Bi-Code Channel Access Method for Ad Hoc Networks
|
|
- Brendan Tyler
- 6 years ago
- Views:
Transcription
1 Bi-Code Channel Access Method for Ad Hoc Networks Jarmo Prokkola, Timo Bräysy Centre for Wireless Communications (CWC), University of Oulu, Oulu, Finland Abstract Ad hoc networks operate conventionally on a contention based common channel where harmful collisions bring problems with increasing traffic load. The use of code division multiple access (CDMA) increases the capacity by allowing multiple successful transmissions simultaneously within the limits of multiple access interference (MAI). Most of the studies on CDMA ad hoc networking so far, however, concentrate on complex schemes like transmitter based orthogonal coding. In this paper, a cross-layered design approach for ad hoc networking is taken and a CDMA-based bi-code channel access method is proposed. In this method, two channels are tracked at the receiver. One is used as a dedicated receiver based channel for robust data transmission, and the other, as a common access channel. It is shown that this method outperforms traditional methods and still is easy to implement over different platforms, robust for the design parameters and different conditions while maintaining the original idea of ad hoc networking. Index Terms BCCA, MAC, performance, ad hoc, CDMA, spreading code. INTRODUCTION Ad hoc network is a self-organizing mobile network without centralized control where each node acts also as a0 router to attain coverage over multiple hops. In this kind of network configuration, it is obvious that the routing protocol plays very important role. Consequently, the main interest of the research has been focused on routing protocols []. The idea of ad hoc networking differs from the traditional network operation where a centralized control, fixed channel assignment and duplexing usually exist and the quality of service (QoS) can be guaranteed. Therefore, in addition to routing, issues in other OSI-model layers need to be considered. In this paper we focus on L and L2 layer (the physical layer and the MAC layer (Medium Access Control)) issues on terms of ad hoc networking. Typically, ad hoc networks operate on a common channel, which in the case of spread spectrum (SS) communications is equal to the use of common spreading code (C-code) for all the nodes. This introduces the need for contention of the common transmission medium. Lots of different random access methods have been proposed (e.g., a good overview in [2]). The fundamental problem of the use of common channel is that all the nodes in the neighborhood (i.e., within the effective radio range) of the transmitting node are locked on to that transmission (Figure a). This is required, because simultaneous transmissions on the same channel can cause collisions where all the information could be lost. In SS systems, it is possible to increase effective capacity by using different codes. This enables the possibility for multiple successful transmissions at the same time, frequency and space (Figure b) within the limits of MAI caused by non-zero cross-correlations of the spreading codes. (a) (b) Figure. Example: When operating with common codes, all receivers are locked to A s transmission (figure a). Using different codes (e.g., receiver based), simultaneous transmission can occur (figure b) and the capacity is effectively doubled in this special case. In this paper a CDMA approach is taken in order improve ad hoc network performance. CDMA-based MAC protocols and channel access methods have been studied with respect of ad hoc networking before (e.g., [3], [4]). However, in most of the studies, the approach has been based on optimality and throughput maximization. This usually introduces the use of transmitter based spreading codes (T-codes) or pair wise codes [5]. This code assignment makes the receiver architecture very complex, because the receiver must be able to track (receive) multiple spreading codes simultaneously. Also, the goal of optimal performance requires the use of orthogonal spreading codes for all possibly colliding transmissions. But, the orthogonal functionality requires careful synchronization [6], which is contrary to the idea of ad hoc networking where even coarse network synchronization should not be assumed. Because of the limited number of orthogonal codes and limited code tracking capability of feasible receivers, a scheme of recoding has to be applied. Efficient recoding algorithms have been proposed (e.g., [7]), but they all need considerable amount of control traffic. The basic functionality of ad hoc network already uses a great deal of potential data capacity for control traffic, so extra control traffic is not welcome [8], [9]. With increasing mobility, the need for routing control and also for recoding multiplies. This would easily lead to a situation where the amount of total control traffic would be intolerable. In our cross-layered approach, the goal is not to produce an optimal CDMA solution, but one which could be easily implemented, utilized and it still would have high performance over * This work was supported by Finnish Defence Forces
2 conventional ad hoc networks. The goal is also a robust solution, which is not sensitive to optimization parameters, operational environment or non-idealities, while the original idea of ad hoc networking is maintained. THE SYSTEM DESCRIPTION A. The functionality of the receiver From the fundamental idea of ad hoc networking, it is clear that a common channel, which is known to all nodes, should exist. On the other hand, the use of CDMA would increase the performance. Therefore, we propose a method where twochannel receiver capable of tracking and receiving transmissions with two different spreading codes is used. One code is used as a common access channel and the other, as a dedicated receiver code (R-code) channel. Common channel is used for route search, topology and connectivity maintenance, while the R-code channel is used for all directed (data) transmissions. We call this method bi-code channel access (BCCA). Notice that this channel access method differs totally from hybrid spreading code protocols ( [0]) where physical layer packet is split with two different codes. With R-codes, it is possible to enhance the performance by making multiple successful simultaneous transmissions. The advantage over T-code methods is that the receiver does not have to be able to track several spreading codes simultaneously. A disadvantage is that there still exists a slight possibility for collisions. This kind of approach could, in fact, be taken in any domain, say time, frequency or code domain. Nevertheless, in the case of ad hoc networking, the use of code domain is the most straightforward. Figure 2 clarifies the idea of using BCCA. Direct sequence (DS) spreading is preferred in order to avoid modifications to the RF/IF -block of the receiver, which would be necessary for example in the case of frequency hopping (FH). In the transmitter, it is only required that the used spreading code can be changed by message (packet) basis. The idea-level structure of the possible receiver is shown in Figure 3. The implementation of BCCA will only require extra despreading module with matched filter (MF) or correlator, detector and, of course, a code synchronization unit. Received channel samples are buffered in order to separate messages received with different channels (codes), since common and dedicated data can arrive simultaneously. The rest of the receiver is common to both channels and usually includes demodulation, channel decoding, de-interleaving, etc. Buffering could introduce some minor delay, if the traffic to both channels is high, because the arrival of the whole packet has to be waited before releasing the received samples forward. This delay can be avoided if the receiver structure after despreading is also separated through physical layer to MAC. B. On the spreading code usage With BCCA, it is possible to maintain the original idea of ad hoc networking and still get high performance via R-coding compared to pure C-coding. While the performance of R- coding does not achieve the performance of T-coding in ideal case, its implementation is simple and the functionality is robust. Also, the amount of extra control traffic is minimized, because in common case, there is no need for recoding. Aside from orthogonal coding, the use of CDMA always involves MAI i.e., transmissions interfere each other. In our proposal this fact is accepted and no effort is put to optimization of spreading code usage. Recommended properties for the spreading code family are well-controlled cross-correlation properties (e.g., Gold sequences []). In this performance study, we use a simplified assumption that spreading code cross-correlations always have the value of /N c where N c is the length of the spreading code. Receptions with different codes (MAI) are effectively modeled as Gaussian noise. Receiver dedicated code Frequency Code Common code Time Figure 2. A Time-frequency-code-division view of the proposed method. RF/IF -block, ADC Common code MF (+sync) Receiver code MF (+sync) Buffer Rest of PHY Figure 3. An idea-level view of the possible receiver structure of BCCA. THE SIMULATION MODELS The simulation models are built to OPNET 8. network simulator and they are very much the same that were used in our earlier work in the field (e.g., [8], [2]). C. The physical layer and MAC One advantage of BCCA is that it can be easily realized to existing systems. Here, BCCA is realized to well-known IEEE 802. (latter referred as 80.) [3], [4]. It might not be an optimal solution, but it is a good starting point for further development. Also, a lot of performance studies already exist for 802., so the comparison to BCCA can be done easily. The model of 802. used here is originally developed by OPNET Technologies Inc. A modification was needed so that the transmitter spreading code can be changed when instructed to do so (by routing protocol), and of course, an additional receiver channel was needed to physical layer. The RTS/CTShandshaking (Request-to-Send / Clear-to-Send) of 802., does not fit to our idea of BCCA, and is therefore, turned off. Thus, the contention in Distributed Coordination Function (DCF) mode is handled by np-csma (non-persistent Carrier Sense Multiple Access) with exponential back-off algorithm. Carrier sensing is done by power level measurement with a threshold. Sensing may also react to transmissions with unknown codes, because of non-zero cross-correlation of the codes. This certainly reduces MAI, but it might also decrease throughput from
3 the optimum in cases where MAI would not be strong enough to cause packet loss even with multiple simultaneously occurring transmissions. Nevertheless, the optimization of carrier sensing threshold is not considered here. At the physical layer, channel data rate is set to Mbit/s. In 802. DS-mode, N c = chip spreading code is used to spread signal per bit basis. Therefore, the processing gain is directly (0.4 db). D. The Network Layer The networking protocol is minimized in order to keep the model simple enough to emphasize the performance characteristics of the proposed method. The network layer is based on the AODV (Ad hoc On-Demand Distance Vector) routing protocol operation. AODV is reactive, pure on-demand type routing protocol where routes are formed and updated only when needed. A detailed description of AODV can be found e.g., from [6]. The used AODV simulation model for OPNET 8. is based on [5]. Some modifications to this model, which include additional statistic collection capabilities and bug fixings, have been made. The original model had some deficiencies in active route updating and some bugs in route management. AODV hello-messages and passive listening at MAClayer are not used. Network layer data packet header contains 32 bit IP-like (internet protocol) source and destination addresses, Type- (8 bits), Hop count- (8 bits) and Datagram length (6 bits) -fields. These fields are needed for the operation of AODV, and can be therefore calculated as routing overhead. E. The functionality of BCCA with AODV To enable R-type communications, information from neighboring node spreading codes are needed. Figure 4 presents an example of BCCA usage with AODV. In the initial state, the network topology is completely unknown. When node A wants to communicate with node F, it starts route discovery by broadcasting a route request (RREQ) packet with C- code like it is done normally in AODV. When the desired destination node F gets RREQ, it replies with a route reply packet (RREP). Now, the RREP is unicasted upstream along the reverse route which was created by the propagation of RREQ. The next hop nodes are now known for the intermediate nodes in the reverse route and therefore R-codes can be used for RREP transmission as well as for subsequent data communications along the active forward route. Always, when the next hop node is dedicated and known, receiving node s R-code is used for transmission. C-code is used for broadcasting and also, if the next hop node is not known. The scenarios of this study are quite simple and therefore it is assumed that the R-type spreading codes are fixed to nodes and known a priori. Although this kind of assumption is not always realistic, it can be reasonable for example in military environment and we do not lose the generality of the results. Moreover, the algorithm for distributing the spreading codes can be quite easily implemented to AODV and no extra control packets are needed. The spreading code distribution can be handled in route discovery state, since in BCCA, the nodes only need to know the codes of the neighboring nodes, which belong to an active route. The method for spreading code distribution is already under development. (a) (b) Figure 4. An example of node A searching a route to node F. RREQ is broadcast through the network with C-code (3.a) and RREP is unicast along found reverse route upstream to source A with R-codes used between hops (3.b). SIMULATIONS F. Simulation scenario Simulations are carried out in order to explore the performance of the proposed BCCA method. The performance is studied as a function of offered data traffic, which is normalized to the physical layer data rate. Several performance metrics are used (see more details from [8] and [9]). We have selected a small network of 0 active nodes in order to focus the attention to lower layers. Of course, the whole network performance is in the main interest, but to reveal the performance of BCCA, a scenario where the performance is not limited by other issues (routing protocol) is preferred. A simplified radio interface, with nominal radio range of 250 m is used and the antennas are assumed to be omni-directional ( bidirectional links). To guarantee satisfactory connectivity, the area is chosen to be 400 m 400 m. From to 3 hops occur in this kind of scenario with an average path length of about.4 hops. At the application layer, we use variable bit rate traffic source with Poisson arrivals (VBR-M), in which packet interarrival times are exponentially distributed. Packet length is set to a constant value of 52 bits. Exponential distribution is of form x f ( x) = λe λ, () where /λ is the expectation value of the distribution. Modern data traffic is found to be highly variable and therefore heavytailed distributions (e.g., Pareto distribution) are used in modeling [8]. Heavy tailed distributions are not used here, because they also introduce their own effects to the performance, which is not in the focus of this paper. Poisson-process still is a good reference point and it models for example voice traffic accurately and it also fits quite well to some data application modeling [7]. In simulations, each offered traffic value point is averaged over 90 iterations with on the average of packets per iteration. A session model of dynamic connections is used here. In this model, source node chooses randomly the destination node to communicate with, and the connections are changed during iteration. Session duration is exponentially distributed with
4 expectation value of 00 packets. Ad hoc network must also support mobility, so mobile scenarios are also included to the study. The mobility is based on the random waypoint model used in several other studies [9], [20]. The speed of the network nodes is set randomly from 0.2 to.5 m/s in order to model pedestrian movement. When mobility is enabled, it is continuous with no pause time. G. Simulation results In all figures, cases with pure 802. and 802. with BCCA enhancement, both with, no mobility and continuous mobility, are presented. Figure 5 depicts the average data packet delay as a function of offered data traffic. Typical network behavior can be clearly seen, i.e., with increasing traffic, the delay remains low from low to moderate traffic load, but after a certain point the delay starts to significantly increase. At this point the network starts to collapse due to congestion. Extra delay is caused by numerous retransmissions, buffer fulfillments, route maintenance and route re-discoveries. As it is seen from the figure, the performance enhancement of BCCA is obvious. For example, at data traffic load of 0., the delay of BCCA in no mobility case is only about 5 ms, while in the case of pure 802. it is over twofold (about 2 ms). Avg. data packet delay [s] 0, 0,0 0 node placement in used scenario is about 97.7 %. Due to slow speed of the nodes, the mobility only reduces the connectivity problems, for the possible bad connections are not permanent. Also, the path lengths are reduced, because the random waypoint mobility model is known to exhibit properties where the node density is larger at the center of the operational area than at the boundary areas [2]. Of course, if the speed of the nodes would be much higher, the routing protocol would not be able to adapt to rapid topological changes and the performance would be worse (see e.g., [8]). Data throughput S 0,4 0,35 0,3 0,25 0,2 0,5 0, 0,05 0 Figure 6. Data throughput. Packet loss ratio Ideal random channel access,0e+00 0,0 0,,0E-0,0E-02 0,00 Figure 5. Average data packet delay. From the delay figure, the effect of the routing protocol can be also seen. The performance deteriorates (delay increases) at very low traffic load. The main reason for this are route breakages due to too small route timeout parameter of AODV. We have already increased it up to the value of 20 s, but it is still insufficient for such a small traffic loads of < Further increment of the timeout parameter is not desirable, because it would cause problems in heavy traffic and high mobility situations. The optimal performance is got with moderate traffic load, because the used, mainly default, AODV parameters are optimized to traffic loads of about 0.0 to 0.. In Figure 6, normalized network throughput is presented. Pure 802. gets a maximum normalized throughput of about 0.26, while BCCA achieves about 5 % better (0.30) performance in the case of no mobility. With continuous mobility, the ratio of the performance difference is about the same. It is interesting to note that the performance is better, when the network scenario mobile rather than static. This can be explained by the problem of connectivity, which still exists even though the network is quite small. With external simulator, we discovered that the probability for full connectivity with random,0e-03,0e-04 Figure 7. Packet loss ratio. The packet loss ratio is shown in Figure 7. The performance differences are clearly seen with increasing traffic. For example, if % packet loss is assumed to be tolerable for some application, pure 802. can handle traffic loads of about 0.06, while BCCA can handle over 50 % more in no mobility case. With low traffic loads, the benefit of BCCA is negligible, because the packet loss is caused by connectivity problems rather than the used channel access method. Note that in the case of no mobility, packet loss ratio is saturated to %, while with continuous mobility, low packet loss ratios of order of 0.05 % are reached. In Figure 8, normalized total network control load is presented. We point out that the use of BCCA does not increase the need for control traffic. In fact, at high traffic load, the need for control traffic is higher in pure 802., because it starts to collapse earlier. Naturally, if the spreading codes would be unknown in the initial state, the spreading code distribution algorithm would increase the needed control traffic modestly in the beginning of the simulation iteration. With static nodes, the need for control traffic is slightly higher with all traffic loads
5 than with continuous mobility. This is due to performance enhancing feature of decent mobility. The increased control overhead at low traffic load, caused by AODV route timeout, can be also seen. The relative amount of control information is high because of the used small data packet. Normalized total network control load [bit/bit] 2,2 2,8,6,4,2 0,8 Figure 8. Norm. total network control load calc. in bits. In Figure 9, average number of collisions in correctly received packets is illustrated. It is noticed that BCCA is highly tolerant against collisions as compared to pure This highlights the potential benefits of using CDMA, since multiple simultaneous successful transmissions can occur. Average num of collisions in packet. 0, 0,0 0,00 Figure 9. Average number of collisions in packet (MAC layer). SUMMARY A new method for channel access in ad hoc networks was presented. Proposed BCCA uses two-channel approach to enable simple and robust receiver based CDMA networking capability without forgetting the need for a common access channel in ad hoc environment. A simulation test environment was set with AODV routing protocol and IEEE BCCA was realized with simple modifications to IEEE It was shown that BCCA outperformed pure 802. especially in heavy traffic situation where the problems are the greatest and still the use of BCCA does not increase the need for control traffic. It has to be noticed that no optimization what so ever was made to BCCAenabled 802., which, as a platform designed for the operation on a common contention channel, is definitely not the best for the purpose of BCCA. With optimization, the performance difference is likely to be much greater. As a by-product, the study also suggested that there still exists optimization work to do also in AODV parameters with variable traffic load. This was noticed especially at low traffic load where proactive routing protocols would probably have worked better. Also, the connectivity problems of ad hoc networking were observed. The idea of BCCA can basically be used in many kinds of networks, but it is designed especially for the needs of ad hoc networks. BCCA functionality in ad hoc networking is an example of the benefits of cross-layer design in enhancing the performance of wireless systems. REFERENCES [] E.M. Royer and C.-K. Toh, A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks, IEEE Personal Communications, vol. 6, no. 2, Apr.999. [2] R. Rom and M. Sidi, Multiple Access Protocols, Performance and Analysis, Springer-Verlag, New York, 990, pp [3] A. Muqattah and M. Krunz, CDMA-Based MAC Protocol for Wireless Ad Hoc Networks, MobiHoc 03, June [4] S. Lal, E. S. Sousa, Distributed Resource Allocation for DS-CDMA - Based Multimedia ad hoc Wireless LAN s, IEEE J-SAC, Vol. 7, No. 5, May, 999, pp [5] L. Hu, Distributed Code Assignments for CDMA Packet Radio Networks, IEEE/ACM Transactions on Networking, vol., no. 6, December 993, pp [6] J. Proakis, Digital Communications, McGraw-Hill Inc., 200. [7] I. Gupta, Minimal CDMA Recoding Strategies in Power Controlled Ad-Hoc Wireless Networks, Technical Report, Dept. of Computer Science, Cornell University, 200. [8] J. Prokkola, L. Leppänen, and T. Bräysy, On the Effect of Traffic Models to the Performance of Ad Hoc Network, IEEE Military Communication Conference (MILCOM 2003), Oct [9] J. Prokkola, et al., Ad Hoc Networking under Variable Traffic Scenarios in Military Environment, in Technical Aspects of Network Centric Warfare, J. Jormakka, C. Candolin eds., National Defence College, Dept. of Technology, Helsinki. Series, No. 7, pp [0] E. S. Sousa and J. A. Silvester, Spreading Code Protocols for Distributed Spread-Spectrum Packet Radio Networks, IEEE Transactions on Communications, Vol 36, March 988, pp [] D. Sarwate and M. Pursley, Cross-correlation Properties of Pseudorandom and Related Sequences, Proc. IEEE, Vol. 68, 980. [2] L. Leppänen, J. Prokkola and T. Bräysy, Performance of Ad Hoc Network Under Pareto Distributed Traffic Model, Finnish Wireless Communications Workshop, Oct [3] A. Santamaría and F.J. López-Hernández (eds.), Wireless LAN: Standards and Applications, Artech House 200. [4] K. Pahlavan and P. Krishnamurthy, Principles of Wireless Networks, Prentice Hall [5] L. Guamari, An OPNET Model Implementation for Ad Hoc On- Demand Distance Vector Routing Protocol, Master s Thesis, NIST, Aug [6] C. Perkins, E. Belding-Royer, and S. Das, Ad Hoc On-Demand Distance Vector (AODV) Routing, RFC 356. Url: [7] J. Hui, Switching and Traffic Theory for Integrated Broadband Networks, Kluwer Academic Publications 990. [8] W. Willinger et al., Self-Similarity Through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level, IEEE Transaction on Networking, vol. 5, 997, pp [9] S.R. Das et al., Comparative Performance Evaluation of Routing Protocols for Mobile Ad hoc Networks, Proc. of Computer Communications and Networks, Oct 998. [20] J. Broch et al., A Performance Comparison of Multihop Wireless Ad Hoc Network Routing Protocols, Proc. of IEEE/ACM MOBICOM 98, Oct [2] T. Chu, I. Nikolaidis, Node Density and Connectivity Properties of the Random Waypoint Model, Elsevier Journal on Computer Communications No. 27, pp
QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationImpact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationEfficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks
Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56
More informationPerformance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols
Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More information1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol
1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks
More informationPower aware Multi-path Routing Protocol for MANETS
Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile
More informationEstimate the Routing Protocols for Internet of Things
Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationFigure 1: Ad-Hoc routing protocols.
Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationEfficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks
Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent W. S. Wong and Victor C. M. Leung Department of Electrical and Computer Engineering The University of British
More informationDesign Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks
Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks Michelle X. Gong Scott F. Midkiff Shiwen Mao The Bradley Department of Electrical and Computer Engineering Virginia Polytechnic
More informationPerformance analysis of aodv, dsdv and aomdv using wimax in NS-2
Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers
More informationPerformance Analysis of MANET Routing Protocols OLSR and AODV
VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz
More informationEvaluation of Routing Protocols for Mobile Ad hoc Networks
International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network
More informationControl Traffic Analysis of On-Demand Routing Protocol. in Mobile Ad-hoc Networks
Second International Conference on Networking and Distributed Computing Control Traffic Analysis of On-Demand Routing Protocol in Mobile Ad-hoc Networks Zhilin Zhang School of Computer Science & Technology
More informationRouting in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14
Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path
More informationPerformance Analysis of Three Routing Protocols for Varying MANET Size
Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Performance Analysis of Three Routing Protocols for Varying MANET Size N Vetrivelan,
More informationA REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS
A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen
More informationSimulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network
Global Journal of Computer Science and Technology Volume 11 Issue 1 Version 1.0 February 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More informationPerformance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV
MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through
More informationA Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET
A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute
More informationEffect of 3 Key Factors on Average End to End Delay in MANET
Effect of 3 Key Factors on Average End to End Delay in MANET Suhaimi. Abd. Latif, Saqib Hakak Department of Electrical and Computer Engineering International Islamic University Malaysia, Kuala Lumpur,
More informationPerformance Comparison of MANETs Routing Protocols for Dense and Sparse Topology
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationMulti-Linked AODV Routing Protocol for Wireless Mesh Networks
Multi-Linked AODV Routing Protocol for Wireless Mesh Networks Asad Amir Pirzada and Ryan Wishart Queensland Research Laboratory, National ICT Australia Limited, Brisbane, QLD 4, Australia. {Asad.Pirzada,
More informationA Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks
A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,
More informationPerformance Comparison of Two On-demand Routing Protocols for Ad-hoc Networks based on Random Way Point Mobility Model
American Journal of Applied Sciences 5 (6): 659-664, 2008 ISSN 1546-9239 2008 Science Publications Performance Comparison of Two On-demand Routing Protocols for Ad-hoc Networks based on Random Way Point
More informationPerformance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power
, pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria
More informationIMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS
IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS E. Gnanamanoharan and R. Bensraj Department of Electrical Engineering, Annamalai University, Tamil Nadu, India
More informationPerformance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)
Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) WADHAH AL-MANDHARI, KOICHI GYODA 2, NOBUO NAKAJIMA Department of Human Communications The University
More informationKeywords: AODV, MANET, WRP
Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)
More informationAppointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks
Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University
More informationThroughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network
Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India
More informationShortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks
Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless
More informationQueue Management for Network Coding in Ad Hoc Networks
2012 Third International Conference on Intelligent Systems Modelling and Simulation Queue Management for Network Coding in Ad Hoc Networks S.E. Tan H.T. Yew M.S. Arifianto I. Saad K.T.K. Teo Modelling,
More informationMultiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks
Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at Charlotte,
More information2013, IJARCSSE All Rights Reserved Page 85
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of
More informationPerformance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols
Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Akshay Shankar, Lavanya Chelle Information Science Engineering RNS Institute of Technology Bangalore, India Abstract- A Mobile
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationEffect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols
Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy
More informationDistributed STDMA in Ad Hoc Networks
Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad
More informationSecure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks
Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department
More informationA SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering
More informationPerformance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless
More informationPERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH
PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,
More informationA Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver
1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More informationEnhanced AODV for Providing QoS of Multimedia Application in MANET
Enhanced AODV for Providing QoS of Multimedia Application in MANET Wintwar Oo, and Eiei Khin Abstract MANET is a kind of wireless network which has dynamic topology and no fixed organization. As more and
More informationBehaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model
Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,
More informationPerformance Analysis of Aodv Protocol under Black Hole Attack
International Journal of Scientific & Engineering Research Volume 2, Issue 8,August-2011 1 Performance Analysis of Aodv Protocol under Black Hole Attack Monika Roopak, Dr. Bvr Reddy ABSTRACT- Mobile Ad-hoc
More informationPerformance of Routing Protocols in Very Large-Scale Mobile Wireless Ad Hoc Networks
Performance of Routing Protocols in Very Large-Scale Mobile Wireless Ad Hoc Networks Xin Zhang, George F. Riley Department of ECE Georgia Institute of Technology Atlanta, GA 3332-25 xinzhang, riley@ece.gatech.edu
More informationAn Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET
An Extensive Simulation Analysis of AODV Protocol with IEEE 802.11 MAC for Chain Topology in MANET V.K.Taksande 1, Dr.K.D.Kulat 2 1 Department of Electronics & Communication, Nagpur University Priyadarshini
More informationCOMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK
COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK Nalin Gahlaut 1, Jaya sharma 2, Pankaj Kumar 3, Kaushal Kumar 4 1 Doctoral Candidate, Uttarakhand Technical University,
More informationA Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks
A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks Won-Ik Kim Radio Performance Analysis Section Electronics & Telecommunications Research Institute 161 Kajong-dong,
More informationGateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario
Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,
More informationDynamic bandwidth management for multihop wireless ad hoc networks
Dynamic bandwidth management for multihop wireless ad hoc networks Sofiane Khalfallah Email: sofiane.khalfallah@insa-lyon.fr Cheikh Sarr Email: Cheikh.Sarr@insa-lyon.fr Isabelle Guerin Lassous Email: Isabelle.Guerin-Lassous@inrialpes.fr
More informationMobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV
Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationA Modified Medium Access Control Algorithm for Systems with Iterative Decoding
A Modified Medium Access Control Algorithm for Systems with Iterative Decoding Inkyu Lee Carl-Erik W. Sundberg Sunghyun Choi Dept. of Communications Eng. Korea University Seoul, Korea inkyu@korea.ac.kr
More informationQos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks
Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks 1 Ravindra.E, 2 Pooja Agraharkar Asst Prof, Dept. of Electronics & Communication Engg, Mtech Student, Dept. of Electronics & Communication
More informationA Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 6 (Jul. - Aug. 2013), PP 01-09 A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile
More informationMobile Communications. Ad-hoc and Mesh Networks
Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between
More informationThe Basics of Wireless Communication Octav Chipara
The asics of Wireless ommunication Octav hipara genda hannel model: the protocol model High-level media access TM, SM hidden/exposed terminal problems WLN Fundamentals of routing proactive on-demand 2
More informationA Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network
ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer
More informationExploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range
Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range Asha Ambhaikar and Lokesh Kumar Sharma Abstract a mobile ad hoc network is a collection of autonomous
More informationExpected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network
Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)
More informationEfficient On-Demand Routing Protocols to Optimize Network Coverage in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.7, July 2008 277 Efficient On-Demand Routing Protocols to Optimize Network Coverage in Wireless Sensor Networks * Mohammed
More informationCollisions & Virtual collisions in IEEE networks
Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationEffects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks
Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi
More informationSimulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol
Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationA Performance Comparison of Routing Protocols for Ad Hoc Networks
RESEARCH ARTICLE OPEN ACCESS A Performance Comparison of Routing Protocols for Ad Hoc Networks Hicham Zougagh *, Ahmed Toumanari *, Rachid Latif *, Noureddine. Idboufker **, Youssef. Elmourabit * Laboratory
More informationPerformance evaluation of reactive and proactive routing protocol in IEEE ad hoc network
Author manuscript, published in "ITCom 6 - next generation and sensor networks, Boston : United States (26)" DOI :.7/2.68625 Performance evaluation of reactive and proactive routing protocol in IEEE 82.
More informationA STUDY & ANALYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK ON DIFFERENT APPLICATION
International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 www.ijcea.com ISSN 2321-3469 A STUDY & ANALYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK
More informationPERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS Natarajan Meghanathan Jackson State University, 1400
More informationNetwork Connectivity Analysis of VANET using Fuzzy Logic Controller
Network Connectivity Analysis of VANET using Fuzzy Logic Controller Poonam Rathore 1 and Laxmi Shrivastava 2 1,2 Department of Electronics and Communication, Madhav Institute of Technology and Science,
More informationPerformance Evaluation of Routing Protocols for MAC Layer Models
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 4 (Mar. - Apr. 2013), PP 71-77 Performance Evaluation of Routing Protocols for MAC Layer Models Somya
More information6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationANewRoutingProtocolinAdHocNetworks with Unidirectional Links
ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob
More informationRouting in ad-hoc networks Marina Dupcinov, Srdjan Krco Applied Research Lab, EEI, Ericsson Ireland
Routing in ad-hoc networks Marina Dupcinov, Srdjan Krco Applied Research Lab, EEI, Ericsson Ireland I Introduction Ad-hoc networks are formed by users or devices wishing to communicate, without the necessity
More informationInvestigation on OLSR Routing Protocol Efficiency
Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova
More informationData Link Layer Technologies
Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave
More informationCOMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK
COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK 1 Ranjana Kukkar, 2 Kulbhushan Rassewatt, 3 Rahul Malhotra GTB KHALSA INSTITUTE OF ENGINEERING AND TECHNOLOGY,
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationScalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size
Lovekesh Kumar / International Journal of Engineering Research and Applications (IJERA) ISSN: Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size Lovekesh Kumar* *(Department
More informationPerformance of Ad-Hoc Network Routing Protocols in Different Network Sizes
Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co
More informationComparison of proposed path selection protocols for IEEE s WLAN mesh networks
Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba
More informationA COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE
More informationA Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks
A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationComputation of Multiple Node Disjoint Paths
Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes
More informationArchitecture of EHARP Routing Protocols in Ad Hoc Wireless Networks
2009 International Conference on Intelligent Networking and Collaborative Systems Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks Saud Al otaibi Software Technology Research Laboratory
More informationUAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks
UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,
More information