INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH Volume 1, No1, Copyright 2010 All rights reserved Integrated Publishing Association

Size: px
Start display at page:

Download "INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH Volume 1, No1, Copyright 2010 All rights reserved Integrated Publishing Association"

Transcription

1 Multipath Dynamic Source Routing with Cost and Ant Colony Optimization for MANETS Sarala.P 1, Kalaiselvi.D 2 1. Lecturer 2. Post graduate student in Computer Science and Engineering Nandha Engineering College, Erode, Tamilnadu saralagokul@yahoo.com ABSTRACT The mobile adhoc networks are the infrastructureless networks constructed without any fixed infrastructure such as base station, tower, redirection switches and routers. Mobile adhoc networks are the temporary wireless networks. All the routing information are managed by the node itself. Mobile adhoc network routing operations are categorized into two types proactive and reactive routing. The multipath routing mechanisms are used to discover multiple paths under the nodes. Multipath dynamic source routing protocol (MP DSR) is used to discover multipath route under MANET nodes. The MP DSR protocol uses the local link information for the route discovery process. The MP DSR protocol is enhanced with ant colony optimization method to provide multipath route information using global link information. EMP DSR provides QoS factors such as end to end reliability. Network traffic, bandwidth and battery power factors make an influence over the route discovery process. Cost enabled route discovery is one of the consierable routing method that enables the cost estimation with different metrics. The multipath routing protocols concentrates on the route discovery with end to end reliability factors. The EMP DSR protocol is integrated with fuzzy cost estimiation techniques. Distance, network traffic, bandwidth and battery power metrics are used in the fuzzy cost enabled multipath dynamic source routing protocol. Keywords: Fuzzy network, Ant colony algorithm, adhoc networks, multipath routing. 1. Introduction Mobile Ad hoc Networks (MANETs) consisting of a collection of wireless mobile hosts (called nodes) have received increasing attention recently. Independence from central network administration, ability to be self configured, self healing through continuous reconfiguration, scalability and flexibility are the distinguished reasons to deploy such networks [1]. Routing as one of the cornerstones of any network including MANETs, is needed whenever data packets need to be handed over several nodes to arrive at their destinations. Routing protocols have to find routes for packet delivery and make sure the packets are delivered to the correct destinations [7]. In MANETs each node serves as a router to forward packets to other hosts. Since, nodes are free to move randomly and organize themselves arbitrarily; the network s topology may change rapidly and unpredictably. Such characteristics allow an ad hoc network to be established on the fly with built in fault tolerance and unconstrained connectivity. This makes routing in such networks more challenging, especially when certain Quality of Service (QoS) requirements are to be guaranteed during the routing. One of the most important QoS metrics is to provide end to end reliability. End to end reliability is used to reflect the 83

2 probability of sending data successfully from the source node to the destination node within a time window. End to end path reliability is the product of the link availabilities along the path, assuming the link availabilities are independent. The calculation of link availability is based on the current s node movement. The words availability and reliability will be used interchangeably throughout the paper. Usually required end to end reliability for routing is satisfied through applying multi path scheme. Taking this scheme into consideration, the endto end reliability is 1 Π k K (1 k), where k is the reliability of a path, and K is the set of all paths to be considered in the reliability calculation. End to end reliability guarantees that there is an active path between two mobile nodes within a time interval. In this paper, our major contribution goes towards supporting the reliability as a QoS metric through multi path routing. Many researches have been done to improve QoS in multipath routing algorithms for MANETs [2][10][11]. However, only few of them have focused on reliability metric. The most related work to ours is Multi Path Dynamic Source Routing (MP DSR), which is based on Dynamic Source Routing (DSR) protocol. MP DSR seeks to compute a set of unicast routes that can satisfy a minimum end toend reliability requirement. It then maintains this requirement throughout the lifetime of transmission. However, the route discovery in MP DSR relies only on local link availability information at each intermediate node to perform the route request message forwarding, without using any global information. Selecting a reliable link in an intermediate node solely based on local information may not necessarily lead to finding a satisfactory reliable end toend path. The problem originates from the fact that there is no global end to end reliability related information available for each node. To alleviate the aforementioned problem and provide the global reliability related information for each node, in this paper an Enhanced Multi Path Dynamic Source Routing algorithm called EMP DSR has been developed. To this end, we have applied an Ant Colony Optimization (ACO) based approach called AntNet, a lightweight optimization method. Generally ACO algorithms utilize ants, which are mobile agents that are capable of solving various optimization problems such as network routing and congestion problems [5]. 2. Preliminaries The fundamental concepts and approaches which our proposed method is based upon are introduced to the necessary extent. First MP DSR method then a brief introduction of Ant Colony Optimization and AntNet are given MP DSR MP DSR or Multi Path Dynamic Source Routing introduced, tries to find multiple disjoint paths from a given source to a destination while guaranteeing that these paths altogether can satisfy a given end to end reliability P u where 0 < P u 1. MP DSR achieves route discovery by determining the number of paths to be discovered (m 0 ) and the lowest reliability (Π lower ) that each of the m 0 paths must have so that the P u reliability can be satisfied. Once, obtaining the appropriate values for the parameters at the source node, the source node sends m0 Route Request (RREQ) messages to search for feasible paths. Each of the RREQ messages contains useful information such as, the path it has traversed till then (pathvector), 84

3 pathvector s corresponding accumulated reliability namely Π acc and Π lower. When an intermediate node receives an RREQ message, it investigates whether Π acc Π lower or not. If this inequality fails, the message is discarded. Otherwise, it appends itself to pathvector and calculates the new Π acc and finally forwards at most m 0 copies of the modified message to its neighbors. After a while, the destination node collects some of the RREQ messages. From the pathvectors stored inside RREQ messages, the destination node uses a path selection algorithm to pick the set of disjoint paths that can satisfy P u. Two paths are disjoint if they just share common source and destination nodes, but do not share common intermediate nodes. Then, the destination node responds to the source by sending Route Reply (RREP) messages through the selected paths. Thereafter, the source node commences sending the packets through these paths Ant Colony Optimization (ACO) ACO, a famous swarm intelligence approach, has taken its inspiration from the social behaviors of real world ants. Most often real ants are wandering stochastically around their nests to forage (Search for food). Upon finding food, they return back to their nests and simultaneously deposit pheromone trails along the paths. Since ants tend to follow the pheromone trails, they more likely biased towards such paths, and as a result they may not keep on traveling quite randomly. Therefore, they likely move through these paths and reinforce the existent pheromone. This kind of indirect communication is called stigmergy [4] in the biology and entomology literatures. Over time, however, the pheromone trail starts to evaporate, thus reducing its attractive strength. Analogously, ACO [4], one of the state ofthe art paradigms in designing meta heuristic algorithms for combinatorial optimization problems, utilizes artificial mobile agents namely ants which are capable of solving various kinds of routing and congestion problems. At regular intervals from every network node several ants are launched toward the destination node to discover the feasible low cost path to that node. Each ant in ACO considers two parameters to select its next hop. The first one is the amount of pheromone deposited on the path to the next node, and the other is a kind of heuristic parameter such as the queue length associated with the link. AntNet as an ACO approach to adaptive learning of routing tables in communication networks. Each node k in the network stores some data structures within itself which are responsible for keeping local traffic statistics, and routing table. Local traffic statistics defines a simple parametric statistical model for traffic distribution over the network as seen by node k. In fact, it explains the amount of traffic flows towards each possible destination. Routing table, for each possible destination d and for each node n, stores a probability value P nd which expresses the desirability of selecting n as the next node when the destination node is d. In fact it shows amount of pheromone deposited on the link (k,n). When an ant at node k heads toward a destination node d, it selects the next neighbor node n with the probability P nd where we have: P nd = P nd + α l n / 1 + α ( N k 1) (1) Here l n = 1 q n / Σ Nk n =1 qn (2) Where N k is the number of the neighbors of node k, q n is the length of the queue associated with the link connecting k to n and α is the weight of the importance of the heuristic function with respect to pheromone deposit. When an ant reaches the destination node, this node can now evaluate the goodness of the path. This goodness can be de fined according to an application s requirement [8]. AntNet itself uses the ants trip time and the 85

4 parameters of the local statistical model. Quantifying the goodness value, the destination node creates a backward ant. The backward ant takes the exact path by the corresponding ant, but in the opposite direction, and deposits an amount of pheromone on its path to the source node. This amount is commensurate with the goodness of this path. 3 Related Work On demand routing protocols generally perform well for wireless ad hoc networks, since the flooding of route request messages is only performed when a route is needed, rather than periodically as in proactive routing protocols. The degree of flooding is further reduced by using multi path routing protocols, which have been proposed to discover multiple paths for data transmission. Such protocols can be considered as a hybrid of proactive and ondemand routing, because route discovery is invoked on demand while route maintenance is done on a proactive basis. Examples of such multi path protocols include Temporally Ordered Routing Algorithm (TORA) [9] and Split Multi path Routing (SMR) [6]. In TORA, the source node constructs multiple routes by flooding a query message followed by a set of update messages. However, TORA does not have any mechanisms to evaluate the quality of these multiple paths and this leads to its poor performance. MP DSR overcomes this problem by selectively choosing more reliable paths and by providing soft guarantees on the end toend reliability. SMR [6] extends DSR in the way that the destination can discover two paths for each route request, in which one is the shortest path, and the other is the maximum disjoint path. There is no explicit enforcement of disjoint paths and this differs from our work, because our algorithm enforces the use of disjoint paths in its route discovery in order to use the definition of path reliability to provide end to end reliable service. Previous work in QoS routing for ad hoc wireless networks focuses on guarantees with respect to bandwidth, cost and delay. One of such routing protocols is the ticket based QoS routing protocol [3]. It considers two kinds of routing criteria: the delay constrained least cost routing and the bandwidth constraint leastcost routing. It uses ticket based probing to control the number of route queries and to find multi path in parallel. In comparison, our MP DSR considers the dynamic nature of network topology as well as the importance to offer continuous network connection in certain mission critical applications. Thus, the objective of our protocol is to improve the level of service by providing guarantee with respect to end to end reliability, and to probabilistically guarantee the required connection lifetime. In addition, our MP DSR differs in the way of searching multiple paths; the route discovery in our protocol relies only on local link availability information at each intermediate node to perform the route request (RREQ) message forwarding, without resorting to any global information as was used in [3]. 4. EMP DSR 4.1. Motivation MP DSR tries to compute a set of unicast routes that can satisfy a minimum end toend reliability requirement. It then maintains this requirement throughout the lifetime of transmission. MP DSR is fed with just local information for discovery of routes. Following a high reliable link, which connects the current node to one of its neighbors, cannot guarantee an end to end reliable path, since the selected neighbor may not have good reliable links towards destination node. As a result the obtained path may not have the end to end 86

5 satisfactory reliability. To mitigate this problem, we have used AntNet running silently in background to provide the required global information for MP DSR Ants' Contribution to EMP DSR EMP DSR uses a modified version of AntNet to populate its own routing table. The most significant change made to AntNet goes towards the way the goodness value is obtained. In our approach, we have used end to end reliability as the goodness parameter. A forward ant starts the trip to the destination node, then it arrives at an intermediate node, where it needs to update its Π acc field, by multiplying Π acc with the link availability of the link the forward ant has just traversed. This process continues until the ant eventually reaches its destination node. As a result, Π acc at the destination is the end to end traversed path reliability. Using Π acc and trip time (T) obtained from the forward ant; the paths goodness is calculated from equation 3: PathGoodness = c 1 (Π acc ) + c 2 (W best /T) (3) In equation (3), W best is the best trip time experienced by the forward ants traveling toward the destination over the last observation window. The maximum size of the window is set to a constant, for the sake of simplicity. The coefficient c 1 and c 2 weight the importance of each term. In the current implementation of the algorithm c 1 = 0:6 and c 2 = 04. The first term is the end to end path reliability. The second term implies the goodness of the round trip time (T) relative to recent best trip time (W best ). The first term is the most important one, while the second term alleviates the stagnation problem [4], by conducting some of the ants to less reliable but less congested or shorter paths. Stagnation occurs when ants are attracted by one optimal path which will lead this path to be heavily congested. After the forward ant reaches the destination node, the destination node generates a backward ant, transfers the entire forward ant s memory to it. The backward ant takes the same path as that of its corresponding forward ant, but in the opposite direction. The backward ant updates the routing table at intermediate nodes for all the entries related to the forward ant s destination node. In this update the related probabilities will be increased by a value proportional to both path goodness and the previous value of the probability (P nd ) through equation 4. P nd = P nd + PathGoodness (1 P nd ) (4) Launching several ants at regular intervals at different nodes, the whole process silently runs in the background all the time and updates routing tables Path Discovery Upon receiving a connection request from an application with a certain reliability criterion (P u ), the source node initiates the PathDiscovery algorithm with the given P u (illustrated in Algorithm 1). PathDiscovery process needs to determine m 0 (number of paths), Πlower (the minimum reliability that each of the m 0 paths requires to guarantee P u ), and t w (the time window that this end to end reliability holds within). Π lower is calculated from the given P u and m 0 through equation 5: Π lower = 1 m 0 1 P u (5) In PathDiscovery, tw is set to the constant t wmax (here 100 seconds), the upper bound of the time window. m 0 is initiated to 1 from which Π lower is calculated (line 8). Then, procedure iterates through all links associated with the neighbors of the source node and 87

6 checks if there are m 0 number of links with at least Π lower reliability (lines 9 13). Basically, the procedure tries to find the minimum number of links which altogether can satisfy P u. There is also a maximum threshold (m max ) for number of disjoint paths to be discovered (line 5). Thus, if m0 violates m max or the number of neighbors (L), the process will need to decrease t w due to the fact that links can be more reliable in the shorter time window (line 31). However, it is preferred not to have smaller time windows, since source node is required to send route check messages to validate whether the end to end reliability can still satisfy P u or not. This validation incurs extra overhead especially when it is done at short intervals periodically. Therefore, a minimum threshold is adopted for t w called t wmin (here 20 seconds), if the algorithm fails for the minimum threshold then it is a failure for the application request (line 30). Otherwise, the source node will send RREQ messages to the m 0 highest reliable links. The highest reliable links are the ones who have the highest value in ant generated table for the requested end destination (lines 14 28). Note that MP DSR s link selection relies on local information, whereas EMP DSR utilizes the more global and consequently worthwhile information about the network status provided by ants. Upon receiving an RREQ message, each intermediate node runs HandleRREQMessage Algorithm (illustrated in Algorithm 2). In this algorithm, the intermediate node first checks whether it is the destination itself or not. If not then the HandleRREQMessage algorithm will try to forward the RREQ towards the destination. An intermediate node only forwards m 0 number of the same RREQ messages, and the same RREQs will be discarded. This is accomplished via the bookkeeping variable numofforwardedmsg (lines 1 2). In order to keep the required reliability criterion along the path, the RREQ contains a reliability field Π acc that keeps reliability value from source to the current node. Each time it passes a link, it multiplies Π acc with the links associated reliability it has just traversed (line 4). The procedure then calculates L i (t w ) according to the equation 6 (line 5). L i (t w ) = Π lower / Π acc (6) With the current Π acc, L i (t w ) is the minimum reliability that the rest of path must hold in order to keep the end to end path reliability greater than or equal to P u. Then, the highest reliable links retrieved from ant populated table, which also satisfy the L i (t w ), are picked and the RREQ messages are forwarded to them (lines 8 17). To avoid loops, the selected neighbors must not be visited before (lines 9 10). Algorithm 1 Path Discovery (P u ) 1: t w = t w Max; 2: while t w t wmin do 3: set A A s,1(t w ),..., A s,t(t w ); 4: m 0 = 0; 5: while m 0 L and m 0 m max do 6: path = 0; 7: m 0 = m 0 + 1; 8: Π lower = 1 m 0 1 P u ; 9: for neighborj seta do 10: if A s,j (t w ) Π lower then 11: path = path + 1; 12: end if 88

7 13: end for 14: if path m 0 then 15: Π end_to_end = {(n 1, v 1 ),.., (n n,v n )}; {where the list is sorted according to v i } 16: rreq = newrreq(m 0,Π lower,t w ); 17: n = numberofneighbors of source node; 18: numrreqmsg = 0; 19: for i = 1 to i = n do 20: if A s (t w ) Π lower then 21: Send(RREQ;Π endtoend[i].neighbor); 22: numrreqmsg + +; 23: if numrreqmsg = m 0 then 24: return success; 25: end if 26: end if 27: end for 28: end if 29: end while 30: return error 31: t w = 0.9 t w ; 32: end while When the destination node receives the first RREQ, it triggers a timer to somehow limit the time that should wait for the same consecutive RREQs. The more the time limit, the greater number of RREQs are received at the destination. On the other hand, higher time limits increase path discovery delay. Thus, it is better to set the time limit according to network size. As soon as the timer time outs, the destination node launches its path selection algorithm. Each of the RREQ messages contains a path with at least Π lower reliability. Then, the destination node selects a set of these paths, so that these selected paths (TraceSet) can collectively satisfy P u. To attain this, it sorts all the available paths regarding to their reliability in descending order, and names this sorted paths CandidateSet. Path selection algorithm intrinsically is performed recursively. At each step, the algorithm picks a new path from CandidateSet and tries to add it to the TraceSet upon condition that the new path is disjoint with respect to the previously added paths in TraceSet. Then, the algorithm recursively invokes itself and attempts to add further paths. If none of the paths remaining in the CandidateSet were eligible to be included in TraceSet, the algorithm removes the previously added paths from TraceSet, and backtracks to look for other possible paths from CandidateSet. The whole procedure continues until either the algorithm finds an adequate number of paths to satisfy desired reliability, or exits with no achievement. Algorithm to handle RREQ Message ( RREQ) 1: if numofforwardedmsg[rreq] > m 0 then 2: return ; 3: end if 4: Π acc = Π acc A j,i (t w ); 5: L i (t w ) = Π lower / Π acc ; 89

8 6: n = num of the neighbors of the intermediate node; 7: P end_to_end = {(n 1, v 1 ),, (n n, v n )}; {where the list is sorted according to vi} 8: for k = 1 to n do 9: if P end_to_end [k].neighbor pathvector then 10: continue; 11: end if 12: if A i,k (t w ) L k (t w ) then 13: numofforwardedmsg[rreq] + +; 14: forward(rreq, P end to end [k].neighbor); 15: return ; 16: end if 17: end for 5. Fuzzy Cost Estimation on EMP DSR The proposed system improves the EMP DSR protocol with cost based route discovery scheme. The fuzzy logic techniques are used for the cost estimation. Bandwidth and traffic factors are used in the route discovery process. The proposed system improves the end to end reliability. Multi path route discovery is designed in the system. Cost factor is used for route discovery process. Dynamic source routing protocol is used in the system. Alternate route is selected in node failure state. The system is divided into three major modules. They are Route discovery, Route maintenance and Cost estimation. 5.1 Route Discovery The route discovery module is developed to find out path between given source and destination nodes. The route request is passed to all nodes. The neighbor list updated using route reply. The system produces multiple paths for the source to destination node. 5.2 Route Maintenance The route maintenance module is designed to perform route update process. The node failure and node mobility are monitored in the route maintenance process. The path is updated with respect to current network status. The system maintains active path for data transmission. 5.3 Cost Estimation The system uses the cost factor for route selection process. The fuzzy logic technique is used for cost estimation process. Bandwidth, traffic, node count and battery power factors are used in cost estimation. The system improves the reliability using multiple paths. 90

9 6. Conclusions Multipath routing supports end to end reliability. The Enhanced Multi Path Dynamic Source Routing (EMP DSR) is improved with fuzzy cost mechanism. The bandwidth and traffic factors are included in the route discovery process. The system provides user choice based route discovery process. Cost based route estimation. High reliability. Multipath routing. Global optimized route discovery. 7. References 1. Breed.G, "Wireless ad hoc networks: Basic concepts. In High Frequency Electronics", pages 44 46, Chen. Y.S, Tseng.Y.C, Sheu.J.P, and Kuo.P.H. "An ondemand, link state, multi path QoS routing in a wireless mobile ad hoc network". In European Wireless, Chen.S and Nahrstedt. K "Distributed Quality of Service Routing in Ad Hoc Networks". IEEE Journal on Selected Areas in Communications, 17(8), August Dorigo.M and Stutzle.T "Ant Colony Optimization". MIT Press, Ehsan Khosrowshahi Asl, Morteza Damanafshan, Maghsoud Abbaspour Majid Noorhosseini, Kamran Shekoufandeh "EMP DSR: An Enhanced Multi Path Dynamic Source Routing Algorithm for MANETs Based on Ant Colony Optimization" 2009 Third Asia International Conference on Modelling & Simulation IEEE. 6. Lee. S and Gerla.M "Split Multipath Routing with Maximally Disjoint paths in Ad Hoc Networks". In Technical Report in University of California, Mueller.S, Tsang.R.P, and Ghosal.D. "Multipath routing in mobile ad hoc networks: Issues and challenges". In MASCOTS Tutorials, pages , OMNeT++. January Park.V and Corson. S "Temporaly ordered routing algorithm". Internet Draft, August Tsirigos.A and Haas.Z "Multipath routing in the presence of frequent topological changes". IEEE Communications Magazine, 39(11), Valera.A.C, Seah.W.K.G, and Rao.S.V. "Cooperative packet caching and shortest multipath routing in mobile ad hoc networks". In INFOCOM. IEEE Computer Society,

Keywords: MANETs, Dynamic Source Routing, Ant Colony Optimization, Reliability, Quality of Service 1. INTRODUCTION

Keywords: MANETs, Dynamic Source Routing, Ant Colony Optimization, Reliability, Quality of Service 1. INTRODUCTION JOURNAL OF INFORMATION SCIENCE AND ENGINEERING XX, 1-xxx (xxxx) A Dynamic Ant Colony Based Routing Algorithm for Mobile Ad-hoc Networks ehsan@iranet.ir, majidnh@aut.ac.ir, atiehs@gmail.com Department of

More information

ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET)

ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET) ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET) DWEEPNA GARG 1 & PARTH GOHIL 2 1,2 Dept. Of Computer Science and Engineering, Babaria Institute of Technology, Varnama, Vadodara, India E-mail

More information

A Review: Optimization of Energy in Wireless Sensor Networks

A Review: Optimization of Energy in Wireless Sensor Networks A Review: Optimization of Energy in Wireless Sensor Networks Anjali 1, Navpreet Kaur 2 1 Department of Electronics & Communication, M.Tech Scholar, Lovely Professional University, Punjab, India 2Department

More information

Adhoc Network Routing Optimization and Performance Analysis of ACO Based Routing Protocol

Adhoc Network Routing Optimization and Performance Analysis of ACO Based Routing Protocol Adhoc Network Routing Optimization and Performance Analysis of ACO Based Routing Protocol Anubhuti Verma Abstract Ant Colony Optimization is based on the capability of real ant colonies of finding the

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

MODIFICATION AND COMPARISON OF DSDV AND DSR PROTOCOLS

MODIFICATION AND COMPARISON OF DSDV AND DSR PROTOCOLS MODIFICATION AND COMPARISON OF DSDV AND DSR PROTOCOLS Department of computer science Thadomal Shahani engineering college Mumbai-400051, ABSTRACT: In this era of mobile devices, mobile ad-hoc network (MANET)

More information

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS ix TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS v xiv xvi xvii 1. INTRODUCTION TO WIRELESS NETWORKS AND ROUTING PROTOCOLS 1 1.1

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

PERFORMANCE ANALYSIS OF QUALITY OF SERVICE ENABLED TEMPORALLY ORDERED ROUTING ALGORITHM USING ANT COLONY OPTIMIZATION IN MOBILE AD HOC NETWORKS

PERFORMANCE ANALYSIS OF QUALITY OF SERVICE ENABLED TEMPORALLY ORDERED ROUTING ALGORITHM USING ANT COLONY OPTIMIZATION IN MOBILE AD HOC NETWORKS R. Asokan et al. : Performance Analysis of Quality of Service Enabled Temporally Ordered Routing Algorithm Using Ant Colony Optimization in Mobile Ad Hoc Networks Advances in Engineering Science 11 Sect.

More information

Power aware Multi-path Routing Protocol for MANETS

Power aware Multi-path Routing Protocol for MANETS Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Performance evaluation of AODV, DSDV and AntHocNet in video transmission

Performance evaluation of AODV, DSDV and AntHocNet in video transmission Performance evaluation of AODV, DSDV and AntHocNet in video transmission Neelam S. Labhade, S.S.Vasekar Abstract Now a days wireless technologies are important in the world of communication due to its

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Highly Effective and Efficient Route Discovery & Maintenance in DSR A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan

More information

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network 1 Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network Nilima Walde, Assistant Professor, Department of Information Technology, Army Institute of Technology, Pune, India Dhananjay

More information

A Swarm-based Distance Vector Routing to Support Multiple Quality of Service (QoS) Metrics in Mobile Adhoc Networks

A Swarm-based Distance Vector Routing to Support Multiple Quality of Service (QoS) Metrics in Mobile Adhoc Networks Journal of Computer Science 3 (9): 700-707, 2007 ISSN 1549-3636 2007 Science Publications A Swarm-based Distance Vector Routing to Support Multiple Quality of Service (QoS) Metrics in Mobile Adhoc Networks

More information

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

ANT INTELLIGENCE ROUTING

ANT INTELLIGENCE ROUTING AJSTD Vol. 25 Issue 1 pp. 81-93 (2008) ANT INTELLIGENCE ROUTING Chye Ong Gan, K. Daniel Wong, and Wei-Lee Woon Malaysia University of Science and Technology Received 30 October 2006 ABSTRACT We introduce

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network Journal of Computer Science 7 (5): 678-682, 2011 ISSN 1549-3636 2011 Science Publications Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network 1 V. Balaji and 2 V. Duraisamy

More information

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0 White Paper Mobile Ad hoc Networking (MANET) with AODV Revision 1.0 This page is intentionally blank, or rather nearly blank. Table of Contents TABLE OF CONTENTS...3 TABLE OF FIGURES...4 WHAT IS MANET?...5

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

ROUTING IN MANETS USING ACO WITH MOBILITY ASSISTANCE

ROUTING IN MANETS USING ACO WITH MOBILITY ASSISTANCE ISSN : 0973-7391 Vol. 3, No. 1, January-June 2012, pp. 97-101 ROUTING IN MANETS USING ACO WITH MOBILITY ASSISTANCE Praveen Biradar 1, and Sowmya K.S 2 1,2 Dept. Of Computer Science and Engineering, Dayananda

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

ANALYSIS OF ANTHOCNET AND AODV PERFORMANCE USING NS2

ANALYSIS OF ANTHOCNET AND AODV PERFORMANCE USING NS2 ANALYSIS OF ANTHOCNET AND PERFORMANCE USING NS2 Y. Lakshmi Prasanna 1 and Dr. P. Chenna Reddy 2 1 Department of Computer Science and Engineering, JNTUACEP, Pulivendula 2 Professor of CSE Department, JNTUACEP,

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

[Jagtap*, 5 (4): April, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785

[Jagtap*, 5 (4): April, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A SURVEY: ANT BASED BIO-INSPIRED ALGORITHM FOR AD-HOC NETWORK Anjali A Jagtap *, Prof. Ankita Agarwal, Prof. Dipak R Raut, Prof.

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

ABSTRACT DYNAMIC ADAPTIVE ROUTING IN MOBILE AD HOC NETWORKS. Department of Electrical Engineering

ABSTRACT DYNAMIC ADAPTIVE ROUTING IN MOBILE AD HOC NETWORKS. Department of Electrical Engineering ABSTRACT Title of Thesis: DYNAMIC ADAPTIVE ROUTING IN MOBILE AD HOC NETWORKS Degree candidate: Harsh Mehta Degree and year: Master of Science, 2002 Thesis directed by: Professor John S. Baras Department

More information

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA) 103 6. Node Disjoint Split Multipath Protocol for Unified Multicasting through Announcements (NDSM-PUMA) 6.1 Introduction It has been demonstrated in chapter 3 that the performance evaluation of the PUMA

More information

Mitigating Superfluous Flooding of Control Packets MANET

Mitigating Superfluous Flooding of Control Packets MANET Mitigating Superfluous Flooding of Control Packets MANET B.Shanmugha Priya 1 PG Student, Department of Computer Science, Park College of Engineering and Technology, Kaniyur, Coimbatore, India 1 Abstract:

More information

A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm

A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm A New Approach for Energy Efficient in MANETs Using Multi Objective Genetic Algorithm Neha Agarwal, Neeraj Manglani Abstract Mobile ad hoc networks (MANET) are selfcreating networks They contain short

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014 Throughput Analysis of Proactive and Reactive MANET Routing Protocols Kiranveer Kaur 1 Surinderjit Kaur 2 Vikramjit Singh 3 Department of Computer Science, University College of Engineering, Department

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh Amity University Rajasthan, Jaipur, India Abstract MANET is a dynamic topology wireless network in which

More information

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer

More information

A Literature survey on Improving AODV protocol through cross layer design in MANET

A Literature survey on Improving AODV protocol through cross layer design in MANET A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Speed Performance of Intelligent Ant Sense Routing Protocol for Mobile Ad-Hoc Personal Area Network

Speed Performance of Intelligent Ant Sense Routing Protocol for Mobile Ad-Hoc Personal Area Network International Journal of Computer Science and Telecommunications [Volume 4, Issue 10, October 2013] 41 ISSN 2047-3338 Speed Performance of Intelligent Ant Sense Routing Protocol for Mobile Ad-Hoc Personal

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information

International Journal of Current Trends in Engineering & Technology Volume: 02, Issue: 01 (JAN-FAB 2016)

International Journal of Current Trends in Engineering & Technology Volume: 02, Issue: 01 (JAN-FAB 2016) Survey on Ant Colony Optimization Shweta Teckchandani, Prof. Kailash Patidar, Prof. Gajendra Singh Sri Satya Sai Institute of Science & Technology, Sehore Madhya Pradesh, India Abstract Although ant is

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

Ant-DYMO: A Bio-Inspired Algorithm for MANETS

Ant-DYMO: A Bio-Inspired Algorithm for MANETS 21 17th International Conference on Telecommunications Ant-: A Bio-Inspired Algorithm for MANETS José Alex Pontes Martins Universidade Vale do Acaraú (UVA) Sobral, Brazil 62.4 37 Email: alexmartins@larces.uece.br

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

A Review of Ant Colony based Routing Algorithm in Wireless Ad-hoc Networks

A Review of Ant Colony based Routing Algorithm in Wireless Ad-hoc Networks A Review of Ant Colony based Routing Algorithm in Wireless Ad-hoc Networks Sai Priya Thottempudi $, Dr Syed Umar * $ Student, Department of ECE, V R Siddhartha Eng College, A.P.INDIA. * Assoc. Professor,

More information

QUERY LOCALIZATION USING PHEROMONE TRAILS: A SWARM INTELLIGENCE INSPIRED APPROACH. Nupur Kothari, Vartika Bhandari and Dheeraj Sanghi

QUERY LOCALIZATION USING PHEROMONE TRAILS: A SWARM INTELLIGENCE INSPIRED APPROACH. Nupur Kothari, Vartika Bhandari and Dheeraj Sanghi QUERY LOCALIZATION USING PHEROMONE TRAILS: A SWARM INTELLIGENCE INSPIRED APPROACH Nupur Kothari, Vartika Bhandari and Dheeraj Sanghi Department of Computer Science & Engineering Indian Institute of Technology

More information

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,

More information

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Comparison of DSDV, AODV, DSR, Routing protocols

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA

More information

Effects of Caching on the Performance of DSR Protocol

Effects of Caching on the Performance of DSR Protocol IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 07-11 Effects of Caching on the Performance of DSR Protocol Narinderjeet Kaur 1, Maninder

More information

SWARM INTELLIGENCE -I

SWARM INTELLIGENCE -I SWARM INTELLIGENCE -I Swarm Intelligence Any attempt to design algorithms or distributed problem solving devices inspired by the collective behaviourof social insect colonies and other animal societies

More information

Ant Colony Optimization in Dynamic Source Routing Protocol

Ant Colony Optimization in Dynamic Source Routing Protocol Ant Colony Optimization in Dynamic Source Routing Protocol Rachna Sharma 1, Neha Goyal 2, M-Tech Student 1, Assit. Prof. 2 & Department of CSE & Shri Ram College of Engg. & Mgmt Palwal, Haryana, India

More information

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India

More information

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks 2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

SUMMARY OF ROUTING PROTOCOL MOBILE AD HOC NETWORKS. YI Jiazi. Polytechnic School of University of Nantes. Feb.

SUMMARY OF ROUTING PROTOCOL MOBILE AD HOC NETWORKS. YI Jiazi. Polytechnic School of University of Nantes. Feb. SUMMARY OF ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS YI Jiazi Polytechnic School of University of Nantes yi.jiazi@gmail.com Feb. 2007 CONTENTS ABSTRACT...2 1. INTRODUCTION...2 2. UNI-PATH ROUTING PROTOCOL...2

More information

SWARM INTELLIGENCE BASED DYNAMIC SOURCE ROUTING FOR IMPROVED QUALITY OF SERVICE

SWARM INTELLIGENCE BASED DYNAMIC SOURCE ROUTING FOR IMPROVED QUALITY OF SERVICE SWARM INTELLIGENCE BASED DYNAMIC SOURCE ROUTING FOR IMPROVED QUALITY OF SERVICE 1 N.UMAPATHI, 2 N.RAMARAJ 1 Research Scholar, Department of Electronics and Communication, GKM College of Engg and Tech,Chennai-63,,

More information

PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS

PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS Natarajan Meghanathan Jackson State University, 1400

More information

Evaluation of Power Aware Routing Protocols Mohammad Mahmud. Wireless Networks Professor: Dr. Lijun Qian

Evaluation of Power Aware Routing Protocols Mohammad Mahmud. Wireless Networks Professor: Dr. Lijun Qian Evaluation of Power Aware Routing Protocols Mohammad Mahmud Wireless Networks Professor: Dr. Lijun Qian Power Aware Routing In a typical network, the route of a packet will be determined by calculating

More information

G.Narasa Reddy, 2 A.Avanthi, 3 R.Prasanth Reddy 1

G.Narasa Reddy, 2 A.Avanthi, 3 R.Prasanth Reddy 1 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Enhancing DSR Protocol Performance in Mobile Ad Hoc Networks

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

A Stable TORA Based for Routing in Mobile Ad Ηoc Networks

A Stable TORA Based for Routing in Mobile Ad Ηoc Networks , Technology & Applied Science Research Vol. 8, No. 1, 2018, 2532-2536 2532 A Stable TORA Based for Routing in Mobile Ad Ηoc Networks Sajjad Jahanbakhsh Gudakahriz Germi Branch Germi, Iran Sa_jahanbakhsh@iaugermi.ac.ir

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B. IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol

More information

Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4

Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4 Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4 1 Research Scholar, Computer Science and Engineering, Lovely

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network) Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing

More information

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Analysis

More information

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocol

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocol IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VII (May-Jun. 2014), PP 47-53 Design and Implementation of a Simulator for Ad Hoc Network Routing

More information

Mobile Ad-Hoc Networks & Routing Algorithms

Mobile Ad-Hoc Networks & Routing Algorithms Mobile Ad-Hoc Networks & Routing Algorithms EMMANOUIL G. SPANAKIS, PhD. spanakis@csd.uoc.gr COLLABORATING RESEARCHER, COMPUTATIONAL BIOMEDICINE LABORATORY, FORTH-ICS VISITING LECTURER, COMPUTER SCIENCE

More information

Image Edge Detection Using Ant Colony Optimization

Image Edge Detection Using Ant Colony Optimization Image Edge Detection Using Ant Colony Optimization Anna Veronica Baterina and Carlos Oppus Abstract Ant colony optimization (ACO) is a population-based metaheuristic that mimics the foraging behavior of

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols. MANET TECHNOLOGY Dharna 1, Varsha Saroha 2, R. B. Dubey 3 1,2,3 Department of Electronics and Communication Engineering, Hindu College of Engineering, Sonepat, Haryana,(India) ABSTRACT Wireless technology

More information

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Mudit, Sachin Chaudhary Abstract In consideration of adaptability to the environment and flexibility in protocol construction,

More information

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers

More information

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,

More information

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network Author manuscript, published in "ITCom 6 - next generation and sensor networks, Boston : United States (26)" DOI :.7/2.68625 Performance evaluation of reactive and proactive routing protocol in IEEE 82.

More information

An Extended AODV Protocol for Multipath Routing in MANETs

An Extended AODV Protocol for Multipath Routing in MANETs IACSIT International Journal of Engineering and Technology, Vol.2, No.4, August 21 An Extended Protocol for Multipath Routing in MANETs N.Jaisankar 1 and R.Saravanan 2 Abstract Mobile ad hoc networks (MANETs)

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique

Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique P. Rathiga Research Scholar, Department of Computer Science, Erode Arts & Science College,

More information

ON THE USE OF SMART ANTS FOR EFFICIENT ROUTING IN WIRELESS MESH NETWORKS

ON THE USE OF SMART ANTS FOR EFFICIENT ROUTING IN WIRELESS MESH NETWORKS ON THE USE OF SMART ANTS FOR EFFICIENT ROUTING IN WIRELESS MESH NETWORKS Fawaz Bokhari and Gergely Zaruba Department of Computer Science and Engineering, The University of Texas at Arlington, Texas, US

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information