Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node
|
|
|
- Beryl Allyson Parrish
- 10 years ago
- Views:
Transcription
1 Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS [email protected] D. C. VASILIADIS [email protected] E. STERGIOU [email protected] Abstract: In this paper, we present a model that incorporates nodes with role of proxy in a MANET environment. MANET is specifically characterized by high mobility of network nodes and frequent changes of direct visibility. In partially connected ad hoc networks, the destination is not always reachable. In our model we need a proxy node to relay messages to the destination. Proxies are nodes that have high probability of reaching the destination. In our scheme, when a source sends a request for a destination and the destination is not reachable, then some of the nodes in the network will choose to become the proxy for the destination. The model has been evaluated via simulation in order to confirm the feasibility of his application in real conditions. In our measurements we use one proxy node in order to broadcast the messages in the destination. Key words Mobile Ad Hoc Networks (MANET), Routing Protocols, proxy node, ftp protocol. 1. Introduction Mobile Ad hoc networks (MANET) are considered as promising communication networks in situations where rapid deployment and selfconfiguration is essential. In ad hoc net-works, nodes are allowed to communicate with each other without any existing infrastructure. Typically every node should also play the role of a router. This kind of networking can be applied to scenarios like conference room, disaster management, battle field communication and places where deployment of infrastructure is either difficult or costly [1, 2]. A classification of routing protocols distinguishes them into source routing and hop-byhop routing protocols. In source routing, the sources compute the complete path towards the destinations, leading to a loop-free routing protocol. On the other hand, in hop-by-hop routing, each intermediate node computes the next hop itself. Thus, the hop-by-hop routing protocols reduce the chance of failed routes, a parameter of crucial importance especially in mobile networks, which are more prone to the specific error type due to the fact that their topology changes much faster as compared to wired networks. Consequently, source routing protocols - such as the Dynamic Source Routing (DSR) [4] - allow intermediate nodes (and even overhearing nodes) to modify the route, adapting thus better to the nature of mobile networks. Most MANET routing protocols such as Optimized Link State Routing (OLSR) [7] and Ad-hoc On-demand Distance Vector (AODV) protocols [5] have adopted the strategy of hop-by-hop routing. As we see many routing protocols exist to enable communication in ad hoc networks like, AODV [5], DSR [4], DSDV [3], etc. All these protocols assume that the source and destination nodes can reach each other using a single or multi-hop path. But, there exist situations when connectivity between source and destination cannot be guaranteed always. In this paper we study the performance analysis of a wireless ad hoc network model using Distance Vector routing protocols, and the FTP protocol. The remainder of this paper is organized as follows: in section 2 a quickly overview of routing protocols for Ad Hoc Networks is presented. In section 3 we analyse a test-bed wireless ad hoc network scheme using the Distance Vector routing protocols. Section 4 we present the simulations results of our experimental analysis, which has been conducted through simulation experiments, while section 5 provides the concluding remarks. ISBN:
2 2. Routing Protocols for Ad Hoc Networks We distinguished three basic categories of protocols: o Table - driven o Demand - driven o Hybrid Table - Driven Routing Protocols (proactive) Guided from table of routing (dynamic): In this category of protocols the nodes that constitute the network allocate tables which contain elements for the routing of messages in any other node, and which are informed permanently for each change in the topology of network. Examples of proactive protocols include the Destination Sequence Distance Vector (DSDV) [3], the Fisheye State Routing (FSR), the Global State Routing (GSR), the Wireless Routing Protocol (WRP), the Clusterhead Gateway Switch Routing (CGSR) and the STAR. On Demand - Driven Protocols (reactive) Guided at requirement (counteractive): In the particular protocols are not maintained the all ways of each node in tables. On the contrary when exists application for mission of some message, the sender calls a algorithm for the finding of suitable path, which is maintained until the message reaches in his destination, or until is created such change in the topology of network, that automatically will cancel him because henceforth it will not be in effect [11]. Examples of reactive protocols include the Ad hoc On Demand Distance Vector (AODV) [5], the Dynamic Source Routing (DSR) [4], the Signal Stability Routing (SSR), and the Temporally Ordered Routing Algorithm (TORA). 3. The model Analysis (a01) The following (Fig.1) test-bed configuration was chosen to represent the behaviour of a wireless ad hoc network scheme [8, 9, 10, 11 ], where all services are roughly categorized with data rate requirements and delay sensitivity. # Simulation # Ad-Hoc Protocol: AODV,DSR,DSDV # Define options set val(chan) Channel/WirelessChannel ;# channel type set val(prop) Propagation/TwoRayGround ;#radio-propagation model set val(netif) Phy/WirelessPhy ;# network interface type set val(mac) Mac/802_11 ;# MAC type set val(ifq) DropTail ;# interface queue type set val(ll) LL ;# link layer type set val(ant) OmniAntenna ;# antenna model set val(ifqlen) 50 ;# max packet in ifq set val(nn) 10 ;# number of mobilenodes set val(rp) AODV ;# routing protocol set val(x) 1000 ;# X dimension of topography set val(y) 500 ;# Y dimension of topography set val(stop) 200 ;# time of simulation end Figure1. Network Simulation model. We have chosen AODV routing protocol of ad hoc network as the base of our measurements because of some simple reasons: It is a "popular" protocol for ad hoc networks Our approach needs least modification in AODV as compare to that in other schemes like DSR, DSDV. The modelled network (Fig.2) consists of 10 nodes, one source (node 0) and one sink (node1). Figure2. Modelled network When our nodes start moves, the model tries to exploits client/server location visibility to reorganize the locality via the dynamic election of a proxy agent [12]. # Generation of movements $ns at 5.0 "$node_(1) setdest " $ns at 5.0 "$node_(0) setdest " $ns at 25.0 "$node_(4) setdest " $ns at 35.0 "$node_(6) setdest " $ns at 35.0 "$node_(5) setdest " $ns at 45.0 "$node_(8) setdest " $ns at 40.0 "$node_(9) setdest " $ns at 50.0 "$node_(2) setdest " Figure3. Movement s generation ISBN:
3 The proxy takes care of searching servers by need, of forwarding client requests, and of performing multi hop routing it permits to organize solutions for client/server rebinding and service reestablishment that are scalable and mobilitytransparent [7]. Once the proxy finds the server, the proxy starts forwarding service requests/responses from/to interested clients. In other words, all service messages are automatically and transparently sent through the proxy, acting as a bridge between the clients and the server. packets that are sent from the source to the total number of packets that are transmitted within the network to reach the destination. ii. Goodput (In terms of Packet Size in Bytes): The ratio of the total bytes of data that are sent from the source to the total bytes that are transmitted within the network to reach the destination. Figure5. Throughput vs Time Figure4. Network topology after some movements Of course all these activities (how the information of which connections are open are developed by the lower network levels, how the neighbours informed, how the neighbours inform the computer that have the activity, the possibilities of communication of each node with the source) involve some costs in level of network messages (or snooping network mechanisms for communication mechanisms). And of course all these parameters depend from the mobility rates of model that are examined each time [6]. Figure 5 shows Throughput vs. Time where we analyzed the total bytes received by the destination node per second (Data packet and Overhead). According to this figure the AODV protocol starts off quickly and the data rate is more stable. The DSR protocol starts off quickly as the AODV however as you can see there are lots of fluctuations in the data rate. Finally the DSDV protocol takes time to start off but the data rate has lesser fluctuations. 4. Experimental Analysis and Simulations Results We use the file transfer protocol to measure the performance of our model. To measure the performances, we used the following metrics: Throughput: The total bytes received by the destination node per second (Data packets and Overhead). Goodput: i. Goodput (In terms of Number of packets): The ratio of the total number of data Figure6a. Goodput (Number of data packets) ISBN:
4 Figure6b. Goodput (Packet Size in Bytes) In Figure 6a and Figure 6b we calculated Goodput in terms of number of packets and the packet size in bytes. We can see that on an average, packets are transmitted in the network, 17% packets would be data packets for AODV, 17% for DSR, and 28% for DSDV. In term of bytes, on an average; 32% bytes would be data packets for AODV, 28% bytes for DSR, and 54% bytes for DSDV. From these data, we could deduce that; though DSDV takes time to converge, it actually is sending more data packets in number as well as in bytes than that of AODV and DSR. The rest of the percentage of each individual graph will be the overheads that contain routing packets and acknowledgements. In the second stage of our measurements we use only the AODV routing protocol (red color line).to measure the performances we used an extension of this protocol (green color line) when source and destination are not connected. In situations where the network is connected our protocol behaves like normal AODV. When there is no connected path, we exploit mobility of nodes and use store and forward approach to deliver the data. Then some of the nodes called proxy nodes are selected by source to hold the data on behalf of destination. Proxy nodes acts as source and try to deliver data to the destination. Figure 7 shows Throughput vs. Time where we analysed the total bytes received by the destination node per second (Data packet and Overhead). According to this figure the AODV protocol starts off quickly and the data rate is stable. The protocol with the proxy starts off quickly as the AODV, the data rate is stable enough however as you can see there is a gap between 25 and 100 seconds. Figure7. Throughput vs Time Figure8a. Goodput (Number of data packets) Figure8b. Goodput (Packet Size in Bytes) In Figure 8a and Figure 8b we calculated Goodput in terms of number of packets and the packet size in bytes. We can see that on an average, packets are transmitted in the network, 17% packets would be data packets for AODV, and 98% for the extension proxy scenario. In term of bytes, on an ISBN:
5 average; 32% bytes would be data packets for AODV, and 97% bytes for the extension. 5. Conclusions In this work, we have compared performance characteristics of on demand driven routing protocols (reactive) for ad-hoc network routing. In our first measurements the general observation is that the AODV behaves more effectively from the DSR as long as increase the time of discovery of source. For AODV, we can see that it adapts quickly to the change of the network and has a relatively stable throughput with a moderate goodput. So, in an application where there is a fast change in the network topology and a requirement of stable date rate, AODV is more preferable. DSR though has a very high throughput, it actually contain less data packets and we can see that there are lots of fluctuations on the throughput curve which are not preferred in a wireless network. DSDV turns out to have the best goodput; however, it takes time to converge. So if there is relatively lesser number of nodes in the network and the mobility is somewhat steady or slow, DSDV will work more efficiently. In the second stage of our measurements the general observation is that the AODV routing protocol and the proxy extension have the same behave and relative stable throughput. However our proxy scenario has better goodput in both of our measurements. From these data, we could deduce that our proxy scenario sending more data packets in number as well as in bytes than that of AODV. The gain for downloading time is greater for the AODV protocol under the used of proxy scenario; when the client informs his neighbours for the session and they start watching the server and the project. [3] C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers," ACM SIGCOMM'94 Conference on Communications Architectures, Protocols and Applications, pp , Aug [4] D. B. Johnson and D. A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks in Mobile Computing, Kluwer Publishing Company, [5] C. E. Perkins and E. M. Belding-Royer, "Ad-hoc On Demand Distance Vector Routing," 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp , Feb [6] Performance Comparison and Improvement of Wireless Network Protocols, G. E. Rizos, D. C. Vasiliadis, E. Stergiou, Proceedings Of The European Computing Conference, Springer [7] Comparative study of demand driven routing protocols over mobile ad-hoc networks, G. E. Rizos, D. C. Vasiliadis, E. Stergiou, Proceedings of the 13th International Conference on Communications - Held as part of the 13th CSCC Multiconference, pp , July 2009 [8] Kevin Fall and Kannan Varadhan (Eds.) ns notes and documentation, Available from [9] The Network Simulator - ns-2; available at [10] [11] Performance Evaluation of Distance Vector Routing Protocol on a Wireless Circular Model, D.C. Vasiliadis, G.Ε. Rizos, and C. Vassilakis, Proceedings of the ΙΕΕΕ sponsored International Joint Conference on Telecommunications and Networking (TENE 07), Springer pres, pp , December [12] A Client-Proxy-Server service model on Mobile Ad hoc networks, G.E. Rizos, D.C. Vasiliadis, Proceedings of the 2nd conference on European computing conference, Springer References: [1] J. Macker, S. Corson, Mobile Ad-hoc Networks (MANET), -harter.html, [2] IEEE b Working Group, Wireless LAN medium access control (MAC) and physical layer (PHY) specifications: higher speed physical layer (PHY) extension in the 2.4 GHz band, ISBN:
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks
www.ijcsi.org 118 -Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks Vijayalakshmi P 1, Dr.V.Saravanan 2, Dr. P. Ranjit Jeba Thangiah 3, Abraham Dinakaran.J 4 1 Karunya
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs
International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks
Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks T. Jagadeepak 1, Dr. B. Prabhakara Rao 2, B. A. S. Roopa Devi 3 PG Student, Dept. of ECE, UCEK, JNTU,
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Achieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,
IJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
A Survey: High Speed TCP Variants in Wireless Networks
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:
`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS
`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS Divya Sharma CSE Dept, ITM Guargoan [email protected] Ashwani Kush Computer Dept, University College Kurukshetra University India [email protected]
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
Network Simulator: A Learning Tool for Wireless Technologies
Current Developments in Technology-Assisted Education (2006) 1979 Network Simulator: A Learning Tool for Wireless Technologies A. Triviño Cabrera, E. Casilari Dpto. Tecnología Electrónica, University of
Keywords: DSDV and AODV Protocol
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparison
Optimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
Energy Consumption analysis under Random Mobility Model
DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network
PERA: Ad-Hoc Routing Protocol for Mobile Robots
PERA: Ad-Hoc Routing Protocol for Mobile Robots Carlos Agüero Vicente Matellán Pedro de-las-heras-quirós José M. Cañas DIET (Departamento de Informática, Estadística y Telemática) Universidad Rey Juan
Daniele Messina, Ilenia Tinnirello
!"! #$ %& ' %& traffic source agent node link n0 ftp tcp sink 2mbps 10 ms n2 1.7mbps, 20 ms n3 cbr udp n1 2mbps 10 ms null pktsize 1KB, rate 1mbps #Create a simulator object set ns [new Simulator] $ $
A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks
A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks Sunho Lim, Wang-Chien Lee, Guohong Cao, and Chita R. Das Department of Computer Science & Engineering The Pennsylvania State University
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
Evaluating the performance of secure routing protocols in Mobile Ad-hoc Networks
ISSN (Print) : 2319-594 ISSN (Online) : 2278-121 Evaluating the performance of secure routing protocols in Mobile Ad-hoc Networks Shawkat K. Guirguis 1, Ommelhana S.Saaid 2 Professor of Computer Science
Performance comparison and analysis of routing strategies in Mobile ad hoc networks
2008 International Conference on Computer Science and Software Engineering Performance comparison and analysis of routing strategies in Mobile ad hoc networks Fu Yongsheng, Wang Xinyu, Li Shanping Department
SJBIT, Bangalore, KARNATAKA
A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,
Performance Evaluation of Mobility Speed over MANET Routing Protocols
International Journal of Network Security, Vol., No.3, PP.28 38, Nov. 2 28 Performance Evaluation of Mobility Speed over MANET Routing Protocols Yasser Kamal Hassan, Mohamed Hashim Abd El-Aziz 2, and Ahmed
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
Study of Network Characteristics Incorporating Different Routing Protocols
Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab
A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks
A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332
Energy Efficiency of Load Balancing in MANET Routing Protocols
Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing protocols and workload balancing techniques
INTELLIGENT LOAD BALANCING IN MOBILE AD HOC NETWORKS. A Thesis by. Varun Khanna. Bachelor of Technology, Kurukshetra University, India, 2004
INTELLIGENT LOAD BALANCING IN MOBILE AD HOC NETWORKS A Thesis by Varun Khanna Bachelor of Technology, Kurukshetra University, India, 2004 Submitted to the Department of Electrical Engineering and Computer
An Efficient AODV-Based Algorithm for Small Area MANETS
An Efficient AODV-Based Algorithm for Small Area MANETS Jai Prakash Kumawat 1, Prakriti Trivedi 2 PG Student, Department of Computer Engineering & IT, Government Engineering College, Ajmer, India 1 Assistant
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 2, April 2012
PERFORMANCE EVALUATION OF DIFFERENT WIRELESS AD HOC ROUTING PROTOCOLS Niranjan Kumar Ray 1 and Ashok Kumar Turuk 2 Department of Computer Science and Engineering, National Institute of Technology Rourkela,
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 54-61 Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
Proposition of a new approach to adapt SIP protocol to Ad hoc Networks
, pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana
AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks
: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks Gianni Di Caro, Frederick Ducatelle and Luca Maria Gambardella Istituto Dalle Molle sull Intelligenza Artificiale (IDSIA) Galleria 2,
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,
Delay aware Reactive Routing Protocols for QoS in MANETs: a Review
Delay aware Reactive Routing Protocols for QoS in MANETs: a Review Saad M. Adam*, Rosilah Hassan Network and Communication Technology Research Group, Faculty of Information Science and Technology, Universiti
Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks
Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks Anders Nilsson, Ali Hamidian, Ulf Körner Department of Communication Systems Lund University, Sweden Box118,221Lund
An Extended AODV Protocol to Support Mobility in Hybrid Networks
An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Power Aware
Comparing the Performance of the Ad Hoc Network under Attacks on Different Routing Protocol
, pp. 195-208 http://dx.doi.org/10.14257/ijsia.2015.9.6.19 Comparing the Performance of the Ad Hoc Network under Attacks on Different Routing Protocol Haiyan Liu 1, * and Zhanlei Shang 2 Engineering Training
Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach
Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach E. Borgia, M. Conti, F.Delmastro, and E. Gregori Pervasive Computing & Networking
1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance
Robust Routing in Wireless Ad Hoc Networks
Robust Routing in Wireless Ad Hoc Networks Seungjoon Lee, Bohyung Han, Minho Shin {slee, bhhan, mhshin}@cs.umd.edu Computer Science Department University of Maryland College Park, MD 2742 USA Abstract
Routing with Load Balancing in Wireless Ad hoc Networks
Routing with Load Balancing in Wireless Ad hoc Networks Hossam Hassanein and Audrey Zhou Department of Computing and Information Science Queen's University Kingston, Ontario, Canada, K7L 3N6 {hossam, zhou}@cs.queensu.ca
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at
MASTER THESIS REPORT MSc IN ELECTRICAL ENGINEERING WITH EMPHASIS ON TELECOMMUNICATION
MEE 09: 17 MASTER THESIS REPORT MSc IN ELECTRICAL ENGINEERING WITH EMPHASIS ON TELECOMMUNICATION TRASMISSION CONTROL PROTOCOL (TCP) PERFORMANCE EVALUATION IN MANET BLEKINGE INSTITUTE OF TECHNOLOGY MARCH
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
Wireless Mesh Networks under FreeBSD
Wireless Networks under FreeBSD Rui Paulo [email protected] The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant
UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks
UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks a Mobile Ad hoc NETwork (MANET) is one that comes together as needed, not necessarily with any support from the existing infrastructure or any
Gateway Load Balancing in Integrated Internet- MANET to Improve Network Performance
Gateway Load Balancing in Integrated Internet- MANET to Improve Network Performance Ajay Kumar 1, Udai Shankar 2, Mahesh Kumar Tiwari 3 1 2 3 Department of Computer science & Engineering and Information
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
A Survey of Mobile Ad Hoc network Routing Protocols*
Technical Report (Nr. 2003-08) A Survey of Mobile Ad Hoc network Routing Protocols* Changling Liu, Jörg Kaiser {changling.liu, joerg kaiser}@informatik.uni-ulm.de Department of Computer Structures University
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund
A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY
A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL Using OPNET 14.5 Modeler NORTH CAROLINA STATE UNIVERSITY SUBMITTED BY: SHOBHANK SHARMA [email protected] Page 1 ANALYSIS OF OSPF ROUTING PROTOCOL A. Introduction
Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks
1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
Cross Layer TCP Congestion Control Load Balancing Technique in MANET
Cross Layer TCP Congestion Control Load Balancing Technique in MANET Nidhi Shukla 1, Neelesh Gupta 2, Naushad Parveen 3 1 M.Tech Scholar (ECE), 2 Prof & Head (ECE), 3 Asst. Prof. ( ECE), Department of
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet
