Wireless Networking & Mobile Computing
|
|
- Anis Copeland
- 6 years ago
- Views:
Transcription
1 Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science
2 The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
3 The OSI Communication Model Page 3 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
4 MANET Mobile Ad Hoc Networks Collection of mobile nodes connected by wireless links, forming an autonomous network Nodes run on batteries power consumption is an issue Thus routing is multi-hop each node also acts as a router Scalability is an issue A B H S C I E G F K J D M Page 4 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
5 MANET vs Cellular MANET Cellular Communications No infrastructure, lack of centralized control Fixed, pre-located base stations Frequent topology changes due to node mobility All communications over wireless medium Static backbone network topology Reliable backbone links; only last link is wireless Page 5 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
6 Applications Civilian environments meeting rooms smart homes multimedia classrooms Emergency operations disaster relief search and rescue law enforcement Military applications Page 6 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
7 Challenges Limited wireless transmission range Broadcast nature of the wireless medium Packet losses due to transmission errors Mobility-induced route changes Mobility-induced packet losses Battery constraints Potentially frequent network partitions Ease of snooping on wireless transmissions (security hazard) 7 Page 7 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
8 Topology Challenges Network connectivity defined by node proximity and wireless medium characteristics Due to mobility the network topology undergoes rapid changes Page 8 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
9 MAC Challenges Hidden terminal problem Unreliable physical layer multi-path fading high Bit Error Rate (BER) other impairments Mobility Page 9 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
10 Routing Schemes Broadcast Unicast Geocast Multicast Anycast Page 10 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
11 Unicast Routing in Mobile Ad Hoc Networks Page 11 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
12 Routing in MANET Why is routing in MANET challenging? Without (necessarily) using a pre-existing infrastructure Main culprit: mobility network topology is changing rapidly (link failure/repair) Rate of link failure/repair may be high when nodes move fast Main challenge: maintain and distribute up-to-date routing information without saturating the network Page 12 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
13 Routing in MANET Numerous protocols have been proposed Flavors: adapted from protocols previously proposed for wired networks invented specifically for MANET Major approaches Proactive: routing information is maintained proactively regardless of communication requests e.g. traditional link-state and distance-vector routing protocols are proactive Reactive: a route to a destination is found and maintained only when the route is needed Page 13 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
14 Proactive vs Reactive Latency of route discovery proactive protocols may have lower latency since routes are maintained at all times reactive protocols may have higher latency because a route from X to Y will be found only when X attempts to send to Y Overhead of route discovery/maintenance reactive protocols may have lower overhead since routes are determined only if needed proactive protocols can (but not necessarily) result in higher overhead due to continuous route updating Which approach is better depends on traffic and mobility patterns Page 14 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
15 Sample Routing Protocols Pure flooding DSR AODV LAR Page 15 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
16 Flooding (1/5) Sender S broadcasts data packet P to all its neighbors Each node receiving P forwards P to its neighbors Sequence numbers are used to avoid forwarding the same packet more than once The destination D does not forward the packet Page 16 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
17 Flooding (2/5) Broadcast transmission Y Z A B H S C I E G F K J D M N L Represents a node that receives packet P for the first time Represents transmission of packet P Page 17 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
18 Flooding (3/5) Y Z A B H S C I E G F K J D M N L Node H receives packet P from two neighbors: potential for collision Page 18 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
19 Flooding (4/5) Y Z A B H S C I E G F K J D M N L Node C receives packet P from G and H, but does not forward it again, because node C has already forwarded packet P Page 19 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
20 Flooding (5/5) Y Z A B H S C I E G F K J D M N L Flooding completed Nodes unreachable from S do not receive packet P (e.g., node Z) Nodes for which all paths from S go through the destination D also do not receive packet P (example: node N) Page 20 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
21 Flooding: Summary Advantage: simplicity Potentially, very high overhead data packets may be delivered to too many nodes who do not need to receive them Potentially lower reliability of data delivery flooding uses MAC broadcasting -- hard to implement reliable broadcast delivery without significantly increasing overhead Broadcasting in IEEE MAC is unreliable Need end-to-end reliability Page 21 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
22 Flooding Control Packets Many protocols perform limited flooding of control packets, instead of data packets Control packets are used to discover routes or to send linkstate updates Discovered routes are subsequently used to send data packet(s) Overhead of control packet flooding is amortized over data packets transmitted between consecutive control packet floods Page 22 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
23 Dynamic Source Routing (DSR) [Johnson96] When source S wants to send a packet to node D, but does not know a route to D, it initiates a route discovery Source node S floods a Route Request (RREQ) Each node appends own identifier when forwarding the RREQ Page 23 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
24 DSR: Route Discovery (1/3) Broadcast transmission Y A B H S [S] C I E G F K J D M Z N L Represents transmission of RREQ [X,Y] Represents list of identifiers appended to RREQ Page 24 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
25 DSR: Route Discovery (2/3) Y A B H S E C [S,C] I [S,E] G F K J D M Z N L Page 25 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
26 DSR: Route Discovery (3/3) Y Z A B H S C I E G F [S,E,F,J] M J D K [S,C,G,K] N L Nodes J and K both broadcast RREQ to node D Since nodes J and K are hidden from each other, their transmissions may collide Page 26 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
27 DSR: Route Reply (1/2) Destination D upon receiving the first RREQ, sends back to S a Route Reply (RREP) RREP is sent on the route obtained by reversing the route appended to the received RREQ RREP includes the route from S to D on which RREQ was received by node D Page 27 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
28 DSR: Route Reply (2/2) Y A B H S C I E RREP [S,E,F,J,D] F J G K D M Z N L Represents RREP control message Page 28 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
29 DSR: Data Delivery (1/2) S upon receiving RREP, caches the route included in the RREP When S sends a data packet to D, the entire route is included in the packet header hence the name source routing Intermediate nodes use the source route included in a packet to determine to whom the packet should be forwarded Page 29 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
30 DSR: Data Delivery (2/2) Y A B H S DATA [S,E,F,J,D] E F C G K I J D M Z N L Packet header size grows with route length Page 30 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
31 DSR Optimization: Route Caching Each node caches a new route it learns by some means When S finds route [S,E,F,J,D] to node D, S also learns route [S,E,F] to node F When node K receives the Route Request [S,C,G], K learns route [K,G,C,S] to S When node F forwards Route Reply RREP [S,E,F,J,D], F learns route [F,J,D] to D When node E forwards Data [S,E,F,J,D], it learns route [E,F,J,D] to node D A node may also learn a route when it overhears data packets Page 31 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
32 DSR: Route Caching (1/3) Advantages: can speed up route discovery can reduce propagation of route requests (RREQ) Page 32 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
33 DSR: Route Caching (2/3) [S,E,F,J,D] [E,F,J,D] Y A B H S C [C,S] I E [G,C,S] G F [K,G,C,S] [F,J,D],[F,E,S] RREQ [J,F,E,S] M J D K Z RREP N L Route Reply (RREP) from node K limits flooding of RREQ In general, the reduction may be less dramatic Page 33 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
34 DSR: Route Caching (3/3) Stale caches can adversely affect performance With passage of time and host mobility, cached routes may become invalid In some cases, a sender may try several stale routes (obtained from its local cache, or from cache of some other node), before finding a good route Page 34 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
35 DSR: Route Maintenance - Route Error (RERR) Y A B H S C I E RERR [J-D] F G K J D M Z N L When J s attempt to forward a data packet (with route S-E-F-J-D) on link (J-D) fails, J sends a route error (RERR) to S along route J-F-E-S Nodes hearing RERR update their route cache to remove link (J-D) When node S receives the RERR, it initiates a new RREQ Page 35 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
36 Summary of DSR Routes maintained only between nodes who need to communicate Route caching can further reduce route discovery overhead A single route discovery may yield many routes to the destination, due to intermediate nodes replying from local caches Complicated Cache Management mechanisms Packet header size grows with route length due to source routing Page 36 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
37 Ad-hoc On-Demand Distance Vector Routing (AODV) Route Requests (RREQ) are forwarded in a manner similar to DSR When a node re-broadcasts a Route Request, it sets up a reverse path pointing towards the source When the intended destination receives a Route Request, it replies by sending a Route Reply Route Reply travels along the reverse path set-up when Route Request is forwarded Page 37 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
38 AODV: Route Request (1/5) Broadcast transmission Y Z A B H S C I E G F K J D M N L Represents transmission of RREQ Page 38 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
39 AODV: Route Request (2/5) Y Z A B H S C I E G F K J D M N L Represents links on Reverse Path Page 39 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
40 AODV: Route Request (3/5) Y Z A B H S C I E G F K J D M N L Represents links on Reverse Path F sets up a reverse path entry in its routing table: reverse path entry Destination S Next Hop E Page 40 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
41 AODV: Route Request (4/5) Y Z A B H S C I E G F K J D M N L Page 41 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
42 AODV: Route Request (5/5) Y Z A B H S C I E G F K J D M N L D does not forward RREQ, because it is the intended target of the RREQ Page 42 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
43 AODV: Route Reply (1/2) Y Z A B H S C I E G F K J D M N L Represents links on path taken by RREP Page 43 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
44 AODV: Route Reply (1/2) An intermediate node may also send a Route Reply (RREP) provided that it knows a more recent path than the one previously known to sender S To determine whether the path known to an intermediate node is more recent, destination sequence numbers are used Forward links are set up when RREP travels along the reverse path Page 44 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
45 AODV: Forward Path Setup Y Z A B H S C I E G F K J D M N L F adds a forward path entry in its routing table: forward path entry Destination Next Hop S E Page 45 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing D J
46 AODV: Data Delivery Y A B H S DATA E C I G F K J D M Z N L Represents a link on the forward path Routing table entries used to forward data packet Route is not included in packet header Page 46 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
47 AODV: Route Maintenance - Route Error (RERR) When node X is unable to forward packet P (from node S to node D) on link (X,Y), it generates a RERR message Node X increments the destination sequence number for D cached at node X The incremented sequence number N is included in the RERR When node S receives the RERR, it initiates a new route discovery for D using destination sequence number at least as large as N Page 47 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
48 Information Freshness Assured Each originating node maintains a monotonically increasing sequence number. Used by other nodes to determine the freshness of the information. Every nodes routing table contains the latest information available about the sequence number for the IP address of the destination node for which the routing information is maintained. Updated whenever a node receives new information about the sequence number from RREQ, RREP, or RERR messages received related to that destination. Page 48 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
49 Information Freshness Assured AODV depends on each node in the network to own and maintain its destination sequence number. A destination node increments its own sequence number immediately before it originates a route discovery A destination node increments its own sequence number immediately before it originates a RREP in response to a RREQ The node treats its sequence number as an unsigned number when incrementing accomplishing sequence number rollover. Destination information is assured by comparing the sequence number of the incoming AODV message with its sequence number for that destination. Page 49 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
50 ADOV: Summary Nodes maintain routing tables containing entries only for routes that are in active use Routes are not included in packet headers At most one next-hop per destination is maintained at each node DSR may maintain several routes for a single destination Page 50 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
51 Flooding of Control Packets How to reduce the scope of the route request flood? LAR [Ko98Mobicom] Query localization [Castaneda99Mobicom] How to reduce redundant broadcasts? The Broadcast Storm Problem [Ni99Mobicom] Page 51 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
52 Location-Aided Routing (LAR) [Ko98Mobicom] Exploits location information to limit scope of route request flood Location information may be obtained using GPS Expected Zone is determined as a region that is expected to hold the current location of the destination Expected region determined based on potentially old location information, and knowledge of the destination s speed Route requests limited to a Request Zone that contains the Expected Zone and location of the sender node Page 52 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
53 Expected Zone in LAR X = last known location of node D, at time t0 Y = location of node D at current time t1, unknown to node S r = (t1 - t0) * estimate of D s speed r X Y Expected Zone Page 53 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
54 Request Zone in LAR Network Space Request Zone A B r X Y S Page 54 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
55 LAR Only nodes within the request zone forward route requests Node A does not forward RREQ, but node B does (see previous slide) Request zone explicitly specified in the route request Each node must know its physical location to determine whether it is within the request zone If route discovery using the smaller request zone fails to find a route, the sender initiates another route discovery (after a timeout) using a larger request zone the larger request zone may be the entire network Page 55 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
56 LAR Variations: Adaptive Request Zone Each node may modify the request zone included in the forwarded request Modified request zone may be determined using more recent/accurate information, and may be smaller than the original request zone B S Request zone adapted by B Request zone defined by sender S Page 56 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
57 Location Aided Routing (LAR) Advantages reduces the scope of route request flood reduces overhead of route discovery Disadvantages Nodes need to know their physical locations Does not take into account possible existence of obstructions for radio transmissions 57 Page 57 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
58 Other Routing Protocols Plenty of other routing protocols Geographic Distance Routing (GEDIR) Energy-aware routing QoS routing Routing with Guaranteed Delivery Page 58 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
59 MANET Routing: Issues How to compare these protocols fairly? Message overhead Routing delays Throughput Energy Consumption Comparisons are based mainly on empirical results Lack of analytical results Interaction with MAC protocols Scalability: >200 nodes is already a problem A possible solution for scalability: hierarchical organization of ad hoc networks Page 59 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
60 MANET Routing: Many Variations Fully Symmetric Environment all nodes have identical capabilities and responsibilities Asymmetric Capabilities transmission ranges and radios may differ battery life at different nodes may differ processing capacity may be different at different nodes speed of movement Asymmetric Responsibilities only some nodes may route packets some nodes may act as leaders of nearby nodes (e.g., cluster head) Page 60 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
61 MANET Routing: Many Variations Traffic characteristics may differ in different ad hoc networks bit rate timeliness constraints reliability requirements unicast / multicast / geocast host-based addressing / content-based addressing / capability-based addressing May co-exist (and co-operate) with an infrastructure-based network Page 61 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
62 MANET Routing: Many Variations Mobility patterns may be different people sitting at an airport lounge New York taxi cabs kids playing military movements personal area network Mobility characteristics speed predictability direction of movement pattern of movement uniformity (or lack thereof) of mobility characteristics among different nodes Page 62 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
63 Research on Mobile Ad Hoc Networks Variations in capabilities & responsibilities X Variations in traffic characteristics, mobility models, etc. X Performance criteria (e.g., optimize throughput, reduce energy consumption) = Significant research activity Page 63 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
64 Questions Page 64 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
65 More on IEEE DCF Collision Avoidance Mechanism CSMA + RTS/CTS (physical/virtual carrier sensing) Collision Resolution Mechanism Binary Exponential Backoff (BEB) Does IEEE DCF work well in multi-hop networks? Answer: No! (has known fairness problems) Page 65 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
66 What is Fairness? What does fairness mean in a multi-hop environment? Max-min fairness an allocation is max-min fair if there is no way to give more bandwidth to a flow without decreasing the allocation of a flow of lesser or equal bandwidth Practical approach ensure that each flow gets a minimum share of the bandwidth allow those flows that are not interfering with the current transmitting flows to send simultaneously Page 66 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
67 Unfairness in IEEE DCF f0 f1 f2 f3 f4 A B C D E F Throughput of each flow: f0: 1298 f1: 684 f2: 47 f3: 1173 f4: 1913 Page 67 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
68 The Flow Contention Graph f0 f1 f2 f3 f4 A B C D E F Nodes represent flows Two flows connected by an edge means they conflict with each other f1 f3 f0 f2 f4 Page 68 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
69 An example of scheduling f1 f3 f0 f2 f4 Flow Contention Graph Scheduling: Slot 1: f0 + f3/f4 Slot 2: f1 + f4 Slot 3: f2 Slot 4: f3 + f0 Slot 5: f4 +f0/f1 Slot 6: f0 + f3/f4 Slot 7: f1 + f4 Slot 8: f2 Slot 9: f3 + f0 Slot 10: f4 +f0/f1 Each flow is guaranteed to be scheduled once in every 5 slots! Page 69 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
70 One can do better f1 f3 f0 f2 f4 Flow Contention Graph Improved schedule: Slot 1: f0 + f3 Slot 2: f1 + f4 Slot 3: f2 Slot 4: f0+f3 Slot 5: f1+f4 Slot 6: f2 Each flow is guaranteed to be scheduled once in every 3 slots! Page 70 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
71 Challenges Which scheduling is better? Trade-off between fairness and overall throughput How to implement a fair scheduler in a fully distributed way? Page 71 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing
UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.
Mobile Ad Hoc Networks: Routing TOPIC 8 UCS-805 MOBILE COMPUTING Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Mobile Ad Hoc Networks (MANET) Introduction
More informationMobile Ad Hoc Networks: Routing, MAC and Transport Issues
Mobile Ad Hoc Networks: Routing, MAC and Transport Issues Nitin H. Vaidya University of Illinois at Urbana-Champaign nhv@uiuc.edu http://www.crhc.uiuc.edu/~nhv 2004 Nitin Vaidya 1 Notes Names in brackets,
More informationMobile Ad-Hoc Networks & Routing Algorithms
Mobile Ad-Hoc Networks & Routing Algorithms EMMANOUIL G. SPANAKIS, PhD. spanakis@csd.uoc.gr COLLABORATING RESEARCHER, COMPUTATIONAL BIOMEDICINE LABORATORY, FORTH-ICS VISITING LECTURER, COMPUTER SCIENCE
More informationPolitecnico di Milano Facoltà di Ingegneria dell Informazione. WI-7 Ad hoc networks. Wireless Internet Prof. Antonio Capone
Politecnico di Milano Facoltà di Ingegneria dell Informazione WI-7 Ad hoc networks Wireless Internet Prof. Antonio Capone Acknowlegments o This class notes are mostly based on the teaching material of:
More informationECS-087: Mobile Computing
ECS-087: Mobile Computing Mobile Adhoc Networks and Routing in MANETS (most of the slides borrowed from Prof. Sridhar Iyer) Diwakar Yagyasen 1 Index Mobile Ad Hoc Networks (MANET) MAC in MANET MANET routing
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 6 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 5 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationWireless Mul*hop Ad Hoc Networks
Wireless Mul*hop Guevara Noubir noubir@ccs.neu.edu Some slides are from Nitin Vaidya s tutorial. Infrastructure vs. Ad Hoc Wireless Networks Infrastructure networks: One or several Access- Points (AP)
More informationLecture 4: Mobile Ad Hoc and Sensor Networks (I)
Lecture 4: Mobile Ad Hoc and Sensor Networks (I) Ing-Ray Chen CS 6204 Mobile Computing Virginia Tech Courtesy of G.G. Richard III for providing some of the slides Mobile Ad Hoc Networks May need to traverse
More informationPart I. Wireless Communication
1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable
More informationPage 1. Mobile Ad Hoc Networks. EEC173B/ECS152C, Winter Mobile Ad Hoc Networks (MANET)
173/152, Winter 2006 obile d oc etworks (T) obile d oc etworks (T) ntroduction Unicast Routing Properties ormed by wireless hosts which may be mobile Without (necessarily) using a pre existing infrastructure
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationRouting in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14
Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path
More informationLECTURE 9. Ad hoc Networks and Routing
1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links
More informationMobile Ad Hoc Networks
Mobile Ad Hoc Networks Tutorial at CIT 2000 Bhubaneshwar, Dec 20 23 Sridhar Iyer IIT Bombay http://www.it.iitb.ernet.in.in/~sri sri@it.iitb.ernet.in Acknowledgements Many figures, slides and reference
More informationKapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types
Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.
More informationOutline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part I Outline Routing Protocols for Ad hoc Networks Example of a reactive routing protocol AODV: Ad hoc On-demand
More informationAd Hoc Networks: Issues and Routing
Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationAd Hoc Routing Protocols and Issues
Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed
More informationPerformance Evaluation of MANET through NS2 Simulation
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation
More informationRedes Inalámbricas Tema 4. Mobile Ad Hoc Networks
Redes Inalámbricas Tema 4. Mobile Ad Hoc Networks A. Specific properties B. Flooding as a basic mechanism C. Basic routing protocols DSR AODV y DYMO OLSR y OLSRv2 D. Advanced protocols and techniques Acknowledgments
More informationMobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1
Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,
More informationRouting protocols in Mobile Ad Hoc Network
Routing protocols in Mobile Ad Hoc Network Presented By :- Nitesh Jain Date:-26/10/2005 SCHOOL OF INFORMATION TECHNOLOGY INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR KHARAGPUR Types of Wireless Networks Infrastructure
More informationRouting Protocols in Mobile Ad-Hoc Network
International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana
More informationPerformance Evaluation of AODV and DSR routing protocols in MANET
Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and
More informationPage 1. Mobile Ad Hoc Networks EEC173B/ECS152C. Mobile Ad Hoc Networks (MANET)
173/152 obile d oc etworks (T) obile d oc etworks (T) ntroduction Unicast Routing Reactive Protocols: R, R, OV Proactive Protocols Properties ormed by wireless hosts which may be mobile Without (necessarily)
More informationWireless Mesh Networks
Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate
More informationAd Hoc Networks: Introduction
Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2
More informationAD HOC NETWORKS. RAJINI M 2 ND SEM M.Tech DECS PESIT
AD HOC NETWORKS RAJINI M 2 ND SEM M.Tech DECS PESIT OUTLINE Introduction Features of Ad hoc network Types of ad hoc network MANETs Network architecture MAC protocols Routing protocols Denial of service
More information6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationComputation of Multiple Node Disjoint Paths
Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes
More informationA REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS
A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen
More informationChapter 7. Wireless Ad Hoc Networks. 7: Wireless Ad Hoc Networks 7-1
Chapter 7 Wireless Ad Hoc Networks 7: Wireless Ad Hoc Networks 7-1 What is an Ad Hoc Network? Definitions: An ad-hoc network is one that comes together as needed, not necessarily with any assistance from
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationMobile Ad Hoc Networks: Basic Concepts and Research Issues
Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full
More informationPower aware Multi-path Routing Protocol for MANETS
Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationCS551 Ad-hoc Routing
CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor
More informationLocation Awareness in Ad Hoc Wireless Mobile Neworks
Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,
More informationSimulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol
Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-
More informationA Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network
ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer
More information2013, IJARCSSE All Rights Reserved Page 85
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of
More informationAppointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks
Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University
More informationMobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]
192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer
More informationQuiz 5 Answers. CS 441 Spring 2017
Quiz 5 Answers CS 441 Spring 2017 1. How does Flooding differ from the route discovery phase used in other reactive routing protocols such as DSR and AODV? [2] Flooding involves broadcasting of data packet
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationA Survey - Energy Efficient Routing Protocols in MANET
, pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram
More information2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)
2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing
More informationAd Hoc Networks. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology
Ad Hoc Networks Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Medium Access Control (MAC) in Multi-Channel Scenario
More informationINTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..
INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH An Overview of Mobile Ad-Hoc Networks: Architecture, Routing and Challenges Avadhesh Kumar 1 Sonali Yadav 2 Kamalesh Chandra Maurya 3 1 Assistant Professor, avadhesh@iul.ac.in
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationA Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More information6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)
103 6. Node Disjoint Split Multipath Protocol for Unified Multicasting through Announcements (NDSM-PUMA) 6.1 Introduction It has been demonstrated in chapter 3 that the performance evaluation of the PUMA
More informationA COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE
More informationEvaluation of Routing Protocols for Mobile Ad hoc Networks
International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationMANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.
MANET TECHNOLOGY Dharna 1, Varsha Saroha 2, R. B. Dubey 3 1,2,3 Department of Electronics and Communication Engineering, Hindu College of Engineering, Sonepat, Haryana,(India) ABSTRACT Wireless technology
More informationLecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday
Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN
International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M
More informationUnicast Routing in Mobile Ad Hoc Networks
Unicast Routing in obile d oc etworks Routing problem 1 2 Responsibility of a routing protocol etermining an optimal way to find optimal routes etermining a feasible path to a destination based on a certain
More informationEnergy Efficient EE-DSR Protocol for MANET
Energy Efficient EE- Protocol for MANET 1 Mr. Prakash Patel, 2 Ms. Tarulata Chauhan 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 prakashpmp1990@gmail.com, 2 taruchauhan114@gmail.com
More informationWhite Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0
White Paper Mobile Ad hoc Networking (MANET) with AODV Revision 1.0 This page is intentionally blank, or rather nearly blank. Table of Contents TABLE OF CONTENTS...3 TABLE OF FIGURES...4 WHAT IS MANET?...5
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationExpected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network
Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)
More informationA Literature survey on Improving AODV protocol through cross layer design in MANET
A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,
More informationA Review paper on Routing Protocol Comparison
A Review paper on Routing Protocol Comparison Ms. Aastha kohli 1, Mr. Sukhbir 2 1 M.Tech(CSE) (N.C College of Engineering, Israna Panipat) 2 HOD Computer Science Dept.( N.C College of Engineering, Israna
More informationAnalysis of Routing Protocols in MANETs
Analysis of Routing Protocols in MANETs Musica Supriya, Rashmi, Nishchitha, Ashwini C Shetty, Sharath Kumar Student, Dept. of CSE, SMVITM Bantakal, Karnataka, India Student, Dept. of CSE, SMVITM Bantakal,
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationWireless Internet Routing. Review of Wireless Networking (with Routing in Mind)
Wireless Internet Routing Review of Wireless Networking (with Routing in Mind) 1 Review of Wireless Networking Architecture of wireless networks Wireless PHY Wireless MAC o 802.11 PHY: physical layer /
More informationOptimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol
More informationPerformance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power
, pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria
More informationPerformance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Comparison of DSDV, AODV, DSR, Routing protocols
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationMobile Communications. Ad-hoc and Mesh Networks
Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between
More informationGurinder Pal Singh Chakkal, Sukhdeep Singh Dhillon
A Review on Mobile Ad-Hoc Networks (MANET) Routing Protocols Gurinder Pal Singh Chakkal 1, Sukhdeep Singh Dhillon 2 Computer Science & Engineering 1, 2 Institute of Engineering & Technology Bhaddal, Ropar
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS
ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile
More informationA Survey on Wireless Routing Protocols (AODV, DSR, DSDV)
RESEARCH ARTICLE International Journal of Computer Techniques - Volume 2 Issue 1, 2015 OPEN ACCESS A Survey on Wireless Routing Protocols (AODV, DSR, DSDV) Sejal D Mello 1, Priyanka B. Patil 2, Tarannum
More informationKeywords: AODV, MANET, WRP
Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationWireless and Mobile Communications
Wireless and Mobile Communications Outline Overview MAC Routing Wireless in real world Leverage broadcasting nature Wireless security 2 From Wired to Wireless The Difference: # 1 The Difference #2 Unicast
More informationA Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network
A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk
More informationA Highly Effective and Efficient Route Discovery & Maintenance in DSR
A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan
More informationPerformance analysis of aodv, dsdv and aomdv using wimax in NS-2
Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers
More informationA Survey of Vehicular Ad hoc Networks Routing Protocols
International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 3 No. 3 July 2013, pp. 829-846 2013 Innovative Space of Scientific Research Journals http://www.issr-journals.org/ijias/ A Survey
More informationPerformance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols
Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationEffects of Caching on the Performance of DSR Protocol
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 07-11 Effects of Caching on the Performance of DSR Protocol Narinderjeet Kaur 1, Maninder
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob
More informationBehaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model
Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,
More informationConsiderable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)
Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing
More informationAn Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks
An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract
More informationDYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL P. Kalaivani 1, G. Sathya 2, N.
More information