Zone-Based Replication Scheme for Mobile Ad Hoc Networks Using Cross-Layer Design

Size: px
Start display at page:

Download "Zone-Based Replication Scheme for Mobile Ad Hoc Networks Using Cross-Layer Design"

Transcription

1 Zone-Based Replication Scheme for Mobile Ad Hoc Networks Using Cross-Layer Design Ke Shi, Rong Chen, and Hai Jin Services Computing Technology and System Lab School of Computer Science & Technology Huazhong University of Science & Technology, Wuhan , China {keshi, crong, Abstract. Accessing remote data is a challenging task in mobile ad hoc networks (MANETs). A common technique used to improve the performance of data access is replication, which improves the performance of data access in distributed systems at the cost of increased storage space and communication overhead. Due to strict resource constraint, node mobility and impairments of wireless transmission, applying replication schemes developed for distributed systems to MANETs directly leads to poor performance. In this paper, we develop a zone-based replication scheme for MANETs. In this scheme, every node proactively maintains replica distributing information within its replicating zone, which leads to the access from requesting node to the requested data item (including its replicas) distributed in its replicating zone can be satisfied directly. If requested data item is outside the replicating zone, reactive lookup process is invoked to find the node hosting the requested data item and the route to this node at the same time. Opportunistic data replicating is performed spontaneously with data transferring, and corresponding replica is allocated to nodes located in the replicating zone of the requesting node. Using cross-layer design, we illustrate how the hybrid adaptive routing technique, zone routing protocol, assists data lookup and replication to achieve high performance of data access. Simulation results have shown that our design is successful in a dynamic MANET. Keywords: Ad hoc network, Zone, Zone Routing Protocol, Data Lookup, Data Replication, Cross-Layer Design. 1 Introduction A MANET consists of many mobile nodes connected by wireless links[1].in such a network, each node operates not only as an end-system, but also as a router to forward packets. Two nodes can communicate with each other directly if they are within each other s wireless transmission range or via intermediate nodes if they are far away. Although routing is a very important issue in MANETs, other issues such as data access are also very important since the ultimate goal of using MANETs is to provide information access to mobile nodes. Accessing desired remote data in MANETs is much more difficult than in fixed networks. Due to strict resource constraint, node J. Cao et al. (Eds.): MSN 2006, LNCS 4325, pp , Springer-Verlag Berlin Heidelberg 2006

2 Zone-Based Replication Scheme for Mobile Ad Hoc Networks 699 mobility and impairments of wireless transmission, disconnections may occur frequently. This means that the creator of data is often unreachable when the data is needed. Even when the creator of data is reachable, multi-hop wireless connections cause long request delay. Data replication has been widely used to improve data accessibility in distributed systems. By replicating data at mobile nodes, data accessibility can be improved because there are multiple replicas in the network and the probability of finding one copy of the data is high. Further, data replication can also reduce the request delay, since mobile nodes can get the data from some nearby replicas. However, applying replication schemes developed for distributed systems to MANETs directly leads to poor performance since the underlying network connections are not reliable and stable anymore and the availability of nodes is not identically independent distributed anymore. The performance of data access heavily depends on the underlying routing service. To achieve high performance in data access, we have developed a zone-based replication (ZBR) scheme for MANETs, integrated with a data lookup service, and assisted by a hybrid adaptive routing protocol, zone routing protocol (ZRP)[2]. In this scheme, every node proactively maintains replica distributing information within its replicating zone, which leads to the access from requesting node to the requested data item (including its replicas) distributed in its replicating zone can be satisfied directly. If requested data item is outside the replicating zone, reactive lookup process is invoked to find the node hosting the requested data item and the route to this node at the same time. Opportunistic data replicating is performed spontaneously with successive data transferring, and corresponding replica is allocated to nodes located in the replicating zone of the requesting node. The rest of this paper is organized as follows: Section 2 presents background and related work. The system model and basic notion is introduced in Section 3. Proposed zone based replication scheme using cross-layer design is discussed in detail in Sections 4. Section 5 evaluates the schemes using simulations with different setups. We conclude with Section 6 and outline the future work. 2 Background and Related Work Data replication is a traditional technique in distributed systems. Hara[3] proposed a data replication scheme in MANETs, which optimized the location of data replicas within a network periodically to achieve certain data accessibility. However, the assumption that access frequencies to data items from each node are known and are fixed limits the applicability of the schemes in practical systems. Periodical replicas reallocation also leads to heavy communication overhead. Similarly to Hara s work, Wang[4] considered the problem of replica allocation. It takes into consideration topological information, and data replication occurs only when necessary according to certain topology detection schemes. These schemes depend on the mobility model and assume that the locations and velocities of all mobile nodes are known. Yin and Cao[5] proposed data replication schemes that address both the query delay and the data accessibility. As both metrics are important for mobile nodes, their schemes need to balance the tradeoffs between data

3 700 K. Shi, R. Chen, and H. Jin accessibility and request delay under different system settings and requirements. Their work adopted the same system model with Hara s work. What is fully unseen from these works is the consideration of the underlying MANET routing services coupled with data access tightly. They do not address the issues that how to find an optimal path from the node requesting data to the node hosting the data or its replica either. The existing routing protocols can be classified either as proactive or reactive. Purely proactive schemes continuously use a large portion of the network capacity to keep the routing information current, such as DSDV[6] and OLSR[7]. The widely used DSR[8] and AODV[9] are reactive protocols, in which global search procedure leads to significant control traffic and long delay. ZRP[2] provides efficient and fast discovery of routes by integrating these two radically different routing schemes. Cross-layer design introduces stack wide layer interdependencies to optimize overall network performance. MobileMan project[10] introduces inside the layered architecture the possibility that protocols belonging to different layers can cooperate by sharing network-status information while still maintaining separation between the layers in protocol design. This project focuses only on providing a general architecture and does not look at the special problems such as data access. Chen etc.[11] proposed a cross-layer framework to solve the data accessibility problem in MANETs. It utilizes advanced data advertising, lookup and replication services, as well as a novel predictive location-based QoS routing protocol in an integrated fashion to achieve high data access success rate. The performance of this scheme depends on the predictive accuracy of nodes location and movement, which is the difficult task in practical environment. Gruber etc.[12] develop a Mobile Peer-to-Peer Protocol (MPP) stack to support peer-to-peer file sharing in MANETs. It spans from the network layer to the application layer, and tries to reuse existing protocols as far as possible. The underlying routing protocol is DSR. 3 System Model and Basic Notion Fig. 1 shows part of a MANET. Each mobile node in the network is assigned a unique identifier. Data is handled as a data item which is a collection of data. Each data item located in the network is also assigned a unique data identifier. The original copy of each data item is held by a particular mobile node. Each mobile node has certain storage space for creating replicas excluding the space for the original data item that the node holds. For example, node S has n original copies of data items {d 1, d 2... d n }. In this MANET, a data request is forwarded hop-by-hop until it reaches the node hosting the original copies of data items and then this node sends the requested data back. To improve the successful data access ratio and reduce the request delay, the length of this multi-hop path between the data provider and the requester should be as short as possible, and the time spending on find such an optimal path should be as short as possible too. Although data replication and

4 Zone-Based Replication Scheme for Mobile Ad Hoc Networks 701 Fig. 1. A MANET routing protocols can be used to achieve this goal separately, there is a limitation on how much they can achieve. In the following, we propose cross-layer zonebased replication scheme. The basic notion is that data replication service in the application layer and zone routing protocol in the network layer can cooperate by sharing network-status information. Zone is the core concept in this scheme. A zone (of radius r) is defined for each node and includes the nodes whose minimum distance in hops from the node in question is at most r hops. Each node is assumed to maintain some kinds of information only to those nodes that are within its zone. In network layer, this zone is called routing zone, and routing information is maintained. In application layer, this zone is called replicating zone, and the information about replicas distribution and storage space are maintained. All these information are shared by the two layers. A node learns its zone through some sort of a proactive scheme. Data lookup is incorporated with route discovery. Opportunistic replica distributing is performed with data transferring simultaneously when there is no available replica in the replicating zone of data requestor. An example of a zone (for node A) of radius two hops is shown in Fig. 1. For the purpose of illustration, we depict zones as circles around the node. However, one should keep in mind that the zone is not a description of physical distance, but rather nodal connectivity (hops). Note that in this example, nodes A J are within the routing zone of the central node A. Node K-V is outside A s routing zone. Peripheral nodes are nodes whose minimum distance to the node is exactly equal to the zone radius. The remaining nodes are categorized as interior nodes. Thus, in Fig. 1, nodes G, I and C are interior nodes while B, D, E, F and J are peripheral nodes. 4 Cross-Layer Zone-Based Replication Scheme In this section, we describe cross-layer zone-based replication scheme in detail. Data replication, lookup and ZRP work together to facilitate data access for various applications at the end-systems.

5 702 K. Shi, R. Chen, and H. Jin 4.1 Zone Information Maintenance In network layer, a node maintains routing information to those nodes that are within its routing zone through some sort of a proactive scheme, which is called intra-zone routing protocol (IARP) in ZRP. In this paper, we use OSLR [7]. However, any other proactive scheme would do. While the performance of the ZRP depends on the choice of IARP implementation, previous research[13] suggests that the tradeoffs are not strongly affected by the particular choice of the proactive scheme used. In application layer, a node needs to maintain the information about the replica distribution and the nodes capabilities within its replicating zone (its routing zone in network layer) to support data lookup and replica allocation. Using cross-layer design, it incorporates with routing zone maintenance. Every node has three tables, routing table, data lookup table and capability table. Data lookup table describes the distribution of the data items (original copies or replicas) within the node s zone with a list of entries: <data_id,o_flag, valid_period, description>. The valid_period field indicating the freshness of the data is used to maintain consistency. We will discuss the detail in section 4.4. The o_flag field indicates whether the data item is original copy or not. Mobile nodes may have very different capabilities ranging from small PDAs to laptops. Considering heterogeneity of the nodes, capability table provides useful information of nodes resource within the zone supporting replica allocating decision. In this paper, only free storage space is considered since we assume single node s processing capability does not have significant effect on the performance of data access. Other parameters such as remaining power and processor utilization can be easily inserted into this table to support more comprehensive decision. OLSR utilize periodical hello messages to sense neighbor and update routing table. To maintain the rest zone information, each node appends data lookup entries and capability entry to the hello message. Upon receiving the hello message, the data lookup table maintenance procedure renews the information associated with the existing data items, and augments the table if new data items become available, and capability table maintenance procedure renews the free storage space parameter associated with the nodes in this zone. Because the updates are only propagated locally, the amount of update traffic required to maintain a zone does not depend on the total number of network nodes (which can be quite large). Since a node may contain a larger number of data items, the size of hello message may become very large. Periodical propagating full information may lead to unnecessary overhead. To reduce the size of the hello messages, we develop a method to include only the difference of contents from the previous hello message. The complete hello messages are propagated in longer time intervals. Between complete hello messages, smaller differential hello messages are sent out in shorter time intervals. 4.2 Data Lookup In our scheme, data lookup is integrated with route discovery. In ZRP, IARP maintains routes for the nodes that are within the coverage of the routing zone. The inter-zone routing protocol (IERP) is responsible for reactively discovering routes to

6 Zone-Based Replication Scheme for Mobile Ad Hoc Networks 703 destinations located beyond a node s routing zone. In application layer, intra-zone data lookup based on IARP finds the data items located in the nodes that are within the coverage of the replicating; and inter-zone data lookup based on IARP is responsible for reactively discovering the data items located in the nodes beyond a node s replicating zone. When a node wants to access a special data item, intra-zone data lookup takes place locally at this node. The process of intra-zone data lookup is as follows: (1) Check the data availability through local data lookup table. If data item is available in the local zone, go to step 2; otherwise, inter-zone data lookup process is invoked. (2) Check the path to the hosting node through local routing table. (3) Send the request to the hosting node to retrieve the data. (4) Hosting node transfer the data items to the requested node. Fig. 2. An example of data lookup Since the lookup table has descriptions of all available data located in the nodes within the replicating zone, the node can get this kind of data items with a very low request delay. As shown in Fig. 2, if A want to access data items c 2, A can find its hosting node D and corresponding route A-G-D through intra-zone data lookup process since D is within A s zone. If the requested data item is not available in the replicating zone, inter-zone data lookup process is invoked to find the requested data item and corresponding path. In our scheme, it is implemented by extending AODV. The process of inter-zone lookup is as follows: (1) The data requestor propagates a data request to all its peripheral nodes. (2) Upon receiving the data request, the peripheral nodes execute the intra-zone data lookup: they check whether the data item is located in the nodes within their zone. If so, go to step 3. If not, the peripheral node forwards the request to its peripheral nodes, which in turn execute the same procedure. (3) A data reply (including route reply) is sent back to the data requestor indicating the route to the node hosting the requested data items (original copies or replicas). (4) The route between the data requestor and hosting node is established through route accumulation. AODV utilizes short-term storage at each relaying node to temporarily store a route in the form of next-hop routes back to the data requestor.

7 704 K. Shi, R. Chen, and H. Jin Comparing with DSR, route accumulation would occur during the route reply phase rather than the route query phase, resulting in less IERP traffic. (5) Hosting node transfer the data items to the requested node along the established route. Opportunistic replication is triggered at the same time. The core idea of opportunistic replication is to replicate the data items beyond the zone of data requestor into the nodes within its zone with the normal data access. An example of this inter-zone data lookup procedure is demonstrated in Fig. 2. If A wants to access d 2, A first checks whether d 2 is within its zone through intra-zone data lookup. Since A find no node within its zone hosts d 2, A propagates a query to its peripheral nodes; that is, A sends a query to nodes B, D, E, F, H and J. Now, in turn, after verifying that d 2 is not in the nodes within its routing zone, each one of these nodes forwards the query by propagating the query to its peripheral nodes. In particular, H sends the query to N, which recognizes d 2 as being in S within its zone and responds to the query, indicating the forwarding path: A C H L-N-Q-S. A nice feature of this distributed data lookup and route discovery process is that a single data query can return multiple route replies. The quality of these returned routes can be evaluated based on hop count (or any other path metric accumulated during the propagation of the query). The best route can be selected based on the relative quality of the route. The inter-zone data lookup process based on IERP is distinguished from standard flooding-based query/response protocols by exploiting the structure of the routing/replicating zone. The zones increase the probability that a node can respond positively to a query. This is beneficial for traffic that is destined for geographically close nodes. More importantly, knowledge of the zone topology allows a node to efficiently continue the propagation of a query in the more likely case that destination can be found. At the same time, since the zones heavily overlap, the query will be forwarded to many network nodes, multiple times. To reduce the corresponding traffic, a query control scheme proposed by Haas [13] is adopted in our scheme. 4.3 Opportunistic Replication Comparing with fixed networks, there exist many resource limitations in MANETs, for example, intermitted transmission, low bandwidth, poor connectivity, and unstable topology. At the same time, most nodes in MANETs also suffers from poor resources, for example, limited memory or storage space, short battery life, and unpredicted sleep or shutdown. Therefore, replication can not cause much additional network overload, which is determined by the characteristics of MANETs. Our solution is opportunistic replication: data replication only performs with the occurrence of normal data accessing and transferring, which only consumes the energy and storage space of the nodes. Opportunistic replication is triggered by interzone data lookup as discussed in section 4.2. The data item that is not in the nodes within the zone of the requesting node is replicated into the node with enough free storage space within this zone when this data item is transferred from the hosting node to the requesting node. The following rules decide which node within the zone host the replica.

8 Zone-Based Replication Scheme for Mobile Ad Hoc Networks 705 (1) The replica is first allocated to the peripheral nodes along the data accessing route. (2) If the peripheral nodes along the data accessing route do not have enough free storage space, the replica is allocated to the interior nodes along the data accessing route. (3) If the interior nodes along the data accessing route do not have enough free storage space, replica replacement procedure is invoked to evict the data replicas from the peripheral nodes when new data arrive. Replica replacement policy is the widely used LRU, which removes the least-recently-used data replicas. In the intra-zone data lookup example shown in Fig.2, the replica of data item d 2 is first allocated to H. if H does not have enough free storage space, it is allocated to C. if C does not have enough free storage space, H replace old replicas with the replica of data item d 2. Following these rules, no extra data transferring is needed to allocate data replicas. Due to the characteristics of MANETs, replica migration is restrictedly limited to reduce the network bandwidth and node energy consumption. When the node hosting the replica of a special data item is down or leaves the zone, we do not try to restore the replica until next access to this data item occurs. Every replica is created on demand. If there are more than one replica of a special data item existing in a zone, the redundant replicas can be removed and relieved storage space can host the replicas of other data items. However, this removing progress can only be triggered by the event that there is no enough storage space at any nodes in this zone to host the replica of new data items that does not exist at any nodes in this zone. Since all the nodes are mobile, the nodes may join or leave a zone dynamically. IARP will sense the change in the network layer, and then trigger zone information maintenance process in the application layer to update corresponding zone information. If there are duplicated replicas after new nodes join, the duplicated replicas will be deleted later as mention above. We don t try to predict which node will leave and move the replicas that leaving node hosts to other nodes in the zone because mobility predication is difficult in the practical environment and replica movement may result in communication overhead. 4.4 Consistency There is a consistency issue in our replicating scheme. Due to network bandwidth, power constraints and node mobility in MANETs, it is too expensive to maintain strong consistency among replicas. In our scheme, a weak consistency model called δ- consistency model [14] is adopted, which is a time-based consistency model. The intuition is based on the fact that replicas are consistent even if their versions are different but has not passed a predetermined time δ (the valid period) since they have been updated last. There are applications such as weather maps, etc., where updates arrive periodically and application only needs to know a consistent value in a certain period. Every data replica is assigned a valid period δ d, and a data requesting node considers a replica up-to-date if δ d >0. When opportunistic replication occurs, the owner decide the validation period δ d of the data replicas based on updating interval and current data access time if the data requesting node gets the data from the owner.

9 706 K. Shi, R. Chen, and H. Jin If the data requesting node gets the data from other nodes hosting the replica, the value of δ d of the new replica equals to the old one. Each node hosting the replica decreases its δ d value in the same ratio. The replicas with δ d =0 can be removed from the hosting node to save storage space. The removing process is triggered later when there is no enough free storage space for new replicas. It is because the invalidated replicas may be still useful and indicate the users interests for special data items. 5 Performance Evaluation We use the OPNET network simulator, an event driven simulation package, to evaluate the performance of our scheme over MANETs. Cross-layer zone-based replication scheme is evaluated over a range of zone radius, ranging from purely reactive flooding-based method (r=1) to purely proactive table-driven method (r= ). Performance is gauged by measuring successful data access ratio, request delay and the control traffic generated by this scheme. We also compare the performance of our ZBR scheme with MPP. Our simulated network consists of 200 mobile nodes, whose initial positions are chosen from a uniform random distribution over an area of 2500m by 2500m. We utilize b with a maximum data rate of 11Mbit/s as MAC. The Two-Ray- Ground propagation model has a maximum radio range of 250m. The nodes move according to random walk mobility model. A node moves from its current location to a new location by randomly choosing a direction and speed from pre-defined ranges, [0,v max m/s] and [0,360 o ], respectively. Each movement occurs in a constant time interval, 10 [s], at the end of which a new direction and speed are calculated. If a node reaches a simulation boundary, it bounces off the simulation border with an angle equal to the incidence angle. Two v max values, 2m/s and 20m/s, are studied in the simulation. We do not adopt widely used random waypoint mobility model because it has been proved to fail to provide steady state in that the average node speed consistently decreases over time [15]. This could lead to unreliable results. There are 200 data items in the simulated network. Each node can host 10 data items. For each data item, the fraction of nodes hosting this data item is defined as replication rate. The mean replication rate is 20%. Two values of the size of data item, 2KByte and 2MByte, are studied in the simulation. Each node generates a single stream of data requests. The request generating time follows exponential distribution with mean value T request, 1 request/s. After a request is sent out, the node does not generate a new request until the request is served. The access pattern is based on uniform distribution. For MPP, the replication rate is also set to 20%, and the replicas are uniformly distributed in the nodes within the network. The zone radius changes from 1 to 8 hops. The hello messages used to maintaining zone information are transmitted at random intervals of mean T hello. T hello is inversely proportional to the node speed, so networks with different mobility experience the same acceptable accuracy level of zone information.

10 Zone-Based Replication Scheme for Mobile Ad Hoc Networks 707 Simulations were run on 50 randomly distributed node layouts, each for duration of 125s. No data was collected for the first 5s of the simulations while the initial intrazone information maintaining process stabilized. Successful data access ratio MPP 2KB ZBR 2KB MPP 2MB ZBR 2MB Zone radius Request delay (ms) MPP ZBP Zone radius Fig. 3. Successful data access ration as a function of zone hops Fig. 4. The request delay as a function of zone hops Controc traffic (KB/Request) MPP ZBR Zone radius Successful data access ratio ZBR Vmax=2m/s ZBR Vmax=20m/s 0.1 MPP Vmax=2m/s MPP Vmax=20m/s Zone radius Fig. 5. The control traffic as a function of zone hops Fig. 6. The successful data access ratio against mobility, the size of data item is 2KB Request delay (ms) ZBR Vmax=2m/s ZBR Vmax=20m/s 800 MPP Vmax=2m/s MPP Vmax=20m/s Zone radius Control traffic (KB/Request) ZBR Vmax=2m/s MPP Vmax=2m/s ZBR Vmax=20m/s MPP Vmax=20m/s Zone radius Fig. 7. The request delay against mobility, the size of data item is 2KB Fig. 8. The control traffic against mobility, the size of data item is 2KB

11 708 K. Shi, R. Chen, and H. Jin Fig. 3 shows successful data access ratio as a function of zone hops. Our ZBR scheme outperforms MPP scheme with appropriate r value, 2-5 in our simulation. When r increases further, the performance of our scheme degrades. Successful data access ratio of our scheme is lower than that of MPP scheme. The reason is that the number of data replicas distributed in the network decreases when r increases. Furthermore, the overhead caused by zone maintenance becomes very large, and the information updates may not arrive in each node in time, which leads to inaccurate zone information. The intra-zone lookup process based on these stale information in the routing table and data lookup table may fail to find the requested data. We also find the performance improvement with appropriate r values is more significant when the size of data item is large. It is because our scheme allocates the replicas around the data requesting nodes dynamically. Comparing with the random allocation in MPP, it makes the requesting node can find its requested data in closer node, which lead to shorter transferring route. In MANETs, shorter path has much longer lifetime than longer path. The probability that path breaks during data transferring decreases significantly. When the size of data item is small, data transferring time is short, this improvement can be observed but not very obvious. When the size of data item is large, data transferring need more time, this improvement is more obvious. Another important performance metric is request delay. In our simulation, request delay is measured as time span from the request generating in the requesting node to the route establishing between the hosting node and the requesting node. This definition excludes data transferring time. Although transferring data items with larger size may occupy more network bandwidth and increases the request delay, it is not a significant factor. Fig. 4 shows the request delay as a function of zone hops when the size of data item is 2KB. Our scheme achieves lower request delay than MPP scheme with appropriate r value. The request delay decreases with the increasing of r when r<6. When r further increases, the request delay begins to increase. Since inter-zone data lookup happens less frequently when r becomes larger, it looks like data requesting node can get most data items through intra-zone data lookup and the request delay should be lower. However, as we mentioned before, the overhead of maintaining a large zone is very large, which leads to inaccurate zone information and makes intra-zone data lookup process fail. Before the requesting node finds its requested data, it may experience several failed intra-zone data lookup process, and then the request delay increases significantly. The overhead is gauged as control traffic caused by our scheme. Transferring requested data items from the hosting nodes to the requesting node is not counted as control traffic, which eliminates the effect of the size of the data item on the overhead. Fig. 5 shows the control traffic as a function of zone hops when the size of data item is 2KB. Our scheme achieves lower control traffic than MPP scheme with appropriate r value. Opportunistic replication does not cause extra replica migrating traffic, and δ- consistency model does not need extra traffic to maintain the consistency among the replicas either. As we discussed above, when r is larger, zone information maintenance causes too much control traffic and make the control traffic of our scheme is higher than MPP scheme.

12 Zone-Based Replication Scheme for Mobile Ad Hoc Networks 709 As shown in Fig. 3, 4, and 5, when r = 1, the performance metrics for ZBR and MPP are very similar because both the underlying routing mechanisms are reactive. The data requests are flooded among the nodes within the network. When mobility increases, we notice that the performance difference becomes a little larger. Under this high mobility circumstance, our scheme performs better than MPP because AODV performs better than DSR. The simulation results shown in Fig.6, 7, and 8 demonstrate this trend. Fig. 6, 7, and 8 illustrate the effects of mobility on the successful data access ratio, request delay, and control traffic respectively. We see that the optimal zone radius at which better performance can be achieved decreases as mobility increases. Increased mobility causes the network topology to change more rapidly, resulting in an increased of zone information update traffic. Therefore, successful data access ratio decreases, and request delay increases. 6 Conclusion and Future Work In this paper, we focus on the cross-layer design between two major layers of the mobile end-system, the routing layer and the application layer. They work together to facilitate data access for various applications at the end-systems. Specially, a cross-layer zone-based replication scheme for MANETs is developed, which provides flexible and efficient data access service with low overhead by integrating data replication, lookup and underlying ZRP routing protocol. Our simulations show that the overall performance of data access is improved. Through simulation we also find for any particular network configuration and performance demand, each node has an optimal zone radius. Our future work is to determine the best choice for the zone radius based on local information directly available. References 1. Homepage of IETF mobile ad hoc networks (MANET) working group, ietf.org/html.charters/manet-charter.html, updated July, Z.J. Haas and M.R. Pearlman, The Zone Routing Protocol (ZRP) for Ad Hoc Networks, Internet Draft, draft-ietf-manet-zone-zrp-04.txt, July Takahiro Hara. Replica allocation methods in ad hoc networks with data update. Mobile Networks and Applications, Vol. 8, Issue 4, August 2003, Pages: K.H. Wang and B. Li, Efficient and guaranteed service coverage in partitionable mobile ad-hoc networks, in Proc. of INFOCOM 02, 2002, pp Liangzhong Yin, Guohong Cao, Balancing the Tradeoffs between Data Accessibility and Query Delay in Ad Hoc Networks. SRDS 2004: C. E. Perkins and P. Bhagwat, Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers, in Proc. ACM SIGCOMM 1994, pp P. Jacquet, P. Muhlethaler, and A. Qayyum, Optimized link state routing protocol, IETF MANET, Internet Draft, Oct D. B. Johnson and D. A. Maltz, Dynamic source routing in ad hoc wireless networking, in Mobile Computing, T. Imielinski and H. Korth, Eds. Norwell, MA: Kluwer, 1996.

13 710 K. Shi, R. Chen, and H. Jin 9. C. E. Perkins and E. M. Royer, Ad hoc on-demand distance vector routing, in Proc. IEEE WMCSA 99, vol. 3, New Orleans, LA, pp M. Conti, G. Maselli, G. Turi, and S. Giordano, Cross-Layering in Mobile Ad Hoc Network Design. IEEE Computer Vol. 37, Num. 2, pg 48-51, Feb K. Chen, S. H. Shah, K. Nahrstedt, Cross-Layer Design for Data Accessibility in Mobile Ad hoc Networks, Journal of Wireless Personal Communications, vol. 21, pp , R. Schollmeier, I. Gruber, F. Niethammer Protocol for Peer-to-Peer Networking in Mobile Environments, In Proc. of ICCCN 2003, October Z.J. Haas and M.R. Pearlman, The Perforamnce of Query Control Schemes for the Zone Routing Protocol, ACM/IEEE Transactions on Networking, vol. 9, no. 4, pp J. Cao, Y. Zhang, L. Xie, and G. Cao, Consistency of cooperative caching in mobile Peerto-peer systems, Workshop on Mobile Distributed Computing, IEEE ICDCS, J. Yoon, M. Liu, and B. Noble, Random Waypoint Considered Harmful, Proc. Of INFOCOM 2003, pp , Apr. 2003

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer

More information

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks 2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath

More information

AWERProcedia Information Technology & Computer Science

AWERProcedia Information Technology & Computer Science AWERProcedia Information Technology & Computer Science Vol 03 (2013) 1424-1429 3 rd World Conference on Information Technology (WCIT-2012) Comparison of routing protocols in mobile ad-hoc wireless networks

More information

CS5984 Mobile Computing

CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part II 1 Outline Routing Protocols for Ad hoc Networks DSDV: Highly Dynamic Destination-Sequenced Distance- Vector

More information

Analysis of the Zone Routing Protocol

Analysis of the Zone Routing Protocol Analysis of the Zone Routing Protocol Jan Schaumann December 8, 2002 Abstract This document describes and analyzes the Zone Routing Protocol (ZRP), a hybrid mobile ad-hoc protocol which divides the network

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Sharma Shelja, Kumar Suresh and Rathy R. K. Department of CSE, FET, MRIU, Faridabad, India Email: sharma.shelja@gmail.com, enthusk@yahoo.com,

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

Impact of Hello Interval on Performance of AODV Protocol

Impact of Hello Interval on Performance of AODV Protocol Impact of Hello Interval on Performance of AODV Nisha Bhanushali Priyanka Thakkar Prasanna Shete ABSTRACT The multi-hop ad hoc networks are self organizing networks with dynamic topology. The reactive

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Highly Effective and Efficient Route Discovery & Maintenance in DSR A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan

More information

Comparative study and Performance Analysis of FSR, ZRP and AODV Routing Protocols for MANET

Comparative study and Performance Analysis of FSR, ZRP and AODV Routing Protocols for MANET 2nd International Conference and workshop on Emerging Trends in Technology (ICWET) 211 Comparative study and Performance Analysis of FSR, and Protocols for MANET Parma Nand Research Scholar Wireless Computing

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS E. Gnanamanoharan and R. Bensraj Department of Electrical Engineering, Annamalai University, Tamil Nadu, India

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS Er. Upasana garg 1, Dr. Vikram Singh 2 1 Student, Computer Science and Application Deptt, CDLU, Sirsa, Haryana, India,upasna.garg44@gmail.com

More information

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator Dr. S. K. Singh Professor, Department of EC, India Dr. R. Gupta Asst. Prof. Department of EC, India Abstract: The

More information

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks E.Gnanamanoharan 1 and R. Bensraj 2 Department of Electrical Engineering 1, 2 Annamalai University 1, 2 Email:

More information

A Location-based Predictive Route Caching Scheme for Pure Reactive Zone-based Routing Protocol in Mobile Ad Hoc Networks Abstract Introduction

A Location-based Predictive Route Caching Scheme for Pure Reactive Zone-based Routing Protocol in Mobile Ad Hoc Networks Abstract Introduction A Location-based Predictive Route Caching Scheme for Pure Reactive Zone-based Routing Protocol in Mobile Ad Hoc Networks Weibo Chen 1, Kun Yang 1 and Xueqi Cheng 2 1. University of Essex, School of Computer

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless

More information

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar

More information

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes Ruchi Khandelwal 1 & Akhilesh Kosta 2 Department of Computer Science and Engineering

More information

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS G. Poornima 1, Mr. M. Rajasenathipathi 2, 1 Research Scholar, Department of Computer Science, NGM College, Pollachi 2 Assistant Professor, Department

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs

A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs Vijaya Lekshmi. S.V, E.P.Prakash PG Scholar, Assistant Professor Department of CSE SNS College of Engineering

More information

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India

More information

A Literature survey on Improving AODV protocol through cross layer design in MANET

A Literature survey on Improving AODV protocol through cross layer design in MANET A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,

More information

Performance Analysis of Three Routing Protocols for Varying MANET Size

Performance Analysis of Three Routing Protocols for Varying MANET Size Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Performance Analysis of Three Routing Protocols for Varying MANET Size N Vetrivelan,

More information

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW Kirandeep Kaur 1, Mr.Pawan Luthra 2, Er.Gagandeep 3 1 Department of Computer Science and Engineering, Shaheed Bhagat Singh

More information

Gurleen Kaur Walia 1, Charanjit Singh 2

Gurleen Kaur Walia 1, Charanjit Singh 2 Simulation based Performance Evaluation and Comparison of Proactive and Reactive Routing Protocols in Mobile Ad-hoc Networks Gurleen Kaur Walia 1, Charanjit Singh 2 1,2 UCoE Department, Punjabi University,

More information

IJMIE Volume 2, Issue 9 ISSN:

IJMIE Volume 2, Issue 9 ISSN: PERFORMANCE ANALYSIS OF DSDV WITH OTHER MANET ROUTING PROTOCOL USING RANDOM WAYPOINT MOBILITY MODEL IN NS-3 Saurabh kumar soni* Prof.Prem Narayan Arya* ABSTRACT Routing protocols are a critical aspect

More information

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network Author manuscript, published in "ITCom 6 - next generation and sensor networks, Boston : United States (26)" DOI :.7/2.68625 Performance evaluation of reactive and proactive routing protocol in IEEE 82.

More information

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering

More information

Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs

Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs Poonam Pahuja Department of Computer Engineering, Mewar University, Chittorgarh Rajasthan, Email: poonamsanjay2007@gmail.com

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

A Novel Review on Routing Protocols in MANETs

A Novel Review on Routing Protocols in MANETs Robinpreet Kaur & Mritunjay Kumar Rai Department of Electronics and Engineering, Lovely Professional University, Phagwara, Punjab, India E-mail : robin_turna@yahoo.com, raimritunjay@gmail.com Abstract

More information

Routing Security in Mobile Ad Hoc Networks: An Extension of DSR

Routing Security in Mobile Ad Hoc Networks: An Extension of DSR Journal of Emerging Trends in Engineering and Applied Sciences (JETEAS) 2 (1): 155-159 Scholarlink Research Institute Journals, 2011 (ISSN: 2141-7016) jeteas.scholarlinkresearch.org Journal of Emerging

More information

Packet Routing using Optimal Flooding Protocol in Cluster based MANET

Packet Routing using Optimal Flooding Protocol in Cluster based MANET IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 09 March 2016 ISSN (online): 2349-784X Packet Routing using Optimal Flooding Protocol in Cluster based MANET S.Bavani V.Aiswariya

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Effects of Caching on the Performance of DSR Protocol

Effects of Caching on the Performance of DSR Protocol IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 07-11 Effects of Caching on the Performance of DSR Protocol Narinderjeet Kaur 1, Maninder

More information

Performance Evaluation of Routing Protocols for MAC Layer Models

Performance Evaluation of Routing Protocols for MAC Layer Models IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 4 (Mar. - Apr. 2013), PP 71-77 Performance Evaluation of Routing Protocols for MAC Layer Models Somya

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Keywords: AODV, MANET, WRP

Keywords: AODV, MANET, WRP Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

Query Control Mechanisms for the Zone Routing Protocol (ZRP)

Query Control Mechanisms for the Zone Routing Protocol (ZRP) Query Control Mechanisms for the Zone Routing Protocol (ZRP) Zygmunt J. Haas and Marc R. Pearlman Wireless Networks Laboratory Cornell University 9/3/98 SIGCOMM '98 1 Agenda Introduction - Routing in Mobile

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET 1 Prashant Dixit* Department of CSE FET, Manavrachna international institute of research

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Power aware Multi-path Routing Protocol for MANETS

Power aware Multi-path Routing Protocol for MANETS Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Minimizing the Routing Delay in Ad Hoc Networks through Route-Cache TTL Optimization

Minimizing the Routing Delay in Ad Hoc Networks through Route-Cache TTL Optimization Minimizing the Routing Delay in Ad Hoc Networks through Route-Cache TTL Optimization Ben Liang and Zygmunt J. Haas School of Electrical and Computer Engineering, Cornell University, Ithaca, NY 14853, USA

More information

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Mudit, Sachin Chaudhary Abstract In consideration of adaptability to the environment and flexibility in protocol construction,

More information

EZR: Enhanced Zone Based Routing In Manet

EZR: Enhanced Zone Based Routing In Manet EZR: Enhanced Zone Based Routing In Manet Bency Wilson 1, Geethu Bastian 2, Vinitha Ann Regi 3, Arun Soman 4 Department of Information Technology, Rajagiri School of Engineering and Technology, Rajagiri

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Maharishi Markandeshwar University

Maharishi Markandeshwar University RESEARCH ARTICLE OPEN ACCESS Simulation Based Performance Comparison of Adhoc Routing Protocols Kushagra Agrawal*, Shaveta Jain** *Department of Computer Science,, Mullana, Ambala agrawal_kushagra@rediffmail.com

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

An Efficient Zone-Based Multicast Routing Protocol for Ad Hoc Network

An Efficient Zone-Based Multicast Routing Protocol for Ad Hoc Network An Efficient Zone-Based Multicast Routing Protocol for Ad Hoc Network Tain-Sao Chang 1 Jyh-Horng Wen 2* and Tzu-Ting Wu 3 1 Department of Electrical Engineering National Chung Cheng University No. 168

More information

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan

More information

The Effects of Route Information Initialization on Two On-demand Routing Algorithms for wireless Ad Hoc Networks *

The Effects of Route Information Initialization on Two On-demand Routing Algorithms for wireless Ad Hoc Networks * The Effects of Route Information Initialization on Two On-demand Routing Algorithms for wireless Ad Hoc Networks * Chunyue Liu Dept. of Computer Science, Graduate Center of City University of New York

More information

A Survey on Path Weight Based routing Over Wireless Mesh Networks

A Survey on Path Weight Based routing Over Wireless Mesh Networks A Survey on Path Weight Based routing Over Wireless Mesh Networks Ankush Sharma Assistant Professor, Dept. Of C.S.E, Chandigarh University Gharuan, India Anuj Gupta Head C.S.E and M.C.A Dept, RIMT Mandi

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications Kai-Juan Wong, Bu-Sung Lee, Boon-Chong Seet, Genping Liu, Lijuan Zhu School of Computer

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information

A Hybrid Multi Meshed Tree Routing Protocol for Wireless Ad hoc Networks

A Hybrid Multi Meshed Tree Routing Protocol for Wireless Ad hoc Networks A Hybrid Multi Meshed Tree Routing Protocol for Wireless Ad hoc Networks Scott Pudlewski, Nirmala Shenoy, Yamin Al-Mousa, Yin Pan, John Fischer Rochester Institute of Technology, Rochester, NY Abstract

More information

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Akshay Shankar, Lavanya Chelle Information Science Engineering RNS Institute of Technology Bangalore, India Abstract- A Mobile

More information

Performance Evaluation of AODV, DSR, DYMO & ZRP in Cost 231 Walfisch-Ikegami Path Loss Propagation Model

Performance Evaluation of AODV, DSR, DYMO & ZRP in Cost 231 Walfisch-Ikegami Path Loss Propagation Model Page 2 Oeconomics of Knowledge, Volume 3, Issue 3, 3Q, Summer 2011 Performance Evaluation of AODV, DSR, DYMO & ZRP in Cost 231 Walfisch-Ikegami Path Loss Propagation Model Rachit JAIN Department of Electronics

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network Global Journal of Computer Science and Technology Volume 11 Issue 1 Version 1.0 February 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online

More information

VANS: Visual Ad hoc Network Simulator

VANS: Visual Ad hoc Network Simulator VANS: Visual Ad hoc Network Simulator Masako Shinohara, Hideki Hayashi, Takahiro Hara, Akimitsu Kanzaki and Shojiro Nishio Graduate School of Information Science and Tech., Osaka University {sinohara.masako,

More information

Routing protocols in Mobile Ad Hoc Network

Routing protocols in Mobile Ad Hoc Network Routing protocols in Mobile Ad Hoc Network Presented By :- Nitesh Jain Date:-26/10/2005 SCHOOL OF INFORMATION TECHNOLOGY INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR KHARAGPUR Types of Wireless Networks Infrastructure

More information

The Performance of Query Control Schemes for the Zone Routing Protocol

The Performance of Query Control Schemes for the Zone Routing Protocol IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 4, AUGUST 2001 427 The Performance of Query Control Schemes for the Zone Routing Protocol Zygmunt J. Haas, Senior Member, IEEE and Marc R. Pearlman, Member,

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

A Review Paper on Routing Protocols in Wireless Sensor Networks

A Review Paper on Routing Protocols in Wireless Sensor Networks A Review Paper on Routing Protocols in Wireless Sensor Networks Seema Pahal 1, Kusum Dalal 2 1,2 ECE Department, DCRUST MURTHAL, Haryana Abstract- This paper presents a literature review on WSN networks,

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Overhead Analysis of Reactive Shortest Single and Multi-path Routing Mechanism with Load Balance in MANET

Overhead Analysis of Reactive Shortest Single and Multi-path Routing Mechanism with Load Balance in MANET www.ijcsi.org https://doi.org/10.20943/01201605.102107 102 Overhead Analysis of Reactive Shortest Single and Multi-path Routing Mechanism with Load Balance in MANET K.MARIYAPPAN 1, Dr.M.KARNAN 2 1 Assistant

More information

Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks

Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks Som Chandra Neema Venkata Nishanth Lolla {sneema,vlolla}@cs.ucr.edu Computer Science Department University of California, Riverside Abstract

More information

Review paper on performance analysis of AODV, DSDV, OLSR on the basis of packet delivery

Review paper on performance analysis of AODV, DSDV, OLSR on the basis of packet delivery IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 1 (May. - Jun. 2013), PP 51-55 Review paper on performance analysis of AODV, DSDV, OLSR on the basis

More information

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

Determining the Optimal Configuration for the Zone Routing Protocol. 1 Compared to wired channels operating with the same transmission power

Determining the Optimal Configuration for the Zone Routing Protocol. 1 Compared to wired channels operating with the same transmission power IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 17, NO. 8, AUGUST 1999 1395 Determining the Optimal Configuration for the Zone Routing Protocol Marc R. Pearlman, Student Member, IEEE, and Zygmunt

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information