SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Computer Science & Information Technology 6 www.ijcsit-apm.com
IJCSIT, Vol. 1, Issue 3 (June 2014) e-ISSN: 1694-2329 | p-ISSN: 1694-2345
ANALYSIS OF ROUTING PROTOCOLS IN
WIRELESS MESH NETWORK1
Sarina Garg, 2
Dr. Dinesh Arora
1,2
Gurukul Vidyapeeth Institute of Engg. & Technology, Banur, Punjab, India
1
sarina21garg@gmail.com, 2
drdinesh169@gmail.com
Abstract: As a developed technology, in recent years
wireless mesh networks has a great achievement in
wireless networks. In Wireless mesh networks Routing is
very difficult because of undeterminable variations in
wireless environment. There are two methods to improve
the performance of routing protocols in wireless mesh
networks. One way is to improve the methods used for
select the path. Second way is to improve the algorithms
to add up the new characteristics of wireless mesh
networks. We also propose a new protocol that is used for
Multi Interfaces and Multiple Channels (MIMC) named as
Hybrid Wireless Mesh Protocol. This protocol selects the
high throughput path to reduce the overhead of control
messages. This protocol is used to overcome the
disadvantages of IEEE 802.11. We implement these
protocols using Ns2 simulator tool.
Keywords: Wireless mesh network, Routing protocols,
throughput, MIMC
I. INTRODUCTION
Wireless mesh networks (WMN) have gained acceptance
from both academic and industry because of cost effective
feature to support high speed connections and large access
of broadband because of advance characteristics such as
robustness, high flexibility, self organization, self
configuration. Wireless mesh network has two types of
nodes-mesh router and mesh clients. Mesh router have
some great features to support mesh networking. Mesh
routers are the backbone for mesh clients. Mesh network
has multiple interfaces which can be used either in same or
different network. Mesh clients also work as a node
operator not as a host also as a router.
There are many types of mesh networks with
advance characteristics available in the market today,
these products are not compatible with each other because
each employ has its own routing protocols and their
solutions. To solve the problem of compatibility in mesh
network we describe the IEEE 802.11s and this is
standardized in the final stage.
Other protocol that is used to select the path is
Hybrid Wireless Mesh Protocol (HWMP). This protocol
combines an on- demand mode with a proactive tree
building mode. The airtime link is the time to transmit the
frame from source to destination. HWMP calculates the
overall cost of the path selected. The main drawback in
IEEE 802.11 is that it does not consider the channel
diversity. Due to this, it is suitable for Multi-interface and
Multi- channels. The main challenge for the IEEE 802.11
is to reduce the overhead between frames. Many control
messages such as Path request (PREQ), these messages
transmit again and again by every interface. If the
interface increases then the amount of transmission
increases.
Fig. 1: WMN architecture: Router backbone and user devices
Path selection metrics in WMN
1. Minimal hop count metric often not optimal
- Wireless links often vary in quality
2. Link metric: assign weights to links
- Weights derived from low rate, available bandwidth
3. Path metric: combine all link metrics on path
- prefer short paths
4. Metrics:
- hop count
- ETT (Expected Transmission Time)
- ETX (Expected Transmission Count)
- WCETT (Weighted Cumulative ETT)
II. REVIEW OF WMN ROUTING PROTOCOL
Wireless mesh networks have unique features that
differentiate them from other networks like wired and
other wireless networks technologies. Therefore, existing
routing protocol need to visit again and again in any order
to check their flexibility to WMNs. Routing protocols can
be mentioned into proactive routing, reactive routing and
hybrid routing.
In proactive routing protocol, each node
creates a one or more routing tables exits all information
about other nodes within the network. Reactive routing
creates only routes between source and destination if
needed. Hybrid routing is the combination of the proactive
routing and reactive routing to transmit the data from
source to destination. Hybrid routing take the advantages
of both proactive and reactive routing. To increase the
performance of routing protocols, we have to adapt the
new methods and modify the algorithms of routing
www.ijcsit-apm.com International Journal of Computer Science & Information Technology 7
protocols by adding the new features in the wireless mesh
network. The more appropriate method is to enhance the
existing routing protocols with new routing protocols by
using its methods.
The recently used routing protocols are
briefed. Dynamic source routing (DSR). Before sending
the data source will check that there is a route or not, if
any route exists then source sends the data to the
destination and if no route exits then the source sends
route request packet. The advantage of this protocol is that
it does not use more energy as compare to the other
protocols. This protocol is used for low power devices.
The main shortcoming of this protocol is that it is unable
to control the congestion between the nodes in a high
traffic. The DSR protocol using the transmission time
rather than the number of hops. The advantage of this
protocol is that it founds high throughput route. The
disadvantage of this protocol is that it is not flexible. Other
protocol named as Link Quality Source Routing (LQSR),
it is an extension of the DSR routing protocol. The metrics
can be Hop Count, Round- Trip Time Latency, Packet Pair
Latency, expected Transmission time. The advantage of
this protocol is that if expected transmission time is
considered then the throughput will increased. The
disadvantage of this protocol is same as the DSR protocol.
Multi radio-Link Quality source routing (MLQSR), If a
node has multiple radios then they are distributed to
different non-interference channels. This protocol checks
all the nodes in the wireless mesh network and assigns the
weights to all the nodes. Each link has the information
about the channel assignment and bandwidth. The
advantages of this protocol are same as the Multiple-
radios: traffic balancing and it has the good quality
channels. The disadvantage of this protocol is that it is not
scalable. Ad hoc on Demand Distance Vector (AODV).
This protocol uses the on demand route technique and only
active routes are maintained. It uses the request-reply
mechanism for discover the routes that are used to send
the frames from source to destination. The advantage of
this protocol is that if the topology changes it react
quickly. The disadvantage of this protocol is that only
active routes are set up not on demand routes are set up.
III. PERFORMANCE EVALUATION
We calculate the performance in wireless mesh network
using ns2 simulator, which is used to support multiple
interfaces and multiple channels. The purpose of this
simulation is to analyze the performance of different
routing protocols in wireless mesh network. The
performance of the routing protocols in wireless mesh
network can be evaluated using different metrics. The two
main metrics are throughput and average end to end delay.
Throughput is measured in terms of bits and throughput is
the total time that takes to receive the data from the
sender. Average end to end delay is measured in terms of
bytes and average end to end delay is the average total
time for all the packets to be delivered from source to
destination. Network size or number of nodes is also a
metric to evaluate the performance. The number of nodes
should be between 10 to 100 nodes. If the number of
nodes increases in the protocol then the throughput will be
reduced. The Performance of the protocol degrades due to
the increasing the size of the protocol and packet losses in
the network. If the number of nodes increases then the
network sizes are getting larger. Due to this, average end
to end delay increases as the network size increases. Due
to poor end to end delay by increasing the size of the
network, the routing protocols will not able to carry out
the load efficiency. Other metrics used for performance
evaluation are number of sources and more. But the
metrics mentioned above are more important to evaluate
the performance.
IV. MESH SECURITY
The security in wireless mesh network is to protect the
message passing from the malicious attacks. It is required
to authenticate the data packet exchanges by designing the
highly reliable and authentication networks to protect the
data from the attackers. In a mesh network, the
authentication is an important step where the node wants
to access the network. The node needs to link
establishment and authentication to access the network.
We already studied the two protocols that is SAE and
EMSA for security in mesh network.
ESMA use the mesh key hierarchy in a mesh
network for providing a reliable link establishment
security between two nodes. In mesh network only master
gateway is responsible for distributing a mesh key
hierarchy to its neighbored gateways. Master gateway
stores the all authentication information. At the initial
stage of ESMA, MP takes its first security association
with an MA and established a key hierarchy for securing a
future links. ESMA follows a 4-way handshake. After a
successful authentication, the master gateway will started
with 4-way handshake and as a result it derives PTK
(Pairwise Transmit Key) for unicast communication and
GTK (Group Transmit Key) for multicast communication.
In SAE, a single password is used for all
MP’s to secure each other in the absence of knowledge
proof. No authentication server is used in SAE which is
involved in ESMA. In this paper, the parties involved are
MP-A and MP-B and can be identified by their MAC
addresses. After successful the SAE authentication, both
parties generate a PMK, which is used to produce a PTK
(Pairwise Transmit key) and GTK (Group Transmit Key).
In SAE , the key material will be updated after the regular
time intervals. This can be done by initiating the SAE
authorization and 4-way handshaking for driving a new set
of keys before the expiration of existing keys. The lifetime
of the keys should be noted in the ESMA protocol. In
ESMA the lifetime of the keys should not be more than the
MSK. In order to maintain the operation of the network for
lifetime we have to refresh the keys periodically. In this
approach, we have to implement our testbeds for both
SAE and ESMA and refresh them periodically. The
refreshment of the keys should be done before the
expiration of the MSK keys.
V. CONCLUSION
Wireless mesh network achieved a great technology for
the next generation wireless networks. In this paper, the
analysis of the routing protocols, performance evaluation
metrics and security in mesh networks have been
presented and mentioned their features and challenges.
International Journal of Computer Science & Information Technology 8 www.ijcsit-apm.com
Fig. 2: 4-way handshaking procedure
In this paper, we mentioned a many routing protocols that
have been implemented in wireless mesh network and we
also described the performance metrics that are
throughput, average end to end delay and network size.
Now, in this research we study in detailed to improve
these protocols using the ns2 simulator.
REFERENCES
[1] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh
networks: a survey,” Computer Networks Journal, vol. 47, pp.
445-487, March2005.
[2] Y. Yang, J. Wang, and R. Kravets, “Designing routing
metrics for mesh networks,” in Proc. of the First IEEE Workshop
on Wireless Mesh Networks, 2005.
[3] Y. Hu, S. Yang, D. Wang, and L. Zhang, “SMETT: a new
routing metric for multi-radio and multi-channel wireless mesh
network,” in Proc. of IEEE International Conference on Wireless
Communication, Networking and Mobile Computing, 2006.
[4] I.F. Akyildiz, X. Wang,W. Wang, Wireless mesh networks: a
survey, Elsevier of Computer Networks Journal, 2005,47(4):
445–487
[5] C.E. Perkins, and E.M. Royer. "Ad-hoc on-demand distance
vector routing".Second IEEE Workshop on Mobile Computing
Systems and Applications Proceedings. WMCSA '99. 1999., pp.
90-100.
[6] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh
networks: a survey,” Computer Networks, Vol. 47, pp. 445- 487,
January 2005.
[7] H. Skalli et al., “Channel Assignment Strategies for
Multiradio Wireless Mesh Networks: Issues and Solutions,”
IEEE Communications Magazine, Nov. 2007.
[6] M. Bahr, "Update on the Hybrid Wireless Mesh Protocol of
IEEE 802.lls". IEEE International Conference on Mobile Adhoc
and Sensor Systems, MASS 2007, pp. 1-6.

More Related Content

What's hot

Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeIJMER
 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
 
Network layer new
Network layer newNetwork layer new
Network layer newreshmadayma
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...Alexander Decker
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission usingeSAT Publishing House
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
 

What's hot (20)

Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...
 
Hd3312521256
Hd3312521256Hd3312521256
Hd3312521256
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
G1063841
G1063841G1063841
G1063841
 
Hs2413641369
Hs2413641369Hs2413641369
Hs2413641369
 
Ag26204209
Ag26204209Ag26204209
Ag26204209
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
 
E010322531
E010322531E010322531
E010322531
 

Viewers also liked

кут. позначення кутів
кут. позначення кутівкут. позначення кутів
кут. позначення кутівAl_Brennan
 
Bases eureka 2015 minedu
Bases eureka 2015   mineduBases eureka 2015   minedu
Bases eureka 2015 mineduKarlita Bella
 
চিউইংগাম আবিষ্কার
চিউইংগাম আবিষ্কারচিউইংগাম আবিষ্কার
চিউইংগাম আবিষ্কারJoy Debnath
 
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...IJCSIT Journal
 
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKSA REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKSIJCSIT Journal
 
DEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATION
DEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATIONDEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATION
DEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATIONIJCSIT Journal
 
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKSA REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKSIJCSIT Journal
 
RECOGNITION OF CHEISING IYEK/EEYEK-MANIPURI DIGITS USING SUPPORT VECTOR MACHINES
RECOGNITION OF CHEISING IYEK/EEYEK-MANIPURI DIGITS USING SUPPORT VECTOR MACHINESRECOGNITION OF CHEISING IYEK/EEYEK-MANIPURI DIGITS USING SUPPORT VECTOR MACHINES
RECOGNITION OF CHEISING IYEK/EEYEK-MANIPURI DIGITS USING SUPPORT VECTOR MACHINESIJCSIT Journal
 
Marco de buen desempeño docente
Marco de buen desempeño docenteMarco de buen desempeño docente
Marco de buen desempeño docenteKarlita Bella
 
Improved Ad-Hoc Networks Using Cooperative Diversity
Improved Ad-Hoc Networks Using Cooperative DiversityImproved Ad-Hoc Networks Using Cooperative Diversity
Improved Ad-Hoc Networks Using Cooperative DiversityIJCSIT Journal
 
Electrical safety
Electrical safetyElectrical safety
Electrical safetyJoy Debnath
 
Mystery of the bermuda triangle
Mystery of the bermuda triangleMystery of the bermuda triangle
Mystery of the bermuda triangleJoy Debnath
 
Generation of SSB and DSB_SC Modulation
Generation of SSB and DSB_SC ModulationGeneration of SSB and DSB_SC Modulation
Generation of SSB and DSB_SC ModulationJoy Debnath
 

Viewers also liked (16)

кут. позначення кутів
кут. позначення кутівкут. позначення кутів
кут. позначення кутів
 
Bases eureka 2015 minedu
Bases eureka 2015   mineduBases eureka 2015   minedu
Bases eureka 2015 minedu
 
চিউইংগাম আবিষ্কার
চিউইংগাম আবিষ্কারচিউইংগাম আবিষ্কার
চিউইংগাম আবিষ্কার
 
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
 
кути 1
кути 1кути 1
кути 1
 
кути 2
кути 2кути 2
кути 2
 
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKSA REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
 
DEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATION
DEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATIONDEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATION
DEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATION
 
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKSA REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
 
RECOGNITION OF CHEISING IYEK/EEYEK-MANIPURI DIGITS USING SUPPORT VECTOR MACHINES
RECOGNITION OF CHEISING IYEK/EEYEK-MANIPURI DIGITS USING SUPPORT VECTOR MACHINESRECOGNITION OF CHEISING IYEK/EEYEK-MANIPURI DIGITS USING SUPPORT VECTOR MACHINES
RECOGNITION OF CHEISING IYEK/EEYEK-MANIPURI DIGITS USING SUPPORT VECTOR MACHINES
 
Bandrban
BandrbanBandrban
Bandrban
 
Marco de buen desempeño docente
Marco de buen desempeño docenteMarco de buen desempeño docente
Marco de buen desempeño docente
 
Improved Ad-Hoc Networks Using Cooperative Diversity
Improved Ad-Hoc Networks Using Cooperative DiversityImproved Ad-Hoc Networks Using Cooperative Diversity
Improved Ad-Hoc Networks Using Cooperative Diversity
 
Electrical safety
Electrical safetyElectrical safety
Electrical safety
 
Mystery of the bermuda triangle
Mystery of the bermuda triangleMystery of the bermuda triangle
Mystery of the bermuda triangle
 
Generation of SSB and DSB_SC Modulation
Generation of SSB and DSB_SC ModulationGeneration of SSB and DSB_SC Modulation
Generation of SSB and DSB_SC Modulation
 

Similar to ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK

A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET ijcnac
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...IRJET Journal
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...eSAT Publishing House
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
 
rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444IJRAT
 
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.JohnWilson47710
 
Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyRouting protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyIOSR Journals
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET Journal
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Networksheenammiddha
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET Journal
 
Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802Mumbai Academisc
 

Similar to ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK (20)

A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
 
Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyRouting protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation Study
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
A340105
A340105A340105
A340105
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Network
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
 
Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802
 
ROUTING
ROUTINGROUTING
ROUTING
 

Recently uploaded

Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsapna80328
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming languageSmritiSharma901052
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 

Recently uploaded (20)

Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveying
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming language
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 

ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK

  • 1. International Journal of Computer Science & Information Technology 6 www.ijcsit-apm.com IJCSIT, Vol. 1, Issue 3 (June 2014) e-ISSN: 1694-2329 | p-ISSN: 1694-2345 ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK1 Sarina Garg, 2 Dr. Dinesh Arora 1,2 Gurukul Vidyapeeth Institute of Engg. & Technology, Banur, Punjab, India 1 sarina21garg@gmail.com, 2 drdinesh169@gmail.com Abstract: As a developed technology, in recent years wireless mesh networks has a great achievement in wireless networks. In Wireless mesh networks Routing is very difficult because of undeterminable variations in wireless environment. There are two methods to improve the performance of routing protocols in wireless mesh networks. One way is to improve the methods used for select the path. Second way is to improve the algorithms to add up the new characteristics of wireless mesh networks. We also propose a new protocol that is used for Multi Interfaces and Multiple Channels (MIMC) named as Hybrid Wireless Mesh Protocol. This protocol selects the high throughput path to reduce the overhead of control messages. This protocol is used to overcome the disadvantages of IEEE 802.11. We implement these protocols using Ns2 simulator tool. Keywords: Wireless mesh network, Routing protocols, throughput, MIMC I. INTRODUCTION Wireless mesh networks (WMN) have gained acceptance from both academic and industry because of cost effective feature to support high speed connections and large access of broadband because of advance characteristics such as robustness, high flexibility, self organization, self configuration. Wireless mesh network has two types of nodes-mesh router and mesh clients. Mesh router have some great features to support mesh networking. Mesh routers are the backbone for mesh clients. Mesh network has multiple interfaces which can be used either in same or different network. Mesh clients also work as a node operator not as a host also as a router. There are many types of mesh networks with advance characteristics available in the market today, these products are not compatible with each other because each employ has its own routing protocols and their solutions. To solve the problem of compatibility in mesh network we describe the IEEE 802.11s and this is standardized in the final stage. Other protocol that is used to select the path is Hybrid Wireless Mesh Protocol (HWMP). This protocol combines an on- demand mode with a proactive tree building mode. The airtime link is the time to transmit the frame from source to destination. HWMP calculates the overall cost of the path selected. The main drawback in IEEE 802.11 is that it does not consider the channel diversity. Due to this, it is suitable for Multi-interface and Multi- channels. The main challenge for the IEEE 802.11 is to reduce the overhead between frames. Many control messages such as Path request (PREQ), these messages transmit again and again by every interface. If the interface increases then the amount of transmission increases. Fig. 1: WMN architecture: Router backbone and user devices Path selection metrics in WMN 1. Minimal hop count metric often not optimal - Wireless links often vary in quality 2. Link metric: assign weights to links - Weights derived from low rate, available bandwidth 3. Path metric: combine all link metrics on path - prefer short paths 4. Metrics: - hop count - ETT (Expected Transmission Time) - ETX (Expected Transmission Count) - WCETT (Weighted Cumulative ETT) II. REVIEW OF WMN ROUTING PROTOCOL Wireless mesh networks have unique features that differentiate them from other networks like wired and other wireless networks technologies. Therefore, existing routing protocol need to visit again and again in any order to check their flexibility to WMNs. Routing protocols can be mentioned into proactive routing, reactive routing and hybrid routing. In proactive routing protocol, each node creates a one or more routing tables exits all information about other nodes within the network. Reactive routing creates only routes between source and destination if needed. Hybrid routing is the combination of the proactive routing and reactive routing to transmit the data from source to destination. Hybrid routing take the advantages of both proactive and reactive routing. To increase the performance of routing protocols, we have to adapt the new methods and modify the algorithms of routing
  • 2. www.ijcsit-apm.com International Journal of Computer Science & Information Technology 7 protocols by adding the new features in the wireless mesh network. The more appropriate method is to enhance the existing routing protocols with new routing protocols by using its methods. The recently used routing protocols are briefed. Dynamic source routing (DSR). Before sending the data source will check that there is a route or not, if any route exists then source sends the data to the destination and if no route exits then the source sends route request packet. The advantage of this protocol is that it does not use more energy as compare to the other protocols. This protocol is used for low power devices. The main shortcoming of this protocol is that it is unable to control the congestion between the nodes in a high traffic. The DSR protocol using the transmission time rather than the number of hops. The advantage of this protocol is that it founds high throughput route. The disadvantage of this protocol is that it is not flexible. Other protocol named as Link Quality Source Routing (LQSR), it is an extension of the DSR routing protocol. The metrics can be Hop Count, Round- Trip Time Latency, Packet Pair Latency, expected Transmission time. The advantage of this protocol is that if expected transmission time is considered then the throughput will increased. The disadvantage of this protocol is same as the DSR protocol. Multi radio-Link Quality source routing (MLQSR), If a node has multiple radios then they are distributed to different non-interference channels. This protocol checks all the nodes in the wireless mesh network and assigns the weights to all the nodes. Each link has the information about the channel assignment and bandwidth. The advantages of this protocol are same as the Multiple- radios: traffic balancing and it has the good quality channels. The disadvantage of this protocol is that it is not scalable. Ad hoc on Demand Distance Vector (AODV). This protocol uses the on demand route technique and only active routes are maintained. It uses the request-reply mechanism for discover the routes that are used to send the frames from source to destination. The advantage of this protocol is that if the topology changes it react quickly. The disadvantage of this protocol is that only active routes are set up not on demand routes are set up. III. PERFORMANCE EVALUATION We calculate the performance in wireless mesh network using ns2 simulator, which is used to support multiple interfaces and multiple channels. The purpose of this simulation is to analyze the performance of different routing protocols in wireless mesh network. The performance of the routing protocols in wireless mesh network can be evaluated using different metrics. The two main metrics are throughput and average end to end delay. Throughput is measured in terms of bits and throughput is the total time that takes to receive the data from the sender. Average end to end delay is measured in terms of bytes and average end to end delay is the average total time for all the packets to be delivered from source to destination. Network size or number of nodes is also a metric to evaluate the performance. The number of nodes should be between 10 to 100 nodes. If the number of nodes increases in the protocol then the throughput will be reduced. The Performance of the protocol degrades due to the increasing the size of the protocol and packet losses in the network. If the number of nodes increases then the network sizes are getting larger. Due to this, average end to end delay increases as the network size increases. Due to poor end to end delay by increasing the size of the network, the routing protocols will not able to carry out the load efficiency. Other metrics used for performance evaluation are number of sources and more. But the metrics mentioned above are more important to evaluate the performance. IV. MESH SECURITY The security in wireless mesh network is to protect the message passing from the malicious attacks. It is required to authenticate the data packet exchanges by designing the highly reliable and authentication networks to protect the data from the attackers. In a mesh network, the authentication is an important step where the node wants to access the network. The node needs to link establishment and authentication to access the network. We already studied the two protocols that is SAE and EMSA for security in mesh network. ESMA use the mesh key hierarchy in a mesh network for providing a reliable link establishment security between two nodes. In mesh network only master gateway is responsible for distributing a mesh key hierarchy to its neighbored gateways. Master gateway stores the all authentication information. At the initial stage of ESMA, MP takes its first security association with an MA and established a key hierarchy for securing a future links. ESMA follows a 4-way handshake. After a successful authentication, the master gateway will started with 4-way handshake and as a result it derives PTK (Pairwise Transmit Key) for unicast communication and GTK (Group Transmit Key) for multicast communication. In SAE, a single password is used for all MP’s to secure each other in the absence of knowledge proof. No authentication server is used in SAE which is involved in ESMA. In this paper, the parties involved are MP-A and MP-B and can be identified by their MAC addresses. After successful the SAE authentication, both parties generate a PMK, which is used to produce a PTK (Pairwise Transmit key) and GTK (Group Transmit Key). In SAE , the key material will be updated after the regular time intervals. This can be done by initiating the SAE authorization and 4-way handshaking for driving a new set of keys before the expiration of existing keys. The lifetime of the keys should be noted in the ESMA protocol. In ESMA the lifetime of the keys should not be more than the MSK. In order to maintain the operation of the network for lifetime we have to refresh the keys periodically. In this approach, we have to implement our testbeds for both SAE and ESMA and refresh them periodically. The refreshment of the keys should be done before the expiration of the MSK keys. V. CONCLUSION Wireless mesh network achieved a great technology for the next generation wireless networks. In this paper, the analysis of the routing protocols, performance evaluation metrics and security in mesh networks have been presented and mentioned their features and challenges.
  • 3. International Journal of Computer Science & Information Technology 8 www.ijcsit-apm.com Fig. 2: 4-way handshaking procedure In this paper, we mentioned a many routing protocols that have been implemented in wireless mesh network and we also described the performance metrics that are throughput, average end to end delay and network size. Now, in this research we study in detailed to improve these protocols using the ns2 simulator. REFERENCES [1] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: a survey,” Computer Networks Journal, vol. 47, pp. 445-487, March2005. [2] Y. Yang, J. Wang, and R. Kravets, “Designing routing metrics for mesh networks,” in Proc. of the First IEEE Workshop on Wireless Mesh Networks, 2005. [3] Y. Hu, S. Yang, D. Wang, and L. Zhang, “SMETT: a new routing metric for multi-radio and multi-channel wireless mesh network,” in Proc. of IEEE International Conference on Wireless Communication, Networking and Mobile Computing, 2006. [4] I.F. Akyildiz, X. Wang,W. Wang, Wireless mesh networks: a survey, Elsevier of Computer Networks Journal, 2005,47(4): 445–487 [5] C.E. Perkins, and E.M. Royer. "Ad-hoc on-demand distance vector routing".Second IEEE Workshop on Mobile Computing Systems and Applications Proceedings. WMCSA '99. 1999., pp. 90-100. [6] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: a survey,” Computer Networks, Vol. 47, pp. 445- 487, January 2005. [7] H. Skalli et al., “Channel Assignment Strategies for Multiradio Wireless Mesh Networks: Issues and Solutions,” IEEE Communications Magazine, Nov. 2007. [6] M. Bahr, "Update on the Hybrid Wireless Mesh Protocol of IEEE 802.lls". IEEE International Conference on Mobile Adhoc and Sensor Systems, MASS 2007, pp. 1-6.