CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING
|
|
- Roberta Williamson
- 5 years ago
- Views:
Transcription
1 99 CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING 5.1 INTRODUCTION Dynamic network topology and limited system resources characterize mobile ad hoc networking. Many routing protocols were proposed for routing in MANETs (Chakeres and Belding-Royer 2004; Jiang et al 1998). In MANETs, performance decreases when network s size exceeds a certain threshold, resulting in many routing algorithms performing only when network s size is small. To overcome bandwidth and battery power limitations and reduce routing overhead, it is mandatory to make network organization smaller and manageable (Garcia et al 2003). A clustering architecture provides MANET environments with three features: network scalability, fault tolerance and communication overhead reduction. Many clustering algorithms have geographical regions as clusters or form new ones unnecessarily. (Chiang et al 19997; Lin and Gerla 1997). An algorithm by Chatterjee et al (2000) creates necessary clusters without using routing protocol maintained information. It has been proved that cluster architecture ensures basic performance achievement in MANETs with many mobile terminals. A cluster structure provides at least three benefits, as an effective topology control measure. First, it facilitates spatial resources reuse to increase system capacity. With the non-overlapping multi-cluster structure, two clusters can use the same frequency/code set if they are not neighbours. Also, a cluster
2 100 coordinates transmission events better with a special mobile node, with a cluster head, inside. This saves retransmission resources resulting in lower transmission collisions. The second benefit is in routing, as a cluster head set and cluster gateways normally are the virtual backbone for inter-cluster routing which in turn restricts creation and spread of routing information. Last, a cluster structure shrinks an ad hoc network and makes it more stable with every mobile terminal. When a mobile node changes its cluster attachment, the information is updated only in those nodes in corresponding clusters. Thus, local changes do not need updation by the whole network as this greatly reduces information stored by each mobile node. 5.2 CLUSTERING Clustering technique is not a routing protocol; it aggregates nodes into groups to ensure easier network management. An ad hoc network s cluster organization is impossible to be achieved in fixed infrastructure, offline. Clustering scheme implementation ensures better protocol for Media Access Control (MAC) through improvement of spatial reuse, throughput, scalability and power consumption. MANETs have multiple benefits from clustering. To begin with, cluster structure ensures MANETs scalability and load balancing, increases system capacity facilitating spatial resources reuse. In a multi cluster structure, two non-overlapping clusters can have similar frequency if they are not adjacent. It also elects a mobile host with special features called cluster head for enhanced transmission activities coordination which in turn alleviates collision of mobile nodes, saving both energy and resources. Second, it limits creation and spreading routing information through formation of a inter-cluster routing backbone consisting of cluster heads and cluster gateways. Lastly, it provides a stable and smaller vision of ad hoc network when a mobile node changes its attaching cluster so that the whole
3 101 network need not be aware of local changes in a node set. Only mobile nodes in a corresponding cluster reflect such changes. Hence each node stores and processes a fraction of total network routing information saving resources. Clustering aims to be connected and nodes play various roles in clustering techniques. The three node types are defined as follows: 1. Ordinary nodes 2. Cluster head 3. Cluster gateways Cost Involved with Clustering Construction and maintenance of a cluster structure requires additional cost compared to flat structure MANETs. Cost of clustering analysis is carried out either quantitatively or qualitatively to outline both clustering techniques benefits and drawbacks. Clustering associated cost is explained below: 1. Due to Frequent network topology changes cluster related information varies drastically in a dynamically changing cluster structure. Transfer of message packets subsequently eats up massive bandwidth, depleting mobile nodes energy and further disabling upper layer applications that are unable to be implemented with meagre resources. 2. Re-clustering occurs in some clustering schemes due to abrupt local instance like mobile nodes moving to other clusters or due to the demise of a mobile node or shutting down of cluster heads, resulting in other cluster heads reelection. This is re clustering ripple effect which stimulates a re-clustering effect over the full network.
4 Clustering stages are divided into two: cluster formation and maintenance. The first stage assumes that mobile nodes are static. Every mobile node obtains information from neighbouring nodes in a specific period which might prove impractical in a real time scenario. 5.3 CLUSTER MANAGEMENT Clustering architecture provide network scalability, fault tolerance resulting in increased use of network resources. It could be used for resource management, routing and location management to lower communication and computational overheads. This section discusses cluster formation and maintenance Clustering Algorithm Design Goal It is intended to integrate clustering with routing functions. The design aims of the clustering scheme include: An algorithm using a routing protocol s control messages to form clusters with limited overhead. An algorithm operating in localized and distributed manners and intertwining with nodes using only AODV. The algorithm incurring limited cluster formation/ maintenance overhead and supporting formation of ondemand clusters. The algorithm minimizing network-wide flooding and being scalable.
5 103 The proposed scheme constructs/updates clustering architecture when clusters alone service is required. The on-demand nature of AODV s is utilized for the scheme. Nodes participating in clustering are known from CHs maintained topological information and individual nodes Cluster Formation The aim of clustering is to ensure efficient use of network resources, enhance availability, reduce overheads and give scalable architecture (Jiang et al 1998; Garcai et al 2003). The clustering algorithm choice affects clusters stability. The proposed work divides a network into several two-hop clusters where in each cluster a node can play one of five roles: cluster head, ordinary node, secondary cluster head, undecided node or gateway. A gateway is a node that communicates directly with more than two clusters. A Cluster Head (CH) is elected in every cluster and it is responsible for maintaining inter and intra-cluster communication. Every CH maintains two tables in addition to a routing table, an intra-cluster node table and a k- hop cluster table. The intra-cluster node table has the IDs of cluster nodes. The k-hop table has the IDs of CHs of other clusters in a 2-hop neighborhood. The CHs coordinate every cluster and store shared information. All nodes regularly broadcast a hello message to ensure information about neighbors. To reduce the periodic broadcasting overhead, new/undecided nodes learn of their nearest CH on demand by forwarding a cluster head request packet. The nodes act as either ordinary nodes or a gateway based on present location. A Secondary Cluster Head (SCH) is also chosen to avoid the CH from becoming into a bottleneck (Lu and Denko 2004). The SCH stores backup routing and cluster information, with the role being rotated among
6 104 ordinary nodes. This election needs no extra overheads as any node wishing to serve as a SCH informs the CH and the latter informs cluster members Cluster Head Election Many distributed algorithms were suggested for CH election in MANETs. Chiang et al (1997) revealed that the Lowest ID (LID) algorithm performed better than cluster head election algorithms based on Highest Connectivity (HC). The proposals in Chatterjee et al (2000), Garcia et al (2003) use varied criteria for CH election. As cluster heads are responsible for maintenance and intra and inter-cluster communication, they were expected to work for long durations when elected. Node mobility and link failure are the chief reasons for cluster head re-election and changes in cluster membership. Node Gateway Cluster Figure 5.1 Cluster head election Denko (2003), proposed a mobility-based clustering algorithm where a node is elected as CH only when the mobility index is below a specific threshold. This index is computed based on cluster membership and CH changes. When there is a tie, the lowest ID node is selected. In cluster election algorithm, lowest ID clustering is first used to form clusters. Hence, a node is elected CH when it has the lowest ID. This forms the initial node configuration. Later, a node with a mobility index lower than its neighbors is used as criteria. In Figure 5.1, every node broadcasts mobility information to
7 105 neighbors during a CH election. Once information is collected from neighbors every node checks to see if it is the node with the lowest mobility index. Once this is confirmed it becomes a CH itself and informs all neighbors. In this study, the CH is selected based on the lowest ID and mobility index Cluster Maintenance cluster maintenance. Cluster maintenance consists of two parts: intra-cluster and inter Intra-cluster maintenance To keep the neighbor table and CH information updated, nodes exchange hello messages at periodic intervals. A hello message has information about a node s ID and roles. If no hello message is received from a neighbor during the ALLOW_HELLO_LOST interval, the neighbor is thought lost and removed from the table. An ordinary node checks the neighbor table to check whether the CH is still alive. When no CH is found to exist, a new CH is elected in the neighborhood. Local maintenance is carried out, when a CH fails Inter-cluster maintenance Every cluster head has a k-hop cluster table, containing all network k-hop CHs information. Each CH then informs neighboring CHs that it is active by forwarding a HeadAlive message. For example, CH1 receives a HeadAlive message from CH2. If CH1 discovers that CH2 exists in the CH table, CH2 s expiration time is updated. Otherwise, a new CH entry for CH2 could be inserted and its expiration time would be set by improving CH update time to the present. When no HeadAlive message is received from cluster heads during a HEAD_UPDATE_INTERVAL interval, such a cluster
8 106 is assumed to be unavailable. When no HeadAlive message is received during ALLOW_HEADALIVE_LOST interval, then that CH is removed from the CH table. 5.4 IMPLEMENTATION OF THE AODV CLUSTERING AND ROUTING SCHEMES A k-hop CH table maintains k-hop neighbor cluster information. In this study k=2, where only two hop clusters are considered. The K-hop CH table maintains fields such as CH ID, CH status, cluster size, CH expiration time and number of times the hello message has been lost. The CH s expiration time is the current time plus the HeadAliveUpdate interval. A CH s status could be either alive or not alive. A CH s status will be marked as not alive when its HeadAlive message is not received by other CHs within its expiration time. A CH entry will be removed from a k-hop CH table if the number of times that the HeadAlive message has not been received exceeds three. In the following section, the various data structure added to the AODV to implement the proposed clustering architecture is presented Hello Message and Neighborhood Maintenance Prior to a hello message being forwarded the sender node adds status information to it. The hello message sender can be a CH, a gateway, ordinary node or undecided node. The hello message s extension includes the following: source address, lifetime and current status. A neighbor table stores the neighbor s ID, expiration time, status and the many times a hello message was lost. A node on receipt of a hello message from neighbors, checks whether the neighbor is alive in the neighbor table. If existence is confirmed, the neighbor s expiration time is updated or else a new entry is added. When a node has not received a hello message from
9 107 another in three subsequent hello intervals, it is thought to be unconnected and is removed from the neighbor table Cluster Management Module The following three modules are used to implement an AODV based clustering algorithm Cluster initialization module A cluster formation module initializes clusters after initializing an AODV. The module is invoked through the CLUSTER_FORM_PERIOD, a predefined threshold. Before initialization, all nodes are set at status of undecided and broadcast hello message to neighbors. When a node receives all the hello messages from neighbors, it invokes a Cluster Head Election module to elect a CH. This stage uses a LID clustering algorithm. The new CH notifies neighbors and other CHs. The nodes on receipt of a CH existence notification, changes its status to an ordinary node and forwards hello messages to neighbors. When a node locates two different CHs in the neighbor table, that node changes into a gateway. After the execution of a cluster information module, all nodes belong to one cluster at least Cluster head election module A node invokes a Cluster Head Election module to elect cluster heads when there is no CH or when multiple CHs are in proximity to each other. The procedure involves the following steps: A node checks whether it has the lowest mobility index among non-gateway neighbors. When it has the lowest mobility index, it declares itself as CH and notifies other nodes. Otherwise, it changes its status to ordinary node.
10 108 Figure 5.2(a) reveals the topology of a hypothetical clusterednetwork at time t. In Figure 5.2(a), nodes 1, 3 and 6 are CHs. Nodes 8 and 9 are gateways while nodes 2, 4, 5 and 7 are ordinary nodes. Assuming that at time t2 the network s topology changes to Figure 5.2(b), where node 7 has moved from its original cluster. When node 7 checks the neighbor table, it cannot locate a cluster head. Thus node 7 uses the Cluster Head Election module to elect a new CH and the result is shown in Figure 5.2(c), where node 7 becomes a new CH and node 4 the new gateway (a) Node Gateway Cluster Head (c) (b) Figure 5.2 Cluster re-election when no cluster exists in the neighbor table
11 109 Figure 5.3 reveals a situation where many CHs exist in one cluster as shown in (a). When the network s topology changes from Figure 5.3(a) to Figure 5.3 (b) at time t 2, nodes 6 and 7 exchange positions. Node 6 and node 3 find two CHs among their neighbors, as shown in Figure 5.3 (b). Then both node 3 and node 6 invoke the Cluster Head Election Module to select a new cluster head. After cluster election, node 6 throws away its CH status and changes itself into an ordinary node. Node 3 remains a CH. Again, the cluster with nodes 5, 7, 8 and 9 elect node 5 as the new CH. Network topology after the CH reelection is seen in Figure 5.3(c) (c) Node (a) Gateway Cluster Head (b) Figure 5.3 Cluster re-election when more than one cluster head exists Figure 5.3 reveals a situation where many CHs exist in one cluster as shown in (a). When the network s topology changes from Figure 5.3(a) to
12 110 Figure 5.3 (b) at time t 2, nodes 6 and 7 exchange positions. Node 6 and node 3 find two CHs among their neighbors, as shown in Figure 5.3 (b). Then both node 3 and node 6 invoke the Cluster Head Election Module to select a new cluster head. After cluster election, node 6 throws away its CH status and changes itself into an ordinary node. Node 3 remains a CH. Again, the cluster with nodes 5, 7, 8 and 9 elect node 5 as the new CH. Network topology after the CH re-election is seen in Figure 5.3(c) Neighbor table purge module As all nodes are mobile and network topology s changes frequently, network may be unstable. Clusters size and nodes status varies at any time due to mobility. To ensure that the cluster information is fresh and updated, the neighbor table is purged Cluster AODV Based Routing The AODV protocol sends many packets in comparison to other reactive protocols like DSR. So, when network s size increases, node degree also increases proportionately, leading to congestion in the network. Clustering reduces this through localized route discovery and maintenance. The suggested Cluster AODV scheme uses clustering architecture and AODV functionalities for routing. This section discusses mechanisms used by Cluster-AODV to lower routing overhead and allows scalability while ensuring good packet delivery ratio Intra-cluster routing Intra-cluster routing is routing within a cluster. Each node has routing information on its cluster. When a node lacks a route to a destination that is in the cluster it sends a Local Route Request (LRREQ). When route failures ensure lack of reply to a RREP, local route maintenance is undertaken within a cluster.
13 Inter-cluster routing Inter-cluster routing is routing among clusters. The CH has a 2-hop cluster topology also maintained in a SCH to minimize one point of failure. When routes cannot be found in a cluster once a LRREQ message has been issued, a CH uses a RREQ message to locate a destination via a gateway to 2- hop neighbor clusters. To lower RREQ flooding packet overhead only gateways and CHs forward the RREQ. Ordinary nodes are not involved in RREQ packets in inter-cluster communication Route maintenance Similar to route maintenance, cluster maintenance starts when a route fails within a cluster and is re-constructed locally using LRREQ and RREQ with 2-hop topology information. When LRREQ fails, an AODV procedure is used and the usual RERR is forwarded to source nodes for route reconstruction. The source node follows the same process to repair failed routes, first locally and then others. The processes involving a new node which joins and an existing node leaving are carried out based on hello messages from AODV. When CHs exchange neighborhood information with cluster members, a new node close by can register with a CH by using a RREQ message. A node acts as gateway when it registers with two CHs. When a node goes away from the present CH, it switches its role to that of an ordinary node, a gateway or will be undecided. It will be erased from the old CH and old members routing entries are updated accordingly.
14 SELFISH NODES In ad hoc networks, nodes are classified as failed, co operative, selfish and malicious nodes. A node can refrain from being active in a network when moving out of transmission range or when it is switched off by malfunctions. Failed nodes are unused during route discovery. Co-operative nodes are active in the network and participate in route discovery and packet forwarding. Selfish nodes actively involved in route discovery and actively send/receive own packets. But they are liable to drop other nodes data packets either fully or selectively to lower CPU processing to save battery power. Such nodes affect network performance greatly. But malicious nodes are also active in route discovery and could involve data packets transfer similar to selfish or co-operative nodes. However they also launch attacks on networks either to disrupt services or steal network data.. As mobile nodes are autonomous they join or leave the network freely and so nodes are unable to work out an effective system to prevent prospective malicious behavior from nodes it communicate with. This is because nodes behavioral diversity. Further, because of ad hoc network mobility a compromised node can and will frequently change attack target and indulge in malicious behavior with various network node, thereby making it difficult to track malicious behavior of a compromised node in a large ad hoc networks. Hence, threats from compromised nodes with networks are more dangerous than attacks from outsiders. Also such attacks are harder to detect as they are from compromised nodes, which behave correctly prior to being compromised. An example of such threats is from potential Byzantine failures seen in the routing protocol for MANET (Mishra et al 2004). Byzantine failure occurs when nodes are compromised so that incorrect/malicious behavior cannot be easily detected due to cooperation among compromised nodes when they indulge in malicious behavior. Such nodes may behave well,
15 113 but they may use flaws and inconsistencies in routing protocols to destroy routing network fabric without detection, generate and advertise new routing information containing nonexistent link, provide fake link state information and even flood other nodes with routing traffic. Such malicious behaviors are liable to be ignored by other nodes as compromised nodes cannot be recognized easily. One of the misbehavior which the malicious node exhibit is selfishness, wanting to preserve own resources while using the services of the other nodes in network and consuming their resources. Performance of ad hoc network protocol depends upon the cooperation of all the nodes in the network. Nodes transfer traffic by route detection and packet forwarding. As transferring traffic consumes energy, CPU time, memory and bandwidth, selfish nodes deny packet forwarding to other nodes but use the network resources to deliver its own data. Detection and exclusion mechanism is used to prevent selfishness in ad hoc networks. The selfish node saves its own resources as follow (Bruce 2000): 1. Not participating in routing: Selfish node do not relay the routing data such as route requests and route replies. Set hop limit or TTL value at the lowest in route request / reply. Selfish nodes modify routing data to modify route request, insert additional hops, declare own ID as external in source route. 2. Stop participation in current route: Do not participate in route request, create arbitrary RERR messages, not sending ACK messages. 3. Stop relaying data packets: Drop data packets.
16 EXPERIMENTAL SETUP The OPNET simulation tool is used to evaluate performance. Simulation parameters are the same as used in the previous chapter. Three scenarios are studied in this investigation, Nodes moving in constant speed To replicate real time scenario, experiments with 8 nodes moving at an average speed of 100 Kmph in a predefined circular route 4 nodes moving at an average speed of 65 Kmph in a predefined straight route. Balance nodes moving randomly about the network. To replicate real time scenario, selfish nodes are included in the network. Simulations are run using Fuzzy AODV, Proposed Fuzzy Clustered AODV and Proposed Fuzzy Clustered AODV with selfish nodes. The proposed AODV Clustering approach is evaluated for packet delivery ratio and end to end delay. 5.7 RESULTS AND DISCUSSION The experiments were conducted based on the above simulation parameters. Each data point in the graph represents an average of ten simulation runs. Figure 5.4 shows the packet delivery ratio for Nodes moving in constant speed. Figure 5.5 show the end-to-end delay in MANET. Table 5.1 tabulates the same.
17 115 Table 5.1 Packet delivery ratio and end-to-end delay for nodes moving in constant speed. Packet Delivery Ratio End to End Delay Node Mobility speed Fuzzy AODV Proposed Fuzzy Clustered AODV Fuzzy AODV Proposed Fuzzy Clustered AODV 10.8 Kmph Kmph Kmph Kmph Kmph Kmph Figure 5.4 Packet delivery ratio for nodes moving in constant speed
18 116 Figure 5.5 End-to-end delay nodes moving in constant speed From Figures 5.4 and 5.5, it is seen that when the nodes move in constant speed, the proposed Fuzzy clustered AODV performance is similar to Fuzzy AODV. In high speed, Fuzzy AODV performs better than the proposed clustered AODV. The increase in end to end delay is however negligible. Table 5.2 and Figure 5.6 shows the packet delivery ratio for Nodes moving in varying speed for Fuzzy AODV, Proposed Fuzzy Clustered AODV and Proposed Fuzzy Clustered AODV with selfish nodes. Table 5.3 and Figure 5.7 show the end-to-end delay in MANET.
19 117 Table 5.2 Packet delivery ratio for nodes moving in varying speed Time in sec Fuzzy AODV Proposed Fuzzy Clustered AODV Proposed Fuzzy Clustered AODV with selfish nodes
20 118 Figure 5.6 Packet delivery ratio for nodes moving in varying speed From figure 5.7 it can be seen that end to end delay is high for malicious nodes as newer routes need to be discovered due to the packet drop caused by selfish nodes. Figure 5.7 End-to-end delay for nodes moving in varying speed
21 119 Table 5.3 End-to-end delay for nodes moving in varying speed Time in sec Fuzzy AODV Proposed Fuzzy Clustered AODV Proposed Fuzzy Clustered AODV with selfish nodes
22 120 From Figures 5.6 and 5.7, it is seen that the proposed Fuzzy Clustered AODV performs better than Fuzzy AODV in terms of both packet delivery ratio and end-to-end delay. It is also seen that the performance of the network deteriorates considerably in the presence of selfish nodes. 5.8 CONCLUSIONS This work presents an AODV-based clustering and routing scheme for MANETs. The scheme is used for integrated routing and message delivery in clustered networks. The proposed clustering architecture was evaluated using simulation experiments. The simulation results show that the algorithm builds stable clusters achieving better packet delivery ratio and end-to-end delay. Further studies are required to address the deterioration in performance due to the presence of selfish nodes.
Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationPerformance Analysis of MANET Routing Protocols OLSR and AODV
VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz
More informationMobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1
Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More information2013, IJARCSSE All Rights Reserved Page 85
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of
More informationPerformance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Comparison of DSDV, AODV, DSR, Routing protocols
More information2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)
2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing
More informationPerformance Evaluation of MANET through NS2 Simulation
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation
More informationINTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..
INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH An Overview of Mobile Ad-Hoc Networks: Architecture, Routing and Challenges Avadhesh Kumar 1 Sonali Yadav 2 Kamalesh Chandra Maurya 3 1 Assistant Professor, avadhesh@iul.ac.in
More informationPerformance Evaluation of AODV and DSR routing protocols in MANET
Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and
More informationPERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS Natarajan Meghanathan Jackson State University, 1400
More informationPresenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks
Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali
More informationReview on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks
RESEARCH ARTICLE OPEN ACCESS Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks Mrs. P. V. Meghare 1, Prof. P. A. Deshmukh 2 1 Department of Computer Science, Nagpur University,
More informationAn Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks
An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationMobile Communications. Ad-hoc and Mesh Networks
Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationKapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types
Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.
More information1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol
1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks
More informationVarying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network
Journal of Computer Science 7 (5): 678-682, 2011 ISSN 1549-3636 2011 Science Publications Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network 1 V. Balaji and 2 V. Duraisamy
More informationPacket Estimation with CBDS Approach to secure MANET
Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,
More informationENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK
ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK Yousif Ali Saadi, Rosilah Hassan and Dahlila Putri Dahnil Network Communication Lab Research, Centre for Software Technology and Management
More information6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationPerformance of Ad-Hoc Network Routing Protocols in Different Network Sizes
Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co
More informationSurvey of Routing Protocols for Mobile Ad hoc Networks
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 8, Issue 1 (Nov-Dec. 2012), PP 34-40 Survey of Routing Protocols for Mobile Ad hoc Networks Ashima Batra 1, Abhishek
More informationA Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver
1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More informationComputation of Multiple Node Disjoint Paths
Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes
More informationPower aware Multi-path Routing Protocol for MANETS
Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile
More informationMultipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network
1 Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network Nilima Walde, Assistant Professor, Department of Information Technology, Army Institute of Technology, Pune, India Dhananjay
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA
More informationLECTURE 9. Ad hoc Networks and Routing
1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links
More informationSimulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol
Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-
More informationA Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks
A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior
More informationConsiderable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)
Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing
More informationPerformance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols
www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationPrevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing
Ashish Sharma et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4), 14, 51-55 Prevention of Black Hole Attack in Routing Algorithm of MANET Using Trust Based
More informationA Survey on Cross-Layer Reliable Routing Protocols in MANETs
A Survey on Cross-Layer Reliable Routing Protocols in MANETs Chintan Bhavsar Assistant Professor, Computer Engineering Department, G. H Patel College of, V.V Nagar, Gujarat, India Abstract: A Mobile Ad
More informationPerformance Evaluation of Various Routing Protocols in MANET
208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri
More informationAn Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks
An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation
More informationMitigating Superfluous Flooding of Control Packets MANET
Mitigating Superfluous Flooding of Control Packets MANET B.Shanmugha Priya 1 PG Student, Department of Computer Science, Park College of Engineering and Technology, Kaniyur, Coimbatore, India 1 Abstract:
More informationInvestigation on OLSR Routing Protocol Efficiency
Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova
More informationEfficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks
Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,
More information6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)
103 6. Node Disjoint Split Multipath Protocol for Unified Multicasting through Announcements (NDSM-PUMA) 6.1 Introduction It has been demonstrated in chapter 3 that the performance evaluation of the PUMA
More informationCROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION
CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering
More informationA Survey - Energy Efficient Routing Protocols in MANET
, pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram
More informationSimulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:
Volume-9 Number-1 Jan -June 2017 pp. 16-21 available online at www.csjournalss.com Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Sachin Lalar, Arun Kumar Yadav
More informationPerformance Analysis of Aodv Protocol under Black Hole Attack
International Journal of Scientific & Engineering Research Volume 2, Issue 8,August-2011 1 Performance Analysis of Aodv Protocol under Black Hole Attack Monika Roopak, Dr. Bvr Reddy ABSTRACT- Mobile Ad-hoc
More informationStudy and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs
Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate
More informationA REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS
A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen
More informationExperiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol
Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationAppointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks
Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 6 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so
More informationDefending MANET against Blackhole Attackusing Modified AODV
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 2 August 214 ISSN(online) : 2349-784X Defending MANET against Blackhole Attackusing Modified AODV Devang S. Patel P.G. Student
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationOptimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol
More informationRouting in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14
Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path
More informationMeasure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach
ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.
More informationEmergence of Ad-hoc On-demand Distance Vector Protocol (AODV) as an Efficient On-demand Routing Protocol (EORP) Using Bayesian Approach
ISSN : 2050-3021 Emergence of Ad-hoc On-demand Distance Vector Protocol (AODV) as an Efficient On-demand Routing Protocol (EORP) Using Bayesian Approach Dr. Anubhuti Khare 1, Manish Saxena 2, Raghav Shrivastava*
More information2014, IJARCSSE All Rights Reserved Page 597
Volume 4, Issue 12, December 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Mobility Based
More informationSecure Routing and Transmission Protocols for Ad Hoc Networks
MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks
More informationImpact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationEffects of Caching on the Performance of DSR Protocol
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 07-11 Effects of Caching on the Performance of DSR Protocol Narinderjeet Kaur 1, Maninder
More information[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationA Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 6 (Jul. - Aug. 2013), PP 01-09 A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile
More informationA Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET
A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute
More informationPerformance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET
Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Ekta Barkhodia 1, Parulpreet Singh 2, Gurleen Kaur Walia 3 Lovely Professional University, Phagwara, India ektab0@gmail.com,
More informationOutline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part I Outline Routing Protocols for Ad hoc Networks Example of a reactive routing protocol AODV: Ad hoc On-demand
More informationComparative Study of Routing Protocols in MANET
Comparative Study of Routing Protocols in MANET First Author-PrernaYadav 1 Student,Second Author-ShubhraSaxena 2 Professor Abstract-An ad hoc network is basically a collection of wireless nodes not having
More informationAd Hoc Routing Protocols and Issues
Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed
More informationA Literature survey on Improving AODV protocol through cross layer design in MANET
A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,
More informationPerformance Evaluation in MANET by Using NCPR Scheme with Cluster Technique
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 7, July 2015, PP 22-31 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Performance Evaluation in MANET by Using NCPR
More informationSecurity in DOA routing protocol for Mobile Adhoc Networks
Security in DOA routing protocol for Mobile Adhoc Networks Vanitha.M 1, Deepak.S 2, Ayesha.N 3 1,2,3 Department of Electronics and Communication Engineering, Sriram Engineering College Abstract One of
More informationMANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.
MANET TECHNOLOGY Dharna 1, Varsha Saroha 2, R. B. Dubey 3 1,2,3 Department of Electronics and Communication Engineering, Hindu College of Engineering, Sonepat, Haryana,(India) ABSTRACT Wireless technology
More informationSEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS
SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara
More informationA Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network
A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk
More informationPerformance Analysis and Enhancement of Routing Protocol in Manet
Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and
More informationCaching Strategies in MANET Routing Protocols
International Journal of Scientific and Research Publications, Volume 2, Issue 9, September 2012 1 Caching Strategies in MANET Routing Protocols Narinderjeet Kaur, Maninder Singh Punjabi university, Department
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More informationTHE EXTENDED CLUSTERING AD HOC ROUTING PROTOCOL (ECRP)
THE EXTENDED CLUSTERING AD HOC ROUTING PROTOCOL (P) 1 Buthayna Al-Sharaa 1 Department of Electrical Engineering, Al Balqa Applied University, Jordan buthayna74@hotmail.com Abstract Ad hoc networks are
More informationA Review Paper on Routing Protocols in Wireless Sensor Networks
A Review Paper on Routing Protocols in Wireless Sensor Networks Seema Pahal 1, Kusum Dalal 2 1,2 ECE Department, DCRUST MURTHAL, Haryana Abstract- This paper presents a literature review on WSN networks,
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationPerformance Evaluation and Comparison of AODV and AOMDV
Performance Evaluation and Comparison of AODV and AOMDV S. R. Biradar 1, Koushik Majumder 2, Subir Kumar Sarkar 3, Puttamadappa C 4 1 Sikkim Manipal Institute of Technology, Majitar -737 132 2 WBUT, Kolkata
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationAn Extended AODV Protocol for Multipath Routing in MANETs
IACSIT International Journal of Engineering and Technology, Vol.2, No.4, August 21 An Extended Protocol for Multipath Routing in MANETs N.Jaisankar 1 and R.Saravanan 2 Abstract Mobile ad hoc networks (MANETs)
More informationImplementation of AODV Protocol and Detection of Malicious Nodes in MANETs
Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Savithru Lokanath 1, Aravind Thayur 2 1 Department of Electronics & Communication Engineering, DayanandaSagar College of Engineering,
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationPerformance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV
MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through
More informationA Hybrid Multi Meshed Tree Routing Protocol for Wireless Ad hoc Networks
A Hybrid Multi Meshed Tree Routing Protocol for Wireless Ad hoc Networks Scott Pudlewski, Nirmala Shenoy, Yamin Al-Mousa, Yin Pan, John Fischer Rochester Institute of Technology, Rochester, NY Abstract
More informationInvestigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments
Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments Al-Baadani, Faris., Yousef, S., Tapaswi, S., Patnaik, K. K., and Cole, M Faculty
More informationENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS
ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS May Cho Aye and Aye Moe Aung Faculty of Information and Communication Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo
More informationSIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze
80 SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that
More informationRecent Researches in Communications, Information Science and Education
AODV Based Multi-path Local Repairing Scheme for Mobile Ad Hoc Networks Eman Shaaban, PhD Computer Systems Dept. Faculty of computer and information science Ain-Shams university, Cairo, Egypt Eman.shaaban@cis.asu.edu.eg
More informationPerformance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks
Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks P.Suganthi Research Scholar Mother Teresa Women s University Kodaikanal, TamilNadu, India Dr.A.Tamilarasi
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #11 - Identity Mgmt.; Routing Security 2016 Patrick Tague 1 Class #11 Identity threats and countermeasures Basics of routing in ad hoc networks
More information