A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks

Size: px
Start display at page:

Download "A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks"

Transcription

1 2013 IEEE 27th International Conference on Advanced Information Networking and Applications A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks Daichi Amagata, Yuya Sasaki, Takahiro Hara, Shojiro Nishio Department of Multimedia Engineering, Graduate School of Information Science and Technology, Osaka University {amagata.daichi, yuya.sasaki, hara, nishio}@ist.osaka-u.ac.jp Abstract In mobile ad hoc networks (MANETs), to acquire only necessary data items, it is effective that each mobile node retrieves data items using a top-k query, in which data items are ordered by the score of a particular attribute and the query-issuing mobile node acquires data items with k highest scores. In our previous works, we proposed top-k query processing methods for reducing traffic and also keeping high accuracy of query result. Those methods focus on the traffic reduction by not sending back unnecessary data items. However, queries are forwarded to all of nodes in the entire area by flooding, and thus, many nodes which do not contribute to the query result have to send redundant top-k queries and replies, which increases unnecessary traffic. In this paper, we propose a routing method for top-k query processing in MANETs. In this method, when each mobile node sends a top-k query, it refers to its own routing table consisting of the ranking of scores of data items in the network and identifiers of nodes to which queries are forwarded to obtain the necessary data items. Moreover, each node updates its own routing table when the link disconnection occurs and scores of data items are updated. Keywords-Top-k query; Routing; Mobile ad hoc networks; I. INTRODUCTION Recently, mobile ad hoc networks (MANETs)[5], [8] have been attracting increasing interests. Query processing for retrieving data items is one of the important issues in MANETs. Since the network bandwidth and batteries of mobile nodes are limited in MANETs, it is important for query processing to acquire only necessary data items in order to reduce data traffic. A possible and promising solution is that each mobile node acquires data items using a top-k query, in which data items are ordered by the score of a particular attribute and the query-issuing node acquires data items with the k-highest scores (top-k result). A naive manner to process a top-k query in a MANET is as follows. A query-issuing node floods all mobile nodes in the entire network with a query message, and then, each mobile node that receives the query message transmits its own data items with k-highest scores. By doing so, the query-issuing node can acquire all data items included in the top-k result if communication failures do not occur. However, many data items that are not included in the top-k result are sent back to the queryissuing node. This causes communication failures and large battery consumption. Figure 1 shows an application example of a top-k query assuming a rescue effort at a disaster site where the communication infrastructure, e.g., Internet, has been broken down. Let us assume that each rescuer manages Figure 1. Example of Top-k query processing in a MANET the information on his/her responsible sites, and a rescuer searches for sites with high damage to dispatch rescuers with a limited number of apparatuses. When the rescuer on the left side wants to find the two highest damaged sites in the entire area, he issues a top-k query where k is set to 2. Here, if each rescuer transmits the information on the two highest damaged sites in his/her responsible sites, the query-issuing rescuer acquires the information on more sites than necessary. In our previous works, we proposed query processing methods for top-k query for reducing traffic and also keeping high accuracy of query result [3], [9], [10]. In the methods in [3], [9], the query-issuing node floods the query message, and each node estimates the k-th score based on the scores of data items held by nodes on the query path, and sends back its own data items with scores higher than the estimated k-th score. In the method in [10], in the first phase, the query-issuing node collects the information of scores of data items held by each node (the size of a score is less than that of data items), and then determines the threshold as the k-th highest score. In the second phase, the query-issuing node transmits a query attached with the threshold, and each node that received the query sends back its own data items whose scores are equal to or larger than the threshold. However, those methods still have a problem. Those methods focus on traffic reduction by not sending unnecessary date items, but queries are forwarded to all nodes in the network by flooding. Thus, many nodes which do not contribute to the query result have to send redundant top-k queries and replies. As the result, unnecessary traffic increases, and thus, it causes extra battery consumption and communication failures. In this paper, to solve this problem, we propose a routing method for top-k query processing in MANETs. In this method, each node holds a routing table consisting of the ranking of scores of data items in the network and X/13 $ IEEE DOI /AINA

2 identifiers of nodes to which queries are forwarded (we call each of these identifiers the query address) to obtain the necessary data items. When each mobile node issues a query, it refers to its own routing table, and sends the query message to nodes which are the query addresses of these query. Nodes that received the query message behave in the same way. If the query-issuing node and relaying nodes cannot forward a query message to a query address due to a link disconnection, it searches another route to the query address and updates its routing table accordingly. Moreover, when a node updates the score of an its own data item, the node notifies other nodes of the update of the score in order to maintain their routing tables. We present simulation results to evaluate the performance of our proposed method. The contributions of this paper are as follows. We propose an effective routing method for topk query processing to reduce traffic and also keep high accuracy of the query result. To the best of our knowledge, this method is the first routing method for top-k query processing in MANETs. In our proposed method, each node holds a routing table to acquire the top-k result with small traffic. When link disconnections and updates of scores of data items occur, each node updates its own routing table accordingly. This procedure keeps high accuracy of the query result. The remainder of this paper is organized as follows: In Section II, we present some related works. In Section III, we present our proposed routing method for top-k query processing in MANETs. In Section IV, we show the results of the simulation experiments. Finally, in Section V, we conclude this paper. II. RELATED WORK There have been a large number of data-centric routing protocols. Since a data-centric routing protocol aims at retrieving data items with specific attribute values specified by the user, the approach to acquire data items could be similar to that in routing of top-k queries. We first survey some typical data-centric routing protocols. In [4], the authors have proposed a method called directed diffusion for wireless sensor networks. In this method, sinks disseminate a message with their interest of data items, and then, if nodes hold data items with the interest, they forward the data packets toward the sink by flooding. In this process, efficient paths between sinks and nodes are reinforced by a reinforcement mechanism. Messages and data packets are transmitted through reinforced paths with highest probabilities. This method can construct efficient path and achieve small traffic for data transmission. However, because the network topology changes dynamically in MANETs, this method is not effective in MANETs. In [6], the authors proposed a routing method for top-k query processing in wireless sensor networks. This method constructs a cluster for topk query whose size is determined based on the residual energy of the cluster head. This method can keep a balance between the energy consumption among sensor nodes in the network by changing the cluster head. However, the cost of cluster maintenance is too large in MANETs because of movement of nodes. A large number of strategies for processing a top-k query have been proposed in several research fields, such as unstructed P2P networks and wireless sensor networks. However there is no research which focuses on top-k query processing in MANETs except for our previous work and EcoTop [7]. Since the assumption in [7] is quite different with the assumption in this paper, we introduce our previous work, 2-phase top-k query processing [10], which can keep the highest accuracy of query result among our previous methods. 2-phase top-k query processing consists of two phases : search and data collection phases. In the search phase, the query-issuing node floods a query message, and then, collects the information on scores of data items held by all nodes in the entire MANET (the size of a score is smaller than that of data items). Then, it checks those scores and determines the k-th score as the threshold. In the data collection phase, the query-issuing node floods a query message attached with the threshold, and then, collects data items with scores equal to or larger than the threshold. This method can decrease the number of transmitted data items as much as possible. However, all nodes receive and forward queries (and replies) twice. This increases unnecessary traffic. Therefore, to solve this problems in our method in this paper, each node forwards a query message based on its own routing table to only nodes which contribute to the top-k result. As a result, our method can decrease traffic and also keep high accuracy of the query result. III. PROPOSED METHOD In this section, first, we describe the design policy of our proposed method and the assumed environment. Then, we describe the overview of our proposed method and how to process a top-k query in detail. A. Design Policy In MANETs, since mobile nodes consume the limited communication bandwidth for data transmission, a packet loss and packet retransmission may occur when the network is congested, i.e., some data items cannot be transmitted and extra overhead involved. Thus, the number of messages and data items sent by mobile nodes should be small as much as possible. For this aim, it is effective that each node holds the information on data items with k-highest scores and nodes to transmit a query message in order to acquire the top-k result. Thus, each node holds and maintains the information on data items as the routing table and forwards a query message based on the information. B. Assumption The system environment is assumed to be a MANET in which mobile nodes retrieve data items held by itself and other mobile nodes using a top-k query. The query-issuing 162

3 node transmits a query message with the query condition and the number of requested data items, and acquires data items with the k-highest scores among all data items held by mobile nodes in the entire network. Each mobile node determines the number of requested data items, k, from 1 to k max. We assign a unique data identifier to each data item in the system. The set of all data items in the system is denoted by D= {D 1,D 2,,D n }, where n is the total number of data items and D i (1 i n) isa data identifier. Each data item is held by a specific node, and scores of data items are updated as time passes. For simplicity, all data items are of the same size and not replicated. The scores of data items can be calculated from the query condition and some scoring functions. We also assign a unique node identifier to each mobile node in the system. The set of all mobile nodes in the system is denoted by M= {M 1,M 2,,M m }, where m is the total number of mobile nodes and M i (1 i m) is a node identifier. Each mobile node moves freely. C. Overview In our proposed method, a top-k query is processed based on the routing table. Thus, it first needs to construct the routing table at each node. The query-issuing node which issues a query firstly in the network sends a message for constructing routing table, and then nodes that receive the message reply the information on scores of data items held by them. Through this procedure, the query-issuing node knows the ranking of scores (ranking table) and which nodes hold data items with high scores (data holders). Then, it floods a message attached with the ranking table and the information on data holders to all nodes in the network. Nodes that receive this message construct their own routing tables which consist of the ranking table, the identifiers of data holders, the identifiers of nodes to which a query is forwarded to acquire data items with high scores (query address), and time stamps. In top-k query processing, the queryissuing node sends a query message attached with ranks of data items that it requires to the query addresses. If nodes that receive the message hold required data items, they reply the data items. If a link disconnection occurs during processing a top-k query, the node that detects the disconnection searches another route and updates its own routing table accordingly. When the score of a data item is updated, the node that updated the score transmits a message to nodes which hold data items whose ranks have changed. Figure 2 shows an example of behavior of the proposed method when M 1 issues a top-k query for acquiring data items with the three highest scores (k =3). Table I shows the scores of its data items held by mobile nodes. In the figure, the table in each balloon denotes the routing table which each node holds, and q-a means query address. M 1 sends a query message to M 2 to request the 1st rank data item and M 4 to request the 2nd and 3rd rank data items. Then, for example, since M 4 knows that 2nd data Table I SCORES OF DATA ITEMS HELD BY EACH MOBILE NODE Node identifier Scores of data items M 1 89, 88, 82, 78, 70, 66, 49, 30, 21 M 2 99, 90, 80, 77, 72, 71, 69, 55, 42 M 3 81, 79, 53, 41, 33, 29, 19, 12, 11 M 4 96, 87, 76, 61, 58, 50, 44, 37, 10 M 5 92, 75, 60, 59, 56, 40, 30, 25, 22 Figure 2. Example of a behavior of the proposed method item s holder is itself, and 3rd one is not, it transmits a query message to request the 3rd data item to M 5. Nodes that hold required data items send them back. Finally, M 1 can collect data items with the three highest scores. D. Routing Table Construction In this section, we explain how to construct the routing table in detail. When the query-issuing node does not have its own routing table which corresponds to the query condition, the node starts constructing the routing table. First, the node floods all nodes in the network with a routing table message. Each node that received the message at the first time sets the sender node as its parent, and knows its neighbors. Through this process, a tree-network (the root node is the query-issuing node) is constructed. Leaf nodes in the tree-network start sending a reply message with the information on data items (the score, and the node identifier of the holder) with N(> k max )-highest scores to its parent. N is set larger than k max in order to adapt to a case that scores of data items with k max highest scores are updated as smaller scores. Intermediate nodes send back a reply when they received replies from all its children or the pre-determined time limit passes. If a node detects a link disconnection between the node and its parent, it sends a reply to its neighbor node with the information on the minimum hopcount to the queryissuing node. Each node that received a reply stores the information on data items with N-highest scores and the sender node of the reply, so it knows which data item is replied from which node (we call this information the node-data list). From this procedure, the query-issuing node can make the ranking table which consists of scores of data items, node identifiers of data holders, and time stamp. The time stamp is set as the time when the ranking table is made. The list of this information in the ranking table is sorted by score in descending order. Moreover, the node-data list is also made in order to use for constructing the routing table. Then, the query-issuing node floods a message attached 163

4 Table II M 1 S ROUTING TABLE with the ranking table. Nodes that received the message for the first time construct their own routing table. The process that a receiver of this message makes the routing table is as follows. 1) The receiver stores the information in the received ranking table into own routing table. 2) The receiver sets query addresses for all ranks in own routing table as the identifier of the node that sent the ranking table to it. 3) The receiver updates query addresses for ranks to its own identifier if it holds the corresponding data items. 4) The receiver further updates query addresses for ranks to the identifiers of nodes corresponding to data items in its node-data list. After the above procedure, each of nodes that hold data items with k max -highest scores floods a message attached with its node identifier to construct the shortest path to the data items. This process is important to reduce traffic in top-k query processing because without this process, the path depends on the position of the root node (i.e., the query-issuing node). Through all the above procedure, each node knows the next hop node to retrieve the data items with the required rank via the shortest path. Table II shows an example of the routing table of M 1 in Figure 2 in the case of N=20. For example, it knows that the next hop node is M 2 to retrieve the 1st rank data item. E. Top-k Query Processing In our proposed method, each node sends a query message based on its own routing table and nodes that received the query message send back only required data items. We explain the detail of top-k query processing. 1) Transmission of query: A query message consists of the following elements. Query-issuing node s ID: the node identifier of the query-issuing node. Query ID: the identifier of the query Number of requested data items: the number of data items, k, that the query-issuing node requests. Query condition: The query condition specified by the query-issuing node. Ranking list of requested data items: the list of ranks of data items requested by this query message. Sender node s ID: the node identifier of the node that sends this message. The behaviors of the query-issuing node, M p, and nodes that received the query message are as follows. 1) M p specifies the query condition and checks whether it has the routing table or not. If it does not have, it first performs the procedure in section III-D. 2) M p specifies the number of requested data items, k. Then, it unicasts a query message to each of query addresses corresponding to the ranks higher than k in its own routing table. In this message, the ranking list of requested data items is set as the list of ranks that this message targets. 3) Each mobile node, M q, that received the query message sends an ACK to its sender node. If M q received the query firstly, it sets the sender as its parent and stores the ranking list and query-issuing node s ID. Then, M q unicasts a query message to each of query addresses corresponding to the requested ranks in the query message (specified in the ranking list) except for data items that M q holds. In this message, the ranking list is set in the same way as step 2), and the sender s ID is set as M q. If M q received the same query message again and its requested ranks are different from that in the previous one, it unicasts a query message in the same way as described above. Otherwise, M q drops the message. 4) Each mobile node that received an ACK updates the time stamps of the ranks (as the current time) whose query address is the sender of the ACK. Through this procedure, a query message is forwarded to only necessary nodes for collecting data items included in the top-k result. If there are some data items whose query addresses are same, only one query is issued by aggregated by using the ranking list of requested data items, which is effective to reduce traffic. Moreover, each node can send back data items by only one reply message. 2) Transmission of Reply: In our proposed method, each mobile node sends back a reply message attached with data items requested by the query message, which can suppress unnecessary data items which are not included in the top-k result being sent back. A reply message consists of the following elements. Query ID: the identifier of the query Sender node s ID: the node identifier of the node that sends this message. Data list: the list of pairs of data items requested by the query and their scores. The behaviors of each mobile node that has completed the transmission of a query message are as follows. 1) Each mobile node, M r, that holds all data items corresponding to the ranking list in the received query message starts to transmit a reply message to its parent. In the reply message, the query ID is set as the query ID in the received query message, and data list consists of pairs of requested data items which M r holds and their scores. 2) When a mobile node, M s, receives a reply, it updates the time stamps (as the current time) for ranks corresponding to the data items in the data list 164

5 in the received reply. If the query addresses for corresponding to those data items are not the sender of the reply message in its own routing table, M s updates those query addresses to the sender. 3) When a mobile node, M t, which is not the queryissuing node receives all data items which M t requested or the pre-determined time limit has passed, it transmits a reply message to its parent. In this message, the data list consists of pairs of requested data items which M t holds and all received data items and their scores. Here, if M t receives data items which are not recorded in its own routing table due to the updates of the scores of the data items., it updates its own routing table. We explain this procedure in section III-F2. 4) When a mobile node, M t, receives data items which it did not request in its query message, it does the same process as step 2). However, if M t has already transmitted the reply to its parent, it does not send data items which were already transmitted. Through this procedure, each mobile node sends back only data items which are requested by the query, so unnecessary data items are not transmitted. Moreover, each mobile node that received replies can update their routing table, which can keep accuracy of the routing table. F. Routing Table Maintenance In our proposed method, each node has to update its own routing table when a link disconnection occurs and scores of data items are updated in order to keep accuracy of the routing table. We explain how to maintain a routing table in this section. 1) Handling Link Disconnection: In MANETs, the network topology dynamically changes due to movement of nodes. If a mobile node cannot transmit a query to a query address or a reply to its parent because of a link disconnection between these nodes, the accuracy of query result decreases. Therefore, when a mobile node detects the link disconnection (we call the node the route request node), it searches another route to the query address or its parent (we call this node the destination node) by sending a route request message. A route request message consists of the following elements. Route request node s ID: the node identifier of the route request node. Sender node s ID: the node identifier of the node that sends this message. Query ID (only for reply transmission): the identifier of the query. TTL: the hopcount which represents the search range to find the destination node. Search list: the list of triples of a destination node s identifier, ranks corresponding to the node, and their time stamps in the route request node s routing table in the case of query transmission. The list of pairs of the destination node s identifier and query-issuing node s identifier in the case of reply transmission. A route reply message consists of following elements. Route request node s ID: the node identifier of the route request node. Sender node s ID: the node identifier of the node that sends this message. Query ID (only for reply transmission): the identifier of the query. Answer list (only for query transmission): the list of pairs of requested ranks and their time stamps in the destination node s routing table. The procedure is same in both query and reply transmission. A mobile node that detects a link disconnection broadcasts a route request message. If a node that received this message is the destination node or the query-issuing node (only for reply transmission), it starts to send back a route reply message. Otherwise, it decrements TTL and broadcasts the route request message if TTL is larger than 0. In the case of query transmission, if a node that received a route reply does not hold data items specifies in the answer list in its own routing table and the time stamps in the answer list are newer than that in its own routing table, it updates the query addresses corresponding to ranks as the sender of the route reply message as well as their time stamp as the current time. In this way, even if a link disconnection occurs, mobile nodes can continue to transmit a query or a reply by finding another route, and the accuracy of query result can be kept. 2) Score Update Announcement: If scores of data items are updated, the ranking of data items may change. In our proposed method, when the ranking of data items changes, a mobile node that updated the data items updates its own routing table, and sends a message to notify the change in rank of data items. There are three cases that need to maintain the routing table when updating the score of a data item held by a mobile node, M v. 1) The rank of the data item move to different rank in the routing table. 2) The data item is newly included in routing table (i.e., appear on the ranking list). 3) The data item is excluded from the routing table (i.e., disappear from the ranking list). In the following cases, we explain how to update the routing table in each of the three cases and how to notify the score updating. Case 1: If the score of the i(< N)-th data item in the routing table is updated and its rank becomes different ( N), M v updates its own routing table and resorts its records in descending order by score. M v also updates the time stamps for the moved ranks as the current time. Case 2: If the score of the data item newly becomes i(< N)- 165

6 Table III CONFIGURATION OF PARAMETERS Symbol Meaning Values(Range) k Number of requested data items 30 (1 50) d Size of data items 128 ( )[byte] T Score update interval 90 (15 300)[sec] th rank, M v inserts the information on the data items to its own routing table. Case 3: If the score of i(< N)-th data item becomes smaller than N-th score, M v deletes the information on the data item in routing table. Then, M v sends a score update announcement message to query addresses corresponding to data items whose ranks are changed. A score update announcement message consists of the following elements. Score update node s ID: the identifier of the score update node. Score update announcement ID: the identifier of the score update announcement. Sender node s ID: the identifier of the node that sends this message. Score update list: the list of pairs of the previous score and the new score of the data items. Each node that received a score update announcement message sends an ACK to its sender, and it updates its own routing table in the same way as M v, expect for that it sets query addresses for changed ranks to the sender node s ID in score update announcement message. After that, it further transmits a score update announcement message in the same way as M v. The node that received an ACK updates the time stamp for the rank whose query address is the sender of the ACK as the current time. If the node does not receive an ACK within the pre-determined time limit, it broadcasts a score update announcement message. In this way, a node that updates data items transmits a score update announcement message to only nodes which have to update their routing table soon, i.e., nodes holding data items whose ranks have been changed. Nodes which did not receive a score update announcement message can update their own routing table when they receive a reply message in a future top-k query. Therefore, the overhead of transmission of a score update announcement message is small. IV. SIMULATION EXPERIMENTS In this section, we show the results of simulation experiments regarding the performance evaluation of our proposed method. For the simulation experiments, we used a network simulator, QualNet4.0 [12]. A. Simulation Model The number of mobile nodes in the entire system is 100 (M 1,M 2,,M 100 ). These mobile nodes exist in an area of 800 [m] 500 [m] and move according to the random waypoint model [1] where the movement speed and the pause time are 0.5 [m/sec] and 60 [sec] respectively. Each mobile node transmits messages and data items using an IEEE b device whose data transmission rate is 11 [Mbps]. The transmission power of each mobile node is determined so that the radio communication range becomes about 100 [m]. We assume that packet losses and delays occur due to a radio interference. Each mobile node has 20 data items, and the size of data items is d [byte]. The score distribution in the entire network follows the normal distribution and the total range of scores are set as [1, 999]. A node which is randomly selected at every T [sec] updates scores of data items held by itself. In our proposed method, the number of rank orders, N, maintained in the routing table and k max are respectively set as 100 and 50. The TTL value of a route request message is set as 2. Table III shows the parameters and their values used in the simulation experiments. The parameters are basically fixed to constant values specified by numbers to the left of the parenthetic values. Each of them is varied in the range specified by the parenthetic element in a simulation experiment. We compare the performance of our proposed method with that of the method proposed in [10] and a naive method (denoted by Fixed k) in which each node replies k data items with highest scores among its own and received data item. In the above simulation model, we randomly determine the initial position of each mobile node and randomly determine a query-issuing node at every 3 [sec]. We evaluate the following criteria during 600 [sec]. Accuracy of query result: is MAP (Mean Average Precision) which is often used to calculate the accuracy with a ranking. MAP averages accuracy of each query result, AP (Average Precision). AP and MAP are determined by the following equations. AP i = 1 k MAP = k j=1 x j e (1) 1 querynum querynum i=1 AP i (2) AP i is accuracy of the i-th query result. x is the number of collected data items with j-highest score included within j-highest correct answer set. querynum is the total number of issued query. e is determined by the following equation. { 1 (j-th answer is included in top-k result) e = (3) 0 (otherwise) Thus, MAP gets higher as the query-issuing node gets data items with higher score. Traffic: is defined as the total volume of messages sent during the simulation. Search time: is defined as the average of the elapsed time after the query-issuing node issued a top-k query until it acquired the result. 166

7 (a) Accuracy of query result (a) Accuracy of query result (b) Traffic Figure 3. Effects of k (b) Traffic Figure 4. Effects of d (c) Search Time (c) Search Time B. Impact of Number of Requested Data Items We examine the effects of the number of requested data items, k. Figure 3 shows the simulation result. In this graph, the horizontal axis indicates k. The vertical axes indicate the accuracy of query result in Figure 3(a), the traffic in Figure 3(b), and the search time in Figure 3(c). From Figure 3(a), as k increases, the accuracy of query result decreases in all methods. This is because packet losses occur more often due to the increase of traffic. When k is large, the difference of accuracy of query result between our proposed method and the naive method is very large because a large number of unnecessary data items are sent back in the naive method. The accuracy of query result in our proposed method is also higher than that in the method in [10]. This is because in the method in [10], when the threshold is not set accurately due to packet losses in the search phase, traffic increases by sending back unnecessary data items. From Figures 3(b) and 3(c), as k increases, the traffic and the search time increase in all methods since the size of a reply message increases. Since in the method in [10], query processing requires two rounds of message transmissions, the search time is much longer than our proposed method. When k is small, the search time is short in our proposed method because the number of nodes which send a query message is very small. C. Impact of Data Size We examine the effects of the size of data items, d. Figure 4 shows the simulation result. In this graph, the horizontal axis indicates d. The vertical axes indicate the accuracy of query result in Figure 4(a), the traffic in Figure 4(b), and the search time in Figure 4(c). From Figure 4(a), as d increases, the accuracy of query result decreases in all methods. This is because packet losses occur more often due to the increase of traffic. When d is large, the difference of accuracy of query result between our proposed method and the method in [10] is large. This is because in the method in [10], if packet losses happen in the search phase, the threshold cannot be accurately set, and unnecessary data items are sent back, which further causes packet losses. Our method can suppress such unnecessary traffic by using the routing table. From Figures 4(b) and 4(c), as d increases, the traffic and the search time increase in all methods. The reason is the same as that mentioned in section IV-B. D. Impact of Score Update Interval We examine the effects of the score update interval, T. Figure 5 shows the simulation result. In this graph, the horizontal axis indicates T. The vertical axes indicate the accuracy of query result in Figure 5(a), the traffic in Figure 5(b), and the search time in Figure 5(c). Here, we omit the result of naive method from simulation results because the naive method shows much worse performance than other methods. From Figure in 5(a), the accuracy of query result is almost constant in the method in [10] since this method determines the threshold on demand when a query is issued, which is not affected by T. In our proposed method, when T is long, the accuracy is almost constant. However, as T gets very short, the accuracy of query result slightly decreases because a failure of score update announcement sometimes occurs, which causes an error in the ranking table in its routing table. 167

8 (a) Accuracy of query result (b) Traffic Figure 5. Effects of T (c) Search Time From Figures 5(b) and 5(c), the traffic and the search time are not significantly affected by T in both methods. The reason for the method in [10] is same as that for the result in Figure 5(a). In the proposed method, a score update announcement message is transmitted to only nodes which need to update its routing table soon, and thus, its overhead is not high. V. CONCLUSION In this paper, we propose a routing method for top-k query processing in MANETs. In this method, each mobile node holds the routing table consisting of the ranking of data items in the network and identifiers of nodes (query addresses) to which queries are forwarded. Each node sends a top-k query message by referring to its own routing table. Then, nodes which received a query message sends back required data items. In this way, our proposed method can reduce the traffic and also keep high accuracy of the query result. Moreover, when a mobile node detects a link disconnection during the transmission of query and reply message, it finds another route and updates routing table. In addition, when the score of a data item is updated, a score update announcement is forwarded efficiently. The simulation results show that our proposed method reduces traffic and achieves high accuracy of the query result compared with the method in [10] and the naive method. In our proposed method, a top-k query message is forwarded by using unicast and the route to each of data items with k-highest scores is single. Thus, the accuracy of the top-k result is expected to become lower in highly dynamic networks because link disconnections occur frequently. We plan to extend our method to solve this problem. ACKNOWLEDGMENT This research is partially supported by the Grant-in-Aid for Scientific Research (S)( ) and (B)( ) of MEXT, Japan. REFERENCES [1] T. Camp, J. Boleng, and V. Davies, A survey of mobility models for ad hoc networks research, Wireless Communications and Mobile Computing: Special issue on Mobile Ad Hoc Networking: Reserach, Trends and Applications, vol.2, no.5, pp , [2] J. Cecílio, J. Costa, and P. Furtado, Survey on data routing in wireless sensor networks, Wireless Sensor Network Technologies for the Information Explosion Era, vol.278, pp.3 46, [3] R. Hagihara, M. Shinohara, T. Hara, and S. Nishio, A message processing method for top-k query for traffic reduction in ad hoc networks, Proc. Int. Conf. on Mobile Data Management, pp.11 20, [4] C. Intanagonwiwat, R. Govindan, and D. Estrin, Directed diffusion for wireless sensor networking, IEEE/ACM Trans. Networking, vol.11, no.1, pp.2 16, [5] D. B. Johnson, Routing in ad hoc networks of Mobile Hosts, Proc. IEEE WMCSA 94, pp , [6] S. Mo, H. Chen, and Y. Lie, Clustering-based routing for top-k querying in wireless sensor networks, EURASIP Journal on Wireless Communications and Networking, vol.2011, no.1, p.1 13, [7] N. Padhariya, A. Mondal, V. Goyal, R. Shankar, and S. K. Madria, EcoTop: An Economic Model for Dynamic Processing of Top-k Queries in Mobile-P2P Networks, Proc. Int. Conf. DASFAA, pp , [8] C. E. Perkins, and E. M. Ooyer, Ad-hoc on-demand distance vecotr routing, Proc. ieee WMCSA 99, pp , [9] Y. Sasaki, R. Hagihara, T. Hara, and S. Nishio, A top-k query method by estimating score distribution in mobile ad hoc networks, Int. Workshop on Data Management for wireless amd Pervasive Communications, pp , [10] Y. Sasaki, T. Hara, and S. Nishio, Two-phase top-k query processing in mobile ad hoc networks, Proc. Int. Conf. on Network-Based Information Systems, pp.42 49, [11] X. Zhao, K. Mao, S. Cai, and Q. Chen, Data-centric routing mechanism using hash-value in wireless sensor network, Wireless Sensor Network, vol.2, no.9, pp , [12] Scalable Network Technologoes: Creaters of QualNet Network Simulator Software, <URL: 168

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks 928 Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks Rui Teng, Shirazi N. Mehdad and Bing Zhang National institute of information and communications

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Location Information Services in Mobile Ad Hoc Networks

Location Information Services in Mobile Ad Hoc Networks Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent

More information

DAG based In-Network Aggregation for Sensor Network Monitoring

DAG based In-Network Aggregation for Sensor Network Monitoring DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless

More information

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Gowthami.V.R, Divya Sharma M.Tech, Dept. of E&C. NHCE, VTU, Bengaluru India. Assistant

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at

More information

Dynamic Source Routing in Ad Hoc Wireless Networks

Dynamic Source Routing in Ad Hoc Wireless Networks Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract

More information

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

Ad hoc On Demand Distance Vector (AODV) Routing Protocol Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter

More information

MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks

MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks Journal of Information Processing Systems, Vol.6, No.3, September 2010 DOI : 10.3745/JIPS.2010.6.3.295 MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks Mohamed Mostafa

More information

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Energy Efficiency of Load Balancing in MANET Routing Protocols

Energy Efficiency of Load Balancing in MANET Routing Protocols Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing protocols and workload balancing techniques

More information

Gossiping using the Energy Map in Wireless Sensor Networks

Gossiping using the Energy Map in Wireless Sensor Networks Gossiping using the Energy Map in Wireless Sensor Networks Max do Val Machado 1, Raquel A.F. Mini 2, Antonio A.F. Loureiro 1, Daniel L. Guidoni 1 and Pedro O.S.V. de Melo 1 1 Federal University of Minas

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted

More information

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna

More information

Efficient File Sharing Scheme in Mobile Adhoc Network

Efficient File Sharing Scheme in Mobile Adhoc Network Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and

More information

A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications

A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications Ahmed Abada Dept. of Systems and Computer Engineering Carleton University Ottawa, ON, Canada Li Cui Institute of Computing

More information

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute

More information

IJMIE Volume 2, Issue 7 ISSN: 2249-0558

IJMIE Volume 2, Issue 7 ISSN: 2249-0558 Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)

More information

An Extended AODV Protocol to Support Mobility in Hybrid Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

Isolines: Energy-efficient Mapping in Sensor Networks

Isolines: Energy-efficient Mapping in Sensor Networks Isolines: Energy-efficient Mapping in Sensor Networks Ignacio Solis and Katia Obraczka {isolis, katia}@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz April 15, 2005 Abstract

More information

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin

More information

Optimized Load Balancing Mechanism Using Carry Forward Distance

Optimized Load Balancing Mechanism Using Carry Forward Distance Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

POWER AWARE QOS MULTIPATH ROUTING PROTOCOL FOR DISASTER RECOVERY NETWORKS

POWER AWARE QOS MULTIPATH ROUTING PROTOCOL FOR DISASTER RECOVERY NETWORKS POWER AWARE QOS MULTIPATH ROUTING PROTOCOL FOR DISASTER RECOVERY NETWORKS ABSTRACT S.Santhi 1, Dr.G.Sudha Sadasivam 2 1 Department of Information Technology,Dr.NGP Institute of Technology,Coimbatore,India

More information

Routing and Transport in Wireless Sensor Networks

Routing and Transport in Wireless Sensor Networks Routing and Transport in Wireless Sensor Networks Ibrahim Matta (matta@bu.edu) Niky Riga (inki@bu.edu) Georgios Smaragdakis (gsmaragd@bu.edu) Wei Li (wli@bu.edu) Vijay Erramilli (evijay@bu.edu) References

More information

Service Discovery in Mobile Ad-Hoc Networks

Service Discovery in Mobile Ad-Hoc Networks A Parameter-Based Service Discovery Protocol for Mobile Ad-Hoc Networks Unai Aguilera, Diego López-de-Ipiña Deusto Institute of Technology - DeustoTech University of Deusto Avda. Universidades 24, 48007

More information

Performance and Scalability of Self-Organizing Hierarchical Ad Hoc Wireless Networks

Performance and Scalability of Self-Organizing Hierarchical Ad Hoc Wireless Networks Performance and Scalability of Self-Organizing archical Ad Hoc Wireless Networks Suli Zhao, Ivan Seskar and Dipankar Raychaudhuri WINLAB, Rutgers University 7 Brett Road, Piscataway, NJ 8854 {sulizhao,

More information

Security Threats in Mobile Ad Hoc Networks

Security Threats in Mobile Ad Hoc Networks Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey 21020013@baskent.edu.tr, asafak@baskent.edu.tr

More information

Energy Efficient and Robust Multicast Protocol for Mobile Ad Hoc Networks

Energy Efficient and Robust Multicast Protocol for Mobile Ad Hoc Networks Energy Efficient and Robust Multicast Protocol for Mobile Ad Hoc Networks Sangman Moh Chansu Yu Ben Lee Hee Yong Youn Electronics and Telecommunications Research Institute Daejeon, Korea smmoh@etri.re.kr

More information

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

Study of Network Characteristics Incorporating Different Routing Protocols

Study of Network Characteristics Incorporating Different Routing Protocols Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab

More information

Reliable Adaptive Lightweight Multicast Protocol

Reliable Adaptive Lightweight Multicast Protocol Reliable Adaptive Lightweight Multicast Protocol Ken Tang Scalable Network Technologies ktang@scalable-networks.com Katia Obraczka UC Santa Cruz katia@cse.ucsc.edu Sung-Ju Lee HP Labs sjlee@hpl.hp.com

More information

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue

More information

Energy Consumption analysis under Random Mobility Model

Energy Consumption analysis under Random Mobility Model DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network

More information

Intelligent Transportation System for Vehicular Ad-Hoc Networks

Intelligent Transportation System for Vehicular Ad-Hoc Networks Intelligent Transportation System for Vehicular Ad-Hoc Networks T. Sujitha 1, S. Punitha Devi 2 1,2 Department of CSE, P.A College of Engineering and Technology, Coimbatore, Tamilnadu Abstract - Vehicular

More information

Simulation Based Analysis of VOIP over MANET

Simulation Based Analysis of VOIP over MANET Simulation Based Analysis of VOIP over MANET Neeru Mehta 1, leena 2 M-Tech Student 1, Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal, Haryana, India Abstract In the last

More information

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN)

ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN) ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN) Yao, Yanjun 1 Papers Real-time Power-Aware Routing in Sensor Networks Real-Time Traffic Management in Sensor

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network

Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network Jyoti P.Desai 1, Prof Abhijit Patil 2 1 Student, ME Computer Engineering, Yadavrao Tasgaonkar college of Engineering and

More information

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks

AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks : an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks Gianni Di Caro, Frederick Ducatelle and Luca Maria Gambardella Istituto Dalle Molle sull Intelligenza Artificiale (IDSIA) Galleria 2,

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied

More information

Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas

Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas I.J.Computer Network and Information Security, 21, 2, 26-32 Published Online December 21 in MECS (http://www.mecs-press.org/) Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using

More information

An Energy Efficient Location Service for Mobile Ad Hoc Networks

An Energy Efficient Location Service for Mobile Ad Hoc Networks An Energ Efficient Location Service for Mobile Ad Hoc Networks Zijian Wang 1, Euphan Bulut 1 and Boleslaw K. Szmanski 1, 1 Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 12180

More information

Location-Aided Routing (LAR) in mobile ad hoc networks

Location-Aided Routing (LAR) in mobile ad hoc networks Wireless Networks 6 (2000) 307 321 307 Location-Aided Routing (LAR) in mobile ad hoc networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science, Texas A&M University, College Station, TX

More information

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS M. Tamilarasi 1, T.G. Palanivelu 2, 1, 2 Department of ECE, Pondicherry Engineering College, Puducherry-605014. Email:

More information

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of

More information

On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks

On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura Department of Electronic and Telecommunication Engineering (DIET) University

More information

A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks

A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks Sunho Lim, Wang-Chien Lee, Guohong Cao, and Chita R. Das Department of Computer Science & Engineering The Pennsylvania State University

More information

A networking framework for spontaneous interactions in MANETs

A networking framework for spontaneous interactions in MANETs A networking framework for spontaneous interactions in MANETs BACKGROUND AND MOTIVATIONS Promoting interactions Socializing Group wise Transforming places Ephemeral Ad hoc Minimal Application driven User

More information

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather

More information

II RELATED PROTOCOLS. Dynamic Source Routing (DSR)

II RELATED PROTOCOLS. Dynamic Source Routing (DSR) ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra

More information

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)

More information

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.

More information

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,

More information

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,

More information

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India

More information

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance

More information

Location-Aided Routing (LAR) in mobile ad hoc networks

Location-Aided Routing (LAR) in mobile ad hoc networks Location-Aided Routing (LAR) in mobile ad hoc networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science, Texas A&M University, College Station, TX 77843-3112, USA 2000 Abstract A mobile

More information