Setup Ad Hoc Routing Protocol over On-Demand Backup Node

Size: px
Start display at page:

Download "Setup Ad Hoc Routing Protocol over On-Demand Backup Node"

Transcription

1 etup d oc Routing Protocol over On-emand ackup ode Ying-ong Wang, hi ing hung, hih-hieh huang epartment of omputer cience and nformation ngineering, Tamang University 151 Ying-chuan Road, Tamsui 25137, Taipei sien, Taiwan Tel: , inhon@mail.tku.edu.tw, cmchung@cs.tku.edu.tw, g @tkgis.tku.edu.tw TRT n ad hoc wireless network provides infrastructueless data networking; users have network services while they are continually moving. nstructureless, and mobility are properties of the ad hoc wireless networks. urthermore, each move of the mobile host affects the change of network topology, and affects the change of the route of transmission. There are numerous routing protocols have been developed for ad hoc wireless networks, and they may be generally categorized by table-driven and source-initiated on-demand. owever, the properties of the ad hoc wireless networks still strike those routing algorithms. The d oc ackup ode etup Routing Protocol (RP) is proposed to lead us pay more attention on the intrinsic properties of the ad hoc wireless networks. t provides more complete consideration will take the quality of routing much well. ccording to the proposed RP, the destination can receive some more routes in a period of time. Those routes, which are more than one routes, from the source node to the destination node may give us ways to analyze and find some good backup routes to get more help for reconnection when link failure happened. The backup route information can be saved in a specific on-the-route node. s soon as the backup routes can be rapidly found out and trace back these nodes when there would be situations such as disconnection or loss of connection. oreover, RP provides backup node mechanism to reconnect maintenance quickly for fitting the property of the ad hoc wireless networks.. TROUTO Wireless networks have been developed for a long time and become more and more popular in many areas, such as military, academic research, business, and so on. The ad hoc networks, is one kind of mobile wireless networks, which provides infrastructueless data networking. n ad hoc wireless networks, users have network services while they are continually moving. ach move of the mobile host affects the change of network topology, and affects the change of the route of transmission; therefore, those affections lead to a link failure of the route. esides, there is a radio wave communication for mobile hosts to communicate with each other. While the radio wave exposes itself in the air, the coverage of communication must be limited. ccordingly, when the environment is bad or the far distance is from a host to the other hosts, it is possible to make low quality of transmission, even of disconnection. Power limit will be also a restriction of the ad hoc networks. The mobile node in the ad hoc wireless network may be a notebook or P. t is unlike common static equipment, such as P, that the equipment usually has to depend on the finite energy source primarily by batteries. n order to save the consumption of electricity, power off or disconnection is the measure we often take. s above, when a mobile host takes a measure of power off or disconnection, the mobile host will disappear in the network and also the network topology by change. ometimes link failure is inevitable; thereupon, when network topology s speed of reconnection changes, it affects not only the communication among the nodes in networks but also the quality of packet sending. Once link failure happens, the packet would again keep delivery swiftly if there would be backup routes replaced. Otherwise, it is necessary that it will cost much time to find out a new route to the destination node. There are numerous routing protocols have been developed for ad hoc wireless networks, and they may be generally categorized by table-driven and sourceinitiated on-demand [1]. n the ad hoc networks, tabledriven routing protocols attempt to maintain consistent and up-to-date routing information which is from nodes to the other ones, such as estination-d istance-vector Routing (V) [2], lusterhead ateway witch Routing (R) [3], and the Wireless Routing Protocol (WRP) [4]. Those kinds of routing protocols require each node to maintain one or more routing tables which record routing information, and propagate update packets through the network to maintain a consistent network information when network topology changing or is in a period of duration. Table-driven routing protocols may cause heavy overhead in high mobility network environment, because network topology changes more frequently to update routing table fresh. Unlike the table-driven routing protocols, sourceinitiated on-demand routing protocol creates route when the source node only requires a route to the destination node. d oc On-emand istance Vector Routing

2 (OV) [5], ynamic ource Routing (R) [6], Temporally Ordering Routing lgorithm (TOR) [7], ssociativity-ased Routing (R) [8] and ignal tability Routing (R) [9] are all on-demand routing protocols for ad hoc wireless networks. ource-initiated on-demand routing protocols often process include route discovery to establish a route first when the source node requires, and then maintain the route when network topology changing happened. The issue how to find a route fast and stably is always being discussed in this area. owever, compare these two categories of routing protocols, source-initiated on-demand routing protocols often have performance well [1]. These two kinds of routing protocols do not think about backup route; therefore, while link failure is happening, it approximately has to find a new route. There are many limitations in the ad hoc wireless networks that are including high power consumption, low bandwidth, and high error rates. Whether the table-driven or on-demand is used, dynamic mobility characteristic of the ad hoc networks is the most important factor which effects the route s life cycle. n this article, a new ad hoc on-demand routing protocol was proposed. The Remainder of the paper is organized as fellow: n ection 2, we bring up the motivation of our research first. We illustrate the new routing protocol we proposed in ection 3. Then, in ection 4, we will give an example about our routing protocol. The paper then concludes with challenges and future works for our keep on research.. OTVTO or ad hoc wireless networks routing protocol, there are many methods had been proposed to establish stably, shortest, or fast routes. owever, instructureless and mobility are properties of the ad hoc wireless networks, they are still charge those routing algorithms. esides, the performance has not been improved much. Promoting the quality of ad hoc routing, we must manage to avoid those situations that are mentioned above. The directions are: 1. voiding excessive long route, 2. hoosing stronger route, 3. hoosing low mobility nodes, 4. peeding up maintenance or re-establishing routes, and 5. mplement the design of backup route. ccording to the five directions above, the major idea is to adapt the mechanism of backup routes. oreover, a new routing protocol generates by the idea. The method that we proposed leads us pay more attention on the intrinsic properties of the ad hoc wireless networks which the more complete consideration will take the quality of routing much well. f the source node needs route to reach the destination node, it would influence not much on Qo while spending some time searching the route within the tolerance time. That is, when the source node broadcasts RQUT packet to find out the route to the destination node, the route RQUT arrives first the destination might not be the shortest path or most stably route. ince, the throughput between a node and the other node affects RQUT s order to reach the destination, and so does the stability of the connection. f we wait a little time for the destination to receive some more routes, those routes, which are more than one routes for source node to destination node, may give us ways to analyze and find some good backup routes to get more help for reconnection when link failure happened. nd, we save backup route information in certain on-the-route node. s soon as the backup routes can be rapidly found out and trace back these nodes when there would be situations such as disconnection or loss of connection. The destination node replies the first arrival route as primary; therefore, we can design a period of time, Tc, to gather more routes as backup route analysis, and we can also analyze the backup routes saving methods of mechanism.. O UP O TUP ROUT PROTOO ome concepts of the d oc ackup ode etup Routing Protocol (RP) are basic on the ynamic ource Routing (R) [6]. The RP is an on-demand routing protocol that doesn t requires any table and replies the complete route from the destination to the source. The difference from the R is that RP allows intermediate nodes to receive and transmit the same request packet from the source reduplicate that is to gather more information to establish backup nodes. n RP, there are three phases, route discovery, backup node setup, and route maintenance, and there are three kinds of cache required (ee ig 1). urthermore, there are some basic protocol packets that need to be defined in the RP (ee ig 2). nd, there are statements of the three phases as fellow.. Route iscovery Phase When source node needs the route to destination, will enter the route discovery phase and check if there are or not adequate fresh routes to in resh_routes_ first. (ee ig 3) f some fresh routes to in resh_routes_ are found, will run Route_onfirm_Process instead. Otherwise, runs ew_route_iscovery_process to find a new route to the destination node. * ew_route_iscovery_process ource node broadcasts Route iscovery (R-request) to nearby nodes. n the R-request, there is a sequence number field to distinguish from the other route discovery process, and there is a route content field to record the address along the path from to. fter the on-the-way node receives R-request, the node inserts its address into the route content field of the R-request, and then broadcasts to the other neighbors. urthermore, the node received the Rrequest will record the information in the R-

3 request_ and sends R-request and sequence numbers to the other nodes. f there is a node that receives the same sequence number of R-request from its neighbor X, the node will check whether the route content of R-request has recorded its address; the node will discard this Rrequest. Otherwise, the node will insert its address into the R-request, and then check if X is or not in the Rrequest_. f it is, the node will clear X from the R-request_, and then forward the R-request again to the neighbor nodes recorded in the Rrequest_. f X is not in the R-request_, the node forwards the R-request to the neighbor nodes according to the R-request_. f there is no record in R-request_, the R-request will be discard. Unlike the R, RP only discards the duplicate R- when the node appeared in the route content field of the R-request or when there is no more downstream node recorded in the Rrequest_. ence, RP can prevent loop infinite. fter the destination node receives a R-request, will send the route content of the first arrival Rrequest back to the source node, and wait more Rrequests in a short span of time, and then enter the step of ackup ode etup Phase. Route iscovery Phase ew_route_iscovery_process igure 1. The main architecture of the RP Packet ame unction ain ields Route iscovery (R-request) Route onfirm (R- request) Route iscovery Reply (R-reply) ackup etup Packet (-packet) Route_onfirm_Process ackup ode etup Phase Route aintenance Phase Route rasure (R- request) Routing Phase ccess To find and record the route content from the source node to the destination node. To re-establish the path from the source to the destination node according to the fresh route in the resh Route. The destination node replies the route content back to the source. The destination node transmits the backup information to the backup nodes to setup backup routes. The source node announces other nodes to erasure routing information if no need. resh Routes R-request ackup Routes isk ackup node, ackup Route Route rasure igure 2. The main protocol packets of the RP resh Routes Y Read the route of the cache Route onfirm end Route onfirm (R-request) Y Return the route of the R-reply ode needs routes to node egin Route iscovery Phase igure 3. Route discover phase of RP * Route_onfirm_Process f there were a fresh route to the destination in the resh_routes_, the source node would add the fresh route from to into the Route onfirm (R-request), and then transmit R-request through this route. On the way to transmit R-request, intermediate node checks its resh_route_ whether there is any other fresh route to when it receives the R-request. f there is a fresh route, the node will copy R-request and put this route in the route content field of the R-requests, and then transmit the R-request by this fresh route. Of course, if there is not, R-request would be transmitted downstream according to its original route content field. ventually, after is receiving the R-request, Route iscovery Reply (R-reply) will send back to, and then will send packets by this route.. ackup ode etup Phase s there any fresh route in the cache Receive R-reply nding Route iscovery Phase roadcast Route iscovery (R-request) ew Route iscovery fter route discovery phase, the destination gathers several routes within a period of time, Tc. The destination will get backup nodes and backup routes. aving gathered some routes, we compare with nodes two by two (from beginning to the end) to find whether there is any the same section of any two paths. The last node of this section is ackup ode (destination is exception), and a backup node subset can be gathered from any two paths. fter comparison, we make union of all those backup node subsets. urthermore, the ackup etup Packet (-packet) with each backup node and the partial path from the backup node to the destination node are formed. nd then the destination Return O such route from to

4 node will make use of -packet to separately setup the ackup_route_ of those backup nodes.. Route aintenance Phase s a link failure happens, a node is not able to keep on transmitting. Therefore, this node will not pass a link failure message to upstream node until the message is gave back to backup node. fter the backup node receives the message of a link failure, it will fetch the backup route of ackup_route_ to replace the route after the backup node, and inform the source node to change the route. nd then, node sends packets to use the new route. esides, backup route that has been fetched by the ackup_route_ would be labeled as non-backup route. f there has been no more backup route in ackup_route_, the node will have lost the identification of backup node. Under the circumstances, there is no backup node exists. The source node will receive the link failure message and reenter the Route iscovery Phase to establish new route toward the destination. When the route from to is invalid, will store the usable routes into the resh_routes_ and broadcast Route rasure (R-). When backup node receives R-, it will save backup routes of ackup_route_ into the resh_routes_ as well. V. XP The process and the principle of RP are illustrated above. n this section, an example shows how the RP runs in practical case (see fig 4). When source node needs a route to pass packets to destination node, processes route discovery phase first. n the route discovery phase, broadcasts R- with a sequence number to its neighbor nodes. When the intermediate node receive the R-Packet (we take node for example) node receives R- Packet from, will check whether its address has recorded in the route content field of the R- or not. f it won t, will insert its address into the route content field and send the R-Packet to its neighbor nodes,,, and after recording <sequence number, downstream node> pair into the R-_ (n this case which is <#, >, <#, >, <#, >, and <#, >). f receives the same sequence number R- without its address in the route content field from one node, will also insert its address into the route content field and send this R-Packet to those nodes (,, and ) of the R-_, except for. Otherwise, loop infinite will be occurred if sends R- to again. urthermore, will discard the R- in those situations that R- has already contained or contained no pair in the R-_. ource ode estination ode igure 4.. n example of RP. ntermediate ode onnection When the destination node receives the first arrival R-, node will reply the R-Reply packet that is used by the route of the first arrival R-. or example, --> --> --> --> -->. Then the timer, Tc, will be started. Within a period of time, Tc, may gather some more routes from to, such as followings: --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> nalyzing and comparing those routes with nodes two by two from beginning to the end, we can find out the route tree and backup node set {,,,, }(ee ig 5). ote that, the source node is also a backup node, because there are two ways for to send to. nd then, node sends -Packet with backup routes to each backup node. or this case, will set to be backup node and store { --> --> -->, --> --> -->, --> --> --> } in its ackup_route_. ackup ode ource ode igure 5. n example of route tree and backup node subset in RP ntermediate ode estination ode Path of Routes

5 fter the source node receives R-Reply from the destination node, then begins to send packets to. When link failure happens to the duration sending packets, there are some nodes could not send packet to the downstream node by the current path. This node will not pass over a link failure message to the upstream node until the message is gave back to backup node (ee ig 6). or example, node moves out and a link failure from to happened, node will send alert message back to the node. fterwards, backup node will check its ackup_route_, and pick one path ( --> --> --> ) to replace the current route, and inform to change the route toward (the new route is --> --> --> --> --> ). ater on, there might be no backup route in s ackup_route_; thereupon, will lose the identification of backup node. ackup ode ource ode ig 6. n example of link failure. V. OUO ntermediate ode n this article, a new ad hoc on-demand routing protocol, RP, is proposed. t seems that R and RP provide the shortest path. Thus, the destination node sends back the R-Reply with the route of the first arrival R-. oreover, RP provides backup node mechanism to reconnect maintenance quickly for fitting the property of the ad hoc wireless networks. ote that, Tc is a critical parameter that affects the performance of the RP. Tc begins with the s receiving first R-request or R-request from, and then analyzes some routes after Tc s finishing gathering. f the Tc is too large, there will be some redundant backup routes processed, and there will be some routes maintenance phase procrastinated. On the other hand, small Tc will reduce the gathered routes for analysis, even helpless for the route maintenance phase. To prevent the intermediate nodes from receiving and sending redundant R-s in the route discovery phase, they must stop receive any R-s after estination ode Path of Routes s receiving first R-request to the end of Tc. There are three measures as below: 1. estination node broadcasts message to each node. 2. ll nodes are set for synchronous clock. 3. odes receive R-request from and then start Tc by itself. owever, the first way will make the network overhead increase, and the second way is extremely difficult to set synchronous clock. The last way is more convenient and easy to implement, and we just need to choose an adequate Tc for the RP. n the future for RP, there are also many ways to be considered that can improve the stability of the routes. Taking ssociativity-ased Routing (R)[8] and ignal tability Routing (R)[9] for example, the intermediate nodes can choose more stable path first. nd, we will keep about some hot issues of the ad hoc networks, such as the Qo and mulicast to enhance the capability of the RP. RR [1] Royer,..; hai-eong Toh, review of current routing protocols for ad hoc mobile wireless networks, Personal ommun., Vol. 6 ss. 2, pr. 1999, pp [2].. Perkins and P. hagwat, ighly ynamic estination-d istance-vector Routing (V) for obile omputers, omp. ommun. Rev., Oct. 1994, pp [3].-. hiang, Routing in lustered ultihop, obile Wireless etworks with ading hannel, Proc. O 97, pr. 1997, pp [4]. urthy and.. arcia-una-ceves, n fficient Routing Protocol for Wireless etworks, obile etworks and pp.., pecial ssue on Routing in obile ommunication etworks, Oct. 1996, pp [5].. Perkins and.. Royer, d-hoc On- emand estance Vector Routing, Proc. 2nd Wksp. obile omp. ys. nd pps., eb. 1999, pp [6].. ohnson and.. altz, ynamic ource Routing in d-oc Wireless etworks, obile omputing, T. mielinski and. orth, ds., luwer, 1996, pp [7] V.. Park and.. orson, highly daptive istributed Routing lgorithm for obile Wireless etworks, Proc. OO 97, pr [8] -. Toh, ovel istributed Routing Protocol To upport d-oc obile omputing, Proc th nnual nt l. Phoenix onf. amp. and ommun., ar. 1996, pp [9] R. ube et al., ignal tability based daptive Routing () for d-oc obile etworks, Pers. ommun., eb. 1997, pp

Routing In Ad Hoc Networks

Routing In Ad Hoc Networks Routing n d oc Networks ontents 1. ntroduction to ad-hoc networks 2. Proactive routing protocols OLR 3. Reactive routing protocols R, OV 4. Non-uniform routing protocols ZRP, R 5. Other approaches eographical

More information

Ad Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols

Ad Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols d oc Routing d-hoc Routing rvind Krishnamurthy all 2003 Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems

More information

Page 1. Mobile Ad Hoc Networks. EEC173B/ECS152C, Winter Mobile Ad Hoc Networks (MANET)

Page 1. Mobile Ad Hoc Networks. EEC173B/ECS152C, Winter Mobile Ad Hoc Networks (MANET) 173/152, Winter 2006 obile d oc etworks (T) obile d oc etworks (T) ntroduction Unicast Routing Properties ormed by wireless hosts which may be mobile Without (necessarily) using a pre existing infrastructure

More information

Page 1. Mobile Ad Hoc Networks EEC173B/ECS152C. Mobile Ad Hoc Networks (MANET)

Page 1. Mobile Ad Hoc Networks EEC173B/ECS152C. Mobile Ad Hoc Networks (MANET) 173/152 obile d oc etworks (T) obile d oc etworks (T) ntroduction Unicast Routing Reactive Protocols: R, R, OV Proactive Protocols Properties ormed by wireless hosts which may be mobile Without (necessarily)

More information

Ad Hoc On-Demand Backup Node Setup Routing Protocol

Ad Hoc On-Demand Backup Node Setup Routing Protocol JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 20, 821-843 (2004) Ad Hoc On-Demand Backup Node Setup Routing Protocol Department of Computer Science and Information Engineering Tamkang University Taipei,

More information

Wireless Internet Routing

Wireless Internet Routing Wireless nternet Routing Wireless Routing in the eginning 1 Wireless nternet Routing This course: routing in T/ad hoc networks and mesh networks o nternet? = ateway(s) wireless/wired 2 1 Outline Review

More information

Dynamic Source Routing (DSR) [Johnson96]

Dynamic Source Routing (DSR) [Johnson96] ynamic Source Routing (SR) [ohnson96] S 6811 : ecture 5 d oc Wireless Routing ifferent from routing in the wired world esirable properties of a wireless routing protocol istributed operation oop freedom

More information

AODV Route Requests (RREQ) are forwarded in a manner similar to DSR

AODV Route Requests (RREQ) are forwarded in a manner similar to DSR d oc On-emand istance Vector (OV) R includes source routes in packet headers Resulting large headers can sometimes degrade performance particularly when data contents of a packet are small OV attempts

More information

Unicast Routing in Mobile Ad Hoc Networks

Unicast Routing in Mobile Ad Hoc Networks Unicast Routing in obile d oc etworks Routing problem 1 2 Responsibility of a routing protocol etermining an optimal way to find optimal routes etermining a feasible path to a destination based on a certain

More information

4/11/2012. Outline. Routing Protocols for Ad Hoc Networks. Classification of Unicast Ad-Hoc Routing Protocols. Ad Hoc Networks.

4/11/2012. Outline. Routing Protocols for Ad Hoc Networks. Classification of Unicast Ad-Hoc Routing Protocols. Ad Hoc Networks. 18759 Wireless Networks (2012-pring) urvey Routing Protocols for d Hoc Networks Jiun-RenLin and Yi-hun hou lectrical and omputer ngineering arnegie Mellon University Outline d-hoc networks Unicast d-hoc

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

A Hybrid QoS Routing Strategy for Suburban Ad-Hoc Networks

A Hybrid QoS Routing Strategy for Suburban Ad-Hoc Networks A ybrid Qo Routing trategy for uburban Ad-oc etworks Muhammad Mahmudul Islam, Ronald Pose, arlo Kopp chool of omputer cience and oftware ngineering, Monash University, Australia {sislam,rdp,carlo}@csse.monash.edu.au

More information

Dynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5

Dynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5 ynamic Source Routing (SR) [Johnson96] S 6811 : Lecture 5 d Hoc Wireless Routing ifferent from routing in the wired world esirable properties of a wireless routing protocol istributed operation Loop freedom

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

A Self-Healing and Optimizing Routing Technique for Ad Hoc Networks

A Self-Healing and Optimizing Routing Technique for Ad Hoc Networks Self-Healing and Optimizing Routing Technique for d Hoc Networks hao Gui and Prasant Mohapatra 1 bstract On demand routing protocols provide scalable and cost-effective solutions for packet routing in

More information

Dynamically Adaptive Multipath Routing based on AODV

Dynamically Adaptive Multipath Routing based on AODV ynamically daptive Multipath Routing based on OV Perumal Sambasivam shwin Murthy lizabeth M. elding-royer epartment of omputer Science University of alifornia, Santa arbara peru, ashwin, ebelding @cs.ucsb.edu

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

10/29/08. Mobile ad hoc networks. Solution: Wireless ad-hoc networks. MANET: Mobile Ad-hoc Networking A B C

10/29/08. Mobile ad hoc networks. Solution: Wireless ad-hoc networks. MANET: Mobile Ad-hoc Networking A B C obile ad hoc networks Standard obile needs an infrastructure ome gent/oreign gent in the fixed network S, routing, etc., are not designed for mobility Sometimes there is no infrastructure! remote areas,

More information

Multi-hop Technology: Ad-hoc Networks

Multi-hop Technology: Ad-hoc Networks MNT and VNT routing Multi-hop Technology d-hoc Networks ll hops are wireless ll nodes are mobile Military pplications rmy leet of warships pace pplications group of pathfinders group of satellites ommercial

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract

More information

Page 1 EEC173B/ECS152C. Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols

Page 1 EEC173B/ECS152C. Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols 173/S152 Proactive Protocols MNT Unicast Routing Proactive Protocols OLSR SV ybrid Protocols Most of the schemes discussed so far are reactive Proactive schemes based on distance vector and link state

More information

Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios

Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios Contemporary Engineering Sciences, Vol. 7, 2014, no. 12, 559-567 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4436 Evaluation of Ad-hoc Routing Protocols with Different Mobility Models

More information

AODV Multipath Extension using Source Route Lists with Optimized Route Establishment

AODV Multipath Extension using Source Route Lists with Optimized Route Establishment INTERNATIONAL WORKHOP ON WIRELE A-HOC NETWORK (IWWAN) AOV Multipath Extension using ource Route Lists with Optimized Route Establishment Yusuke akurai and Jiro Katto Graduate chool of cience and Engineering,

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

MAC Protocol for Reducing Control Packet Overhead in Underwater Acoustic Networks

MAC Protocol for Reducing Control Packet Overhead in Underwater Acoustic Networks International Journal of pplied ngineering esearch I 0973-4562 Volume 12, umber 15 (2017) pp. 4886-4892 esearch India Publications. http://www.ripublication.com MC Protocol for educing Control Packet Overhead

More information

The Basics of Wireless Communication Octav Chipara

The Basics of Wireless Communication Octav Chipara The asics of Wireless ommunication Octav hipara genda hannel model: the protocol model High-level media access TM, SM hidden/exposed terminal problems WLN Fundamentals of routing proactive on-demand 2

More information

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Highly Effective and Efficient Route Discovery & Maintenance in DSR A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Ad hoc On-demand Distance Vector Routing (AODV) [Perkins99] CSE 6811 : Lecture 7

Ad hoc On-demand Distance Vector Routing (AODV) [Perkins99] CSE 6811 : Lecture 7 d hoc On-demand istance Vector Routing (OV) [Perkins99] 6811 : Lecture 7 d Hoc On-emand istance Vector Routing (OV) R includes source routes in packet headers G ata. Header Large headers can sometimes

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Arvind Krishnamurthy Fall 2003

Arvind Krishnamurthy Fall 2003 Ad-hoc Routing Arvind Krishnamurthy Fall 2003 Ad Hoc Routing Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems

More information

Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks

Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John ixon and Kendall Nygard epartment of Computer Science, IACC 8 North akota

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Performance Analysis of Three Routing Protocols for Varying MANET Size

Performance Analysis of Three Routing Protocols for Varying MANET Size Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Performance Analysis of Three Routing Protocols for Varying MANET Size N Vetrivelan,

More information

Lecture 6: Bridging & Switching. Last time. Today. CSE 123: Computer Networks Chris Kanich. How do multiple hosts share a single channel?

Lecture 6: Bridging & Switching. Last time. Today. CSE 123: Computer Networks Chris Kanich. How do multiple hosts share a single channel? Lecture 6: ridging & Switching SE 3: omputer Networks hris Kanich Project countdown: 5 days Last time How do multiple hosts share a single channel? Medium ccess ontrol (M) protocols hannel partitioning

More information

Key-Words: Ad hoc network, multimedia, QoS, routing protocol.

Key-Words: Ad hoc network, multimedia, QoS, routing protocol. Proceedings of the 5th WSEAS International Conference on Applications of Electrical Engineering, Prague, Czech Republic, March 12-14, 26 (pp117-122) Hidden Route Aware QoS Routing Protocol for Mobile Multimedia

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA) 103 6. Node Disjoint Split Multipath Protocol for Unified Multicasting through Announcements (NDSM-PUMA) 6.1 Introduction It has been demonstrated in chapter 3 that the performance evaluation of the PUMA

More information

Adaptive routing for mobile ad hoc networks

Adaptive routing for mobile ad hoc networks RSRH Open ccess daptive routing for mobile ad hoc networks Jeroen Hoebeke *, Ingrid Moerman and Piet emeester bstract eveloping efficient routing protocols for mobile ad hoc networks remains a challenging

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar

More information

AODV- An Efficient MANET Routing Protocol

AODV- An Efficient MANET Routing Protocol International Journal of urrent Engineering and Technology E-IN 2277 4106, P-IN 2347-5161 2014 INPREO, ll Rights Reserved vailable at http://inpressco.com/category/ijcet Research rticle OV- n Efficient

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Adaptive Router Promotion in Ad-Hoc Networks

Adaptive Router Promotion in Ad-Hoc Networks daptive Router Promotion in d-hoc Networks Kensuke Tanaka, Noriko Matsumoto, and Norihiko Yoshida epartment of Information and omputer Sciences Saitama University, Saitama 338-8570, Japan yoshida@ics.saitama-u.ac.jp

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Mitigating Superfluous Flooding of Control Packets MANET

Mitigating Superfluous Flooding of Control Packets MANET Mitigating Superfluous Flooding of Control Packets MANET B.Shanmugha Priya 1 PG Student, Department of Computer Science, Park College of Engineering and Technology, Kaniyur, Coimbatore, India 1 Abstract:

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014 Throughput Analysis of Proactive and Reactive MANET Routing Protocols Kiranveer Kaur 1 Surinderjit Kaur 2 Vikramjit Singh 3 Department of Computer Science, University College of Engineering, Department

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Security Measures for Black Hole Attack in MANET: An Approach

Security Measures for Black Hole Attack in MANET: An Approach Security Measures for lack Hole Attack in MANET: An Approach Rajib as Research Scholar, epartment of Computer Science Assam University, Silchar 788011, India rajibdas76@gmail.com r. ipul Syam Purkayastha

More information

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks 2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen

More information

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks Won-Ik Kim Radio Performance Analysis Section Electronics & Telecommunications Research Institute 161 Kajong-dong,

More information

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh Amity University Rajasthan, Jaipur, India Abstract MANET is a dynamic topology wireless network in which

More information

Effects of Caching on the Performance of DSR Protocol

Effects of Caching on the Performance of DSR Protocol IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 07-11 Effects of Caching on the Performance of DSR Protocol Narinderjeet Kaur 1, Maninder

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

G.Narasa Reddy, 2 A.Avanthi, 3 R.Prasanth Reddy 1

G.Narasa Reddy, 2 A.Avanthi, 3 R.Prasanth Reddy 1 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Enhancing DSR Protocol Performance in Mobile Ad Hoc Networks

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

Predictive Unicast Multipath Algorithm

Predictive Unicast Multipath Algorithm TE PREITIVE UNIST MULTIPT LGORITM (PUM) Stuart W. ard, Fred W. Tims, r. Youngki wang of ritical Technologies Inc 1001 road Street, Suite 400 Utica, NY Phone (315) 793-0248 Fax (315) 793-9710 Stu.ard@critical.com

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Power aware Multi-path Routing Protocol for MANETS

Power aware Multi-path Routing Protocol for MANETS Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile

More information

Performance evaluation of AODV, DSR and DSDV in mobile ad-hoc network using NS-2

Performance evaluation of AODV, DSR and DSDV in mobile ad-hoc network using NS-2 Performance evaluation of AODV, DSR and DSDV in mobile ad-hoc network using NS-2 Fan-Shuo KONG, Bei-Bei CUI School of Software Engineering, Beijing University of Technology, Beijing, China e-mail: kongfanshuo0224@163.com,

More information

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes Ruchi Khandelwal 1 & Akhilesh Kosta 2 Department of Computer Science and Engineering

More information

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet)

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet) Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet) Dr. Naveen Kr. Singh Ms. Neetu Sharma Ms. Shweta Agarwal Asso. Prof. Asstt. Prof. Asstt. Prof. ABES Engineering College ABES

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Split Multipath Routing with Maximally Disjoint Paths in Ad hoc Networks

Split Multipath Routing with Maximally Disjoint Paths in Ad hoc Networks plit Multipath Routing with Maximally isjoint Paths in Ad hoc Networks ung-ju Lee Internet & Mobile ystems Labs Hewlett-Packard Laboratories Palo Alto, CA 9434-26 sjlee@hpl.hp.com Abstract In recent years,

More information

Emergence of Ad-hoc On-demand Distance Vector Protocol (AODV) as an Efficient On-demand Routing Protocol (EORP) Using Bayesian Approach

Emergence of Ad-hoc On-demand Distance Vector Protocol (AODV) as an Efficient On-demand Routing Protocol (EORP) Using Bayesian Approach ISSN : 2050-3021 Emergence of Ad-hoc On-demand Distance Vector Protocol (AODV) as an Efficient On-demand Routing Protocol (EORP) Using Bayesian Approach Dr. Anubhuti Khare 1, Manish Saxena 2, Raghav Shrivastava*

More information

0!1. Overlaying mechanism is called tunneling. Overlay Network Nodes. ATM links can be the physical layer for IP

0!1. Overlaying mechanism is called tunneling. Overlay Network Nodes. ATM links can be the physical layer for IP epartment of lectrical ngineering and omputer Sciences University of alifornia erkeley '!$$( network defined over another set of networks The overlay addresses its own nodes Links on one layer are network

More information

Lower Layers PART 3: RPL layer in Contiki with the Z1

Lower Layers PART 3: RPL layer in Contiki with the Z1 Slide ower ayers PRT 3: RP layer in ontiki with the Z Kris Steenhaut - Jacques Tiberghien Remark: all numerical data refer to the parameters defined in 802..4 for 32. Kbytes/s transmission in the 2.4 z

More information

IN a mobile ad hoc network, nodes move arbitrarily.

IN a mobile ad hoc network, nodes move arbitrarily. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make

More information

CS5984 Mobile Computing

CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part II 1 Outline Routing Protocols for Ad hoc Networks DSDV: Highly Dynamic Destination-Sequenced Distance- Vector

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS May Cho Aye and Aye Moe Aung Faculty of Information and Communication Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo

More information

Name Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: Fall :50-11:30 Tuesday January 10, 2006

Name Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: Fall :50-11:30 Tuesday January 10, 2006 Name Student I epartment/year inal xamination Introduction to omputer Networks lass#: 901 31110 all 2005 9:50-11:30 Tuesday January 10, 2006 Prohibited 1. You are not allowed to write down the answers

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4

Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4 Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4 1 Research Scholar, Computer Science and Engineering, Lovely

More information

Unit 2. Signaling and Single Area OSPF

Unit 2. Signaling and Single Area OSPF nit ignaling and ingle rea PF elecommunications ignaling ignaling g sed to provide all of the set up, tare down and call processing information such as: ff hook notification alling party number alled party

More information

Dynamic Source Routing in ad hoc wireless networks

Dynamic Source Routing in ad hoc wireless networks Dynamic Source Routing in ad hoc wireless networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University In Mobile Computing, vol. 353, chapter 5, T. Imielinski and H.

More information

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes Replica Distribution Scheme for Location-Dependent Data in Vehicular d Hoc Networks using a Small Number of Fixed Nodes Junichiro Okamoto and Susumu Ishihara Graduate School of Engineering, Shizuoka University,

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

Routing in ad-hoc networks Marina Dupcinov, Srdjan Krco Applied Research Lab, EEI, Ericsson Ireland

Routing in ad-hoc networks Marina Dupcinov, Srdjan Krco Applied Research Lab, EEI, Ericsson Ireland Routing in ad-hoc networks Marina Dupcinov, Srdjan Krco Applied Research Lab, EEI, Ericsson Ireland I Introduction Ad-hoc networks are formed by users or devices wishing to communicate, without the necessity

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Maharishi Markandeshwar University

Maharishi Markandeshwar University RESEARCH ARTICLE OPEN ACCESS Simulation Based Performance Comparison of Adhoc Routing Protocols Kushagra Agrawal*, Shaveta Jain** *Department of Computer Science,, Mullana, Ambala agrawal_kushagra@rediffmail.com

More information