Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Size: px
Start display at page:

Download "Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks"

Transcription

1 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, Messina, Italy. apulia{mfazio, Abstract - We present a protocol for the autoconfiguration of ad-hoc devices. It assures the univocal configuration of new nodes in the network and manages the addresses duplication, which is caused by the merging of several networks. The main innovation is the reactive approach for the addresses duplication management. The nodes check the validity of their configurations only when they have to exchange data. This keeps the network traffic load for the autoconfiguration procedures low. The merging of several networks into a single one is made gradually, so to avoid peaks of traffic on some nodes or channels. I. INTRODUCTION When some mobile users wish to connect to an existing ad hoc network or to create a new one, they need to configure their devices, so to be univocally identified. The opportunity of connecting to the Internet through the nodes of an ad hoc network is also a challenging issue [4]. For these reasons, new mechanisms have been created for the self-configuration of the IP addresses for ad hoc wireless devices. Such mechanisms must provide each node of the network with a single IP address. Furthermore, the mechanisms must manage the issue of addresses duplication, which may occur when different networks get in contact. In this paper we propose an innovative self-configuration protocol of IP addresses for the devices of an ad hoc network. This protocol provides unique IDs and minimizes the amount of information that must be stored by each node of the networkto limit the effective use of the portable devices s computational resources. The most innovative aspect of our self-configuration protocol is the reactive management of address duplication, if different ad hoc networks merge. When different networks merge, some nodes with the same IP address may get in contact. This way, packet routing may not take place correctly. The solutions proposed in literature may be used in small networks, because they require to exchange considerable amounts of information. Our protocol detects whether the nodes of the network are correctly configured only when they need to send or receive data. This enables to limit the traffic on the network for the procedures of network merging management. In order to make the communication of nodes more effective in case of merging of different networks, the network parameters of some nodes should be changed, so that a single network can be obtained. Our protocol performs these operation gradually to limit any peak of traffic in the network. The process of merging allows the largest networks to absorb the smallest ones and is stopped when the initial networks tend to split again. II. RELATED WORKS The MANET group of IETF has created a very simple mechanism for assigning an IP address to a new node that connects to an existing ad-hoc network [3]. The technique proposed enables a node (that is going to connect to the network) to select a temporary address. This address is used only for the negotiation of the final IP address. Then the node selects an IP address and asks all the nodes of the network, in order to check whether this address is in use. If a reply is received, a new address must be found. Otherwise, the address selected is automatically considered available, and the node uses it as a final IP address. However, this solution does not provide a way for solving the problem of two new nodes using the same temporary IP address. The system of self-configuration of the IP address proposed by Vaidya [5] also provides for the management of merging or partitioning networks. This system is based on the use of a single Key (eg. the MAC address or a random number consisting of a big number of bits), which is assigned to each node and is associated to the IP address. Referring to a link state routing protocol, each node has some routing tables where the entries exist for all of the nodes of the network. Both the IP address and the key must be stored in the routing tables. If a generic node detects some routing information about the same IP address with a different key, the node invalidates the entry for that specific IP, and notifies the other nodes about the presence of duplicate addresses. In the approach proposed in [2], the system for the management of the IP addresses, is distributed in all the nodes of the network. When a node (Requester) is going to be entered, it has to rely on a configured node (Initiator), which negotiates the address for the new node. Each node belonging to the network stores all the used addresses, as well as the ones that are going to be assigned to the new elements. This allows to know the available addresses at any time. Then the initiator selects an address among the available ones, and asks the other nodes for the permission to use it. This is a way for checking whether the same address is being assigned in another part of the network. If all the nodes send a positive reply for this request, the address is assigned to the Requester, and all the nodes of the network are notified. If a node decides to leave the network, it has to release the address. The nodes that have

2 suddenly disconnected are taken up, and the corresponding IP addresses are retrieved, since they do not respond to the new assignment procedures. Once the addresses are assigned to all the nodes, any network partitioning must be detected for releasing any IP address available, and for managing the merging of different networks. For this purpose, a single network ID is used, which is selected by the node with the lowest IP address. Since some nodes will not respond during the assignment procedure of the IP address, the partitioning is detected. If such nodes also include the one that originally determined the network ID, a new node must be found with the lowest IP address. This node will then determine the new network ID. Since the IP assignment operations may not take place for a long time, and thus no partitioning can be detected, the node with the lowest IP address must send a message in broadcast from time to time, in order to make its presence noted. The merging of networks is detected when the nodes which a new link is created between have different network IDs. When this happens, the nodes exchange the tables of the addresses used in their networks, in order to detect any duplicate. In this case, only one of the nodes with the same IP address restarts the procedure for assigning the address. III. THE PROPOSED SOLUTION The scenario we are referring to is the one of a wide area where independent ad-hoc networks can coexist. Single nodes can connect to or disconnect from these networks from time to time. In order to communicate with the other nodes, they need to have a single ID configured. Furthermore, due to the movements of their nodes, networks can get in contact or split, thus creating new distinct networks. The addresses that can be associated to the nodes must not have been assigned by the IANA (Internet Assigned Numbers Authority) in view of an Internet connection. For this reason, private addresses must be used for ad-hoc networks. Our system provides to assign any address to the nodes within the blocks , and These blocks denote a class A ( ) and a class B ( ) network. The concepts of class and subnet are associated with the location of the nodes they consist of. In the case of ad-hoc networks, we do not need to consider these types of classifications, since a network can migrate from an area to another, due to the movement of the nodes. For this reason, the block of addresses containing the one to be assigned to each node is selected at random. Similarly to the UUID described in [2], we associate a NetID to each ad-hoc network created. This NetID must be stored by all the nodes connecting to the network. Each node is therefore identified by the pair NetID-hostID. Rather than using a single ID with many bytes for each node as in [5], this choice allows us to limit the amount of bytes sent to the network when two users wish to communicate. In fact, nodes can use just the hostid to exchange data. The NetID is determined during the network initialization phase, that is, when two single nodes get in contact and create a new ad-hoc network. We chose as NetID a 4-byte number. So the probability that independent ad-hoc networks have the same NetID is very low ( 10 6) even in the case of a heterogeneous system where up to 100 different IDs are present. According to these remarks, we can say that the network IDs of two ad-hoc networks that meet are always different. What we are going to explain is a reactive self-configuration and maintenance mechanism for the IP addresses. Our purpose is to guarantee the correct routing of packets by changing the state of the nodes or of the network as less as possible, in order to optimize the use of resources (memory, CPU, battery, bandwidth, etc.) The problem of the self-configuration of the node address can be divided in two parts: initial configuration of the address, which allows a node entering a network to have a single IP address; management of the merging among networks, due to the dynamics of nodes. Single networks can get in contact, thus generating a new network with duplicate addresses. With regard to the first item, many possible solutions have already been proposed in literature: in section 3.1 we will combine some of them, in order to get a new solution to the problem of the initial address configuration. With regard to the second item, a new and original solution to the network merging problem will be presented in section 4. A. Initial address configuration The solution presented for initial address configuration is based on the mechanism of IP address assignment proposed by the MANET group in [3]. This mechanism: does not produce much traffic in the communication channels; does not require the storage of many information about the network in the single nodes; its implementation is very easy. Perkins[3] does not provide a way for solving the problem of two nodes using the same temporary IP address. So we have decided to use the figures of requester and initiator, which have been defined in [2]. Moreover, we have discarded the address negotiation system from the solution [2], because it requires to update the list of IP addresses available in all of the nodes. As we can see in the experimental section, we have obtained less traffic generated in the network, as well as less information to be stored in each device. According to the [2] approach, the new node relies on the initiator, which negotiates the address for the new node. In our solution, when a node is going to connect to an ad-hoc network, it selects the 4-byte HostID (HID), and requests (through a Request packet) the initiator to start the Initialize procedure. The initiator selects an address at random among the allowed addresses, and sends a Search IP packet in broadcast. The selected address is specified in the packet. Any node receiving this packet checks whether the address is known (whether this address belongs to it or to another node in its routing tables). If the match is detected, the node sends a reply Used IP to the initiator. When the initiator receives the message, a new address is selected, and the Initialize procedure is restarted. Conversely, if no message is received for some time, the

3 initiator resends the Search IP packet. This way, if the reply does not arrive, this is not due to some errors in the wireless channels. At the end of the process, the initiator notifies the requester with the NetID of the network and the IP address that can be used. This way, the following benefits are obtained, in comparison with the model proposed in [3]: confusion is less likely to occur among the IDs of the nodes to be configured, since two nodes with the same HostID that rely on the same initiator are less likely, rather than two nodes in [3] have the same temporary IP address, even because the HostID consists of 32 bits chosen randomly, while the temporary IP address consists of only 11 bits; the address is assigned independently from the routing protocol selected, because the messages used are typical of this model and do not need to be supported by a specific routing protocol. In case a node configured with the HostID wants to connect to an ad-hoc network, it periodically sends a Request message in broadcast. This message contains the HostID, and is sent until a reply is received from at least one neighbor node. In this case, two conditions may occur: 1) the node that replied is isolated too; 2) the node belongs to an existing ad-hoc network. The first case happen, when two single nodes get in contact and are not configured with a IP address. The node with the highest ID should select the following values at random within the range of allowed values: the NetID for the new network that is being created, as well as the IP address for itself and for the second node. Then it notifies the second node with the NetID and the IP. In the second case, the IP address of the node contacted is already configured. Thus, the node can work as an initiator and perform the assignment procedure of the IP address, as we have mentioned above. Besides a requester may receive the reply to the Request message from several nodes at the same time. In this case, the node that sends the strongest signal is selected as the initiator. to assure the uniqueness of the addresses. The methods proposed in literature for managing the merging of networks use either IDs consisting of several bits (that need to travel in the network together with the IP address)[5] or mechanisms that detect the merging and organize the networks involved, in order to make them a new single network [2]. The devices of ad-hoc networks generally have limited resources and unreliable channels. An immediate management of duplicated addresses can overload the communication channels and nodes. To minimize the use of nodes resources, our protocol manages the networks merging reactively. This means working only when nodes with duplicate addresses need to communicate. We do not assure that duplicate addresses are never present in the network, but that the packets are routed correctly. We use reactive routing protocols (such as AODV), since the proactive routing protocols waste too many resources, and that is in conflict with our purposes. In fact, we chose to realize a protocol for nets of any extension. So we paid attention to minimize the network load and the node resource utilization. We associate a NetID to each ad-hoc network to detect merging of networks; the nodes characterized by the same NetID have different addresses. This is assured by the Initial Configuration phase. When a node needs to send data, the reactive routing protocol starts the Route Discovery process to search the path towards the destination node. During this phase, our protocol detects if duplicated addresses are present. If node S in Figure 2 looks for a node with IPx address, it sends a request packet in broadcast containing the source and destination IDs. When the request reaches the destination node, this sends a reply packet to the source, to specify the path for the data transfer. Our protocol inserts the NetID of the destination node in the reply packet. When the source S receives replies from nodes with different NetIDs, it detects that the IPx address duplication has occurred. If an address IV. DETECTION OF IP ADDRESS DUPLICATION Ad hoc networks are very dynamic environments. Different networks can overlap, and nodes with the same address can get in contact. When this happens, misunderstandings take place while routing the packets, as shown in Figure 1. So we have Fig. 2. Network merging. Fig. 1. Address duplication. to be able to detect the contact among distinct networks, and duplication is detected, the source sends the Change IP packet to the nodes with the same IPx. So these nodes are requested to change their addresses, by restarting the Initialization phase. If different networks get in contact, routing data is more complex, since the address duplication detection system has to be started up. Getting one network with a single NetID is therefore more convenient. However, network merging and partitioning can be very frequent (highly dynamic networks or low density of nodes), and the immediate reconfiguration of all the nodes might overload the devices. Our protocol implements

4 the Gradual Merging mechanism. This solution allows the nodes to switch from a network to another, according to the evolution of the networks. Each node periodically counts the number of neighbors of its own network or of another one. If there are more neighbors than in a different network, a node can decide to change its network with regard to specific metrics. This way, if two networks tend to merge, the system focuses on the NetID of the network with a higher number or with a higher density of nodes. Conversely, if the networks have few contact points, the procedure for standardizing the NetID is stopped. This merging mechanism avoids to overload the nodes and the communication channels, because it prevents all nodes from reconfiguring their network parameters at the same time. V. PARTITIONING As described above, we have chosen to associate a single network with an ID. We need to detect any network partitioning, so to avoid to create two networks with the same NetID. Let us consider two sub-networks close but logically splitted (see Figure 3). A link can break, and two similar situations may occur. If link 1 that connects different networks is broken, this is not a problem. Otherwise, if link 2 between nodes of the same network is broken, this is dangerous. Since a new node may enter part A and can receive an address present in part B, a new merging between A and B causes an address duplication that cannot be detected with the above-mentioned mechanism. In fact, the nodes of part A and B would have the same NetID2. The detection of the partitioning is activated its network to change the NetID. It specifies the original and the new NetIDs, so that the nodes of the other networks can be excluded from the process. Of course, several nodes can detect the partitioning at the same time, but just one NetID is diffused. VI. EXPERIMENTAL VALUATIONS The configuration protocol of IP addresses proposed in this paper has been simulated with ns2 [1] version We have analyzed the operation and evaluated the performances of the protocol with the increase in the number of nodes of the network. In particular, the simulations have been made for two purposes: Analysis of the configuration times of the nodes present in the network. Evaluation of the performances of the protocol according to the traffic generated for the configuration of each node. In the first case we have studied some scenarios consisting of groups of 10, 30, 50, and 70 nodes. the nodes were contained in an area of 1000x1000 m and were activated at random. In Figure 4 we show the normalized average number of nodes that have been correctly configured throughout the time. After comparing the curves related to the number of network nodes, we can see that the higher this number is, the longer the time is for configuring the same amount of nodes. This is due to the different node concentration in the simulations. The lower the concentration is, the higher the number is of isolated groups. This way, more nodes can be configured without an Initiator and so more quickly. However, the longest time needed for the configuration of the nodes is not longer than 0.6 seconds. The curve for 10 nodes shows an abnormal trend, if compared with other curves. In fact, even if the inclination is very high between 0 and 0.1 seconds, the curve cannot reach the saturation value. This is due to the low density of nodes in the network. Many nodes cannot find a neighbor node, and cannot start the configuration procedure. Fig. 3. Network partitioning. when one or more neighbor nodes belonging to the network of one node disappear. Then the last node searches for a path to the first one through the nodes of its network. This is done for avoiding a fragmentation of the network whose nodes can be reached only through the ones of a different network. In fact, the management of partitioning would become more complex. This method provides for the use of a time-out, and the reply must be received before the time elapses. Since we try to reach a neighbor node, the time-out is not difficult to be determined. If no reply is received for the path to the missing node, we cannot determine which event has occurred (whether the node has been abruptly switched off or moved). So we prefer to deal with the two cases the same way, and to assume that a network partitioning has occurred. This is detected by both of the nodes that have lost the link. However, only the node with the higher IP starts the process of Network reidentification. This node selects a new NetID, and informs the nodes of Fig. 4. Percentage of correctly configured nodes The study of the protocol performances has made use of scenarios consisting of 20, 40, and 60 nodes in an area of 1000x1000 m. The nodes were divided in two equal groups. The first group of nodes were activated at random in a time range between t0=0 and t1=170 s, while the second group of nodes were activated in a time range between t2=400 and t3=570 s. In Figure 5 we show the number of packets Initialize sent in a time unit. Packets Initialize send the configuration parameters to the nodes that requested for them. Due to the

5 lower density of nodes, the curve shows a wide increase for 20 nodes during the first 20 seconds, in comparison with the other curves In fact, in these conditions nodes tend to configure in small groups. Thus, more Initialize packets are sent without starting the procedure Search IP. This is confirmed by the Fig. 7. Packets Request per time unit Fig. 5. Packets Initialize per time unit diagram of Figure 6, which shows the number of packets Search IP sent in a time unit. In this case, the curves (in particular, the 20 node one) are very flat in the first 20 seconds. There is a reason for this: the first nodes that are activated in the network do not need to exchange these packets, because they are configured in pairs. Conversely, figures 5 and 6 are very similar in the range between 400 and 570 seconds. This is due to the fact that the nodes of the second group are not likely to be activated one next to the other and far from the configured nodes. If there are not collisions, each packet Inizialize should be matched by a packet Search IP. In Figure 7 we show the number of packets Request per Fig. 6. Packets Search IP per time unit time unit. The activated nodes use these packets to request the neighbor nodes for the configuration parameters. The higher the number of nodes is, the higher the number of packets Request sent should be. However, the trend is opposite in the range between 170 and 400 seconds. This behavior depends on the different concentration of the nodes in the network. The nodes continue to send such packets, until they find an Initiator. Then they remain silent, waiting for the address to be configured. As we have seen in the previous figures, the nodes are configured 0.6 seconds after the time of activation, at the latest. Then the nodes that continue to send packets Request after this time interval are the ones that remained isolated. The lower the node concentration is, the nodes are more likely to remain isolated, and they cannot find their Initiator. This behavior is confirmed after 570 seconds. In fact, while almost all the nodes of the 60 node networks are configured and stop sending packets Request, the traffic of these packets is intense in a 20 node network. We have used the reactive routing protocol AODV in all of our simulations. This choice did not affect our measurements, because no evaluation was made for the total network traffic. The measures shown point out the behavior of the protocol examined, with reference to specific packets, and with no need for further routing procedures. However, the selection of the AODV protocol allowed to optimize the code, because we could use the methods SendHello, SendRouteRequest, and SendReplay. VII. CONCLUSION In this paper we have described a self-configuration mechanism of the IP address for the nodes of an ad-hoc network. The system has been designed so to avoid to store huge amounts of data allowing each node to be aware of the neighbor nodes only. The reactive management of the address duplication also allows to minimize the traffic in the network: this does not guarantee that the addresses of the nodes can always be different, but to detect any duplication as soon as two users want to communicate. Moreover a gradual merging mechanism has been presented. This allows a node to switch from a NetID to another, according to what is perceived by the node about the evolution of the network. Thanks to this procedure, if two networks with very different size merge, the larger one will prevail over the other. Conversely, the procedure tends to stop where a separation between the elements of two different networks may easily split because few contact elements are present between the different networks. This approach requires to check the partitioning of the network, in order to change the NetID of the two parts that have been formed. REFERENCES [1] K. Fall and K. Varadhan (editors). ns Notes and Documentation. Available ns-documentation.html, 14 April [2] S. Nesargi and R. Prakash. Manetconf: Configuration of hosts in a mobile ad hoc network. In INFOCOM 2002, New York, June [3] C. E. Perkins, E. M. Royer, and S. R. Das. Ip address autoconfiguration for ad hoc networks. Technical report, 10 July [4] Y. Sun, E. M. Belding-Royer, and C. Perkins. Internet connectivity for ad hoc mobile networks. In International Journal of Wireless Information Networks special issue on Mobile Ad hoc Networks, April [5] N. H. Vaidya. Weak duplicate address detection in mobile ad hoc networks. In ACM International Symposium on Mobile Ad Hoc Networking and Computing, Boston- Massachusetts, June 2002.

A Comparison Study of Address Autoconfiguration Schemes for Mobile Ad hoc Network

A Comparison Study of Address Autoconfiguration Schemes for Mobile Ad hoc Network A Comparison Study of Address Autoconfiguration Schemes for Mobile Ad hoc Network Soyeon Ahn, Namhoon Kim, Woohyun Kim and Younghee Lee Information and Communications University, Computer Networks Lab.,

More information

Hosts Address Auto Configuration for Mobile Ad Hoc Networks

Hosts Address Auto Configuration for Mobile Ad Hoc Networks Hosts Address Auto Configuration for Mobile Ad Hoc Networks Sudath Indrasinghe, Rubem Pereira, Hala Mokhtar School of Computing and Mathematical Sciences Liverpool John Moores University M.P.Indrasinghe@2004.ljmu.ac.uk,

More information

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, lpu_chandan@yahoo.co.in

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

New Approach for Address Auto-Configuration in MANET Based on Virtual Address Space Mapping (VASM)

New Approach for Address Auto-Configuration in MANET Based on Virtual Address Space Mapping (VASM) New Approach for Address Auto-Configuration in MANET Based on Virtual Address Space Mapping (VASM) Majid Taghiloo 1, Mehdi Dehghan 2, Jamshid Taghiloo 3, Maria Fazio 4, 1 Computer Engineering Department,

More information

A Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks

A Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks A Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Abstract. In a wired network, layer three address assignment is a task that is mostly performed by

Abstract. In a wired network, layer three address assignment is a task that is mostly performed by IP Address Assignment schemes for mobile ad hoc networks Fernando Rodríguez Haro Universitat Politècnica de Catalunya Report for Mobility in TCP/IP networks, spring semester, 2006. Abstract In a wired

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Analysis of Denial of Service Attack Using Proposed Model

Analysis of Denial of Service Attack Using Proposed Model Chapter 5 Analysis of Denial of Service Attack Using Proposed Model 5.0 Introduction An Adhoc network is a collection of nodes that are capable of forming dynamically a temporary network without the support

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and

More information

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna

More information

Securing Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks

Securing Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks Securing Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks Bok-Nyong Park 1, Wonjun Lee 1 and Christian Shin 2 1 Dept. of Computer Science and Engineering, Korea University,

More information

Network Simulator: A Learning Tool for Wireless Technologies

Network Simulator: A Learning Tool for Wireless Technologies Current Developments in Technology-Assisted Education (2006) 1979 Network Simulator: A Learning Tool for Wireless Technologies A. Triviño Cabrera, E. Casilari Dpto. Tecnología Electrónica, University of

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving

More information

IP ADDRESS ASSIGNMENT IN A MOBILE AD HOC NETWORK

IP ADDRESS ASSIGNMENT IN A MOBILE AD HOC NETWORK MILCOM 2002 1 IP ADDRESS ASSIGNMENT IN A MOBILE AD HOC NETWORK Mansoor Mohsin and Ravi Prakash The University of Texas at Dallas Richardson, TX Abstract A Mobile Ad Hoc Network (MANET) consists of a set

More information

VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs

VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

Internet Connectivity for Ad hoc Mobile Networks

Internet Connectivity for Ad hoc Mobile Networks Internet Connectivity for Ad hoc Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu Charles E. Perkins

More information

PART IV. Network Layer

PART IV. Network Layer PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV

More information

Research on the Implementation of VoIP Service. in Mobile Ad-hoc Network

Research on the Implementation of VoIP Service. in Mobile Ad-hoc Network Research on the Implementation of VoIP Service in Mobile Ad-hoc Network 1,2 Yi Sun, 1,2 Gengfa Fang, 1 Jinglin Shi ( 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080, P.R.

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

RAA: A Ring-Based Address Autoconfiguration Protocol in Mobile Ad Hoc Networks

RAA: A Ring-Based Address Autoconfiguration Protocol in Mobile Ad Hoc Networks RAA: A Ring-Based Address Autoconfiguration Protocol in Mobile Ad Hoc Networks Yuh-Shyan Chen and Shih-Min Lin Department of Computer Science and Information Engineering, National Chung Cheng University,

More information

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection

More information

Name Service in IPv6 Mobile Ad-hoc Network

Name Service in IPv6 Mobile Ad-hoc Network Name Service in IPv6 Mobile Ad-hoc Network Jaehoon Jeong, Jungsoo Park, Hyoungjun Kim, and Kishik Park Protocol Engineering Center, ETRI, 161 Gajong-Dong, Yusong-Gu, Daejon 305-350, Korea {paul,pjs,khj,kipark}@etri.re.kr,

More information

Lab#2: IP Addressing and Subnetting

Lab#2: IP Addressing and Subnetting IP Addressing Lab#2: IP Addressing and Subnetting Each Network Interface Card (NIC or Network card) present in a PC is assigned one Network address called as IP address. This IP address is assigned by

More information

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network

More information

Chapter 5. Simple Ad hoc Key Management. 5.1 Introduction

Chapter 5. Simple Ad hoc Key Management. 5.1 Introduction Chapter 5 Simple Ad hoc Key Management 5.1 Introduction One of the most important consequences of the nature of the MANET networks is that one cannot assume that a node that is part of a network will be

More information

A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications

A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications Ahmed Abada Dept. of Systems and Computer Engineering Carleton University Ottawa, ON, Canada Li Cui Institute of Computing

More information

Name Service in IPv6 Mobile Ad-hoc Network

Name Service in IPv6 Mobile Ad-hoc Network Name Service in IPv6 Mobile Ad-hoc Network Jaehoon Jeong, Jungsoo Park, Hyoungjun Kim, and Kishik Park Protocol Engineering Center, ETRI, 161 Gajong-Dong, Yusong-Gu, Daejon 305-350, Korea {paul,pjs,khj,kipark}@etri.re.kr,

More information

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at

More information

Cloud Infrastructure Planning. Chapter Six

Cloud Infrastructure Planning. Chapter Six Cloud Infrastructure Planning Chapter Six Topics Key to successful cloud service adoption is an understanding of underlying infrastructure. Topics Understanding cloud networks Leveraging automation and

More information

An Extended AODV Protocol to Support Mobility in Hybrid Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}

More information

IJMIE Volume 2, Issue 7 ISSN: 2249-0558

IJMIE Volume 2, Issue 7 ISSN: 2249-0558 Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)

More information

II RELATED PROTOCOLS. Dynamic Source Routing (DSR)

II RELATED PROTOCOLS. Dynamic Source Routing (DSR) ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra

More information

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,

More information

A Distributed Protocol for Dynamic Address. Assignment in Mobile Ad Hoc Networks

A Distributed Protocol for Dynamic Address. Assignment in Mobile Ad Hoc Networks Distributed Protocol for Dynamic ddress 1 ssignment in Mobile d Hoc Networks Mansi Thoppian and Ravi Prakash bstract Mobile d hoc NETwork (MNET) is a group of mobile nodes that form a multi-hop wireless

More information

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS georizos@teiep.gr D. C. VASILIADIS dvas@teiep.gr E. STERGIOU ster@teiep.gr Abstract: In this paper,

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith y, and Louise E. Moser y Department of Computer Science y Department of Electrical and Computer

More information

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1

More information

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue

More information

Quality of Service for MANETs connected to the Internet

Quality of Service for MANETs connected to the Internet Quality of Service for MANETs connected to the Internet Andreas J. Kassler 1, ChenShanShan 2 1 Karlstad University, Computer Science Department, Universitetgatan 2, 65188 Karlstad, Sweden, kassler@ieee.org

More information

other. A B AP wired network

other. A B AP wired network 1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer

More information

Swarm Intelligence and Network Administration: Applications in Ad Hoc Wireless Auto-Configuration

Swarm Intelligence and Network Administration: Applications in Ad Hoc Wireless Auto-Configuration Swarm Intelligence and Network Administration: Applications in Ad Hoc Wireless Auto-Configuration Dr. Eric Cole Abstract: The Dynamic Host Configuration Protocol (DHCP) has been a commonly employed technique

More information

Study of Network Characteristics Incorporating Different Routing Protocols

Study of Network Characteristics Incorporating Different Routing Protocols Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab

More information

Result Analysis of Virtual IP Address Configuration Protocol

Result Analysis of Virtual IP Address Configuration Protocol Volume 64 No2, February 2013 Result Analysis of Virtual IP Address Configuration Protocol Satinder Kaur MTech Student Amritsar College of Engineering & Technology, Amritsar, Punjab-India- 143001 Tanu Preet

More information

A Link-state QoS Routing Protocol for Ad Hoc Networks

A Link-state QoS Routing Protocol for Ad Hoc Networks A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,

More information

Keywords: DSDV and AODV Protocol

Keywords: DSDV and AODV Protocol Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparison

More information

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses

More information

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891

More information

Energy Efficiency of Load Balancing in MANET Routing Protocols

Energy Efficiency of Load Balancing in MANET Routing Protocols Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing protocols and workload balancing techniques

More information

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &

More information

CAODV: Routing in Mobile Ad-hoc Cognitive Radio Networks

CAODV: Routing in Mobile Ad-hoc Cognitive Radio Networks : Routing in Mobile Ad-hoc Cognitive Radio Networks Angela Sara Cacciapuoti, Cosimo Calcagno, Marcello Caleffi Department of Biomedical, Electronics and Telecommunications Engineering University of Naples

More information

Routing with Load Balancing in Wireless Ad hoc Networks

Routing with Load Balancing in Wireless Ad hoc Networks Routing with Load Balancing in Wireless Ad hoc Networks Hossam Hassanein and Audrey Zhou Department of Computing and Information Science Queen's University Kingston, Ontario, Canada, K7L 3N6 {hossam, zhou}@cs.queensu.ca

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

Topics. Subnetting. The Basics of Subnetting Subnet Mask Computing subnets and hosts Subnet Routing Creating a Subnet Example of Subnetting 1/37

Topics. Subnetting. The Basics of Subnetting Subnet Mask Computing subnets and hosts Subnet Routing Creating a Subnet Example of Subnetting 1/37 1/37 Subnetting Surasak Sanguanpong nguan@ku.ac.th http://www.cpe.ku.ac.th/~nguan Last updated: 27 June 2002 Topics 2/37 The Basics of Subnetting Subnet Mask Computing subnets and hosts Subnet Routing

More information

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks , pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,

More information

Security issues in Address Autoconfiguration Protocols: An improved version of the Optimized Dynamic Address Configuration Protocol

Security issues in Address Autoconfiguration Protocols: An improved version of the Optimized Dynamic Address Configuration Protocol Security issues in Address Autoconfiguration Protocols: An improved version of the Optimized Dynamic Address Configuration Protocol André Langer Department of Computer Science University of California,

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

Dynamic Source Routing in Ad Hoc Wireless Networks

Dynamic Source Routing in Ad Hoc Wireless Networks Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract

More information

Adaptive Localized Active Route Maintenance Mechanism to Improve Performance of VoIP over Ad Hoc Networks

Adaptive Localized Active Route Maintenance Mechanism to Improve Performance of VoIP over Ad Hoc Networks 68 JOURNAL OF COMMUNICATIONS, VOL. 6, NO. 1, FEBRUARY 211 Adaptive Localized Active Route Maintenance Mechanism to Improve Performance of VoIP over Ad Hoc Networks Adriana Sofia Otero 1, Mohammed Atiquzzaman

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Location-Aided Routing (LAR) in mobile ad hoc networks

Location-Aided Routing (LAR) in mobile ad hoc networks Wireless Networks 6 (2000) 307 321 307 Location-Aided Routing (LAR) in mobile ad hoc networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science, Texas A&M University, College Station, TX

More information

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually

More information

A Survey: High Speed TCP Variants in Wireless Networks

A Survey: High Speed TCP Variants in Wireless Networks ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:

More information

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied

More information

Robust Routing in Wireless Ad Hoc Networks

Robust Routing in Wireless Ad Hoc Networks Robust Routing in Wireless Ad Hoc Networks Seungjoon Lee, Bohyung Han, Minho Shin {slee, bhhan, mhshin}@cs.umd.edu Computer Science Department University of Maryland College Park, MD 2742 USA Abstract

More information

Implementation of Virtual Local Area Network using network simulator

Implementation of Virtual Local Area Network using network simulator 1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,

More information

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013 CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60

More information

Local Address Management in IoT environments

Local Address Management in IoT environments Local Address Management in IoT environments Pat Thaler, Senior Technical Director, Broadcom 29 September 2014 3 rd IEEE 802 and IETF Leadership Meeting 1 PROBLEM STATEMENT 2 MAC address consumption ramps

More information

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks www.ijcsi.org 118 -Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks Vijayalakshmi P 1, Dr.V.Saravanan 2, Dr. P. Ranjit Jeba Thangiah 3, Abraham Dinakaran.J 4 1 Karunya

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

Ad hoc On Demand Distance Vector (AODV) Routing Protocol Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter

More information

Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols

Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols Farooq Anjum Applied Research Telcordia. Tech Inc. Morristown NJ 796 fanjum@telcordia.com

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Performance comparison and analysis of routing strategies in Mobile ad hoc networks

Performance comparison and analysis of routing strategies in Mobile ad hoc networks 2008 International Conference on Computer Science and Software Engineering Performance comparison and analysis of routing strategies in Mobile ad hoc networks Fu Yongsheng, Wang Xinyu, Li Shanping Department

More information