Simple Ant Routing Algorithm

Size: px
Start display at page:

Download "Simple Ant Routing Algorithm"

Transcription

1 Simple Ant Routing Algorithm Fernando Correia Inesc-ID and Instituto Superior Técnico Lisboa,Portugal Teresa Vazão Inesc-ID and Instituto Superior Técnico Lisboa, Portugal Abstract A Mobile Ad-hoc Network has limited and scarce resources and thus routing protocols in such environments must be kept as simple as possible. This paper presents a MANET routing protocol, inspired in insect societies biological models, the Simple Ant Routing Algorithm (SARA), which provides a simple and efficient routing solution. SARA uses a controlled neighbour broadcast route discovery procedure, aimed at reducing the routing overhead of existing solutions. In this controlled neighbour broadcast strategy, every node collects routing information received from its neighbours and updates its own routing information accordingly, but only one of them is responsible for forwarding this information. Simulation results have shown that, besides reducing the overhead incurred by the routing protocol, SARA also provides a solution to detect early congestion link situations and tries to re-route the traffic through alternative routes (if available). I. INTRODUCTION At the earliest stage of Mobile Ad-hoc Network (MANET), most of the applications were military. However, rapid advances in this research area led to the development of new technologies and to the use of such networks in other applicational domains, including sensor, personal or home networking. In spite of this growing interest in MANET, these networks share many problems with traditional wireless communications, such as the limited bandwidth of the shared wireless channel and the highly variable quality of the transmission. In addition, their mobility, multi-hop nature and the lack of a fixed infrastructure pose problems as the nodes can move freely and the network topology may change very often. To support this new communication paradigm, robust, reliable and efficient algorithms are needed to overcome such problems and to allow the network to offer a good, or at least an acceptable, level of service. Routing in such kind of networks is a major research issue and many proposals have appeared within its scope. Some of them resulted from the adaptation of classical routing protocols, mostly designed to route information in wired networks that do not suffer from typical wireless network problems, such as resource constraint or frequent and unpredictable topological changes [1], [2]. The challenges in MANET are thereof much bigger and new designs are necessary to guarantee even the most basic connectivity service. Taking a quite different approach, insect societies have become a source of inspiration for MANET routing as they adopt robust and effective solutions to find food in environments that change very often, which has proved to be a keyaspect of their biological success. Usually, routing algorithms based on these biological models are simpler than the ones based on the traditional solutions. Nevertheless, they still introduce significant overhead, as their efforts are focused on maintaining multiple paths per destination, which requires a significant amount of control messages. Moreover, in highly dynamic environments, a burden of information is needed to maintain those paths and it may not be possible to guarantee their accuracy. We believe that keeping the routing as simple as possible is the best solution for MANET, due to its scarce and highly variable resources. This paper proposes a routing protocol, inspired in insect societies behaviour, the Simple Ant Routing Algorithm (SARA), which offers a very simple routing solution for MANET that provides very reduced overhead and a solution to detect early congestion link situations. The remainder of the paper is organised as follows. Section II presents the related work which contains further motivation to our proposal. Section III describes the SARA architecture, comprising the route discovery, maintenance and repair mechanisms. This architecture was evaluated through simulation and some relevant results are shown in section IV. Finally, section V presents the conclusions reached and the future work planned. II. SCIENTIFIC BACKGROUND A. MANET s Routing Algorithms Although many different MANET s routing proposals have been presented, so far there is a generalised consensus on a classification framework that distinguishes the algorithms according to the strategy they use to calculate the routes. Table-driven algorithms are purely pro-active as they calculate and maintain routes to all possible destinations. Keeping track of topology variations is difficult to achieve in a MANET and requires the exchange of a lot of control information. This kind of strategy is used in algorithms that are based on the classical wired routing approach, such as the Dynamic Destination Sequenced Distance Vector Routing (DSDV) [3] and the Optimise Link State Routing (OLSR) [4]. Demand-driven algorithms, such as the Ad-hoc on demand distance vector routing (AODV) [5], only gather routing information and calculate the routes when a new data session starts, implying the use of a reactive strategy. A more scalable

2 solution is achieved as the amount of control information exchanged is reduced. Nevertheless, the network is not able to have a fast reaction to topological failure events and service disruption may happen in such a case. Well-known algorithms, such as the Dynamic Source Routing (DSR) [6], the Adhoc On-demand Distance Vector routing (AODV) [5] and the Temporally Ordered Routing Algorithm (TORA) [7], belong to this category. In the Hybrid strategy, the network is divided into clusters and different routing protocols may be used for inter and intracluster routing: the goal is to find out an optimal solution by combining both types of strategies. Its performance deeply depends on the organisation of the cluster and the variability of the network topology. Small or highly dynamic networks may not be able to take advantage of hybrid strategies due to the overhead associated to cluster creation and maintenance. Examples of this kind of routing are the Zone Routing Protocol (ZRP) [8] and the Hybrid Ad Hoc Routing Protocol (HARP) [9]. Demand-driven algorithms are more scalable [10] due to the reduced overhead. The routing algorithm should present a fast route convergence feature and the network performance may increase, as less time is required to find and maintain a stable route. Nevertheless, the working conditions can always be affected if the algorithms are not prepared for broken link situations. B. Swarm Intelligence-based Routing Algorithms Several routing algorithms have been proposed that modulate the behaviour of real ants searching for food [11], [12]. As it can be easily observed, real ants can converge on moving to the shortest path that connects their nest to a source of food. This behaviour is caused by a chemical substance, the pheromone: while moving, the ants deposit the pheromones and tend to follow the paths with the highest intensity of pheromones. The paths that attract more ants will experience an increasing level of pheromones, until the majority of the ants converge on the shortest path. This indirect communication process used by the ants, which modify the environment and react to these modifications, is known as stigmergy [13]. By simulating the ants behaviour in routing protocols, route agents and data packets can act as ants leaving a pheromone trail as they pass through the path between the source and the destination. The path is marked without more control packets being introduced into the network. The result is lower overhead. Different routing protocols modulate this behaviour by using a set of routing agents that cooperate among each other. Three different phases are usually considered: Route Discovery, Route Maintenance and Route Recovery. The Route Discovery is accomplished by using two types of control packets that execute the following procedure: a Forward Ant Packet (FANT) is sent from the source to the destination to discover a path and to establish the pheromone track back to the source; a Backward Ant Packet (BANT) is sent from the destination to the source to confirm the existence of a path between the two nodes and to establish the pheromone track back to the destination. In the basic Ant Routing Algorithm (ARA) [14], the control packets are broadcasted in the network, leading to the discovery of all paths between any pair of source-destination nodes. Nevertheless, during the Route Discovery phase, the network is flooded with control traffic and thus collisions will frequently happen and routing convergence may be hardly achieved. During a communication process, the associated routing entries need to be kept up-to-date. In ARA, this task is accomplished exclusively by data packets, which refresh both the direct and the reverse path entries. The pheromone value is periodically decreased using an exponential function, in order to remove unused paths. No overhead is needed to perform state maintenance in ARA. Nevertheless, the solution adopted is not realistic as traffic network is usually asymmetric, leading to a wrong perspective of the paths situation. For instance, an HTTP session, where most of the traffic comes from the server, will cause a higher pheromone level in the direct path (clientto-server), which is actually the least loaded one. AntHocNet routing [15] solves this problem by pro-actively maintaining the information of the active paths. Control packets (FANT and BANT) are used in this process, but a unicast procedure is used whenever the path information is still valid. In spite of the advantages of having additional mechanisms that are able to deal with traffic asymmetries, the incurred overhead and additional complexity make the AntHocNet state maintenance solution inadequate to deal with the reduced wireless resources. A Route Recovery procedure is executed when a topological failure is detected. In ARA, when a node detects a broken link, it uses an alternative path if it is available, or starts a re-routing procedure when this is not the case. As a missing ACK is used to detect this event, frequent and unnecessary routing recovery procedures may be triggered, leading to unstable data paths. AntHocNet solves this issue by using Hello packets to detect and maintain neighbourhood information. The route recovery procedure is triggered only when a certain number of missing Hello packets is detected. A complex re-routing procedure is used, where the node that detects the broken link signals this event to all its neighbours, which starts a recovery procedure which is similar to the one described above. III. SARA ARCHITECTURE SARA is a swarm intelligence routing algorithm, based on the ACO framework, which provides reduced overhead and procedures to identify possible link congestion situations. SARA uses the on-demand routing strategy and is able to discover and maintain multiple paths per destination. The algorithm quality converges to the shortest discovered paths, which will be selected to forward data packets. SARA gets some ideas from Opportunistic Routing to be applied on heuristic used to calculate the link probabilities. Accordingly with the state and routing capability for a particular link, SARA chooses one to forward packets to next hop

3 towards destination. A. Route Discovery Let us consider a network (see fig. 1) represented as a direct weighted graph G = (V, E), where V denotes the set of vertices and E denotes the set of edges with weight function w : E R. Also considering a source node s V, a destination node d V and a generic node u V. Adj[u] is the list of adjacencies of node u containing all the vertices to j G on node u neighbourhood. The Route Discovery procedure deals with the process of defining a path from s to d, when node s starts a new data session towards node d. To discover the path, FANT packets are sent from the source s to the destination d, regularly, using a controlled neighbour broadcast process, and BANT are unicasted from the destination d to the source s to mark the path. As soon as a BANT arrives at the source node, a trail of pheromones is left in the network and a path between s and d is ready to be used. During this process, the pheromone trail usually indicates the short discovered path 1, δ(s, d). In SARA, the FANTs are transmitted using a new broadcast scheme, the controlled neighbour broadcast, where every neighbour node J of a given node u receives a broadcasted FANT, but only the selected one (node J 0 ) will be able to re-broadcast it (see fig. 1). To implement this controlled neighbour broadcast scheme, every node must maintain the list of its own adjacencies upto-date. Thus, each node J periodically broadcasts very small packets, known as HELLO packets, which, when received by an adjacent node u, means that node u knows that node J is one of its neighbours, e.g. J Adj[u]. When a node u receives a FANT, it updates its own routing table with information of the path from itself to the source s (reverse path), using the relevant information contained in the FANT. Each routing entry carries the information of the destination node (d), the next hop (next) and the number of hops (n hops) towards the destination. As each FANT carries the information of the last node responsible for the broadcast process and the number of hops it travels, the receiving node u is able to update the reverse shortest discovered path δ(u, s), by comparing the stored information with the newly received one. Should a smaller number of hops found by the FANT, the next hop towards the source must be replaced. If the number of hops is the same as the smallest number found at that time, the routing table can add another entry. If a node has more than one entry in its routing table towards the source or the destination, it means that multiple paths that can be used, have been found. To minimise the occurrence of congestion, control packets should be as small as possible. Thus, every FANT is composed of the following set of fields: 1 The shortest discovered path represents the shortest path that is found during the route discovery phase, which may be different from the network s shortest path. the FANT identifier, N, which is generated by the source node and is unique for each pair of communicating nodes (s, d); the relevant path information, comprising the identification of the source node s, the destination node d and the previous node prev (for instance u); the identification of the node responsible for rebroadcasting the FANT (e.g. a specific node J Adj[u], named J 0 ); the number of hops, n hops, crossed since the FANT leaves the source node s until it reaches the current node (e.g. for J 0 this value is represented by n hops(s, J 0 )). F ANT (N, s, d,,, ), indicates the table of FANTs on node u and contains information about its neighbour nodes which have already processed FANT with identification N. After the node u terminates the update process, it selects which one of its neighbours, J, will be responsible for rebroadcasting the FANT. The selected node J 0 is probabilistically given by eq. 1. This selection deeply depends on the link weight, w (u,ji,d), of the adjacent nodes, J Ad[u]. p (u,j,d) = w (u,j,d) i Adj[u] w u,i,d A broader selection scheme is needed to allow a wide range of paths to be discovered. Thus, the previously selected nodes will be weighted according to the pheromone level and to the number of hops needed to reach the destination; and the nodes which have not been selected yet will have a unitary weight to increase their probability of selection. During the route discovery procedure, when a FANT is transmitted, all j nodes in the neighbourhood receive that FANT and all the nodes know where that FANT came from and which nodes have already processed that agent. This information is stored in a table. When a node u uses eq. 1 to calculate p (u,j,d) and every node that has already been visited by the FANT (in accordance with the information store locally), the link weight for node J will be 0 (see eq. 2). This way, it is possible to avoid loops and ensure that FANT will follow a unique path from the source to the destination. If a node u has no available way out to transfer the FANT to another node, when all its neighbours have processed the FANT, it sends an error message to the previous node reporting it can not forward the FANT. The previous node then updates the FANT information table and uses the 1 to recalculate the link probability. This procedure is repeated until the FANT reaches the destination (the network has an available path) or the error message arrives in the source node (there is not a valid path to the destination). Considering a pheromone level ϕ (u,ji,d); the convergence parameters used to reach the shortest discovered path δ(s, u) faster, F and e n hops (s,u) ; the link weight w (u,j,d) E is given by eq. 2. (1)

4 w (u,ji,d) = 0 if J i F ANT (N, s, d,,, ) 1 if ϕ (u,ji,d) = 0 ϕ F (u,j i,d) e nhops (s,u) if ϕ (u,ji,d) 0 (2) Through the F parameter, the heuristics used to calculate the link weight become more or less greedy. Greedy heuristics allow the traffic to converge faster to one route, but reduces the probability of exploring alternative routes. The value of F must be a commitment between the kind of traffic and the resources available in the network. When a FANT arrives at the destination node d, this node sends a BANT to the source node s that is used to mark the path, using unicast communication. When a node u receives a BANT, it uses this packet to update the direct path from itself to the destination node d. The BANT is then unicasted to the next neighbour node, which is the one that leads to source node s through the shortest discovered path (see fig 1). Fig. 1. FANT transmission using controlled neighbour broadcast, BANT transmission using controlled neighbour broadcast When a BANT is received by a node, it updates the reverse shortest path. Should a shorter path be discovered, the oldest routing information will be replaced by the new one (see fig. 1). When the first BANT arrives at the source node, it means that the network has established a route between s and d and may start transmitting data. B. Route Maintenance The Route Maintenance procedure deals with the process of maintaining the paths active. Usually, data traffic is used to refresh these paths and to update the pheromone values of the links. However, as the pheromones decay with time, the least used links may reach a very small weight and, if multiple paths are required, an on-demand Route Maintenance procedure must be triggered. The node which is responsible for triggering such procedure is the source node s, which transmits a Refresh FANT (RF FANT) packet to the destination d, whenever it detects a link weight smaller than a given threshold value, lower lim. A node which receives the RF FANT replies with a Refresh BANT (RF BANT) packet whenever it knows a path to the destination node (it has a valid routing entry associated with that node); otherwise, it replies with an RF ERROR indication, meaning that it does not know how to reach the destination. When a node receives an RF BANT, it refreshes the routing entry associated with the destination node; otherwise, if an ERROR or a time-out are received, the corresponding entry is removed from the routing table. The pheromone level decays according to eq. 3, where ϕ (u,j,d) is the new pheromone value and ϕ (u,j,d) is the old value. γ represents the decreased quantity of the pheromone level and depends on the existence or absence of traffic passing through the link. The behaviour of the pheromone level presents an exponential arc. C. Route Recovery ϕ (u,j,d) = ϕ (u,j,d) γ { γ 1 with traffic = γ 2 without traffic During the transmission of data connectivity may be broken, due to a wide variety of reasons. To assure the transmission this event must be detected as soon as possible and the broken route must be repaired very fast, in order to avoid service disruption. A link is considered broken when a node misses a certain number of ACK from CTS/RTS. Whenever a broken link is detected by a node, this node should search its own routing table and should try to find alternative paths to the destination node. If such paths are available, data traffic may be sent again, using the new route. Otherwise, the node tries a local recovery procedure, which is executed within the node neighbourhood by sending a Route Recovery FANT (RR FANT) that attempts to repair the route within this neighbourhood. When a node receives an RR FANT and has a valid routing entry to the destination node, it sends a Route Recovery BANT (RR BANT) through the same path; otherwise, it re-broadcasts the RR FANT packet. The Route Recovery procedure ends when the node that triggers it receives an RR BANT packet. If no RR BANT packet is received at the node which started the repair procedure, it means that the local recovery procedure was not successful and this node sends a Route Recover ERROR (RR ERROR) to the source node. Upon receiving it, the source node starts a new Route Discovery procedure. D. Congestion links - early detection procedure SARA uses the pheromone to label a route from the source to the destination. The pheromone level is maintained by the traffic which travels on that path. The pheromone level can be an indicator which represents the network state. When the network has enough resources to accommodate new data sessions or to allow the increase of the data rate for the existing ones, the pheromone level also increases. However, when the available resources become scarce, the data traffic may not be enough to maintain the pheromone level. (3)

5 Looking the way the pheromone level changes, it is possible to make a decision about what to do: use another route to balance the load through the network (if multiple routes are available) or start a new route discovery procedure and try to find another (less congested) path. This way, biological algorithms like SARA have tools to adapt themself to network variations without applying undue overhead and have the benefit of reducing the packet loss rate and the delay between the source and the destination. B. Performance evaluation on a MANET The test scenario simulates an area of 1000m x 1000m, illustrated in fig. 2. Each node was configured with mobility parameters. In each simulation, all the nodes present the same speed with a random direction function. The node speed changes from 0 ms -1 (to obtain some reference values) until 10 ms -1. IV. SIMULATION STUDIES The proposed method was compared with AODV and ARA via simulation, performed using the Network Simulator 2.29 version, enhanced to support both the ARA and the SARA routing protocols. A. Simulation set-up The SARA set-up procedure took place by tuning some working parameters which allow the algorithm to improve its performance. The parameters to be set-up are: the convergence greedy factor F (eq. 2) and the pheromone lifespan. The F factor allows for the verification of the SARA convergence capability to use the shortest path found. The pheromone lifespan gives SARA a certain level of autonomy to allow forself configuration in accordance with the load at the network. The F value is a parameter which allows for SARA to converge faster to one route when in the presence of a multipath to the destination. The heuristics used to calculate the probability of choosing a certain link are greedy heuristics. The higher the F, greedier the heuristics. When the value of F increases, the probability that SARA will choose a path where the passage of packets has already been noted, will also increase. However, it is possible that this path is not the the best path on the network. So, it is necessary to identify what the ideal value of greedy is to optimise the algorithm s performance. To find an optimal value for the time to consider the pheromone is active, a test simulation scenario with different values was used. The pheromone lifespan must have a weight value which can adjust to the network traffic variations, reducing broken link and congestion situations. It must also be able to perform a self configuration when the network resources change. If the lifespan is small, the presence of a higher rate packet session is necessary to maintain the pheromone level. If it is not possible, the algorithm will frequently lose information about how to reach the destination node and will start a new route discovery procedure. As the pheromone s lifespan increases, the route stability also increases. However, for higher values, because SARA uses greedy heuristics, when in the presence of a congestion link, even if SARA intends to start a route discovery procedure to find a new route, that might not be possible because the old path still has a strong pheromone value leading to the congested path. The pheromone lifespan should be between 1s and 5s. Fig. 2. Test scenario In each test, the user session was modelled by a file transfer, accomplished through the use of the File Transfer Protocol (FTP) over the Transport Connection Protocol (TCP), using data packets of 1000 bytes. The network load was gerenated by four user sessions, for 60 seconds (simulation time). Each session starts 5 seconds after the previous one, the test session being the last one to be established. The source and the destination nodes are randomly selected, being kept the same for all the three routing protocols under evaluation. The SARA configuration values are presented in tab. I. Name Value F 5 Pheromone life time 1s TABLE I SARA CONFIGURATION VALUES In the test scenario, the pair of nodes in communication will become closer in an initial phase and will, later, become further from each other. Each phase is related to the network node s velocity. In this scenario, due to the simulation time chosen (60 seconds), for a velocity of 6ms -1, the nodes in communication will present an approach behaviour. With velocities higher than 7ms -1, it is possible to notice the two phases behaviour. Thus, when velocity increases, the three algorithms show a better performance due to node proximity because the path becomes shorter and the time the packets spend on network travelling from the source to the destination is also lower. C. Simulation results The simulation studies that were carried out are aimed at evaluating and comparing the performance achieved by SARA and by the other routing protocols under analysis, during the Route Discovery process.

6 The evaluation comprises three metrics: Routing protocol overhead, which is determined by the ratio between the amount of information needed to carry control traffic over the amount of information need to carry data traffic. Data delivered at the destination, which evaluates the quality of the routes and the capacity of the routing algorithm to maintain the data flow associated with a session active. The study of SARA s performance is illustrated in figs. 3 and fig. 4 considering the network mobility. At lower velocity, the network topology presents small changes. This way, the congestion situations tend to be maintained through the whole simulation time. Therefor, the number of route repair and route discovery procedures will increase. This fact is shown in fig. 3 with higher overhead at low velocity. When the network node s mobility increases, the nodes in communication get closer and the communication lines associated with each session spread through the simulated scenario. This event makes the reduction of the number of collisions and the improvement of the algorithms performance possible. SARA was written to present optimised overhead values. During the route discovery procedure, the controlled neighbour broadcast allows for the reduction of control traffic. The amount of overhead generated by SARA tends to be the same with slight variations as a consequence of node mobility. Control/Data Traffic [%] Algorithm behaviour - OVERHEAD Fig. 3. Network node velocity (m/s) SARA ARA AODV Simulation scenario - Overhead The volume of data received at the destination in a certain time period is related to the time spent on route discovery and on route repair, as well as to the delay in transporting the packets through the network (link transmission time and node process time). Thus, the algorithm s performance can be measured by the amount of information (data packets) delivered at the destination according to the period of time. In accordance with fig. 4, SARA can route a larger volume of data packets. This value is associated with the amount of control traffic generated and the capability to adapt itself to network changes. V. CONCLUSIONS MANET has limited and scarce resources and thus routing protocols in such environments must be kept as simple as possible. The routing protocol proposed in this paper, SARA, inspired in insect societies behaviour, uses a controlled neighbour broadcast scheme as a way of achieving faster convergence Data received [in MB] Fig. 4. Algorithm behaviour - Data received Network node velocity (m/s) SARA ARA AODV Simulation scenario - Data traffic delivered with very reduced overhead. Simulation results have proved that SARA offers a low overhead solution, with rapid convergence to a reduced set of stable paths. Further studies are needed to evaluate its performance under mobile environments where efficient route recovery procedures must also be addressed. REFERENCES [1] G. A. Forman and J. Zahorjan, The challenges of mobile computing, IEEE Computer, vol. 27, no. 1, pp , Apr [2] W. Creixell and K. Sezaki, Routing protocol for ad hoc mobile networks using mobility prediction, Int. J. of Ad Hoc and Ubiquitous Computing, vol. 2, pp , Feb [3] G. He, Destination-sequenced distance vector (DSDV) protocol, May [4] T. Clausen and P. Jacquet, Optimized Link State Routing Protocol (OLSR) - RFC3626, IETF Network Working Group, October [5] C. E. P. E. Belding-Royer and S. R. Das, Ad hoc On-Demand Distance Vector (AODV) Routing - RFC3561, IETF NetworkWorking Group, July [6] D. B. Johnson and D. A. Maltz, Dynamic source routing in ad hoc wireless networks, in Mobile Computing, ser. THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE, Imielinski and Korth, Eds. Kluwer Academic Publishers, 1996, vol. 353, imielins/book.html. [7] V. D. Park and M. S. Corson, A performance comparison of the temporally-ordered routing algorithm and ideal link-state routing, in ISCC 98: Proceedings of the Third IEEE Symposium on Computers & Communications. Washington, DC, USA: IEEE Computer Society, 1998, p [8] N. Beijar, Zone Routing Protocol (ZRP), May [Online]. [9] C. Bonnet, N. Nikaein, and N. Nikaein, HARP - Hybrid Ad hoc Routing Protocol, Sept [10] J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. G. Jetcheva, A performance comparison of multi-hop wireless ad hoc network routing protocols, in MOBICOM, 1998, pp [11] Z. Liu, M. Z. Kwiatkowska, and C. C. Constantinou, A biologically inspired qos routing algorithm for mobile ad hoc networks, in AINA, 2005, pp [12] R. G. M. A. R. W. G. A. E. Saddik, Ant Colony-Based Reinforcement Learning Algorithm for Routing in Wireless Sensor Networks, in Instrumentation and Measurement Technology Conference Proceedings. IEEE, 1 3 May 2007, pp [13] G. Theraulaz and E. Bonabeau, A brief history of stimergy, Artificial Life, vol. 5, no. 2, pp , [14] M. G. M. K. I. Bouazizi, Ant routing algorithm (ara) for mobile multi-hop ad-hoc networks - new features and results, in The Second Mediterranean Workshop on Ad-Hoc Networks, [15] G. Di Caro, F. Ducatelle, and L. M. Gambardella, AntHocNet: an Ant- Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks, in Parallel Problem Solving from Nature - PPSN VIII, ser. LNCS, vol. 3242, Sep 2004, pp

ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET)

ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET) ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET) DWEEPNA GARG 1 & PARTH GOHIL 2 1,2 Dept. Of Computer Science and Engineering, Babaria Institute of Technology, Varnama, Vadodara, India E-mail

More information

MANET routing protocols based on swarm intelligence

MANET routing protocols based on swarm intelligence MSC SEMINAR - PERVASIVE AND ARTIFICIAL INTELLIGENCE RESEARCH GROUP, DEPARTMENT OF INFORMATICS, UNIVERSITY OF FRIBOURG. JUNE 20111 MANET routing protocols based on swarm intelligence Iliya Enchev Pervasive

More information

[Jagtap*, 5 (4): April, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785

[Jagtap*, 5 (4): April, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A SURVEY: ANT BASED BIO-INSPIRED ALGORITHM FOR AD-HOC NETWORK Anjali A Jagtap *, Prof. Ankita Agarwal, Prof. Dipak R Raut, Prof.

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

A Review of Ant Colony based Routing Algorithm in Wireless Ad-hoc Networks

A Review of Ant Colony based Routing Algorithm in Wireless Ad-hoc Networks A Review of Ant Colony based Routing Algorithm in Wireless Ad-hoc Networks Sai Priya Thottempudi $, Dr Syed Umar * $ Student, Department of ECE, V R Siddhartha Eng College, A.P.INDIA. * Assoc. Professor,

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

AWERProcedia Information Technology & Computer Science

AWERProcedia Information Technology & Computer Science AWERProcedia Information Technology & Computer Science Vol 03 (2013) 1424-1429 3 rd World Conference on Information Technology (WCIT-2012) Comparison of routing protocols in mobile ad-hoc wireless networks

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks

AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks Gianni Di Caro, Frederick Ducatelle and Luca Maria Gambardella Technical Report No. IDSIA-25-04-2004 August 2004 IDSIA / USI-SUPSI

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

A Swarm-based Distance Vector Routing to Support Multiple Quality of Service (QoS) Metrics in Mobile Adhoc Networks

A Swarm-based Distance Vector Routing to Support Multiple Quality of Service (QoS) Metrics in Mobile Adhoc Networks Journal of Computer Science 3 (9): 700-707, 2007 ISSN 1549-3636 2007 Science Publications A Swarm-based Distance Vector Routing to Support Multiple Quality of Service (QoS) Metrics in Mobile Adhoc Networks

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

Models for pheromone evaluation in Ant Systems for Mobile Ad-hoc networks

Models for pheromone evaluation in Ant Systems for Mobile Ad-hoc networks Models for pheromone evaluation in Ant Systems for Mobile Ad-hoc networks Fernando Correia Portuguese Naval Academy/I.S.T Lisboa Portugal fcorreia@tagus.inesc-id.pt Teresa Vazão Inesc-ID/I.S.T. Lisboa

More information

PERFORMANCE ANALYSIS OF QUALITY OF SERVICE ENABLED TEMPORALLY ORDERED ROUTING ALGORITHM USING ANT COLONY OPTIMIZATION IN MOBILE AD HOC NETWORKS

PERFORMANCE ANALYSIS OF QUALITY OF SERVICE ENABLED TEMPORALLY ORDERED ROUTING ALGORITHM USING ANT COLONY OPTIMIZATION IN MOBILE AD HOC NETWORKS R. Asokan et al. : Performance Analysis of Quality of Service Enabled Temporally Ordered Routing Algorithm Using Ant Colony Optimization in Mobile Ad Hoc Networks Advances in Engineering Science 11 Sect.

More information

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,

More information

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Highly Effective and Efficient Route Discovery & Maintenance in DSR A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks 2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath

More information

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes Ruchi Khandelwal 1 & Akhilesh Kosta 2 Department of Computer Science and Engineering

More information

ANALYSIS OF ANTHOCNET AND AODV PERFORMANCE USING NS2

ANALYSIS OF ANTHOCNET AND AODV PERFORMANCE USING NS2 ANALYSIS OF ANTHOCNET AND PERFORMANCE USING NS2 Y. Lakshmi Prasanna 1 and Dr. P. Chenna Reddy 2 1 Department of Computer Science and Engineering, JNTUACEP, Pulivendula 2 Professor of CSE Department, JNTUACEP,

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Adhoc Network Routing Optimization and Performance Analysis of ACO Based Routing Protocol

Adhoc Network Routing Optimization and Performance Analysis of ACO Based Routing Protocol Adhoc Network Routing Optimization and Performance Analysis of ACO Based Routing Protocol Anubhuti Verma Abstract Ant Colony Optimization is based on the capability of real ant colonies of finding the

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information

Performance evaluation of AODV, DSDV and AntHocNet in video transmission

Performance evaluation of AODV, DSDV and AntHocNet in video transmission Performance evaluation of AODV, DSDV and AntHocNet in video transmission Neelam S. Labhade, S.S.Vasekar Abstract Now a days wireless technologies are important in the world of communication due to its

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks Won-Ik Kim Radio Performance Analysis Section Electronics & Telecommunications Research Institute 161 Kajong-dong,

More information

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering

More information

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh Amity University Rajasthan, Jaipur, India Abstract MANET is a dynamic topology wireless network in which

More information

International Journal of Advancements in Research & Technology, Volume 2, Issue 9, September-2013 SN

International Journal of Advancements in Research & Technology, Volume 2, Issue 9, September-2013 SN International Journal of Advancements in Research & Technology, Volume 2, Issue 9, September-2013 146 Survey of Swarm Intelligence Inspired Routing Algorithms and Mobile Ad-Hoc Network Routing Protocols

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Ant-DYMO: A Bio-Inspired Algorithm for MANETS

Ant-DYMO: A Bio-Inspired Algorithm for MANETS 21 17th International Conference on Telecommunications Ant-: A Bio-Inspired Algorithm for MANETS José Alex Pontes Martins Universidade Vale do Acaraú (UVA) Sobral, Brazil 62.4 37 Email: alexmartins@larces.uece.br

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORK BASED ON SWARM INTELLIGENCE

ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORK BASED ON SWARM INTELLIGENCE International Journal of Latest Trends in Engineering and Technology Special Issue SACAIM 2016, pp. 71-77 e-issn:2278-621x ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORK BASED ON SWARM INTELLIGENCE Manibushan

More information

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Sharma Shelja, Kumar Suresh and Rathy R. K. Department of CSE, FET, MRIU, Faridabad, India Email: sharma.shelja@gmail.com, enthusk@yahoo.com,

More information

ROUTING IN MANETS USING ACO WITH MOBILITY ASSISTANCE

ROUTING IN MANETS USING ACO WITH MOBILITY ASSISTANCE ISSN : 0973-7391 Vol. 3, No. 1, January-June 2012, pp. 97-101 ROUTING IN MANETS USING ACO WITH MOBILITY ASSISTANCE Praveen Biradar 1, and Sowmya K.S 2 1,2 Dept. Of Computer Science and Engineering, Dayananda

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob

More information

Comparative Analysis of AntHocNet, AODV, DSR Routing Protocols for Improvising Loss Packet Delivery Factor

Comparative Analysis of AntHocNet, AODV, DSR Routing Protocols for Improvising Loss Packet Delivery Factor Comparative Analysis of,, Routing Protocols for Improvising Loss Packet Delivery Factor Maahi Amit Khemchandani #1, Prof. B. W. Balkhande *2 #1 Saraswati College of Engineering, Computer Engineering Department,

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

Power aware Multi-path Routing Protocol for MANETS

Power aware Multi-path Routing Protocol for MANETS Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile

More information

Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks

Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks 2009 International Conference on Intelligent Networking and Collaborative Systems Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks Saud Al otaibi Software Technology Research Laboratory

More information

QUERY LOCALIZATION USING PHEROMONE TRAILS: A SWARM INTELLIGENCE INSPIRED APPROACH. Nupur Kothari, Vartika Bhandari and Dheeraj Sanghi

QUERY LOCALIZATION USING PHEROMONE TRAILS: A SWARM INTELLIGENCE INSPIRED APPROACH. Nupur Kothari, Vartika Bhandari and Dheeraj Sanghi QUERY LOCALIZATION USING PHEROMONE TRAILS: A SWARM INTELLIGENCE INSPIRED APPROACH Nupur Kothari, Vartika Bhandari and Dheeraj Sanghi Department of Computer Science & Engineering Indian Institute of Technology

More information

Ant-based Dynamic Hop Optimization Protocol: a Routing Algorithm for Mobile Wireless Sensor Networks

Ant-based Dynamic Hop Optimization Protocol: a Routing Algorithm for Mobile Wireless Sensor Networks Joint Workshop of SCPA 2011 and SaCoNAS 2011 Ant-based Dynamic Hop Optimization Protocol: a Routing Algorithm for Mobile Wireless Sensor Networks Alexandre Massayuki Okazaki and Antônio Augusto Fröhlich

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

Overhead Reduction and Performance Enhancement of AODV and DSR Routing Protocols

Overhead Reduction and Performance Enhancement of AODV and DSR Routing Protocols Overhead Reduction and Performance Enhancement of AODV and DSR Routing Protocols Prabhat Kumar Khemariya Department of Electronics & Communication Engineering Sagar Institute of Research, Technology and

More information

ANT INTELLIGENCE ROUTING

ANT INTELLIGENCE ROUTING AJSTD Vol. 25 Issue 1 pp. 81-93 (2008) ANT INTELLIGENCE ROUTING Chye Ong Gan, K. Daniel Wong, and Wei-Lee Woon Malaysia University of Science and Technology Received 30 October 2006 ABSTRACT We introduce

More information

Speed Performance of Intelligent Ant Sense Routing Protocol for Mobile Ad-Hoc Personal Area Network

Speed Performance of Intelligent Ant Sense Routing Protocol for Mobile Ad-Hoc Personal Area Network International Journal of Computer Science and Telecommunications [Volume 4, Issue 10, October 2013] 41 ISSN 2047-3338 Speed Performance of Intelligent Ant Sense Routing Protocol for Mobile Ad-Hoc Personal

More information

Impact of Hello Interval on Performance of AODV Protocol

Impact of Hello Interval on Performance of AODV Protocol Impact of Hello Interval on Performance of AODV Nisha Bhanushali Priyanka Thakkar Prasanna Shete ABSTRACT The multi-hop ad hoc networks are self organizing networks with dynamic topology. The reactive

More information

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS , pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,

More information

Performance Analysis of Routing Protocols in MANETs Using OPNET 14.0

Performance Analysis of Routing Protocols in MANETs Using OPNET 14.0 Performance Analysis of Routing Protocols in MANETs Using OPNET 14.0 Karanveer Singh 1, Naveen Goyal 2 1 Research Scholar,ECE Deptt.,Bhai Gurdas Institute of Engineering and Technology, Sangrur 2 Assistant

More information

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks P.Suganthi Research Scholar Mother Teresa Women s University Kodaikanal, TamilNadu, India Dr.A.Tamilarasi

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS G. Poornima 1, Mr. M. Rajasenathipathi 2, 1 Research Scholar, Department of Computer Science, NGM College, Pollachi 2 Assistant Professor, Department

More information

A Distributed Weighted Cluster Based Routing Protocol for MANETs

A Distributed Weighted Cluster Based Routing Protocol for MANETs Wireless Sensor Network, 2011, 3, 54-60 doi:10.4236/wsn.2011.32006 Published Online February 2011 (http://www.scirp.org/journal/wsn) A Distributed Weighted Cluster Based Routing Protocol for MANETs Abstract

More information

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014 Throughput Analysis of Proactive and Reactive MANET Routing Protocols Kiranveer Kaur 1 Surinderjit Kaur 2 Vikramjit Singh 3 Department of Computer Science, University College of Engineering, Department

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Gurleen Kaur Walia 1, Charanjit Singh 2

Gurleen Kaur Walia 1, Charanjit Singh 2 Simulation based Performance Evaluation and Comparison of Proactive and Reactive Routing Protocols in Mobile Ad-hoc Networks Gurleen Kaur Walia 1, Charanjit Singh 2 1,2 UCoE Department, Punjabi University,

More information

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer

More information

The Efficient Ant Routing Protocol for MANET

The Efficient Ant Routing Protocol for MANET The Efficient Ant Routing Protocol for MANET Srinivas Sethi Dept. of CSEA IGIT Sarang Orissa, India Siba K.Udgata Dept. of Computer and Information Sciences University of Hyderabad Hyderabad, India ABSTRACT

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes

A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes Chetana K. Kamate, Dr. Santosh L. Deshpande Department P.G. Studies in Computer Network and Engineering,

More information

Performance Analysis of Mobile Ad-hoc Network Using AODV Protocol

Performance Analysis of Mobile Ad-hoc Network Using AODV Protocol Performance Analysis of Mobile Ad-hoc Network Using AODV Protocol Dr. Aditya Goel Department of Electronics & Communication Engineering Maulana Azad National Institute of Technology (Deemed University)

More information

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through

More information

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs Beacon Update for Greedy erimeter Stateless Routing rotocol in MANETs Abstract Dhanarasan 1, Gopi S 2 1 M.E/CSE Muthayammal Engineering College, getdhanarasan@gmail.com 2 Assistant rofessor / IT Muthayammal

More information

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS ix TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS v xiv xvi xvii 1. INTRODUCTION TO WIRELESS NETWORKS AND ROUTING PROTOCOLS 1 1.1

More information

Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad Hoc Networks: DSR, AODV, AOMDV, TORA

Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad Hoc Networks: DSR, AODV, AOMDV, TORA 2666 Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad Hoc Networks: DSR, AODV, AOMDV, TORA S.Nagalakshmi Research Scholar, Dept Of Information Science and Engineering,Dr AIT,

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet)

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet) Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet) Dr. Naveen Kr. Singh Ms. Neetu Sharma Ms. Shweta Agarwal Asso. Prof. Asstt. Prof. Asstt. Prof. ABES Engineering College ABES

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network Author manuscript, published in "ITCom 6 - next generation and sensor networks, Boston : United States (26)" DOI :.7/2.68625 Performance evaluation of reactive and proactive routing protocol in IEEE 82.

More information

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Akshay Shankar, Lavanya Chelle Information Science Engineering RNS Institute of Technology Bangalore, India Abstract- A Mobile

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK Nalin Gahlaut 1, Jaya sharma 2, Pankaj Kumar 3, Kaushal Kumar 4 1 Doctoral Candidate, Uttarakhand Technical University,

More information

Review paper on performance analysis of AODV, DSDV, OLSR on the basis of packet delivery

Review paper on performance analysis of AODV, DSDV, OLSR on the basis of packet delivery IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 1 (May. - Jun. 2013), PP 51-55 Review paper on performance analysis of AODV, DSDV, OLSR on the basis

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing Mobile Adhoc Networks and Routing in MANETS (most of the slides borrowed from Prof. Sridhar Iyer) Diwakar Yagyasen 1 Index Mobile Ad Hoc Networks (MANET) MAC in MANET MANET routing

More information

Maharishi Markandeshwar University

Maharishi Markandeshwar University RESEARCH ARTICLE OPEN ACCESS Simulation Based Performance Comparison of Adhoc Routing Protocols Kushagra Agrawal*, Shaveta Jain** *Department of Computer Science,, Mullana, Ambala agrawal_kushagra@rediffmail.com

More information

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET Performance Evaluation of AODV DSDV and OLSR Protocols with Varying FTP Connections in MANET Alok Upadhyay, Rupali Phatak Research Scholar, Asst. Professor -Department of Electronics & Communication Engineering

More information

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT

More information

A Fuzzy Optimized, Bee inspired Routing Protocol for Improved QoS in Mobile Ad Hoc Networks

A Fuzzy Optimized, Bee inspired Routing Protocol for Improved QoS in Mobile Ad Hoc Networks , pp.169-174 http://dx.doi.org/10.14257/astl.2016.135.41 A Fuzzy Optimized, Bee inspired Routing Protocol for Improved QoS in Mobile Ad Hoc Networks Anush Baskaran, Sushant Ramesh, Ronnie D. Caytiles*

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH VOLUME 5, ISSUE 3, MARCH-2014 ISSN

INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH VOLUME 5, ISSUE 3, MARCH-2014 ISSN 657 Performance Evaluation of DDSR via NS- 3 Simulation using RSU s in Vehicular Network Abhay Deep Seth, Ankit Khare Abstract: - Mobile Ad hoc Networks (MANET) are wireless networks without an infrastructure,

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

Comparison of Various Routing Protocols & Brief of MANET

Comparison of Various Routing Protocols & Brief of MANET International Journal of Modern Trends in Engineering and Research www.ijmter.com Comparison of Various Routing Protocols & Brief of MANET Akashkumar Patel 1, Rakshitkumar Hirapara 2, Vivekkumar Dhamecha

More information

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8] 192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer

More information