1. Introduction. Abstract
|
|
- Randolph Wilcox
- 5 years ago
- Views:
Transcription
1 Determining a equence of table Multicast teiner Trees in Mobile Ad Hoc Networks Dr. Natarajan Meghanathan nmeghanathan@jsums.edu Jackson tate University, Jackson, M 3927 Abstract We show that given the complete knowledge of future topology changes, it is possible to determine the sequence of stable multicast teiner trees (called the stable mobile multicast teiner tree) in a multicast session such that the number of tree transitions is minimal. The algorithm to determine the stable mobile multicast teiner tree and the minimum number of tree transitions is called OptTreeTrans. It is based on the following greedy approach: whenever a multicast teiner tree is required, choose the teiner tree that will exist for the longest time. The above strategy is repeated over the duration of the multicast session. We prove that OptTreeTrans gives the optimal number of tree transitions and simultaneously yields the stable mobile multicast teiner tree. We study the performance of OptTreeTrans in terms of the number of tree transitions and the number of links constituting the teiner tree for different conditions of node mobility and network density.. Introduction Wireless networks provide ubiquitous communication capability and location-independent information access to mobile users [2]. A mobile ad hoc network (MANET) is a dynamically reconfigurable self-organizing wireless network with no fixed infrastructure or a centralized administration [8]. MANETs function in a peer-to-peer mode of operation. Routes in MANETs are often multi-hop due to the limited radio propagation range of wireless devices. Each mobile node in MANET also functions as a router to establish endto-end connections between any two nodes [7]. Multicasting in wired and wireless networks has emerged as a desirable and essential technology in many applications such as audio/ video conferencing, corporate communications, collaborative and groupware applications, distance learning, stock quotes, distribution of software, news etc [9]. Using multicast, a single stream of data can be distributed to multiple recipients, with data duplicated only when necessary [9]. This is more advantageous than multiple unicast transmissions of the same data independently to each and every receiver, which also leads to network clogging. MANETs are deployed in applications such as disaster recovery, rescue missions, military operations in a battlefield, conferences, crowd control, outdoor entertainment activities, etc. One common feature among all these applications is oneto-many and many-to-many communications among the participants [6]. Hence, to support these applications, efficient ad hoc multicast routing protocols are required. tability of paths and trees is an important design criterion to be considered in the development of multi-hop unicast and multicast routing protocols for resource-constrained environments like that of MANETs. Wireless links are shared and are limited in their bandwidth. Frequent route discovery attempts could congest the network and also knock out the battery power at critical nodes. The battery reserves at the nodes are to be treated precious as they may be deployed in environments where recharging is next to impossible. Also, nodes in energy-constrained environments cannot afford to lose their battery power quickly. For multi-media applications that require the packets to be delivered in-order with negligible variance in the inter-packet delay, frequent changes in the routes traversed by the packets could result in out-of-order packet delivery with high jitter. In the case of reliable data transfer applications, failure to receive an acknowledgement packet within a particular timeout interval can also trigger retransmissions at the source side. As a result, the application layer at the receiver side might be overloaded in handling out-of-order, lost and duplicate packets. Thus, stability of the communication structures such as unicast paths and multicast trees is important from the point of view of Quality of ervice too. This forms of our motivation for this paper. We model an ad hoc network as a unit disk graph [5], in which vertices represent wireless nodes and a bi-directional edge exists between two vertices if the corresponding nodes are within the transmission range of each other. In general, given a weighted graph G = (V, E), and a subset of vertices (called the multicast group or teiner points) V, the teiner tree is the minimum-weight tree of G connecting all the vertices of. In the unit disk graph considered in this paper, the weight of each edge is unity, and all the edges in the teiner tree are contained in the edge set of the graph. Accordingly, we define the minimum teiner tree as the tree with the least number of edges required to connect all the vertices in the multicast group (i.e., the set of teiner points). Unfortunately, the problem of determining a minimum teiner tree in an undirected graph like that of the unit disk graph is NP-complete. Efficient heuristics (e.g., [4]) have been proposed in the literature to approximate a minimum teiner tree. In this paper, we show that aiming for the minimum teiner tree in MANETs, results in multicast trees that are highly unstable. The multicast tree has to be frequently rediscovered, and this adds considerable overhead to the resource-constrained network. By adding a few more links and nodes to the tree, it is possible to increase its stability. We define stability of a multicast teiner tree in terms of the number of times the tree has to change for the duration of a multicast session. We propose an efficient, polynomial-time greedy algorithm called OptTreeTrans, to determine the minimum number of tree transitions during the period of a multicast session from a source node to a set of nodes constituting the multicast group in the network. Given the complete knowledge of future topology changes, the
2 algorithm operates on the following principle: Whenever a multicast tree connecting a given source node to all the members of a multicast group is required, choose the multicast tree that will keep the source connected to the multicast group members for the longest time. The above strategy is repeated over the duration of the multicast session and the sequence of stable multicast teiner trees obtained by running this algorithm is called the stable mobile multicast teiner tree. The complexity of algorithm OptTreeTrans depends on the complexity of the underlying heuristic used to determine the longest existing multicast teiner tree during each tree transition (also called here after as tree repair). We use the Kou. et. al s [4] well-known O( V 2 ) heuristic, as the underlying heuristic to determine the longest existing multicast tree. The complexity of OptTreeTrans can then be written as O( V 2 T 2 ), where V is the number of nodes in the network, is the multicast group size and T is the duration of the multicast session. We also define the minimum mobile teiner tree as the sequence of approximations to the minimum teiner tree obtained by directly using Kou s heuristic whenever required. We compare the performance of the stable mobile multicast teiner tree with that of the minimum mobile multicast teiner tree in terms of the number of tree repairs and the average number of links in the multicast tree (averaged over time) at different conditions of node density and node mobility. The rest of the paper is organized as follows: In ection 2, we discuss the Kou s heuristic to approximate the minimum teiner tree in wireless ad hoc networks. In ection 3, we introduce the algorithm to find the stable mobile multicast teiner tree and the optimal number of tree transitions; give its proof of correctness, and analyze its complexity. In ection 4, we present our simulation environment and discuss the simulation results with respect to the stable mobile multicast teiner tree and the minimum mobile multicast teiner tree. In ection 5, we conclude the paper. 2. Heuristic to Approximate Minimum teiner Tree Determining a minimum teiner tree is a well-known NPcomplete problem. everal heuristics have been proposed in the literature to solve the minimum teiner tree problem. We use the Kou et. al s [4] well-known O( V 2 ) heuristic to approximate the minimum teiner tree in graphs representing snapshots of the network topology. In this section, we give the outline of the heuristic in Figure, followed by its complexity analysis and approximation ratio. Input: An undirected graph G = (V, E) Multicast group V Output: A tree T H for the set in G tep : Construct a complete undirected weighted graph G C = (, E C ) from G and where (v i, v j ) E C, v i and v j are in, and the weight of edge (v i, v j ) is the length of the shortest path from v i to v j in G. tep 2: Find the minimal spanning tree T C in G C (If more than one minimal spanning tree exists, pick an arbitrary one). tep 3: Construct the sub graph G of G, by replacing each edge in T C with the corresponding shortest path from G (If there is more than one shortest path between two given vertices, pick an arbitrary one). tep 4: Find the minimal spanning tree T in G (If more than one minimal spanning tree exists, pick an arbitrary one). tep 5: Construct the minimum teiner tree T H, from T by deleting edges in T, if necessary, such that all the leaves in T H are members of. Figure : Kou et. al s Heuristic to find an Approximate Minimum teiner Tree tep is the most time consuming step of the heuristic. The shortest path between any two vertices on G = (V, E) can be found in O( V 2 ) time. There are /2 pairs of vertices that form the edges of G C. Hence, the graph G C can be constructed at time complexity O( V 2 ). With the Kruskal s minimal spanning tree algorithm run on G C = (, E C ), step 2 can be completed in O( 2 ) time. The sub graph G can be constructed in step 3 in O( V ) time as all the shortest paths have been already calculated in step. tep 4 can be completed in O( V 2 ) time by running Kruskal s algorithm on G. tep 5 visits at most V nodes to construct the minimum teiner tree T H. In our case, since all the edges in the teiner tree are contained in the input edge set E, there is no need to execute tep 5. The minimal spanning tree T determined in step 4 is also the teiner tree T H. umming up the complexities of steps through 5, the overall time complexity of the heuristic is O( V 2 ). Let D H be the total number of edges in the teiner tree T H, produced by the above heuristic. Let D MIN be the total length on the edges of the minimal teiner tree T MIN. Let m be the total number of leaves in T MIN. Then, according to [4], D H / D MIN 2(-/m). 3. table Mobile Multicast teiner Tree In a dynamically changing topology, the minimum multicast teiner tree approximated using Kou s heuristic has to be frequently updated as it will have the minimal nodes and links. The source might be disconnected from one or more members of the multicast group. 3.. Mobile Graph The algorithm to determine the stable mobile multicast teiner tree and hence the optimal number of tree transitions uses the notion of a mobile graph [3] to represent the sequence of network topology changes. A mobile graph is defined as the sequence G M = G G 2 G T of static graphs that represents the network topology changes over some time scale T, the duration of the multicast session.
3 3.2. Algorithm for the Optimal Number of Tree Transitions Algorithm OptTreeTrans operates on the following simple greedy strategy: whenever a multicast teiner tree, here after denoted as (s-)-tree, connecting given a source node s to all the members of the multicast group, i.e., set of teiner points, is required, select a multicast teiner tree that will exist for the longest time. Let G M = G G 2 G T be the mobile graph generated by sampling the network topology at regular instants t, t 2,, t T of a multicast session. When an (s-)-tree is required at sampling time instant t i, the strategy is to find a mobile sub graph G(i, j) = G i G i+ G j such that there exists at least one multicast (s-)-tree in G(i, j) and none exists in G(i, j+). A multicast (s-)-tree in G(i, j) is selected using Kou s heuristic. uch a tree exists in each of the static graphs G i, G i+,, G j. If there is a tie, the (s-)-tree with the smallest number of constituent links is chosen. If sampling instant t j+ t T, the above procedure is repeated by finding the (s-)-tree that can survive for the maximum amount of time since t j+. A sequence of such maximum lifetime multicast teiner (s-) trees over the timescale of G M forms the stabile mobile multicast teiner tree in G M. The pseudo code is given in Figure 2. Input: G M = G G 2 G T, source s, multicast group Output: (s-) Mobiletabletree // stable mobile multicast teiner tree Auxiliary Variables: i, j Initialization: i=; j= Begin OptTreeTrans while (i T) do 2 Find a mobile graph G(i, j) = G i G i+ G j such that there exists at least one (s-)-tree in G(i, j) and {no (s-)-tree exists in G(i, j+) or j = T} 3 (s-) Mobiletabletree = (s-) Mobiletabletree U {Minimum teiner (s-)-tree in G(i, j) } 4 i = j + 5 end while 6 return (s-) Mobiletabletree End OptTreeTrans Figure 2: Pseudo code for algorithm OptTreeTrans In a mobile graph G M = G G 2 G T, the number of tree transitions can be at most T. The minimum teiner tree Kou s heuristic will have to be run at most T 2 times, each time on a graph of V nodes. As Kou s heuristic is of O( V 2 ) complexity, the complexity of OptTreeTrans is O( V 2 T 2 ) Proof of Correctness Given a mobile graph G M = G G 2 G T, the source node s and the multicast group, let the number of tree transitions in the mobile multicast teiner tree, (s-) Mobiletabletree, generated by OptTreeTrans be m. To prove m is the optimal number of tree transitions, assume the contrary: there exists another mobile multicast teiner tree (s-) Mobiletabletree in G M and the number of tree transitions in (s-) Mobiletabletree is m < m. Let epoch, 2 epoch,, m+ epoch be the set of sampling time instants in each of which the mobile multicast teiner tree (s-) Mobiletabletree suffers no tree transitions. Let epoch, 2 ' epoch,, m ' + ' epoch be the set of sampling time ' instants in each of which the mobile multicast teiner tree init, j (s-) Mobiletabletree suffers no tree transitions. Let t( s ) and end, k t( s ) be the initial and final sampling time instants of j init, j epoch where j m+. Let t ( s )' end, k and t( s )' be the initial and final sampling time instants of k epoch where ' k m +. Note that init, t = init, t and end, m+ t = end, m ' + ' t to ' indicate (s-) Mobiletabletree and (s-) Mobiletabletree span over the same sequence of sampling time instants. Now, we claim (j, k; j m+ and k m +) such that j epoch k epoch, i.e., init, k init, j end, j end, k ' t' < t < t < t and ' at least one (s-)-tree existed in [ init, k t,, end, k ' t ]; ' otherwise, m m. But OptTreeTrans made a tree transition after end, j t since there was no common (s-)-tree outside [ init, j t,, end, j t ]. This implies there is no common (s-)-tree in [ init, k t,, end, k ' t ].=> Contradiction. Thus, m ' m. 4. imulations 4.. imulation Conditions The node mobility model used in all of our simulations is the Random waypoint model [], a widely used mobility model in MANET studies. Each node starts moving from an arbitrary location to a randomly selected destination with a randomly chosen speed in the range [0.. v max ]. Once the destination is reached, the node selects another destination and continues to move with a different speed. The v max values used are: 0 and 50 m/s. The pause time between two consecutive direction changes is 0 seconds. We obtain a centralized view of the network topology by generating mobility trace files for 000 seconds. The network size is 500 m x 300 m. The density of the network is varied by performing simulations with 25 and 75 nodes. The wireless transmission range of nodes in all three cases is 250m. imulation time is
4 000 seconds. The network topology is sampled for every second. The multicast group size is varied from 2 through 24. Each data point in Figures 3., 3.2, 3.3, 3.4, 4. and 4.2, is averaged over 5 randomly generated mobility trace files Figure 3.: 25 Nodes, vmax = 0 m/s Figure 3.3: 25 Nodes, vmax = 50 m/s tested on 5 randomly picked multicast groups for each value of the group size. Figure 3.2: 75 Nodes, vmax = 0 m/s Figure 3.4: 75 Nodes, vmax = 50 m/s Figure 3: Minimum Mobile Multicast teiner Tree Vs table Mobile Multicast teiner Tree Figure 4.: vmax = 0 m/s Figure 4.2: vmax = 50 m/s Figure 4: Availability Lifetime Tradeoff in Minimum Mobile Multicast teiner Tree When an (s-) teiner tree is required at sampling time instant ti and stability is not to be considered, then Kou s heuristic is run on static graph Gi and the (s-) tree obtained is used as long as it exists. The procedure is repeated till the last sampling time instant tt is reached. We refer to the sequence of multicast teiner trees generated by the above strategy as minimum mobile multicast teiner tree. We compare the performance of the stable mobile multicast teiner tree with that of minimum mobile teiner tree in terms of number of tree transitions and the average number of edges in the mobile teiner trees, which is the number of links in the constituent (s-) teiner trees, averaged over time imulation Results The stability of the minimum mobile multicast teiner tree decreases exponentially as the multicast group size is increased. Aiming for the minimum number of edges, it is tough to find a teiner tree that would keep together all the multicast group members for a longer time. On the other hand, by accommodating 20-50% more edges, the stable mobile teiner tree becomes insensitive to the multicast group size. The decrease in the number of tree transitions is by a factor of 2 to 7 (with 25 nodes, 0 m/s) and 6 to 5 (for 75 nodes). For a given node mobility and multicast group size, the number of tree transitions in the case of a stable mobile multicast teiner tree is reduced by half. This could be attributed to the tendency of algorithm OptTreeTrans to make use of the available nodes and links as much as possible in order to maximize the stability of the trees. On the contrary,
5 in the case of a minimum mobile teiner tree, the average number of links in the constituent (s-) trees remains the same with increase in node density, while the stability of the minimum mobile teiner trees decreases with increase in node density. This shows that when we aim for a minimum teiner (s-) tree, we do not make use of the increased number of nodes and links to improve the lifetime of the tree. As the network density increases, the physical distance of a link (or the hop) is equal to 70-80% of the transmission range of the nodes. Hence, the links in a minimum mobile multicast teiner tree are highly vulnerable to failure as the constituent nodes of the link are likely to move away from the reach of one another anytime. On the other hand, in the case of the stable mobile teiner trees, the physical distance of a link is only 50-60% of the transmission range of the nodes. This justifies the stability of the trees and also the increase in the number of links in the constituent (s-) trees of a stable mobile multicast teiner tree, compared to that of the minimum mobile multicast teiner tree. The availability-lifetime tradeoff in the case of the minimum mobile teiner trees is well illustrated in Figures 4. and 4.2. With 25 nodes in the network, it is tough to find a tree that connects the source node of the multicast session to all the members of the multicast group for most of the duration of the multicast session. The connectivity of the nodes in the network is limited. On the other hand, with 75 nodes, it is possible to keep the source connected to all the members of the multicast group for most of the duration of the multicast session. The tradeoff is that we will be making more tree transitions with 75 nodes compared to that with 25 nodes. This availability-lifetime tradeoff is more dominant at smaller values of the multicast group size and fades off as the multicast group size approaches 25 nodes. Note that the number of edges in a mobile sub graph is inversely proportional to the number of constituent static graphs. When an algorithm is applied over a mobile sub graph spanning multiple static graphs, the algorithm is offered only limited choices in selecting a multicast teiner tree and is forced to lose sight over its design objective. Thus, Kou s heuristic is merely used as a tool to find the stable mobile multicast teiner tree. The optimal number of tree reconstructions does not depend on the underlying algorithm or heuristic used as we always try to find the longest living multicast teiner tree in the mobile graph. Nevertheless, the run-time complexity of OptTreeTrans depends on the underlying algorithm or heuristic used to determine the constituents of the stable mobile multicast teiner tree. 5. Conclusions The high-level contribution of our paper is a polynomialtime algorithm OptTreeTrans to determine the sequence of stable multicast teiner trees in a MANET environment. The algorithm can determine the longest-living multicast teiner tree over a given span of time using any heuristic developed (for the NP-complete problem) to approximate the minimum teiner tree. When used with the well-known Kou s heuristic, whose complexity is O( V 2 ), the complexity of algorithm OptTreeTrans is O( V 2 T 2 ), where V is the number of nodes in the network, is the multicast group size, and T is the duration of the multicast session during which a source node is sending data to all the members of the multicast group. imulation results indicate that for a given node density, the number of tree transitions in a stable mobile multicast teiner tree increases linearly with node mobility while the number of tree transitions in a minimum mobile teiner tree increases exponentially. Also, for a given node mobility, the stability of minimum mobile multicast teiner tree decreases with increase in node density; while the stability of stable mobile multicast teiner tree increases with increase in node density. The average number of links in a minimum mobile multicast teiner tree remains the same irrespective of the increase in node density; where as algorithm OptTreeTrans chooses a teiner tree that has more constituent links and can cover the multicast group members for a longer time. As part of future work, we are working on developing a practical stable multicast tree-discovery and maintenance protocol that can make use of the looking ahead technique of algorithm OptTreeTrans. References [] C. Bettstetter, H. Hartenstein and X. Perez-Costa, tochastic Properties of the Random-Way Point Mobility Model, Wireless Networks, pp , Vol. 0, No. 5, eptember [2] C. C. Chiang, M. Gerla and L. Zhang, Adaptive shared tree multicast in mobile wireless networks, GLOBECOM 98, pp , 998. [3] A. Farago and V. R. yrotiuk, MERIT: A calable Approach for Protocol Assessment, Mobile Networks and Applications, Vol. 8, No. 5, pp , October [4] L. Kou, G. Markowsky and L. Berman, A Fast Algorithm for teiner Trees, Vol 5, pp. 4-45, Acta Informatica, pringer-v erlag, 98. [5] F. Kuhn, T. Moscibroda and R. Wattenhofer, Unit Disk Graph Approximation, Proceedings of DIALM-POMC, pp. 7 23, October [6] M. Lee and Y. Kim, PatchODMRP: an ad hoc multicast routing protocol, 5 th IEEE International Conference on Information Networking, pp , 200. [7]. Lee and C. Kim, Neighbor supporting ad hoc multicast routing protocol, First Annual Workshop on Mobile and Ad hoc Networking and Computing, MobiHOC, pp.37-44, [8]. J. Lee, W. u, J. Hsu, M. Gerla and R. Bagrodia, A performance comparison study of ad hoc wireless multicast protocols, 9 th Annual Joint Conference of the IEEE Computer and Communications ocieties, INFOCOM, v.2, pp , [9] C. K. Toh, G. Guichal and. Bunchua, ABAM: ondemand associativity-based multicast routing for ad hoc mobile networks, 52 nd IEEE VT Fall Vehicular Technology Conference, v.3, pp , 2000.
6
CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS
CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department
More informationImpact of Route Selection Metrics on the Performance of On-Demand Mesh-based Multicast Ad hoc Routing
Computer and Information Science Vol. 3, No. 2; May 2010 Impact of Route Selection Metrics on the Performance of On-Demand Mesh-based Multicast Ad hoc Routing Natarajan Meghanathan (Corresponding Author)
More informationPerformance Comparison of Minimum Hop vs. Minimum Edge Based Multicast Routing under Different Mobility Models for Mobile Ad hoc Networks
Performance Comparison of Minimum Hop vs. Minimum Edge Based Multicast Routing under Different Mobility Models for Mobile Ad hoc Networks Natarajan Meghanathan Associate Professor Department of Computer
More informationLocation Prediction Based Routing Protocol for Mobile Ad hoc Networks
Location Prediction Based Routing Protocol for Mobile Ad hoc Networks Natarajan Meghanathan Department of Computer Science Jackson State University Jackson, MS 39217, USA Email: nmeghanathan@jsums.edu
More informationPERFORMANCE OF THE MAXIMUM STABLE CONNECTED DOMINATING SETS IN THE PRESENCE OF STATIC NODES IN A MOBILE ADHOC NETWORK
PERFORMANCE OF THE MAXIMUM STABLE CONNECTED DOMINATING SETS IN THE PRESENCE OF STATIC NODES IN A MOBILE ADHOC NETWORK Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA ABSTRACT
More informationPERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS Natarajan Meghanathan Jackson State University, 1400
More informationIMPACT OF STATIC NODES AND PAUSE TIME ON THE STABILITY OF CONNECTED DOMINATING SETS IN A MOBILE AD HOC NETWORK
IMPACT OF STATIC NODES AND PAUSE TIME ON THE STABILITY OF CONNECTED DOMINATING SETS IN A MOBILE AD HOC NETWORK Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA ABSTRACT The
More informationVolume 2 No. 1 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.
The Beaconless Node Velocity-based Stable Path Routing Protocol for Unicasting and Multicasting in Mobile Ad hoc Networks Natarajan Meghanathan Jackson State University, Jackson, MS 39217, USA natarajan.meghanathan@jsums.edu
More informationA Performance Comparison of Multicast Routing Protocols In Ad hoc Networks
A Performance Comparison of Multicast Routing Protocols In Ad hoc Networks Hasnaa MOUSTAFA and Houda LABIOD ENST - INFRES Department - 46 Rue Barrault 75634 Paris cedex 3 Paris - France Tel: +33 ().45.8.74.36
More informationIMPACT OF THE OPTIMUM ROUTING AND LEAST OVERHEAD ROUTING APPROACHES ON MINIMUM HOP ROUTES AND CONNECTED DOMINATING SETS IN MOBILE AD HOC NETWORKS
IMPACT OF THE OPTIMUM ROUTING AND LEAST OVERHEAD ROUTING APPROACHES ON MINIMUM HOP ROUTES AND CONNECTED DOMINATING SETS IN MOBILE AD HOC NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch
More informationComputer and Information Science February, 2010
Improvement in Network Lifetime for On-Demand Routing in Mobile Ad hoc Networks Using either On-Demand Recharging or Transmission Power Control or Both Natarajan Meghanathan (Corresponding Author) Department
More informationA Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks
A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior
More information1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol
1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks
More informationHeuristic Clustering Algorithms in Ad hoc Networks
Heuristic Clustering Algorithms in Ad hoc Networks Artvin Çoruh University e-mail: nevin.aydin@gmail.com Volume 3 No 3 (2014) ISSN 2158-8708 (online) DOI 10.5195/emaj.2014.39 http://emaj.pitt.edu Abstract
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationA Survey - Energy Efficient Routing Protocols in MANET
, pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationPerformance Comparison of MANET (Mobile Ad hoc Network) Protocols (ODMRP with AMRIS and MAODV)
Performance Comparison of MANET (Mobile Ad hoc Network) Protocols (ODMRP with AMRIS and MAODV) Aparna K Lecturer, Dept. of Master of Computer Applications BMS Institute of Technology, Bangalore, India.
More informationINVESTIGATING THE SCALABILITY OF THE FISH-EYE STATE ROUTING PROTOCOL FOR AD HOC NETWORKS
INVESTIGATING THE SCALABILITY OF THE FISH-EYE STATE ROUTING PROTOCOL FOR AD HOC NETWORKS 1 NATARAJAN MEGHANATHAN, 2 AYOMIDE ODUNSI 1 Asstt Prof., Department of Computer Science, Jackson State University,
More information#$% * #$%+ $ (% Enables community-centric applications: Military and law enforcement. Search and rescue applications.
Enables communitycentric applications: Military and law enforcement Search and rescue applications Foad Hamidi Amir Ali Ghadiri Online gaming Possibly email and file transfer! Limited radio propagation
More informationAN ANTENNA SELECTION FOR MANET NODES AND CLUSTER HEAD GATEWAY IN INTEGRATED MOBILE ADHOC NETWORK
www.arpapress.com/volumes/vol9issue2/ijrras_9_2_09.pdf AN ANTENNA SELECTION FOR MANET NODES AND CLUSTER HEAD GATEWAY IN INTEGRATED MOBILE ADHOC NETWORK Ashish Bagwari 1, Danish Quamar 2, Noor Mohd 3 &
More informationFigure 1: Ad-Hoc routing protocols.
Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca
More informationConnectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks
Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University
More informationPerformance Evaluation of DSDV, DSR AND ZRP Protocol in MANET
Performance Evaluation of, AND Protocol in MANET Zaiba Ishrat IIMT Engg college,meerut Meerut, India Pankaj singh Sidhi vinayak Group of College,Alwar Alwar,Rajasthan Rehan Ahmad IIMT Engg college,meerut
More informationInternational Journal of Engineering, Science and Technology Vol. 2, No. 6, 2010, pp. 1-21
MultiCraft International Journal of Engineering, Science and Technology Vol. 2, No. 6, 2010, pp. 1-21 INTERNATIONAL JOURNAL OF ENGINEERING, SCIENCE AND TECHNOLOGY www.ijest-ng.com 2010 MultiCraft Limited.
More informationII. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid.
A COMPLETE STUDY ON POWER AWARE ROUTING PROTOCOL FOR MOBILE ADHOC NETWORK A. Kumaravel 1, Dr. M.Chandrasekaran 2 1 (Electronics and Communication Engineering, Paavai Engineering College,India) 2 (Electronics
More informationImplementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)
CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal
More informationSurvey of Topology-based Multicast Routing Protocols for Mobile Ad hoc Networks
124 Survey of Topology-based Multicast Routing Protocols for Mobile Ad hoc Networks Natarajan Meghanathan Department of Computer Science, Jackson State University, P. O. Box 18839, 1400 John R. Lynch Street,
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationAn Energy-aware Greedy Perimeter Stateless Routing Protocol for Mobile Ad hoc Networks
An Energy-aware Greedy Perimeter Stateless Routing Protocol for Mobile Ad hoc Networks Natarajan Meghanathan Jackson State University P. O. Box 18839, 1400 J. Lynch Street Jackson, MS 39217, USA ABSTRACT
More informationGATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani
GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,
More informationEfficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks
Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,
More informationExperiments with Broadcast Routing Algorithms for Energy- Constrained Mobile Adhoc Networks. (Due in class on 7 March 2002)
EE Project Description Winter Experiments with Broadcast Routing Algorithms for Energy- Constrained Mobile Adhoc Networks (Due in class on March ) Abstract In this project, you will experiment with the
More informationDynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks
Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationA Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET
A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant
More informationPresenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks
Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali
More informationModule 6 NP-Complete Problems and Heuristics
Module 6 NP-Complete Problems and Heuristics Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 397 E-mail: natarajan.meghanathan@jsums.edu Optimization vs. Decision
More informationAnalysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group
More informationAn Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks
Georgia State University ScholarWorks @ Georgia State University Computer Science Theses Department of Computer Science 12-4-2006 An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationMulticasting in Ad-Hoc Networks: Comparing MAODV and ODMRP
Multicasting in Ad-Hoc Networks: Comparing MAODV and ODMRP Thomas Kunz and Ed Cheng Carleton University tkunz@sce.carleton.ca Abstract. Multicasting can efficiently support a variety of applications that
More informationIMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS
IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS Indu Shukla, Natarajan Meghanathan Jackson State University, Jackson MS, USA indu.shukla@jsums.edu,
More informationPerformance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power
, pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria
More informationMaximization of Time-to-first-failure for Multicasting in Wireless Networks: Optimal Solution
Arindam K. Das, Mohamed El-Sharkawi, Robert J. Marks, Payman Arabshahi and Andrew Gray, "Maximization of Time-to-First-Failure for Multicasting in Wireless Networks : Optimal Solution", Military Communications
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationCASER Protocol Using DCFN Mechanism in Wireless Sensor Network
Volume 118 No. 7 2018, 501-505 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu CASER Protocol Using DCFN Mechanism in Wireless Sensor Network A.Shirly
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationCommunication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1
Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a
More informationEnhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1
Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu
More informationModule 6 NP-Complete Problems and Heuristics
Module 6 NP-Complete Problems and Heuristics Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu P, NP-Problems Class
More informationAn Intelligent Mesh Based Multicast Routing Algorithm for MANETs using Particle Swarm Optimization
214 An Intelligent Mesh Based Multicast Routing Algorithm for MANETs using Particle Swarm Optimization E. Baburaj 1, and V. Vasudevan 2 1. Research Scholar, Anna University 2. Professor, Department of
More informationApplication Layer Multicasting for Mobile Ad-Hoc Networks with Network Layer Support
Application Layer Multicasting for Mobile Ad-Hoc Networks with Network Layer Support Jayanta Biswas and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 0 0, India {jayanta@cadl, nandy@serc}.iisc.ernet.in
More informationAppointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks
Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University
More informationApproximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks
Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Thomas Erlebach Department of Computer Science University of Leicester, UK te17@mcs.le.ac.uk Ambreen Shahnaz Department of Computer
More informationInternational Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
More informationLoad Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department RPI Mobile Wireless Networks Wireless nodes
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationBehaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model
Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,
More informationCHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS
89 CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS 5.1 INTRODUCTION Efficient routing in MANET is a tough task due to their highly dynamic network topology, bandwidth controlled links and
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationPerformance Improvement of Wireless Network Using Modern Simulation Tools
Performance Improvement of Wireless Network Using Modern Simulation Tools Ms. Nimisha Dinesh Deval 1, Prof. Mrs. S. P. Pawar 2 1ME student CSE Dept, SVERIs college of Engineering, Pandharpur, Maharashtra,
More informationStudy and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs
Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate
More informationKeywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various
More informationReversing Ticket Based Probing Routing Protocol for MANET
Reversing Ticket Based Probing Routing Protocol for MANET TURGUT YUCEL and MIN SONG Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529 U.S.A. http://www.odu.edu/networking
More informationA Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh
A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh Amity University Rajasthan, Jaipur, India Abstract MANET is a dynamic topology wireless network in which
More informationImplementation and simulation of OLSR protocol with QoS in Ad Hoc Networks
Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More informationDBSCAN APLLY In Weighted Clustering Algorithm
DBSCAN APLLY In Weighted Clustering Algorithm for MANET Manju Vishwakarma Research Scholar, Department of Computer Science and Engineering, Bhilai Institute of Technology, Durg, India. Partha Roy Associate
More informationReview: Performance Evaluation of TCP Congestion Control Mechanisms Using Random-Way-Point Mobility Model
Review: Performance Evaluation of TCP Congestion Control Mechanisms Using Random-Way-Point Mobility Model Rakesh K Scholar (M.Tech) The Oxford College of Engineering Bangalore Mrs. Kalaiselvi Asst. Prof,
More informationAvailable online at ScienceDirect. Procedia Computer Science 57 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (2015 ) 890 897 2015 International Conference on Recent Trends in Computing (ICRTC 2015) Performance Analysis of Efficient
More informationConstructing Connected Dominating Sets with Bounded Diameters in Wireless Networks
Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng
More informationTECHNICAL RESEARCH REPORT
TECHNICAL REEARCH REPORT Multicast Routing in Mobile Ad Hoc Networks Using ource Grouped Flooding by Karthikeyan Chandrashekar, John. Baras CHCN TR 00-6 (IR TR 00-) The Center for atellite and Hybrid Communication
More informationA Weighted-Density Connected Dominating Set Data Gathering Algorithm for Wireless Sensor Networks
A Weighted-Density Connected Dominating Set Data Gathering Algorithm for Wireless Sensor Networks Larry King Clemson University, Clemson, SC 29634, USA E-mail: larryfking3@gmail.com Natarajan Meghanathan
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationBattery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks
Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Masaru Yoshimachi and Yoshifumi Manabe movement of the devices. Thus the routing protocols for MANET need
More informationAn Implementation of Cross Layer Approach to Improve TCP Performance in MANET
An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2
More informationThe Impact of Clustering on the Average Path Length in Wireless Sensor Networks
The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia
More informationModule 6 NP-Complete Problems and Heuristics
Module 6 NP-Complete Problems and Heuristics Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 97 E-mail: natarajan.meghanathan@jsums.edu Optimization vs. Decision
More informationEnhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks
Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure
More informationA REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS
A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen
More informationEnergy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks
Energy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks Baisakh Department of Computer Science and Engineering, Jaypee University of Engineering and Technology, Guna, Madhya Pradesh, India
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFERENT MOBILITY MODELS
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFERENT MOBILITY MODELS Natarajan Meghanathan 1 and Sireesha Gorla 1, Jackson State University, 1400 Lynch St, Jackson, MS, USA
More informationModule 6 P, NP, NP-Complete Problems and Approximation Algorithms
Module 6 P, NP, NP-Complete Problems and Approximation Algorithms Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu
More information[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor
[Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR
More informationEvaluation of Routing Protocols for Mobile Ad hoc Networks
International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network
More informationDYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET
DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,
More informationMulticast Routing in Wireless Mesh Networks: Minimum Cost Trees or Shortest Path Trees?
Multicast Routing in Wireless Mesh Networks: Minimum Cost Trees or Shortest Path Trees? Uyen Trang Nguyen, Jin Xu Department of Computer Science and Engineering York University, Toronto, Ontario M3J P3,
More informationOn the Design of QoS aware Multicast Algorithms for Wireless Mesh Network. By Liang Zhao Director of Study: Dr. Ahmed Al-Dubai (CDCS)
On the Design of QoS aware Multicast Algorithms for Wireless Mesh Network By Liang Zhao Director of Study: Dr. Ahmed Al-Dubai (CDCS) Outline 1. Introduction to Wireless Mesh Networks 2. Multicast and its
More informationToward the joint design of electronic and optical layer protection
Toward the joint design of electronic and optical layer protection Massachusetts Institute of Technology Slide 1 Slide 2 CHALLENGES: - SEAMLESS CONNECTIVITY - MULTI-MEDIA (FIBER,SATCOM,WIRELESS) - HETEROGENEOUS
More informationAMRIS: A Multicast Protocol for Ad hoc Wireless Networks
of AMRIS: A Multicast Protocol for Ad hoc Wireless Networks C.W. Wu, Y.C. Tay National University of Singapore wuchunwei@alum.comp.nus.edu.sg,tay@acm.org Abstract This paper introduces AMRIS, a new multicast
More informationLink Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.5, May 2017 265 Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method Mohammad Pashaei, Hossein Ghiasy
More informationQUALITY OF SERVICE PROVISIONING IN MANET USING A CROSS-LAYER APPROACH FOR ROUTING
QUALITY OF SERVICE PROVISIONING IN MANET USING A CROSS-LAYER APPROACH FOR ROUTING ABSTRACT Ruchita Goyal, Divyanshu and Manoj Mishra Department of Electronics and Computer Engineering, Indian Institute
More informationEnd-To-End Delay Optimization in Wireless Sensor Network (WSN)
Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,
More informationPOWER AWARE ENERGY EFFICIENT ROUTING PROTOCOL
POWER AWARE ENERGY EFFICIENT ROUTING PROTOCOL NISHA SHARMA 1 AND SHILPA 2 2 M.TECH DCRUST MURTHAL SONEPAT (INDIA), 1 M.TECH YMCAUST FARIDABAD (INDIA) ABSTRACT Ad hoc network are defined as the category
More informationSIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks
SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract
More informationKeywords-MANETs, Multicast mode, Clustering, Inter-domain routing.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey of Multicast
More information