A Dominating-Set-Based Broadcast Gossip Protocol in Mobile Ad Hoc Networks

Size: px
Start display at page:

Download "A Dominating-Set-Based Broadcast Gossip Protocol in Mobile Ad Hoc Networks"

Transcription

1 A Dominating-Set-Based Broadcast Gossip Protocol in Mobile Ad Hoc Networks Chun Meng, Meina Song, and Junde Song School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing, China Junmin Jia School of Electronic and Information Engineering North China Electric Power University Baoding, China Abstract Traditional gossip-based protocols rely on underlying routing protocols to disseminate messages. In mobile ad hoc networks, frequent topology changes may incur many route errors, which increase the overhead of maintaining routing information. They also need to maintain a partial or global view of the network, which further increases the overhead. This paper presents a broadcast gossip protocol based on dominating set. Neither does it require maintaining any routing information, nor does it need any partial or global view of the network. In this paper, a dominating set is dynamically constructed through an on-demand three-way join session and is kept connected through connect session. A reduce session is also proposed to reduce the size of a dominating set and the calculation only involves the nodes in the dominating set. Simulation results prove that the proposed protocol can achieve high scalability in terms of reliability and transmission delay. Keywords-mobile ad hoc network; gossip; dominating set I. INTRODUCTION Compared with wired networks, mobile ad hoc networks (MANETs) are more error-prone and the topology might undergo frequent changes due to mobility and switch-offs of mobile hosts. These features pose great challenges for designing efficient and reliable multicast protocol for MANETs. Recently, one class of multicast protocols, called gossip-based protocols, have been proposed and gained popularity among researchers. Gossip was first proposed for dissemination of updates to distributed database [1]. The main idea of this family of protocols is to have each node select a random set of nodes as targets and send messages to them. Due to the randomness of targets, gossip is highly resilient to node failures, link disconnections and topology changes. According to the underlying routing protocol, gossip-based protocols can be classified into two categories. One category relies on underlying routing protocol to transmit messages. Examples of this category include AG [2] and RDG [3]. In MANETs, frequent topology changes may incur many route errors, which will greatly increase the cost of maintaining routing information. This problem will become worse when the size of network increases. Another drawback of this category of gossip is that it requires each node maintain a global or partial view of the network, which further increases the overhead. Another category exploits the broadcast nature of wireless medium. Instead of sending packets to a random set of nodes one by one, a node locally broadcasts one packet and every node in the transmission range will receive it. They don t rely on any underlying routing protocol and thus don t need to maintain any routing information. In addition, they don t require any view of the network. These features make them scale well even in large and highly dynamic network. In this paper, we propose a broadcast gossip protocol based on the dominating-set of a multicast group. A subset of the network is a dominating set of a multicast group if every node of the group is in the subset or is adjacent to at least one node of the subset. Each node in the dominating set is called gateway. In figure 1, B, D and E are group members, and A, B, C form a dominating set of the group. When D wants to send a message m to other group members, it locally broadcasts m. Since A is within the transmission range of D, it receives m and rebroadcasts m to B. This process keeps going on until every node in the dominating set has broadcasted m. In the protocol, by confining data dissemination within the dominating set of the group, a message can be quickly propagated throughout the group. Moreover, this method can significantly reduce network congestion when the size of the network increases because only a small fraction of nodes participate in data dissemination. Figure 1. A dominating set of five nodes. The dotted circle reprents wireless transmission range Dominating-set-based routing in ad hoc wireless network was first proposed by [4]. Similar approaches include backbone-based routing [5] and spine-based routing [6]. However, to our best knowledge, application of this method in multicast has remained undiscovered /08/$ IEEE 1

2 Three important issues must be addressed when applying this approach to multicast protocol. First, since a node might join the group anytime and anywhere, the dominating set must be constructed dynamically to cover the new group member. This paper presents an on-demand method to dynamically construct the dominating set. Second, the dominating set must maintain connected throughout the lifetime of the multicast group to ensure the reliability of data transmission. However, in a highly dynamic network, the mobility and switch-offs of gateways might disconnect the dominating set. In this paper, we solve this problem through connect session, which connects the dominating set immediately after the breakdown of the dominating set. Third, the efficiency of this approach largely depends on the size of dominating set. Unfortunately, finding a minimum dominating set has been proven to be NP-complete. [5], [7] proposed methods to construct close-to-optimal dominating set. However, in these approaches, the calculation of dominating set involves all nodes of the network. In our protocol, only gateways are involved. In addition, it doesn t require maintaining any information about routing and group membership. The rest of this paper is organized as follows: Section II describes the network model and design goals. Section III presents in detail the protocol. The simulation and evaluation of the protocol is given in Section IV. Finally, Section V concludes this paper. II. NETWORK MODEL AND DESIGN GOALS Before presenting the protocol, we briefly describe the network model and design goals. A. Network Model In the network considered, each node has the same transmission radius r, communicating through bi-directional wireless links with each other. The network can be described as a graph G = (V, E), where V represents a set of wireless nodes and E represents a set of edges. An edge {u, v} indicates that both u and v are within their transmission range. N(v) = { u { u, v} E} represents the open neighbor set of node v and N[ v] = N ( v) { v} represents the closed neighbor set of node v. For a subset S V, N ( S) = v S N ( v) is the neighbor set of S and N[ S] = v S N[ v] is the closed neighbor set of S. S g V represents the set of nodes in a group g. A sub-graph G = ( D, E ) is a dominating set of group g if u S g, u N[D]. G is connected if every node pair in D can be connected with a path in E. Following assumptions are also made to simplify the protocol: (1) Nodes in the network will cooperate with each other; (2) Network partition rarely happens during the lifetime of group g since the networks studied in this paper tend to be dense networks; (3) Only a small fraction of nodes will shut down their wireless interfaces during the lifetime of group g. B. Design Goals The proposed protocol will achieve following goals: (1) when a node v joins the group, a dominating set covering v should be quickly constructed; (2) The dominating set of a group g should remain connected during most of the lifetime of group g even when the nodes in the network move considerably fast; (3) The size of the dominating set of group g should be kept small even when the size of group g increases. III. PROTOCOL PRESENTATION This section presents in detail the protocol, which consists of four sessions. Join session defines the operations to dynamically construct a dominating set when a node joins the group. Connect session defines the actions to reconnect the dominating set when a gateway senses the disconnection of the dominating set. Each gateway also performs reduce session to reduce the size of the dominating set each time it senses the changes of neighbors. Dissemination session defines the operations to disseminate a message throughout a group. For the protocol to work, the initiator of a group serves as the first gateway of the dominating set at the beginning of the lifetime of the group. A. Join Session The join session is a three-way handshaking process, which consists of three phases. The first two phases are just like a route discovery process, the purpose of which is to find paths to existing gateways. During the third phase, after a new group member finds a path to a gateway, it sends a confirm message to mark all the nodes along the path as gateways and consequently a dominating set covering the new group member is constructed. The pseudo-codes for join session are shown in figure 2. 1) Request Dissemination Phase When a node wants to join a group, it first calls the procedure Join and sends the identifier of the group (gid) as the parameter. The Join procedure first checks whether the node is a gateway (denoted by dflag i ) or there exist at least one neighboring gateways, i.e., it is already covered by the dominating set, and quits immediately if one of the conditions is satisfied. Otherwise, it generates a request message and broadcasts the message to its neighbors. Note that N i represents the set of IDs of neighbor gateways of node i, the construction of which is presented in Connect Session. After receiving a join request, a node first checks whether it has already received the same request. If it has already received the request, it simply drops the request. Otherwise, it will send a reply to the requestor if it is a gateway or rebroadcast the request if not. Note that every request packet has a ttl (time to live) field that is decreased when the packet is forwarded to other nodes. A request is dropped when its ttl field reaches zero. Note that in the pseudo-codes, R i represents the set of join requests received by node i. One important issue is the so-called broadcast storm problem [8]. In a large network, serious congestion and redundancy could exist if every node participates in the flooding of a packet. Various approaches have been proposed to tackle this problem. In this paper, a simple probabilistic scheme [8] is adopted, in which every node rebroadcasts a packet with a probability p. Simulation results indicate that this simple approach is sufficient to efficiently propagate messages /08/$ IEEE 2

3 in a dense network. Before broadcasting a packet, a node waits for a random amount of time to avoid collisions. 2) Reply Forwarding Phase During this phase, the reply message is forwarded to the requestor along the reverse path the corresponding request is disseminated. Note that the reply message will be dropped during the forwarding process if it has been confirmed before (denoted by replied i ). Finally, the reply message reaches the requestor which responded with a confirm message. Note that the requestor only confirms the first reply it receives and drops subsequent replies. The idea behind this approach is explained below. distance-2 neighborhood, i.e., the neighbors neighborhood, the dominating set is still connected. Otherwise, the dominating set may be disconnected and the leaving gateway s ID is added into a node set S i and a find request for S i is generated and broadcasted to the neighborhood. At the same time, a timer findtimer i is started to monitor whether the find request has been successfully responded or not. Figure 2. Join session at node i 3) Dominating Set Construction Phase During this phase, the confirm message is forwarded along the reverse path the corresponding reply message is forwarded until the confirm message reaches the replier. Each node along the path declares itself as a gateway. After the confirm message arrives at the replier, a connected dominating set covering the requestor is constructed. Because the path of the first reply generally is the shortest path in most cases, only a small number of nodes will be added to the dominating set, causing the resultant dominating set to be small. B. Connect Session The pseudo-codes for connect session are presented in figure 3. In order to maintain the connectivity of a dominating set, each gateway in the dominating set periodically generates a heartbeat message and piggybacks it with the IDs of its neighboring gateways. Then it broadcasts the heartbeat to its neighbors. Upon the reception of the heartbeat, every node will record the transmitter s ID and the piggybacked gateway set. Each node periodically checks the arrival time of the heartbeats (represented by node.lasttime) it recently received. If it hasn t received any heartbeat from a gateway for more than τ seconds, the gateway is removed from its neighbor gateway l set. However, if the leaving gateway can be found in the Figure 3. Connect session at node i However, if the neighbor gateway set becomes empty and no connect session ha been started, the node might be isolated from other gateways. In this case, the isolated node will leave the dominating set if it has served as gateway for more than a threshold T i, also called serve time. Then it restarts a join session to reconnect itself to the dominating set if it is a group member. The serve time mechanism is important to this protocol, which will be discussed in detail in Reduce Session. When a node receives a find request for the first time, it will respond to the requestor with a find reply message if it is among the node list to be found (denoted by req.list) and rebroadcasts the request if there is any node still to be found. Note that each find request has a ttl field that is set to 4 hops initially. In the network considered, a node cannot be far away when it is found to be outside of the transmission range of its neighbors. A small ttl also restricts the finding process within a small region, causing little overhead over the network. While forwarding a find reply, each node along the path marks itself as a gateway. When the reply finally arrives at the /08/$ IEEE 3

4 requestor, it removes the replier s ID from S i and cancels the monitoring timer if S i becomes empty. Two problems exist when applying the connect session in the network considered. First, a find request (or reply) message might be lost due to network congestion. Second, the node to be found might be switched off during the connect session. These problems are solved through a find timer, which is started at the beginning of the connect session and expires after T f seconds. When the timer expires, the requestor first examines whether it is detached from other gateways and marks itself as non-gateway if there is no gateways within vicinity. Otherwise, it bundles all nodes in N(S i ), i.e., the neighbors of the gateways still to be found, into a request message and broadcasts the request. Since only a small fraction of nodes might be switched off during the lifetime of the group, it is reasonable to assume that most of the nodes in N(S i ) can be found and the newly started connect session will reconnect the dominating set. C. Reduce Session We adopt the methods proposed by [7] to reduce the size of a dominating set. Two rules are applied to reduce the size of a dominating set: (1) If N[ u] N[ v] and the id of u is smaller than v, u marks itself as a non-gateway; (2) If N( u) N( v) N( w) and the id of u is the smallest among u, v and w, u marks itself as a non-gateway. However, the approach proposed by [7] involves all nodes in the network and it relies on each node broadcasting heartbeats, which will overburden the network and incur serious congestion. In our protocol, only gateways need to broadcast heartbeats and the calculation of dominating set only involves gateways. Each gateway has a serve time, which is set to T s seconds initially. Each non-gateway group member periodically sends a preserve message to the first gateway in its neighbor gateway set. Upon the reception of a preserve message, a gateway updates its serve time according to the following formula: results show that this pure push approach can achieve a considerably high reliability even when the underlying topology undergoes frequent changes. IV. SIMULATION AND EVALUATION We use ns-2 to simulate an ad hoc network with 100 nodes in a 1000m 1000m area. The movement pattern was defined by Random Waypoint model. Each node moves at the same speed between 5 ~ 20m/s without pausing. Each node has a transmission radius of 250m. The underlying MAC layer can provide a 2Mbps transmission rate. The two-ray ground reflection model was adopted as the propagation model. The network included only one multicast group. At the beginning, one node declared the group and served as the first gateway. Then other nodes consecutively joined the group. Around 60 seconds, one node started to transmit packets to other group members every 200ms. Each packet had a length of 200 bytes. The simulation ended at 360 seconds. Each simulation was carried out 10 times with different scenario files created by ns-2. A. Reliability Figure 4 shows the reliability of the protocol. From figure 4, we can see that the protocol achieves considerably high reliability even though the nodes move very quickly. It can also be observed that the protocol s reliability decreases slightly when the speed increases. An interesting observation is that the protocol s reliability increases slightly when the node density increases. In fact, with more gateways participating in the dominating set when the group size increases, the chance that a group member is isolated from the dominating set might be decreased. The simulation results show that the protocol scale well in terms of reliability when the size of the network and mobility increase. Figure 4 also shows a comparison between our protocol and the well-known RDG protocol. The results show that our protocol achieves better performance. ST = max{ ST, now t0 + τ} (1) new old In the above formula, ST new and ST old represents the new and the old serve time respectively, and t 0 is the time when the node becomes a gateway. τ is an important protocol parameter. Formula (1) ensures that the gateway increases its serve time by no more than a short period of τ. Upon the reception of a heartbeat, a gateway marks itself as non-gateway if one of the two rules is satisfied and it has served for more than its serve time and no connect session is pending. A leaving gateway also broadcasts a leave message with ttl set to 2 hops. This leave message will inform all distance-2 nodes to update their gateway information. D. Dissemination Session When a node wants to transmit a message to other group members, it first locally broadcasts the message. After receiving the message, every gateway will rebroadcast it the first time it is received. Though other mechanism such as the request/resend scheme in TCP can be applied, the simulation Figure 4. Reliability of our protocol in a group of 30, 50, 70 and 80 nodes with the speed varing from 5m/s to 20 m/s. The RDG protocol is also presented with a group of 50 nodes. B. Transmission Delay Figure 5 shows the average transmission delay of the protocol. From the figure, we can see that the average transmission delay increases slightly when the speed increases. This phenomenon is due to the fact that more gateways might /08/$ IEEE 4

5 be added to the dominating set as a result of more disconnections caused by node mobility. We can also observe that the average transmission delay only increases slightly even when the group size increases. This observation indicates that our protocol can achieve high scalability in terms of transmission delay. Figure 7. Average disconnected time of a dominating set when the group consists of 30, 50, 70 and 80 nodes and the speed varies from 5m/s to 20m/s. Figure 5. Average transmission delay of our protocol in a group of 30, 50, 70 and 80 nodes with a speed between 5m/s and 20m/s. C. Dominating Set Figure 6 shows the average number of gateways in the dominating set during the simulation. From this figure, we can observe that the dominating set grows slightly when the mobility of nodes increases. As expected, the average number of gateways increases when the group grows. An interesting observation is that only a small transmission delay degradation is observed when the dominating set grows. This might be explained by the observation that the average shortest hop distance between the source and a group member is close to a constant in spite of the growing of the dominating set. Figure 6. Average number of gateways when the group consits of 30, 50, 70 and 80 nodes and the speed varies from 5m/s to 20m/s. Figure 7 shows the average disconnected time of the dominating set during the simulation. As expected, the disconnected time of the dominating set increases when the mobility of the network increases. However, though more disconnections might happen when the mobility of the network increases, the reliability of our protocol only degrades slightly. The simulation results justify the efficiency of the connect session. V. CONCLUSIONS In this paper, we have proposed a broadcast gossip protocol based on dominating set. We have described the problems when applying a dominating-set-based approach in a multicast protocol and solved these problems by introducing four sessions, i.e., join session, connection session, reduce session and dissemination session. Through simulations we have proved that our protocol scaled well in terms of reliability and transmission delay even when the size of the multicast group and the mobility of the network increase. REFERENCES [1] A.J. Demers et al., Epidemic Algorithms for Replicated Database Maintenance, Proceedings of the sixth annual ACM Symposium on Principles, New York, vol. 22, pp. 8-32, Jan [2] R. Chandra, V. Ramasubramanian, and K. P. Birman, Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks, 21st International Conference on Distributed Computing Systems. New York, pp , April [3] Jun Luo, P. T. Eugster and J. Hubaux, Route Driven Gossip: Probabilistic Reliable Multicast in Ad Hoc Networks, Twenty-Seond Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp , March [4] P. Krishna, M. Chatterjee, N. H. Vaidya, and D. K. Pradhan, A clusterbased approach for routing in ad-hoc networks, Proceedings of the Second USENIX Symposium on Mobile and Location-Independent Computing, pp. 1-10, April [5] B. Das, E. Sivakumar, and V. Bhargavan, Routing in ad-hoc networks using a virtual back-bone, Proceedings of the 6th International Conference on Computer Communications and Networks, pp. 1-20, Sept [6] B. Das, R. Sivakumar, and V. Bhargavan, Routing in ad-hoc networks using a spine, IEEE International Conference on Computers and Communications Networks, pp , Sept [7] J. Wu and H. Li, A Dominating Set Based Routing Scheme in Ad Hoc Wireless Network, Proceedings of Third Int'l Workshop Discrete Algorithms and Methods for Mobile Computing and Comm, pp. 7-14, Aug [8] Yu-Chee Tseng, Sze-Yao Ni, Yuh-Shyan Chen, and Jang-Ping Sheu, The broadcast storm problem in a mobile ad hoc network, WINET Wireless Networks, vol. 8, no. 2 3, pp , March May /08/$ IEEE 5

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

Location Information Services in Mobile Ad Hoc Networks

Location Information Services in Mobile Ad Hoc Networks Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent

More information

Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks

Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Mahmuda Ahmed, Mehrab Shariar, Shobnom Zerin and Ashikur Rahman Department of Computer Science and Engineering Bangladesh

More information

Enhanced routing performance and overhead in Mobile Ad-hoc network for big data Transmission in Telemedicine using computer communication network

Enhanced routing performance and overhead in Mobile Ad-hoc network for big data Transmission in Telemedicine using computer communication network ISSN (Online) : 2278-1021 Enhanced routing performance and overhead in Mobile Ad-hoc network for big data Transmission in Telemedicine using computer communication network D. Rajasekaran 1, S.Saravanan

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Understanding and Exploiting the Tradeoffs between Broadcasting and Multicasting in Mobile Ad Hoc Networks*

Understanding and Exploiting the Tradeoffs between Broadcasting and Multicasting in Mobile Ad Hoc Networks* Understanding and Exploiting the Tradeoffs between Broadcasting and Multicasting in Mobile Ad Hoc Networks* Lap Kong Law, Srikanth V. Krishnamurthy, and Michalis Faloutsos Department of Computer Science

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Dynamic Source Routing in Ad Hoc Wireless Networks

Dynamic Source Routing in Ad Hoc Wireless Networks Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract

More information

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

Ad hoc On Demand Distance Vector (AODV) Routing Protocol Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter

More information

Hosts Address Auto Configuration for Mobile Ad Hoc Networks

Hosts Address Auto Configuration for Mobile Ad Hoc Networks Hosts Address Auto Configuration for Mobile Ad Hoc Networks Sudath Indrasinghe, Rubem Pereira, Hala Mokhtar School of Computing and Mathematical Sciences Liverpool John Moores University M.P.Indrasinghe@2004.ljmu.ac.uk,

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks

A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks 2013 IEEE 27th International Conference on Advanced Information Networking and Applications A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks Daichi Amagata, Yuya Sasaki, Takahiro Hara,

More information

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor

More information

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, lpu_chandan@yahoo.co.in

More information

II RELATED PROTOCOLS. Dynamic Source Routing (DSR)

II RELATED PROTOCOLS. Dynamic Source Routing (DSR) ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra

More information

A Comparison of Reliable Multicast Protocols for Mobile Ad Hoc Networks

A Comparison of Reliable Multicast Protocols for Mobile Ad Hoc Networks A Comparison of Reliable Multicast Protocols for Mobile Ad Hoc Networks Beini Ouyang and Xiaoyan Hong Dept. of Computer Science University of Alabama bouyang@cs.ua.edu Yunjung Yi Honeywell Technology Center

More information

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

Ad hoc Networking

Ad hoc Networking An Integrated Approach for Efficient Routing and Service iscovery in Mobile Ad Hoc Networks Chang-Seok Oh Graduate School of Information & Communication, Ajou University Suwon, Korea Email: csoh@ajou.ac.kr

More information

Energy Efficiency of Load Balancing in MANET Routing Protocols

Energy Efficiency of Load Balancing in MANET Routing Protocols Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing protocols and workload balancing techniques

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA jing@cs.uno.edu Yunghsiang

More information

On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks

On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura Department of Electronic and Telecommunication Engineering (DIET) University

More information

An Extended AODV Protocol to Support Mobility in Hybrid Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}

More information

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

Reliable Adaptive Lightweight Multicast Protocol

Reliable Adaptive Lightweight Multicast Protocol Reliable Adaptive Lightweight Multicast Protocol Ken Tang Scalable Network Technologies ktang@scalable-networks.com Katia Obraczka UC Santa Cruz katia@cse.ucsc.edu Sung-Ju Lee HP Labs sjlee@hpl.hp.com

More information

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks , pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks

Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks Ken Tang * Katia Obraczka + Sung-Ju Lee^ Mario Gerla * * Computer Science Department, University of California, Los

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications

A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications Ahmed Abada Dept. of Systems and Computer Engineering Carleton University Ottawa, ON, Canada Li Cui Institute of Computing

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

A Link-state QoS Routing Protocol for Ad Hoc Networks

A Link-state QoS Routing Protocol for Ad Hoc Networks A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,

More information

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1 Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research

More information

CAODV: Routing in Mobile Ad-hoc Cognitive Radio Networks

CAODV: Routing in Mobile Ad-hoc Cognitive Radio Networks : Routing in Mobile Ad-hoc Cognitive Radio Networks Angela Sara Cacciapuoti, Cosimo Calcagno, Marcello Caleffi Department of Biomedical, Electronics and Telecommunications Engineering University of Naples

More information

Location-Aided Routing (LAR) in mobile ad hoc networks

Location-Aided Routing (LAR) in mobile ad hoc networks Location-Aided Routing (LAR) in mobile ad hoc networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science, Texas A&M University, College Station, TX 77843-3112, USA 2000 Abstract A mobile

More information

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2 International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1

More information

Study of Network Characteristics Incorporating Different Routing Protocols

Study of Network Characteristics Incorporating Different Routing Protocols Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab

More information

Service Discovery for Delay Tolerant Networks

Service Discovery for Delay Tolerant Networks 1 Service Discovery for Delay Tolerant Networks Zijian Wang, Eyuphan Bulut, and Boleslaw K. Szymanski Abstract Service discovery is an essential step in deploying many wireless network applications. The

More information

Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas

Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas I.J.Computer Network and Information Security, 21, 2, 26-32 Published Online December 21 in MECS (http://www.mecs-press.org/) Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using

More information

Keywords: DSDV and AODV Protocol

Keywords: DSDV and AODV Protocol Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparison

More information

Impact of Node Mobility and Network Density on Service Availability in MANETs*

Impact of Node Mobility and Network Density on Service Availability in MANETs* Impact of Node Mobility and Network Density on Service Availability in MANETs* Christopher N. Ververidis and George C. Polyzos Mobile Multimedia Laboratory, Department of Computer Science Athens University

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection

More information

Review of DDoS and Flooding Attacks in MANET

Review of DDoS and Flooding Attacks in MANET Review of DDoS and Flooding Attacks in MANET Mohan K Mali 1, Pramod A Jadhav 2 Dept. of Information Tchnology, Bharati Vidyapeeth Deemed University College of Engineering, Pune-43 Abstract-- The flooding

More information

Optimized Load Balancing Mechanism Using Carry Forward Distance

Optimized Load Balancing Mechanism Using Carry Forward Distance Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,

More information

A DISTRIBUTED RESOURCE-MANAGEMENT APPROACH IN MANETS

A DISTRIBUTED RESOURCE-MANAGEMENT APPROACH IN MANETS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 142-153 School of Engineering, Taylor s University College A DISTRIBUTED RESOURCE-MANAGEMENT APPROACH IN MANETS S. A. HOSSEINI-SENO 1,*,

More information

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Gowthami.V.R, Divya Sharma M.Tech, Dept. of E&C. NHCE, VTU, Bengaluru India. Assistant

More information

A Comparison Study of Address Autoconfiguration Schemes for Mobile Ad hoc Network

A Comparison Study of Address Autoconfiguration Schemes for Mobile Ad hoc Network A Comparison Study of Address Autoconfiguration Schemes for Mobile Ad hoc Network Soyeon Ahn, Namhoon Kim, Woohyun Kim and Younghee Lee Information and Communications University, Computer Networks Lab.,

More information

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity

Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity Yonghang Yan*, Linlin Ci*, Ruiping Zhang**, Zhiming Wang* *School of Computer Science, Beiing Institute of Technology,

More information

Stable and Flexible Weight based Clustering Algorithm in Mobile Ad hoc Networks

Stable and Flexible Weight based Clustering Algorithm in Mobile Ad hoc Networks R. Pandi Selvam et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (2),,82-828 Stable and Flexible Weight based Clustering Algorithm in Mobile Ad hoc Networks

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV

More information

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

An Energy Efficient Location Service for Mobile Ad Hoc Networks

An Energy Efficient Location Service for Mobile Ad Hoc Networks An Energ Efficient Location Service for Mobile Ad Hoc Networks Zijian Wang 1, Euphan Bulut 1 and Boleslaw K. Szmanski 1, 1 Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 12180

More information

Hierarchical routing in ad hoc mobile networks

Hierarchical routing in ad hoc mobile networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. ; :515 53 (DOI: 1.1/wcm.74) Hierarchical routing in ad hoc mobile networks Elizabeth M. Belding-Royer*, Department of Computer Science

More information

Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networks

Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networks Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networks Mahesh K. Marina Department of ECECS University of Cincinnati Cincinnati, OH 1- USA mmarina@ececs.uc.edu Samir

More information

A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks

A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks Natarajan Meghanathan 1 and Leslie C. Milton 2 1 Jackson State University, 1400 John Lynch

More information

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication

More information

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332

More information

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

Scalable Membership Management and Failure Detection (Dependability) INF5360 Student Presentation by Morten Lindeberg mglindeb@ifi.uio.

Scalable Membership Management and Failure Detection (Dependability) INF5360 Student Presentation by Morten Lindeberg mglindeb@ifi.uio. Scalable Membership Management and Failure Detection (Dependability) INF5360 Student Presentation by Morten Lindeberg mglindeb@ifi.uio.no Outline! Membership Management! Gossip Based Membership Protocol

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

other. A B AP wired network

other. A B AP wired network 1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer

More information

Service Discovery in Mobile Ad-Hoc Networks

Service Discovery in Mobile Ad-Hoc Networks A Parameter-Based Service Discovery Protocol for Mobile Ad-Hoc Networks Unai Aguilera, Diego López-de-Ipiña Deusto Institute of Technology - DeustoTech University of Deusto Avda. Universidades 24, 48007

More information

Efficient File Sharing Scheme in Mobile Adhoc Network

Efficient File Sharing Scheme in Mobile Adhoc Network Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:

More information

Quality of Service Routing in Ad-Hoc Networks Using OLSR

Quality of Service Routing in Ad-Hoc Networks Using OLSR Quality of Service Routing in Ad-Hoc Networks Using OLSR Ying Ge Communications Research Centre ying.ge@crc.ca Thomas Kunz Carleton University tkunz@sce.carleton.ca Louise Lamont Communications Research

More information

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,

More information

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

Graph Theory Algorithms for Mobile Ad Hoc Networks

Graph Theory Algorithms for Mobile Ad Hoc Networks Informatica 36 (2012) 185-200 185 Graph Theory Algorithms for Mobile Ad Hoc Networks Natarajan Meghanathan Department of Computer Science, Jackson State University Jackson, MS 39217, USA E-mail: natarajan.meghanathan@jsums.edu

More information

Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service

Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service António Grilo Courtesy: Holger Karl, UPB Overview Dependability requirements Delivering single packets Delivering blocks of

More information