Bi-Code Channel Access Method for Ad Hoc Networks

Size: px
Start display at page:

Download "Bi-Code Channel Access Method for Ad Hoc Networks"

Transcription

1 Bi-Code Channel Access Method for Ad Hoc Networks Jarmo Prokkola, Timo Bräysy Centre for Wireless Communications (CWC), University of Oulu, Oulu, Finland Abstract Ad hoc networks operate conventionally on a contention based common channel where harmful collisions bring problems with increasing traffic load. The use of code division multiple access (CDMA) increases the capacity by allowing multiple successful transmissions simultaneously within the limits of multiple access interference (MAI). Most of the studies on CDMA ad hoc networking so far, however, concentrate on complex schemes like transmitter based orthogonal coding. In this paper, a cross-layered design approach for ad hoc networking is taken and a CDMA-based bi-code channel access method is proposed. In this method, two channels are tracked at the receiver. One is used as a dedicated receiver based channel for robust data transmission, and the other, as a common access channel. It is shown that this method outperforms traditional methods and still is easy to implement over different platforms, robust for the design parameters and different conditions while maintaining the original idea of ad hoc networking. Index Terms BCCA, MAC, performance, ad hoc, CDMA, spreading code. INTRODUCTION Ad hoc network is a self-organizing mobile network without centralized control where each node acts also as a0 router to attain coverage over multiple hops. In this kind of network configuration, it is obvious that the routing protocol plays very important role. Consequently, the main interest of the research has been focused on routing protocols []. The idea of ad hoc networking differs from the traditional network operation where a centralized control, fixed channel assignment and duplexing usually exist and the quality of service (QoS) can be guaranteed. Therefore, in addition to routing, issues in other OSI-model layers need to be considered. In this paper we focus on L and L2 layer (the physical layer and the MAC layer (Medium Access Control)) issues on terms of ad hoc networking. Typically, ad hoc networks operate on a common channel, which in the case of spread spectrum (SS) communications is equal to the use of common spreading code (C-code) for all the nodes. This introduces the need for contention of the common transmission medium. Lots of different random access methods have been proposed (e.g., a good overview in [2]). The fundamental problem of the use of common channel is that all the nodes in the neighborhood (i.e., within the effective radio range) of the transmitting node are locked on to that transmission (Figure a). This is required, because simultaneous transmissions on the same channel can cause collisions where all the information could be lost. In SS systems, it is possible to increase effective capacity by using different codes. This enables the possibility for multiple successful transmissions at the same time, frequency and space (Figure b) within the limits of MAI caused by non-zero cross-correlations of the spreading codes. (a) (b) Figure. Example: When operating with common codes, all receivers are locked to A s transmission (figure a). Using different codes (e.g., receiver based), simultaneous transmission can occur (figure b) and the capacity is effectively doubled in this special case. In this paper a CDMA approach is taken in order improve ad hoc network performance. CDMA-based MAC protocols and channel access methods have been studied with respect of ad hoc networking before (e.g., [3], [4]). However, in most of the studies, the approach has been based on optimality and throughput maximization. This usually introduces the use of transmitter based spreading codes (T-codes) or pair wise codes [5]. This code assignment makes the receiver architecture very complex, because the receiver must be able to track (receive) multiple spreading codes simultaneously. Also, the goal of optimal performance requires the use of orthogonal spreading codes for all possibly colliding transmissions. But, the orthogonal functionality requires careful synchronization [6], which is contrary to the idea of ad hoc networking where even coarse network synchronization should not be assumed. Because of the limited number of orthogonal codes and limited code tracking capability of feasible receivers, a scheme of recoding has to be applied. Efficient recoding algorithms have been proposed (e.g., [7]), but they all need considerable amount of control traffic. The basic functionality of ad hoc network already uses a great deal of potential data capacity for control traffic, so extra control traffic is not welcome [8], [9]. With increasing mobility, the need for routing control and also for recoding multiplies. This would easily lead to a situation where the amount of total control traffic would be intolerable. In our cross-layered approach, the goal is not to produce an optimal CDMA solution, but one which could be easily implemented, utilized and it still would have high performance over * This work was supported by Finnish Defence Forces

2 conventional ad hoc networks. The goal is also a robust solution, which is not sensitive to optimization parameters, operational environment or non-idealities, while the original idea of ad hoc networking is maintained. THE SYSTEM DESCRIPTION A. The functionality of the receiver From the fundamental idea of ad hoc networking, it is clear that a common channel, which is known to all nodes, should exist. On the other hand, the use of CDMA would increase the performance. Therefore, we propose a method where twochannel receiver capable of tracking and receiving transmissions with two different spreading codes is used. One code is used as a common access channel and the other, as a dedicated receiver code (R-code) channel. Common channel is used for route search, topology and connectivity maintenance, while the R-code channel is used for all directed (data) transmissions. We call this method bi-code channel access (BCCA). Notice that this channel access method differs totally from hybrid spreading code protocols ( [0]) where physical layer packet is split with two different codes. With R-codes, it is possible to enhance the performance by making multiple successful simultaneous transmissions. The advantage over T-code methods is that the receiver does not have to be able to track several spreading codes simultaneously. A disadvantage is that there still exists a slight possibility for collisions. This kind of approach could, in fact, be taken in any domain, say time, frequency or code domain. Nevertheless, in the case of ad hoc networking, the use of code domain is the most straightforward. Figure 2 clarifies the idea of using BCCA. Direct sequence (DS) spreading is preferred in order to avoid modifications to the RF/IF -block of the receiver, which would be necessary for example in the case of frequency hopping (FH). In the transmitter, it is only required that the used spreading code can be changed by message (packet) basis. The idea-level structure of the possible receiver is shown in Figure 3. The implementation of BCCA will only require extra despreading module with matched filter (MF) or correlator, detector and, of course, a code synchronization unit. Received channel samples are buffered in order to separate messages received with different channels (codes), since common and dedicated data can arrive simultaneously. The rest of the receiver is common to both channels and usually includes demodulation, channel decoding, de-interleaving, etc. Buffering could introduce some minor delay, if the traffic to both channels is high, because the arrival of the whole packet has to be waited before releasing the received samples forward. This delay can be avoided if the receiver structure after despreading is also separated through physical layer to MAC. B. On the spreading code usage With BCCA, it is possible to maintain the original idea of ad hoc networking and still get high performance via R-coding compared to pure C-coding. While the performance of R- coding does not achieve the performance of T-coding in ideal case, its implementation is simple and the functionality is robust. Also, the amount of extra control traffic is minimized, because in common case, there is no need for recoding. Aside from orthogonal coding, the use of CDMA always involves MAI i.e., transmissions interfere each other. In our proposal this fact is accepted and no effort is put to optimization of spreading code usage. Recommended properties for the spreading code family are well-controlled cross-correlation properties (e.g., Gold sequences []). In this performance study, we use a simplified assumption that spreading code cross-correlations always have the value of /N c where N c is the length of the spreading code. Receptions with different codes (MAI) are effectively modeled as Gaussian noise. Receiver dedicated code Frequency Code Common code Time Figure 2. A Time-frequency-code-division view of the proposed method. RF/IF -block, ADC Common code MF (+sync) Receiver code MF (+sync) Buffer Rest of PHY Figure 3. An idea-level view of the possible receiver structure of BCCA. THE SIMULATION MODELS The simulation models are built to OPNET 8. network simulator and they are very much the same that were used in our earlier work in the field (e.g., [8], [2]). C. The physical layer and MAC One advantage of BCCA is that it can be easily realized to existing systems. Here, BCCA is realized to well-known IEEE 802. (latter referred as 80.) [3], [4]. It might not be an optimal solution, but it is a good starting point for further development. Also, a lot of performance studies already exist for 802., so the comparison to BCCA can be done easily. The model of 802. used here is originally developed by OPNET Technologies Inc. A modification was needed so that the transmitter spreading code can be changed when instructed to do so (by routing protocol), and of course, an additional receiver channel was needed to physical layer. The RTS/CTShandshaking (Request-to-Send / Clear-to-Send) of 802., does not fit to our idea of BCCA, and is therefore, turned off. Thus, the contention in Distributed Coordination Function (DCF) mode is handled by np-csma (non-persistent Carrier Sense Multiple Access) with exponential back-off algorithm. Carrier sensing is done by power level measurement with a threshold. Sensing may also react to transmissions with unknown codes, because of non-zero cross-correlation of the codes. This certainly reduces MAI, but it might also decrease throughput from

3 the optimum in cases where MAI would not be strong enough to cause packet loss even with multiple simultaneously occurring transmissions. Nevertheless, the optimization of carrier sensing threshold is not considered here. At the physical layer, channel data rate is set to Mbit/s. In 802. DS-mode, N c = chip spreading code is used to spread signal per bit basis. Therefore, the processing gain is directly (0.4 db). D. The Network Layer The networking protocol is minimized in order to keep the model simple enough to emphasize the performance characteristics of the proposed method. The network layer is based on the AODV (Ad hoc On-Demand Distance Vector) routing protocol operation. AODV is reactive, pure on-demand type routing protocol where routes are formed and updated only when needed. A detailed description of AODV can be found e.g., from [6]. The used AODV simulation model for OPNET 8. is based on [5]. Some modifications to this model, which include additional statistic collection capabilities and bug fixings, have been made. The original model had some deficiencies in active route updating and some bugs in route management. AODV hello-messages and passive listening at MAClayer are not used. Network layer data packet header contains 32 bit IP-like (internet protocol) source and destination addresses, Type- (8 bits), Hop count- (8 bits) and Datagram length (6 bits) -fields. These fields are needed for the operation of AODV, and can be therefore calculated as routing overhead. E. The functionality of BCCA with AODV To enable R-type communications, information from neighboring node spreading codes are needed. Figure 4 presents an example of BCCA usage with AODV. In the initial state, the network topology is completely unknown. When node A wants to communicate with node F, it starts route discovery by broadcasting a route request (RREQ) packet with C- code like it is done normally in AODV. When the desired destination node F gets RREQ, it replies with a route reply packet (RREP). Now, the RREP is unicasted upstream along the reverse route which was created by the propagation of RREQ. The next hop nodes are now known for the intermediate nodes in the reverse route and therefore R-codes can be used for RREP transmission as well as for subsequent data communications along the active forward route. Always, when the next hop node is dedicated and known, receiving node s R-code is used for transmission. C-code is used for broadcasting and also, if the next hop node is not known. The scenarios of this study are quite simple and therefore it is assumed that the R-type spreading codes are fixed to nodes and known a priori. Although this kind of assumption is not always realistic, it can be reasonable for example in military environment and we do not lose the generality of the results. Moreover, the algorithm for distributing the spreading codes can be quite easily implemented to AODV and no extra control packets are needed. The spreading code distribution can be handled in route discovery state, since in BCCA, the nodes only need to know the codes of the neighboring nodes, which belong to an active route. The method for spreading code distribution is already under development. (a) (b) Figure 4. An example of node A searching a route to node F. RREQ is broadcast through the network with C-code (3.a) and RREP is unicast along found reverse route upstream to source A with R-codes used between hops (3.b). SIMULATIONS F. Simulation scenario Simulations are carried out in order to explore the performance of the proposed BCCA method. The performance is studied as a function of offered data traffic, which is normalized to the physical layer data rate. Several performance metrics are used (see more details from [8] and [9]). We have selected a small network of 0 active nodes in order to focus the attention to lower layers. Of course, the whole network performance is in the main interest, but to reveal the performance of BCCA, a scenario where the performance is not limited by other issues (routing protocol) is preferred. A simplified radio interface, with nominal radio range of 250 m is used and the antennas are assumed to be omni-directional ( bidirectional links). To guarantee satisfactory connectivity, the area is chosen to be 400 m 400 m. From to 3 hops occur in this kind of scenario with an average path length of about.4 hops. At the application layer, we use variable bit rate traffic source with Poisson arrivals (VBR-M), in which packet interarrival times are exponentially distributed. Packet length is set to a constant value of 52 bits. Exponential distribution is of form x f ( x) = λe λ, () where /λ is the expectation value of the distribution. Modern data traffic is found to be highly variable and therefore heavytailed distributions (e.g., Pareto distribution) are used in modeling [8]. Heavy tailed distributions are not used here, because they also introduce their own effects to the performance, which is not in the focus of this paper. Poisson-process still is a good reference point and it models for example voice traffic accurately and it also fits quite well to some data application modeling [7]. In simulations, each offered traffic value point is averaged over 90 iterations with on the average of packets per iteration. A session model of dynamic connections is used here. In this model, source node chooses randomly the destination node to communicate with, and the connections are changed during iteration. Session duration is exponentially distributed with

4 expectation value of 00 packets. Ad hoc network must also support mobility, so mobile scenarios are also included to the study. The mobility is based on the random waypoint model used in several other studies [9], [20]. The speed of the network nodes is set randomly from 0.2 to.5 m/s in order to model pedestrian movement. When mobility is enabled, it is continuous with no pause time. G. Simulation results In all figures, cases with pure 802. and 802. with BCCA enhancement, both with, no mobility and continuous mobility, are presented. Figure 5 depicts the average data packet delay as a function of offered data traffic. Typical network behavior can be clearly seen, i.e., with increasing traffic, the delay remains low from low to moderate traffic load, but after a certain point the delay starts to significantly increase. At this point the network starts to collapse due to congestion. Extra delay is caused by numerous retransmissions, buffer fulfillments, route maintenance and route re-discoveries. As it is seen from the figure, the performance enhancement of BCCA is obvious. For example, at data traffic load of 0., the delay of BCCA in no mobility case is only about 5 ms, while in the case of pure 802. it is over twofold (about 2 ms). Avg. data packet delay [s] 0, 0,0 0 node placement in used scenario is about 97.7 %. Due to slow speed of the nodes, the mobility only reduces the connectivity problems, for the possible bad connections are not permanent. Also, the path lengths are reduced, because the random waypoint mobility model is known to exhibit properties where the node density is larger at the center of the operational area than at the boundary areas [2]. Of course, if the speed of the nodes would be much higher, the routing protocol would not be able to adapt to rapid topological changes and the performance would be worse (see e.g., [8]). Data throughput S 0,4 0,35 0,3 0,25 0,2 0,5 0, 0,05 0 Figure 6. Data throughput. Packet loss ratio Ideal random channel access,0e+00 0,0 0,,0E-0,0E-02 0,00 Figure 5. Average data packet delay. From the delay figure, the effect of the routing protocol can be also seen. The performance deteriorates (delay increases) at very low traffic load. The main reason for this are route breakages due to too small route timeout parameter of AODV. We have already increased it up to the value of 20 s, but it is still insufficient for such a small traffic loads of < Further increment of the timeout parameter is not desirable, because it would cause problems in heavy traffic and high mobility situations. The optimal performance is got with moderate traffic load, because the used, mainly default, AODV parameters are optimized to traffic loads of about 0.0 to 0.. In Figure 6, normalized network throughput is presented. Pure 802. gets a maximum normalized throughput of about 0.26, while BCCA achieves about 5 % better (0.30) performance in the case of no mobility. With continuous mobility, the ratio of the performance difference is about the same. It is interesting to note that the performance is better, when the network scenario mobile rather than static. This can be explained by the problem of connectivity, which still exists even though the network is quite small. With external simulator, we discovered that the probability for full connectivity with random,0e-03,0e-04 Figure 7. Packet loss ratio. The packet loss ratio is shown in Figure 7. The performance differences are clearly seen with increasing traffic. For example, if % packet loss is assumed to be tolerable for some application, pure 802. can handle traffic loads of about 0.06, while BCCA can handle over 50 % more in no mobility case. With low traffic loads, the benefit of BCCA is negligible, because the packet loss is caused by connectivity problems rather than the used channel access method. Note that in the case of no mobility, packet loss ratio is saturated to %, while with continuous mobility, low packet loss ratios of order of 0.05 % are reached. In Figure 8, normalized total network control load is presented. We point out that the use of BCCA does not increase the need for control traffic. In fact, at high traffic load, the need for control traffic is higher in pure 802., because it starts to collapse earlier. Naturally, if the spreading codes would be unknown in the initial state, the spreading code distribution algorithm would increase the needed control traffic modestly in the beginning of the simulation iteration. With static nodes, the need for control traffic is slightly higher with all traffic loads

5 than with continuous mobility. This is due to performance enhancing feature of decent mobility. The increased control overhead at low traffic load, caused by AODV route timeout, can be also seen. The relative amount of control information is high because of the used small data packet. Normalized total network control load [bit/bit] 2,2 2,8,6,4,2 0,8 Figure 8. Norm. total network control load calc. in bits. In Figure 9, average number of collisions in correctly received packets is illustrated. It is noticed that BCCA is highly tolerant against collisions as compared to pure This highlights the potential benefits of using CDMA, since multiple simultaneous successful transmissions can occur. Average num of collisions in packet. 0, 0,0 0,00 Figure 9. Average number of collisions in packet (MAC layer). SUMMARY A new method for channel access in ad hoc networks was presented. Proposed BCCA uses two-channel approach to enable simple and robust receiver based CDMA networking capability without forgetting the need for a common access channel in ad hoc environment. A simulation test environment was set with AODV routing protocol and IEEE BCCA was realized with simple modifications to IEEE It was shown that BCCA outperformed pure 802. especially in heavy traffic situation where the problems are the greatest and still the use of BCCA does not increase the need for control traffic. It has to be noticed that no optimization what so ever was made to BCCAenabled 802., which, as a platform designed for the operation on a common contention channel, is definitely not the best for the purpose of BCCA. With optimization, the performance difference is likely to be much greater. As a by-product, the study also suggested that there still exists optimization work to do also in AODV parameters with variable traffic load. This was noticed especially at low traffic load where proactive routing protocols would probably have worked better. Also, the connectivity problems of ad hoc networking were observed. The idea of BCCA can basically be used in many kinds of networks, but it is designed especially for the needs of ad hoc networks. BCCA functionality in ad hoc networking is an example of the benefits of cross-layer design in enhancing the performance of wireless systems. REFERENCES [] E.M. Royer and C.-K. Toh, A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks, IEEE Personal Communications, vol. 6, no. 2, Apr.999. [2] R. Rom and M. Sidi, Multiple Access Protocols, Performance and Analysis, Springer-Verlag, New York, 990, pp [3] A. Muqattah and M. Krunz, CDMA-Based MAC Protocol for Wireless Ad Hoc Networks, MobiHoc 03, June [4] S. Lal, E. S. Sousa, Distributed Resource Allocation for DS-CDMA - Based Multimedia ad hoc Wireless LAN s, IEEE J-SAC, Vol. 7, No. 5, May, 999, pp [5] L. Hu, Distributed Code Assignments for CDMA Packet Radio Networks, IEEE/ACM Transactions on Networking, vol., no. 6, December 993, pp [6] J. Proakis, Digital Communications, McGraw-Hill Inc., 200. [7] I. Gupta, Minimal CDMA Recoding Strategies in Power Controlled Ad-Hoc Wireless Networks, Technical Report, Dept. of Computer Science, Cornell University, 200. [8] J. Prokkola, L. Leppänen, and T. Bräysy, On the Effect of Traffic Models to the Performance of Ad Hoc Network, IEEE Military Communication Conference (MILCOM 2003), Oct [9] J. Prokkola, et al., Ad Hoc Networking under Variable Traffic Scenarios in Military Environment, in Technical Aspects of Network Centric Warfare, J. Jormakka, C. Candolin eds., National Defence College, Dept. of Technology, Helsinki. Series, No. 7, pp [0] E. S. Sousa and J. A. Silvester, Spreading Code Protocols for Distributed Spread-Spectrum Packet Radio Networks, IEEE Transactions on Communications, Vol 36, March 988, pp [] D. Sarwate and M. Pursley, Cross-correlation Properties of Pseudorandom and Related Sequences, Proc. IEEE, Vol. 68, 980. [2] L. Leppänen, J. Prokkola and T. Bräysy, Performance of Ad Hoc Network Under Pareto Distributed Traffic Model, Finnish Wireless Communications Workshop, Oct [3] A. Santamaría and F.J. López-Hernández (eds.), Wireless LAN: Standards and Applications, Artech House 200. [4] K. Pahlavan and P. Krishnamurthy, Principles of Wireless Networks, Prentice Hall [5] L. Guamari, An OPNET Model Implementation for Ad Hoc On- Demand Distance Vector Routing Protocol, Master s Thesis, NIST, Aug [6] C. Perkins, E. Belding-Royer, and S. Das, Ad Hoc On-Demand Distance Vector (AODV) Routing, RFC 356. Url: [7] J. Hui, Switching and Traffic Theory for Integrated Broadband Networks, Kluwer Academic Publications 990. [8] W. Willinger et al., Self-Similarity Through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level, IEEE Transaction on Networking, vol. 5, 997, pp [9] S.R. Das et al., Comparative Performance Evaluation of Routing Protocols for Mobile Ad hoc Networks, Proc. of Computer Communications and Networks, Oct 998. [20] J. Broch et al., A Performance Comparison of Multihop Wireless Ad Hoc Network Routing Protocols, Proc. of IEEE/ACM MOBICOM 98, Oct [2] T. Chu, I. Nikolaidis, Node Density and Connectivity Properties of the Random Waypoint Model, Elsevier Journal on Computer Communications No. 27, pp

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

Power aware Multi-path Routing Protocol for MANETS

Power aware Multi-path Routing Protocol for MANETS Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent W. S. Wong and Victor C. M. Leung Department of Electrical and Computer Engineering The University of British

More information

Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks

Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks Michelle X. Gong Scott F. Midkiff Shiwen Mao The Bradley Department of Electrical and Computer Engineering Virginia Polytechnic

More information

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

Control Traffic Analysis of On-Demand Routing Protocol. in Mobile Ad-hoc Networks

Control Traffic Analysis of On-Demand Routing Protocol. in Mobile Ad-hoc Networks Second International Conference on Networking and Distributed Computing Control Traffic Analysis of On-Demand Routing Protocol in Mobile Ad-hoc Networks Zhilin Zhang School of Computer Science & Technology

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

Performance Analysis of Three Routing Protocols for Varying MANET Size

Performance Analysis of Three Routing Protocols for Varying MANET Size Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Performance Analysis of Three Routing Protocols for Varying MANET Size N Vetrivelan,

More information

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen

More information

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network Global Journal of Computer Science and Technology Volume 11 Issue 1 Version 1.0 February 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

Effect of 3 Key Factors on Average End to End Delay in MANET

Effect of 3 Key Factors on Average End to End Delay in MANET Effect of 3 Key Factors on Average End to End Delay in MANET Suhaimi. Abd. Latif, Saqib Hakak Department of Electrical and Computer Engineering International Islamic University Malaysia, Kuala Lumpur,

More information

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Multi-Linked AODV Routing Protocol for Wireless Mesh Networks

Multi-Linked AODV Routing Protocol for Wireless Mesh Networks Multi-Linked AODV Routing Protocol for Wireless Mesh Networks Asad Amir Pirzada and Ryan Wishart Queensland Research Laboratory, National ICT Australia Limited, Brisbane, QLD 4, Australia. {Asad.Pirzada,

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

Performance Comparison of Two On-demand Routing Protocols for Ad-hoc Networks based on Random Way Point Mobility Model

Performance Comparison of Two On-demand Routing Protocols for Ad-hoc Networks based on Random Way Point Mobility Model American Journal of Applied Sciences 5 (6): 659-664, 2008 ISSN 1546-9239 2008 Science Publications Performance Comparison of Two On-demand Routing Protocols for Ad-hoc Networks based on Random Way Point

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS E. Gnanamanoharan and R. Bensraj Department of Electrical Engineering, Annamalai University, Tamil Nadu, India

More information

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) WADHAH AL-MANDHARI, KOICHI GYODA 2, NOBUO NAKAJIMA Department of Human Communications The University

More information

Keywords: AODV, MANET, WRP

Keywords: AODV, MANET, WRP Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India

More information

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless

More information

Queue Management for Network Coding in Ad Hoc Networks

Queue Management for Network Coding in Ad Hoc Networks 2012 Third International Conference on Intelligent Systems Modelling and Simulation Queue Management for Network Coding in Ad Hoc Networks S.E. Tan H.T. Yew M.S. Arifianto I. Saad K.T.K. Teo Modelling,

More information

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at Charlotte,

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Akshay Shankar, Lavanya Chelle Information Science Engineering RNS Institute of Technology Bangalore, India Abstract- A Mobile

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department

More information

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Enhanced AODV for Providing QoS of Multimedia Application in MANET

Enhanced AODV for Providing QoS of Multimedia Application in MANET Enhanced AODV for Providing QoS of Multimedia Application in MANET Wintwar Oo, and Eiei Khin Abstract MANET is a kind of wireless network which has dynamic topology and no fixed organization. As more and

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Performance Analysis of Aodv Protocol under Black Hole Attack

Performance Analysis of Aodv Protocol under Black Hole Attack International Journal of Scientific & Engineering Research Volume 2, Issue 8,August-2011 1 Performance Analysis of Aodv Protocol under Black Hole Attack Monika Roopak, Dr. Bvr Reddy ABSTRACT- Mobile Ad-hoc

More information

Performance of Routing Protocols in Very Large-Scale Mobile Wireless Ad Hoc Networks

Performance of Routing Protocols in Very Large-Scale Mobile Wireless Ad Hoc Networks Performance of Routing Protocols in Very Large-Scale Mobile Wireless Ad Hoc Networks Xin Zhang, George F. Riley Department of ECE Georgia Institute of Technology Atlanta, GA 3332-25 xinzhang, riley@ece.gatech.edu

More information

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET An Extensive Simulation Analysis of AODV Protocol with IEEE 802.11 MAC for Chain Topology in MANET V.K.Taksande 1, Dr.K.D.Kulat 2 1 Department of Electronics & Communication, Nagpur University Priyadarshini

More information

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK Nalin Gahlaut 1, Jaya sharma 2, Pankaj Kumar 3, Kaushal Kumar 4 1 Doctoral Candidate, Uttarakhand Technical University,

More information

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks Won-Ik Kim Radio Performance Analysis Section Electronics & Telecommunications Research Institute 161 Kajong-dong,

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

Dynamic bandwidth management for multihop wireless ad hoc networks

Dynamic bandwidth management for multihop wireless ad hoc networks Dynamic bandwidth management for multihop wireless ad hoc networks Sofiane Khalfallah Email: sofiane.khalfallah@insa-lyon.fr Cheikh Sarr Email: Cheikh.Sarr@insa-lyon.fr Isabelle Guerin Lassous Email: Isabelle.Guerin-Lassous@inrialpes.fr

More information

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

A Modified Medium Access Control Algorithm for Systems with Iterative Decoding

A Modified Medium Access Control Algorithm for Systems with Iterative Decoding A Modified Medium Access Control Algorithm for Systems with Iterative Decoding Inkyu Lee Carl-Erik W. Sundberg Sunghyun Choi Dept. of Communications Eng. Korea University Seoul, Korea inkyu@korea.ac.kr

More information

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks 1 Ravindra.E, 2 Pooja Agraharkar Asst Prof, Dept. of Electronics & Communication Engg, Mtech Student, Dept. of Electronics & Communication

More information

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 6 (Jul. - Aug. 2013), PP 01-09 A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

The Basics of Wireless Communication Octav Chipara

The Basics of Wireless Communication Octav Chipara The asics of Wireless ommunication Octav hipara genda hannel model: the protocol model High-level media access TM, SM hidden/exposed terminal problems WLN Fundamentals of routing proactive on-demand 2

More information

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer

More information

Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range

Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range Asha Ambhaikar and Lokesh Kumar Sharma Abstract a mobile ad hoc network is a collection of autonomous

More information

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)

More information

Efficient On-Demand Routing Protocols to Optimize Network Coverage in Wireless Sensor Networks

Efficient On-Demand Routing Protocols to Optimize Network Coverage in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.7, July 2008 277 Efficient On-Demand Routing Protocols to Optimize Network Coverage in Wireless Sensor Networks * Mohammed

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

A Performance Comparison of Routing Protocols for Ad Hoc Networks

A Performance Comparison of Routing Protocols for Ad Hoc Networks RESEARCH ARTICLE OPEN ACCESS A Performance Comparison of Routing Protocols for Ad Hoc Networks Hicham Zougagh *, Ahmed Toumanari *, Rachid Latif *, Noureddine. Idboufker **, Youssef. Elmourabit * Laboratory

More information

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network Author manuscript, published in "ITCom 6 - next generation and sensor networks, Boston : United States (26)" DOI :.7/2.68625 Performance evaluation of reactive and proactive routing protocol in IEEE 82.

More information

A STUDY & ANALYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK ON DIFFERENT APPLICATION

A STUDY & ANALYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK ON DIFFERENT APPLICATION International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 www.ijcea.com ISSN 2321-3469 A STUDY & ANALYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK

More information

PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS

PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS Natarajan Meghanathan Jackson State University, 1400

More information

Network Connectivity Analysis of VANET using Fuzzy Logic Controller

Network Connectivity Analysis of VANET using Fuzzy Logic Controller Network Connectivity Analysis of VANET using Fuzzy Logic Controller Poonam Rathore 1 and Laxmi Shrivastava 2 1,2 Department of Electronics and Communication, Madhav Institute of Technology and Science,

More information

Performance Evaluation of Routing Protocols for MAC Layer Models

Performance Evaluation of Routing Protocols for MAC Layer Models IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 4 (Mar. - Apr. 2013), PP 71-77 Performance Evaluation of Routing Protocols for MAC Layer Models Somya

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob

More information

Routing in ad-hoc networks Marina Dupcinov, Srdjan Krco Applied Research Lab, EEI, Ericsson Ireland

Routing in ad-hoc networks Marina Dupcinov, Srdjan Krco Applied Research Lab, EEI, Ericsson Ireland Routing in ad-hoc networks Marina Dupcinov, Srdjan Krco Applied Research Lab, EEI, Ericsson Ireland I Introduction Ad-hoc networks are formed by users or devices wishing to communicate, without the necessity

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information

COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK

COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK 1 Ranjana Kukkar, 2 Kulbhushan Rassewatt, 3 Rahul Malhotra GTB KHALSA INSTITUTE OF ENGINEERING AND TECHNOLOGY,

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size Lovekesh Kumar / International Journal of Engineering Research and Applications (IJERA) ISSN: Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size Lovekesh Kumar* *(Department

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks

Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks 2009 International Conference on Intelligent Networking and Collaborative Systems Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks Saud Al otaibi Software Technology Research Laboratory

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information