Proactive Distance-Vector Multipath Routing for Wireless Ad Hoc Networks

Size: px
Start display at page:

Download "Proactive Distance-Vector Multipath Routing for Wireless Ad Hoc Networks"

Transcription

1 Proactive Distance-Vector Multipath Routing for Wireless Ad Hoc Networks Ralph Jansen, Sven Hanemann and Bernd Freisleben Department of Mathematics and Computer Science, University of Marburg Hans-Meerwein-Str., D-353 Marburg, Germany ABSTRACT Routing in wireless ad hoc networks of mobile nodes is complicated by the fact that the transmission ranges and the communication bandwidth is limited, and that the network topology is highly dynamic due to continuously moving nodes. In this paper, a new approach is presented to equip proactive distance-vector routing algrithms with the capability of using multiple paths to each target. The basic idea of our multipath routing proposal is to split up a path between a source and a target node into two paths at every forwarding node. In contrast to other multipath approaches, our solution uses already available topology information and thus does not require any additional routing messages to be sent. The benefits of our approach with respect to load distribution, bottleneck avoidance, fairness and communication breakdowns are demonstrated via simulations. KEYWORDS wireless networks, ad hoc networks, routing, multipath routing Introduction Wireless ad hoc networks consist of an ensemble of mobile nodes operating in a particular area without using any existing infrastructure. Each mobile node acts as an intermediate router forwarding messages received by other nodes. Thus, a wireless ad hoc network is only operational if nodes offer their forwarding capabilities to other nodes. The special conditions of wireless communication like limited transmission range, limited bandwidth and possible interference require dedicated routing algorithms that take these conditions into account. Routing protocols for wireless ad hoc networks can be broadly classified into reactive and proactive algorithms. Reactive routing algorithms rely on flooding to establish new routes that replace invalid routes due to node movement. Proactive routing algorithms usually constantly update routing tables among nodes. Both methods consume a certain percentage of the available bandwidth for routing purposes, which increases with node movements. Existing reactive routing algorithms like DSR [] and AODV [] invoke their route determination procedure only on demand through a query/reply approach. They have been optimized by computing multiple and link disjoint paths during the initial path finding process [7, 5] to counter the increasing bandwidth demands caused by route finding and establishment for rising node movement speeds. If multipath routing is used in reactive routing algorithms, there will be a basic advantage: Since routes are calculated on demand every time when a new route must be determined, the calculation of additional routes towards the same target increases the number of messages for route calculation required anyhow only slightly. Therefore, it is reasonable to calculate all available routes within one search request and use them as long as they are operational. Another approach [3] is to add proactive route maintenance and selection methods to a reactive routing protocol like DSR to reduce the number of broken paths. However, bandwidth consumption is increased with this approach. Proactive routing algorithms like DSDV [] maintain routes between nodes all the time. In fact, most proactive protocols try to maintain a shortest path to each destination all the time. This is achieved by continuously monitoring the network topology. In contrast to reactive algorithms, proactive approaches are capable of repairing a broken route within short time, due to the continously collected network topology information. Several proposals to use multiple paths in proactive algorithms have already been presented [4, 3, 6]. In the most advanced of these approaches [4], distance vector routing is extended to offer the computation of all possible alternative paths with instant loop freedom. In this paper, we present a new approach to add a multipath capability to proactive distance vector (DV) routing algorithms. Such routing algorithms are well suited for wireless networks [8,, 6]. The basic idea of our multipath proposal is to split up a path between a source and a target node into two paths at every forwarding node of the path (if the network topology offers sufficient alternatives), resulting in multiple paths between source and target. Whenever multiple paths are available, the forwarded data packets are later randomly distributed to each available path. This prevents the cost of additional messages

2 for load distribution, and still enables a fair load distribution in the long run. Thus, in contrast to the approach proposed in [4], our solution offers multipath routing based on the already available topology information, which does not require any additional routing messages to be sent at all. Just one additional step must be added to the processing of routing update messages to obtain an alternative packet forwarding possibility at each node. This minimizes bandwidth consumption and is thus a major advantage in wireless networks with battery powered nodes. For this reason, loop protection is provided by our proactive distance-vector routing algorithm [6] instead of building it into the multipath extension. Using simulations, we will demonstrate the benefits of the proposed multipath routing approach with respect to load distribution and communication breakdowns. The paper is organized as follows. Section presents an overview of our proactive distance-vector protocol, the tree exchange routing algorithm (TERA) and describes how the proposed strategy can be realized. Section 3 discusses the performance results obtained from a series of simulations regarding load distribution. Section 4 presents additional simulations to analyze the error behavior of multiple path routing. Section 5 concludes the paper and outlines areas for future research. The Tree Exchange Routing Algorithm The tree exchange routing algorithm (TERA) [6] is based on asynchronous distributed distance vector routing but uses several additional tables to allow path reconstruction. This avoids the count to infinity problem which causes a very slow adaptation to new network topologies and forbids the use of simple distance vector algorithms including the standard routing information protocol (RIP) [] in networks with fast topology changes. Figure shows the advantage of tree based routing. The path from any destination i to root A is stored in the. Any path can be backtraced to the root using these entries, enabling the detection and avoidance of any loop. To describe TERA, we assume that there is a network of nodes, each having an unique identifier k. These nodes are able to communicate with each other via links. The links are assumed to have a cost which is also called distance. The distance between a source and a destination is given by d ij and must be positive. Nodes with d ij < are called neighbors. If there is no direct way of communication between nodes i, j, the distance is assumed to be predecessor entries V A i infinite d ij =. The distance of a node to itself is assumed to be zero: d ii =.. Data Structure The status of a node with an unique identity k is defined by the following tables: A E B 4 3 F H C G Table entries of A i Di A Ni A Vi A A - - B B A C 4 E F D 5 E C E E A F 3 E E G 3 E E H E E Figure. Path recovery in tree exchange routing The routing table Di k, showing the best available distances to destination i. The successor table Ni k, showing the id of the neighbor which is used to forward to destination i. The predecessor table Vi k, showing the predecessor node of the chosen shortest path to i. There are two further tables to store all collected information available by messages coming from neighbors. These tables are later used to calculate the three routing tables mentioned above: The neighbor distance table NDij k shows the best available distance to destination i offered by neighbor j. The neighbor predecessor table NVij k shows the predecessors in the shortest path to i offered by node j. Table N i can be recalculated by backtracing all paths through V i, so that table N i does not need to be forwarded to neighbors.. Initialization All communications between nodes are described in an event-based manner. The state of any node is described by Di k(t),nk i (t),vk i (t),ndk k ij (t) and NVij (t). At startup t =each node initalizes its tables: Di k() := i, k i k, and Dk k := k D

3 N k i () := none i, k Vi k() := none i, k NDij k () := i, j, k NV k ij () := none i, j, k.3 Updating Neighbors After initialization, the iteration is started. In the first step, all nodes send the tables Di k, V i k to their neighbors. At startup, these tables contain only one valid element, the sending node itself. Each node stores the received information in the tables NDij k k and NVij. If node k receives tables Dj i (t ),V j i (t ) from neighbor j containing the minimum spanning tree used for routing by neighbor j, the tables of k are updated as follows. First, all old entries have to be deleted: NDij k (t) := i NVij k (t) := none i After that, the new tree is inserted: All distances reported by neighbor j must be increased by the distance from k to neighbor j: ND k ij (t) := Dj i (t ) + d kj i. The predecessors remain unchanged NVij k j (t) := Vi (t ) i. After that, a predecessor entry must be corrected. This is necessary because the root of a received minimum spanning tree has no predecessor entry. But at node k the new root of all received trees is node k: NVjj k (t) := k Finally, node k recalculates a new minimum spanning tree using the information stored in NDij k k (t) and NVij (t). The new minimum spanning tree is stored in tables D i k(t), Ni k k (t) and Vi (t). If a calculation leads to different tables compared to the results from the previous iteration, the tables D i k(t), Vi k(t) must be sent to all neighbors which are {i d ki < }. All distance vector algorithms use this iteration process which causes information distribution in a step by step manner. With each iteration, the information about remote neighbors travels one hop forward through the network. Due to the recalculation in each node, only important information will be sent to neighbors; this is the first step to bandwidth efficiency in routing. It is not necessary to always resend a full minimum spanning tree if an update occurred. There are algorithms available to reduce update messages to minimal sizes [9] and still guarantee consistency of trees among the communicating nodes. However, a description of message compression is beyond the scope of this paper..4 Calculation of Minimum Spanning Trees Recalculation of the minimum spanning tree is done with an adapted shortest path algorithm of Dijkstra []. Every node k has a collection of reported minimum spanning trees of its neighbors stored in table NDij k k and NVij. The trees have been altered during reception to be subtrees under the root of node k. The algorithm of Dijkstra can be immediately applied to extract the minimum spanning tree regarding node k. The shortest path algorithm is executed at each node. Since all calculations are done at one point in time, indices regarding status t are omitted. First, the tables Di k, N i k, V i k of node k are cleared: Di k := i Ni k := none i Vi k := none i Table Di k lists the estimated distances to all destinations. These estimations may change during calculation if a better path to a certain destination is found. All nodes with unchanged distances are members of a list of permanent nodes P k. The algorithm also uses a candidate list C k containing the identity of all nodes which are candidates for becoming permanent. At start, the distance of the root node k is set to zero Dk k := and P k := {k}. The list of candidates is filled with the identities of neighbors of node k: C k := C k {i d ik < } and the distance estimation is set to all existing links of node k: Di k := d ik {i d ik < }. The successors are set to the neighbors Ni k := i {i d ik < }. The predecessors are set to k: Vi k := k {i d ik < }. The calculation of the minimum spanning tree is performed in a loop until there are no more nodes which can become permanent: the candidate with the minimal distance offer is searched BD k := min[d k i ] {i i Ck }, BI k := is the identity of the node with the minimal distance BD k. the best candidate is made permanent P k := P k {BI k } the candidate is removed from the candidate list C k := C k \{BI k } all successors of BI k become candidates C k := C k {i i/ P k and NV k the distance for these new candidates must be set D k i := DV k i (N k BI k ) {i i/ P k and NV k

4 the successors for these new candidates must be set N k i := N k (BI k ) {i i/ P k and NV k the predecessors for these new candidates must be set V k i := NV k i (N k BI k ) {i i/ P k and NV k After having executed this loop, a new minimum spanning tree regarding node k is available in tables D i k(t), Ni k(t), V i k (t). Now, the new tables are compared to the tables of the previous calculation to check whether the distance of nodes or their position within a tree has changed..5 Update Criteria With unrestricted shortest path calculation, the tables Di k k (t) and Vi (t) must be sent to all neighbors if at least one of the following criteria is true: i : D k i (t) Dk i (t ) i : N k i (t) N k i (t ) i : Vi k (t) V i k (t ) () Updates are optimized by changing these criteria, thus not allowing every small change to be forwarded immediately. Consequently, updates may be limited to a threshold D which defines the maximum tolerable change in distance that can be suppressed. Thus, with reduced path optimization the tables Di k k (t) and Vi (t) must be sent to all neighbors if at least one of the following criteria is true: i : Di k(t) Dk i (t ) Di k(t) > D i : Ni k (t) Ni k (t ) () The criteria i : Ni k(t) N i k (t ) remains unchanged because any variation in N i k is a substantial tree modification that cannot be ignored. This term also guarantees that information about new or vanished nodes are immediately forwarded to neighbors..6 Route Maintenance There are two major events that must be handled by a routing algorithm during network operation. A routing algorithm must be able to include new destinations into the routing tables and delete lost destinations from them..6. Adding Nodes If a new neighbor is detected by node k, some corrections at NDij k k and NVij are required to integrate the new link into route calculation. First, the new neighbor with identity n must be inserted into the neighbor distance table with ND k nn := d kn, and a predecessor must be set to link this neighbor as a new subtree with NV k nn := k. A new minimum spanning tree must be calculated in this case, as described in section.4. If the new neighbor offers some better paths, the check of the update criteria described in section.5 will be positive, and this new information is sent to all neighbors..6. Deleting Nodes A connection loss from node k to a neighbor n will change the link cost d kn to infinity. Node k must update its tables to check whether current routes include forwarding to the unreachable neighbor. Table NDin k must be set to iand table NVin k must be set to none i. Then, a new minimum spanning tree is calculated by node k as described in section.4. If the update criteria check described in section.5 detects that routes must be corrected, the neighbors are updated with this information..7 Extensions for Multipath Routing To add the multipath capability to the algorithm described above, an additonal forwarding table must be added to the data structure: the alternative successor table ANi k, showing the id of the neighbor which is used to forward to destination i via an alternative path. Whenever a neighbor j sends an update to node i, an additional computation step must be performed after the recalculations of routing tables described in section.4 have taken place to find alternative paths. First, all destinations which are marked as unreachable in the first routing table also get marked as unreachable in the alternative table: AN k i = none i N k i = none After that, table NDij k is searched for all targets which are reachable in the first table. If the distance information stored in NDij k offers the same path lengths as the primary distance table Di k, neighbor j is used for alternative forwarding, otherwise the alternative path is marked as unusable: AN k i = { j j :(j N k i ND k ij = Dk i ) none otherwise This extension will detect one alternative path with the same distance as the primary path. The exclusive use of paths with the same distance as the primary path may sound as a hard limitation, but this limit is a very effective protection mechanism against routing loops, and this mechanism

5 does not require any additional messages. A detailed analysis of routing loop protection in multipath routing can be found in [4]. To forward a packet to destination i, the routing algorithm will check whether alternative paths are available. One path is available for destination i if Ni k none and an alternative path is available if ANi k none. If only one path is available, the packet has to be sent to the next node (i.e. Ni k ). If an alternative path is available, the next hop will be chosen randomly. Therefore, outgoing packets will be split into two paths, one half will be sent to Ni k and the other half to ANi k. 3 Analysis of Load Distribution Number of pakets Load 8 9 To get a better understanding of the possible degree of load distribution for routing algorithms with and without a multipath extension, we performed a series of simulation runs with our wireless network simulator [, 5, 4]. The simulated network is a grid of x nodes, as shown in figure. This (theoretical) scenario is well suited for a basic analysis, because a grid offers many paths with equal length for load distribution. During the simulation, we noticed that any movement of nodes will automatically lead to some kind of load distribution, because nodes swapping position will also swap their communication tasks. Thus, any movement of nodes is not allowed in this first simulation scenario, to keep the analysis restricted to load distribution through routing only. In later simulations we will analyze the duration of communication breakdowns which undoubtly are influenced by node movements, so the simulations in section 4 will be performed with node movements included. S R Figure 3. Load distribution without multipath routing Load Number of pakets Figure 4. Load distribution with multipath routing S Figure. Network topology During each simulation run two connections are set up: the first one sends. packets from the upper left corner to the lower right corner, while the second one sends. packets from the upper right corner to the lower left corner. The routing algorithm without the multipath option chooses one path for each connection, as marked in R figure. The simulation setup enforces that there must be one point in the network (at least one node) where the two connections have to cross each other. In this simulation run, the routing algorithm calculates paths which overlap at four nodes near the upper left corner. The next two figures present the results of our load analysis with and without multipath routing. To visualize the different network load of the nodes, we have chosen a three-dimensional chart. The x grid of nodes is placed on the base floor and the height of each node represents the network load of this node as the total number of forwarded packets during the entire simulation run. The results of the first simulation run without the multipath option is shown in figure 3. As stated above, there are four nodes near the upper left corner, each of which is part of both communication links and must forward the maxi-

6 mum of. packets. These four nodes are the bottleneck of this communication scenario. Each node can only provide a fixed forwarding capacity to the network, and thus the four nodes can only provide 5% of their forwarding capacity to each of these two connections. The second simulation run was performed with the same parameters but the multipath capability of the routing algorithm was switched on. Figure 4 shows the improved load distribution. There are no more bottlenecks, and the nodes with maximum network load are the corners of the grid: the source and the target of both connections. The path of each connection is split up at each step, resulting in perfectly distributed load among the network. The fairness of load distribution in wireless networks is an open field of research. Ad hoc networks are assembled from battery powered mobile nodes, thus packet forwarding is limited by the available battery power. Multipath routing with additional algorithms to get a guaranteed fair load distribution will need additional messages, which counteracts the idea of saving battery power. Our approach offers a simple solution to this problem. If the network topology offers multiple paths with equal length to a target node, the forwarding load is distributed equally to the available paths. The limitation to equal length will lead to improved fairness, because the use of paths with increased length will put additional load to the network by enforcing (otherwise unnecessary) nodes to participate in the forwarding process. All nodes will additionally profit from this approach by avoiding bottleneck nodes which tend to be central nodes within the network. Without load distribution, they will quickly loose their battery power, leading to longer routes which are required to surround the center of the network. 4 Analysis of Communication Breakdowns The last simulation run was performed to demonstrate the different behavior of communication breakdowns with and without multipath routing. The experiments were conducted with the following parameters: a network of 5 nodes transmission ranges of meters each nodes randomly moving on a field of x meters simulation runs with average node movement speeds ranging from. to meters per second one hour simulated movement and network activity the TERA routing algorithm with and without multipath extensions was used beaconing for neighbor detection at a rate of 6 seconds The first simulation run analyzed the number of packet losses with and without multipath routing. A very interesting fact is that the total number of packet losses is equal in both simulations, regardless of multipath usage. This can be explained by the fact that routing in general will not change the probability of packet loss for any transmission between neighbors, so the loss probability is always constant. avg. comm. breakdown times in s TERA without Multipath TERA with Multipath movement speed in m/s Figure 5. Duration of communication breakdowns In a second experiment, we analyzed the average duration of a communication breakdown during network activity. The results of these simulations show a significant difference between routing with and without multipath usage. Figure 5 presents the average duration of communication breakdowns for these simulations. Single path routing shows a significantly increased breakdown duration. If a route breaks down, a single path routing algorithm will need some time until it can provide a new route. Meanwhile packets are lost, leading to a large breakdown duration. Multipath routing splits up its packets to different paths. A route breakdown of one path will result in loosing only the number of packets which has been sent to the broken path. Therefore, communication will suffer from increased packet loss, but communication is still possible. All error recovery algorithms are built to deal with this kind of network error, e.g. all implementations of TCP will resend lost packets until a data transfer is completed. Without the use of multipath routing an error correction mechanism like TCP has to stop its activity until the route has been recovered. With multipath extensions, a communication can be used as long at least one alternative path is available. The error correction procedure automatically resends lost packets. This will result in increased message delay, but not in a full communication breakdown.

7 5 Conclusions This paper presented an extension to standard distance vector routing algorithms based on using multiple paths. We introduced the proactive TERA routing algorithm and explained the necessary modifications to enable multipath routing. The proposed extensions do not require any additional messages, so the multipath capability can be set up at almost no additional cost. The benefits of multipath routing for wireless ad hoc networks were analyzed via simulations. In a first step, we performed experiments to show the effects of multipath routing with respect to load distribution, bottleneck avoidance and fairness. In a second step, we showed the improved performance of multipath routing with respect to communication breakdowns. There are several areas for further research. For example, an important issue are especially designed error correction algorithms for optimal data transfer via multiple paths. Another problem worth investigating is whether several (instead of two) paths are beneficial in particular scenarios. Finally, additional simulations of different network configurations, movement patterns and transfer scenarios are required to analyze the effects of multipath routing in more detail. References [] David A. Maltz David B. Johnson. Mobile Computing, T. Imielinski and H. F. Korth edt., chapter Dynamic Source Routing in Ad Hoc Wireless Networks, pages Kluwer Academic Publishers, Boston, 996. [] Bernd Freisleben and Ralph Jansen. Analysis of routing protocols for ad hoc networks of mobile computers. In Proceedings of the 5th IASTED International Conference on Applied Informatics, pages Iasted-Acta Press, 997. [3] T. Goff, N.B. Abu Ghazaleh, D. Phatak, and R. Kahvecioglu. Preemptive routing in ad hoc networks. In Proc. of ACM SIGMOBILE, pages 43 5, Rome,. [4] R. Jansen. Routing Algorithms for Wireless Ad Hoc Networks with Cooperating Mobile Nodes (in German). PhD thesis, Department of Electrical Engineering and Computer Science, University of Siegen,. [5] Ralph Jansen. Simulating adaptive routing in highly dynamic wireless networks. In Proceedings of the 998 European Simulation Multiconference, pages , Manchester, United Kingdom, June 998. Society for Computer Simulation (SCS). [6] Ralph Jansen and Bernd Freisleben. Bandwidth efficient distance vector routing for ad hoc networks. In Proceedings of the Wireless and Optical Communications Conference (WOC), pages 7, Banff, Canada, June. IASTED, Iasted-Acta Press. [7] M. K. Marina and S. R Das. On-demand multipath distance vector routing for ad hoc networks. In Proc. of the International Conference for Network Protocols (ICNP), pages 4 3. Riverside, USA,. [8] Shree Murthy and J.J. Garcia-Luna-Aceves. An efficient routing protocol for wireless networks. In Mobile Networks and Nomadic Applications (NOMAD), Special issue on Routing in Mobile Communication Networks, volume /4, 996. [9] Shree Murthy and J.J. Garcia-Luna-Aceves. An efficient routing protocol for wireless networks. In Mobile Networks and Applications, Special issue on Routing in Mobile Communications Networks, volume /, pages 83 97, 996. [] Chalres E. Perkins and E. M. Royer. Ad hoc ondemand distance vector (AODV) routing. Proc. of the Second Annual IEEE Workshop on Mobile Computing Systems and Applications, pages 9, February 999. [] Charles Perkins and Pravin Bhagwat. Highly dynamic destination-sequenced distance-vector routing for mobile computers. In Proceedings of the Symposium on Communication Architectures and Protocols, pages ACM SIGCOMM, 994. [] Martha Steenstrup. Routing in Communication Networks. Prentice Hall, Englewood Cliffs, New Jersey, 995. ISBN [3] Srinivas Vutukury and J. J. Garcia-Luna-Aceves. A simple approximation to minimum-delay routing. In SIGCOMM, pages 7 38, 999. [4] Srinivas Vutukury and J. J. Garcia-Luna-Aceves. MDVA: A distance-vector multipath routing protocol. In INFOCOM, pages ,. [5] J. Wu. An extended dynamic source routing scheme in ad hoc wireless networks. In Proceedings of the 35th Hawaii International Conference on System Sciences, pages 96 97, Hawaii,. [6] William T. Zaumen and J. J. Garcia-Luna-Aceves. Loop-free multipath routing using generalized diffusing computations. In INFOCOM (3), pages 48 47, 998.

Bandwidth Efficient Distant Vector Routing for Ad Hoc Networks

Bandwidth Efficient Distant Vector Routing for Ad Hoc Networks Bandwidth Efficient Distant Vector Routing for Ad Hoc Networks Ralph Jansen and Bernd Freisleben Department of Electrical Engineering & Computer Science University of Siegen Hölderlinstr. 3 D 57068 Siegen

More information

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 155-158 STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS Monika ABSTRACT: In Many wireless

More information

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Highly Effective and Efficient Route Discovery & Maintenance in DSR A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

A Performance Comparison of MDSDV with AODV and DSDV Routing Protocols

A Performance Comparison of MDSDV with AODV and DSDV Routing Protocols A Performance Comparison of MDSDV with AODV and DSDV Routing Protocols A. Etorban Peter J.B King Phil Trinder etorban@macs.hw.ac.uk pjbk@macs.hw.ac.uk P.W.Trinder@hw.ac.uk School of Mathematical and Computer

More information

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 185-189 A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols B.V. Manikyala Rao

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Mudit, Sachin Chaudhary Abstract In consideration of adaptability to the environment and flexibility in protocol construction,

More information

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India

More information

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks E.Gnanamanoharan 1 and R. Bensraj 2 Department of Electrical Engineering 1, 2 Annamalai University 1, 2 Email:

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless

More information

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Sharma Shelja, Kumar Suresh and Rathy R. K. Department of CSE, FET, MRIU, Faridabad, India Email: sharma.shelja@gmail.com, enthusk@yahoo.com,

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Dynamic Route Switching Protocol in Mobile Ad Hoc Networks

Dynamic Route Switching Protocol in Mobile Ad Hoc Networks Dynamic Route Switching Protocol in Mobile Ad Hoc Networks Abstract Due to limited bandwidth, how to decrease routing overhead is an important issue in mobile ad hoc networks. Several multipath routing

More information

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks 2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath

More information

ESAR: An Energy Saving Ad Hoc Routing Algorithm for MANET

ESAR: An Energy Saving Ad Hoc Routing Algorithm for MANET : An Energy Saving Ad Hoc Routing Algorithm for MANET Utkarsh 1, Mukesh Mishra 2 and Suchismita Chinara 3 Department of Computer Science and Engineering, National Institute of Technology Rourkela, Rourkela,

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Impact of Hello Interval on Performance of AODV Protocol

Impact of Hello Interval on Performance of AODV Protocol Impact of Hello Interval on Performance of AODV Nisha Bhanushali Priyanka Thakkar Prasanna Shete ABSTRACT The multi-hop ad hoc networks are self organizing networks with dynamic topology. The reactive

More information

Routing in Anhinga. Aakash Chauhan October 20th, Chair: Hans-Peter Bischof Reader: Alan Kaminsky Observer: Sidney Marshall

Routing in Anhinga. Aakash Chauhan October 20th, Chair: Hans-Peter Bischof Reader: Alan Kaminsky Observer: Sidney Marshall Routing in Anhinga Aakash Chauhan October 20th, 2006 Chair: Hans-Peter Bischof Reader: Alan Kaminsky Observer: Sidney Marshall Agenda Introduction & Background Dynamic Source Routing Project Architecture

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks

Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks 2009 International Conference on Intelligent Networking and Collaborative Systems Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks Saud Al otaibi Software Technology Research Laboratory

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

A Comparative Analysis of Pro-active Routing Protocols in MANET

A Comparative Analysis of Pro-active Routing Protocols in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.144

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer

More information

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,

More information

Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network

Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network Md. Golam Kaosar Victoria University, Australia golam.kaosar@vu.edu.au Abstract Mobile Ad-hoc Network

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract:

Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract: Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Amr Ergawy aergawy@cc.hut.fi Abstract: Ad Hoc wireless networks have their own

More information

A New Energy-Aware Routing Protocol for. Improving Path Stability in Ad-hoc Networks

A New Energy-Aware Routing Protocol for. Improving Path Stability in Ad-hoc Networks Contemporary Engineering Sciences, Vol. 8, 2015, no. 19, 859-864 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2015.57207 A New Energy-Aware Routing Protocol for Improving Path Stability

More information

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS G. Poornima 1, Mr. M. Rajasenathipathi 2, 1 Research Scholar, Department of Computer Science, NGM College, Pollachi 2 Assistant Professor, Department

More information

PERFORMANCE EVALUATION OF DSR AND AODV OVER UDP AND TCP CONNECTIONS

PERFORMANCE EVALUATION OF DSR AND AODV OVER UDP AND TCP CONNECTIONS PERFORMANCE EVALUATION OF DSR AND AODV OVER UDP AND TCP CONNECTIONS Sunil Taneja Department of Computer Science Smt. Aruna Asaf Ali Government Post Graduate College, Kalka, India E-mail: suniltaneja.iitd@gmail.com

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS E. Gnanamanoharan and R. Bensraj Department of Electrical Engineering, Annamalai University, Tamil Nadu, India

More information

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE APPLICATIONS IJCSMA Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV Er. Sandeep Singh Khehra 1, Er. Abhinash Singla

More information

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network Global Journal of Computer Science and Technology Volume 11 Issue 1 Version 1.0 February 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Analysis

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

IJESRT. [Dahiya, 2(5): May, 2013] ISSN: Keywords: AODV, DSDV, Wireless network, NS-2.

IJESRT. [Dahiya, 2(5): May, 2013] ISSN: Keywords: AODV, DSDV, Wireless network, NS-2. IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Performance Comparison of ADSDV and DSDV in MANET Brahm Prakash Dahiya Shaym Lal College,New Delhi, India brahmprakasd@gmail.com

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Preemptive Multicast Routing in Mobile Ad-hoc Networks

Preemptive Multicast Routing in Mobile Ad-hoc Networks Preemptive Multicast Routing in Mobile Ad-hoc Networks Uyen Trang Nguyen and Xing Xiong Department of Computer Science and Engineering York University, Toronto, Ontario Canada, M3J 1P3 Email: {utn, xing}@cs.yorku.ca

More information

AWERProcedia Information Technology & Computer Science

AWERProcedia Information Technology & Computer Science AWERProcedia Information Technology & Computer Science Vol 03 (2013) 1424-1429 3 rd World Conference on Information Technology (WCIT-2012) Comparison of routing protocols in mobile ad-hoc wireless networks

More information

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK Nalin Gahlaut 1, Jaya sharma 2, Pankaj Kumar 3, Kaushal Kumar 4 1 Doctoral Candidate, Uttarakhand Technical University,

More information

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Masaru Yoshimachi and Yoshifumi Manabe movement of the devices. Thus the routing protocols for MANET need

More information

COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK

COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK International Journal of Information Technology and Knowledge Management July-December 2011, Volume 4, No. 2, pp. 531-538 COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 10, October 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

EFFECT OF ROUTING PROTOCOLS OVER RENOVATED CONGESTION CONTROL MECHANISMS IN SINGLE-HOP WIRELESS

EFFECT OF ROUTING PROTOCOLS OVER RENOVATED CONGESTION CONTROL MECHANISMS IN SINGLE-HOP WIRELESS EFFECT OF ROUTING PROTOCOLS OVER RENOVATED CONGESTION CONTROL MECHANISMS IN SINGLE-HOP WIRELESS 1 TANMAYA SWAIN, 2 PRASANT KUMAR PATTNAIK School Of Computer Engineering, KIIT University, Bhubaneswar E-mail:

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Savithru Lokanath 1, Aravind Thayur 2 1 Department of Electronics & Communication Engineering, DayanandaSagar College of Engineering,

More information

Maharishi Markandeshwar University

Maharishi Markandeshwar University RESEARCH ARTICLE OPEN ACCESS Simulation Based Performance Comparison of Adhoc Routing Protocols Kushagra Agrawal*, Shaveta Jain** *Department of Computer Science,, Mullana, Ambala agrawal_kushagra@rediffmail.com

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks Won-Ik Kim Radio Performance Analysis Section Electronics & Telecommunications Research Institute 161 Kajong-dong,

More information

Analysis of Network Traffic in Ad-Hoc Networks based on DSDV Protocol

Analysis of Network Traffic in Ad-Hoc Networks based on DSDV Protocol Analysis of Network Traffic in Ad-Hoc Networks based on DSDV Protocol with Emphasis on Mobility and Communication Patterns Vahid Garousi Department of Systems and Computer Engineering Carleton University,

More information

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity Anastassios Michail Department of Electrical Engineering and Institute for

More information

Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks

Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks Som Chandra Neema Venkata Nishanth Lolla {sneema,vlolla}@cs.ucr.edu Computer Science Department University of California, Riverside Abstract

More information

Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range

Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range Asha Ambhaikar and Lokesh Kumar Sharma Abstract a mobile ad hoc network is a collection of autonomous

More information

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy

More information

To Repair or Not To Repair: Helping Ad Hoc Routing Protocols to Distinguish Mobility from Congestion

To Repair or Not To Repair: Helping Ad Hoc Routing Protocols to Distinguish Mobility from Congestion Brigham Young University BYU ScholarsArchive All Faculty Publications 27-5-1 To Repair or Not To Repair: Helping Ad Hoc Routing Protocols to Distinguish Mobility from Congestion Qiuyi Duan qiuyiduan@gmail.com

More information

G.Narasa Reddy, 2 A.Avanthi, 3 R.Prasanth Reddy 1

G.Narasa Reddy, 2 A.Avanthi, 3 R.Prasanth Reddy 1 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Enhancing DSR Protocol Performance in Mobile Ad Hoc Networks

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI 1 Yongxian SONG, 2 Rongbiao ZHANG and Fuhuan

More information

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network Author manuscript, published in "ITCom 6 - next generation and sensor networks, Boston : United States (26)" DOI :.7/2.68625 Performance evaluation of reactive and proactive routing protocol in IEEE 82.

More information

Research Paper GNANAMANOHARAN ET AL., INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING TECHNOLOGY E-ISSN

Research Paper GNANAMANOHARAN ET AL., INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING TECHNOLOGY E-ISSN Research Paper PERFORMANCE ANALYSIS OF PROBABILISTIC BROADCAST ON DEMAND ROUTE DISCOVERY PROTOCOL FOR MOBILE AD HOC NETWORKS BASED ON NODE MOBILITY E.Gnanamanoharan 1, R.Bensraj 2 Address for Correspondence

More information

Local Recovery of Routes for Reliability using Backup Nodes in MANETs

Local Recovery of Routes for Reliability using Backup Nodes in MANETs Local Recovery of Routes for Reliability using Backup Nodes in MANETs Madhura Krishna R K 1, Megha T 2, Meghana M S 3, Dr. K Raghuveer (Professor and Head) 4 1,2,3,4 Dept. of Information Science and Engineering,The

More information

Power Aware Virtual Node Routing Protocol for Ad hoc Networks

Power Aware Virtual Node Routing Protocol for Ad hoc Networks Power Aware Virtual Node Routing Protocol for Ad hoc Networks A.Kush 1, R.Kumar 2, P.Gupta 3 1 Department of Computer Science, Kurukshetra University, Kurukshetra, INDIA, akush20@rediffmail.com 2 Department

More information

NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks

NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks 102 The International Arab Journal of Information Technology, Vol. 5, No. 1, January 2008 NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks Al-Sakib Pathan 1, Muhammad Monowar

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu

More information

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator Dr. S. K. Singh Professor, Department of EC, India Dr. R. Gupta Asst. Prof. Department of EC, India Abstract: The

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK

ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK Yousif Ali Saadi, Rosilah Hassan and Dahlila Putri Dahnil Network Communication Lab Research, Centre for Software Technology and Management

More information

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar

More information

Performance Analysis of Three Routing Protocols for Varying MANET Size

Performance Analysis of Three Routing Protocols for Varying MANET Size Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Performance Analysis of Three Routing Protocols for Varying MANET Size N Vetrivelan,

More information

PERFORMANCE ANALYSIS OF MOBILE AD- HOC NETWORK ROUTING PROTOCOLS OVER TCP

PERFORMANCE ANALYSIS OF MOBILE AD- HOC NETWORK ROUTING PROTOCOLS OVER TCP PERFORMANCE ANALYSIS OF MOBILE AD- HOC NETWORK ROUTING PROTOCOLS OVER TCP Rahat Hossain Faisal 1, A. N. M. Tawhidul Islam 2, Md. Sadek Ali 3, Farruk Ahmed 4 1 Department of Electronics and Telecommunication

More information

Exploring Multiple Paths using Link Utilization in Computer Networks

Exploring Multiple Paths using Link Utilization in Computer Networks 7 Exploring Multiple Paths using Link Utilization in Computer Networks 1 Shalini Aggarwal, 2 Shuchita Upadhyaya 1 Teacher Fellow, Department of Computer Science & Applications, Kurukshetra University Kurukshetra,

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Comparison of Various Routing Protocols & Brief of MANET

Comparison of Various Routing Protocols & Brief of MANET International Journal of Modern Trends in Engineering and Research www.ijmter.com Comparison of Various Routing Protocols & Brief of MANET Akashkumar Patel 1, Rakshitkumar Hirapara 2, Vivekkumar Dhamecha

More information

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,

More information

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B. IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol

More information

Power aware Multi-path Routing Protocol for MANETS

Power aware Multi-path Routing Protocol for MANETS Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios

Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios Contemporary Engineering Sciences, Vol. 7, 2014, no. 12, 559-567 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4436 Evaluation of Ad-hoc Routing Protocols with Different Mobility Models

More information

On Fault Tolerant Ad Hoc Network Design

On Fault Tolerant Ad Hoc Network Design On Fault Tolerant Ad Hoc Network Design Wassim El-Hajj College of Information Technology UAE University United Arab Emirates welhajj@uaeu.ac.ae Hazem Hajj Faculty of Engineering and Architecture American

More information

4/11/2012. Outline. Routing Protocols for Ad Hoc Networks. Classification of Unicast Ad-Hoc Routing Protocols. Ad Hoc Networks.

4/11/2012. Outline. Routing Protocols for Ad Hoc Networks. Classification of Unicast Ad-Hoc Routing Protocols. Ad Hoc Networks. 18759 Wireless Networks (2012-pring) urvey Routing Protocols for d Hoc Networks Jiun-RenLin and Yi-hun hou lectrical and omputer ngineering arnegie Mellon University Outline d-hoc networks Unicast d-hoc

More information

Available online at ScienceDirect. Procedia Computer Science 46 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 46 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 1209 1215 International Conference on Information and Communication Technologies (ICICT 2014) Improving the

More information

Performance of New Broadcast Forwarding Criteria in MANET

Performance of New Broadcast Forwarding Criteria in MANET Performance of New Broadcast Forwarding Criteria in MANET Lijuan Zhu 1, Bu-Sung Lee 1, Boon-Chong Seet 2, Kai-Juan Wong 3, Genping Liu 1, Shell-Ying Huang 1, and Keok-Kee Lee 1 1 Centre for Multimedia

More information