Mobile Ad Hoc Networks. Ad Hoc Networks - A New Communication Paradigm 1. Mobile Ad Hoc Networks (MANET) Mobile Ad Hoc Networks. Why Ad Hoc Networks?

Size: px
Start display at page:

Download "Mobile Ad Hoc Networks. Ad Hoc Networks - A New Communication Paradigm 1. Mobile Ad Hoc Networks (MANET) Mobile Ad Hoc Networks. Why Ad Hoc Networks?"

Transcription

1 obile d oc etworks d oc etworks - ew ommunication Paradigm 1 ormed by wireless hosts which may be mobile Without (necessarily) using a pre-existing infrastructure Routes between nodes may potentially contain multiple hops (due to limited transmission range) 1 These slides were adapted from a tutorial given by. Vaidya at 2001 obiom. ou may view/download the full presentation at the following address: Wireless omputing and etwork ystems Page 1 Wireless omputing and etwork ystems Page 2 obile d oc etworks ay need to traverse multiple links to reach a destination obile d oc etworks (T) obility causes route changes Wireless omputing and etwork ystems Page 3 Wireless omputing and etwork ystems Page 4 Why d oc etworks? ase of deployment peed of deployment ecreased dependence on infrastructure any pplications Personal area networking cell phone, laptop, ear phone, wrist watch ilitary environments soldiers, tanks, planes ivilian environments taxi cab network meeting rooms sports stadiums boats, small aircraft mergency operations search-and-rescue policing and fire fighting Unknown? Wireless omputing and etwork ystems Page 5 Wireless omputing and etwork ystems Page 6 1

2 any Variations ully ymmetric nvironment all nodes have identical capabilities and responsibilities symmetric apabilities transmission ranges and radios may differ battery life at different nodes may differ processing capacity may be different at different nodes speed of movement symmetric Responsibilities only some nodes may route packets some nodes may act as leaders of nearby nodes (e.g., cluster head) any Variations Traffic characteristics may differ in different ad hoc networks bit rate timeliness constraints reliability requirements unicast / multicast / geocast host-based addressing / content-based addressing / capability-based addressing ay co-exist (and co-operate) with an infrastructure-based network Wireless omputing and etwork ystems Page 7 Wireless omputing and etwork ystems Page 8 any Variations obility patterns may be different people sitting at an airport lounge ew ork taxi cabs kids playing military movements personal area network obility characteristics speed predictability direction of movement pattern of movement uniformity (or lack thereof) of mobility characteristics among different nodes Wireless omputing and etwork ystems Page 9 hallenges imited wireless transmission range roadcast nature of the wireless medium idden terminal problem (see next slide) Packet losses due to transmission errors obility-induced route changes and packet loss connectivity and propagation patterns traffic and mobility patterns obility induced packet loss attery constraints Potentially frequent network partitions ase of snooping on wireless transmissions (security hazard) Wireless omputing and etwork ystems Page 10 hallenges in d-oc etworks The challenges in the design of d-oc networks stem from the following facts: the lack of centralized entity self-organizing and distributed protocols the possibility of rapid platforms movement (highly versatile topology) efficient and robust protocols all communication is carried over the wireless medium power and spectrum efficient communications ompare this with the fixed (cellular) networks Research on obile d oc etworks Variations in capabilities & responsibilities X Variations in traffic characteristics, mobility models, etc. X Performance criteria (e.g., optimize throughput, reduce energy consumption) + ncreased research funding = ignificant research activity stablishment of the T T Working roup to study Pbased routing in ad-hoc networks Wireless omputing and etwork ystems Page 11 Wireless omputing and etwork ystems Page 12 2

3 The oly rail d oc rchitectural esign hoices (1) one-size-fits-all solution Perhaps using an adaptive/hybrid approach that can adapt to situation at hand ifficult problem any solutions proposed trying to address a sub-space of the problem domain Routing/obility anagement: Proactive vs. Reactive Routing Protocol edium ccess ontrol: To ense or ot to ense, this is a question! ultimedia Traffic: ow to handle Qo for real-time traffic? s it possible at all? ecurity: uthentication, uthorization, Privacy, in the ad hoc networking environment. Wireless omputing and etwork ystems Page 13 Wireless omputing and etwork ystems Page 14 d oc rchitectural esign hoices (2) rchitectural esign hoices (1) elected examples of ad-hoc architectural choices: flat vs. hierarchical (multi-tiered) network proactive vs. reactive routing protocols degree of globalization in topological changes frequency of communication of topological changes criteria for route selection / max route determination sizing of nodal transmission radius synchronized vs. unsynchronized operation vs. dialog-based The lat etwork rchitecture lat d-oc etwork Wireless omputing and etwork ystems Page 15 Wireless omputing and etwork ystems Page 16 rchitectural esign hoices (2) ierarchical d-oc etwork rchitecture tier-2 network cluster head Overview of Unicast Routing Protocols tier-1 network tier-1 network cluster tier-1 network tier-1 network Two-Tier d-oc etwork Wireless omputing and etwork ystems Page 17 Wireless omputing and etwork ystems Page 18 3

4 Why is Routing in T different? Proactive Vs. Reactive Routing (1) ost mobility link failure/repair due to mobility may have different characteristics than those due to other causes Rate of link failure/repair may be high when nodes move fast ew performance criteria may be used route stability despite mobility energy consumption Proactive Protocols continuously update the reachability information at all the network nodes when a route is requested, it is immediately available examples of proactive protocols are: istance-vector (V), hortest Path irst (P), Open hortest Path irst (OP) Proactive protocols may be inappropriate for the ad hoc networking environment as they waste too much wireless resources, especially for large, highly mobile network. Wireless omputing and etwork ystems Page 19 Wireless omputing and etwork ystems Page 20 Proactive Vs. Reactive Routing (2) Reactive Protocols discover routes only upon demand involve some sort of global search there may be a significant delay associated with the route discovery examples of reactive protocols are the family of flooding protocols Reactive protocols may be inappropriate for the adhoc networking environment as they are too slow and consume too much network resources, especially for large, highly mobile network. Trade-Off atency of route discovery Proactive protocols may have lower latency since routes are maintained at all times Reactive protocols may have higher latency because a route from X to will be found only when X attempts to send to Overhead of route discovery/maintenance Reactive protocols may have lower overhead since routes are determined only if needed Proactive protocols can (but not necessarily) result in higher overhead due to continuous route updating Which approach achieves a better trade-off depends on the traffic and mobility patterns Wireless omputing and etwork ystems Page 21 Wireless omputing and etwork ystems Page 22 Routing Protocols for d-oc etworks looding for ata elivery The following are few examples of routing protocols for ad-hoc networks: ORP = Optimized inks tate Routing Protocol draft-ietf-manet-olsrp-04.txt R = ynamic ource Routing draft-ietf-manet-dsr-05.txt OV = d-hoc On-emand istance Vector draft-ietf-manet-aodv-08.txt TOR = Temporary-Ordered Routing lgorithm draft-ietf-manet-tora-spec-03.txt RP = one Routing Protocol draft-ietf-manet-zone-ierp-01.txt draft-ietf-manet-zone-iarp-01.txt draft-ietf-manet-zone-brp-01.txt ender broadcasts data packet P to all its neighbors ach node receiving P forwards P to its neighbors equence numbers used to avoid the possibility of forwarding the same packet more than once Packet P reaches destination provided that is reachable from sender ode does not forward the packet Wireless omputing and etwork ystems Page 23 Wireless omputing and etwork ystems Page 24 4

5 looding for ata elivery looding for ata elivery roadcast transmission Represents a node that has received packet P Represents that connected nodes are within each other s transmission range Wireless omputing and etwork ystems Page 25 Represents a node that receives packet P for the first time Represents transmission of packet P Wireless omputing and etwork ystems Page 26 looding for ata elivery looding for ata elivery ode receives packet P from two neighbors: potential for collision ode receives packet P from and, but does not forward it again, because node has already forwarded packet P once Wireless omputing and etwork ystems Page 27 Wireless omputing and etwork ystems Page 28 looding for ata elivery odes and both broadcast packet P to node ince nodes and are hidden from each other, their transmissions may collide => Packet P may not be delivered to node at all, despite the use of flooding Wireless omputing and etwork ystems Page 29 looding for ata elivery ode does not forward packet P, because node is the intended destination of packet P Wireless omputing and etwork ystems Page 30 5

6 looding for ata elivery looding for ata elivery looding completed odes unreachable from do not receive packet P (e.g., node ) odes for which all paths from go through the destination also do not receive packet P (example: node ) Wireless omputing and etwork ystems Page 31 looding may deliver packets to too many nodes (in the worst case, all nodes reachable from sender may receive the packet) Wireless omputing and etwork ystems Page 32 looding for ata elivery: dvantages looding for ata elivery: isadvantages implicity ay be more efficient than other protocols when rate of information transmission is low enough that the overhead of explicit route discovery/maintenance incurred by other protocols is relatively higher this scenario may occur, for instance, when nodes transmit small data packets relatively infrequently, and many topology changes occur between consecutive packet transmissions Potentially higher reliability of data delivery ecause packets may be delivered to the destination on multiple paths Potentially, very high overhead ata packets may be delivered to too many nodes who do not need to receive them Potentially lower reliability of data delivery looding uses broadcasting -- hard to implement reliable broadcast delivery without significantly increasing overhead roadcasting in is unreliable n our example, nodes and may transmit to node simultaneously, resulting in loss of the packet in this case, destination would not receive the packet at all Wireless omputing and etwork ystems Page 33 Wireless omputing and etwork ystems Page 34 looding of ontrol Packets any protocols perform (potentially limited) flooding of control packets, instead of data packets The control packets are used to discover routes iscovered routes are subsequently used to send data packet(s) Overhead of control packet flooding is amortized over data packets transmitted between consecutive control packet floods ommon eatures of Reactive Routing Protocols (i.e. OV, R, TOR) Route discovery process is initiated only when a route is needed. Route discovery is based on the exchange of queries and replies. Route queries are broadcast. Route discovery process may produce multiple routes. Protocol design ensures loop freedom of routes. route maintenance mechanism is provided to inform nodes of invalid routes. Wireless omputing and etwork ystems Page 35 Wireless omputing and etwork ystems Page 36 6

7 ynamic ource Routing (R) [ohnson96] Route iscovery in R When node wants to send a packet to node, but does not know a route to, node initiates a route discovery ource node floods Route Request (RRQ) ach node appends own identifier when forwarding RRQ Represents a node that has received RRQ for from Wireless omputing and etwork ystems Page 37 Wireless omputing and etwork ystems Page 38 Route iscovery in R Route iscovery in R roadcast transmission [] [,] [,] [X,] Represents transmission of RRQ Represents list of identifiers appended to RRQ Wireless omputing and etwork ystems Page 39 ode receives packet RRQ from two neighbors: potential for collision Wireless omputing and etwork ystems Page 40 Route iscovery in R Route iscovery in R [,,] [,,] [,,,] [,,,] ode receives RRQ from and, but does not forward it again, because node has already forwarded RRQ once Wireless omputing and etwork ystems Page 41 odes and both broadcast RRQ to node ince nodes and are hidden from each other, their transmissions may collide Wireless omputing and etwork ystems Page 42 7

8 Route iscovery in R Route iscovery in R ode does not forward RRQ, because node is the intended target of the route discovery Wireless omputing and etwork ystems Page 43 [,,,,] estination on receiving the first RRQ, sends a Route Reply (RRP) RRP is sent on a route obtained by reversing the route appended to received RRQ RRP includes the route from to on which RRQ was received by node Wireless omputing and etwork ystems Page 44 Route Reply in R Route Reply in R RRP [,,,,] Route Reply can be sent by reversing the route in Route Request (RRQ) only if links are guaranteed to be bidirectional To ensure this, RRQ should be forwarded only if it received on a link that is known to be bi-directional f unidirectional (asymmetric) links are allowed, then RRP may need a route discovery for from node Unless node already knows a route to node f a route discovery is initiated by for a route to, then the Route Reply is piggybacked on the Route Request from. Represents RRP control message Wireless omputing and etwork ystems Page 45 f is used to send data, then links have to be bi-directional (since ck is used) Wireless omputing and etwork ystems Page 46 ynamic ource Routing (R) ata elivery in R ode on receiving RRP, caches the route included in the RRP When node sends a data packet to, the entire route is included in the packet header hence the name source routing ntermediate nodes use the source route included in a packet to determine to whom a packet should be forwarded T [,,,,] Packet header size grows with route length Wireless omputing and etwork ystems Page 47 Wireless omputing and etwork ystems Page 48 8

9 When to Perform a Route iscovery When node wants to send data to node, but does not know a valid route node R Optimization: Route aching ach node caches a new route it learns by any means When node finds route [,,,,] to node, node also learns route [,,] to node When node receives Route Request [,,] destined for node, node learns route [,,,] to node When node forwards Route Reply RRP [,,,,], node learns route [,,] to node When node forwards ata [,,,,] it learns route [,,,] to node node may also learn a route when it overhears ata packets Wireless omputing and etwork ystems Page 49 Wireless omputing and etwork ystems Page 50 Use of Route aching Use of Route aching When node learns that a route to node is broken, it uses another route from its local cache, if such a route to exists in its cache. Otherwise, node initiates route discovery by sending a route request ode X on receiving a Route Request for some node can send a Route Reply if node X knows a route to node Use of route cache can speed up route discovery can reduce propagation of route requests Wireless omputing and etwork ystems Page 51 [,,,,] [,] [,,,] [P,Q,R] Represents cached route at a node (R maintains the cached routes in a tree format) [,,] [,,],[,,] [,,,] Wireless omputing and etwork ystems Page 52 Use of Route aching: an peed up Route iscovery Use of Route aching: an Reduce Propagation of Route Requests [,,,,] [,] [,,,] [,,] [,,],[,,] [,,,] [,,,] RRP RRQ When node sends a route request for node, node sends back a route reply [,,,] to node using a locally cached route Wireless omputing and etwork ystems Page 53 [,,,,] [,] [,,,] [,,] [,,,] [,,],[,,] RRQ [,,,] Wireless omputing and etwork ystems Page 54 RRP ssume that there is no link between and. Route Reply (RRP) from node limits flooding of RRQ. n general, the reduction may be less dramatic. 9

10 Route rror (RRR) Route aching: eware! RRR [-] sends a route error to along route --- when its attempt to forward the data packet (with route ) on - fails tale caches can adversely affect performance With passage of time and host mobility, cached routes may become invalid sender host may try several stale routes (obtained from local cache, or replied from cache by other nodes), before finding a good route odes hearing RRR update their route cache to remove link - Wireless omputing and etwork ystems Page 55 Wireless omputing and etwork ystems Page 56 ynamic ource Routing: dvantages Routes maintained only between nodes who need to communicate reduces overhead of route maintenance Route caching can further reduce route discovery overhead single route discovery may yield many routes to the destination, due to intermediate nodes replying from local caches Wireless omputing and etwork ystems Page 57 ynamic ource Routing: isadvantages Packet header size grows with route length due to source routing lood of route requests may potentially reach all nodes in the network are must be taken to avoid collisions between route requests propagated by neighboring nodes insertion of random delays before forwarding RRQ ncreased contention if too many route replies come back due to nodes replying using their local cache Route Reply torm problem Reply storm may be eased by preventing a node from sending RRP if it hears another RRP with a shorter route Wireless omputing and etwork ystems Page 58 ynamic ource Routing: isadvantages looding of ontrol Packets n intermediate node may send Route Reply using a stale cached route, thus polluting other caches This problem can be eased if some mechanism to purge (potentially) invalid cached routes is incorporated. some proposals for cache invalidation tatic timeouts daptive timeouts based on link stability ow to reduce the scope of the route request flood? R [o98obicom] Query localization [astaneda99obicom] ow to reduce redundant broadcasts? The roadcast torm Problem [i99obicom] Wireless omputing and etwork ystems Page 59 Wireless omputing and etwork ystems Page 60 10

11 d oc On-emand istance Vector Routing (OV) [Perkins99Wmcsa] R includes source routes in packet headers Resulting large headers can sometimes degrade performance particularly when data contents of a packet are small OV attempts to improve on R by maintaining routing tables at the nodes, so that data packets do not have to contain routes OV retains the desirable feature of R that routes are maintained only between nodes which need to communicate OV Route Requests (RRQ) are forwarded in a manner similar to R When a node re-broadcasts a Route Request, it sets up a reverse path pointing towards the source OV assumes symmetric (bi-directional) links When the intended destination receives a Route Request, it replies by sending a Route Reply Route Reply travels along the reverse path set-up when Route Request is forwarded Wireless omputing and etwork ystems Page 61 Wireless omputing and etwork ystems Page 62 istance Vector Routing Route Requests in OV (a) subnet. (b) nput from,,,, and the new routing table for. Represents a node that has received RRQ for from Wireless omputing and etwork ystems Page 63 Wireless omputing and etwork ystems Page 64 Route Requests in OV Route Requests in OV roadcast transmission Represents transmission of RRQ Represents links on Reverse Path Wireless omputing and etwork ystems Page 65 Wireless omputing and etwork ystems Page 66 11

12 Reverse Path etup in OV Reverse Path etup in OV ode receives RRQ from and, but does not forward it again, because node has already forwarded RRQ once Wireless omputing and etwork ystems Page 67 Wireless omputing and etwork ystems Page 68 Reverse Path etup in OV Route Reply in OV ode does not forward RRQ, because node is the intended target of the RRQ Wireless omputing and etwork ystems Page 69 Represents links on path taken by RRP Wireless omputing and etwork ystems Page 70 Route Reply in OV n intermediate node (not the destination) may also send a Route Reply (RRP) provided that it knows a more recent path than the one previously known to sender To determine whether the path known to an intermediate node is more recent, destination sequence numbers are used The likelihood that an intermediate node will send a Route Reply when using OV is not as high as R new Route Request by node for a destination is assigned a higher destination sequence number. n intermediate node which knows a route, but with a smaller sequence number, cannot send Route Reply Wireless omputing and etwork ystems Page 71 orward Path etup in OV orward links are setup when RRP travels along the reverse path Represents a link on the forward path Wireless omputing and etwork ystems Page 72 12

13 ata elivery in OV Timeouts T routing table entry maintaining a reverse path is purged after a timeout interval timeout should be long enough to allow RRP to come back routing table entry maintaining a forward path is purged if not used for a active_route_timeout interval if no data is being sent using a particular routing table entry, that entry will be deleted from the routing table (even if the route may actually still be valid) Routing table entries used to forward data packet. Route is not included in packet header. Wireless omputing and etwork ystems Page 73 Wireless omputing and etwork ystems Page 74 ink ailure Reporting Route rror neighbor of node X is considered active for a routing table entry if the neighbor sent a packet within active_route_timeout interval which was forwarded using that entry When the next hop link in a routing table entry breaks, all active neighbors are informed ink failures are propagated by means of Route rror messages, which also update destination sequence numbers When node X is unable to forward packet P (from node to node ) on link (X,), it generates a RRR message ode X increments the destination sequence number for cached at node X The incremented sequence number is included in the RRR When node receives the RRR, it initiates a new route discovery for using destination sequence number at least as large as Wireless omputing and etwork ystems Page 75 Wireless omputing and etwork ystems Page 76 estination equence umber When node receives the route request with destination sequence number, node will set its sequence number to. ink ailure etection ello messages: eighboring nodes periodically exchange hello message bsence of hello message is used as an indication of link failure lternatively, failure to receive several level acknowledgement may be used as an indication of link failure Wireless omputing and etwork ystems Page 77 Wireless omputing and etwork ystems Page 78 13

14 Why equence umbers in OV Why equence umbers in OV To avoid using old/broken routes To determine which route is newer To prevent formation of loops ssume that does not know about failure of link - because RRR sent by is lost ow performs a route discovery for. ode receives the RRQ (say, via path --) ode will reply since knows a route to via node Results in a loop (for instance, ---- ) oop ---- Wireless omputing and etwork ystems Page 79 Wireless omputing and etwork ystems Page 80 Optimization: xpanding Ring earch ummary: OV Route Requests are initially sent with small Timeto-ive (TT) field, to limit their propagation R also includes a similar optimization f no Route Reply is received, then larger TT tried Routes need not be included in packet headers odes maintain routing tables containing entries only for routes that are in active use t most one next-hop per destination maintained at each node R may maintain several routes for a single destination Unused routes expire even if topology does not change Wireless omputing and etwork ystems Page 81 Wireless omputing and etwork ystems Page 82 14

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

Ad hoc On Demand Distance Vector (AODV) Routing Protocol Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter

More information

Scalable Unidirectional Routing with Zone Routing Protocol (ZRP) Extensions for Mobile Ad-Hoc Networks

Scalable Unidirectional Routing with Zone Routing Protocol (ZRP) Extensions for Mobile Ad-Hoc Networks Scalable Unidirectional Routing with Zone Routing Protocol (ZRP) xtensions for Mobile d-hoc Networks Prasun Sinha, o-ordinated Sciences Laboratory, University of Illinois, Urbana hampaign prasun@vayu.crhc.uiuc.edu

More information

Routing in wireless networks

Routing in wireless networks Routing in wireless networks. Pham Université de Pau et des Pays de l dour épartement Informatique http://www.univ-pau.fr/~cpham ongduc.pham@univ-pau.fr Routing in wireless networks What s a wireless network?

More information

Dynamic Source Routing in Ad Hoc Wireless Networks

Dynamic Source Routing in Ad Hoc Wireless Networks Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract

More information

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Internet Layer. Routing Tables. Routing in the Internet. Routing Protocols

Internet Layer. Routing Tables. Routing in the Internet. Routing Protocols Internet Layer Routing Tables estination ddress Next Hop Raw division into three tasks: ata transfer over a global network Route decision at the sub-nodes ontrol of the network or transmission status.7...../8

More information

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted

More information

A Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks

A Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks A Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu

More information

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch Network Infrastructure or building computer networks more complex than e.g. a short bus, some additional components are needed. They can be arranged hierarchically regarding their functionality: Repeater

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Location Information Services in Mobile Ad Hoc Networks

Location Information Services in Mobile Ad Hoc Networks Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

Location-Aided Routing (LAR) in mobile ad hoc networks

Location-Aided Routing (LAR) in mobile ad hoc networks Wireless Networks 6 (2000) 307 321 307 Location-Aided Routing (LAR) in mobile ad hoc networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science, Texas A&M University, College Station, TX

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

How To Write A Transport Layer Protocol For Wireless Networks

How To Write A Transport Layer Protocol For Wireless Networks Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security

More information

Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks

Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks Ahmed Helmy Electrical Engineering Department University of Southern California (USC) helmy@usc.edu http://ceng.usc.edu/~helmy

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

Talk Announcement CSC 458 -- Lecture 5 Intra-Domain Routing Protocols. Administrivia. This Time

Talk Announcement CSC 458 -- Lecture 5 Intra-Domain Routing Protocols. Administrivia. This Time Talk nnouncement S 48 -- Lecture Intra-omain Routing Protocols Internet in the st entury. Vint erf. hief Internet vangelist, oogle ahen Stefan Saroiu http://www.cs.toronto.edu/syslab/courses/csc48 Tuesday,

More information

Internet Connectivity for Ad hoc Mobile Networks

Internet Connectivity for Ad hoc Mobile Networks Internet Connectivity for Ad hoc Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu Charles E. Perkins

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Study of Network Characteristics Incorporating Different Routing Protocols

Study of Network Characteristics Incorporating Different Routing Protocols Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab

More information

28 Networks and Communication Protocols

28 Networks and Communication Protocols 113 28 Networks and ommunication Protocols Trend in computer systems: personal computing. Reasons why: ost: economies of scale. lso, avoids large initial investment in timesharing system. Performance:

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

other. A B AP wired network

other. A B AP wired network 1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer

More information

Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges

Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges Stephen Mueller 1,RoseP.Tsang 2, and ipak Ghosal 1 1 epartment of Computer Science, University of California, avis, CA 95616 2 Sandia

More information

Delay aware Reactive Routing Protocols for QoS in MANETs: a Review

Delay aware Reactive Routing Protocols for QoS in MANETs: a Review Delay aware Reactive Routing Protocols for QoS in MANETs: a Review Saad M. Adam*, Rosilah Hassan Network and Communication Technology Research Group, Faculty of Information Science and Technology, Universiti

More information

Streaming in MANET: Proactive Link Protection and Receiver-Oriented Adaptation

Streaming in MANET: Proactive Link Protection and Receiver-Oriented Adaptation Streaming in AET: Proactive Link Protection and Receiver-Oriented Adaptation Toby u ing Cai Department of Computer Science Iowa State University Ames, Iowa 50011, U.S.A. E-mail: {tobyxu, yingcai}@cs.iastate.edu

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Power Aware

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

Understanding and Exploiting the Tradeoffs between Broadcasting and Multicasting in Mobile Ad Hoc Networks*

Understanding and Exploiting the Tradeoffs between Broadcasting and Multicasting in Mobile Ad Hoc Networks* Understanding and Exploiting the Tradeoffs between Broadcasting and Multicasting in Mobile Ad Hoc Networks* Lap Kong Law, Srikanth V. Krishnamurthy, and Michalis Faloutsos Department of Computer Science

More information

Introduction to Ad hoc Networks

Introduction to Ad hoc Networks Introduction to Ad hoc Networks CS-647: Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University Amitabh Mishra & Baruch Awerbuch

More information

Security Threats in Mobile Ad Hoc Networks

Security Threats in Mobile Ad Hoc Networks Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey 21020013@baskent.edu.tr, asafak@baskent.edu.tr

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

TCP in Wireless Networks

TCP in Wireless Networks Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch David A. Maltz David B. Johnson Yih-Chun Hu Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

OLSR Performance Measurement in a Military Mobile Ad-hoc Network

OLSR Performance Measurement in a Military Mobile Ad-hoc Network OLSR Performance Measurement in a Military Mobile d-hoc Network Thierry Plesse ½, Jerome Lecomte ½, Cedric djih ¾, Marc Badel ¾, Philippe Jacquet ¾, nis Laouiti ¾, Pascale Minet ¾, Paul Muhlethaler ¾,

More information

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

Tema 5.- Seguridad. Problemas Soluciones

Tema 5.- Seguridad. Problemas Soluciones Tema 5.- Seguridad Problemas Soluciones Wireless medium is easy to snoop on Routing security vulnerabilities Due to ad hoc connectivity and mobility, it is hard to guarantee access to any particular node

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

SECURITY PROTOCOLS IN MANETS

SECURITY PROTOCOLS IN MANETS International Journal of Latest Research in Science and Technology Volume 2,Issue 1 :Page No.594-598,January-February (2013) http://www.mnkjournals.com/ijlrst.htm ISSN (Online):2278-5299 SEURITY PROTOOLS

More information

Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks

Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Technical Report, December 4 Pradeep Kyasanur Dept. of Computer Science, and Coordinated Science Laboratory, University of Illinois at

More information

AODV-BR: Backup Routing in Ad hoc Networks

AODV-BR: Backup Routing in Ad hoc Networks AOV-BR: Backup Routing in Ad hoc Networks Sung-Ju Lee and Mario Gerla ireless Adaptive Mobility Laboratory Computer Science epartment University of California, Los Angeles Los Angeles, CA 90095-596 http://www.cs.ucla.edu/nrl/wireless

More information

II RELATED PROTOCOLS. Dynamic Source Routing (DSR)

II RELATED PROTOCOLS. Dynamic Source Routing (DSR) ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather

More information

A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks

A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks Ioannis Broustis Gentian Jakllari Thomas Repantis Mart Molle Department of Computer Science & Engineering University

More information

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Mobile Computing/ Mobile Networks

Mobile Computing/ Mobile Networks Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information

Security Sensor Network. Biswajit panja

Security Sensor Network. Biswajit panja Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks

More information

Lifetime Prediction Routing in Mobile Ad Hoc Networks

Lifetime Prediction Routing in Mobile Ad Hoc Networks Lifetime Prediction Routing in Mobile d Hoc Networks Morteza Maleki, Karthik Dantu, and Massoud Pedram Dept. of EE-Systems, University of Southern California, Los ngeles, C, 989 {morteza, dantu, massoud}@sahand.usc.edu

More information

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually

More information

GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks

GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks eotor: Protocol for eocasting in Mobile d oc Networks Young-ae Ko ept. of omputer Science Texas &M University ollege Station, TX 77843-3112, US youngbae@cs.tamu.edu Nitin. Vaidya ept. of omputer Science

More information

The Monitoring of Ad Hoc Networks Based on Routing

The Monitoring of Ad Hoc Networks Based on Routing The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,

More information

MASTER'S THESIS. Routing Protocols in Wireless Ad-hoc Networks - A Simulation Study. Tony Larsson, Nicklas Hedman. Civilingenjörsprogrammet

MASTER'S THESIS. Routing Protocols in Wireless Ad-hoc Networks - A Simulation Study. Tony Larsson, Nicklas Hedman. Civilingenjörsprogrammet 1998:362 MASTER'S THESIS Routing Protocols in Wireless Ad-hoc Networks - A Simulation Study Tony Larsson, Nicklas Hedman Civilingenjörsprogrammet 1998:362 ISSN: 1402-1617 ISRN: LTU-EX--98/362--SE Master

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2 International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Chapter 5. Simple Ad hoc Key Management. 5.1 Introduction

Chapter 5. Simple Ad hoc Key Management. 5.1 Introduction Chapter 5 Simple Ad hoc Key Management 5.1 Introduction One of the most important consequences of the nature of the MANET networks is that one cannot assume that a node that is part of a network will be

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS M. Tamilarasi 1, T.G. Palanivelu 2, 1, 2 Department of ECE, Pondicherry Engineering College, Puducherry-605014. Email:

More information

An Extended AODV Protocol to Support Mobility in Hybrid Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}

More information

Load balanced routing in mobile ad hoc networks

Load balanced routing in mobile ad hoc networks Computer Communications 27 (2004) 295 305 www.elsevier.com/locate/comcom Load balanced routing in mobile ad hoc networks Vikrant Saigal a, Ajit K. Nayak b, *, Sateesh K. Pradhan c, R. Mall a a Department

More information

A Special-Purpose Peer-to-Peer File Sharing System for Mobile Ad Hoc Networks

A Special-Purpose Peer-to-Peer File Sharing System for Mobile Ad Hoc Networks Special-Purpose Peer-to-Peer Sharing System for Mobile d Hoc Networks lexander Klemm, hristoph Lindemann, and Oliver P. Waldhorst epartment of omputer Science University of ortmund ugust-schmidt-str. 12

More information

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :

More information

A Novel Approach for Load Balancing In Heterogeneous Cellular Network

A Novel Approach for Load Balancing In Heterogeneous Cellular Network A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1

More information

IP Multicasting. Applications with multiple receivers

IP Multicasting. Applications with multiple receivers IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data

More information

19531 - Telematics. 9th Tutorial - IP Model, IPv6, Routing

19531 - Telematics. 9th Tutorial - IP Model, IPv6, Routing 19531 - Telematics 9th Tutorial - IP Model, IPv6, Routing Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 06. January, 2011 Institute of Computer Science Telematics

More information

Ad hoc Networking

Ad hoc Networking An Integrated Approach for Efficient Routing and Service iscovery in Mobile Ad Hoc Networks Chang-Seok Oh Graduate School of Information & Communication, Ajou University Suwon, Korea Email: csoh@ajou.ac.kr

More information

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

Tomás P. de Miguel DIT-UPM. dit UPM

Tomás P. de Miguel DIT-UPM. dit UPM Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability

More information

Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networks

Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networks Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networks Mahesh K. Marina Department of ECECS University of Cincinnati Cincinnati, OH 1- USA mmarina@ececs.uc.edu Samir

More information

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering

More information

Hierarchical routing in ad hoc mobile networks

Hierarchical routing in ad hoc mobile networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. ; :515 53 (DOI: 1.1/wcm.74) Hierarchical routing in ad hoc mobile networks Elizabeth M. Belding-Royer*, Department of Computer Science

More information

3.2 Preliminaries. Location Information. route request. Expected Zone and Request Zone

3.2 Preliminaries. Location Information. route request. Expected Zone and Request Zone Location-Aided Routing (LAR) in Mobile Ad Hoc Networks æ Young-Bae Ko and Nitin H. Vaidya epartment of Computer cience Texas A&M University College tation, TX 7783-3 fyoungbae,vaidyag@cs.tamu.edu Abstract

More information

Keywords: DSDV and AODV Protocol

Keywords: DSDV and AODV Protocol Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparison

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

Wireless Mesh Networks under FreeBSD

Wireless Mesh Networks under FreeBSD Wireless Networks under FreeBSD Rui Paulo rpaulo@freebsd.org The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much

More information

Safari: A Self-Organizing, Hierarchical Architecture for Scalable Ad Hoc Networking

Safari: A Self-Organizing, Hierarchical Architecture for Scalable Ad Hoc Networking Safari: A Self-Organizing, Hierarchical Architecture for Scalable Ad Hoc Networking 1 Shu Du Ahamed Khan Santashil PalChaudhuri Ansley Post Amit Kumar Saha Peter Druschel David B. Johnson Rudolf Riedi

More information