SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Backbone Nodes Based Stable Routing for Mobile Ad Hoc Networks
                                    Vinay Rishiwal 1, A. Kush 2, S. Verma 3

      M.J.P. Rohilkhand University, Bareilly1, Kurushetra University, Kurushetra2, IIITM, Gwalior3, India.
                   vianyrishiwal@gmail.com1, akush20@gmail.com2, sv.iiitm@gmail.com3

                                                      ABSTRACT

                 The recent trend in ad hoc network routing is the reactive on-demand philosophy
                 where routes are established only when required. Most of the protocols in this
                 category, however, use single route and do not utilize multiple alternate paths. This
                 paper proposes a scheme to improve existing on-demand routing protocols by
                 introducing the concept of stable backbone based node scheme in network
                 topologies scenario. The scheme establishes the multi paths without transmitting
                 any extra control message. It offers quick adaptation to distributed processing,
                 dynamic linking, less memory overhead and loop freedom at all times. The
                 Scheme has been incorporated with the AODV and DSR protocols. The extensive
                 simulation has been done for the performance evaluation; it clearly shows that the
                 scheme performs very well with increasing packet delivery for different network
                 scenarios.

                 Keywords: Ad hoc networks, Routing protocols, Backbone nodes, AODV, DSR.


1. INTRODUCTION                                                  proposed scheme is discussed. Section 4 provides
A mobile ad hoc network (MANET)[1] is a collection               simulation details and results. Section 5 concludes the
of autonomous nodes, which communicate using                     paper.
wireless links without any fixed network infrastructure
and centralized administrative support. The main                 2. PREVIOUS STUDY
application of mobile ad hoc network is in emergency             The primary goal of routing protocol is to establish a
rescue operations and battle fields.                             correct and efficient route between a pair of nodes so
                                                                 that messages may be delivered in a timely manner.
This paper addresses the problem of routing in mobile            Routing protocols in Mobile ad hoc networks can be
ad hoc network. Since mobile nodes in mobile ad hoc              classified in to two broad categories as
network can move randomly the topology may change                1 Proactive or Table driven
arbitrarily and frequently at unpredictable times.               2. Reactive or On demand
Transmission and reception parameters may also
impact the topology. So it is very difficult to find and         The proactive or table driven protocols attempt to find
maintain an optimal route. The routing algorithm must            a route continuously and maintain routing information
react quickly to topological changes. Due to dynamic             from each node to every other node within the network,
nature of MANETs, the problem of broken path                     so that whenever data is needed to be transmitted
becomes prominent. Most of the existing protocols                between two nodes, the route is already there. The
maintain single routing path and rediscover the new              nodes are required to maintain consistent up-to-date
path whenever a link fails. A scheme has been                    routing information in one or more tables. DSDV[2],
proposed here which takes the advantage of stable                WRP[3], CGSR[4] etc are the protocols of this
backbone nodes to provide the alternate path in case of          category.
a link failure. This scheme can be incorporated in any
existing on demand routing protocol to improve the               In Reactive approach routes are created only when
performance. The efforts in this paper has been made             desired by the source node. When a node requires a
to incorporate the scheme on AODV and DSR.                       route to other node, it initiates a route discovery
                                                                 process with in the network. All permutations are
Rest of the paper is organized as follows. The Section 2         examined and best possible route is established. The
deals with study on existing protocols. In section 3 the         route is maintained by some route maintenance



                                                                                                                     1
procedure until either the destination becomes             the backbone nodes can be 6, 8 and 9. These nodes are
inaccessible or until the route is no longer desired.      nearer to the routing path nodes and can join the
AODV[5], DSR[6], LMR[7], TORA[8], and ABR[9]               process any time.
etc are reactive protocols.
                                                                            9
There is another category of routing protocols known                 1                          3
as hybrid routing which is a compromised approach               S
between proactive and reactive approaches. Zone                                        2
Routing Protocol (ZRP) [10] is one of the most
important protocols under this category. This protocol
                                                                                                              4
limits the scope of table driven procedure to a small                                                         D
area called zone. Outside the zone area reactive                                      6
approach is followed. Surveys of routing protocols for
                                                            5
                                                                                                          8
ad hoc networks have been discussed in [1,11]
                                                                           7
3. PROPOSED STUDY:
The      proposed scheme takes care of on demand           Figure 1: Stable route using Backbone Nodes.
routing along with a new concept of backbone nodes.
These backbone nodes help in reconstruction phase in       AODV: For AODV the protocol description has been
the fast selection of new routes. Selection of backbone    explained as: the protocol is divided into three phases.
nodes is made upon availability of nodes. Each route       Route Request (REQ), Route Repair (REP) and Error
table has an entry for number of backbone nodes            Phase (ERR).
attached to it. Whenever need for a new route arises in
case of route break, check for backbone nodes are          3.1 Route Construction (REQ) Phase
made, and a new route is established. Same process is
                                                           This scheme can be incorporated with reactive routing
repeated in route repair phase. Route tables are updated
                                                           protocols that build routes on demand via a query and
at each hello interval as in AODV with added entries
                                                           reply procedure. The scheme does not require any
for backbone nodes. Backbone nodes are nodes at the
                                                           modification to the AODV's RREQ (route request)
one hop distance from its neighbor. Backbone nodes
                                                           propagation process. In the scheme with Backbone
are those nodes which are not participating in route
                                                           nodes, when a source needs to initiate a data session to
process currently or nodes which enter the range of
                                                           a destination but does not have any route information,
transmission during routing process. As nodes are in
                                                           it searches a route by flooding a ROUTE REQUEST
random motion for a scenario, so there is every
                                                           (REQ) packet. Each REQ packet has a unique identifier
possibility that some nodes are idle and are in the
                                                           so that nodes can detect and drop duplicate packets. An
vicinity of the routing nodes. Whenever a break in the
                                                           Intermediate node with an active route, upon receiving
route phase occurs due to movement of participant
                                                           a no duplicate REQ, records the previous hop and the
node, node damage or for other reasons; theses idle
                                                           source node information in its route table. It then
nodes which have been termed as backbone nodes take
                                                           broadcasts the packet or sends back a ROUTE REPLY
care of the process and start routing. The whole process
                                                           (REP) packet to the source if it has an active route to
becomes fast and more packet delivery is assured. The
                                                           the destination. The destination node sends a REP via
changes in the existing protocol are required at route
                                                           the selected route when it receives the first REQ or
reply and route recovery phases. In these phases the
                                                           subsequent REQs that traversed a better active route.
route table is updated with entries of backbone nodes.
                                                           Nodes monitor the link status of next hops in active
Each route table has an entry for number of backbone
                                                           routes. When a link break in an active route is detected,
nodes surrounding it and their hop distance form the
                                                           an ERR message is used to notify that the loss of link
node. For simplicity of the protocol the distance has
                                                           has occurred to its one hop neighbor. Here ERR
been assumed to be one hop.
                                                           message indicates those destinations which are no
As it has been described in Figure 1, the Route
                                                           longer reachable by way of the broken link. Taking
selection from S (source) to D (destination) is made via
                                                           advantage of the broadcast nature of wireless
1-2-3-4 using shortest path routing. In case any of the
                                                           communications, a node promiscuously overhears
participating nodes damages or move out of the range,
                                                           packets that are transmitted by their neighboring nodes.




                                                                                                                  2
When a node that is not part of the route overhears a        sender (originator) of the currently undeliverable
REP packet not directed to itself transmit by a neighbor     packet. BN attached is number of backbone nodes.
(on the primary route), it records that neighbor as the      This factor is transmitted as weight factor to all nodes
next hop to the destination in its alternate route table.    to select best available path. Addition of backbone
From these packets, a node obtains alternate path            nodes help in selecting stable routes.
information and makes entries of these backbone nodes
(BN) in its route table. If route breaks occurs it just      DSR:
starts route construction phase from that node. The          The key feature of DSR is the use of source routing.
protocol updates list of BNs periodically in the route       That is, the sender knows the complete hop-by-hop
table.                                                       route to the destination. These routes are stored in a
                                                             route cache. The data packets carry the source route in
3.2 Route Error & Maintenance (REP) Phase                    the packet header. When a node in the ad hoc network
                                                             attempts to send a data packet to a destination for
Data packets are delivered through the primary route
                                                             which it does not already know the route, it uses a
unless there is a route disconnection. When a node
                                                             route discovery process to dynamically determine such
detects a link break (for example, receives a link layer
                                                             a route. Route discovery works by flooding the
feedback signal from the MAC protocol, node1 does
                                                             network with route request (RREQ) packets. Each node
not receive passive acknowledgments, node2 does not
                                                             receiving a RREQ, rebroadcasts it, unless it is the
receive hello packets for a certain period of time, etc.),
                                                             destination or it has a route to the destination in its
it performs a one hop data broadcast to its immediate
                                                             route cache. Such a node replies to the RREQ with a
neighbors. The node specifies in the data header that
                                                             route reply (RREP) packet that is routed back to the
the link is disconnected and thus the packet is
                                                             original source. RREQ and RREP packets are also
candidate for alternate routing. Upon receiving this
                                                             source routed. The RREQ builds up the path traversed
packet, previous one hop neighbor starts route
                                                             so far. The RREP routes itself back to the source by
maintenance phase and constructs an alternate route
                                                             traversing this path backwards. The route carried back
through backbone nodes by checking their stability.
                                                             by the RREP packet is cached at the source for future
Nodes those have an entry for the destination in their
                                                             use. If any link on a source route is broken, the source
alternate route table; transmit the packet to their next
                                                             node is notified using a route error (RERR) packet. The
hop node. Data packets therefore can be delivered
                                                             source removes any route using this link from its
through one or more alternate routes and are not
                                                             cache. A new route discovery process must be initiated
dropped when route breaks occur. To prevent packets
                                                             by the source, if this route is still needed. DSR makes
from tracing a loop, these mesh nodes forward the data
                                                             very aggressive use of source routing and route
packet only if the packet is not received from their next
                                                             caching. No special mechanism to detect routing loops
hop to the destination and is not a duplicate. When a
                                                             is needed. Also, any forwarding node caches the source
node of the primary route receives the data packet from
                                                             route in a packet it forwards for possible future use.
alternate routes, it operates normally and forwards the
                                                             Some additional optimizations have been proposed
packet to its next hop when the packet is not a
                                                             here for DSR as (i) Selection: In DSR route request
duplicate. All this route maintenance occurs under
                                                             have been modified by changing cache settings. A
local repair scheme.
                                                             value is set at some minimum level and route reply is
                                                             checked, If route reply does not occur in that time then
3..3 Local Repair                                            backbone nodes are used. Backbone nodes have been
                                                             entered at random level for DSR for better results. An
When a link break in an active route occurs, the node
                                                             intermediate node can use an alternate route from its
upstream of that break may choose to repair the link
                                                             own cache, when a data packet meets a failed link on
locally if the destination was no farther and there exists
                                                             its source route. (ii) route repair: A source node
Backbone Nodes that are active. The Time to live
                                                             receiving a RERR packet piggybacks the RERR in the
(TTL) of the REQ should initially be set to the
                                                             following RREQ. This helps clean up the caches of
following value:
                                                             other nodes in the network that may have the failed
TTL = max (MIN_Repair_TTL+ BN, 0.5* #hops)                   link in one of the cached source routes. (iii) Duplicate
                                                             routes: When a node overhears a packet not addressed
Where MIN_Repair_TTL is the known hop count to               to itself, it checks whether the packet could be routed
the destination. #hops is the number of hops to the




                                                                                                                   3
via itself to gain a shorter route. If so, the node sends a                Pause time of 0 means maximum mobility and 300 is
RREP to the source of the route with this new, better                      minimum mobility. Speed has been kept constant at 15
route. Aside from this, promiscuous listening helps a                      meter per second.
node to learn different routes without directly
participating in the routing process.
                                                                                                                          Packet delivery ratio

4. Simulation and Results                                                           98

Simulation study has been carried out to study the                                  96
performance study of proposed scheme with existing                                  94                                                                     AODV
different protocols. Simulation Environment used is                                 92                                                                     Refined AODV




                                                                           ra tio
NS-2[12] (network simulator).The version NS 2.28 has
                                                                                    90                                                                     DSR
been used to carry out the process. Simulation results
have been compared with AODV and DSR and their                                      88                                                                     Refined DSR
modified versions. The metrics used in the simulation                               86
study to perform evaluations have been discussed                                    84
below.                                                                                                1         2         5         10      15       20
Packet Delivery Ratio: The fraction of successfully
                                                                                                                          speed m/s
received packets, which survive while finding their
destination. This performance measure also determines
the completeness and correctness of the routing
protocol.                                                                  Figure 3 : Packet delivery at different speeds
End-to-End Delay: Average end-to-end delay is the
delay experienced by the successfully delivered                            An approximate increase of 16-20 % have been seen
packets in reaching their destinations. This is a good                     in packet delivery of AODV and DSR modified
metric for comparing protocols. This denotes how                           versions. AODV gets stable even at higher pause time
efficient the underlying routing algorithm is, because                     as shown in figure 2. This trend is more evident with
delay primarily depends on optimality of path chosen.                      use of stable backbone nodes. The scenario has been
                                                                           changed in figure 3 for 50 nodes moving at different
                                                                           speeds. Speed has been varied from 1 meter per second
                             Packet delivery ratio                         to 20 meters per second.

          1
                                                                                                                               End to end delay
        0.95
                                                            AODV
                                                                                                      0.8
                                                            refined AODV
ratio




         0.9
                                                            DSR                                       0.7
                                                            REF DSR                                   0.6                                                   AODV
                                                                                    d e la y (m s )




        0.85
                                                                                                                                                            Refined AODV
                                                                                                      0.5
         0.8                                                                                                                                                DSR
               0   20   50    100 150     200   250   300
                                                                                                      0.4                                                   Refined DSR
                             Pause time                                                               0.3

                                                                                                      0.2
Figure 2 : Packet delivery at pause times                                                                   0   0.5   1       1.5    2    2.5    3   3.5

In simulation study 50 nodes have been taken in a                                                                             speed m/s
random scenario with 1000 Ă— 750 areas. The area
selected is rectangular instead of square as in earlier                    Figure 4: End to end delay at different speeds
simulations. This relates it better to real life scenarios.
The study has been conducted at different pause times.




                                                                                                                                                                          4
The trend clearly indicate more packet delivery for            Special Issue on Routing in Mobile Communication
refined versions of protocols. Refined ADOV has                Networks, pp. 183-197, Oct. 1996.
better delivery at faster speeds. It gets stabilized at fast   [4] C. C. Chiang, H. K. Wu, W. Liu, and M.
speeds. The initial fall can be attributed to time             Gerla,”Routing in Clustered Multihop, Mobile
required for more calculations involved in better              Wireless Networks with fading channels”, Proc. of
selection of stable route.                                     IEEE SICON’97, pp. 197-211, April 1997.
                                                               [5]C. Perkins, et al , “Ad Hoc On Demand Distance
One more parameter has been used as End to end                 Vector (AODV) Routing”, draft-ietf-manet-aodv-
delay. It is expected that initially delay is more for         10.txt, Jan 19, 2002.
refined versions. This is because all initial calculations     [6]D. Johnson, “The Dynamic Source Routing Protocol
take more time. It takes more time in initial selection of     for Mobile Ad Hoc Networks (DSR)”, draft-ietf-manet-
Route and when it stabilizes then the delay decreases as       dsr-07.txt, Feb 21, 2002.
shown in figure 4. DSR is better in all cases as it uses       [7]Yong-Bae Ko and Nitin H. Vaidya,” Location
cache                                                          Added Routing (LAR) in Mobile Ad Hoc Networks”,
                                                               ACM/IEEE International Conference on Mobile
5. CONCLUSION                                                  Computing and Networking, pp. 66-75, Oct. 1998.
A new scheme has been presented that utilizes a mesh           [8]V. D. Park and M. S. Corsion, “A Highly Adaptive
structure and alternate paths. The scheme can be               Distributed Routing Algorithm for Mobile Wireless
incorporated into any ad hoc on-demand unicast                 Network”, IEEE Sixteenth Annual Joint Conference of
routing protocol to improve reliable packet delivery in        the IEEE Computer and Communication Societies,
the face of node movements and route breaks.                   INFOCOM’97, pp 1405-1413, vol. 3 April 1997.
Alternate routes are utilized only when data packets           [9] C. K. Toh, “A Novel Distributed Routing Protocol
cannot be delivered through the primary route. As a            to Support Ad Hoc Mobile Computing”, Proceedings
case study, the proposed scheme has been applied to            of the 1996 IEEE Fifteenth Annual International
AODV and DSR and it was observed that the                      Phoenix       Conference     on   Computers      and
performance improved. Simulation results indicated             Communications, pp. 480-486, March 1996.
that the technique provides robustness to mobility and         [10] Z. J. Hass, “A New Routing Protocol for the
enhances protocol performance. Average increase in             Reconfigurable Wireless Network,” IEEE 6th
packet delivery occurs for both protocols. The                 International Conference on Universal Personal
Backbone based node Routing gives a better approach            Communication Record 1997, Vol. 2, pp. 562-566,
for on demand routing protocols for route selection and        Oct. 1997.
maintenance. It caused a bit more end to end delay.            [11] S. Ramanathan and M. Steenstrup, “A survey of
The process of checking the protocol scheme is on for          routing techniques for mobile communications
more sparse mediums and real life scenarios and also           networks”, Mobile Networks and Applications, pp. 89–
for other metrics like Path optimality, Link layer             104, 1996.
overhead. Additionally, the plan is to further evaluate         [12] NS Notes and Documentation, available at
the proposed scheme by using factor of power and               www.isi.edu/vint.
quality of service.

6. REFERENCES:
[1] E. M. Royer and Chai Keong Toh, “A Review of
Current Routing Protocols for Ad Hoc Mobile Wireless
Networks”, IEEE Personal Communications, Vol. 6,
No. 2, April 1999, pp 46-55.
[2] C. Perkins and P. Bhagwat, “Highly Dynamic
Destination Sequenced Distance Vector Routing
(DSDV) for Mobile Computers,” Computer
Communication Reviews, pp. 234-244, Oct. 1994.
[3] S. Murthy and J. J. Gracia-Luna-Aceves,”An
Efficient Routing Protocol for Wireless Networks”,
ACM Mobile Networks and Applications Journal,




                                                                                                                 5

Weitere ähnliche Inhalte

Was ist angesagt?

Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsNarendra Singh Yadav
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)IJCNCJournal
 
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLIJCNCJournal
 
Hs2413641369
Hs2413641369Hs2413641369
Hs2413641369IJERA Editor
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...eSAT Publishing House
 
A simulation based performance evaluation
A simulation based performance evaluationA simulation based performance evaluation
A simulation based performance evaluationijwmn
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...IOSR Journals
 

Was ist angesagt? (14)

Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
 
Ijcta2011020605
Ijcta2011020605Ijcta2011020605
Ijcta2011020605
 
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
 
Hs2413641369
Hs2413641369Hs2413641369
Hs2413641369
 
Be31390392
Be31390392Be31390392
Be31390392
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...
 
A simulation based performance evaluation
A simulation based performance evaluationA simulation based performance evaluation
A simulation based performance evaluation
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...
 

Andere mochten auch

Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...ambitlick
 
Multi hop wireless-networks
Multi hop wireless-networksMulti hop wireless-networks
Multi hop wireless-networksambitlick
 
Independent tasks scheduling based on genetic
Independent tasks scheduling based on geneticIndependent tasks scheduling based on genetic
Independent tasks scheduling based on geneticambitlick
 
An adaptive power controlled mac protocol for
An adaptive power controlled mac protocol forAn adaptive power controlled mac protocol for
An adaptive power controlled mac protocol forambitlick
 
Effective and efficient shape based pattern
Effective and efficient shape based patternEffective and efficient shape based pattern
Effective and efficient shape based patternambitlick
 
A novel estimation based backoff algorithm in the ieee
A novel estimation based backoff algorithm in the ieeeA novel estimation based backoff algorithm in the ieee
A novel estimation based backoff algorithm in the ieeeambitlick
 
Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...ambitlick
 
Dynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimationDynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimationambitlick
 

Andere mochten auch (8)

Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
 
Multi hop wireless-networks
Multi hop wireless-networksMulti hop wireless-networks
Multi hop wireless-networks
 
Independent tasks scheduling based on genetic
Independent tasks scheduling based on geneticIndependent tasks scheduling based on genetic
Independent tasks scheduling based on genetic
 
An adaptive power controlled mac protocol for
An adaptive power controlled mac protocol forAn adaptive power controlled mac protocol for
An adaptive power controlled mac protocol for
 
Effective and efficient shape based pattern
Effective and efficient shape based patternEffective and efficient shape based pattern
Effective and efficient shape based pattern
 
A novel estimation based backoff algorithm in the ieee
A novel estimation based backoff algorithm in the ieeeA novel estimation based backoff algorithm in the ieee
A novel estimation based backoff algorithm in the ieee
 
Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...
 
Dynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimationDynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimation
 

Ă„hnlich wie Backbone nodes based stable routing for mobile ad hoc networks

Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networksijceronline
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksIJCNCJournal
 
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVA Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVEditor IJMTER
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET Journal
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
Md3421762181
Md3421762181Md3421762181
Md3421762181IJERA Editor
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolPrafull Johri
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928IJRAT
 
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...IOSR Journals
 
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...IJASCSE
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374IJERA Editor
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 

Ă„hnlich wie Backbone nodes based stable routing for mobile ad hoc networks (20)

Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
 
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVA Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing Protocol
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928
 
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
 
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 

Mehr von ambitlick

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...ambitlick
 
Low cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsLow cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsambitlick
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013ambitlick
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013ambitlick
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocationambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocolsambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsambitlick
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2 ambitlick
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1ambitlick
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portalambitlick
 
Embassy
EmbassyEmbassy
Embassyambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocolsambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsambitlick
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”ambitlick
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...ambitlick
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministicambitlick
 
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor NetworksA Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networksambitlick
 

Mehr von ambitlick (20)

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
 
Low cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsLow cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projects
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocation
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portal
 
Embassy
EmbassyEmbassy
Embassy
 
Crm
Crm Crm
Crm
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministic
 
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor NetworksA Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
 

KĂĽrzlich hochgeladen

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 

KĂĽrzlich hochgeladen (20)

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 

Backbone nodes based stable routing for mobile ad hoc networks

  • 1. Backbone Nodes Based Stable Routing for Mobile Ad Hoc Networks Vinay Rishiwal 1, A. Kush 2, S. Verma 3 M.J.P. Rohilkhand University, Bareilly1, Kurushetra University, Kurushetra2, IIITM, Gwalior3, India. vianyrishiwal@gmail.com1, akush20@gmail.com2, sv.iiitm@gmail.com3 ABSTRACT The recent trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category, however, use single route and do not utilize multiple alternate paths. This paper proposes a scheme to improve existing on-demand routing protocols by introducing the concept of stable backbone based node scheme in network topologies scenario. The scheme establishes the multi paths without transmitting any extra control message. It offers quick adaptation to distributed processing, dynamic linking, less memory overhead and loop freedom at all times. The Scheme has been incorporated with the AODV and DSR protocols. The extensive simulation has been done for the performance evaluation; it clearly shows that the scheme performs very well with increasing packet delivery for different network scenarios. Keywords: Ad hoc networks, Routing protocols, Backbone nodes, AODV, DSR. 1. INTRODUCTION proposed scheme is discussed. Section 4 provides A mobile ad hoc network (MANET)[1] is a collection simulation details and results. Section 5 concludes the of autonomous nodes, which communicate using paper. wireless links without any fixed network infrastructure and centralized administrative support. The main 2. PREVIOUS STUDY application of mobile ad hoc network is in emergency The primary goal of routing protocol is to establish a rescue operations and battle fields. correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. This paper addresses the problem of routing in mobile Routing protocols in Mobile ad hoc networks can be ad hoc network. Since mobile nodes in mobile ad hoc classified in to two broad categories as network can move randomly the topology may change 1 Proactive or Table driven arbitrarily and frequently at unpredictable times. 2. Reactive or On demand Transmission and reception parameters may also impact the topology. So it is very difficult to find and The proactive or table driven protocols attempt to find maintain an optimal route. The routing algorithm must a route continuously and maintain routing information react quickly to topological changes. Due to dynamic from each node to every other node within the network, nature of MANETs, the problem of broken path so that whenever data is needed to be transmitted becomes prominent. Most of the existing protocols between two nodes, the route is already there. The maintain single routing path and rediscover the new nodes are required to maintain consistent up-to-date path whenever a link fails. A scheme has been routing information in one or more tables. DSDV[2], proposed here which takes the advantage of stable WRP[3], CGSR[4] etc are the protocols of this backbone nodes to provide the alternate path in case of category. a link failure. This scheme can be incorporated in any existing on demand routing protocol to improve the In Reactive approach routes are created only when performance. The efforts in this paper has been made desired by the source node. When a node requires a to incorporate the scheme on AODV and DSR. route to other node, it initiates a route discovery process with in the network. All permutations are Rest of the paper is organized as follows. The Section 2 examined and best possible route is established. The deals with study on existing protocols. In section 3 the route is maintained by some route maintenance 1
  • 2. procedure until either the destination becomes the backbone nodes can be 6, 8 and 9. These nodes are inaccessible or until the route is no longer desired. nearer to the routing path nodes and can join the AODV[5], DSR[6], LMR[7], TORA[8], and ABR[9] process any time. etc are reactive protocols. 9 There is another category of routing protocols known 1 3 as hybrid routing which is a compromised approach S between proactive and reactive approaches. Zone 2 Routing Protocol (ZRP) [10] is one of the most important protocols under this category. This protocol 4 limits the scope of table driven procedure to a small D area called zone. Outside the zone area reactive 6 approach is followed. Surveys of routing protocols for 5 8 ad hoc networks have been discussed in [1,11] 7 3. PROPOSED STUDY: The proposed scheme takes care of on demand Figure 1: Stable route using Backbone Nodes. routing along with a new concept of backbone nodes. These backbone nodes help in reconstruction phase in AODV: For AODV the protocol description has been the fast selection of new routes. Selection of backbone explained as: the protocol is divided into three phases. nodes is made upon availability of nodes. Each route Route Request (REQ), Route Repair (REP) and Error table has an entry for number of backbone nodes Phase (ERR). attached to it. Whenever need for a new route arises in case of route break, check for backbone nodes are 3.1 Route Construction (REQ) Phase made, and a new route is established. Same process is This scheme can be incorporated with reactive routing repeated in route repair phase. Route tables are updated protocols that build routes on demand via a query and at each hello interval as in AODV with added entries reply procedure. The scheme does not require any for backbone nodes. Backbone nodes are nodes at the modification to the AODV's RREQ (route request) one hop distance from its neighbor. Backbone nodes propagation process. In the scheme with Backbone are those nodes which are not participating in route nodes, when a source needs to initiate a data session to process currently or nodes which enter the range of a destination but does not have any route information, transmission during routing process. As nodes are in it searches a route by flooding a ROUTE REQUEST random motion for a scenario, so there is every (REQ) packet. Each REQ packet has a unique identifier possibility that some nodes are idle and are in the so that nodes can detect and drop duplicate packets. An vicinity of the routing nodes. Whenever a break in the Intermediate node with an active route, upon receiving route phase occurs due to movement of participant a no duplicate REQ, records the previous hop and the node, node damage or for other reasons; theses idle source node information in its route table. It then nodes which have been termed as backbone nodes take broadcasts the packet or sends back a ROUTE REPLY care of the process and start routing. The whole process (REP) packet to the source if it has an active route to becomes fast and more packet delivery is assured. The the destination. The destination node sends a REP via changes in the existing protocol are required at route the selected route when it receives the first REQ or reply and route recovery phases. In these phases the subsequent REQs that traversed a better active route. route table is updated with entries of backbone nodes. Nodes monitor the link status of next hops in active Each route table has an entry for number of backbone routes. When a link break in an active route is detected, nodes surrounding it and their hop distance form the an ERR message is used to notify that the loss of link node. For simplicity of the protocol the distance has has occurred to its one hop neighbor. Here ERR been assumed to be one hop. message indicates those destinations which are no As it has been described in Figure 1, the Route longer reachable by way of the broken link. Taking selection from S (source) to D (destination) is made via advantage of the broadcast nature of wireless 1-2-3-4 using shortest path routing. In case any of the communications, a node promiscuously overhears participating nodes damages or move out of the range, packets that are transmitted by their neighboring nodes. 2
  • 3. When a node that is not part of the route overhears a sender (originator) of the currently undeliverable REP packet not directed to itself transmit by a neighbor packet. BN attached is number of backbone nodes. (on the primary route), it records that neighbor as the This factor is transmitted as weight factor to all nodes next hop to the destination in its alternate route table. to select best available path. Addition of backbone From these packets, a node obtains alternate path nodes help in selecting stable routes. information and makes entries of these backbone nodes (BN) in its route table. If route breaks occurs it just DSR: starts route construction phase from that node. The The key feature of DSR is the use of source routing. protocol updates list of BNs periodically in the route That is, the sender knows the complete hop-by-hop table. route to the destination. These routes are stored in a route cache. The data packets carry the source route in 3.2 Route Error & Maintenance (REP) Phase the packet header. When a node in the ad hoc network attempts to send a data packet to a destination for Data packets are delivered through the primary route which it does not already know the route, it uses a unless there is a route disconnection. When a node route discovery process to dynamically determine such detects a link break (for example, receives a link layer a route. Route discovery works by flooding the feedback signal from the MAC protocol, node1 does network with route request (RREQ) packets. Each node not receive passive acknowledgments, node2 does not receiving a RREQ, rebroadcasts it, unless it is the receive hello packets for a certain period of time, etc.), destination or it has a route to the destination in its it performs a one hop data broadcast to its immediate route cache. Such a node replies to the RREQ with a neighbors. The node specifies in the data header that route reply (RREP) packet that is routed back to the the link is disconnected and thus the packet is original source. RREQ and RREP packets are also candidate for alternate routing. Upon receiving this source routed. The RREQ builds up the path traversed packet, previous one hop neighbor starts route so far. The RREP routes itself back to the source by maintenance phase and constructs an alternate route traversing this path backwards. The route carried back through backbone nodes by checking their stability. by the RREP packet is cached at the source for future Nodes those have an entry for the destination in their use. If any link on a source route is broken, the source alternate route table; transmit the packet to their next node is notified using a route error (RERR) packet. The hop node. Data packets therefore can be delivered source removes any route using this link from its through one or more alternate routes and are not cache. A new route discovery process must be initiated dropped when route breaks occur. To prevent packets by the source, if this route is still needed. DSR makes from tracing a loop, these mesh nodes forward the data very aggressive use of source routing and route packet only if the packet is not received from their next caching. No special mechanism to detect routing loops hop to the destination and is not a duplicate. When a is needed. Also, any forwarding node caches the source node of the primary route receives the data packet from route in a packet it forwards for possible future use. alternate routes, it operates normally and forwards the Some additional optimizations have been proposed packet to its next hop when the packet is not a here for DSR as (i) Selection: In DSR route request duplicate. All this route maintenance occurs under have been modified by changing cache settings. A local repair scheme. value is set at some minimum level and route reply is checked, If route reply does not occur in that time then 3..3 Local Repair backbone nodes are used. Backbone nodes have been entered at random level for DSR for better results. An When a link break in an active route occurs, the node intermediate node can use an alternate route from its upstream of that break may choose to repair the link own cache, when a data packet meets a failed link on locally if the destination was no farther and there exists its source route. (ii) route repair: A source node Backbone Nodes that are active. The Time to live receiving a RERR packet piggybacks the RERR in the (TTL) of the REQ should initially be set to the following RREQ. This helps clean up the caches of following value: other nodes in the network that may have the failed TTL = max (MIN_Repair_TTL+ BN, 0.5* #hops) link in one of the cached source routes. (iii) Duplicate routes: When a node overhears a packet not addressed Where MIN_Repair_TTL is the known hop count to to itself, it checks whether the packet could be routed the destination. #hops is the number of hops to the 3
  • 4. via itself to gain a shorter route. If so, the node sends a Pause time of 0 means maximum mobility and 300 is RREP to the source of the route with this new, better minimum mobility. Speed has been kept constant at 15 route. Aside from this, promiscuous listening helps a meter per second. node to learn different routes without directly participating in the routing process. Packet delivery ratio 4. Simulation and Results 98 Simulation study has been carried out to study the 96 performance study of proposed scheme with existing 94 AODV different protocols. Simulation Environment used is 92 Refined AODV ra tio NS-2[12] (network simulator).The version NS 2.28 has 90 DSR been used to carry out the process. Simulation results have been compared with AODV and DSR and their 88 Refined DSR modified versions. The metrics used in the simulation 86 study to perform evaluations have been discussed 84 below. 1 2 5 10 15 20 Packet Delivery Ratio: The fraction of successfully speed m/s received packets, which survive while finding their destination. This performance measure also determines the completeness and correctness of the routing protocol. Figure 3 : Packet delivery at different speeds End-to-End Delay: Average end-to-end delay is the delay experienced by the successfully delivered An approximate increase of 16-20 % have been seen packets in reaching their destinations. This is a good in packet delivery of AODV and DSR modified metric for comparing protocols. This denotes how versions. AODV gets stable even at higher pause time efficient the underlying routing algorithm is, because as shown in figure 2. This trend is more evident with delay primarily depends on optimality of path chosen. use of stable backbone nodes. The scenario has been changed in figure 3 for 50 nodes moving at different speeds. Speed has been varied from 1 meter per second Packet delivery ratio to 20 meters per second. 1 End to end delay 0.95 AODV 0.8 refined AODV ratio 0.9 DSR 0.7 REF DSR 0.6 AODV d e la y (m s ) 0.85 Refined AODV 0.5 0.8 DSR 0 20 50 100 150 200 250 300 0.4 Refined DSR Pause time 0.3 0.2 Figure 2 : Packet delivery at pause times 0 0.5 1 1.5 2 2.5 3 3.5 In simulation study 50 nodes have been taken in a speed m/s random scenario with 1000 Ă— 750 areas. The area selected is rectangular instead of square as in earlier Figure 4: End to end delay at different speeds simulations. This relates it better to real life scenarios. The study has been conducted at different pause times. 4
  • 5. The trend clearly indicate more packet delivery for Special Issue on Routing in Mobile Communication refined versions of protocols. Refined ADOV has Networks, pp. 183-197, Oct. 1996. better delivery at faster speeds. It gets stabilized at fast [4] C. C. Chiang, H. K. Wu, W. Liu, and M. speeds. The initial fall can be attributed to time Gerla,”Routing in Clustered Multihop, Mobile required for more calculations involved in better Wireless Networks with fading channels”, Proc. of selection of stable route. IEEE SICON’97, pp. 197-211, April 1997. [5]C. Perkins, et al , “Ad Hoc On Demand Distance One more parameter has been used as End to end Vector (AODV) Routing”, draft-ietf-manet-aodv- delay. It is expected that initially delay is more for 10.txt, Jan 19, 2002. refined versions. This is because all initial calculations [6]D. Johnson, “The Dynamic Source Routing Protocol take more time. It takes more time in initial selection of for Mobile Ad Hoc Networks (DSR)”, draft-ietf-manet- Route and when it stabilizes then the delay decreases as dsr-07.txt, Feb 21, 2002. shown in figure 4. DSR is better in all cases as it uses [7]Yong-Bae Ko and Nitin H. Vaidya,” Location cache Added Routing (LAR) in Mobile Ad Hoc Networks”, ACM/IEEE International Conference on Mobile 5. CONCLUSION Computing and Networking, pp. 66-75, Oct. 1998. A new scheme has been presented that utilizes a mesh [8]V. D. Park and M. S. Corsion, “A Highly Adaptive structure and alternate paths. The scheme can be Distributed Routing Algorithm for Mobile Wireless incorporated into any ad hoc on-demand unicast Network”, IEEE Sixteenth Annual Joint Conference of routing protocol to improve reliable packet delivery in the IEEE Computer and Communication Societies, the face of node movements and route breaks. INFOCOM’97, pp 1405-1413, vol. 3 April 1997. Alternate routes are utilized only when data packets [9] C. K. Toh, “A Novel Distributed Routing Protocol cannot be delivered through the primary route. As a to Support Ad Hoc Mobile Computing”, Proceedings case study, the proposed scheme has been applied to of the 1996 IEEE Fifteenth Annual International AODV and DSR and it was observed that the Phoenix Conference on Computers and performance improved. Simulation results indicated Communications, pp. 480-486, March 1996. that the technique provides robustness to mobility and [10] Z. J. Hass, “A New Routing Protocol for the enhances protocol performance. Average increase in Reconfigurable Wireless Network,” IEEE 6th packet delivery occurs for both protocols. The International Conference on Universal Personal Backbone based node Routing gives a better approach Communication Record 1997, Vol. 2, pp. 562-566, for on demand routing protocols for route selection and Oct. 1997. maintenance. It caused a bit more end to end delay. [11] S. Ramanathan and M. Steenstrup, “A survey of The process of checking the protocol scheme is on for routing techniques for mobile communications more sparse mediums and real life scenarios and also networks”, Mobile Networks and Applications, pp. 89– for other metrics like Path optimality, Link layer 104, 1996. overhead. Additionally, the plan is to further evaluate [12] NS Notes and Documentation, available at the proposed scheme by using factor of power and www.isi.edu/vint. quality of service. 6. REFERENCES: [1] E. M. Royer and Chai Keong Toh, “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks”, IEEE Personal Communications, Vol. 6, No. 2, April 1999, pp 46-55. [2] C. Perkins and P. Bhagwat, “Highly Dynamic Destination Sequenced Distance Vector Routing (DSDV) for Mobile Computers,” Computer Communication Reviews, pp. 234-244, Oct. 1994. [3] S. Murthy and J. J. Gracia-Luna-Aceves,”An Efficient Routing Protocol for Wireless Networks”, ACM Mobile Networks and Applications Journal, 5