SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
Praveen Yadav, Joy Bhattacharjee, Dr. K S Rahguwanshi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 1133-1139
1133 | P a g e
A Novel Routing Algorithm Based On Link Failure Localization
for MANET
Praveen Yadav1
, Joy Bhattacharjee2
, Dr. K S Rahguwanshi3
1
M. Tech Scholar Department of Computer Science & Engineering Oriental College of Technology, Bhopal
India
2
Assistant Professor Department of Computer Science & Engineering Oriental College of Technology, Bhopal
India
3
Associate Professor Department of Computer Science & EngineeringOriental College of Technology, Bhopal
India
Abstract
The routing in Mobile Ad hoc Network
(MANET) is a critical task due to dynamic
topology. Many routing protocols were proposed
which are categorized as proactive and reactive
routing protocols. Route maintenance is a great
challenge in MANET due to frequent link failure
which causes high data loss and delay. To counter
such problems, lots of link repair mechanisms
were proposed, but all these have their own
limitations. This paper proposes a novel routing
algorithm for route maintenance based on Link
Failure Localization called DSR-LFL. DSR-LFL
takes decision on the basis of location of failure
link in source route. Simulation results shows
DSR-LFL improve the Packet Delivery Ratio,
Throughput and decrease the Routing Overhead,
End-to-End Delay as compared to Dynamic
Source Routing (DSR) protocol.
Keywords— DSR, MANET, DSR-LFL, routing,
salvage
I. INTRODUCTION
Mobile Ad hoc Network is a group of
wireless mobile nodes which cooperate in forwarding
packets in a multi-hop fashion without any
centralized administration. The nodes are mobile and
their movements are random, therefore MANET has
dynamic topology. Because of this dynamic topology,
link failures in MANET’s are frequent. This causes
many problems such as data loss, delay, and other
factors such as packet delivery ratio etc, which
degrades performance of the network. Routing in
MANET is critical due to its dynamic topology.
Many routing protocols for MANET have been
proposed and these protocols can be classified as
proactive and reactive routing protocols [11].
Reactive routing protocols are most popular due to
their low frequency of route discovery as compared
to pro-active routing protocols. The DSR [1], [14] is
one of the commonly used reactive routing protocols
for MANET. DSR protocol has two main
mechanisms: Route Discovery and Route
Maintenance, which work together to allow nodes to
discover and maintain routes in order to send the data
packets to the destination. In spite of this, the link
failure could significantly increase the overhead and
decrease the performance because link failure may
cause packet loss, delay and may also need a global
broadcasting for new route discovery, if any other
route is not available in route cache.
Route maintenance is great challenge in
MANET, it is required to overcome the causes of link
failure. To overcome the link failure problems, lots of
local link repair mechanisms [2, 3, 4, 5, 6, 7, 8] were
proposed. But these mechanisms does not take the
decision on the basis of location of failure link in
source route and does not take advantages of relay
node location in source route. The proposed routing
algorithm is based on location of the failure link in
source route.
Rest of the paper is organized as follows. In
Section 2, DSR route discovery and maintenance
mechanism is briefly described. Section 3, several
existing route repair mechanisms are briefly
discussed. Section 4, describes the proposed
algorithm. In Section 5, simulation parameters and
compared results of DSR-LFL is listed out. Finally,
conclusions are drawn in Section 6.
II. DSR ROUTE DISCOVERY AND
MAINTENANCE
DSR is a reactive and simple protocol. The
key characteristic of DSR is based on the concept of
source routing. DSR protocol has two main
mechanisms: Route Discovery and Route
Maintenance, which work together to allow nodes to
discover and maintain routes in order to send the data
packets to the destination.
2.1 Route Discovery
Fig.1 shows the route discovery mechanism
of DSR. Whenever source node (S) wants to sends
data packets to the destination node (D). First, it
checks its route cache for a route to the destination, if
route is found then source forward the packet
according to route. Otherwise, source node (S)
broadcasts Route Request Packet (RREQ) to its
neighbour nodes which are in its transmission range.
Praveen Yadav, Joy Bhattacharjee, Dr. K S Rahguwanshi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 1133-1139
1134 | P a g e
Each RREQ packet contains source address,
destination address, request ID, and route record.
When any node receives a route request
packet, it processes the request according to the
following steps:
1. If this route request is found in this node’s list
of recently seen requests, then discard the route
request packet and do not process it further.
2. Otherwise, if this node’s address is already
listed in the route record in the request, then
discard the route request packet and do not
process it further.
3. Otherwise, if the destination of the request
matches this node’s own address, then the route
record in the packet contains the route by which
the request reached this node from the source of
the route request. Return a copy of this route in
a route reply packet to the source.
4. Otherwise, append this node’s own address to
the route record in the route request packet, and
re-broadcast the request.
The route request thus propagates through
the ad hoc network until it reaches the destination
node, which then replies to the source. In our
example, when a route request packet arrives at the
destination node (D), it returns a Route Reply Packet
(RREP) along with the reverse of a recorded path to
the source node (S), which is (S, A, C, G, D).
2.2 Route Maintenance
When relay node transmitting the packet and
found that the next node in source route is not
reachable due to any reason then it sends route error
to source. To salvage the packet relay node first
check its route cache for any other route to
destination, if route found then it forwards the packet
and inform the source about new route to destination.
When source node receives route error packet then it
discards all routes which contain the failure link.
III. EXISTING ROUTE REPAIR
MECHANISMS
Many route repair mechanisms for
MANETs were proposed. Some of them are
described bellow:
Localized Route Repair (LRR) Technique
[2], in this technique aim is to patch the route
between the two nodes of the broken path through
some other link or node. In this approach, the Time-
to-Live (TTL) field of the IP packets is used to limit
the request zone to two hops.
Dynamic Source Routing based on
Downstream node’s Information (DSR_DI) [3]
contains two algorithms: local relay node cache
search algorithm and local area route discovery for
new routes to any downstream node of original error
route. When link failure occurs, DSR_DI apply local
relay node cache search algorithm to find other route
to any downstream node. Otherwise, it apply local
area route discovery algorithm to find route to any
downstream node. The DSR-DI protocol improves
the performance of DSR protocol.
In Proximity Approach to Connection
Healing (PATCH) [4] if the link breaks off, there
should exist, in most cases, some indirect route from
relay node to the original next node in the source
route through some neighbour nodes. In these
situations, if a request packet is sent out to find the
original next hop or other node which is at the further
part of the original route with limited TTL (e.g. 2
hops), the possibility of repairing the current route
should be high and the overhead should be much
lower than using End-to-End global recovery.
In Witness-Aided Routing (WAR) [5] when
link breakage occurs, it performs local recovery by
broadcasting of the data packets with some
predefined hop limits. WAR provides fast route
recovery, but it needs high control overhead because
data packet is broadcasted as a recovery packet.
Associability Based Routing (ABR) [6, 7] is
a routing scheme to select the routes likely to be
long-lived. However, if link breakage occurs, two
cases arise. In case one if relay node is located at the
first half of the route (i.e., it is nearer to the source
than to the destination), then a route error is reported
to the source, and the source will initiate route
discovery to recover the route. In case two relay node
will broadcast a route request with a hop limit equal
to the remaining number of hops that was in the
currently failed route. Only the destination is able to
reply to the route request. If this succeeds, this route
is remedied and no route error will be reported.
Otherwise, a route error will be reported to the node
preceding relay node, which will in turn repeat trying
the above two cases again. This process is recursively
repeated until either the broken route is remedied or
one host at the first half of the original route is
A
Fig. 1 DSR Route Discovery
S
B
E
C
F
G
D
RREQ (Route Request)
Link Connectivity
RREP (Route Reply)
S (Source Node)
D (Destination Node)
Discovered Route (S, A, C, G, D)
Praveen Yadav, Joy Bhattacharjee, Dr. K S Rahguwanshi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 1133-1139
1135 | P a g e
reached. But this approach takes more bandwidth and
longer delay if the above recursion keeps on failing.
Relative Distance Micro-discovery Ad Hoc
Routing (RDMAR) [8] employs a similar approach of
local repair as ABR. However, the region of the
localized route repair is estimated from the history
distance between the current relay node and
destination node using a location prediction model.
An Analytical Model of LRR Technique is given
by Ramnath et.at [2], which is being described below.
3.1 Analytical Model
To develop a detailed model of the system
and analyze the performance of the LRR technique,
we assume certain parameters and arrived at an
expression for the traffic in ad hoc networks.
3.1.1 System Model
We assume that there are n nodes in the
system, all the nodes have the same distribution of
moving speed and direction and the same
transmission range r. We assume that:
1. The average route length between the source and
destination is EL.
2. The duration of the packet arrival is an
exponentially distributed with mean 1/λ.
3. All n mobile hosts in the network have the same
transmission range r.
4. The time between location changes for each node
is an exponentially distributed with mean 1/μ.
(Note that μ is zero when the network is static).
5. The density of nodes is same at all points in the
network, where area of the network is
represented by A.
Theorem 1. The probability P0 that a particular
mobile node
Y is in the vicinity of node X is
Theorem 2. The average number Nm of neighbours
for a node
can be given by
Theorem 3. The probability PB that a link is broken
while a
packet is being transmitted is
PB = μ/(λ +μ)
3.2 Limitations of Existing Algorithms
3.2.1 DSR
- Flooding causes more bandwidth consumption.
- Lots of error messages.
- More packet drops.
- Performance decreases as network size
increases.
3.2.2 Local Link Recovery Mechanisms
- Always takes decision on the basis of local
information.
- Overhead on all intermediate nodes is more.
- All intermediate node work on same mechanism
irrespective of their location in the source route.
3.2.3 Mechanism Based on Downstream Nodes
Information
- If failed link is far away from the destination
then it may cause overhead on intermediate
nodes.
- If nodes are highly movable then more links
failure occurs and may degrade the performance
of the network.
IV. PROPOSED ALGORITHM
To overcome the limitations that have been
discussed above, this paper introduces new algorithm
DSR-LFL based on DSR which take decisions on the
basis of location of the Relay Node (where link
failure is detected) in source route.
4.1 Description of DSR-LFL
When route is failed, the DSR, DSR-LRR
[2], DSR-DI [3] and PATCH [4] do not take decision
on the basis of failed link location in source route.
The proposed algorithm DSR-LFL is the route
maintenance algorithm based on DSR takes decision
on location of the failure link in source route. DSR-
LFL divide source route into three equal regions if
possible, otherwise Source and Destination Regions
will be of equal size and the Middle Region will be
larger as compared to other regions as shown in fig.2.
One is for nodes near to source called Source region,
second is for nodes near to destination called
Destination region, and third is called middle region.
Flow Chart of Proposed algorithm DSR-
LFL is shown in fig.3.
When relay node forward packet to next
node in source route and it founds link failure is
occur then proposed algorithm DSR-LFL work as
follows:
1. First, Relay Node searches its route cache for
other route to destination.
2. If route is found then forward the packet to
destination using new route and inform to
source about this new route.
3. Otherwise, Relay Node identifies its location
in the failed source route. Relay node belongs
to any one of the region.
4. If Relay Node belongs to Source Region, then
sends Route Error message to source, because
relay node is close to source. Now source will
take decisions.
N2 Ni Nn-1Ni+1 D
Case-1:
Source Region
Case-3:
Middle Region
Case-2:
Destination Region
Fig. 2 Partitions of Source Route
S
P0 = min (1, πr2
/A)
n-1
Nm = ∑ k (
K=0
) P0 (1-P0)n-1-kn-1
k
Praveen Yadav, Joy Bhattacharjee, Dr. K S Rahguwanshi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 1133-1139
1136 | P a g e
5. If Relay Node belongs to Destination Region,
then relay node will take advantages of down
stream nodes information [3] to find new
route to destination, because relay node is
close to destination. If new route is found,
relay node forward the packet and inform to
source about new route.
6. If Relay Node belongs to Middle Region, then
it is better to recover the link locally using one
hope or two hope request. So Relay Node
applies Local Link Recovery. If link recovery
is successful then relay node forward the
packet and inform to source about new route.
V. SIMULATIONS
5.1 Simulation settings
Simulations were carried out using NS-2.34,
network simulator, to evaluate the proposed
mechanism. We compared DSR-LFL with DSR
protocol. To emphasize the effectiveness of the
proposed mechanism, a long map of 1000m*1000m
was used and the number of nodes is 20, 40, 60, 80,
100, 120 and 140. The fastest speed of the node’s
movement is 20m/s. Each simulation time is 200
seconds. The pause time of the nodes is 20 seconds
and CBR transmission is used. Table-1 shows the
simulation parameters. We used the following
properties to evaluate the performance of DSR-LFL
and DSR protocols: packet delivery ratio, end to end
delay, normalized routing load and throughput.
5.2 Simulation result and analysis
Fig.4 shows the comparison of Packet
Delivery Ratio (PDR) between DSR and DSR-LFL.
We can see that initially packet delivery ratio keeps
increasing as number of nodes are increases, but
when number of nodes is more than 60 packet
delivery ratio decreases. At low density, DSR-LFL
does not show much advantage over DSR, but at high
density DSR-LFL shows more advantages. Table-2,
Shows the packet delivery ratio of DSR and DSR-
LFL.
Fig.5 shows the comparison of End-to-End
delay between DSR and DSR-LFL. We can see that
when number of nodes is less then difference
Yes
Relay Node search its cache
for other route to destination
Route
Found
Relay Node Identify its
Location in Source Route
Any one is
Applicable
out of
Case I, II,
And III
Send Route
Error to
Source
Apply Local
Link
Recovery
Use Downstream
Nodes Information
Route
Found
Forward the Packet and
Inform to Source
Stop
Start
No
Yes
No
Case I Case III
Case II
Fig.3 Flow Chart of DSR-LFL
Parameter Value
Mobility pattern Random way point
Traffic CBR transmission
Transmission range 250 m
Mobility Pause time 20s, speed 0-20 m/s
Map 1000m*1000m
Number of Nodes 20, 40, 60, 80, 100, 120, 140
Simulation time 200 s
Table 1: Simulation Parameters
Number
of Nodes
DSR DSR-LFL
20 95.0254 94.9290
40 96.1026 95.0655
60 96.4539 96.9000
80 93.8570 94.3320
100 93.4542 94.0937
120 89.9083 93.1727
140 79.1242 87.5502
Table-2: Packet Delivery Ratio
Praveen Yadav, Joy Bhattacharjee, Dr. K S Rahguwanshi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 1133-1139
1137 | P a g e
between end to end delay of both DSR and DSR-LFL
is very less but as the number of nodes is increases
the end to end delay in DSR-LFL is much less as
compared to DSR. Table-3, Shows the end to end
delay of DSR and DSR-LFL.
Fig.4 Packet Delivery Ratio
Fig.5 End-to-End Delay
Fig.6 shows the comparison of Normalized
Routing Load (NRL) between DSR and DSR-LFL.
Results shows that when number of nodes are less
DSR-LFL load is equivalent to that of DSR, but
when number of nodes is more than 60 the load in
DSR-LFL is very less as compared to DSR. The
performance of DSR is good when the number of
nodes in network is less, as the number of nodes is
increases the performance of DSR is decreases. But
DSR-LFL performs well in such conditions. Table-4,
Shows the normalized routing load of DSR and DSR-
LFL.
Fig.6 Normalized Routing Load
Fig.7 shows the comparison of Throughput
between DSR-LFL and DSR. Results show that the
throughput of DSR-LFL is very good as compared to
DSR. It shows that the salvaging of packets in DSR-
LFL is more as compared to DSR. Table-5, Shows
the throughput of DSR and DSR-LFL.
Number
of Nodes
DSR DSR-LFL
20 314.235 315.382
40 346.379 363.471
60 165.076 178.596
80 314.613 188.632
100 228.937 211.681
120 379.892 278.596
140 763.496 362.417
Table-3: End-to-End Delay
Number
of Nodes
DSR DSR-LFL
20 2.431 2.201
40 2.520 2.368
60 2.873 2.612
80 4.315 3.327
100 5.015 4.614
120 9.893 5.316
140 21.937 8.637
Table-4: Normalized Routing Load
Praveen Yadav, Joy Bhattacharjee, Dr. K S Rahguwanshi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 1133-1139
1138 | P a g e
Fig.7 Throughput
VI. CONCLUSION
The DSR-LFL is a route maintenance
algorithm. It will take decision on the basis of
location of failure link in source route. Source route
divided into three regions, and depends on the region
of relay node DSR-LFL will apply suitable
mechanism for route maintenance. DSR-LFL use
downstream nodes information and also repair local
link breakages to salvage the packet. DSR-LFL
improves the packet delivery ratio and throughput. It
reduces the normalized routing load and end to end
delay of the network. Our simulation shows DSR-
LFL performed well in dense map, as compared to
DSR. Thus, DSR-LFL improves the scalability and
route maintenance performance of DSR.
REFERENCES
[1] D.B. Johnson and D. A. Maltz, “Dynamic
Source Routing Protocol for Mobile Ad Hoc
Networks”, Mobile Computing, T.
Imielinski and H. Korth, Eds., Kluwer,
1996, pp. 153-181.
[2] Qing-An Zeng , Dharma P. Agrawal
Ramnath Duggirala and Rahul Gupta,
“Performance Enhancements of Ad Hoc
Networks with Localized Route Repair”
IEEE Transaction on Computers, 0018-
9340/03/$17.00 , IEEE 2003, VOL. 52, NO.
7, pp. 854-861, JULY 2003
[3] Junjie Chen, Chang’en Zhou, Deli Chen,
Bin Huang, Jiajun Hong, Chao Zhou1, Xiao
Yang, “A Novel Routing Algorithm for Ad
hoc Networks Based on the Downstream
Nodes Information”, International
Conference on Multimedia Information
Networking and Security, 2009. 978-0-
7695-3843-3/09 IEEE 2009.
[4] Genping Liu, Kai Juan Wong, Bu Sung Lee,
Boon Chong Seet, Chuan Heng Foh, Lijuan
Zhu, “PATCH: a novel local recovery
mechanism for mobile ad-hoc networks”,
Vehicular Technology Conference, 2003.
VTC 2003-Fall. 58th. pp. 2995 – 2999
Vol.5. IEEE, 2003.
[5] Aron and S. Gupta. “A Witness-Aided
Routing Protocol for Mobile Ad-Hoc
Networks with Unidirectional Links”, Proc.
First lnt'l Conf. on Mobile Data Access
(MDA '99), Hong-Kong, Dec. 1999, pp. 24-
33.
[6] C-K. Toh, "A novel distributed routing
protocol to support ad-hoc mobile
computing," IEEE International Phoenix
Conf. on Computers and Communications,
IPCCC'96.
[7] C. K. Toh, "Long-lived ad hoc routing based
on the concept of associativity", Internet
draft, IETF, Mar. 1999.
[8] George Aggelou , Rahim Tafazolli,
“RDMAR: a bandwidth-efficient routing
protocol for mobile ad hoc networks”,
Proceedings of the 2nd
ACM international
workshop on Wireless mobile multimedia,
Seattle, Washington, United States, August
20-20, 1999, pp.26-33.
[9] C. Gomez, D. Mediavilla, P. Salvatella, X.
Mantecon, J. Paradells, “A Study of Local
Connectivity Maintenance Strategies of
MANET Reactive Routing Protocol
Implementations”, 1-4244-0398-7/06 IEEE
2006.
[10] M.Tamilarasi, Shyam Sunder V R, Udara
Milinda Haputhanthri, Chamath
Somathilaka, Nannuri Ravi Babu,
S.Chandramathi T.G. Palanivelu,
“Scalability Improved DSR Protocol for
MANETs”, International Conference on
Computational Intelligence and Multimedia
Applications 2007. 0-7695-3050-8/07 IEEE
2007.
Number
of Nodes
DSR DSR-LFL
20 19439.88 19426.47
40 19463.00 19593.14
60 19761.49 20116.22
80 19352.31 19351.33
100 19274.81 19180.28
120 18315.59 19252.50
140 16125.53 18094.82
Table-5: Throughput
Praveen Yadav, Joy Bhattacharjee, Dr. K S Rahguwanshi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 1133-1139
1139 | P a g e
[11] I.Vijaya , Amiya Kumar Rath, Pinak Bhusan
Mishra, Amulya Ratna Dash, “Influence of
Routing Protocols in Performance of
Wireless Mobile Adhoc Network”, Second
International Conference on Emerging
Applications of Information Technology.
978-0-7695-4329-1/11. DOI
10.1109/EAIT.2011.65. IEEE, 2011.
[12] Natarajan Meghanathan, “A location
prediction based routing protocol and its
extensions for multicast and multi-path
routing in mobile ad hoc networks” 1570-
8705/Elsevier-2011 doi:10.1016/
j.adhoc.2010.12.005
[13] Song Guo, Oliver Yang, and Yantai Shu,
“Improving Source Routing Reliability in
Mobile Ad Hoc Networks”, IEEE
Transaction on Parallel and Distributed
Systems, pp. 362-373, VOL. 16, NO. 4,
APRIL 2005
[14] Jie Lia,∗,Yi Panb,Yang
Xiaoc, ”Performance study of multiple route
dynamic source routing protocols for mobile
ad hoc networks”, J. Parallel Distributed
Computers. 65 (2005) 169 – 177, 0743-
7315/$ - see front matter © 2004 Elsevier,
doi:10.1016/j.jpdc.2004.09.015
Sunil Taneja*and Ashwani Kush†, ” A Survey of
Routing Protocols in Mobile Ad Hoc
Networks”, International Journal of
Innovation, Management and Technology,
Vol. 1, No. 3, August 2010 ISSN: 2010-
0248.
Akshai Aggarwal, Savita Gandhi, Nirbhay
Chaubey, Gujarat Technological University,
Ahmedabad, Gujarat,
India, ”PERFORMANCE ANALYSIS OF
AODV, DSDV AND DSR IN MANETS”,
International Journal of Distributed and
Parallel Systems (IJDPS) Vol.2, No.6,
November 2011 DOI : 10.5121/ijdps.
2011.2615.

Weitere ähnliche Inhalte

Was ist angesagt?

The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
 
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...IJNSA Journal
 
A new parameter proposed for route selection in routing protocol
A new parameter proposed for route selection in routing protocolA new parameter proposed for route selection in routing protocol
A new parameter proposed for route selection in routing protocolIAEME Publication
 
Performance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingPerformance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingeSAT Publishing House
 
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...eSAT Journals
 
Performance evaluation of various types of nodes in
Performance evaluation of various types of nodes inPerformance evaluation of various types of nodes in
Performance evaluation of various types of nodes ineSAT Publishing House
 
Performance evaluation of various types of nodes in manet with dsr routing pr...
Performance evaluation of various types of nodes in manet with dsr routing pr...Performance evaluation of various types of nodes in manet with dsr routing pr...
Performance evaluation of various types of nodes in manet with dsr routing pr...eSAT Journals
 
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...Editor IJMTER
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)IJMER
 
20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)IAESIJEECS
 
Analysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANETAnalysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANETidescitation
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 

Was ist angesagt? (16)

The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
En33838844
En33838844En33838844
En33838844
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
 
A new parameter proposed for route selection in routing protocol
A new parameter proposed for route selection in routing protocolA new parameter proposed for route selection in routing protocol
A new parameter proposed for route selection in routing protocol
 
Performance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingPerformance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routing
 
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
 
Performance evaluation of various types of nodes in
Performance evaluation of various types of nodes inPerformance evaluation of various types of nodes in
Performance evaluation of various types of nodes in
 
Performance evaluation of various types of nodes in manet with dsr routing pr...
Performance evaluation of various types of nodes in manet with dsr routing pr...Performance evaluation of various types of nodes in manet with dsr routing pr...
Performance evaluation of various types of nodes in manet with dsr routing pr...
 
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
 
20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)
 
Analysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANETAnalysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANET
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 

Andere mochten auch

Andere mochten auch (9)

1 tabla libros
1 tabla libros1 tabla libros
1 tabla libros
 
Brasil
BrasilBrasil
Brasil
 
WINDFORM TO WEEK GRID CONNECTION USING UPQC
WINDFORM TO WEEK GRID CONNECTION USING UPQCWINDFORM TO WEEK GRID CONNECTION USING UPQC
WINDFORM TO WEEK GRID CONNECTION USING UPQC
 
La belleza nocturna
La belleza nocturnaLa belleza nocturna
La belleza nocturna
 
Pasos para crear un blog.
Pasos para crear un blog.Pasos para crear un blog.
Pasos para crear un blog.
 
ApresentaçãO
ApresentaçãOApresentaçãO
ApresentaçãO
 
Siglo xxi
Siglo xxiSiglo xxi
Siglo xxi
 
Aprendizaje abierto anep_ceibal_2013
Aprendizaje abierto anep_ceibal_2013Aprendizaje abierto anep_ceibal_2013
Aprendizaje abierto anep_ceibal_2013
 
Generaciones del Computador
Generaciones del ComputadorGeneraciones del Computador
Generaciones del Computador
 

Ähnlich wie Ge3411331139

THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksIJCNCJournal
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
 
On the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksOn the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksNarendra Singh Yadav
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153IJRAT
 
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVA Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVEditor IJMTER
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
 
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...IOSR Journals
 

Ähnlich wie Ge3411331139 (20)

C 16
C 16C 16
C 16
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
En33838844
En33838844En33838844
En33838844
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
On the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksOn the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networks
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
Q01821111115
Q01821111115Q01821111115
Q01821111115
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153
 
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVA Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
 
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...
 

Kürzlich hochgeladen

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Ge3411331139

  • 1. Praveen Yadav, Joy Bhattacharjee, Dr. K S Rahguwanshi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 1133-1139 1133 | P a g e A Novel Routing Algorithm Based On Link Failure Localization for MANET Praveen Yadav1 , Joy Bhattacharjee2 , Dr. K S Rahguwanshi3 1 M. Tech Scholar Department of Computer Science & Engineering Oriental College of Technology, Bhopal India 2 Assistant Professor Department of Computer Science & Engineering Oriental College of Technology, Bhopal India 3 Associate Professor Department of Computer Science & EngineeringOriental College of Technology, Bhopal India Abstract The routing in Mobile Ad hoc Network (MANET) is a critical task due to dynamic topology. Many routing protocols were proposed which are categorized as proactive and reactive routing protocols. Route maintenance is a great challenge in MANET due to frequent link failure which causes high data loss and delay. To counter such problems, lots of link repair mechanisms were proposed, but all these have their own limitations. This paper proposes a novel routing algorithm for route maintenance based on Link Failure Localization called DSR-LFL. DSR-LFL takes decision on the basis of location of failure link in source route. Simulation results shows DSR-LFL improve the Packet Delivery Ratio, Throughput and decrease the Routing Overhead, End-to-End Delay as compared to Dynamic Source Routing (DSR) protocol. Keywords— DSR, MANET, DSR-LFL, routing, salvage I. INTRODUCTION Mobile Ad hoc Network is a group of wireless mobile nodes which cooperate in forwarding packets in a multi-hop fashion without any centralized administration. The nodes are mobile and their movements are random, therefore MANET has dynamic topology. Because of this dynamic topology, link failures in MANET’s are frequent. This causes many problems such as data loss, delay, and other factors such as packet delivery ratio etc, which degrades performance of the network. Routing in MANET is critical due to its dynamic topology. Many routing protocols for MANET have been proposed and these protocols can be classified as proactive and reactive routing protocols [11]. Reactive routing protocols are most popular due to their low frequency of route discovery as compared to pro-active routing protocols. The DSR [1], [14] is one of the commonly used reactive routing protocols for MANET. DSR protocol has two main mechanisms: Route Discovery and Route Maintenance, which work together to allow nodes to discover and maintain routes in order to send the data packets to the destination. In spite of this, the link failure could significantly increase the overhead and decrease the performance because link failure may cause packet loss, delay and may also need a global broadcasting for new route discovery, if any other route is not available in route cache. Route maintenance is great challenge in MANET, it is required to overcome the causes of link failure. To overcome the link failure problems, lots of local link repair mechanisms [2, 3, 4, 5, 6, 7, 8] were proposed. But these mechanisms does not take the decision on the basis of location of failure link in source route and does not take advantages of relay node location in source route. The proposed routing algorithm is based on location of the failure link in source route. Rest of the paper is organized as follows. In Section 2, DSR route discovery and maintenance mechanism is briefly described. Section 3, several existing route repair mechanisms are briefly discussed. Section 4, describes the proposed algorithm. In Section 5, simulation parameters and compared results of DSR-LFL is listed out. Finally, conclusions are drawn in Section 6. II. DSR ROUTE DISCOVERY AND MAINTENANCE DSR is a reactive and simple protocol. The key characteristic of DSR is based on the concept of source routing. DSR protocol has two main mechanisms: Route Discovery and Route Maintenance, which work together to allow nodes to discover and maintain routes in order to send the data packets to the destination. 2.1 Route Discovery Fig.1 shows the route discovery mechanism of DSR. Whenever source node (S) wants to sends data packets to the destination node (D). First, it checks its route cache for a route to the destination, if route is found then source forward the packet according to route. Otherwise, source node (S) broadcasts Route Request Packet (RREQ) to its neighbour nodes which are in its transmission range.
  • 2. Praveen Yadav, Joy Bhattacharjee, Dr. K S Rahguwanshi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 1133-1139 1134 | P a g e Each RREQ packet contains source address, destination address, request ID, and route record. When any node receives a route request packet, it processes the request according to the following steps: 1. If this route request is found in this node’s list of recently seen requests, then discard the route request packet and do not process it further. 2. Otherwise, if this node’s address is already listed in the route record in the request, then discard the route request packet and do not process it further. 3. Otherwise, if the destination of the request matches this node’s own address, then the route record in the packet contains the route by which the request reached this node from the source of the route request. Return a copy of this route in a route reply packet to the source. 4. Otherwise, append this node’s own address to the route record in the route request packet, and re-broadcast the request. The route request thus propagates through the ad hoc network until it reaches the destination node, which then replies to the source. In our example, when a route request packet arrives at the destination node (D), it returns a Route Reply Packet (RREP) along with the reverse of a recorded path to the source node (S), which is (S, A, C, G, D). 2.2 Route Maintenance When relay node transmitting the packet and found that the next node in source route is not reachable due to any reason then it sends route error to source. To salvage the packet relay node first check its route cache for any other route to destination, if route found then it forwards the packet and inform the source about new route to destination. When source node receives route error packet then it discards all routes which contain the failure link. III. EXISTING ROUTE REPAIR MECHANISMS Many route repair mechanisms for MANETs were proposed. Some of them are described bellow: Localized Route Repair (LRR) Technique [2], in this technique aim is to patch the route between the two nodes of the broken path through some other link or node. In this approach, the Time- to-Live (TTL) field of the IP packets is used to limit the request zone to two hops. Dynamic Source Routing based on Downstream node’s Information (DSR_DI) [3] contains two algorithms: local relay node cache search algorithm and local area route discovery for new routes to any downstream node of original error route. When link failure occurs, DSR_DI apply local relay node cache search algorithm to find other route to any downstream node. Otherwise, it apply local area route discovery algorithm to find route to any downstream node. The DSR-DI protocol improves the performance of DSR protocol. In Proximity Approach to Connection Healing (PATCH) [4] if the link breaks off, there should exist, in most cases, some indirect route from relay node to the original next node in the source route through some neighbour nodes. In these situations, if a request packet is sent out to find the original next hop or other node which is at the further part of the original route with limited TTL (e.g. 2 hops), the possibility of repairing the current route should be high and the overhead should be much lower than using End-to-End global recovery. In Witness-Aided Routing (WAR) [5] when link breakage occurs, it performs local recovery by broadcasting of the data packets with some predefined hop limits. WAR provides fast route recovery, but it needs high control overhead because data packet is broadcasted as a recovery packet. Associability Based Routing (ABR) [6, 7] is a routing scheme to select the routes likely to be long-lived. However, if link breakage occurs, two cases arise. In case one if relay node is located at the first half of the route (i.e., it is nearer to the source than to the destination), then a route error is reported to the source, and the source will initiate route discovery to recover the route. In case two relay node will broadcast a route request with a hop limit equal to the remaining number of hops that was in the currently failed route. Only the destination is able to reply to the route request. If this succeeds, this route is remedied and no route error will be reported. Otherwise, a route error will be reported to the node preceding relay node, which will in turn repeat trying the above two cases again. This process is recursively repeated until either the broken route is remedied or one host at the first half of the original route is A Fig. 1 DSR Route Discovery S B E C F G D RREQ (Route Request) Link Connectivity RREP (Route Reply) S (Source Node) D (Destination Node) Discovered Route (S, A, C, G, D)
  • 3. Praveen Yadav, Joy Bhattacharjee, Dr. K S Rahguwanshi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 1133-1139 1135 | P a g e reached. But this approach takes more bandwidth and longer delay if the above recursion keeps on failing. Relative Distance Micro-discovery Ad Hoc Routing (RDMAR) [8] employs a similar approach of local repair as ABR. However, the region of the localized route repair is estimated from the history distance between the current relay node and destination node using a location prediction model. An Analytical Model of LRR Technique is given by Ramnath et.at [2], which is being described below. 3.1 Analytical Model To develop a detailed model of the system and analyze the performance of the LRR technique, we assume certain parameters and arrived at an expression for the traffic in ad hoc networks. 3.1.1 System Model We assume that there are n nodes in the system, all the nodes have the same distribution of moving speed and direction and the same transmission range r. We assume that: 1. The average route length between the source and destination is EL. 2. The duration of the packet arrival is an exponentially distributed with mean 1/λ. 3. All n mobile hosts in the network have the same transmission range r. 4. The time between location changes for each node is an exponentially distributed with mean 1/μ. (Note that μ is zero when the network is static). 5. The density of nodes is same at all points in the network, where area of the network is represented by A. Theorem 1. The probability P0 that a particular mobile node Y is in the vicinity of node X is Theorem 2. The average number Nm of neighbours for a node can be given by Theorem 3. The probability PB that a link is broken while a packet is being transmitted is PB = μ/(λ +μ) 3.2 Limitations of Existing Algorithms 3.2.1 DSR - Flooding causes more bandwidth consumption. - Lots of error messages. - More packet drops. - Performance decreases as network size increases. 3.2.2 Local Link Recovery Mechanisms - Always takes decision on the basis of local information. - Overhead on all intermediate nodes is more. - All intermediate node work on same mechanism irrespective of their location in the source route. 3.2.3 Mechanism Based on Downstream Nodes Information - If failed link is far away from the destination then it may cause overhead on intermediate nodes. - If nodes are highly movable then more links failure occurs and may degrade the performance of the network. IV. PROPOSED ALGORITHM To overcome the limitations that have been discussed above, this paper introduces new algorithm DSR-LFL based on DSR which take decisions on the basis of location of the Relay Node (where link failure is detected) in source route. 4.1 Description of DSR-LFL When route is failed, the DSR, DSR-LRR [2], DSR-DI [3] and PATCH [4] do not take decision on the basis of failed link location in source route. The proposed algorithm DSR-LFL is the route maintenance algorithm based on DSR takes decision on location of the failure link in source route. DSR- LFL divide source route into three equal regions if possible, otherwise Source and Destination Regions will be of equal size and the Middle Region will be larger as compared to other regions as shown in fig.2. One is for nodes near to source called Source region, second is for nodes near to destination called Destination region, and third is called middle region. Flow Chart of Proposed algorithm DSR- LFL is shown in fig.3. When relay node forward packet to next node in source route and it founds link failure is occur then proposed algorithm DSR-LFL work as follows: 1. First, Relay Node searches its route cache for other route to destination. 2. If route is found then forward the packet to destination using new route and inform to source about this new route. 3. Otherwise, Relay Node identifies its location in the failed source route. Relay node belongs to any one of the region. 4. If Relay Node belongs to Source Region, then sends Route Error message to source, because relay node is close to source. Now source will take decisions. N2 Ni Nn-1Ni+1 D Case-1: Source Region Case-3: Middle Region Case-2: Destination Region Fig. 2 Partitions of Source Route S P0 = min (1, πr2 /A) n-1 Nm = ∑ k ( K=0 ) P0 (1-P0)n-1-kn-1 k
  • 4. Praveen Yadav, Joy Bhattacharjee, Dr. K S Rahguwanshi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 1133-1139 1136 | P a g e 5. If Relay Node belongs to Destination Region, then relay node will take advantages of down stream nodes information [3] to find new route to destination, because relay node is close to destination. If new route is found, relay node forward the packet and inform to source about new route. 6. If Relay Node belongs to Middle Region, then it is better to recover the link locally using one hope or two hope request. So Relay Node applies Local Link Recovery. If link recovery is successful then relay node forward the packet and inform to source about new route. V. SIMULATIONS 5.1 Simulation settings Simulations were carried out using NS-2.34, network simulator, to evaluate the proposed mechanism. We compared DSR-LFL with DSR protocol. To emphasize the effectiveness of the proposed mechanism, a long map of 1000m*1000m was used and the number of nodes is 20, 40, 60, 80, 100, 120 and 140. The fastest speed of the node’s movement is 20m/s. Each simulation time is 200 seconds. The pause time of the nodes is 20 seconds and CBR transmission is used. Table-1 shows the simulation parameters. We used the following properties to evaluate the performance of DSR-LFL and DSR protocols: packet delivery ratio, end to end delay, normalized routing load and throughput. 5.2 Simulation result and analysis Fig.4 shows the comparison of Packet Delivery Ratio (PDR) between DSR and DSR-LFL. We can see that initially packet delivery ratio keeps increasing as number of nodes are increases, but when number of nodes is more than 60 packet delivery ratio decreases. At low density, DSR-LFL does not show much advantage over DSR, but at high density DSR-LFL shows more advantages. Table-2, Shows the packet delivery ratio of DSR and DSR- LFL. Fig.5 shows the comparison of End-to-End delay between DSR and DSR-LFL. We can see that when number of nodes is less then difference Yes Relay Node search its cache for other route to destination Route Found Relay Node Identify its Location in Source Route Any one is Applicable out of Case I, II, And III Send Route Error to Source Apply Local Link Recovery Use Downstream Nodes Information Route Found Forward the Packet and Inform to Source Stop Start No Yes No Case I Case III Case II Fig.3 Flow Chart of DSR-LFL Parameter Value Mobility pattern Random way point Traffic CBR transmission Transmission range 250 m Mobility Pause time 20s, speed 0-20 m/s Map 1000m*1000m Number of Nodes 20, 40, 60, 80, 100, 120, 140 Simulation time 200 s Table 1: Simulation Parameters Number of Nodes DSR DSR-LFL 20 95.0254 94.9290 40 96.1026 95.0655 60 96.4539 96.9000 80 93.8570 94.3320 100 93.4542 94.0937 120 89.9083 93.1727 140 79.1242 87.5502 Table-2: Packet Delivery Ratio
  • 5. Praveen Yadav, Joy Bhattacharjee, Dr. K S Rahguwanshi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 1133-1139 1137 | P a g e between end to end delay of both DSR and DSR-LFL is very less but as the number of nodes is increases the end to end delay in DSR-LFL is much less as compared to DSR. Table-3, Shows the end to end delay of DSR and DSR-LFL. Fig.4 Packet Delivery Ratio Fig.5 End-to-End Delay Fig.6 shows the comparison of Normalized Routing Load (NRL) between DSR and DSR-LFL. Results shows that when number of nodes are less DSR-LFL load is equivalent to that of DSR, but when number of nodes is more than 60 the load in DSR-LFL is very less as compared to DSR. The performance of DSR is good when the number of nodes in network is less, as the number of nodes is increases the performance of DSR is decreases. But DSR-LFL performs well in such conditions. Table-4, Shows the normalized routing load of DSR and DSR- LFL. Fig.6 Normalized Routing Load Fig.7 shows the comparison of Throughput between DSR-LFL and DSR. Results show that the throughput of DSR-LFL is very good as compared to DSR. It shows that the salvaging of packets in DSR- LFL is more as compared to DSR. Table-5, Shows the throughput of DSR and DSR-LFL. Number of Nodes DSR DSR-LFL 20 314.235 315.382 40 346.379 363.471 60 165.076 178.596 80 314.613 188.632 100 228.937 211.681 120 379.892 278.596 140 763.496 362.417 Table-3: End-to-End Delay Number of Nodes DSR DSR-LFL 20 2.431 2.201 40 2.520 2.368 60 2.873 2.612 80 4.315 3.327 100 5.015 4.614 120 9.893 5.316 140 21.937 8.637 Table-4: Normalized Routing Load
  • 6. Praveen Yadav, Joy Bhattacharjee, Dr. K S Rahguwanshi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 1133-1139 1138 | P a g e Fig.7 Throughput VI. CONCLUSION The DSR-LFL is a route maintenance algorithm. It will take decision on the basis of location of failure link in source route. Source route divided into three regions, and depends on the region of relay node DSR-LFL will apply suitable mechanism for route maintenance. DSR-LFL use downstream nodes information and also repair local link breakages to salvage the packet. DSR-LFL improves the packet delivery ratio and throughput. It reduces the normalized routing load and end to end delay of the network. Our simulation shows DSR- LFL performed well in dense map, as compared to DSR. Thus, DSR-LFL improves the scalability and route maintenance performance of DSR. REFERENCES [1] D.B. Johnson and D. A. Maltz, “Dynamic Source Routing Protocol for Mobile Ad Hoc Networks”, Mobile Computing, T. Imielinski and H. Korth, Eds., Kluwer, 1996, pp. 153-181. [2] Qing-An Zeng , Dharma P. Agrawal Ramnath Duggirala and Rahul Gupta, “Performance Enhancements of Ad Hoc Networks with Localized Route Repair” IEEE Transaction on Computers, 0018- 9340/03/$17.00 , IEEE 2003, VOL. 52, NO. 7, pp. 854-861, JULY 2003 [3] Junjie Chen, Chang’en Zhou, Deli Chen, Bin Huang, Jiajun Hong, Chao Zhou1, Xiao Yang, “A Novel Routing Algorithm for Ad hoc Networks Based on the Downstream Nodes Information”, International Conference on Multimedia Information Networking and Security, 2009. 978-0- 7695-3843-3/09 IEEE 2009. [4] Genping Liu, Kai Juan Wong, Bu Sung Lee, Boon Chong Seet, Chuan Heng Foh, Lijuan Zhu, “PATCH: a novel local recovery mechanism for mobile ad-hoc networks”, Vehicular Technology Conference, 2003. VTC 2003-Fall. 58th. pp. 2995 – 2999 Vol.5. IEEE, 2003. [5] Aron and S. Gupta. “A Witness-Aided Routing Protocol for Mobile Ad-Hoc Networks with Unidirectional Links”, Proc. First lnt'l Conf. on Mobile Data Access (MDA '99), Hong-Kong, Dec. 1999, pp. 24- 33. [6] C-K. Toh, "A novel distributed routing protocol to support ad-hoc mobile computing," IEEE International Phoenix Conf. on Computers and Communications, IPCCC'96. [7] C. K. Toh, "Long-lived ad hoc routing based on the concept of associativity", Internet draft, IETF, Mar. 1999. [8] George Aggelou , Rahim Tafazolli, “RDMAR: a bandwidth-efficient routing protocol for mobile ad hoc networks”, Proceedings of the 2nd ACM international workshop on Wireless mobile multimedia, Seattle, Washington, United States, August 20-20, 1999, pp.26-33. [9] C. Gomez, D. Mediavilla, P. Salvatella, X. Mantecon, J. Paradells, “A Study of Local Connectivity Maintenance Strategies of MANET Reactive Routing Protocol Implementations”, 1-4244-0398-7/06 IEEE 2006. [10] M.Tamilarasi, Shyam Sunder V R, Udara Milinda Haputhanthri, Chamath Somathilaka, Nannuri Ravi Babu, S.Chandramathi T.G. Palanivelu, “Scalability Improved DSR Protocol for MANETs”, International Conference on Computational Intelligence and Multimedia Applications 2007. 0-7695-3050-8/07 IEEE 2007. Number of Nodes DSR DSR-LFL 20 19439.88 19426.47 40 19463.00 19593.14 60 19761.49 20116.22 80 19352.31 19351.33 100 19274.81 19180.28 120 18315.59 19252.50 140 16125.53 18094.82 Table-5: Throughput
  • 7. Praveen Yadav, Joy Bhattacharjee, Dr. K S Rahguwanshi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 1133-1139 1139 | P a g e [11] I.Vijaya , Amiya Kumar Rath, Pinak Bhusan Mishra, Amulya Ratna Dash, “Influence of Routing Protocols in Performance of Wireless Mobile Adhoc Network”, Second International Conference on Emerging Applications of Information Technology. 978-0-7695-4329-1/11. DOI 10.1109/EAIT.2011.65. IEEE, 2011. [12] Natarajan Meghanathan, “A location prediction based routing protocol and its extensions for multicast and multi-path routing in mobile ad hoc networks” 1570- 8705/Elsevier-2011 doi:10.1016/ j.adhoc.2010.12.005 [13] Song Guo, Oliver Yang, and Yantai Shu, “Improving Source Routing Reliability in Mobile Ad Hoc Networks”, IEEE Transaction on Parallel and Distributed Systems, pp. 362-373, VOL. 16, NO. 4, APRIL 2005 [14] Jie Lia,∗,Yi Panb,Yang Xiaoc, ”Performance study of multiple route dynamic source routing protocols for mobile ad hoc networks”, J. Parallel Distributed Computers. 65 (2005) 169 – 177, 0743- 7315/$ - see front matter © 2004 Elsevier, doi:10.1016/j.jpdc.2004.09.015 Sunil Taneja*and Ashwani Kush†, ” A Survey of Routing Protocols in Mobile Ad Hoc Networks”, International Journal of Innovation, Management and Technology, Vol. 1, No. 3, August 2010 ISSN: 2010- 0248. Akshai Aggarwal, Savita Gandhi, Nirbhay Chaubey, Gujarat Technological University, Ahmedabad, Gujarat, India, ”PERFORMANCE ANALYSIS OF AODV, DSDV AND DSR IN MANETS”, International Journal of Distributed and Parallel Systems (IJDPS) Vol.2, No.6, November 2011 DOI : 10.5121/ijdps. 2011.2615.