Expanding Ring Search for Route Discovery in LOADng Routing Protocol

Similar documents
A Depth First Forwarding (DFF) Extension for the LOADng Routing Protocol

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

INTERNATIONAL JOURNAL OF COMMUNICATIONS Volume 12, Performance comparative analysis of LOADing-CTP and RPL routing protocols for LLNs

Comparative Study of RPL-Enabled Optimized Broadcast in Wireless Sensor Networks

CMPE 257: Wireless and Mobile Networking

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

AODV-PA: AODV with Path Accumulation

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

A Comparative Performance Study of the Routing Protocols RPL, LOADng and LOADng-CTP with Bidirectional Traffic for AMI Scenario

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

2013, IJARCSSE All Rights Reserved Page 85

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

On the Need of Source Address for Route-Error Delivery in 6LoWPAN

LECTURE 9. Ad hoc Networks and Routing

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Figure 1: Ad-Hoc routing protocols.

Mobile Communications. Ad-hoc and Mesh Networks

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Performance Analysis of MANET Routing Protocols OLSR and AODV

Redes Inalámbricas Tema 4. Mobile Ad Hoc Networks

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network

Delay Tolerant Networking with OLSRv2

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Routing over Low Power and Lossy Networks

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

An Adaptive Jitter Mechanism for Reactive Route Discovery in Sensor Networks

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

Performance Evaluation of Various Routing Protocols in MANET

Mobile Ad-Hoc Networks & Routing Algorithms

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

Routing in Variable Topology Networks

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Recent Researches in Communications, Information Science and Education

Performance Evaluation of MANET through NS2 Simulation

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

Performance Analysis of Various Routing Protocols for Motorway Surveillance System Cameras Network

The Performance of MANET Routing Protocols for Scalable Video Communication

Performance of Routing Protocols in Very Large-Scale Mobile Wireless Ad Hoc Networks

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

Investigation on OLSR Routing Protocol Efficiency

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Computation of Multiple Node Disjoint Paths

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Performance Enhancement of Reactive on Demand Routing Protocol in Wireless Ad Hoc Network

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

Impact of Hello Interval on Performance of AODV Protocol

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

Performance Analysis of Aodv Protocol under Black Hole Attack

Routing Protocols in MANETs

ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Specification-based Intrusion Detection. Michael May CIS-700 Fall 2004

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

Evaluation of Routing Protocols for Mobile Ad hoc Networks

COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

To enhance Routing in ZigBee Wireless Networks

Reconfigure ZigBee Network Based on System Design

The P2P-RPL Routing Protocol for IPv6 Sensor Networks: Testbed Experiments

Multicasting in Ad-Hoc Networks: Comparing MAODV and ODMRP

An Adaptive Congestion Avoidance ACA_AODV Routing Protocol

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator

Routing Protocols in Mobile Ad-Hoc Network

October Copyright (C) The Internet Society (2003). All Rights Reserved.

Study and Analysis of Routing Protocols RIP and DSR Using Qualnet V5

Performance Comparison of AODV and AOMDV Routing Protocols in Mobile Ad Hoc Networks

Study of RPL DODAG Version Attacks

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks

Arvind Krishnamurthy Fall 2003

Impact of Link Discovery Delay on Optimized Link State Routing Protocol for Mobile ad hoc Networks

An Implementation Study of the AODV Routing Protocol

Performance Analysis and Enhancement of Routing Protocol in Manet

Routing in ad-hoc networks Marina Dupcinov, Srdjan Krco Applied Research Lab, EEI, Ericsson Ireland

Routing Protocols in MANET: Comparative Study

A New Energy-Aware Routing Protocol for. Improving Path Stability in Ad-hoc Networks

Gateway Forwarding Strategies for Ad hoc Networks

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

COMPARISON OF DSR PROTOCOL IN MOBILE AD-HOC NETWORK SIMULATED WITH OPNET 14.5 BY VARYING INTERNODE DISTANCE

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks

Transcription:

Expanding Ring Search for Route Discovery in LOADng Routing Protocol Antonin Bas, Jiazi Yi, Thomas Clausen Laboratoire d Informatique (LIX) Ecole Polytechnique, France) antonin@antonin-bas.fr, jiazi@jiaziyi.com, Thomas@ThomasClausen.org Abstract LOADng is an on-demand routing protocol, derived from AODV, simplified for use in lossy, low-power and constrained environments, where the ability for devices to communicate is a commodity to their primary function, and where therefore not only the communications channel offers limited capacity, but also the resources available to the device s communications subsystem are limted. LOADng simplifies AODV in a number of ways, notably the route discovery process by removing intermediate/gratuitous Route Replies sacrificing that functionality in order to attain smaller control messages and less router state and processing. Alas, this comes at an expense: in some situations, LOADng produces increased control traffic overhead (as compared to AODV), and more control messages transmissions means tapping into the device s limited resources. This paper presents a simple mechanism by which to integrate Expanding Ring flooding into LOADng. The mechanism is described, and the result of simulation studies are presented, showing that both in scenarios with point-to-point (any-to-any) traffic and in scenarios with multipoint-to-point (all traffic sent to the same destination, as in a data acquisition sensor network) traffic, considerable savings in control traffic overhead can be achieved without loss in data delivery ratios. 1. Introduction For on-demand routing protocols like AODV [1] and its derivatives (LOAD, LOADng [2]), the route discovery procedure is the most costly operation in the protocol. To discover a route to a certain destination, a Route Request () message is flooded through the network. To reduce the flooding overhead and make use of existing routing information, AODV uses intermediate Route Reply (RREP) messages and Expanding Ring search, with the cost of more complex sequence numbers in the control packet to avoid loops. LOADng [2] is a derivative of AODV, targeting routing in low-power and lossy networks, where the communications channel is characterized by a high risk of packet loss and (typically) very small frame sizes, very limited throughput, and where routers have strict bounds on memory, processing power and energy. This implies a requirement for a routing protocol of extreme simplicity: minimal state can be maintained, protocol operations must be simple, and control traffic must be minimal - both in terms of number of messages exchanged (each transmission takes energy and consumes network capacity better used for data) and in terms of the size of these messages, so as to avoid fragmentation. For example, using 6LoWPAN over 82.15.4 [3], leaves only 81 octets for payload in each frame transmitted and, over a lossy network, fragmenting a packet naturally increases the risk of one of the frames in that packet being lost, thus loosing the whole packet. LOADng simplifies AODV in a number of ways, as documented in [4] and one of those simplifications is eliminating intermediate RREP, so as to guarantee loop freedom, and reduce the control message size and the complexity of protocol operation for constrained environments. A comparison of LOADng with RPL and AODV has been performed in [4, 5]. To avoid increasing control overhead too much in some scenarios, LOADng also introduces

D A S B C Figure 1: Route Discovery. S initiates an for D. A, B and C already know routes to D. a new propagation scheme, called Smart, which takes advantage of existing routing information in intermediate routers. 1.1. Paper Outline The remainder of this paper is organized as follows: section 2 describes the Expanding Ring flooding mechanism, as used in AODV. Section 3 describes LOADng - the derivative of AODV for low-power and lossy networks - as well as the Smart extension, the simple and efficient mechanism replacing the intermediate RREPs otherwise used in AODV. Section 4 presents how to integrate Expanding Ring search into LOADng the performance of which is studied by way of network simulations, and presented in section 5. Section 6 concludes this paper. 2. AODV and Expanding Ring Flooding The basic operation in AODV is Route Discovery. During Route Discovery, messages are flooded trough the network, indicating the address to which a route is sought. Upon receiving an, the router which is responsible for the address listed in the will respond with an RREP, sent in unicast to the source of the. In AODV, if an intermediate router receiving the has a (valid) route to the address listed in the, it may send an intermediate RREP to the source of the, as well as a gratuitous RREP to the intended destination (both as unicast), so as to establish a bi-directional route. This permits, in some cases, avoiding an being flooded through the entire network, with the ambition of reducing the control traffic incurring from Route Discovery, illustrated in figure 1, which shows 5 routers from an N-router network (where N > 5). S initiates an for D. The neighbors of S: A, B, C already have valid routes to D. Without intermediate RREPs, all routers other than the destination have to retransmit the, i.e., there are at least N 1 transmissions. In contrast, with intermediate RREP, route discovery will remain local to the neighborhood of S: A, B, C would generate intermediate RREPs to S. Although in this example, those RREPs would be discarded as providing longer routes, using intermediate RREPs would avoid s being disseminated blindly through the whole network. 2.1. Expanding Ring flooding In AODV, an Expanding Ring flooding mechanism is used for route discovery, in order to further avoid network-wide dissemination of s. A router will at first send an with a reduced TTL causing the to not be flooded through the entire network, but only up to a limited distance. Only if no intermediate RREP results, will the router attempt to

flood the entire network. [1] recommends starting with TTL=1, then do successive floods with the TTL increasing by 2 each time until TTL=7 after which classic flooding is employed. Note that while this may be an advantage in some cases, this mechanism can be a doubleedged sword, which may cause increased rather than decreased control traffic: if no router closer to the originator of an than the final destination has a route to the destination, much more control traffic can be generated by such repeated Expanding Ring floods. 3. LOADng and Smart As a reactive distance-vector protocol and a light-weight derivative of AODV, LOADng [2] targets routing in low power and constrained environments. It inherits the basic properties and operations of AODV, including generation of Route Requests (s) by a router (originator) for discovering a route to a destination, forwarding of such s until they reach the destination router, generation of Route Replies (RREPs) upon receipt of an by the indicated destination, and unicast hop-by-hop forwarding of these RREPs towards the originator. If a route is detected broken, i.e., if the forwarding of a data packet to the recorded next hop on the route to the destination is detected to fail, local route repair can be attempted, or a Route Error (RERR) message can be returned to the originator of that data packet. Compared to AODV, LOADng prohibits intermediate RREPs, in order to reduce the size of control messages 1 and to reduce the state and processing required in routers in the network. Replacing intermediate RREPs, LOADng introduces an alternative route discovery scheme, denoted Smart, which introduces no additional signaling or data in /RREPs, nor any particular additional processing, yet permits taking the same benefits from the existing routing information present in intermediate routers, similar to what is done by intermediate RREPs. Smart works as follows: when a router receives an, it looks in its routing table for an already existing routing entry for the sought destination. If such an entry exists, and if its <next-hop> is not equal to the previous hop address of the, the is unicast to the <next-hop> instead of being broadcast. In figure 2, Router S initiates a route discovery to Router D, while A and B have already available routes to D. On receiving the broadcast from S, A identifies that it already has a valid route to D, and so proceeds to unicast, rather than broadcast, the via the recorded path to D. uni- uni- S A B D Figure 2: LOADng Route Discovery with smart. S initiates an for D. A and B already have an available route to D Smart considerably reduces the overhead of dissemination, as illustrated in figure 3, and also enables a modified version of Expanding Ring flooding described in section 4. 1 Low-power and constrained environments, typically, use network interfaces with very tiny MTUs: IEEE 82.15.4 with 6LowPAN, for example, accords an MTU of only 81 octets, rendering very small control messages a necessity, to avoid fragmentation.

Overhead (bytes/sec) 1 9 8 7 6 5 4 3 2 1 AODV LOADng 5 6 7 8 9 1 Figure 3: Average control traffic overhead, in bytes, in a network with from 5-1 routers, distributed randomly in a 1m 1m field, and subject to 3 concurrent and random (source, destination) traffic flows. All of the three protocols, AODV, LOADng and LOADng with Smart attained identical and 1% data delivery ratios. 4. Expanding Ring flooding for LOADng Because LOADng intermediate routers are not allowed to generate intermediate RREPs, Expanding Ring flooding in LOADng cannot be simply accomplished by progressively increasing an initially small TTL. Even if an intermediate router already has a valid route to the sought destination, the would still need to reach the destination which would mean the TTL would have to be of a value at least equal to the distance between the source of the and the sought destination. Therefore, the TTL field in the IP header is not used for Expanding Ring flooding in LOADng. Rather, a new field is introduced in messages, denoted the MNB (Maximum Number of Broadcasts). This field is of the same size (8 bits) and behavior as the TTL field from the IP header, except that it governs only the number of broadcasts of s permitted. When initiating a route discovery in LOADng and with Expanding Ring flooding enabled, the originating router sets the MNB field to MNB START (similar to AODV TTL START), and sets the timeout for receiving an RREP to twice the value of the LOADng parameter NET TRAVERSAL TIME. If this timeout expires without a matching RREP having been received, a new is broadcast with a MNB field incremented by MNB INCREMENT. This continues until the MNB set in the reaches MNB THRESHOLD, beyond which the route discovery can either be declared a failure or continued with a MNB set to LOADng MAX HOP COUNT (i.e., 255), which corresponds to a network-wide flooding. Each time, the timeout for receiving an RREP is twice NET TRAVERSAL TIME. Unlike the TTL, the MNB is not decreased by one on each hop. When an intermediate router receives an, it performs the following procedure before transmitting it: 1. If the message is to be unicast, which with Smart means that the intermediate router has an available routing tuple to the destination router in the routing table and that the <next-hop> field of the corresponding routing tuple is not equal to the previous hop address of the, then the MNB field is left unchanged. 2. If the MNB field has reached, then the is discarded. 3. Otherwise, the MNB field is decreased by one (and the is broadcast normally). Figure 4 illustrates situations, where Expanding Ring flooding can decrease control traffic overhead: router S initiates a route discovery for D, the routers with double circles already have a valid routes to D. In figure 4(a), MNB START is set to 1, and the MNB INCREMENT

is set to 2, thus no RREP results from the first with MNB = 1. Then, in figure 4(b), S increases MNB by 2 the reaches two routers which already have valid routes to D, and which therefore by way of Smart unicast the to D which will respond by returning an RREP. MNB 1 S D (a) MNB = 1 MNB 3 MNB 1 S D S D Source Destination Node with route to D Node visited by Uni- (b) MNB = 3 Figure 4: An example of Expanding Ring flooding initiated by S for D. The white routers are not visited by s, but would have been without Expanding Ring flooding enabled. Unlike for AODV, the timeout is constant and equal to twice NET TRAVERSAL TIME which should correspond to the maximum time needed for an to traverse the whole network. The reason for this is, that regardless of the value of MNB, an in LOADng must travel all the way from S to D (and an RREP returned): in figure 4, a 5-hops route is found with an where MNB = 3. With Smart, route discovery can be divided into two parts: (i) broadcast until a router with a valid route to the sought destination is encountered, then (ii) unicast towards the destination. Expanding Ring flooding tries to limit the number of routers impacted by (i), as well as the number of messages required by (i). 5. Simulation and Evaluation This section presents the performance of LOADng using Smart, with and without Expanding Ring flooding enabled (MNB START = 1, MNB INCREMENT = 3), in two different traffic scenarios: sensor-to-root (multipoint-to-point - MP2P) traffic and sensor-tosensor (point-to-point - P2P) traffic. The performance is evaluated by way of network simulations, using NS2 [6], with LOADng implemented in Java and using AgentJ [7] for interfacing

the LOADng implementation with the NS2 network simulator. Simulations are run with 63, 125, 25 and 5 nodes. Networks are generated randomly in a square area, which grows with the number of nodes so as to maintain a constant density of nodes in the network. For example, with 63 nodes, we use a 195 195 m 2 area. The transmission radius is set to 25 m. No mobility is considered in the simulations. The network is subject to point-to-point (P2P) traffic or multipoint-to-point (MP2P) traffic with routers generating 8 second bursts of 512-octet data packets every 5 seconds The number of layer 2 collisions, the average control overload and the average end-toend delay are measured. The control overload includes and RREP messages, and the end-to-end delay is defined as the time between data packet generation and its arrival at the destination. The end-to-end delay reflects the time needed to find a route to the destination router, and the time it takes for the data packet to be delivered. 5.1. MP2P Performance For MP2P traffic scenarios, all the routers establish a route to the designated root, and generate data traffic to the root. The data delivery ratio is illustrated in figure 5(a) noting that identical data delivery ratios are obtained for LOADng with and without Expanding Ring flooding. The number of collisions, overhead and delays are presented in figure 5. 1.2 1 25 2 Delivery ratio.8.6.4 Number of collisions 15 1.2 5 5 1 15 2 25 3 35 4 45 5 5 1 15 2 25 3 35 4 45 5 (a) Data Delivery Ratio, in MP2P scenarios (b) Number of collisions, in MP2P scenarios 2 18.4.35 Overhead (bytes/sec) 16 14 12 1 8 6 4 Delay (s).3.25.2.15.1 2.5 5 1 15 2 25 3 35 4 45 5 5 1 15 2 25 3 35 4 45 5 (c) Average overhead, in MP2P scenarios (d) Average end-to-end delay, in MP2P scenarios Figure 5: The Performance of Expanding Ring search for a MP2P scenario 5.2. P2P Performance The network was subject to 1 concurrent and random (source, destination) traffic flows. The data delivery ratio is illustrated in figure 6(a) noting that identical data delivery ratios

are obtained for LOADng with and without Expanding Ring flooding. The number of collisions, overhead and delays are presented in figure 6. 1.2 1 45 4 35 Delivery ratio.8.6.4 Number of collisions 3 25 2 15.2 1 5 5 1 15 2 25 3 35 4 45 5 5 1 15 2 25 3 35 4 45 5 (a) Data Delivery Ratio, in P2P scenarios (b) Number of collisions, in P2P scenarios 8 7.4.35 Overhead (bytes/sec) 6 5 4 3 2 Delay (s).3.25.2.15.1 1.5 5 1 15 2 25 3 35 4 45 5 5 1 15 2 25 3 35 4 45 5 (c) Average overhead, in P2P scenarios (d) Average end-to-end delay, in P2P scenarios Figure 6: The Performance of Expanding Ring search for a P2P scenario 5.3. Discussion In the scenarios studied, the control traffic overhead was noticeably reduced when Expanding Ring flooding was enabled. For multipoint-to-point traffic, LOADng without Expanding Ring flooding generates twice as much control overload as when using Expanding Ring flooding, as shown in figure 5(c). However, this comes at the expense of an increase in end-to-end delays, both for MP2P and P2P traffic, shown in figure 5(d) and figure 6(d), respectively. This is due to the (high) value of the timeout, which is necessarily equal to two times the NET TRAVERSAL TIME, even if the MNB value is low. This delay increase is less pronounced for multipoint-to-point traffic, due to the increased likelihood that somebody close has a route to the (single) destination but may not be acceptable for networks where point-to-point traffic is predominant, and where Expanding Ring search increases route discovery time (and thus data packet delivery delays) dramatically. 6. Conclusion Expanding Ring flooding is one of the features from AODV which has not been carried over in the core specification of LOADng, in part because LOADng does not support intermediate/gratuitous RREPs. This paper presents a way in which Expanding Ring flooding can be introduced into LOADng, by way of using Smart and introducing a single-octet of extra information in messages but, without requiring additional router state and

signaling. A performance study of networks subjects to MP2P and P2P traffic has been performed, by way of network simulations, comparing LOADng with and without Expanding Ring flooding. Whilst maintaining identical data delivery ratios of 1%, the introduction of Expanding Ring flooding considerably reduces the control traffic overhead, especially when faced with MP2P traffic but also for P2P traffic. The downside to the use of Expanding Ring flooding, as described in this paper, is increased average end-to-end delays. Thus, Expanding Ring search can be highly advantageous in networks where MP2P traffic is predominant and where a slight increase in average data delivery delays is acceptable. References [1] C. Perkins, E. Belding-Royer, and S. Das, Ad hoc On-Demand Distance Vector (AODV) Routing, Experimental RFC 3561, July 23. [2] T. Clausen, A. C. de Verdiere, J. Yi, A. Niktash, Y. Igarashi, H. Satoh, and U. Herberg, The lln on-demand ad hoc distance-vector routing protocol - next generation, The Internet Engineering Task Force, April 212, Internet Draft, work in progress, draftclausen-lln-loadng. [3] G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, Transmission of IPv6 Packets over IEEE 82.15.4 Networks, September 27, Standards Track RFC 4944. [4] T. Clausen, J. Yi, and A. C. de Verdiere, Loadng: Towards aodv version 2. Proceedings of IEEE 76th Vehicular Technology Conference: VTC212-Fall, 212. [5], Efficient data acquisition in sensor networks: Introducing (the) loadng collection tree protocol. Proceedings of IEEE WICOM 212, 8th International Conference on Wireless Communications, Networks and Mobile Computing, 212. [6] Network Simulator - ns - 2, available at http://www.isi.edu/nsnam/ns/. [7] U. Herberg and I. Taylor, Development Framework for Supporting Java NS2 Routing Protocols, in Proceedings of the International Workshop on Future Engineering, Applications and Services, May 21.