SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Journal of Engineering Inventions
e-ISSN: 2278-7461, p-ISSN: 2319-6491
Volume 2, Issue 7 (May 2013) PP: 41-44
www.ijeijournal.com Page | 41
A study of the effect of different topology parameters on the
routing overhead for Ad Hoc networks
Bambrik Ilyas1
, Didi Fedoua2
1, 2
Dept of computer engineering, University of Tlemcen, Algeria
Abstract: Because of the dynamic nature of the topology in Ad hoc networks, a new type of routing protocols
has been developed. These Ad hoc routing protocols react faster than the classic routing protocols to topology
changes. When a path between tow nodes is broken, the routing protocol finds an alternative path to reconnect
the two nodes. Random topology changes and other topology parameters can highly affect the volume of routing
overhead. For this reason, the routing protocols for Ad hoc networks use different methods to reduce routing
over head. In this paper we present a new routing technique and we study its effect on routing overhead by
running multiple simulations.
Keywords: Ad hoc network; routing protocol; topology parameters; routing overhead
I. INTRODUCTION
By the manner that the protocols use to build a path between two nodes, the routing protocols for Ad hoc
networks can be categorized as proactive, reactive or hybrid. Proactive protocols create a routing table that
contains a path to all the possible destinations in the network. This approach reduces transmission delay since all
the paths are already defined but increases the quantity of routing overhead. The reactive approach constructs a
path between two nodes only when needed. Even if this method reduces the routing overhead generated by the
nodes significantly, the reactive approach increases the transmission delay. The third type which is the hybrid
protocols combines the reactive approach and the proactive approach. The proactive approach is used in the close
neighborhood only and the reactive approach is used when there is no path leading to the destination. This makes
the hybrid protocols benefit from the advantages of the proactive and the reactive approach at the same time. The
inconvenient of the hybrid protocols is the fact that transmission delay can be high when the destinations is not in
the close neighborhood (even if the proactive approach is used to reduce it) and the paths that result from the path
discovery process are most likely not the shortest ones.
Generally, an Ad hoc network is used to provide and maintain a connection between all the components
of the network at all time. For example, in a military operation all the participant need to maintain contact at all
time. This is why we believe that the proactive approach is more suitable of such applications. Unlike the reactive
approach that build path only on demand, the proactive approach maintain the paths between all the nodes. On the
other hand, to maintain the routing table up to date the nodes exchange their routing messages. This periodic
exchange of routing information’s increases the routing overhead. To reduce the routing overhead, the proactive
protocols use different methods in order to adapt to the different parameters of the network (network size, nodes
mobility, nodes transmission range …etc). In this paper we present the mechanism used in our own routing
protocol and we run some simulation in order to verify its reaction to the changes in network parameters. The
protocol we present in this paper is called ERBOR (Effective Routing Based on Overhead Reduction). In Section
I we discuss the different strategies used by proactive routing protocols to reduce the routing overhead. Section II
we present our protocol and its main techniques to reduce routing overhead. Section III contains multiple
simulations that we executed in order to study the effect of different network parameters on the routing overhead
generated by our protocol. Section IV concludes our paper.
II. ROUTING OVERHEAD REDUCTION STRATEGIES
To reduce routing overhead, many techniques has been included in the proactive routing protocols. In
FSR [1] (Fisheye State Routing) the nodes broadcast the routing entries describing their close neighbors more
often than the node far away. This technique reduces the routing overhead efficiently. In [2], DREAM (Distance
Routing Effect Algorithm of Mobility) uses the nodes geographic coordinates in order to reduce the routing
overhead. A similar mechanism to the one used in FSR is applied so the information’s about the nodes far away is
rarely transmitted. This protocol also uses the relative speed of the node in order to define the frequency that the
node broadcast its routing information with. This way, the nodes that are moving fast broadcast their routing
information’s more often than the nodes moving slowly.
A different approach is used in OLSR [3] (Optimized Link Stat Routing). In this protocol, the nodes
selects only a subset of it neighbors that are in charge of rebroadcasting its routing information. The subset of
neighbors selected by the node is called MPR’s (Multi Point Relay). These neighbors selected as MPR’s of a
A study of the effect of different topology parameters on the routing overhead for Ad Hoc networks
www.ijeijournal.com Page | 42
node must be enough to reach all the neighbors two hops away. Any neighbor that is considered as redundant in
path construction doesn’t belong to in the MPR list (a neighbor that can be reached by another path). This method
reduces the number of links broadcasted on the network. Instead of broadcasting instantly a new routing
information every time a topology change is detected, In GSR [4] (Global State Routing) protocol the nodes
exchange routing information only periodically. This method is well adapted to nodes mobility. Another approach
is used in DSDV [5] (Destination Sequence Distance Vector) where two types of routing messages exist, Full
dump (contains the entire routing table) and Incremental update. The nodes send a Full dump when it detects an
important topology change. This reduces the size of the Incremental update sent after a Full dump message.
III. ERBOR (EFFECTIVE ROUTING BASED ON OVERHEAD REDUCTION)
In the purpose of building a new proactive routing protocol, we used some techniques from different
protocols. The idea of our protocol is to reduce the full routing table exchange to the minimum in order to reduce
routing overhead. Also, we use a similar technique to the MPR selection method in order to reduce the
complexity of routing tables update and the volume of traffic overhead at the same time. Instead of processing all
the routing messages generated by neighbors, each node in our protocol process only the routing messages
coming from its MPR nodes.
Different techniques are used to detect the changes in the MPR set. Instead of broadcasting periodically
the entire routing table to select the MPR set, the nodes detect the MPR set by the use of routing update only
which is smaller than a full routing table and easier to process. If a neighbor can’t be reached by any existing
MPR node, than this neighbor is a new MPR. In order to actively reduce the MPR set to the minimum. If two
MPR nodes of the same node become MPRs to each other, one of the two MPRs nodes is deleted from the MPR
ensemble. This technique reduces efficiently the routing overhead and the complexity of routing table update at
the same time. Unlike OLSR where the node process all the routing information’s broadcasted by its neighbors
but rebroadcast only the routing information coming from its MPRs selectors (nodes that selected this node as an
MPR), in our protocol the node process only the routing information coming from its MPR selection. This
reduces the complexity of routing information treatment. When a routing message is received from a neighbor
that’s not selected as MPR, the node verifies if there is an existent path to this neighbor. If there is a path it means
that this neighbor is redundant in path calculation and therefore this node is not included in the MPR list. If not
this neighbor becomes a new MPR. In order to reduce the routing overhead even more, a node broadcast its full
routing table only if a new MPR is detected. The combination of these methods reduces the routing overhead and
the complexity of routing information treatment.
IV. SIMULATION
Because of the periodic exchange of routing messages between nodes, the changes in the different parameters
of the network can affect the amount of routing overhead generated by the nodes. For example, the increase
network size increases the routing messages size and the traffic overhead quantity. Other factors that can affect
the traffic overhead are the random movements of nodes and nodes transmission range. In this paper we run
multiple tests to define the effect of some network parameters on our protocol ERBOR. To measure the routing
overhead generated by ERBOR, we implemented a network simulator in Java that’s able to create random
network topologies and measure the routing overhead generated by the nodes at each instant.
A. The effect of random topology changes on routing overhead
Figure 1The effect of random topology changes on routing overhead
For our first simulations we study the effect of random topology changes on the routing overhead
generated by ERBOR. The chart in red represents the traffic overhead generated by the network when the nodes
exchange the entire routing table and the chart in blue represents the traffic overhead generated when ERBOR is
A study of the effect of different topology parameters on the routing overhead for Ad Hoc networks
www.ijeijournal.com Page | 43
applied. The traffic overhead in our simulations is measured by counting the number of entries contained in the
routing messages.
In order to identify the effect of random topology changes on the quantity of routing information, we ran
many simulations with random movement scenario. All the nodes have the same speed and in each simulation
150 nodes are created with 150 units (pixels) of transmission range. After that, the simulators execute a random
movement scenario. Once we observe that the protocol has completely converged, we have stoped the simulation
and have recorded the traffic overhead generated by the two techniques (full routing table exchange and the
ERBOR method of routing information exchange).
Figure 1 represents the results recorded from ten consecutive simulations. The results show that the
random topology changes don’t have a significant effect on the traffic overhead generated by ERBOR. On the
other hand, it’s noticeable that the traffic overhead generated by the full routing table exchange is much more
affected by the random topology changes. These results can be explained by the fact that ERBOR use the MPR
technique. This technique uses only a subset of the neighbors list to propagate routing information’s. This way,
the topology changes (a neighbor move away or a new neighbor is detected) are not rebroadcasted by all the
neighbors which reduces the nodes movement effect on the routing overhead.
B. The effect of network size on routing overhead
Figure 2 The effect of network size on routing overhead
In the second experiment, we study the effect of the network size on the routing overhead. We execute
multiple simulations where we start at first with a network that contains 150 nodes and after each simulation we
increase the network size by 10 new nodes.
One of the most commune problems encountered in proactive routing protocols is the exponential
increase of routing overhead when the network size is increased. In ERBOR, we tried to reduce the effect of the
network size by the method that the protocol uses to exchange routing messages. With the increase of network
size, the size of the routing table and the complexity of routing table update operations increases as well. ERBOR
minimizes the exchange of routing tables and thus minimizes the quantity of routing overhead. A node broadcast
its routing table only if at least a new MPR node is detected. This explains why the quantity of routing overhead
generated by ERBOR is smaller than the routing overhead generated by the network when the full routing table is
sent. Thus, the results in Figure 2 show that even if the routing overhead generated by ERBOR increases when
the network size is increased; the routing information exchange method reduces the traffic overhead. On the other
hand, the exchange of the full routing table increases substantially the traffic overhead.
C. The effect of nodes transmission range on the routing overhead
Figure 3 The effect of nodes transmission range on the routing overhead
A study of the effect of different topology parameters on the routing overhead for Ad Hoc networks
www.ijeijournal.com Page | 44
Another parameter that can affect the traffic overhead is the nodes transmission range. In Figure 3, we
execute a series of simulations where we increase the transmission range after each simulation. At first we start
with 150 nodes network where each node have a transmission range of 150 units (pixels). After each simulation
the transmission range is increased by 10 units until the transmission range reaches 300 units in all the nodes. The
simulations show that the increase of nodes transmission range increases only slightly the quantity of traffic
overhead generated by ERBOR. The increase of transmission range of a node imply that the number of neighbors
detected by each nodes increases. Thus, the number of links and the traffic overhead increases. With the MPR
selection technique, the nodes broadcast only the links with their MPR and thus the traffic overhead generated by
ERBOR is reduced. This explains the results presented in Figure 3.
D. The effect of misbehaving nodes on routing overhead
The misbehaving nodes are the nodes that do not participate on the propagation of the routing
information’s of their neighbors. This kind of nodes overhears the routing messages of their neighbors but do not
contribute in routing functions. Consequently, the misbehaving nodes decrease the network performance. In order
to identify the effect of the misbehaving nodes on ERBOR, we conduct many simulations where we add
misbehaving nodes to the network. At first, the network does not contain any misbehaving nodes. After each
simulation we add 10 new misbehaving nodes.
Figure 4 The effect of misbehaving nodes on routing overhead
A node is considered as a misbehaving node if it doesn’t broadcast routing information and use its
neighbors to forward its traffic. Figure 4 show that the existence of misbehaving nodes doesn’t influence the
routing functions of ERBOR. Since the misbehaving nodes don’t generate any routing information’s, they are not
selected as MPR. Thus the misbehaving nodes are not used to construct paths between nodes. This explains why
the increase of misbehaving nodes up to 100 nodes doesn’t influence the performance of ERBOR.
V. CONCLUSION
Due to the periodic exchange of routing messages, the use of a proactive protocol generates an important
amount of routing overhead. Most of the traditional proactive protocols exchange the entire routing table in the
purpose of updating the routing table of the neighbor. This exchange of the total routing table is the main reason
for the increase of routing overhead especially when the network size is increased. Unlike other proactive
protocols, ERBOR use a method to minimize the full routing table exchange and thus minimizes the routing
overhead when the network size is increased. Additionally, ERBOR uses the MPR technique to reduce the effect
of network density on routing overhead. In this paper we present a brief presentation of ERBOR and various
topology parameters effect on the routing overhead generated by ERBOR. In future work we will try to include
other techniques in order to improve our protocol performances.
REFERENCES
[1] M. Gerla, “Fisheye State Routing protocol for ad hoc networks”, Internet Draft, draft-ietf-manet-aodv-03.txt, work in progress,
2002.
[2] S. Basagni, I. Chlamtac, V. R. Syrotiuk, and B. A. Woodward, ”A Distance Routing Effect algorithm for mobility ,” in ACM/IEEE
International Conference on Mobile Computing and Networking, 1998,pages 76 – 84
[3] T. Clausen and P. Jacquet, “Optimized Link State Routing Protocol”, IETF RFC 3626, Oct 2003.
[4] T.-W. Chen, M. Gerla, “Global State Routing: A new routing scheme for ad-hoc wireless networks “, Proc. IEEE Int’l Conf. on
Communications, (ICC 1998) 1998, p. 171–175.
[5] C. E. Perkins, P. Bhagwat, “Highly dynamic destination-sequenced distance-vector routing for mobile computers”, Proc. ACM
SIGCOMM’ 94 Conference on Communications Architectures, Protocols and Applications, 1994, p. 234–244.

Weitere ähnliche Inhalte

Was ist angesagt?

A Comparative Performance Analysis of Route Redistribution among Three Differ...
A Comparative Performance Analysis of Route Redistribution among Three Differ...A Comparative Performance Analysis of Route Redistribution among Three Differ...
A Comparative Performance Analysis of Route Redistribution among Three Differ...IJCNCJournal
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission usingeSAT Publishing House
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkJamia Hamdard
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)IJCNCJournal
 
Analysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANETAnalysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANETidescitation
 
POSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSPOSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSIJCNCJournal
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...IOSR Journals
 
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...CSCJournals
 
Analysis of zone routing protocol in manet
Analysis of zone routing protocol in manetAnalysis of zone routing protocol in manet
Analysis of zone routing protocol in maneteSAT Publishing House
 
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...IJERA Editor
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...ijwmn
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
 

Was ist angesagt? (20)

A Comparative Performance Analysis of Route Redistribution among Three Differ...
A Comparative Performance Analysis of Route Redistribution among Three Differ...A Comparative Performance Analysis of Route Redistribution among Three Differ...
A Comparative Performance Analysis of Route Redistribution among Three Differ...
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
L045037278
L045037278L045037278
L045037278
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
 
Analysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANETAnalysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANET
 
POSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSPOSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETS
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
 
Position based Opportunistic routing in MANET
Position based Opportunistic routing in MANETPosition based Opportunistic routing in MANET
Position based Opportunistic routing in MANET
 
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
 
Analysis of zone routing protocol in manet
Analysis of zone routing protocol in manetAnalysis of zone routing protocol in manet
Analysis of zone routing protocol in manet
 
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
Gpsr2
Gpsr2Gpsr2
Gpsr2
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
 

Andere mochten auch

FAULT DETECTION AND CLASSIFICATION ON TRANSMISSION OVERHEAD LINE USING BPP...
FAULT DETECTION AND CLASSIFICATION ON TRANSMISSION OVERHEAD LINE  USING BPP...FAULT DETECTION AND CLASSIFICATION ON TRANSMISSION OVERHEAD LINE  USING BPP...
FAULT DETECTION AND CLASSIFICATION ON TRANSMISSION OVERHEAD LINE USING BPP...Politeknik Negeri Ujung Pandang
 
PROPOSED FAULT DETECTION ON OVERHEAD TRANSMISSION LINE USING PARTICLE SWARM ...
PROPOSED FAULT DETECTION ON OVERHEAD TRANSMISSION LINE  USING PARTICLE SWARM ...PROPOSED FAULT DETECTION ON OVERHEAD TRANSMISSION LINE  USING PARTICLE SWARM ...
PROPOSED FAULT DETECTION ON OVERHEAD TRANSMISSION LINE USING PARTICLE SWARM ...Politeknik Negeri Ujung Pandang
 
Electrical transmission line
Electrical transmission lineElectrical transmission line
Electrical transmission lineDhananjay Jha
 
Transmission Line Towers and details
Transmission Line Towers and detailsTransmission Line Towers and details
Transmission Line Towers and detailsMahesh Sontyal
 
Mechanical design of overhead lines
Mechanical design of overhead linesMechanical design of overhead lines
Mechanical design of overhead linesMd. Rimon Mia
 

Andere mochten auch (7)

FAULT DETECTION AND CLASSIFICATION ON TRANSMISSION OVERHEAD LINE USING BPP...
FAULT DETECTION AND CLASSIFICATION ON TRANSMISSION OVERHEAD LINE  USING BPP...FAULT DETECTION AND CLASSIFICATION ON TRANSMISSION OVERHEAD LINE  USING BPP...
FAULT DETECTION AND CLASSIFICATION ON TRANSMISSION OVERHEAD LINE USING BPP...
 
PROPOSED FAULT DETECTION ON OVERHEAD TRANSMISSION LINE USING PARTICLE SWARM ...
PROPOSED FAULT DETECTION ON OVERHEAD TRANSMISSION LINE  USING PARTICLE SWARM ...PROPOSED FAULT DETECTION ON OVERHEAD TRANSMISSION LINE  USING PARTICLE SWARM ...
PROPOSED FAULT DETECTION ON OVERHEAD TRANSMISSION LINE USING PARTICLE SWARM ...
 
Tl book
Tl bookTl book
Tl book
 
INSULATORS AND ITS TYPES
INSULATORS AND ITS TYPESINSULATORS AND ITS TYPES
INSULATORS AND ITS TYPES
 
Electrical transmission line
Electrical transmission lineElectrical transmission line
Electrical transmission line
 
Transmission Line Towers and details
Transmission Line Towers and detailsTransmission Line Towers and details
Transmission Line Towers and details
 
Mechanical design of overhead lines
Mechanical design of overhead linesMechanical design of overhead lines
Mechanical design of overhead lines
 

Ähnlich wie A study of the effect of different topology parameters on the routing overhead for Ad Hoc networks

A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...eSAT Publishing House
 
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Jitender Grover
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928IJRAT
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetIAEME Publication
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeIJMER
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAIJITE
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...
Network Performance Analysis of Dynamic Routing Protocols for  Real Time Appl...Network Performance Analysis of Dynamic Routing Protocols for  Real Time Appl...
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...IJMER
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...IOSR Journals
 

Ähnlich wie A study of the effect of different topology parameters on the routing overhead for Ad Hoc networks (20)

A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...
 
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
 
Jm3516391646
Jm3516391646Jm3516391646
Jm3516391646
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...
Network Performance Analysis of Dynamic Routing Protocols for  Real Time Appl...Network Performance Analysis of Dynamic Routing Protocols for  Real Time Appl...
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
 
H01115155
H01115155H01115155
H01115155
 

Mehr von International Journal of Engineering Inventions www.ijeijournal.com

Mehr von International Journal of Engineering Inventions www.ijeijournal.com (20)

H04124548
H04124548H04124548
H04124548
 
G04123844
G04123844G04123844
G04123844
 
F04123137
F04123137F04123137
F04123137
 
E04122330
E04122330E04122330
E04122330
 
C04121115
C04121115C04121115
C04121115
 
B04120610
B04120610B04120610
B04120610
 
A04120105
A04120105A04120105
A04120105
 
F04113640
F04113640F04113640
F04113640
 
E04112135
E04112135E04112135
E04112135
 
D04111520
D04111520D04111520
D04111520
 
C04111114
C04111114C04111114
C04111114
 
B04110710
B04110710B04110710
B04110710
 
A04110106
A04110106A04110106
A04110106
 
I04105358
I04105358I04105358
I04105358
 
H04104952
H04104952H04104952
H04104952
 
G04103948
G04103948G04103948
G04103948
 
F04103138
F04103138F04103138
F04103138
 
E04102330
E04102330E04102330
E04102330
 
D04101822
D04101822D04101822
D04101822
 
C04101217
C04101217C04101217
C04101217
 

Kürzlich hochgeladen

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Kürzlich hochgeladen (20)

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

A study of the effect of different topology parameters on the routing overhead for Ad Hoc networks

  • 1. International Journal of Engineering Inventions e-ISSN: 2278-7461, p-ISSN: 2319-6491 Volume 2, Issue 7 (May 2013) PP: 41-44 www.ijeijournal.com Page | 41 A study of the effect of different topology parameters on the routing overhead for Ad Hoc networks Bambrik Ilyas1 , Didi Fedoua2 1, 2 Dept of computer engineering, University of Tlemcen, Algeria Abstract: Because of the dynamic nature of the topology in Ad hoc networks, a new type of routing protocols has been developed. These Ad hoc routing protocols react faster than the classic routing protocols to topology changes. When a path between tow nodes is broken, the routing protocol finds an alternative path to reconnect the two nodes. Random topology changes and other topology parameters can highly affect the volume of routing overhead. For this reason, the routing protocols for Ad hoc networks use different methods to reduce routing over head. In this paper we present a new routing technique and we study its effect on routing overhead by running multiple simulations. Keywords: Ad hoc network; routing protocol; topology parameters; routing overhead I. INTRODUCTION By the manner that the protocols use to build a path between two nodes, the routing protocols for Ad hoc networks can be categorized as proactive, reactive or hybrid. Proactive protocols create a routing table that contains a path to all the possible destinations in the network. This approach reduces transmission delay since all the paths are already defined but increases the quantity of routing overhead. The reactive approach constructs a path between two nodes only when needed. Even if this method reduces the routing overhead generated by the nodes significantly, the reactive approach increases the transmission delay. The third type which is the hybrid protocols combines the reactive approach and the proactive approach. The proactive approach is used in the close neighborhood only and the reactive approach is used when there is no path leading to the destination. This makes the hybrid protocols benefit from the advantages of the proactive and the reactive approach at the same time. The inconvenient of the hybrid protocols is the fact that transmission delay can be high when the destinations is not in the close neighborhood (even if the proactive approach is used to reduce it) and the paths that result from the path discovery process are most likely not the shortest ones. Generally, an Ad hoc network is used to provide and maintain a connection between all the components of the network at all time. For example, in a military operation all the participant need to maintain contact at all time. This is why we believe that the proactive approach is more suitable of such applications. Unlike the reactive approach that build path only on demand, the proactive approach maintain the paths between all the nodes. On the other hand, to maintain the routing table up to date the nodes exchange their routing messages. This periodic exchange of routing information’s increases the routing overhead. To reduce the routing overhead, the proactive protocols use different methods in order to adapt to the different parameters of the network (network size, nodes mobility, nodes transmission range …etc). In this paper we present the mechanism used in our own routing protocol and we run some simulation in order to verify its reaction to the changes in network parameters. The protocol we present in this paper is called ERBOR (Effective Routing Based on Overhead Reduction). In Section I we discuss the different strategies used by proactive routing protocols to reduce the routing overhead. Section II we present our protocol and its main techniques to reduce routing overhead. Section III contains multiple simulations that we executed in order to study the effect of different network parameters on the routing overhead generated by our protocol. Section IV concludes our paper. II. ROUTING OVERHEAD REDUCTION STRATEGIES To reduce routing overhead, many techniques has been included in the proactive routing protocols. In FSR [1] (Fisheye State Routing) the nodes broadcast the routing entries describing their close neighbors more often than the node far away. This technique reduces the routing overhead efficiently. In [2], DREAM (Distance Routing Effect Algorithm of Mobility) uses the nodes geographic coordinates in order to reduce the routing overhead. A similar mechanism to the one used in FSR is applied so the information’s about the nodes far away is rarely transmitted. This protocol also uses the relative speed of the node in order to define the frequency that the node broadcast its routing information with. This way, the nodes that are moving fast broadcast their routing information’s more often than the nodes moving slowly. A different approach is used in OLSR [3] (Optimized Link Stat Routing). In this protocol, the nodes selects only a subset of it neighbors that are in charge of rebroadcasting its routing information. The subset of neighbors selected by the node is called MPR’s (Multi Point Relay). These neighbors selected as MPR’s of a
  • 2. A study of the effect of different topology parameters on the routing overhead for Ad Hoc networks www.ijeijournal.com Page | 42 node must be enough to reach all the neighbors two hops away. Any neighbor that is considered as redundant in path construction doesn’t belong to in the MPR list (a neighbor that can be reached by another path). This method reduces the number of links broadcasted on the network. Instead of broadcasting instantly a new routing information every time a topology change is detected, In GSR [4] (Global State Routing) protocol the nodes exchange routing information only periodically. This method is well adapted to nodes mobility. Another approach is used in DSDV [5] (Destination Sequence Distance Vector) where two types of routing messages exist, Full dump (contains the entire routing table) and Incremental update. The nodes send a Full dump when it detects an important topology change. This reduces the size of the Incremental update sent after a Full dump message. III. ERBOR (EFFECTIVE ROUTING BASED ON OVERHEAD REDUCTION) In the purpose of building a new proactive routing protocol, we used some techniques from different protocols. The idea of our protocol is to reduce the full routing table exchange to the minimum in order to reduce routing overhead. Also, we use a similar technique to the MPR selection method in order to reduce the complexity of routing tables update and the volume of traffic overhead at the same time. Instead of processing all the routing messages generated by neighbors, each node in our protocol process only the routing messages coming from its MPR nodes. Different techniques are used to detect the changes in the MPR set. Instead of broadcasting periodically the entire routing table to select the MPR set, the nodes detect the MPR set by the use of routing update only which is smaller than a full routing table and easier to process. If a neighbor can’t be reached by any existing MPR node, than this neighbor is a new MPR. In order to actively reduce the MPR set to the minimum. If two MPR nodes of the same node become MPRs to each other, one of the two MPRs nodes is deleted from the MPR ensemble. This technique reduces efficiently the routing overhead and the complexity of routing table update at the same time. Unlike OLSR where the node process all the routing information’s broadcasted by its neighbors but rebroadcast only the routing information coming from its MPRs selectors (nodes that selected this node as an MPR), in our protocol the node process only the routing information coming from its MPR selection. This reduces the complexity of routing information treatment. When a routing message is received from a neighbor that’s not selected as MPR, the node verifies if there is an existent path to this neighbor. If there is a path it means that this neighbor is redundant in path calculation and therefore this node is not included in the MPR list. If not this neighbor becomes a new MPR. In order to reduce the routing overhead even more, a node broadcast its full routing table only if a new MPR is detected. The combination of these methods reduces the routing overhead and the complexity of routing information treatment. IV. SIMULATION Because of the periodic exchange of routing messages between nodes, the changes in the different parameters of the network can affect the amount of routing overhead generated by the nodes. For example, the increase network size increases the routing messages size and the traffic overhead quantity. Other factors that can affect the traffic overhead are the random movements of nodes and nodes transmission range. In this paper we run multiple tests to define the effect of some network parameters on our protocol ERBOR. To measure the routing overhead generated by ERBOR, we implemented a network simulator in Java that’s able to create random network topologies and measure the routing overhead generated by the nodes at each instant. A. The effect of random topology changes on routing overhead Figure 1The effect of random topology changes on routing overhead For our first simulations we study the effect of random topology changes on the routing overhead generated by ERBOR. The chart in red represents the traffic overhead generated by the network when the nodes exchange the entire routing table and the chart in blue represents the traffic overhead generated when ERBOR is
  • 3. A study of the effect of different topology parameters on the routing overhead for Ad Hoc networks www.ijeijournal.com Page | 43 applied. The traffic overhead in our simulations is measured by counting the number of entries contained in the routing messages. In order to identify the effect of random topology changes on the quantity of routing information, we ran many simulations with random movement scenario. All the nodes have the same speed and in each simulation 150 nodes are created with 150 units (pixels) of transmission range. After that, the simulators execute a random movement scenario. Once we observe that the protocol has completely converged, we have stoped the simulation and have recorded the traffic overhead generated by the two techniques (full routing table exchange and the ERBOR method of routing information exchange). Figure 1 represents the results recorded from ten consecutive simulations. The results show that the random topology changes don’t have a significant effect on the traffic overhead generated by ERBOR. On the other hand, it’s noticeable that the traffic overhead generated by the full routing table exchange is much more affected by the random topology changes. These results can be explained by the fact that ERBOR use the MPR technique. This technique uses only a subset of the neighbors list to propagate routing information’s. This way, the topology changes (a neighbor move away or a new neighbor is detected) are not rebroadcasted by all the neighbors which reduces the nodes movement effect on the routing overhead. B. The effect of network size on routing overhead Figure 2 The effect of network size on routing overhead In the second experiment, we study the effect of the network size on the routing overhead. We execute multiple simulations where we start at first with a network that contains 150 nodes and after each simulation we increase the network size by 10 new nodes. One of the most commune problems encountered in proactive routing protocols is the exponential increase of routing overhead when the network size is increased. In ERBOR, we tried to reduce the effect of the network size by the method that the protocol uses to exchange routing messages. With the increase of network size, the size of the routing table and the complexity of routing table update operations increases as well. ERBOR minimizes the exchange of routing tables and thus minimizes the quantity of routing overhead. A node broadcast its routing table only if at least a new MPR node is detected. This explains why the quantity of routing overhead generated by ERBOR is smaller than the routing overhead generated by the network when the full routing table is sent. Thus, the results in Figure 2 show that even if the routing overhead generated by ERBOR increases when the network size is increased; the routing information exchange method reduces the traffic overhead. On the other hand, the exchange of the full routing table increases substantially the traffic overhead. C. The effect of nodes transmission range on the routing overhead Figure 3 The effect of nodes transmission range on the routing overhead
  • 4. A study of the effect of different topology parameters on the routing overhead for Ad Hoc networks www.ijeijournal.com Page | 44 Another parameter that can affect the traffic overhead is the nodes transmission range. In Figure 3, we execute a series of simulations where we increase the transmission range after each simulation. At first we start with 150 nodes network where each node have a transmission range of 150 units (pixels). After each simulation the transmission range is increased by 10 units until the transmission range reaches 300 units in all the nodes. The simulations show that the increase of nodes transmission range increases only slightly the quantity of traffic overhead generated by ERBOR. The increase of transmission range of a node imply that the number of neighbors detected by each nodes increases. Thus, the number of links and the traffic overhead increases. With the MPR selection technique, the nodes broadcast only the links with their MPR and thus the traffic overhead generated by ERBOR is reduced. This explains the results presented in Figure 3. D. The effect of misbehaving nodes on routing overhead The misbehaving nodes are the nodes that do not participate on the propagation of the routing information’s of their neighbors. This kind of nodes overhears the routing messages of their neighbors but do not contribute in routing functions. Consequently, the misbehaving nodes decrease the network performance. In order to identify the effect of the misbehaving nodes on ERBOR, we conduct many simulations where we add misbehaving nodes to the network. At first, the network does not contain any misbehaving nodes. After each simulation we add 10 new misbehaving nodes. Figure 4 The effect of misbehaving nodes on routing overhead A node is considered as a misbehaving node if it doesn’t broadcast routing information and use its neighbors to forward its traffic. Figure 4 show that the existence of misbehaving nodes doesn’t influence the routing functions of ERBOR. Since the misbehaving nodes don’t generate any routing information’s, they are not selected as MPR. Thus the misbehaving nodes are not used to construct paths between nodes. This explains why the increase of misbehaving nodes up to 100 nodes doesn’t influence the performance of ERBOR. V. CONCLUSION Due to the periodic exchange of routing messages, the use of a proactive protocol generates an important amount of routing overhead. Most of the traditional proactive protocols exchange the entire routing table in the purpose of updating the routing table of the neighbor. This exchange of the total routing table is the main reason for the increase of routing overhead especially when the network size is increased. Unlike other proactive protocols, ERBOR use a method to minimize the full routing table exchange and thus minimizes the routing overhead when the network size is increased. Additionally, ERBOR uses the MPR technique to reduce the effect of network density on routing overhead. In this paper we present a brief presentation of ERBOR and various topology parameters effect on the routing overhead generated by ERBOR. In future work we will try to include other techniques in order to improve our protocol performances. REFERENCES [1] M. Gerla, “Fisheye State Routing protocol for ad hoc networks”, Internet Draft, draft-ietf-manet-aodv-03.txt, work in progress, 2002. [2] S. Basagni, I. Chlamtac, V. R. Syrotiuk, and B. A. Woodward, ”A Distance Routing Effect algorithm for mobility ,” in ACM/IEEE International Conference on Mobile Computing and Networking, 1998,pages 76 – 84 [3] T. Clausen and P. Jacquet, “Optimized Link State Routing Protocol”, IETF RFC 3626, Oct 2003. [4] T.-W. Chen, M. Gerla, “Global State Routing: A new routing scheme for ad-hoc wireless networks “, Proc. IEEE Int’l Conf. on Communications, (ICC 1998) 1998, p. 171–175. [5] C. E. Perkins, P. Bhagwat, “Highly dynamic destination-sequenced distance-vector routing for mobile computers”, Proc. ACM SIGCOMM’ 94 Conference on Communications Architectures, Protocols and Applications, 1994, p. 234–244.