TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS

Size: px
Start display at page:

Download "TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS"

Transcription

1 TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS Juan Carlos García, Mari-Carmen Bañuls, Pablo Galdámez and Rubén Quintero Instituto Tecnológico de Informática, Universidad Politécnica de Valencia, Valencia (Spain). ABSTRACT The development of distributed applications and components for ad hoc networks rises specific questions. The need for energy efficient protocols is always one major concern in the design. Nevertheless, when several services are to be simultaneously provided, the choice of the most energy saving option for an individual component may be against the quality of other services. In this paper we focus on providing routing together with a global membership estimation. The former is a fundamental service in ad hoc networks. The latter will be required by any distributed application using consensus. Some proactive routing protocols, as OLSR, already maintain at each node information on the global composition of the system. With reactive routing algorithms, as DSR, a specific service must be used to monitor the global system composition. We perform a study of the joint performance of routing and failure discovery services in the case of OLSR, which provides both at once, and in the case of DSR routing complemented with gossip style failure detection. We compare the energy consumption of both approaches and show that the advantage of one routing service over the other may be compensated or inverted when bounds are imposed on the liveness of membership monitoring information. KEY WORDS ad hoc networks, distributed systems, wireless routing, energy consumption, consensus, group membership. 1 Introduction Mobile Ad hoc Networks (MANETs), or simply ad hoc networks, are wireless networks without a fixed infrastructure, that may be constituted by heterogeneous nodes with possibly more than one hop between them. Different network services are required to support the development of distributed applications over this type of systems. An outstanding case is that of routing protocols, that allow messages to be addressed to individual nodes, in spite of the specific problems due to mobility and limited node resources. Different specifications of routing protocols exist for ad hoc networks. Their energy consumption is one of the most decisive factors, but the choice among them for a given system will depend on the particular scenario. Nevertheless, a routing service may not fulfil all the requirements of certain distributed systems. In particular, an application could require information about which nodes are connected or disconnected in order to estimate the global composition of the system. An evident example is that of distributed consensus if some node may crash [1]. Since many routing protocols only maintain local information on neighbouring nodes, such estimation of global membership is in general not achievable by the routing service alone. There exist routing protocols that keep the global composition of the system at every node, e.g. OLSR (Optimised Link State Routing Protocol), and can provide membership information. As a drawback, OLSR is a proactive service, and thus it implies a certain sustained energy consumption. From the point of view of energy, a reactive routing algorithm optimised for lower consumption would be preferable. To our knowledge no reactive routing protocol provides every node with information about the global composition of the system. Thus an extra service should be implemented to perform the membership estimation. The best strategy to achieve this in a wireless ad hoc network is to build a gossip style protocol, that will indeed impose some extra energy cost, but which can be tuned independently of routing requirements. The goal of this paper is to analyse both approaches from the point of view of their performance regarding maintenance of global information and energy consumption. The rest of the paper is structured as follows. In section 2 we review some of the existing work related to routing services and gossip like protocols for ad hoc networks and their evaluation. Section 3 describes the protocols involved in both approaches under comparison, and section 4 collects the performed experiments and the results obtained. Finally, in section 5 we discuss the results and summarise our conclusions. 2 Related Work The multiple existing proposals for routing protocols in ad hoc networks can be classified in two groups, namely reactive (also called on-demand ) and proactive. Reactive algorithms, as DSR [2], AODV [3] and TORA [4], only operate when a new packet is to be sent and no calculated valid route exists from the sender to the receiver. The route search process introduces some delay in the delivery, but the overload due to network maintenance

2 messages is very low. On the contrary proactive algorithms, as OLSR [5] and DSDV [6], periodically exchange data about routes and system state in order to refresh the system topology. They imply a constant energy consumption by all nodes, and introduce a higher overload in the network. Different studies have been carried in order to characterise the performance of both approaches with respect to different parameters and in various working scenarios. In [7], the authors define the main characteristics and different parameters of evaluation of ad hoc networks. The energy consumption of different routing protocols is compared in [8] in terms of total, transmission, reception and packet type dependent energy consumptions, over 500x500 m 2 scenarios. [9] studies four protocols and compares their packet delivery ratio, routing overhead and path optimality using multi hop scenarios of 50 nodes with CBR traffic. OLSR is studied in [], which evaluates its control message overhead and loss of data packets over networks of more of 0 nodes. The second fundamental block of our work is the gossip style protocol. Epidemic or gossip protocols are widely used for spreading information in large distributed systems [11] without strict guarantees but high probability of success. Their use is typical for providing group communication services in wireless networks and has also been proposed for achieving computational tasks in large groups. As a membership estimation service, its use was first proposed in [12], whereas [13] defined a gossip like failure detection system in charge of monitoring changes to the network in a wired environment. The use of gossip protocols for routing in ad hoc networks was analysed in [14]. In that work several gossip variants are proposed and studied. We use one of them to adapt the gossip style failure detection in [13], so that instead of selecting a number of destinies for the gossipped message, each receiver probabilistically decides whether to forward data. This yields a gossip like protocol which provides each node with an estimation of the changes to the composition of the global network. 3 The Analysed Protocols OLSR routing and membership maintenance. OLSR [15, 5] is a proactive routing algorithm that maintains information on the global composition of the system at every node. Its proactive nature ensures that routes are available at any moment. OLSR is a optimisation of link state algorithms that reduces flooding overload only to a set of nodes called MPR (Multipoint Relays). OLSR handles two types of messages. Hello messages are used to discover links between neighbours and their unidirectional or bidirectional character, and TC messages to build the overall network topology. Hello messages are exchanged periodically between neighbours. Each node selects its set of MPR nodes from received Hello messages and periodically broadcasts a TC message to the entire network with part of the received information. This message is only forwarded by MPR nodes and it is used by every node to update the global composition of the system. The behaviour of OLSR is determined by a number of parameters, among which the most relevant for our comparison are H i, the interval between Hello messages; T C i, the interval between TC messages; H t, the time validity of the last Hello message (H t H i ); and T C t, the time validity of the last TC message (T C t T C i ). DSR with Gossip Style Failure Detection. DSR (Dynamic Source Routing) [2] is one of the most widely used reactive algorithms. When a packet is to be sent to an individual node, and if no pre-calculated route to the receiver exists, the sender produces and broadcasts a Route Request message, containing its identity and that of the destination, a unique message identifier and a path list initially holding the sender alone. The neighbouring nodes that receive the Request add their identifier to the route path list and broadcast the modified message. After receiving it, the target replies to the source with a Route Reply message that contains the path followed by the message from the sender. Since Route Requests are only issued when there are messages to be sent, no constant overhead is imposed by DSR, at the price of a certain delay when delivering a message to a node for which no route is yet known. On the other hand, as a node N i only holds information on nodes for which a route including N i exists, there is no guarantee that the global composition of the system is locally available. Liveness is ensured by confirming the reception of data packets at each hop. If a node misses such confirmation from the next node after a number of retransmissions, it generates a Route Error message to notify the original source about a broken link in the route. For the maintenance of global membership information we adopt a gossip like protocol from [13], slightly modified to adapt it to the wireless scenario. Each node maintains a table of connected nodes, with their state, a (heartbeat) integer value and the last time that value was updated. Every T g seconds each members increments its heartbeat and, with probability P hb, broadcasts its local table. The receivers merge the incoming information with their local table, updating entries for which newer heartbeat values have arrived, and setting the state of possibly failed nodes. Then they rebroadcast the updated table with probability P s. When the heartbeat of a certain node is older than a predefined time T f, the node is considered to have failed, its state is changed in the local table and after a longer period T cleanup, it is definitely removed from the table. When a node joins the network its table keeps only its identifier and the initial heartbeat. During a fixed time T s the node waits to receive an extended table from an existing member. If that does not happen, it broadcasts its own and enters normal operation. The main parameters controlling the gossip algorithm are T g, the periodicity of heartbeat increment; T f, the maximum allowed age of information on a particular node before setting its state to failed (generally T f 2T g ); T s, the length of the initial waiting period when

3 joining the network; P s, the probability of broadcasting updated information after reception of new data; and P hb, the probability of broadcasting the updated information at each Gossip period. 4 Measurements and Results Our comparison between both approaches is centred on two aspects. On one hand, we are interested in the quality of the obtained global information. On the other, we must evaluate the energy consumption in any case. In order to quantify the liveness of global membership information we measure the time it takes for all nodes in the system to reach a common knowledge about the connected members after a change has happened. This is 1 done in two different scenarios. In the first one, one joins, the N-th node joins the group when the remaining N 1 are in a stable state (all of them having the same correct knowledge about present members). We measure the time elapsed from this join until the last node knows the full group composition,. (j) In the second scenario, one leaves, one node is switched off when all N nodes were in the stable state, and we measure the time it takes for the remaining members to notice the failure,. (f) In each execution we also measure the total energy consumed by each node as a function of time. This is found to fit to a straight line, whose slope determines the consumed power, de/dt, approximately constant in every execution. We average this quantity over all the nodes in the network, to obtain a measure of the energetic performance of the protocols. Description of the Experiments. Our simulations were done using ns [17]. The Network Simulator, ns2, includes a number of protocols for wireless networks, among them, DSR. Although the employed release of the simulator does not include a version of the OLSR protocol, there exist implementations developed by third parties for their use with ns2. We used the freely downloadable one from NRL Protean Group [18]. The gossip protocol described in sect. 3 was explicitly implemented to be included in the simulator. This implementation is available at [19]. We performed a series of experiments to measure, (j) (f) and de/dt as a function of the relevant protocol parameters. Each experiment consisted of a set of 20 simulations with varying network topology, whose results were later averaged. Topologies were constructed by randomly locating the N nodes on a square grid of dimension m 2 in the case of single hop and m 2 for multihop scenarios. Since the range of radio signal assumed by ns2 is 250 m, in order to ensure connectivity the maximum allowed distance between a node and its nearest neighbour was 60 m for single hop, and 225 m for multihop settings. Each simulation was run for the one joins 1 This kind of measurements have been previously used to characterise the behaviour of gossip algorithms in wired networks [16]. scenario to determine (j) and de/dt and for the one failures scenario to determine. (f) The experiments were repeated for various values of the total number of nodes, from N = 4 to N = 40, for both proposed architectures, gossip with DSR (GDSR) and OLSR. The simulation time was 300 s for single-hop scenarios and 00 s for multi hop networks, after the state of the nodes had stabilised and they shared the correct knowledge about the initial composition of the network. The power consumption for reception and transmission were fixed to 0.2 mw. The basic factors that determine the power consumption and the liveness of global information in each case are the periodicity of information broadcasting and the lifetime of local information. The performance of both proposed approaches has to be compared when those factors are comparable. In the case of GDSR the relevant parameters are the gossip interval T g, the time to detect a failure, T f and the probabilities of forwarding local or received information, P hb and P s. In our simulations we considered P hb = P s, so that we had only three free parameters. In OLSR, the periodicity of information refreshing is determined by H i and T C i, whereas the time to detect a failure is governed by H t and T C t. We took H i = T C i and H t = T C t in our experiments, so that only two independent parameters remained. The role of H i and T C i in OLSR is equivalent to that of T g /P g in the gossip failure detection, namely the period between local broadcasts from each node. 2 On the other hand, H t and T C t determine the expiry of information, as T f does in the case of the gossip algorithm. This consideration allowed us to establish comparable sets of parameters in both protocols. We performed a group of experiments with fixed P s = 0.06 and T g between 1 and 5 s in GDSR, and with the corresponding values H i = T g /P g in OLSR. In the one joins scenario we fixed T f = 2T g and H t = 6H i. In one leaves a more realistic T f = 0.7T g /P g was chosen, as this upper bounds the probability of detecting a fake failure due to missing gossip messages, and H t = 1.5T g /P g (as the implementation of OLSR requires H t > H i ). Results. Figs. 1 and 2 show in a logarithmic scale the dependence of (j) with T g for both approaches in single and multi hop scenarios, respectively. Notice that the value of T g determines that used for H i, the relevant OLSR parameter, through H i = T g /P s. In the plots (j) shows a linear dependence with broadcast periodicity, less pronounced in the case of GDSR, and with little sensitivity to the number of nodes in the network, N, specially in the case of OLSR. As expected, the best time to reach agreement when a new member joins is found for GDSR, with (j) at least one order of magnitude lower than in the case of OLSR. GDSR shows better behaviour regarding the agreement time, since its operation is optimised to react when 2 Equivalently we may say that in OLSR each node broadcasts its information 1/H i times per unit time, whereas in the gossip algorithm it does so P g/t g times per unit time.

4 (s) (j) 3 GDSR,N=12 2 GDSR,N=12 (P=0.03) (P=0.03) (s) (f) 120 GDSR,N= Figure 1. T (j) agr as a function of T g in a single hop scenario. Figure 4. T (f) agr as a function of T g in a multi hop scenario. (s) (j) 3 2 GDSR,N=12 GDSR,N=12 (P=0.03) (P=0.03) de/dt(w) -2 GDSR OLSR GDSR (P=0.03) GDSR (P=0.01) N Figure 2. T (j) agr as a function of T g in a multi hop scenario. Figure 5. Power as a function of N in a single hop scenario. (s) (f) 60 GDSR,N=12 50 de/dt(w) -2 GDSR OLSR GDSR (P=0.03) GDSR (P=0.01) N Figure 3. T (f) agr as a function of T g in a single hop scenario. Figure 6. Power as a function of N in a multi hop scenario.

5 new nodes appear. It is highly probable that a new node receives the composition of the network during its initial waiting time T s and it takes only one flood to spread the complete information to the entire network. Receiving such initial message is more likely for larger N, specially in the case of a single hop. In multi hop scenarios, higher agreement times are obtained (although still far lower than those for OLSR) as the information needs to go through a number of hops, and for constant N the probability of having a gossip within one transmission range is lower. The time to reach agreement in the one leaves scenario, in figs. 3 and 4, shows in most cases a linear dependence with T g. For GDSR it is directly governed by the time of validity of local information, given by T f. It would thus be possible to tune the reaction time, at the expense of tolerating some spurious failure. In the single hop scenario OLSR manages to reduce (f) even under the value for GDSR. This is due to its capability of monitoring link quality, discarding links that do not show activity for long enough periods. The effect shows when the periodicity is low enough, but it is not relevant in the multi hop scenario. Different results are found for energy consumption. Figs. 5 and 6 show in a logarithmic scale the average consumed power with fixed T g = 1 s, as a function of the number of nodes in single and multi hop scenarios. Contrary to what happens with liveness, the energetic performance of OLSR exceeds that of GDSR when comparable parameters are used for both protocols (starred and circle data series). The average consumption rate is lower and scales better with the number of nodes for the OLSR approach both in the case of single and multi hop scenarios. Summarising the results above, GDSR yields much better liveness for changes detection, whereas OLSR energy consumption is lower. Yet, the magnitude of the difference in the values obtained for (j) is such that one may try to trade off some liveness for energy saving. Thus, we performed a second set of experiments with GDSR, in which we limited the liveness by taking P s = 0.03 while keeping the remaining parameters unchanged. The results of such tests appear also in the figures above. In figs. 1 and 2 the effect of lowering P s in the liveness of information about joined nodes is shown (series with cross-shaped marker). We see that the result is worse than the one obtained with P s = 0.06, as expected, but it is still much better than the one obtained with OLSR. In 5 and 6 we observe the effect of this change in energy consumption. In the single hop scenario, the OLSR approach is still more efficient, except for the lowest values of N. However, in the case of multi hop scenario, GDSR with P s = 0.03 yields a better result for all system sizes, between 4 and 40 nodes. A similar improvement is achieved in the single hop experiments by further reducing the liveness to P s = 0.01, whereas the time of agreement is still better than for OLSR. 5 Conclusions We have analysed the joint performance of routing and membership estimation, two services that are to be commonly used in MANETs. Two approaches have been proposed, namely a single protocol (OLSR), which provides both of them at once, and a combination of two specialised algorithms (GDSR). OLSR has the advantage of needing a single component, with the implicit optimisations of the OLSR protocol regarding flooding in a multi hop network. GDSR offers higher flexibility, as the parameters of the gossip like protocol can be independently tuned to obtain the desired balance between energy consumption and liveness of information, whereas the reactive behaviour of DSR does not impose a sustained flow of control messages. We have simulated both approaches with comparable configurations. The results show that depending on the characteristics of the system (size, single or multi hop character), and on the requirements on the composition information (degree of liveness), either alternative may be preferable. GDSR may be easily tuned to provide very fast detection of joined nodes, whereas OLSR is more efficient in the consumption of energy. In order to get a competitive energy result with GDSR, liveness must be relaxed. In multi hop scenarios the balance is more easily achievable, and GDSR may provide better results in both time of agreement and consumed power. The performance of this approach could be further optimised if an on demand approach is adopted to compose the global view of the network only when necessary [20]. Furthermore, we have also run tests in which a CBR application is run on top of either routing service, randomly sending messages to all known members of the network at a total rate of msg/s. The results indicate that the difference between OLSR and GDSR consumption reduces, but it is still possible to get better energetic results from GDSR with lower values of P s. Previous works studied the performance of routing protocols from the point of view of throughput or energy consumption, but to our knowledge no analysis was done of how other services could affect such results. We have explicitly shown that if DSR is chosen as a more energy efficient routing protocol, and some estimation of the network global composition is required by user applications, the component added to provide such information may neutralise the presumed saving, and even result in a more consuming system. Thus it is not enough to study the performance of some individual component to characterise the overall performance of the system or to optimise its energy consumption. In our opinion, it is more sound to carry out a study of the performance of the set of support services that are to be deployed, in order to understand their interaction and to reach a trade off between consumption and quality of service in a global manner. Our tests have been made using DSR and OLSR, but some of the arguments apply to reactive and proactive algorithms in general. Reactive algorithms offer the advantage of not forcing a constant traffic overload, whereas proactive

6 algorithms offer lower delays. However, when combining a routing protocol with other distributed service, we may find situations in which either approach exceeds the other s performance depending on the required QoS of the added component. If additional services are required by the applications, more components will affect the energetic performance and must be taken into account in this analysis. One major question concerning wireless networks is that of securing communications. As a future work we plan to integrate securing mechanisms into the protocols analysed so far to study their effect on the previous results. Acknowledgements. Partially supported by the Spanish Research Council (CICYT), under grant TIC C02-01, by Valencian Government under grant GV05/259 and by the Polytechnic University of Valencia, under grant The authors are grateful to Prof. Pietro Manzoni for fruitful discussions. References [1] Michael J. Fischer, Nancy A. Lynch, and Michael S. Paterson. Impossibility of distributed consensus with one faulty process. J. ACM, 32(2): , [2] D. Johnson, D. Maltz, and J. Broch. DSR The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks, chapter 5, pages Addison-Wesley, [3] Charles E. Perkins and Elizabeth M. Royer. Ad-hoc on-demand distance vector routing. In WMCSA 99: Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications, page 90, Washington, DC, USA, IEEE Computer Society. [4] Vincent D. Park and M. Scott Corson. A highly adaptive distributed routing algorithm for mobile wireless networks. In INFOCOM 97: Proceedings of the IN- FOCOM 97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution, pages , Washington, DC, USA, IEEE Computer Society. [5] P. Jacquet, P. Mühlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot. Optimized link state routing protocol for ad hoc networks. In Proceedings of the 5th IEEE Multi Topic Conference (INMIC 2001), [6] Charles Perkins and Pravin Bhagwat. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In ACM SIG- COMM 94 Conference on Communications Architectures, Protocols and Applications, pages , [7] S. Corson and J. Macker. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, [8] Juan-Carlos Cano and Pietro Manzoni. A performance comparison of energy consumption for mobile ad hoc network routing protocols. In MASCOTS 00: Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pages 57 64, Washington, DC, USA, IEEE Computer Society. [9] Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, and Jorjeta Jetcheva. A performance comparison of multi-hop wireless ad hoc network routing protocols. In Mobile Computing and Networking, pages 85 97, [] Anis Laouti, Paul Mühlethaler, Abdellah Najid, and Epiphane Plakoo. Simulation results of the olsr routing protocol for wireless network. Technical Report RR-4414, INRIA, March [11] Patrick T. Eugster, Rachid Guerraoui, Ane-Marie Kermarrec, and Laurent Massoulié. Epidemic information dissemination in distributed systems. IEEE Computer, pages 60 67, May [12] Richard A. Golding. A weak-consistency Architecture For Distributed Information Services. Computing Systems, Technical Report UCSC-CRL [13] R. Van Renesse, Y. Minsky, and M. Hayden. A gossip-style failure detection service. In Proceedings of Middleware 98, pages IFIP, The Lake District, UK, [14] Zygmunt J. Haas, Joseph Y. Halpern, and Erran L. Li. Gossip-based ad hoc routing. In INFOCOM, [15] P. Jacquet et al. Optimized link state routing protocol (olsr). Internet Draft (draft-ietfmanet -olsr-09.txt), INRIA Rocquencourt, April [16] Mark W. Burns, Alan D. George, and Bradley A. Wallace. Simulative performance analysis of gossip failure detection of scalable distributed systems. Cluster Computing, (2): , [17] The VINT project. The NS2 manual. Technical report, ISI, [18] NRL Protean Group. [19] [20] Mari-Carmen Bañuls and Pablo Galdámez. Ondemand membership for energy-aware networks. In First International Workshop High Availability of Distributed Systems HADIS 2005, 2005.

More Efficient Routing Algorithm for Ad Hoc Network

More Efficient Routing Algorithm for Ad Hoc Network More Efficient Routing Algorithm for Ad Hoc Network ENSC 835: HIGH-PERFORMANCE NETWORKS INSTRUCTOR: Dr. Ljiljana Trajkovic Mark Wang mrw@sfu.ca Carl Qian chunq@sfu.ca Outline Quick Overview of Ad hoc Networks

More information

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:

More information

Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic

Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 67-71 Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic Dhiraj

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network Ad Hoc and Wireless Mesh Networking Laura Marie Feeney lmfeeney@sics.se Datakommunikation III, HT 00 Overview Ad hoc and wireless mesh networks Ad hoc network (MANet) operates independently of network

More information

Survey of MANET based on Routing Protocols

Survey of MANET based on Routing Protocols Survey of MANET based on Routing Protocols M.Tech CSE & RGPV ABSTRACT Routing protocols is a combination of rules and procedures for combining information which also received from other routers. Routing

More information

Performance Evaluation of MANET Using Quality of Service Metrics

Performance Evaluation of MANET Using Quality of Service Metrics Performance Evaluation of MANET Using Quality of Service Metrics C.Jinshong Hwang 1, Ashwani Kush 2, Ruchika,S.Tyagi 3 1 Department of Computer Science Texas State University, San Marcos Texas, USA 2,

More information

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR 802.11P INCLUDING PROPAGATION MODELS Mit Parmar 1, Kinnar Vaghela 2 1 Student M.E. Communication Systems, Electronics & Communication Department, L.D. College

More information

PERFORMANCE EVALUATION OF AODV AND DSR IN FEASIBLE AND RANDOM PLACEMENT MODELS

PERFORMANCE EVALUATION OF AODV AND DSR IN FEASIBLE AND RANDOM PLACEMENT MODELS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.487

More information

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET Latest Research Topics on MANET Routing Protocols Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET In this topic, the existing Route Repair method in AODV can be enhanced

More information

IMPROVED OLSR AND TORA ROUTING PROTOCOLS FOR MANETS

IMPROVED OLSR AND TORA ROUTING PROTOCOLS FOR MANETS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,

More information

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT

More information

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR 5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden

More information

International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn:

International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn: Modified Route Maintenance in AODV Routing Protocol ChiragBhalodia (M.Tech, Research Scholar) 1, Prof. Amit M. Lathigara 2 Pg Scholar, Computer Engineering Department & R K University, chiragsbhalodia@gmail.com

More information

EVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS

EVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS EVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS 1 ALOK KUMAR JAGADEV, 2 BINOD KUMAR PATTANAYAK *, 3 AJIT KUMAR NAYAK, 4 MANOJRANJAN NAYAK Institute Of Technical Education And Research,

More information

Investigating the Impact of Partial Topology in Proactive MANET Routing Protocols

Investigating the Impact of Partial Topology in Proactive MANET Routing Protocols Investigating the Impact of Partial Topology in Proactive MANET Routing Protocols Thomas Clausen, Philippe Jacquet, Laurent Viennot To cite this version: Thomas Clausen, Philippe Jacquet, Laurent Viennot.

More information

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Prepared For: UMIACS/LTS Seminar March 3, 2004 Telcordia Contact: Stephanie Demers Robert A. Ziegler ziegler@research.telcordia.com 732.758.5494

More information

OLSR-L. Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig

OLSR-L. Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig OLSR-L 1 2 3 4 2 ROULA OLSR OLSR ROULA ROULA OLSR OLSR-L Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig Kazuyoshi Soga, 1 Tomoya Takenaka, 2 Yoshiaki Terashima,

More information

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 6.047 Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey

More information

A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks. Laura Marie Feeney Swedish Institute of Computer Science

A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks. Laura Marie Feeney Swedish Institute of Computer Science A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks Laura Marie Feeney Swedish Institute of Computer Science http://www.sics.se/~lmfeeney Overview mobile ad hoc networks routing protocols communication

More information

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models Rohit Kumar Department of Computer Sc. & Engineering Chandigarh University, Gharuan Mohali, Punjab

More information

Analysis on Privacy and Reliability of Ad Hoc Network-Based in Protecting Agricultural Data

Analysis on Privacy and Reliability of Ad Hoc Network-Based in Protecting Agricultural Data Send Orders for Reprints to reprints@benthamscience.ae The Open Electrical & Electronic Engineering Journal, 2014, 8, 777-781 777 Open Access Analysis on Privacy and Reliability of Ad Hoc Network-Based

More information

The Pennsylvania State University. The Graduate School. College of Engineering PERFORMANCE ANALYSIS OF END-TO-END

The Pennsylvania State University. The Graduate School. College of Engineering PERFORMANCE ANALYSIS OF END-TO-END The Pennsylvania State University The Graduate School College of Engineering PERFORMANCE ANALYSIS OF END-TO-END SMALL SEQUENCE NUMBERS ROUTING PROTOCOL A Thesis in Computer Science and Engineering by Jang

More information

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724 ROUTING PROTOCOLS Dr. Ahmed Khattab EECE Department Cairo University Fall 2012 ELC 659/ELC724 Dr. Ahmed Khattab Fall 2012 2 Routing Network-wide process the determine the end to end paths that packets

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 3,

More information

Comparative Analysis of Routing Protocols AODV DSDV and DSR in MANET

Comparative Analysis of Routing Protocols AODV DSDV and DSR in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,

More information

Performance Analysis of AODV, DSR and OLSR Routing Protocols in WSN

Performance Analysis of AODV, DSR and OLSR Routing Protocols in WSN Performance Analysis of AODV, DSR and OLSR Routing Protocols in WSN Rajinder Kaur Research Scholar, Department of ECE Shaheed Bhagat Singh State Technical Campus, Moga Road ABSTRACT Real implementation

More information

Performance Comparison of AODV, DSDV and ZRP Routing Protocols

Performance Comparison of AODV, DSDV and ZRP Routing Protocols Performance Comparison of AODV, DSDV and ZRP Routing Protocols Ajay Singh 1, Anil yadav 2, Dr. mukesh Sharma 2 1 Research Scholar (M.Tech), Department of Computer Science, T.I.T&S, bhiwani 1 Faculty, Department

More information

Experimental evaluation of IEEE s path selection protocols in a mesh testbed

Experimental evaluation of IEEE s path selection protocols in a mesh testbed University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2010 Experimental evaluation of IEEE 802.11s path selection protocols

More information

Link Duration, Path Stability and Comparesion of MANET. Routing Protcols. Sanjay Kumar, Haresh Kumar and Zahid Yousif

Link Duration, Path Stability and Comparesion of MANET. Routing Protcols. Sanjay Kumar, Haresh Kumar and Zahid Yousif Link Duration, Path Stability and Comparesion of MANET Routing Protcols Sanjay Kumar, Haresh Kumar and Zahid Yousif A Bachelor thesis submitted to the Department of Electrical Engineering COMSATS Institute

More information

PERFORMANCE ANALYSIS OF UNICAST ROUTING PROTOCOL IN IEEE S WIRELESS MESH NETWORK

PERFORMANCE ANALYSIS OF UNICAST ROUTING PROTOCOL IN IEEE S WIRELESS MESH NETWORK PERFORMANCE ANALYSIS OF UNICAST ROUTING PROTOCOL IN IEEE 802.11S WIRELESS MESH NETWORK Aneri Fumtiwala 1, Himani Modi 2, Pinal Patel 3, Mrs.Payal T. Mahida 4 1,2,3,4 Department of Computer Science & Engineering

More information

ENHANCEMENT OF OLSR ROUTING PROTOCOL IN MANET Kanu Bala 1, Monika Sachdeva 2 1,2

ENHANCEMENT OF OLSR ROUTING PROTOCOL IN MANET Kanu Bala 1, Monika Sachdeva 2 1,2 ENHANCEMENT OF OLSR ROUTING PROTOCOL IN MANET Kanu Bala 1, Monika Sachdeva 2 1,2 CSE Department, SBSCET Ferozepur, Punjab Email: kanubala89@gmail.com 1, monika.sal@rediffmail.com 2 Abstract MANET stands

More information

Distributed Pruning Methods for Stable Topology Information Dissemination in Ad Hoc Networks

Distributed Pruning Methods for Stable Topology Information Dissemination in Ad Hoc Networks The InsTITuTe for systems research Isr TechnIcal report 2009-9 Distributed Pruning Methods for Stable Topology Information Dissemination in Ad Hoc Networks Kiran Somasundaram Isr develops, applies and

More information

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work

More information

Scalable Routing Protocols for Mobile Ad Hoc Networks

Scalable Routing Protocols for Mobile Ad Hoc Networks Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview

More information

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks.

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. Sanjit Kaul and Marco Gruteser WINLAB, Rutgers University. Ryokichi Onishi and Rama Vuyyuru Toyota InfoTechnology Center. ICVES 08 Sep 24 th

More information

A Consolidated Analysis of MANET Routing Protocols

A Consolidated Analysis of MANET Routing Protocols A Consolidated Analysis of MANET Routing Protocols Leelavathi School of IT, SEGI University leelavathiraj@segi.edu.my Raja Mohan School of IT, SEGI University rajamohanp@segi.edu.my Thinaharan.R School

More information

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network Performance comparison of AODV, DSDV and EE-DSDV routing algorithm for wireless sensor network Mohd.Taufiq Norhizat a, Zulkifli Ishak, Mohd Suhaimi Sauti, Md Zaini Jamaludin a Wireless Sensor Network Group,

More information

Papers. Ad Hoc Routing. Outline. Motivation

Papers. Ad Hoc Routing. Outline. Motivation CS 15-849E: Wireless Networks (Spring 2006) Ad Hoc Routing Discussion Leads: Abhijit Deshmukh Sai Vinayak Srinivasan Seshan Dave Andersen Papers Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms

More information

Wireless Internet Routing. IEEE s

Wireless Internet Routing. IEEE s Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:

More information

PERFORMANCE EVALUATION OF VARIOUS TRAFFIC LOADS IN MANET WITH AODV, OLSR AND DSR ROUTING PROTOCOLS

PERFORMANCE EVALUATION OF VARIOUS TRAFFIC LOADS IN MANET WITH AODV, OLSR AND DSR ROUTING PROTOCOLS PERFORMANCE EVALUATION OF VARIOUS TRAFFIC LOADS IN MANET WITH AODV, OLSR AND DSR ROUTING PROTOCOLS Puneet Mittal, Paramjeet Singh* and Shaveta Rani** Dept. of Computer Engg. Govt. Poly. College, Bathinda,

More information

GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu

GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT by Yi Zhu A thesis submitted to the Faculty of the University of Delaware in partial fulfillment of the requirements for the degree of Master of Science

More information

Dynamic Zonal Broadcasting for Effective Data Dissemination in VANET

Dynamic Zonal Broadcasting for Effective Data Dissemination in VANET Dynamic Zonal Broadcasting for Effective Data Dissemination in VANET Masters Project Final Report Author: Madhukesh Wali Email: mwali@cs.odu.edu Project Advisor: Dr. Michele Weigle Email: mweigle@cs.odu.edu

More information

Simulating AODV and DSDV For Adynamic Wireless Sensor Networks

Simulating AODV and DSDV For Adynamic Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.7, July 2010 219 Simulating AODV and DSDV For Adynamic Wireless Sensor Networks Fasee Ullah, Muhammad Amin and Hamid ul

More information

Exhaustive Study on the Infulence of Hello Packets in OLSR Routing Protocol

Exhaustive Study on the Infulence of Hello Packets in OLSR Routing Protocol International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 399-404 International Research Publications House http://www. irphouse.com /ijict.htm Exhaustive

More information

Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET.

Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET. Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET. Adel Aneiba, Mohammed Melad Department of Computer Networks and Communication Faculty of Information Technology,

More information

Data Dissemination in Wireless Sensor Networks

Data Dissemination in Wireless Sensor Networks Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks

More information

Simulation and Performance Analysis Evaluation for Variant MANET Routing Protocols

Simulation and Performance Analysis Evaluation for Variant MANET Routing Protocols Simulation and Performance Analysis Evaluation for Variant MANET Mrs. Assistant Lecturer, Technical College on Mosul, Mosul, Iraq, razan_alani@yahoo.com doi:10.4156/ijact.vol3. issue1.1 Abstract This paper

More information

Mobile Ad-Hoc Networks Part I. Based on presentation from Matthias Hollick (Technische Universität Darmstadt)

Mobile Ad-Hoc Networks Part I. Based on presentation from Matthias Hollick (Technische Universität Darmstadt) Mobile Ad-Hoc Networks Part I Thomas Plagemann Based on presentation from Matthias Hollick (Technische Universität Darmstadt) Outline Part I: Introduction and Motivation Terminology, Basics and Applications

More information

Analysis and Design of Link Metrics for Quality Routing in Wireless Multi-hop Networks

Analysis and Design of Link Metrics for Quality Routing in Wireless Multi-hop Networks Analysis and Design of Link Metrics for Quality Routing PhD Thesis Defense by Nadeem JAVAID Dec 15, 2010 Thesis Director Prof. Karim DJOUANI Jury : Rapporteur B.J. VAN WYK Prof. Tshwane University of Technology

More information

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA and Improvement with PCF in TORA using OPNET tool Anupam Sharma, Deepinderjeet Kaur Dhaliwal Desh Bhagat University Mandi Gobindgarh Punjab

More information

ENHANCEMENT OF LINK STABILITY USING RDGR IN VANET

ENHANCEMENT OF LINK STABILITY USING RDGR IN VANET ENHANCEMENT OF LINK STABILITY USING RDGR IN VANET D.Mithila 1, R.Revathy 2, Rozamber Marline 3, P.Sathiyanarayanan 4 4 Assistant professor, Department of Computer Science and Engineering, sathiyanarayanan89@gmail.com.

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

The application trends to the real systems of an Ad hoc network. Susumu MATSUI

The application trends to the real systems of an Ad hoc network. Susumu MATSUI The application trends to the real systems of an Ad hoc network Susumu MATSUI 1980 1990 1990 2000 1 1980 1) 1990 2) 1997 IETF MANET(Mobile Adhoc Network) WG 3) 2003 12 4) 2000 5) 1 2 2.1 1 Topology Base

More information

On Probability of Link Availability in Original and Modified AODV, FSR and OLSR Using and p

On Probability of Link Availability in Original and Modified AODV, FSR and OLSR Using and p 1 On Probability of Link Availability in Original and AODV, FSR and OLSR Using 82.11 and 82.11p S. Sagar, N. Javaid, J. Saqib, Z. A. Khan $, U. Qasim, M. A. Khan arxiv:1212.4244v1 [cs.ni] 18 Dec 212 COMSATS

More information

Performance Evaluation of a Hybrid Sensor and Vehicular Network to Improve Road Safety

Performance Evaluation of a Hybrid Sensor and Vehicular Network to Improve Road Safety 7th ACM PE-WASUN 2010 Performance Evaluation of a Hybrid Sensor and Vehicular Network to Improve Road Safety Carolina Tripp Barba, Karen Ornelas, Mónica Aguilar Igartua Telematic Engineering Dept. Polytechnic

More information

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu

More information

Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks

Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks The InsTITuTe for systems research Isr TechnIcal report 2009-8 Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks Kiran K. Somasundaram, John S. Baras Isr develops, applies and teaches

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes IN4181 Lecture 2 Ad-hoc and Sensor Networks Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes Outline: discuss impact of wireless Ad-hoc networks link layer: medium access control network layer:

More information

Performance Tuning of Failure Detectors in Wireless Ad-Hoc Networks: Modelling and Experiments

Performance Tuning of Failure Detectors in Wireless Ad-Hoc Networks: Modelling and Experiments Performance Tuning of Failure Detectors in Wireless Ad-Hoc Networks: Modelling and Experiments {Corine.Marchand,Jean-Marc.Vincent}@imag.fr Laboratoire ID-IMAG (UMR 5132), Projet Apache. MIRRA Project:

More information

Keywords mobile ad hoc network, fading, interference, shadowing, QualNet 6.1.

Keywords mobile ad hoc network, fading, interference, shadowing, QualNet 6.1. Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Effects of Shadowing,

More information

Performance characteristics of OLSR and AODV protocols in Wireless Mesh Network

Performance characteristics of OLSR and AODV protocols in Wireless Mesh Network Performance characteristics of OLSR and AODV protocols in Wireless Mesh Network Navtej Singh Sandhu 1, Navdeep Kaur Sandhu 2, Ashwinder Singh 3 M.Tech Student 1 Guru Nanak Dev University Amritsar, Assistant

More information

Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks

Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks 2009 First International Conference on Networks & Communications Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks Kiran K. Somasundaram, John S. Baras Institute of Systems Research

More information

Secure Ad-Hoc Routing Protocols

Secure Ad-Hoc Routing Protocols Secure Ad-Hoc Routing Protocols ARIADNE (A secure on demand RoutIng protocol for Ad-Hoc Networks & TESLA ARAN (A Routing protocol for Ad-hoc Networks SEAD (Secure Efficient Distance Vector Routing Protocol

More information

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1 ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,

More information

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network K.T. Sze, K.M. Ho, and K.T. Lo Abstract in this paper, we study the performance of a video-on-demand (VoD) system in wireless

More information

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute

More information

ExperimentswithOLSRRoutinginaMANET

ExperimentswithOLSRRoutinginaMANET ExperimentswithOLSRRoutinginaMANET Cédric Adjih, Pascale Minet, Thierry Plesse, Anis Laouiti, Adokoe Plakoo, Marc Badel, Paul Mühlethaler, Philippe Jacquet, and Jérome Lecomte INRIA, BP 105, Rocquencourt,

More information

Mobile and Sensor Systems. Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo

Mobile and Sensor Systems. Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo Mobile and Sensor Systems Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo In this lecture We will describe techniques to reprogram a sensor network while deployed. We describe

More information

LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR MULTI-HOP WIRELESS MESH NETWORKS

LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR MULTI-HOP WIRELESS MESH NETWORKS SHIV SHAKTI International Journal in Multidisciplinary and Academic Research (SSIJMAR) Vol. 2, No. 6, November- December (ISSN 2278 5973) LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR

More information

Introduction to Mesh

Introduction to Mesh Introduction to Mesh ICTP School on Radio-based Computer Networking February 24 th 2005 Tomas B. Krag wire.less.dk What is Mesh? "A mesh network is a network that employs one of two connection arrangements,

More information

OLSR Standards. Emmanuel BACCELLI. INRIA / Hitachi

OLSR Standards. Emmanuel BACCELLI. INRIA / Hitachi OLSR Standards Emmanuel BACCELLI INRIA / Hitachi Main Topics Standardization of OSLR Where are we at? What are we dealing with? The IETF. The future of OLSR Standards and Concepts. Example: MANET WG (Mobile

More information

EFFICIENT ROUTING IN AD HOC NETWORKS WITH DIRECTIONAL ANTENNAS

EFFICIENT ROUTING IN AD HOC NETWORKS WITH DIRECTIONAL ANTENNAS EFFICIENT ROUTING IN AD HOC NETWORKS WITH DIRECTIONAL ANTENNAS David L Rhodes OpCoast Brick, NJ ABSTRACT Increased mobility, connectivity and self-formation are the hallmarks of envisioned tactical communication

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS PERFORMANCE ANALYSIS OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS by Lee Kok Thong December 24 Thesis Advisor: Second Reader: Geoffrey Xie Su Wen

More information

Performance Analysis of Energy-aware Routing Protocols for Wireless Sensor Networks using Different Radio Models

Performance Analysis of Energy-aware Routing Protocols for Wireless Sensor Networks using Different Radio Models Performance Analysis of Energy-aware Routing Protocols for Wireless Sensor Networks using Different Radio Models Adamu Murtala Zungeru, Joseph Chuma and Mmoloki Mangwala Department of Electrical, Computer

More information

CROSS-LAYER DESIGNS FOR MITIGATING RANGE ATTACKS IN AD HOC NETWORKS

CROSS-LAYER DESIGNS FOR MITIGATING RANGE ATTACKS IN AD HOC NETWORKS CROSS-LAYER DESIGNS FOR MITIGATING RANGE ATTACKS IN AD HOC NETWORKS Jarmo V. E. Mölsä Communications Laboratory Helsinki University of Technology P.O. Box 3, FI-25 HUT, Finland email: jarmo.molsa@tkk.fi

More information

Wireless Mesh Networks

Wireless Mesh Networks Wireless Mesh Networks Renato Lo Cigno www.disi.unitn.it/locigno/teaching Part of this material (including some pictures) features and are freely reproduced from: Ian F.Akyildiz, Xudong Wang,Weilin Wang,

More information

ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)

ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM) ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM) ABSTRACT Sidi Ould CHEIKH Nouackchott University, Nouackchott, Mauritania The IEEE 802.11s Wireless Mesh Networks (WMN) is a new multi-hop

More information

Modeling Hop Length Distributions for Reactive Routing Protocols in One Dimensional MANETs

Modeling Hop Length Distributions for Reactive Routing Protocols in One Dimensional MANETs This full tet paper was peer reviewed at the direction of IEEE Communications Society subject matter eperts for publication in the ICC 27 proceedings. Modeling Hop Length Distributions for Reactive Routing

More information

Jamming Attacks with its Various Techniques and AODV in Wireless Networks

Jamming Attacks with its Various Techniques and AODV in Wireless Networks IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 4 Ver. II (Jul. Aug. 2016), PP 48-52 www.iosrjournals.org Jamming Attacks with its

More information

OSPF and MANET WG meetings, IETF64. OSPF MANET Design Team outbrief. November, Tom Henderson

OSPF and MANET WG meetings, IETF64. OSPF MANET Design Team outbrief. November, Tom Henderson OSPF and MANET WG meetings, IETF64 OSPF MANET Design Team outbrief November, 2005 Tom Henderson {thomas.r.henderson@boeing.com} Design team members: Emmanuel Baccelli, Madhavi Chandra, Thomas Clausen,

More information

Interlayer routing issues for wireless networks

Interlayer routing issues for wireless networks NRL Cross-Layer Workshop Interlayer routing issues for wireless networks June 2, 2004 Tom Henderson Marcelo Albuquerque Phil Spagnolo Jae H. Kim Boeing Phantom Works 1 Report Documentation Page Form Approved

More information

Lecture 8 Link-State Routing

Lecture 8 Link-State Routing 6998-02: Internet Routing Lecture 8 Link-State Routing John Ioannidis AT&T Labs Research ji+ir@cs.columbia.edu Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures 1-5, 7-8 are

More information

Antonis Panagakis, Athanasios Vaios, Ioannis Stavrakakis.

Antonis Panagakis, Athanasios Vaios, Ioannis Stavrakakis. Study of Two-Hop Message Spreading in DTNs Antonis Panagakis, Athanasios Vaios, Ioannis Stavrakakis WiOpt 2007 5 th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless

More information

Link State Routing in Wireless Ad-Hoc Networks

Link State Routing in Wireless Ad-Hoc Networks Link State Routing in Wireless Ad-Hoc Networks Cédric Adjih, Emmanuel Baccelli, Philippe Jacquet To cite this version: Cédric Adjih, Emmanuel Baccelli, Philippe Jacquet. Link State Routing in Wireless

More information

Chaitanya Kishor Reddi 1, Dr. S. Vijay Bhanu 2. Ph.D Scholar, Department of CSE Annamalai University, Annamalai Nagar, Tamil Nadu, India

Chaitanya Kishor Reddi 1, Dr. S. Vijay Bhanu 2. Ph.D Scholar, Department of CSE Annamalai University, Annamalai Nagar, Tamil Nadu, India International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 Comparisons Analysis of Routing Protocols (AODV,

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN ISSN 0976 6464(Print)

More information

Performance Evaluation of DSDV, OLSR and DYMO using and p MAC-Protocols

Performance Evaluation of DSDV, OLSR and DYMO using and p MAC-Protocols Performance Evaluation of DSDV, OLSR and DYMO using 82.11 and 82.11p MAC-Protocols Final Year Project Report Presented By Saad Wasiq CIIT/FA8-BET-96/ISB Muhammad Waqar Arshad CIIT/FA8-BET-87/ISB In Partial

More information

ENSC 427: Communica1on Networks

ENSC 427: Communica1on Networks ENSC 427: Communica1on Networks Spring 2014 Final Project Presenta1on Performance of Mobile Ad- Hoc Network Rou9ng Protocols Project website: hbp://www.sfu.ca/~rtariq/proj.html Tariq Rizvi (rtariq@sfu.ca)

More information

Modeling of data networks by example: NS-2 (III) Wireless Networks

Modeling of data networks by example: NS-2 (III) Wireless Networks Modeling of data networks by example: NS-2 (III) Wireless Networks Holger Füßler, Hannes Hartenstein Holger Füßler, Hannes Hartenstein Universität Mannheim, Universität Karlsruhe (TH) Summer 2004 Course

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February-2016 181 A NOVEL RANGE FREE LOCALIZATION METHOD FOR MOBILE SENSOR NETWORKS Anju Thomas 1, Remya Ramachandran 2 1

More information

Efficient UMTS. 1 Introduction. Lodewijk T. Smit and Gerard J.M. Smit CADTES, May 9, 2003

Efficient UMTS. 1 Introduction. Lodewijk T. Smit and Gerard J.M. Smit CADTES, May 9, 2003 Efficient UMTS Lodewijk T. Smit and Gerard J.M. Smit CADTES, email:smitl@cs.utwente.nl May 9, 2003 This article gives a helicopter view of some of the techniques used in UMTS on the physical and link layer.

More information

Empirical Probability Based QoS Routing

Empirical Probability Based QoS Routing Empirical Probability Based QoS Routing Xin Yuan Guang Yang Department of Computer Science, Florida State University, Tallahassee, FL 3230 {xyuan,guanyang}@cs.fsu.edu Abstract We study Quality-of-Service

More information

Phase Transition Phenomena in Wireless Ad Hoc Networks

Phase Transition Phenomena in Wireless Ad Hoc Networks Phase Transition Phenomena in Wireless Ad Hoc Networks Bhaskar Krishnamachari y, Stephen B. Wicker y, and Rámon Béjar x yschool of Electrical and Computer Engineering xintelligent Information Systems Institute,

More information

JADE: Jamming-Averse Routing on Cognitive Radio Mesh Networks

JADE: Jamming-Averse Routing on Cognitive Radio Mesh Networks JADE: Jamming-Averse Routing on Cognitive Radio Mesh Networks (Invited Paper) Yu Seung Kim, Bruce DeBruhl, and Patrick Tague Carnegie Mellon University Email: {yuseungk, bdebruhl, tague}@cmu.edu Abstract

More information

AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS

AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS Vicent J. Botti Navarro Grupo de Tecnología Informática- Inteligencia Artificial Departamento de Sistemas Informáticos y Computación

More information

RECENT era has seen the plenty of mobile networks

RECENT era has seen the plenty of mobile networks 1 Modeling Routing Overhead Generated by Wireless Reactive Routing Protocols Nadeem Javaid, Ayesha Bibi, Akmal Javaid, Shahzad A. Malik Department of lectrical ngineering, COMSAS Institute of Information

More information

Networks: how Information theory met the space and time. Philippe Jacquet INRIA Ecole Polytechnique France

Networks: how Information theory met the space and time. Philippe Jacquet INRIA Ecole Polytechnique France Networks: how Information theory met the space and time Philippe Jacquet INRIA Ecole Polytechnique France Plan of the talk History of networking and telecommunication Physics, mathematics, computer science

More information