Routing in Cognitive Radio Ad-Hoc Networks

Size: px
Start display at page:

Download "Routing in Cognitive Radio Ad-Hoc Networks"

Transcription

1 Routing in Cognitive Radio Ad-Hoc Networks Payel Bandyopadhyay University of Helsinki Helsinki, Finland Abstract Cognitive Radio (CR) mitigates the problem of inefficient spectrum usage. Cognitive radio is based on Dynamic Spectrum Access (DSA), through which unlicensed users can use the licensed spectrum band without causing harmful interference to the licensed users. However, this dynamic spectrum access increases designing of communication protocols in different layers. In this paper, I have presented several challenges that cognitive radio ad-hoc networks faces while routing. The main challenges that I have focused on is spectrum awareness, set up of quality routes and maintenance of those routes. In the next section, several solutions based on these challenges have been presented. The routing solutions presented in this paper is categorised into full spectrum knowledge and local spectrum knowledge. In the last section of this paper, a comparison of all the above mentioned solutions have been presented. I. INTRODUCTION The radio spectrum is divided into two parts: licensed spectrum band and unlicensed spectrum band. Licensed spectrum bands consists of Ultra High Frequency (UHF)/ Very High Frequency (VHF) TV frequency bands and many other licensed frequencies while unlicensed spectrum bands consists of ISM (Industrial, Scientific and Medical) and U-NII (Unlicensed National Information Infrastructure) [1]. Previously, fixed licensed policy was used to allocate spectrum bands to different users. Only licensed users could access the licensed spectrum. Studies of Federal Communications Commission (FCC) [2] showed that only 15-85% of licensed spectrum band was utilised, hence large part of this spectrum band was idle in different time and space. On the other hand, the unlicensed spectrum band became congested with the applications of different fields like WLANs, mesh area network, body area networks and sensor networks; which lead to the problem of inefficient spectrum usage. Hence, Cognitive Radio was discovered in 1999 to mitigate the problem of this inefficient spectrum usage. Devices having Cognitive Radio capabilities are called Cognitive Radio devices and the network that they form together is called Cognitive Radio Networks (CRNs). Cognitive radio is based on Dynamic Spectrum Access [2], through which unlicensed users can use the licensed spectrum band without causing harmful interference to the licensed users. Unlicensed users are referred as Secondary Users (SUs) and licensed users are referred as primary users (PUs). The idea is based on the fact that SUs can access the available licensed spectrum band but have to immediately change the spectrum band once an allocated PU need to access the spectrum band (PU still accesses the spectrum in fixed license policy). With the help of Software Defined Radios (SDRs) [1], a Cognitive Radio can change its transmitter parameters according to the external environment but this spectrum changing capabilities also cause routing issues in CRNs. Cognitive Radio Networks are two types according to their architecture: infrastructure based networks and ad-hoc based networks. Ad-hoc based networks are also called as Cognitive Radio Ad-Hoc Networks - CRAHNs [3]. Users of infrastructure based CRNs connect with each other via an infrastructure, like access point. Unlikely in CRAHNs, CR users connect with each other in an ad-hoc manner means there is no access point present. In CRAHNs, the available spectrum also known as Spectrum Opportunity (SOP), is divided into multiple channels. SUs try to access those channels which are currently not occupied by any PU. In this paper, I will be focusing on routing in multi-hop CRAHNs. Section II, mentions about why routing in multi-hop CRAHNs is an issue. Section III, presents a survey on different routing protocols proposed so far based on the routing challenges mentioned in Section II. Section IV, provides a comparison of all the proposals mentioned in Section III. II. PROBLEMS OF ROUTING IN MULTI HOP CRAHNS Many research work have already been made regarding routing issues in MAC and physical layer of single hop Cognitive Networks [4], [5] based on spectrum sensing, spectrum decision and spectrum sharing but the MAC protocols which provided optimal solutions for single hop CRNs could not be applied on multi-hop CRNs due to the distributed architecture of multi hop CRNs. Moreover, the dynamic network topology increases the complexities in network design of CRAHNs. Figure 1 represents how routing takes place in multi hop CRAHNs. Hence, recently much of research has taken place regarding routing issues in multi hop CRAHNs in both upper and lower layers. The upper layer includes transport layer while the lower layer includes physical and MAC layer. In this paper, I will be mainly focusing on lower layer protocols. Choosing the appropriate path and the appropriate frequency band at each path are the two major routing problems in CRAHNs [6]. There have been many routing challenges described so far. I will be listing some of them in the following subsections. These routing challenges are mainly based on physical/mac layers. Based on the spectrum the main challenges of routing in multi hop CRNs include: spectrum awareness, quality routes and route maintenance [2].

2 Fig. 1. Information routing in multi hop CRNs [2] Challenge 1: Spectrum awareness - compactness between routing modules and spectrum functionality should be there so that routing modules always have a picture of the surrounding environment, which will help to take correct routing decisions. The spectrum occupancy information may be obtained in either of the following ways: externally (like SUs having access to database of white spaces of TV towers); locally gathered by SUs by distributed sensing mechanisms; or by both externally and internally. Challenge 2: Set up of quality routes - routes in multi hop CRNs depends mainly on the PUs behaviour. Hence, to measure the quality of routes from source to destination metrics path stability and spectrum availability/pu activity should be considered. If PUs are less active then the network topology of SUs becomes less active. If, PUs become more active, then SUs also have to change their routes continuously. Challenge 3: Route maintenance/reparation - Re-routing is required if a route fails suddenly due to a sudden appearance of a PU. Hence proper methods are required to restore the broken routes. III. CLASSIFICATION OF COGNITIVE ROUTING SCHEMES Here I will mention about different routing schemes in lower layers. Based on spectrum issue there are several routing solutions that have been proposed so far. The routing solutions are categorised into two routing schemes: routing schemes based on full spectrum knowledge and routing schemes based on local spectrum knowledge [2]. A. Full spectrum knowledge In full spectrum knowledge scheme, nodes in CRNs have full knowledge about the availability of spectrum from the central spectrum database recently promoted by FCC to show the availability of spectrum below 900 MHz and around 3GHz [7]. Full spectrum knowledge is further divided into Graph based routing approaches and Mixed Integer Non-Linear Programming also known as MINLP optimization approach. 1) Graph based routing approach: Graph based routing approach [2] helps in creating efficient routes in multi hop CRNs. It consists of two phases: graph abstraction and route calculation. Graph abstraction refers to the network topology Fig. 2. Two Channel between four nodes [2] Fig. 3. Constructed layered graph showing horizontal, vertical access edges between 2 channels [8] of CRNs containing the number of edges (V), number of nodes (N) and a function to assign weight to each edge of the graph (f(v)). Route calculation refers to calculating the efficient routes to connect from source and destination. Graph based routing can be classified in three distinct methods: routing through layered graph, routing through colored-graph, routing and spectrum selection through conflict-graphs. Routing through layered graph: In layered graph approach [8] is mainly based on how channel is assigned and routing in semi-static multi-hop CRNs. The assumption is that PU dynamics is low. The layers of the graph represents the number of available channels. Each secondary user device is represented by a node, A,and additional sub nodes (one for each available channel) ranging from A 1, A 2,..., A m. There are three types of edges in layered graph namely, access, horizontal and vertical. Access edges connects each node with its suitable sub nodes. Horizontal edges connects sub nodes of same logical layers and adds them to the graph if two corresponding secondary devices can reach each other at the corresponding channel. Vertical edges connects sub nodes of various layers of same secondary device to portray the switching ability of secondary device from one channel to another channel to forward incoming traffic. The above Figure 2 represents two channels between four nodes and Figure 3 represents the layered graph model explained so far.

3 Fig. 4. Example of edge costs [8] Fig. 5. Updated edge costs of CRNs [8] Once a graph has been set, metrics are assigned to each of the edges to calculate the shortest route (the routing path) from source to destination. At first we arbitrarily choose two nodes based on descending order of traffic load information metric but other metrics can also be used. The cost of vertical edge depends on channel switching overhead and is fixed in routing path computation period. The cost of horizontal edge is dependent on link usage. The cost of access edge can be set arbitrarily because only access edge of source and destination participate in the path computation. Taking an example as shown in the Figure 3, I will be explaining the algorithm. Suppose, we have to calculate the shortest path between A and D. At first we choose node A and B for calculating the shortest path. The cost of vertical edge, horizontal edge and access edges of A and B are 1,2 and 0 respectively as shown in Figure 4. All the cost are arbitrarily set, the values of cost can vary. The path we choose is A, A 1, B 1, B with path cost 2. As, the subnodes of both the nodes belong to the same channel i.e. channel 1, the radios of both A and B is assigned to channel 1. As, subnodes A 1 and B 1 are taken in the path, they are referred as active node while the sub nodes A 2 and B 2 are referred as inactive node. Then we update the vertical and horizontal edges of the sub nodes as following. We remove all the vertical edges between inactive sub nodes of the same node. We remove the horizontal edge between A 2 and B 2. We change the vertical edge between A 1 and A 2 to uni-directional from A 1 to A 2. Similarly, vertical edge between B 1 and B 2 becomes unidirectional from B 1 to B 2. The horizontal edge of B 2 and C 2 is changed to out going from B 2. Then we increase the cost of all horizontal edges that are related to the path, as in the shown in Figure 5, cost of horizontal edges between A 1, B 1 and between B 1, C 1 increases. Then, we compute the path between C and D in the same manner as above. We assign C and D nodes in channel 2 as both of their active sub nodes (C 2, D 2 ) lies in channel 2. Now, while computing the total path from A to D, as shown in Figure 6, B and C are in different primary channels. So, when large number of packets of this path arrives at node B, it switches its channel from channel 1 to channel 2. In most link centric channel assignment cases, nodes often fluctuate between channels to maintain the link level connectivity to neighbours. Hence, in this way channels are assigned to the nodes of CRNs and routing path is designed. The algorithm described is in centralised mode but it will also work in distributed mode. Fig. 6. Computing the routing path from node A to node D [8] Fig. 7. Channel assignment and corresponding multi hop CRNs [9] Routing through colored graph: In colored graph approach [9], different channels are represented by different colors. The three parameters of the graph is denoted by G =(V, E C, W E ), where V is the vertex set representing each individual secondary user, E C is the set of colored edges and W E is the weight of edges. Each of the channels is assigned different colors, there are N possible colors, where N represents the number of channels. Figure 7 represents the colored graph topology. The route calculation algorithm is the same as mentioned in routing through layered graphs but it is used only in centralised mode. Routing and spectrum selection through conflict graph: Conflict graph approach [10] is different from the above mentioned two approaches. This approach separates routing and spectrum (or channel) assignment. Here, route selection and channel selection is done in the following way. Given a sourcedestination pair, at first all the possible routes from source to destination is considered one by one. Then all the possible channel assignment for each route is found out. Then for each route/channel assignment, conflict free scheduling algorithm is performed. Then the best combination of route/channel is chosen. Here, vertex refers to wireless link of the network and edge is the link between two vertices, if the two vertices are not active simultaneously. Hence, in this manner channels

4 are assigned to the nodes of CRNs and the efficient route is selected. 2) Optimization approach to routing design: Here, optimization model and algorithm [11] is used to design routes in multi-hop CRNs. This approach is based on Mixed Integer Non-Linear Programming formulation also known as MINLP. The main aim of MINLP is that it maximises the spectrum reuse factor in the network so that the overall bandwidth usage of the network is reduced. MINLP takes into consideration, for instance, link capacity, interference and routing. Link capacity formulates that the total traffic flow should always be less than the wireless link it is currently travelling through. Interference states that two SUs can interfere in the same interference range but they cannot share the same sub band for transmission. Routing is based on flow balanced constraints which states that for each source to destination path, all the nodes expect the source and destination nodes have their incoming flow equal to the outgoing flow. The flow creation point is the source node and the flow sink point is the destination node. In network, multiple paths can exist between a given source destination pair. The path designed is robust but is difficult to implement in packet-switched network. Here, routing is based on sequential fixing which is a centralised and heuristic approach. The sequential-fixing algorithm starts by setting up and solving the relaxed LP version of the original problem to obtain the lower bound. Then the assignment variables are sorted in descending order. Then the largest bit is set to 1 and other variable are set to 0. Then, the LP formulation of the problem is solved based on the variables. This procedure is repeated until we get fixed assignment variables. B. Local spectrum knowledge In local knowledge based scheme, nodes do not have a full knowledge of the spectrum availability. Each SU has its own spectrum availability knowledge gathered through distributed protocols. The proposed solutions are divided according to the metrics it uses to specify quality of routes like interference and power based solutions, delay based solutions, throughputbased solutions, link quality/stability based solutions, probabilistic approaches. 1) Interference and power based solutions: Interference and power based solutions [12] are mainly based on power consumption for transmission and the interference that is generated along a multi hop path through secondary users. It solves the problem of neighbour discovery and routing. Different terminals in CRAHNs have different wireless systems which makes neighbour discovery and routing from source to destination an issue. To solve this problem, a common link control radio (CLCR) [12] is introduced, which is a common active wireless system of cognitive terminals. Based on CLCR, a minimum weight routing protocol is introduced which helps in finding the path from source to destination having the minimum weight so that data can be transmitted though minimum overhead path among the terminals. The main objective of this scheme is that network discovery and routing will be performed in CLCR through a Fig. 8. Neighbour discovery and routing over CLCR [12] Fig. 9. Example of routing parameters [12] common active wireless system of the terminals. In CLCR, terminals discover the neighbours by sensing the carriers of its neighbours. After the neighbours are selected, the best path is selected by selecting the wireless link that is mostly available. Figure 8 shows how neighbour discovery and routing takes place in presence of CLCR. Here, transmission power is considered as one of the routing overhead. The transmission power is represented as the distance between a transmitter (source) and receiver (destination) and is denoted by: P T X = P RX (4 Π d/λ) 2 (1) where P T X denotes transmission power of a transmitter, P RX denotes remaining power of wave at a receiver, λ denotes wave length and d denoted the actual distance between source and destination. Figure 9 shows an example of routing weights and reachable distances. The protocol is based on finding the path that has minimum weight between source and destination. At first, the source discovers its neighbours by broadcasting a request over CLCR. The nodes receiving the request replies back to the source with a list of all the wireless systems available. Based on this reply, the source selects a neighbour which it can reach in minimum weight. This process is repeated for every source destination, until the final destination is reached.

5 2) Delay based solutions: Delay based solutions [13] are based on delays that occur in establishing, maintaining and sending traffic in multi-hop routes in CRAHNs. The delay metrics that are considered are switching delay, medium access delay and queueing delay. In CRAHNs nodes often switch their path from one frequency band to another which may lead to switching delay. MAC access scheme that are used in a given frequency band leads to medium access delay. Queueing delay refers to the delays experienced in a node s queue because of the limited output transmission capacity of a node. The protocol is based on local coordination of neighbours. A node which is common among the neighbour nodes decides whether to keep the incoming flow or to change its direction to its neighbours based on the local work load. While creating the path between source and destination, at first the source broadcasts route requests (RREQ) message, which contains the local network state, to its immediate neighbour. In the Figure 10, source forwards a RREQ message to node 1. Node 1 in turn forwards the message to node 2, by adding its own spectrum opportunities (SOP) - which contains a list of currently available and unavailable channels. RREQ message is forwarded by intermediate nodes until it reaches the destination D where the possible delays are calculated on each probable frequency bands, based on the above mentioned metrics. Out of these it chooses the best possible frequency band that can be used and sends back a route reply (RREP) message back in the same path as RREQ message. All the nodes in the backward path process the RREP packet, as shown in the Figure 10. But as this RREP message moves along the backward path, it may change its route - whenever a node has more than one flow, it can switch between frequency bands depending on delay. In the Figure 10, node 3 checks whether its neighbour nodes can carry the flow in a better delay. As, node 3 can carry the flow with a better delay, the backward path flow is moved through node 3. Hence, in this way the best possible path is chosen. 3) Throughput based solutions: Throughput based solutions [2] are based on maximising the throughput and further classified as: path spectrum availability routing and spectrum utility based routing. Path spectrum availability routing [2]: It is based on Spectrum Aware Mesh Routing (SAMER) protocol which takes long term and short term spectrum availability into account. SAMER designates a path to send data that has highest spectrum availability. At first all the possible paths are established using Path Spectrum Availability (PSA) metric. PSA s metric includes: Local spectrum availability [2]: Spectrum availability at node i depends on availability of spectrum block at i, bandwidth and contention from other SUs. Spectrum blocks quality depends on their bandwidth and loss rate. After all the possible paths are established, the path having the highest PSA value is used to send data. PSA is measured in terms of throughput as: T hr (i,j),b = T f,b.b w,b (1 P loss,b ) (2) where B w,b denotes bandwidth and P loss,b denotes the loss probability of the spectrum block b.the aggregate throughput between pair of neigh nodes i,j is measured by smoothed aggregate throughput denoted by: ST hr (i,j),b = α.st hr i,j + (1 α).t hr i,j (3) The spectrum availability of a path is measured by smoothed aggregate throughput. Hence, when a data is send from a source to destination, the source first chooses its next hop based on PSA and this step is repeated until destination is reached. Spectrum utility based routing [14]: It is based on routing and dynamic spectrum allocation (ROSA) algorithm. This algorithm is based on spectrum utility and the best route is based on spectrum opportunities with the goal to maximise spectrum utility. Spectrum utility for link (i,j) is defined as: U i,j = c i,j (Q s i Q s j ) (4) where c i,j represents achievable capacity for link i,j; Q i (s*) represents the current backlog of packets at node i for the session (packet flow) s* and s* is the session with the highest differential backlog. The node i at first tries to find out its next hops for session s(n 1, n 2,..., n N ). Then it calculates the capacity over the links for each probable neighbour means each SU uses a decision algorithm to choose the spectrum mini-bands and power level that will be used during the whole spectrum bands. Then it chooses the next hop, j*, that maximises the spectrum utility. These steps are repeated until the destination is reached. 4) Link quality/stability based solutions: In link quality/stability based solutions [15] the available channels changes frequently in CRNs. The number of channels available at SUs varies and change often with respect to other nodes. Hence, routes also change according to the available nodes. Based on this problem, the solution proposed here is to design stable and multi-hop routes. This protocol introduces route stability based on route maintenance cost. The route maintenance cost refers to the cost of maintaining end-to-end connectivity in dynamic multi-hop CRNs. The route changes according to the link switching and channel switching as PUs become active. When PUs become active, one or more links should be altered with a link that is not interfered by PUs. SUs coordinate with each other in terms of signalling, which measures cost in terms of power and service interruption time during switching routes. Figure 11 shows that due to an incoming PU, a new route is required to be established as shown in Figure 12 - two hop path is replaced by three hop path. The main aim of this protocol is maintain a stable route between secondary source destination pairs with low maintenance costs. Routing is also based on epochs which means time interval in which the network topology is stable. In each epoch network topology changes,

6 Fig. 10. Example of route establishment [2] Fig. 11. Rerouting needed due to PU becoming active [2] Fig. 12. Rerouting due to PU activation [2] due to incoming and outgoing of PUs. MILP formulation, as described in subsection A part two, is used to reduce the maintenance costs under interference, link capacity and flow balanced constraints. The metric used to measure the maintenance cost is: w l = (C s l w + αc rep l )/E[T T S l ] (5) where parameter α allows gauging of different cost contributions and E[TTS l ] denotes the average time to switch for the link l. The maintenance cost is inversely proportional to the lifetime. Hence, denominators provide lower link weights to longer available links. Based on the above metric, path on the source side is constructed and changed according to the spectral conditions. 5) Probabilistic approaches: In probabilistic approach [16] routing is based on probabilistic estimation of available capacity of every CR link. Here source based routing protocol is used for path selection from source to destination. When an application requests a route from a source to a destination with a rate demand D, the source node starts the algorithm. The source node gathers information about other nodes using link state advertisements over the control channel. Then the link probabilities on all the channels are calculated as: P r[c i kj D] = P r[p i i,j (P i r,j/2 D/wi 1) N 0 ] (6) where D is the rate demand, N 0 is the power of the white Gaussian noise, w i represents bandwidths and P i r,j is the power of the received signal. After that, the source chooses a route to destination using path selection algorithm. In this case, a log operation on the probability is used to obtain ordered weights. The smaller the weight means higher is the probability. Then, Dijkstra s algorithm is used to find the shortest path from source to destination. IV. COMPARISON OF AFOREMENTIONED PROTOCOLS Table 1 demonstrates a thorough comparison of the above mentioned protocol solutions. The routing solutions can be divided into two main categories: Category 1: Solutions are mainly based on fixed or stable network topology and each node has full knowledge of the available spectrum. Here, designing routes for CRAHNs

7 is related to designing routes for traditional static wireless networks. Graph theory and mathematical programming is used to design routes from source to destination. These types of solutions are mainly useful in cases where SUs have knowledge of data bases storing the spectrum maps. Category 2: Solutions are based on local knowledge of each SU about the network topology. Here, some approaches create full path from source to destination while some approaches are based on hop to hop movement till destination is reached. However, all the approaches are based on selecting the spectrum on each link of the path. The suitable spectrum bands are selected by measuring metrics like interference, delay, throughput, etc. In some solutions the dynamic PU activity is also considered while creating a route from source to destination. TABLE I COMPARISON OF ALL THE PROTOCOL SOLUTIONS DESCRIBED SO FAR Solutions Whole path Next hop Spectrum awareness Graph MINLP-MILP Interference and power Delay Throughput Link quality/stability Probabilistic approaches V. CONCLUSION Though cognitive radio acts as an effective solution for efficient utilization of spectrum bands, it has some drawbacks as presented in this paper. The dynamic spectrum changing pattern of devices enabled with cognitive radio capabilities makes routing a challenging issue. Though in this paper, I have presented several solutions which help in routing efficiently in Cognitive radio ad-hoc networks. However, some issues are still needed to be solved like issues pertaining to crosslayering, etc. Hence, routing in cognitive radio ad-hoc network will still remain an interesting research area to work on. [5] W. Jeon and D. Jeong, An advanced quiet period management protocol for cognitive radio systems, IEEE Trans. Veh. Technol., vol. 59, no. 3, p [6] X. Huang, D. Lu, P. Li, and Y. Fang, Coolest path: Spectrum mobility aware routing metrics in cognitive ad hoc networks, st International Conference on Distributed Computing Systems, pp , [7] FCC, FCC , Unlicensed Operation in the TV Broadcast Bands, November [8] C. Xin, L. Ma, and C.-C. Shen, Path-centric channel assignment in cognitive radio wireless networks, Cognitive Radio Oriented Wireless Networks and Communications, CrownCom nd International Conference, pp , August [9] X. Zhou, L. Lin, J. Wang, and X. Zhang, Cross-layer routing design in cognitive radio networks by colored multigraph model, Wirel. Pers. Commun., vol. 49, no. 1, pp , April [Online]. Available: [10] Q. Wang and H. Zheng, Route and spectrum selection in dynamic spectrum networks, vol. 1, pp , Jan. [11] T. Hou, Y. Shi, and H. Sherali, Optimal spectrum sharing for multi-hop software defined radio networks, pp. 1 9, December [12] C. Pyo and M. Hasegawa, Minimum weight routing based on a common link control radio for cognitive wireless ad hoc networks, pp , [Online]. Available: [13] Z. Yang, G. Cheng, W. Liu, W. Yuan, and W. Cheng, Local coordination based routing and spectrum assignment in multihop cognitive radio networks, Mobile Networks and Applications, vol. 13, no. 1-2, pp , April [Online]. Available: [14] L. Ding, T. Melodia, S. Batalama, and M. Medley, Rosa: distributed joint routing and dynamic spectrum allocation in cognitive radio ad hoc networks, pp , [Online]. Available: [15] I. Filippini, E. Ekici, and M. Cesana, Minimum maintenance cost routing in cognitive radio networks, pp , October [16] H. Khalife, S. Ahuja, N. Malouch, and M. Krunz, Probabilistic path selection in opportunistic cognitive radio networks, pp. 1 5, December VI. ACKNOWLEDGEMENT I thank Dr. Suzan Bayhan for guiding me to complete this paper. I am also thankful to my reviewers for helping me to improve my paper. REFERENCES [1] J. Marinho and E. Monteiro, Cognitive radio: survey on communication protocols, spectrum decision issues, and future research directions, Wireless Networks, vol. 18, no. 2, pp , [Online]. Available: [2] M. Cesana, F. Cuomo, and E. Ekici, Routing in cognitive radio networks: Challenges and solutions, Ad Hoc Networks, vol. 9, no. 3, pp , May [Online]. Available: [3] I. Akyildiz, W.-Y. Lee, and K. Chowdhury, Crahns: Cognitive radio ad hoc networks, Ad Hoc Networks, vol. 7, no. 5, pp , July [Online]. Available: [4] C. Cormio and K. Chowdhury, A survey on mac protocols for cognitive radio networks, Ad Hoc Networks, vol. 7, no. 7, p , September [Online]. Available:

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

A survey on Spectrum Management in Cognitive Radio Networks

A survey on Spectrum Management in Cognitive Radio Networks A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,

More information

CAODV: Routing in Mobile Ad-hoc Cognitive Radio Networks

CAODV: Routing in Mobile Ad-hoc Cognitive Radio Networks : Routing in Mobile Ad-hoc Cognitive Radio Networks Angela Sara Cacciapuoti, Cosimo Calcagno, Marcello Caleffi Department of Biomedical, Electronics and Telecommunications Engineering University of Naples

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Power Analysis and Comparison of Reactive Routing Protocols for Cognitive Radio Ad Hoc Networks

Power Analysis and Comparison of Reactive Routing Protocols for Cognitive Radio Ad Hoc Networks Power Analysis and Comparison of Reactive Routing Protocols for Cognitive Radio Ad Hoc Networks Dharam Vir 1, Dr. S.K Agarwal 2, Dr. S.A Imam 3 Research Scholar, Dept. of EE, YMCA UST, Faridabad, Haryana,

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks

Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Technical Report, December 4 Pradeep Kyasanur Dept. of Computer Science, and Coordinated Science Laboratory, University of Illinois at

More information

MAC Scheduling for High Throughput Underwater Acoustic Networks

MAC Scheduling for High Throughput Underwater Acoustic Networks MAC Scheduling for High Throughput Underwater Acoustic Networks Yang Guan Chien-Chung Shen Department of Computer and Information Sciences University of Delaware, Newark, DE, USA {yguan,cshen}@cis.udel.edu

More information

Spectrum handoff reduction for cognitive radio ad hoc networks

Spectrum handoff reduction for cognitive radio ad hoc networks Published Research in Conference: International Symposium on Wireless Communication Systems - ISWCS, pp. 1036-1040, 2010 Spectrum handoff reduction for cognitive radio ad hoc networks Mohamed A. Kalil,

More information

Efficient Load Balancing Routing in Wireless Mesh Networks

Efficient Load Balancing Routing in Wireless Mesh Networks ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept

More information

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance

Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance Tamal Chakraborty 1, Atri Mukhopadhyay 2 1 Dept. of Electronics and Telecommunication Engineering 2 School of Mobile

More information

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue

More information

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network International Journal of Future Generation Communication and Networking 67 Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network Jie Zhang, Choong Kyo Jeong, Goo Yeon Lee, Hwa Jong

More information

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

Voice Service Support over Cognitive Radio Networks

Voice Service Support over Cognitive Radio Networks Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

Effective Link Operation Duration: a New Routing Metric for Mobile Ad Hoc Networks

Effective Link Operation Duration: a New Routing Metric for Mobile Ad Hoc Networks Effective Link Operation Duration: a New Routing Metric for Mobile Ad Hoc Networks Xiaoqin Chen, Haley M. Jones, A.D.S. Jayalath Department of Information Engineering, CECS Department of Engineering, CECS

More information

SmartDiagnostics Application Note Wireless Interference

SmartDiagnostics Application Note Wireless Interference SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

Performance Evaluation of The Split Transmission in Multihop Wireless Networks Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr

More information

NEW applications of wireless multi-hop networks, such

NEW applications of wireless multi-hop networks, such 870 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009 Delay Aware Link Scheduling for Multi-Hop TDMA Wireless Networks Petar Djukic, Member, IEEE, and Shahrokh Valaee, Senior Member, IEEE

More information

A Novel Approach for Load Balancing In Heterogeneous Cellular Network

A Novel Approach for Load Balancing In Heterogeneous Cellular Network A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1

More information

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,

More information

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

Manet Load Balancing Parallel Routing Protocol

Manet Load Balancing Parallel Routing Protocol www.ijcsi.org 187 Manet Load Balancing Parallel Routing Protocol Hesham A. Ali 1, Taher T. Hamza 2 and Shadia Sarhan 3 1 Faculty of Engineering, Mansoura University, Mansoura,Egypt 2 Faculty of Computers

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks

A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks Natarajan Meghanathan 1 and Leslie C. Milton 2 1 Jackson State University, 1400 John Lynch

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information

Joint Link Scheduling and Routing for Load Balancing in STDMA Wireless Mesh Networks

Joint Link Scheduling and Routing for Load Balancing in STDMA Wireless Mesh Networks 246 Joint Link Scheduling and Routing for Load Balancing in STDMA Wireless Mesh Networks Whoi Jin Jung, Jae Yong Lee and Byung Chul Kim Dept. of Info. Comm. Engineering, Chungnam National University, Korea

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks

Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,

More information

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.

More information

Performance advantages of resource sharing in polymorphic optical networks

Performance advantages of resource sharing in polymorphic optical networks R. J. Durán, I. de Miguel, N. Merayo, P. Fernández, R. M. Lorenzo, E. J. Abril, I. Tafur Monroy, Performance advantages of resource sharing in polymorphic optical networks, Proc. of the 0th European Conference

More information

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection

More information

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,

More information

Slow Adaptive OFDMA Systems Through Chance Constrained Programming

Slow Adaptive OFDMA Systems Through Chance Constrained Programming www.ijcsi.org 213 Slow Adaptive OFDMA Systems Through Chance Constrained Programming N. Revathy 1, T.Guhan 2 1 Assistant Professor, Department of Computer Applications, Karpagam College of Engineering,

More information

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS M. Tamilarasi 1, T.G. Palanivelu 2, 1, 2 Department of ECE, Pondicherry Engineering College, Puducherry-605014. Email:

More information

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather

More information

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University E-mail:

More information

Impact Of Interference On Multi-hop Wireless Network Performance

Impact Of Interference On Multi-hop Wireless Network Performance Impact Of Interference On Multi-hop Wireless Network Performance Kamal Jain Jitendra Padhye Venkata N. Padmanabhan Lili Qiu Microsoft Research One Microsoft Way, Redmond, WA 98052. {kamalj, padhye, padmanab,

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

Automated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement

Automated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement Automated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement Vijaykumar Naik Pawar M.Tech., Dept of CSE KLS Gogte Institute of Technology Udyambag, Belagavi, Karnataka,

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

An overview of the IEEE 802.22 Standard

An overview of the IEEE 802.22 Standard An overview of the IEEE 802.22 Standard P.Rastegari M.S student of the communication engineering The Electrical & Computer Department of Isfahan University of Technology, IUT E-Mail : P.Rastegari@ec.iut.ac.ir

More information

Medium Access Control Protocols in Mobile Ad Hoc Networks: Problems and Solutions 1

Medium Access Control Protocols in Mobile Ad Hoc Networks: Problems and Solutions 1 1 Medium Access Control Protocols in Mobile Ad Hoc Networks: Problems and Solutions 1 Hongqiang Zhai and Yuguang Fang Department of Electrical and Computer Engineering University of Florida, Gainesville,

More information

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at

More information

A Routing Metric for Load-Balancing in Wireless Mesh Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca

More information

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Load Balancing Routing Algorithm for Data Gathering Sensor Network Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

II RELATED PROTOCOLS. Dynamic Source Routing (DSR)

II RELATED PROTOCOLS. Dynamic Source Routing (DSR) ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra

More information

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar

More information

An Extended AODV Protocol to Support Mobility in Hybrid Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}

More information

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

More information

Cross Layer TCP Congestion Control Load Balancing Technique in MANET

Cross Layer TCP Congestion Control Load Balancing Technique in MANET Cross Layer TCP Congestion Control Load Balancing Technique in MANET Nidhi Shukla 1, Neelesh Gupta 2, Naushad Parveen 3 1 M.Tech Scholar (ECE), 2 Prof & Head (ECE), 3 Asst. Prof. ( ECE), Department of

More information

Allocation of Opportunistic Spectrum for Cognitive Radio Ad hoc Networks

Allocation of Opportunistic Spectrum for Cognitive Radio Ad hoc Networks Allocation of Opportunistic Spectrum for Cognitive Radio Ad hoc Networks Thesis submitted in partial fulfillment for the degree of Master of Science in Electrical Engineering (Telecommunications) By Vijay

More information

Honours Project Report. Smart Wireless Mesh Network

Honours Project Report. Smart Wireless Mesh Network Honours Project Report Smart Wireless Mesh Network Routing using I-BATMAN Richard Maliwatu Supervised by: Dr. Antoine Bagula Category Min Max Chosen 1 Requirement Analysis and Design 0 20 0 2 Theoretical

More information

A hierarchical multicriteria routing model with traffic splitting for MPLS networks

A hierarchical multicriteria routing model with traffic splitting for MPLS networks A hierarchical multicriteria routing model with traffic splitting for MPLS networks João Clímaco, José Craveirinha, Marta Pascoal jclimaco@inesccpt, jcrav@deecucpt, marta@matucpt University of Coimbra

More information

Study of Network Characteristics Incorporating Different Routing Protocols

Study of Network Characteristics Incorporating Different Routing Protocols Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab

More information

CHAPTER 1 1 INTRODUCTION

CHAPTER 1 1 INTRODUCTION CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful

More information

Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks

Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks Abstract. As many radio chips used in today s sensor mote hardware can work at different frequencies, several multi-channel

More information

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Gowthami.V.R, Divya Sharma M.Tech, Dept. of E&C. NHCE, VTU, Bengaluru India. Assistant

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

other. A B AP wired network

other. A B AP wired network 1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer

More information

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor

More information