International Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 9, September 2012)

Size: px
Start display at page:

Download "International Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 9, September 2012)"

Transcription

1 Cross Layer Design for P2P Overlay Network over MANET Prof. Rekha Patil 1, Ashwini.D 2 1 Professor, 2 M.Tech (CS), PDA College Of Engineering, Gulbarga Abstract - Peer-to-peer (p2p) network is an alternative of client/server system for sharing resources, e.g. files. P2P network is a robust, distributed and fault tolerant architecture. We consider the scenario of p2p network over MANET where all nodes are the members of p2p network and one of the node acts as p2p server which maintains the file list available to the nodes. The mobility of nodes constantly changes the file chunks availability in the peer which raises the demand for a comprehensive framework that can lucidly overlay p2p network on MANET. The p2p node is configured as server (peer). In p2p network, since nodes are peer they provide a large portion of shared files that can be accessed. A node decides to publish its files and update the server with the files. The server before sending the route request message, it forms a cluster. In this cluster one of the nodes is selected as cluster head based on maximum connectivity. We use an ad hoc on-demand routing protocol (AODV) through delay measurement to propose a p2p overlay network. In this work, we use simulation to determine the impact on the performance of the protocol. Simulation results show that the proposed protocol performs better. Keyword - AODV, MANET, P2P Overlay Network, Peer. I. INTRODUCTION Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected via wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. P2P network is an overlay network for distributed object store, search and sharing [1]. P2P is a class of applications that take advantage of resources storage, cycles, content, human presence available at the edges of the internet. P2P is a special distributed system on the application layer, where each pair of peers can communicate each other through the routing protocol in p2p layers. A general p2p network is pictured in figure I. Each node (peer) keeps an object (such as file, etc.) database. Each peer can query its wanted object from other peers through the logical connection on p2p layer. Object DB Client/Server (Peer) Figure 1: General P2P Model [15] P2P overlay networks are distributed systems in nature, without any hierarchical organization or centralized control. P2P protocol provides a good mechanism for conventional MANET. But conventional MANET routing protocol do not seamlessly support ad hoc protocols. Therefore in this work, we overlay p2p protocol over MANET by integrating p2p application protocols with that off MANET routing protocols at same time using delay. The objective of this work is to integrate p2p protocol with MANET and at same time ensuring that file availability could be retained on such overlays. A peer-to-peer (p2p) overlay network consists of a dynamically changing set of nodes connected via the internet. A mobile ad hoc network consists of mobile nodes communicating with each other using multi-hop wireless links. Here promising research direction in networking is to exploit the synergy between p2p overlay and MANET routing protocols to design better routing protocols for MANETs. As a supporting example, the work applies recent advancement in p2p overlay networks, i.e., topology-aware structured p2p overlay routing protocols, to routing in MANETs [14]. 212

2 Since topology-aware structured p2p overlay routing protocols, it is clear that we cannot combine p2p overlay network over MANET. Since the existing system does not combine the p2p overlay network over MANET, the proposed system overcomes this situation by combining p2p overlay network over MANET. In this work, there is a definite need for overlay/p2p networking in a MANET, for the following reasons: (a) the MANET routing layer is often inadequate to provide the services needed by sophisticated mobile applications, and; (b) the unpredictability of the radio channel combined with the mobility of the users can pose major challenges to routing, requiring upper layer intervention. Both MANETs and P2P networks follow a P2P paradigm characterized by the lack of a central node or peer acting as a managing server, all participants having therefore to collaborate in order for the whole system to work. II. RELATED WORK The rapid growth of wireless communication and mobile computing technologies has led to the appearance of a new networking concept-mobile Ad hoc Networks (MANETs) [1]. A mobile ad-hoc network (MANET) is characterized by a set of mobile devices that communicate among themselves using wireless links. This communication is done in a completely decentralized, selforganised manner and without requiring any pre-existing fixed communications infrastructure. AODV (Ad hoc On demand routing protocol) a novel algorithm for the operation of Ad hoc networks this protocol is an excellent choice for ad hoc network establishment is proposed in the phases involved in AODV are Path Discovery, Route Table Management, Path Maintenance, (RREQ, RREP, RRER) are the control messages used for establishing paths in MANET [2]. Cross Layer violates the OSI layered architecture but keep the impact of design violations as small as possible. There are various cross layer design methods available. A simple and effective design of the cross layer architecture has been chosen to improve the performance of lot of services in ad hoc networks. In our paper, we are using upward information flow [3]. On-demand protocols such as AODV typically pick the shortest path route during the route discovery process, and then sticks to this route until it breaks. Continuous use of the route may drain the nodes of battery power. We take a two-step approach to design the adaptive energy-aware protocol. First, the nodes are classified according to their remaining battery energy. 213 Depending on their classification the nodes react differently to the routing protocol dynamics. Second, a new cost function is used as routing metric taking into consideration both the hop-wise distance and the battery levels of the nodes [4]. A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This presents Chord, a distributed lookup protocol that addresses this problem. Chord locates the node that stores a particular data item [5]. This presents the design and evaluation of Pastry, a scalable, distributed object location and routing substrate for wide-area peer-topeer applications. Pastry performs application-level routing and object location in a potentially very large overlay network of nodes connected via the Internet. It can be used to support a variety of peer-to-peer applications, including global data storage, data sharing, group communication and naming [6]. In these systems, files are stored at the end user machines (peers) rather than at a central server and, as opposed to the traditional client-server model, files are transferred directly between peers. CANs resemble a hash table; the basic operations performed on a CAN are the insertion, lookup and deletion of (key, value) pairs. Hash tables which map keys onto values are an essential building block in modern software systems. In this, we introduce the concept of a Content-Addressable Network (CAN) as a distributed infrastructure that provides hash table-like functionality on Internet-like scales [7]. Mobile Ad-Hoc Networks (MANETs) and Peer-to- Peer (P2P) applications are emerging technologies based on the same paradigm: the Peer-to-Peer paradigm. In this model, nodes have equivalent functionalities and provision capabilities and, as a consequence, are called peer entities. Every peer is able to send and reply to request messages originated from another one. This shows the dual interface of these peers, since they might play the role of servers and clients simultaneously [8]. Peer-to-peer (P2P) systems, in which peer nodes form a cooperative network and share their resources (storage, CPU, bandwidth), have attracted a lot of interest lately. Therefore, they are particularly attractive for systems with limited resources, where the cost of sending a message is non-negligible (e.g., in terms of energy) and flooding is considered prohibitive [9]. Peer-to-peer (P2P) file sharing in mobile ad hoc networks has continuously gained popularity due to its strong adaptability in many practical applications. In this, we restrict logical peers, i.e., nodes exchanging file pieces, to physical neighbors, yet data is propagated through the (overlay) network of peers of common interest, which is the basic concept of operation of P2P file sharing systems.

3 In this it is used to maintain enough connectivity among peers with low overhead, such that users can download files in less time than existing protocols [10]. III. PROPOSED WORK A mobile ad hoc network (MANET) is a collection of mobile nodes that dynamically self organize in a wireless network without using any pre-existing infrastructure. In a MANET, the applications are typically peer-to-peer rather than client-server. Moreover, a MANET is often built to support a specific application, thus the networking is application-driven. For these reasons, we often refer to the ad hoc networking done in a MANET as peer-to-peer (P2P) networking. In the Internet, a P2P network is basically an overlay network justified by the need for specialized functions that are not possible in the IP layer. There is a definite need for overlay/p2p networking in a MANET, for the following reasons: (a) the MANET routing layer is often inadequate to provide the services needed by sophisticated mobile applications, and; (b) the unpredictability of the radio channel combined with the mobility of the users can pose major challenges to routing, requiring upper layer intervention. The leading strategy today is to keep MANET routing and transport protocols simple (mainly for ease of standardization), and; to complement them when necessary with upper layer functions via overlays and P2P networking. MANETs and P2P networks share a good number of key characteristics, such as the lack of a central infrastructure, a highly dynamic network topology, and the need for selforganization. Hence, when designing distributed network applications for MANETs, it would be intuitive to consider the building blocks that have proven themselves appropriate in P2P systems. Both MANETs and P2P networks follow a P2P paradigm characterized by the lack of a central node or peer acting as a managing server, all participants having therefore to collaborate in order for the whole system to work. A key issue in both networks is the process of discovering the requested data or route efficiently in a decentralized manner. MANETs and P2P networks also have a highly dynamic topology: nodes are constantly moving in and out of radio coverage of neighboring nodes in the former and peers are continuously joining or leaving the network in the latter. Information (or data) sharing is an application layer task that allows different devices to share data in order to carry out distributed computations and satisfy user needs. 214 Data sharing is considered of fundamental importance for mobile ad hoc networks, since they have been proposed to enable data access for mobile devices in the absence of an infrastructure. In the proposed system, the p2p node is configured as server (peer). In this all nodes are the members of p2p network. In p2p network, since nodes are peer they provide a large portion of shared files that can be accessed. A node decides to publish its files and update the server with the files. The server before sending the RREQ message it forms a cluster. In this cluster one of the nodes is selected as cluster head based on maximum connectivity. In this, the cluster head calculation starts and will store all the cluster head and also nodes that have joined the cluster. It finds if the node with maximum cluster is already a cluster head or not. In the cluster if the node has maximum neighbors, then select it as cluster head and also stores neighbors of it. Now it makes its neighbors to join the cluster and if it is already a cluster head, it will not select it. This is particularly true if one or more nodes are on other routes as well. Note that each message transmission and reception drains battery power. We take a two-step approach to design the adaptive energy-aware protocol. First, the nodes are classified according to their remaining battery energy. Depending on their classification the nodes react differently to the routing protocol dynamics. Second, a new cost function is used as routing metric taking into consideration both the hop-wise distance and the battery levels of the nodes. C i energy is calculated as follows: C i energy=d i /E i remain C i energy is a function depending of the distance and remaining energy of node i, d i is the distance of the node provided by the physical layer and E i remain is the current remaining energy of the node provided by the physical layer. More remaining energy and shorter distance indicate less C i energy [11]. IV. SYSTEM DESIGN AND IMPLEMENTATION This paper has been implemented to combine p2p overlay network on Manet using AODV routing protocol along with delay measurement. In this work, nodes search the files and locate in the database. Information (or data) sharing is an application layer task that allows different devices to share data in order to carry out computations and satisfy user needs. In fig II, When any node has data packets to send the node first checks the routes to the destination in the route cache are present or not. If routes are already present it sends the packets on those paths. If routes are not present then it floods the RREQ message to all its neighboring nodes.

4 When the RREQ message is received by any intermediate node then first it checks if route to destination is known if so forward else generates RREQ packet. Using find node we can search a node in the routing table. The delay value is appended along with the RREQ packet, when RREQ reaches the destination the incoming paths are put in the cache. RREP is generated and if node is part of RREP, it must update its value. The delay value is calculated and data is sent to the nodes. Start Generate RREQ Delay<0.5 NO YES Forward RREQ Generate RREP destination Data Packet Sent at Intermediate Node Calculate Delay= Pkt Received Time - Pkt sent time V. SIMULATION To study the performance of our proposed algorithm simulation was conducted using OMNeT++ [15] which supports complete physical, data link and MAC layer models for simulating wireless ad hoc networks. OMNeT++ is a freely distributed, object-oriented, modular, discrete-event simulator written in C++. It is designed for general-purpose discrete-event simulation, and provides model libraries for communication protocols and network systems. We simulated network of mobile nodes placed randomly in an area of 5000x5000 square meters, with mobile nodes ranging from10 to 50. A source and a destination is selected randomly Mobility pattern of the mobile nodes is generated using Random waypoint model [12]. A mobile selects another node in the network and constantly moves towards it at a given velocity. Once it reaches there, it waits for some pause time and selects another node and again starts moving. By observing the performance of the network under mobility we can test the stability of the design in real time scenario. Speed of a mobile node is assigned a value between 0 to 5 meters/sec. Initially all the mobiles would be given some initial energy (10000). As the packets re to be transmitted through the nodes, they would loose some energy. It is assumed from previous research [13] (as the size of each packet is constant), that the radio interference, when powered on, consumes 1.2W while actually receiving a packet and 1.6W while transmitting a packet. As the communication in MANET is normally a cross layered approach, upward information flow model is very efficient in designing and modeling the network. The performance parameters studied for simulation study are throughput, latency, packet delivery ratio and energy left by varying the Packet rate and simulation time. A. Result Send RREP Send data Stop Figure 2: Flow Chart Figure3: Packet Delivery Ratio Vs Simtime 215

5 Figure III shows the packet delivery ratio (PDR) of proposed and present system. We can observe that packet delivery ratio of proposed system is better than present system along with simulation time. Increasing simtime does not affect the packet delivery ratio. Figure 6: Energyleft Vs Packetrate The graph shows the remaining energy of the nodes in the network of both proposed and present system. The energy left varies along with packet rate. Figure 4: Latency Vs Simtime The graph shows that latency of proposed system is lesser than the latency of present system. There may be slight variation in the latency of proposed system. Figure 5: Throughput Vs Packetrate The throughput is better in proposed system when compared with the present system. In this there may be slight increase or decrease along the packet rate of proposed system but the throughput is high when compared to present system. VI. CONCLUSION AND FUTURE WORK We presented a new technique for simulation study for sharing data and files within a small area network but most popular file sharing protocol like p2p are supported by such a network. We consider the scenarios of P2P network over MANET where all nodes are the members of P2P network and one of the node acts as p2p server which maintains the file list available to the nodes. The mobility of nodes constantly changes the file chunks availability in the peer which raises the demand for a comprehensive framework that can lucidly overlay p2p network on MANET. A discrete-event C++ based simulator OMNET++ can efficiently simulate a p2p overlay network on Manet. From the simulation results we can conclude that the throughput and PDR are significantly improved in the proposed work. There is however slight increase in the latency which is attributed by more packet delivery. The remaining energy is also given for all nodes. The algorithm does not take into account of changes in the cluster head or the server. The System can be further modified to handle the issues of cluster head alteration due to mobility or link failure. More optimization schemes can be adopted to improve the performance of the system under mobility. 216

6 REFERENCES [1 ] S. Jochen, Mobile Communications. Boston, MA, USA: Addison- Wesley Longman Publishing Co., Inc., [2 ] Charles E. Perkins, Elizabeth M. Royer, Samir R. Das and Mahesh K. Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks, IEEE Personal Communications, Feb 2001,pp [3 ] [Vineet Srivastava, Mehul Motani, Cross-Layer Design: A Survey and the Road Ahead, IEEE Communications Magazine, December [4 ] Nishant Gupta and Samir R. Das, Energy-Aware On-Demand Routing for Mobile Ad Hoc Networks, Computer Science Department, USA. [5 ] Stoica, R. Morris, D. Karger, M.F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications, in Proceedings of the ACM SIGCOMM 01 Conference, San Diego, California, USA, August [6 ] A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems, IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), Germany, November [7 ] Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker, A Scalable Content-Addressable Network, In Proceeding SIGCOMM 01, August 27-31, 2001, San Diego, California, USA. [8 ] Leonardo B. Oliveira, I.G. Siqueira, A.F. Loureiro, On the performance of ad hoc routing protocols under a peer-to-peer application, Journal of Parallel and Distributed Computing Volume 65, Issue 11, November 2005, Pages [9 ] Raphal Kummer, Peter Kropf, Pascal Felber: Distributed Lookup in Structured Peer-to-Peer Ad-Hoc Networks. In Proceeding of the OTM Conferences (2) 2006: [10 ] U. Lee, J.S Park, S.H Lee, W. W. Ro, G. Pau, M. Gerla, Efficient Peer-to-peer File Sharing using Network Coding in MANET, Journal of Communications and Networks (JCN), November [11 ] K. Akkaya, M. Younis, An energy-aware QoS routing protocol for wireless networks, Proceedings of International Conference on Distributed Computing Systems Workshops [12 ] FanBai, Ahmed Helmy, A survey of mobility models in wireless Ad Hoc Networks, University of Southern California, U. S. A. [13 ] L. M. Feeney, An energy consumption model for performance analysis of routing protocols for mobile ad hoc networks, ACM J. of Mobile Networks and Applications, vol. 6 issue 3, June 2001, pages [14 ] Hu, Y. Charlie; Das, Saumitra M.; and Pucha, Himabindu, "Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks" (2002). ECE Technical Reports. Paper 167. [15 ] Chonggang Wang and Bo Li, Peer-to-Peer Overlay Networks: A Survey, Department of Computer Science, the Hong Kong University of Science and Technology, Hong Kong April 20, [16 ] Andras Varga, OMNeT++, 217

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

An integrated approach for P2P file sharing on multi-hop wireless networks

An integrated approach for P2P file sharing on multi-hop wireless networks 1 An integrated approach for P2P file sharing on multi-hop wireless networks Bin Tang, Zongheng Zhou, Anand Kashyap and Tzi-cker Chiueh Abstract P2P file sharing protocol and Ad Hoc wireless routing protocol

More information

PEER TO PEER FILE SHARING USING NETWORK CODING

PEER TO PEER FILE SHARING USING NETWORK CODING PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering

More information

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

IJMIE Volume 2, Issue 7 ISSN: 2249-0558

IJMIE Volume 2, Issue 7 ISSN: 2249-0558 Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)

More information

A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks

A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks 1 A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks Hasan Sözer, Metin Tekkalmaz, and İbrahim Körpeoğlu Abstract File sharing in wireless ad-hoc networks in a peerto-peer manner imposes many

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

More information

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &

More information

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching 2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

Study of Network Characteristics Incorporating Different Routing Protocols

Study of Network Characteristics Incorporating Different Routing Protocols Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab

More information

Research on P2P-SIP based VoIP system enhanced by UPnP technology

Research on P2P-SIP based VoIP system enhanced by UPnP technology December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system

More information

A SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS

A SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS A SURVEY OF P2P OVERLAYS IN VARIOUS Mrs. A. Anitha Dr. J. JayaKumari Department of computer science & engineering Department of Electronics & communication Engineering anidathi@yahoo.co.in jkumaribharat@yahoo.com

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

Ad hoc On Demand Distance Vector (AODV) Routing Protocol Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving

More information

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS M. Tamilarasi 1, T.G. Palanivelu 2, 1, 2 Department of ECE, Pondicherry Engineering College, Puducherry-605014. Email:

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

Mobile File-Sharing over P2P Networks

Mobile File-Sharing over P2P Networks Category: P2P obile File-Sharing over P2P Networks Lu Yan Åbo Akademi, Finland INTRODUCTION Peer-to-peer (P2P) computing is a networking and distributed computing paradigm which allows the sharing of computing

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

Energy Efficiency of Load Balancing in MANET Routing Protocols

Energy Efficiency of Load Balancing in MANET Routing Protocols Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing protocols and workload balancing techniques

More information

A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT

A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

More information

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith y, and Louise E. Moser y Department of Computer Science y Department of Electrical and Computer

More information

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar

More information

Comparative Study of Delay-Oriented and Hybrid Load Balancing Routing Protocols in Mobile Ad Hoc Networks

Comparative Study of Delay-Oriented and Hybrid Load Balancing Routing Protocols in Mobile Ad Hoc Networks 2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Comparative Study of Delay-Oriented and Hybrid Load Balancing Routing Protocols in Mobile Ad

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

An Extended AODV Protocol to Support Mobility in Hybrid Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}

More information

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

II RELATED PROTOCOLS. Dynamic Source Routing (DSR)

II RELATED PROTOCOLS. Dynamic Source Routing (DSR) ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra

More information

An Energy Efficient Location Service for Mobile Ad Hoc Networks

An Energy Efficient Location Service for Mobile Ad Hoc Networks An Energ Efficient Location Service for Mobile Ad Hoc Networks Zijian Wang 1, Euphan Bulut 1 and Boleslaw K. Szmanski 1, 1 Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 12180

More information

A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications

A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications Ahmed Abada Dept. of Systems and Computer Engineering Carleton University Ottawa, ON, Canada Li Cui Institute of Computing

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

IPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha

IPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha IPTV AND VOD NETWORK ARCHITECTURES Diogo Miguel Mateus Farinha Instituto Superior Técnico Av. Rovisco Pais, 1049-001 Lisboa, Portugal E-mail: diogo.farinha@ist.utl.pt ABSTRACT IPTV and Video on Demand

More information

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

An Implementation of Secure Wireless Network for Avoiding Black hole Attack An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,

More information

CAODV: Routing in Mobile Ad-hoc Cognitive Radio Networks

CAODV: Routing in Mobile Ad-hoc Cognitive Radio Networks : Routing in Mobile Ad-hoc Cognitive Radio Networks Angela Sara Cacciapuoti, Cosimo Calcagno, Marcello Caleffi Department of Biomedical, Electronics and Telecommunications Engineering University of Naples

More information

LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM

LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM IN PEER TO PEER NETWORKS R. Vijayalakshmi and S. Muthu Kumarasamy Dept. of Computer Science & Engineering, S.A. Engineering College Anna University, Chennai,

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS

`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS `PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS Divya Sharma CSE Dept, ITM Guargoan divya@itmindia.edu Ashwani Kush Computer Dept, University College Kurukshetra University India akush@kuk.ac.in

More information

Cross Layer TCP Congestion Control Load Balancing Technique in MANET

Cross Layer TCP Congestion Control Load Balancing Technique in MANET Cross Layer TCP Congestion Control Load Balancing Technique in MANET Nidhi Shukla 1, Neelesh Gupta 2, Naushad Parveen 3 1 M.Tech Scholar (ECE), 2 Prof & Head (ECE), 3 Asst. Prof. ( ECE), Department of

More information

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach

Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach E. Borgia, M. Conti, F.Delmastro, and E. Gregori Pervasive Computing & Networking

More information

Security Threats in Mobile Ad Hoc Networks

Security Threats in Mobile Ad Hoc Networks Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey 21020013@baskent.edu.tr, asafak@baskent.edu.tr

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Routing in Mobile Ad Hoc and Peer-to-Peer Networks. A Comparison

Routing in Mobile Ad Hoc and Peer-to-Peer Networks. A Comparison Routing in Mobile Ad Hoc and Peer-to-Peer Networks. A Comparison Rüdiger Schollmeier 1), Ingo Gruber 1) and Michael Finkenzeller 2) 1) Lehrstuhl für Kommunikationsnetze, Technische Universität München,

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

A Load Balancing Method in SiCo Hierarchical DHT-based P2P Network

A Load Balancing Method in SiCo Hierarchical DHT-based P2P Network 1 Shuang Kai, 2 Qu Zheng *1, Shuang Kai Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn 2, Qu Zheng Beijing University of Posts and Telecommunications, buptquzheng@gmail.com Abstract

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

Robust Routing in Wireless Ad Hoc Networks

Robust Routing in Wireless Ad Hoc Networks Robust Routing in Wireless Ad Hoc Networks Seungjoon Lee, Bohyung Han, Minho Shin {slee, bhhan, mhshin}@cs.umd.edu Computer Science Department University of Maryland College Park, MD 2742 USA Abstract

More information

8 Conclusion and Future Work

8 Conclusion and Future Work 8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi

More information

Load Balancing in Distributed Systems: A survey

Load Balancing in Distributed Systems: A survey Load Balancing in Distributed Systems: A survey Amit S Hanamakkanavar * and Prof. Vidya S.Handur # * (amitsh2190@gmail.com) Dept of Computer Science & Engg, B.V.B.College of Engg. & Tech, Hubli # (vidya_handur@bvb.edu)

More information

Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks

Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov Department of Computer Science and Engineering University

More information

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,

More information

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

Study and Performance Comparison of AODV & DSR on the basis of Path Loss Propagation Models

Study and Performance Comparison of AODV & DSR on the basis of Path Loss Propagation Models Study and Performance Comparison of AODV & DSR on the basis of Path Loss Propagation Models Rachit Jain 1, Laxmi Shrivastava 2 1,2 Department of Electronics, Madhav Institute of Technology and Science,

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS georizos@teiep.gr D. C. VASILIADIS dvas@teiep.gr E. STERGIOU ster@teiep.gr Abstract: In this paper,

More information

Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration

Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration 1 Harish H G, 2 Dr. R Girisha 1 PG Student, 2 Professor, Department of CSE, PESCE Mandya (An Autonomous Institution under

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information