CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
|
|
- Douglas Peters
- 8 years ago
- Views:
Transcription
1 CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility management. Our focus in this research is routing and load balancing. Existing solutions in mobile ad hoc and sensor networks cannot be directly applied to WMNs due to the difference in traffic patterns, mobility scenarios, gateway functionalities and bandwidth requirements. Since most users in WMN are primarily interested in accessing the Internet or other commercial servers, the traffic in WMNs is routed either toward the Internet Gateways (IGWs) or from the IGWs to clients. Thus, if multiple edge mesh routers choose the best throughput path toward a gateway, the traffic loads on certain paths and mesh routers increase tremendously, thereby significantly decreasing the overall performance of the network. The routing algorithm therefore needs to determine routes between each traffic access point in a way that balances the load on the entire mesh network. Efficient load balancing mechanism can help in avoiding congestion and can increase the efficiency of the network resource utilization. In order to achieve load balancing in WMNs, a suitable routing protocol should be designed. Existing schemes for 160
2 load balancing in wireless mesh networks consider load balancing at the Internet gateways. This research proposes load-balancing routing algorithm which is cross-layer based and utilizes a Multipath routing mechanism. The idea of novel route calculation technique is based on a multiple use of the shortest path algorithm for a specially modified topology graph. Instead of running the algorithm for the case of the computing node as the origin of any route, all the neighbors of the computing node, except the one being currently examined as a possible next hop, are removed from the topology graph along with their adjacent edges. Then the Dijkstra s shortest path algorithm is run for the chosen neighboring node as a route origin. The procedure is repeated for each neighbor of the computing node. As a result, the computing node obtains several routing tables (one table per neighbor), which can be easily merged into its final routing table with multiple entries for every possible destination. The modified route calculation algorithm can be described as a diagram as shown in Fig The example of the algorithm execution is illustrated in Fig
3 Start Require: Topology G, Computing node m Ensure: Multiple routes for each node Yes All neighbours of vertex m visited? No Merge the obtained routing tables of neighbouring nodes into the final multi-path routing table of node m Delete all neighbours of vertex m with their adjacent edges, except of the selected one Run Dijkstra's algorithm for the obtained graph in order to determine entries of a routing tables with the selected neighbour as next hop on the route Fig. 6.1 Flowchart for Calculation of Multiple Routes The OLSR protocol extension has been designed to cooperate with backpressure like scheduling. As a result of modified protocol operation, the transmitting node is able to provide the backpressure based scheduler with the possible choices of the next hop for every destination node. The solution is a variation of the unconstrained backpressure approach. It is aimed at the restriction of all possible next-hop choices to a collection of reasonable choices for a given destination of all the neighbors of the computing node, for which the destination node is unreachable without further contribution from one of the remaining neighbors of the computing node, which are excluded from the set of proposed next hops. 162
4 Fig. 6.2 Multiple Routes Calculation Method As traffic distribution is not equal in all links in the network, spreading the traffic along multiple routes can alleviate congestion in some links and bottlenecks. There are two main families of routing protocols enabling load balancing on multiple paths. The first family uses labelling or source routing mechanisms (deployed above 163
5 traditional IP routing), whereas the second family makes use of hop by hop routing protocols. In this research thesis, we discuss a new multipath routing protocol called Modified MP-OLSR based on OLSR to provide faulttolerance, higher aggregate bandwidth and load balancing. It exchanges control messages periodically as OLSR to get the topology information, queue level and node remaining energy in each node of the whole networks. This routing metric takes into account the above mentioned cross-layer factors topology information, queue level and node remaining energy. Through considering these factors, the route selection is optimized to a large extent, the network throughput is improved and the goal of load balance is achieved. Based on this topology information and remaining energy in each node, our modified Multipath Dijkstra algorithm is used to obtain the multiple paths for the routing. With the algorithm, we can get node-disjoint routes or path-disjoint routes as necessary by adjusting distinct cost functions. In the network, the packets are forwarded from the source to the destination by employing a semi-source routing mechanism (source routing with route recovery). First, we propose a multipath routing algorithm based on the Dijkstra algorithm that allows different multipath approaches. Routing recovery from intermediate nodes is also included. Second, the multiple routes are 164
6 exploited via an original multiple description coding based on a discrete Random transform. 6.2 MODIFIED MP-OLSR (MMP-OLSR) SPECIFICATION The MMP-OLSR can be regarded as a hybrid multipath routing protocol. It sends out HELLO messages and TC messages periodically to be aware of the network topology, just like OLSR. The HELLO message contains the queue level and node remaining energy information from each node. An additional two bytes recording the energy and queue levels are piggybacked onto the hello messages. So, all the neighbors hear the packet and record the corresponding values. The multi-path selection thus takes all the next hops from available paths, and checks the associated normalized remaining energy levels known to the node. The route with the highest energy level is selected. The energy usage at a node indicates the amount of radio activities. Thus, it can be regarded as an indication of traffic load at the node. While selecting the route according to the energy levels, load balancing among the nodes is achieved. However, MMP-OLSR does not always keep a routing table. It only computes the routes when data packets need to be sent out. The core functioning of MMP-OLSR has two main parts: topology sensing and routes computation. The topology sensing is to make the nodes get to the topology information of the network, which includes link 165
7 sensing, neighbor detection and topology discovery. This part gets benefit from MPRs as well as OLSR. The routes computation uses the modified Multipath Dijkstra Algorithm to populate the multipath based on the information got from the topology sensing. The source route (the hops from the source to the destination) will be saved in the header of the data packets. The intermediate nodes just read the packet header and forward the packet to the next hop. Furthermore, to overcome some drawbacks of source routing, the route recovery is introduced Topology Sensing The topology sensing is to make the nodes get to know the topology information of the network, which includes link sensing, neighbor detection and topology discovery. This part gets benefit from MPRs as well as OLSR to minimize the flooding of broadcast packets in the network by reducing duplicate retransmissions in the same region. By sending the routing control messages proactively, the node could get to know the topology of the network: its neighbors, 2-hop neighbors and other links, which are saved in neighbor set, 2-hop neighbors set and topology set respectively Routes Computation Contrary to classical OLSR, routes are not determined by nodes each time they receive a new Topology Control message, but only if need be, in order to avoid the load computation of several routes for 166
8 every possible destination. When a given source must send packets, the route computation procedure uses the algorithm. Modified Dijkstra s Algorithm MODIFIED-DIJKSTRA (G = (V, E), s V) Set d[v] = and count[v] = 0 for every node v V {s} Set d[s] = 0 and count[s] = 1 S = ф, Q = V while Q ф Let u be a node in Q such that d[u] d[v] for all nodes v Q = Q {u}, S = S U {u} for each node v adjacent to u if d[v] > d[u] w(u,v) d[v] = d[u] + w(u,v) count[v] = count[u] else if d[v] = d[u] + w(u,v) count[v] = count[v] + count[u] return count[v] for every node v V Q We simply apply Dijkstra s algorithm and maintain an array count[]. At any step of the algorithm, if v S, then count[v] denotes the number of shortest paths from s to v. When we are relaxing an edge(u,v) with u S; v S, there are three cases to be considered. If d[v] > d[u] + w(u,v), then any shortest path from s to u, coupled with the edge(u,v), can be a potential shortest path from s to v. Thus, we set count[v] = count[u]. On the other hand, if d[v] = d[u] + w(u,v), then we keep track of every existing potential shortest path to v, plus we add the number of 167
9 shortest paths to u coupled with the edge(u,v). Thus, we set count[v] = count[v]+count[u]. Finally, if d[v] < d[u], we need not update any information. The correctness of our algorithm follows from exactly the same argument that is used to prove correctness of Dijkstra s. The running time is O(E log V ). 6.3 SIMULATION AND RESULTS FOR LOAD BALANCING USING MODIFIED MP-OLSR For evaluating the performance of the Modified MPOLSR, simulations are performed using Network Simulator (NS2). The simulation scenarios are modeled with network parameters which represent the real time implementation. During all the simulations the network parameters are kept constant but only the size of the network (i.e) the number of nodes are alone changed to better evaluate the performance of the proposed algorithm. The throughput, packet loss, packet delivery ratio and routing load are taken as performance metrics. During each simulation the trace file is generated, and using perl scripts, the values are calculated. The throughput is calculated by finding the ratio between the amount of data travelled during the simulation period and the duration of the simulation and is expressed in kilo bytes per second (kbps). The packet loss which reflects the real performance of the routing algorithm is calculated by finding the difference between the 168
10 number packets originating from the source node and the number of data packets reaching the destination. The packet delivery ratio is the ratio between the number of packets sent to the number of packets received. The routing load is the ratio between the number of routing packets sent to the total number of the sent packets. The routing load depicts the impact of the additional load put over the network by the routing packets. The following parameters were used to build the simulation environment: the MAC layer is modeled using IEEE standard and the physical layer is implemented with the wireless physical channel. The Droptail queue method with Priority management is utilized to manage the waiting and incoming data packets at the intermediate nodes. The size of the data packets transmitted during the simulation is chosen to be 512 bytes. If larger the size of the data packets, then the amount of energy spent to transmit the data packets will be higher; so a moderate size of the data packet is chosen. The size of the simulation area is chosen to be 500 X 500, which is enough to hold maximum number of nodes during the simulation. During all the simulations the constant bit rate type of traffic is used and random way point movement is used for the node movement. We use the Random waypoint model to generate movements of mobile hosts. At the beginning of a simulation, mobile hosts are randomly placed on 500m x 500m a square field. Each host randomly chooses 169
11 its destination in the field, and a moving speed of 10 m/s. All destinations and speeds are independent and identically distributed. Every host repeats the above step after it has reached the destination and waited a specified time (the pause time). According to this model, the speed and direction of the next movement have no relation to those of the previous movement. The pause time and the maximum speed have similar impacts on the mobility with respect to link change or route change. Parameter Value Simulation Time 200 No. of Nodes Varied Between 10 to 50 Traffic Type Pause Time Constant Bit Rate 10 Sec Topology Area 500 X 500 Packet Size 512 bytes MAC Protocol IEEE Mobility Model Wireless Channel Antenna Type Queue Type Random Way Point Physical Wireless Omni Directional Drop Tail Table 6.1 Simulation Parameters The simulations were performed with 10, 20, 30, 40 and 50 nodes using OLSR, Modified MPOLSR and AODV. The results indicate that the Modified MPOLSR outperforms the OSLR and AODV by all the 170
12 metrics. The packet loss is greatly reduced in the Modified MPOLSR when compared to AODV and OLSR in all the simulation scenarios and also PDR of Modified MPOLSR is higher when compared to AODV and OSLR. The throughput is increased which represents that the modified Dijkstra s algorithm is performing better with varying network size. The multipath nature of the proposed routing algorithm guarantees the delivery of the data packets originating from the source node; therefore the Packet loss is reduced even when the network size is increasing. The running time of the Modified MPOLSR is lesser when compared to its counterparts. The running time of the Modified MPOLSR is O(E log V ) normally the MPOLSR consumes O(E 2 log V). The usage of multiple-path routing protocol instead of single path is increased nowadays. Many protocols were developed as a single path routing protocol at the very beginning. It means that from the source to the destination, only one path is on duty. But to increase the reliability of the data transmission, other kind of protocols was proposed: multipath routing protocol. In this proposed work, it has been tried to use more than one path to send data. So the main objective of these protocols is how to find the reliable paths and ensure load balancing. The multiple paths is disjoint (all the links are combination of the above 2 kinds). These paths can be used as backup route or at the same time for parallel data transmission. To decrease delay and to maximize network life time are also the goals included in the proposed multipath protocols. 171
13 The proposed modified multipath OLSR is also compared with AODV routing protocol which exhibits lesser performance when compared to the proposed protocol. The modified multipath OLSR has different strengths and weaknesses when it comes to node mobility in MANETs. Unlike wired networks, the topology in wireless ad hoc networks may be highly dynamic, causing frequent path breaks to ongoing sessions. When a path break occurs, new routes need to be found. As modified multipath OLSR always have up-to-date topology information at hand, new routes can be calculated immediately when a path break is reported. Because AODV is a reactive protocol, the immediate new route calculation is not possible, so a route discovery must be initiated. In situations where the network traffic is sporadic, modified multipath OLSR offers less routing overhead due to having found the routes proactively. AODV, on the other hand, will have to first discover a route before the actual information can be transmitted. This calls for extensive control overhead per packet. In cases where the network traffic is more or less static (i.e., the traffic has a long duration), however, AODV may perform better, as the amount of control overhead per packet decreases. When a node in a network running the modified multipath OLSR protocol wished to find the route to a host, all it has to do is do a routing table lookup, whereas in a AODV network, a route discovery 172
14 process needs to be initialized unless no valid route is cached. It goes without saying that a simple table-lookup takes less time than flooding the network, making the modified multipath OLSR protocol performance best in delay-sensitive networks. Fig. 6.3a Node Vs Throughput Fig. 6.3b Node Vs Throughput 173
15 The Figs. 6.3a and 6.3b, show the network throughput in all three protocols for 10,20,30,40 and 50 number of nodes. Comparing all three protocols, AODV performed least in case of throughput too. Throughput of OLSR is little higher than that of AODV and it is less than that of the proposed protocol. This is due to the large network overhead generated by AODV. Other reason for lower throughput by AODV is that it deletes its routes when they are not in use. AODV performed decently in terms of throughput when the number of nodes is less. AODV discovers multiple routes from source to destination; so there are always the chances of finding an optimal route. AODV tends to reduce the control traffic overhead at the cost of increased latency in finding new routes. The Hello messages, which are responsible for the route maintenance, also create unnecessary overhead in the network. Modified multipath OLSR performed better than AODV and OLSR in case of throughput too. This is due to the proactive nature of the protocol. It reduces the control overhead forcing the MPR to propagate the updates of the link state. The drawback of the OLSR protocol is that it must maintain the routing table for all the possible routes; so there is no difference in small networks, but when the number of the mobile hosts increase, then the overhead from the control messages also increases. This constrains the scalability of the OLSR protocol to some extent. The OLSR protocol works most efficiently in the dense networks. 174
16 Packet loss problem is much more complicated in mobile ad hoc networks, because wireless links are subject to transmission errors and the network topology changes dynamically. A packet may lose due to transmission errors, no route to the destination, broken links, congestions, etc. The effects of these causes are tightly associated with the network context (e.g., host mobility, number of connections. traffic load, etc.). In mobile ad hoc networks, wireless link transmission errors, mobility, and congestion are the major causes for packet loss. Packet loss due to transmission errors is affected by the physical condition of the channel, the terrain where networks are deployed, etc. They cannot be eliminated or reduced by improving the routing protocols. Congestion in a network occurs whenever the demands exceed the maximum capacity of a communication link, especially when multiple hosts try to access a shared media simultaneously. Mobility may cause packet loss in different ways. A packet may be dropped at the source if a route to the destination is not available, or the buffer that stores pending packets is full. It may also be dropped at an intermediate host if the link to the next hop has broken. Packet loss is measured at all mobile hosts. Every host monitors the networking layer and the MAC layer for all kinds of packet losses. The layers of the protocol stack and the modules that are responsible for mobility related and congestion-related packet loss are identified. Mobility-related packet loss may occur at both the network layer and 175
17 the MAC layer. When a packet arrives at the network layer, the routing protocol forwards the packet if a valid route to the destination is known. Otherwise, the packet is buffered until a route is available. A packet is dropped in two cases: The buffer is full when the packet needs to be buffered. The time that the packet has been buffered exceeds the limit. The MAC layer mobility-related packet loss occurs when the next hop of a packet is out of range at the moment the packet is sent by the MAC protocol. The reason is that the routing information is obsolete. It occurs frequently in a higher mobility network than in a low mobility network. Congestion-related packet loss only occurs at the MAC layer. Because CSMAICA is used in the simulation, a packet may be dropped due to congestion for two reasons: The wireless channel is so busy that the times of back off exceed the limit. The channel is associated with a queue that buffers all the packets waiting to be sent. When the queue is full, any coming packet is dropped. 176
18 Fig. 6.4a Node Vs Packet Loss Fig. 6.4b Node Vs Packet Loss In Figs. 6.4a and 6.4b, the total packet loss for AODV is higher than that of Modified multipath OLSR, regardless of pause time or number of nodes. For moderate and heavy communication requests, total packet loss for modified protocol is more stable than that of AODV with the increase of number of nodes. 177
19 The multipath modified OLSR performs particularly well, delivering over 95% of the data packets regardless of number of nodes. But AODV fails when the node density increases. Modified Multipath OLSR shows consistent performance. Fig. 6.5a Node Vs Packet Delivery Ratio Fig. 6.5b Node Vs Packet Delivery Ratio 178
20 The Figs. 6.5a and 6.5b highlight the relative performance of the three routing protocols. Both OLSR and modified OLSR protocols deliver a greater percentage of the originated data packets when there is little node, converging to 100% delivery when there are more number of nodes. OLSR has a slightly better delivery ratio than MP- OLSR only when the number of nodes is 10. This is because with more paths transmitting packets at the same time, there is a higher possibility of collision at the MAC layer. This inter-path interference can be eliminated by using multichannel techniques, which guarantee a different frequency band for each path. In our case, there is only one channel used, so MP-OLSR has more packets dropped due to the collision at the MAC layer. However, as the number of nodes increases, the links become more unstable, and there are also more loops in the network. The packet delivery ratio of OLSR then decreases quickly and MP-OLSR outperforms OLSR. Fig. 6.6a Node Vs Routing Load 179
21 Fig. 6.6b Node Vs Routing Load The Figs. 6.6a and 6.6b highlight the relative performance of the three routing protocols. High routing load usually has a significant performance impact in low bandwidth wireless links. The AODV routing protocol does not cache the routes it learns during RREQ broadcast and faces the problem of high routing load. In this thesis, we have compared AODV routing with OLSR and modified multipath OLSR, multiple routes which it learns in the process of route request broadcast. The multiple routes reduce the routing and MAC load of AODV and also the delay in packet delivery without changing the basic structure of the protocol. 180
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationCHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationOptimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationA Routing Metric for Load-Balancing in Wireless Mesh Networks
A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca
More informationEXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
More informationAchieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
More informationSIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
More informationLoad-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
More informationStudy of Network Characteristics Incorporating Different Routing Protocols
Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab
More informationLIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
More informationPERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
More informationNetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationAn Extended AODV Protocol to Support Mobility in Hybrid Networks
An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}
More informationPERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
More informationAn Efficient AODV-Based Algorithm for Small Area MANETS
An Efficient AODV-Based Algorithm for Small Area MANETS Jai Prakash Kumawat 1, Prakriti Trivedi 2 PG Student, Department of Computer Engineering & IT, Government Engineering College, Ajmer, India 1 Assistant
More informationSecurity Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey 21020013@baskent.edu.tr, asafak@baskent.edu.tr
More informationPerformance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
More informationVoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet
More informationother. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
More informationAn Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
More informationOptimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
More informationHyacinth An IEEE 802.11-based Multi-channel Wireless Mesh Network
Hyacinth An IEEE 802.11-based Multi-channel Wireless Mesh Network 1 Gliederung Einführung Vergleich und Problemstellung Algorithmen Evaluation 2 Aspects Backbone Last mile access stationary commodity equipment
More informationFormal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
More informationII RELATED PROTOCOLS. Dynamic Source Routing (DSR)
ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra
More informationSimulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2
Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna
More informationAchieving Load Balancing in Wireless Mesh Networks Through Multiple Gateways
Abstract Achieving Load Balancing in Wireless Mesh Networks Through Multiple Gateways Deepti Nandiraju, Lakshmi Santhanam, Nagesh Nandiraju, and Dharma P. Agrawal Center for Distributed and Mobile Computing,
More informationCross Layer TCP Congestion Control Load Balancing Technique in MANET
Cross Layer TCP Congestion Control Load Balancing Technique in MANET Nidhi Shukla 1, Neelesh Gupta 2, Naushad Parveen 3 1 M.Tech Scholar (ECE), 2 Prof & Head (ECE), 3 Asst. Prof. ( ECE), Department of
More informationSurvey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
More informationRouting in Multi-Channel Multi-Interface Ad Hoc Wireless Networks
Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Technical Report, December 4 Pradeep Kyasanur Dept. of Computer Science, and Coordinated Science Laboratory, University of Illinois at
More informationSBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
More informationA Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks
A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332
More informationDynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract
More informationA Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks
A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks Natarajan Meghanathan 1 and Leslie C. Milton 2 1 Jackson State University, 1400 John Lynch
More informationComparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS georizos@teiep.gr D. C. VASILIADIS dvas@teiep.gr E. STERGIOU ster@teiep.gr Abstract: In this paper,
More informationA Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund
More informationA Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks
A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks Ioannis Broustis Gentian Jakllari Thomas Repantis Mart Molle Department of Computer Science & Engineering University
More informationSecurity and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,
More informationFigure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More informationPERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
More informationIRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
More informationStep by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
More informationTCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
More informationAssignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
More informationIntroduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
More informationA Novel Approach for Load Balancing In Heterogeneous Cellular Network
A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1
More informationA Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks
A Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu
More informationFast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
More informationKeywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
More informationEnergy Efficiency of Load Balancing in MANET Routing Protocols
Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing protocols and workload balancing techniques
More informationA NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
More informationIntelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based
More informationDynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network
Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and
More informationA Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV
More informationINTELLIGENT LOAD BALANCING IN MOBILE AD HOC NETWORKS. A Thesis by. Varun Khanna. Bachelor of Technology, Kurukshetra University, India, 2004
INTELLIGENT LOAD BALANCING IN MOBILE AD HOC NETWORKS A Thesis by Varun Khanna Bachelor of Technology, Kurukshetra University, India, 2004 Submitted to the Department of Electrical Engineering and Computer
More informationInvestigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks
Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks T. Jagadeepak 1, Dr. B. Prabhakara Rao 2, B. A. S. Roopa Devi 3 PG Student, Dept. of ECE, UCEK, JNTU,
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationDeployment of VoIP in the IEEE 802.11s Wireless Mesh Networks
Deployment of VoIP in the IEEE 802.11s Wireless Mesh Networks Master Research Report June 6, 2008 Submitted By: Abbasi Ubaid Supervised By:Adlen Ksentini Team: DIONYSOS (IRISA) Abstract Wireless mesh networks
More informationLoad Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted
More informationSECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
More informationComprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 54-61 Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols
More informationROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
More informationResearch Article Ant Colony and Load Balancing Optimizations for AODV Routing Protocol
Ashdin Publishing International Journal of Sensor Networks and Data Communications Vol. 1 (2012), Article ID X110203, 14 pages doi:10.4303/ijsndc/x110203 Research Article Ant Colony and Load Balancing
More informationIJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
More informationPERFORMANCE BASED SECURE OPTIMIZED ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORK
Volume 3, No. 4, April 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info PERFORMANCE BASED SECURE OPTIMIZED ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORK
More informationMultipath Routing in Mobile Ad Hoc Networks: Issues and Challenges
Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges Stephen Mueller 1,RoseP.Tsang 2, and ipak Ghosal 1 1 epartment of Computer Science, University of California, avis, CA 95616 2 Sandia
More informationA Novel Technique to Isolate and Detect Jamming Attack in MANET
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 A Novel Technique to Isolate and Detect Jamming Attack in MANET Harkiranpreet Kaur
More informationCross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks
Sensors 2015, 15, 17621-17648; doi:10.3390/s150717621 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks M.
More informationDelay aware Reactive Routing Protocols for QoS in MANETs: a Review
Delay aware Reactive Routing Protocols for QoS in MANETs: a Review Saad M. Adam*, Rosilah Hassan Network and Communication Technology Research Group, Faculty of Information Science and Technology, Universiti
More informationEnergy Consumption analysis under Random Mobility Model
DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network
More informationSimulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
More informationGateway Load Balancing in Integrated Internet- MANET to Improve Network Performance
Gateway Load Balancing in Integrated Internet- MANET to Improve Network Performance Ajay Kumar 1, Udai Shankar 2, Mahesh Kumar Tiwari 3 1 2 3 Department of Computer science & Engineering and Information
More informationA Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications
A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications Ahmed Abada Dept. of Systems and Computer Engineering Carleton University Ottawa, ON, Canada Li Cui Institute of Computing
More informationPERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1
More informationA survey on Wireless Mesh Networks
A survey on Wireless Mesh Networks IF Akyildiz, X Wang - Communications Magazine, IEEE, 2005 Youngbin Im ybim@mmlab.snu.ac.kr 2007.10.15. Contents Introduction to WMNs Network architecture Critical design
More informationPerformance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs
International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationStudy And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
More informationImplementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
More informationADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS
ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS M. Tamilarasi 1, T.G. Palanivelu 2, 1, 2 Department of ECE, Pondicherry Engineering College, Puducherry-605014. Email:
More informationThe Monitoring of Ad Hoc Networks Based on Routing
The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,
More informationPosition and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,
More informationEfficient Load Balancing Routing in Wireless Mesh Networks
ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept
More informationISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
More informationCustomer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
More informationRoute Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
More informationKeywords: DSDV and AODV Protocol
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparison
More informationAd hoc On Demand Distance Vector (AODV) Routing Protocol
Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter
More informationSuganya D. Computer Science and Engineering, Anna University SMK FOMRA Institute of Technology, Chennai, India Suganya2086@yahoo.
gopalax -International Journal of Technology And Engineering System(IJTES): Jan March 2011- Vol.2.No.2. ) Most Efficient Multicast structure for Wireless Mesh Networks Suganya D Computer Science and Engineering,
More informationLoad Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface
Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface Jungmin So Nitin H. Vaidya Coordinated Science Laboratory, University of Illinois at Urbana-Champaign Email:
More informationCHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.
More information