Comparison of WCA with AODV and WCA with ACO using clustering algorithm
|
|
|
- Maude Mills
- 10 years ago
- Views:
Transcription
1 Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks (MANETs) poses various challenges like routing, Quality of Service (QoS) etc. This paper attempts to compare performance parameters like throughput, packet delivery fraction and packet loss using Ad hoc On-Demand Distance Vector(AODV) routing protocol and Ant Colony Optimization(ACO). The proposed method combines Weighted Clustering Algorithm(WCA) with AODV and WCA with ACO. The performance characteristics are compared between WCA with AODV and WCA with ACO Index terms: MANETs, QoS, Cluster, WCA, AODV, ACO, Cluster Head. I. INTRODUCTION From communicating in battle fields to free internet sharing, MANETs are increasingly finding their application in a wide spectrum of information interchanges. MANETs are a network of self configuring mobile devices that communicate with each other with the help of wireless (IEEE ). MANETs are rapidly deployable infrastructure less networks. They have extremely dynamic topologies that make routing in MANETs a challenge. Several algorithms are available for routing data in MANETs such as Temporally- Ordered Routing Alogotithm(TORA), AODV, Dynamic Source Routing(DSR), Open Shortest Path First(OSPF) etc. Another area of concern is achieving optimal QoS in MANETs. Several techniques have been proposed to improve QoS, chief among them are clustering, resource reservation, traffic classification, buffer management and admission control. Simplicity of deployment and a significant improvement in QoS make clustering the most popular technique to enhance QoS of the network. A plethora of clustering algorithms is available to choose form like, highest degree-based, lowest id, K- CONID, WCA etc ACO is one of the best algorithms for path finding. They derive their inspiration from the real world behavior of ants and the method they use for finding food. When an ant moves along a path, it deposits a chemical called pheromone on it. As more and more ants move along the same path, the pheromone concentration of the path increases. The path with the maximum pheromone concentration is then chosen to be the optimal path. The goal of this paper is to study how ACO optimizes the performance of a MANET clustered using the WCA and compares it with a MANET that makes use of AODV for routing. II. BACKGROUND Clustering is the process of building hierarchies among nodes in the network. Clustering is one of the techniques that provide a solution to challenges like routing and QoS in MANETs [1]. This technique makes network more manageable by grouping the nodes into clusters. The size of each cluster varies from two nodes to n nodes; where n is controlled by the radio transmission power. Each cluster comprises of a Cluster Head (CH), Cluster Gateway (CG), and Cluster Members (CM). Clustering consists two phases: Cluster head election and cluster member registration. WCA algorithm considers several parameters like mobility, transmission power and degree difference in order to perform clustering and elect the cluster head. A pre-defined threshold which indicates the number of nodes each cluster head can ideally support is used to prevent the cluster heads from becoming over-loaded. WCA selects the cluster heads according to the weight of each node. The node with the minimum weight is elected as the cluster head. A cluster head has extra responsibilities and hence expends more battery power than an ordinary node in the network. The cluster head election algorithm concludes once all the nodes become either a cluster head or a member of a cluster head. This algorithm is both mobility and scalability aware [2]. Cauvery N.K et.al proposes an algorithm that uses swarm intelligence to generate all possible paths between a source and a destination node in a MANET. In this algorithm, routing of data packets are done only via the optimal path generated by route discovery phase of the Ant colony based Routing Algorithm (ARA). Route maintenance is periodically done to retain the optimal path using data packets. Due to the dynamic topology of ad hoc networks, existing routes may fail or new paths may be generated. Thus, in order to adapt to the changes in topology, route refreshing is done periodically [3]. Volume 3 Issue 7 July 2015 Page 26
2 An optimized clustering strategy that deploys ACO meta-heuristic technique proves to be an efficient in terms of number of re-affiliations, throughput, delay and load balancing [4]. III. ALGORITHM A. WCA Weighted Clustering Algorithm considers four parameters to perform the clustering and choose the cluster head. It assigns arbitrary weights w1, w2, w3, w4 to each of the four parameters such that: The equation to calculate the weight of each node (Wv) is:. is the degree difference. The degree of each node is determined and is represented as. Then, the degree difference is calculated as, where δ is the threshold value. The threshold value is the no. of nodes that a cluster head can ideally handle. is the sum total of distances from a given node to all its neighbors. is the mobility measure which is calculated as the running average speed of every node during a specified time T. is the time period during which a node remains as cluster head and is an estimate of the amount of battery power consumed. AODV is one of the widely used algorithms for routing in MANETs. In this paper, we compare two scenarios. Both scenarios use WCA clustering algorithm to group nodes and nominate the cluster head. In both cases, the source node communicates with the cluster head by unicast. If a cluster head has the destination as its member, then, it broadcasts the message to all its cluster members. This is done in order to conserve resources that would otherwise be expended in path finding. B. ACO ACO is a table-driven routing protocol which uses swarm intelligence for route discovery. The basic principle of the ant routing algorithm is that the ants deposit hormone called the pheromone, when they roam looking for food. Ants navigate by smelling the pheromone and follow the path characterized by strong pheromone concentrations. The same pheromone trails can be used by other ants to find the location of the food sources discovered by their nest mates [5] The two main phases of ACO algorithm are: Route Discovery, Route Maintenance. 1) Route Discovery: The source node initially checks its routing table for a path to the destination node. The routing table consists of destination address, next hop and pheromone value. If it finds a path i.e. address to the destination, it sends its data packets through the established path. Otherwise, it initiates the flooding of Forward Ants (FANTs) to its neighbors. The FANTs deposit pheromone on the path links. The neighbors update their routing tables and relay the FANTs to their neighbors. The node interprets the source address of the FANT as destination address and the address of the previous node as the next hop, and computes the pheromone value depending on the number of hops taken for the FANT to reach the node. When different FANTs reach the destination through different routes, the destination sends a Backward Ants (BANTs) for each of them by incrementing the pheromone value. When the sender receives the BANT from the destination node, the path is established and data packets can be sent. Figure 1: Route Discovery Phase of ACO Volume 3 Issue 7 July 2015 Page 27
3 In the Figure 1 a) A forward ant (F) is sent from the sender ( ) to the destination node ( ). The forward ant passes by other nodes which initialize their routing table and pheromone values. In Figure 1 b) the backward ant (B) has the same task as the forward ant. It is sent by the destination node ( ) to the source node ( ). 2)Route Maintenance: ACO does not need special packets for route maintenance. Route maintenance is done by the regular data packets with the help of pheromone tracks established between the source and destination nodes. When a node vi relays a data packet to destination vd to a neighbor node vj, it increases the pheromone value of the entry (vd, vj, φ) by φ, i.e. this path to the destination is strengthened by the data packet. Likewise, the next hop vj increases the pheromone value of the entry (vs, vi, φ) by φ, i.e. the backward path to the source node is also strengthened. The evaporation process of the real pheromone is modeled by decreasing the pheromone values [6]. Pseudo Code of the ACO algorithm Initialize Trail Do While(Stopping Criteria Not Satisfied) Cycle Loop Do Until(Each Ant Completes a Tour) Tour Loop Local Trail Update End Do Analyze Tours Global Trail Update End Do ACO has following characteristics ACO provides network adaptive feature and generates multiple path for routing. ACO is capable of adapting for change in network topology and traffic while giving equivalent performance. It relays on both passive and active information for gathering and monitoring. They collect non local information about the characteristics of solution set, like all possible paths. It makes use of stochastic components. It uses stochastic component like pheromone table for user agents. User agents are autonomous and communicate each other through stigmergy. It sets path favoring load balancing rather than pure shortest path. The algorithm also supports for multiple paths, so that load balancing can be achieved. Multipath routing - Possible to generate multiple paths between pairs of nodes. Fast route recovery - If optimal path fails, then packets can easily be sent to other neighbors by re-computing next hop probability, i.e., choosing second best path. Distributed and fault tolerance ACO algorithm are inherently distributed. There is no centralized control mechanism, so if any node or link fails, there is no heavy loss. Scalability and adaptation Population of ants may change based on the size of network. The agents may die or reproduce, with little effect on performance. Speed Change in the network can be adapted very fast. IV. SIMULATION STUDY In this section, two scenarios of experiments have been conducted over simulation using NS2 as a simulation tool. In scenario 1, WCA is used as cluster based leader election algorithm and the source cluster head uses AODV as the routing protocol to multicast the message to all other cluster heads. A diagrammatic representation of the scenario is shown in Figure 2. Volume 3 Issue 7 July 2015 Page 28
4 Figure 2: Representation of the mode of communication Cluster gets created and cluster head is elected by using WCA as a cluster based leader election algorithm. S is the source and D is the destination. S communicates to cluster head through unicast. Cluster head uses AODV protocol to communicate with the other cluster heads or the gateway. Cluster head of the destination node broadcasts within its cluster. In scenario 2, WCA is used as a cluster based leader election algorithm. For further enhancement of QOS, i.e., to discover the optimum path and to hasten the route discovery process, ACO protocol is used for communication between cluster heads. Cluster is created and cluster head election is performed using WCA. When source wants to communicate with the destination, it sends information by unicast to its cluster head. The cluster head of the Source node then tries to find the cluster head where the destination node is present using ACO. Table 1 is the table with simulation parameters applicable for both the scenarios. Sl. No. TABLE I Simulation experiment details Parameters Value 1. Simulator NS2(Version 2.34) 2. Channel Type Channel/Wireless 3. Radio Propagation Model Propagation/Two Ground Wave 4. Network Interface Type Phy/Wireless Phy Ray 5. MAC Type Mac/ Interface Queue type Queue 7. Link Layer Type LL 8. Antenna Antenna/Omni Antenna 9. Maximum Packet Size(in Bytes) Topology Area(M*M) 800x Simulation Time in seconds No. of Nodes Routing Protocols AODV, ACO Simulation results to calculate throughput for Scenario 1 and Scenario 2 depicted in Figure 3 Volume 3 Issue 7 July 2015 Page 29
5 Figure 1: Throughput comparison of cluster head communications with AODV and ACO Simulation results to calculate Packet loss for Scenario 1 and Scenario 2 depicted in Figure 4 Figure 4: Comparison of Packet Loss for cluster head communication with AODV and ACO Simulation results to calculate Packet Delivery Fraction (PDF) for Scenario 1 and Scenario 2 depicted in Figure 5 Figure 5: Comparison of PDF for cluster head communications with AODV and ACO V. CONCLUSION This work modifies AODV to improve its performance using ACO. The ACO protocol incorporates path accumulation during the route discovery process in AODV to attain extra routing information. It is evident from the results that ACO improves the performance of AODV under conditions of high load and moderate to high mobility. REFERENCES [1] Sowmya K S, Dr. N K Cauvery, Clustering Technique for load balancing in MANETs, International Journal of Mobile & Adhoc Network, Vol 2, Issue2, May [2] Ratish Agarwal, Dr.Mahesh Motwani, Survey of clustering algorithms for MANET, International Journal on Computer Science and Engineering, Vol.1(2), 2009, [3] Cauvery N. K., and K. V. Viswanatha, Enhanced Ant Colony Based Algorithm for Routing in Mobile Ad Hoc Network, World Academy of Science, Engineering and Technology 2008 [4] Kumar. V and Balasubramanie. P, "Ant Colony Optimization Using Hierarchical Clustering in MANETs ", European Journal of Scientific Research, ISSN X,Vol.61 No.4(2011) [5] Sowmya K.S, Rakesh T., Deepthi P Hudedagaddi, Detection and Prevention of Blackhole Attack in MANET Using ACO, IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.5, May 2012 [6] Mesut G unes, Martin K ahmer and Imed Bouazizi, "Ant-Routing-Algorithm (ARA) for mobile multi-hop ad hoc networks new features and results, Proceedings of the Med-Hoc Net Workshop, June 2003 Volume 3 Issue 7 July 2015 Page 30
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs
International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks
www.ijcsi.org 118 -Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks Vijayalakshmi P 1, Dr.V.Saravanan 2, Dr. P. Ranjit Jeba Thangiah 3, Abraham Dinakaran.J 4 1 Karunya
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks
: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks Gianni Di Caro, Frederick Ducatelle and Luca Maria Gambardella Istituto Dalle Molle sull Intelligenza Artificiale (IDSIA) Galleria 2,
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
Achieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
Research Article Ant Colony and Load Balancing Optimizations for AODV Routing Protocol
Ashdin Publishing International Journal of Sensor Networks and Data Communications Vol. 1 (2012), Article ID X110203, 14 pages doi:10.4303/ijsndc/x110203 Research Article Ant Colony and Load Balancing
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
II RELATED PROTOCOLS. Dynamic Source Routing (DSR)
ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra
Comparative Study of Delay-Oriented and Hybrid Load Balancing Routing Protocols in Mobile Ad Hoc Networks
2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Comparative Study of Delay-Oriented and Hybrid Load Balancing Routing Protocols in Mobile Ad
Load Balancing of Ant Based Algorithm in MANET
ISSN : 2229-4333(Print) ISSN : 0976-8491(Online) IJCST Vo l. 1, Is s u e 2, De ce m b e r 2010 Load Balancing of Ant Based Algorithm in MANET 1 Rajbhupinder Kaur, 2 Ranjit Singh Dhillon, 3 Harwinder Singh
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet
A Survey: High Speed TCP Variants in Wireless Networks
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
A Position Based Ant Colony Routing Algorithm for Mobile Ad-hoc Networks
JOURNAL OF NETWORKS, VOL. 3, NO. 4, APRIL 200 3 A Position Based Ant Colony Routing Algorithm for Mobile Ad-hoc Networks Shahab Kamali, Jaroslav Opatrny Department of Computer Science and Software Engineering,
Study of Network Characteristics Incorporating Different Routing Protocols
Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS [email protected] D. C. VASILIADIS [email protected] E. STERGIOU [email protected] Abstract: In this paper,
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant
An Efficient AODV-Based Algorithm for Small Area MANETS
An Efficient AODV-Based Algorithm for Small Area MANETS Jai Prakash Kumawat 1, Prakriti Trivedi 2 PG Student, Department of Computer Engineering & IT, Government Engineering College, Ajmer, India 1 Assistant
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,
Optimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
www.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
A Survey on Load Balancing Techniques Using ACO Algorithm
A Survey on Load Balancing Techniques Using ACO Algorithm Preeti Kushwah Department of Computer Science & Engineering, Acropolis Institute of Technology and Research Indore bypass road Mangliya square
Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks
Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering
A Link-state QoS Routing Protocol for Ad Hoc Networks
A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,
Proposition of a new approach to adapt SIP protocol to Ad hoc Networks
, pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,
An Extended AODV Protocol to Support Mobility in Hybrid Networks
An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}
POWER AWARE QOS MULTIPATH ROUTING PROTOCOL FOR DISASTER RECOVERY NETWORKS
POWER AWARE QOS MULTIPATH ROUTING PROTOCOL FOR DISASTER RECOVERY NETWORKS ABSTRACT S.Santhi 1, Dr.G.Sudha Sadasivam 2 1 Department of Information Technology,Dr.NGP Institute of Technology,Coimbatore,India
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 54-61 Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols
A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks
A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks Ioannis Broustis Gentian Jakllari Thomas Repantis Mart Molle Department of Computer Science & Engineering University
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
Keywords: DSDV and AODV Protocol
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparison
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891
UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks
UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks a Mobile Ad hoc NETwork (MANET) is one that comes together as needed, not necessarily with any support from the existing infrastructure or any
Routing with Load Balancing in Wireless Ad hoc Networks
Routing with Load Balancing in Wireless Ad hoc Networks Hossam Hassanein and Audrey Zhou Department of Computing and Information Science Queen's University Kingston, Ontario, Canada, K7L 3N6 {hossam, zhou}@cs.queensu.ca
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, [email protected]
ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Internet Connectivity for Ad hoc Mobile Networks
Internet Connectivity for Ad hoc Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu Charles E. Perkins
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
Optimization of ACO for Congested Networks by Adopting Mechanisms of Flock CC
Optimization of ACO for Congested Networks by Adopting Mechanisms of Flock CC M. S. Sneha 1,J.P.Ashwini, 2, H. A. Sanjay 3 and K. Chandra Sekaran 4 1 Department of ISE, Student, NMIT, Bengaluru, 5560 024,
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
