Simulation and Performance Analysis Evaluation for Variant MANET Routing Protocols
|
|
- Dulcie Arnold
- 6 years ago
- Views:
Transcription
1 Simulation and Performance Analysis Evaluation for Variant MANET Mrs. Assistant Lecturer, Technical College on Mosul, Mosul, Iraq, doi: /ijact.vol3. issue1.1 Abstract This paper first describes characteristics of Mobile Ad hoc Networks (MANETs), and ir Routing protocol, and second a mobile ad hoc network (MANET) which consists of set mobile wireless nodes (25, 50, 75, and 100) and one fixed wireless server are design using OPNET Modeler The performance of this network under different routing protocol is analyzed by three metrics: delay, network load and throughput. The comparison analysis will carry out about se protocols and in last conclusion shows which routing protocol is best one for mobile ad hoc networks. 1. Introduction Keywords: MANET,, OPNET, AODV, TORA, DSR MANET stands for Mobile Ad hoc Network is a dynamic distributed system of arbitrarily moving wireless devices with limited battery power [1][2]. It is a decentralized autonomous wireless system which consists of free nodes. It is also sometimes called a mobile mesh network, and is a self configurable wireless network. A MANET consists of mobile nodes, a router with multiple hosts and wireless communication devices. The wireless communication devices are transmitters, receivers and smart antennas. These antennas can vary in many types, while nodes can be eir fixed or mobile. Node types are: mobile phone, laptop, personal digital assistance, MP3 player and personal computer. These nodes can be located in cars, ships, airplanes as well as small personal electronic devices [3]. Nodes can connect to each or randomly as well as forming arbitrary topologies. Nodes mselves can act like a router. The topology may also change frequently. Each user of node has freedom to move while communicating. One node can take packet from or node and transmit it to its neighboring node[4]. The ability of self configuration of se nodes makes m more suitable for urgently required network connections. For example in disaster hit areas where re is no communication infrastructure, and it is necessary to quickly obtain a communication infrastructure. MANET is a fast solution in any disaster situation. MANET is a spontaneous network. It is useful when dealing with wireless devices in which some of devices are part of network only for duration of a communication session. The MANET working group (WG) within Internet Engineering Task Force (IETF) works specifically on developing IP routing protocols topologies. Interest in MANETs is due to promise of ubiquitous connectivity beyond that currently being provided by Internet. Firstly, MANETs are easily deployed allowing a plug-and-communicate method of networking. Secondly, MANETs need no infrastructure [5], eliminating need for an infrastructure and reducing cost of establishing network. Moreover, such networks can be useful in disaster recovery where re is not enough time or resources to install and configure an infrastructure. Thirdly, MANETs do not need central management. Hence, y are used in military operations where units are moving around battle field and a central unit cannot be used for synchronization [6]. Potential applications of MANETinclude mobile conferencing, emergency services, disaster recovery, and battlefield operations[7] MANET have a dynamic nature, and are ideal as y have a large number of applications. Quick deployment and minimal configuration of MANET makes m suitable to use in emergencies such as natural disasters. The growth of technology and increase in Wi-Fi capable laptops, mobile phones, MP3 players and or small portable devices has created a genuine reason for population of MANET [8]. Ad hoc networks have two forms; one is static ad hoc networks (SANET), and or is called mobile ad hoc network (MANET). Commercial implementation of ad hoc networks has become possible due to development of new technology such as [9]
2 A number of MANET routing protocols were proposed in last decade. These protocols can be classified according to routing strategy that y follow to find a path (route) to destination. These protocols perform variously depending on type of traffic, number of nodes, rate of mobility, etc [5].Simulations provide a valuable means to compare different protocols and study ir performance in terms of efficiency and robustness. Indeed, network simulation environments such as ns-2, GloMoSim, Qualnet, and Opnet are most commonly used tools for evaluating and comparing performance of mobile ad hoc network (MANET) protocols. OPNET Modeler is used in this paper. It is a network simulator developed at Massachusetts Institute of Technology that can model and simulate communication networks, devices, and protocols. OPNET Modeler is based on a series of hierarchical editors that directly parallel structure of actual networks and protocols. OPNET Modeler shows animations of simulation status and graphs of simulation results estimated in this study, while references number 15 use Ns-2 and self similarity traffic for evolution of MANET Routing protocols. 2. in MANETs Routing protocols in MANET are divided into four categories: proactive, reactive, hierarchical and geographic routing protocols [10]. The most popular ones are AODV, DSR (reactive), OLSR (proactive) and GRP (geographic).reactive protocols like DSR and AODV find routes only when requested and data need to be transmitted by source host using distance-vector routing algorithms. Proactive protocols like OLSR are table driven protocols and use link state routing algorithms. Geographic routing protocols use node position (i.e., geographic coordinates) for data forwarding [10]. A node forwards a packet with considering its neighbors and destination physical positions. In se protocols packets are sent to known geographic coordinates of destination nodes [11]. We will focus in this paper on following MANET routing protocols: 2.1. DSR Dynamic Source Routing (DSR) DSR is an entirely on-demand ad hoc network routing protocol composed of two parts: Route Discovery and Route Maintenance[12]Dynamic Source Routing (DSR) is a reactive protocol that discovers and maintains routes between nodes on demand [13]. It relies on two main mechanisms, Route Discovery and Route Maintenance. In order to discover a route between two nodes, DSR floods network with a Route Request packet. This packet is forwarded only once by each node after concatenating its own address to path. When targeted node receives Route Request, it piggybacks a Route Reply to sender and a route is established. Each time a packet follows an established route, each node has to ensure that link is reliable between itself and next node. DSR provides three successive steps to perform this maintenance: link layer acknowledgment, passive acknowledgment and network layer acknowledgment. If a route is broken, n node which detects failure sends (by piggybacking) a Route Error packet to original sender [14] OLSR (Optimized Link State Routing) OLSR is a proactive routing protocol and is also called a table driven protocol because it permanently stores and updates its routing table. OLSR keeps track of its routing table in order to provide a route if needed. OLSR can be implemented in any ad hoc network. Due to its nature, OLSR is called a proactive routing protocol [4]. Based on definition and use of dedicated nodes, y are called multipoint relays (MPRs). MPRs are selected nodes which forward broadcast packets during flooding process. This technique allows reduction of packet overhead as compared to a pure flooding mechanism, where every node retransmits packet when it receives first copy. In contrast with classic link state algorithm, partial link state information is distributed into network [15]
3 2.3. Ad Hoc on-demand Distance Vector Routing (AODV) AODV provides on-demand route discovery in mobile ad hoc networks [16]. Like most reactive routing protocols, route finding is based on a route discovery cycle involving a broadcast network search and a uncast reply containing discovered paths. Similar to DSDV, AODV relies on per-node sequence numbers for loop freedom and for ensuring selection of most recent routing path. AODV nodes maintain a route table in which next-hop routing information for destination nodes is stored. Each routing table entry has an associated lifetime value. If a route is not utilized within lifetime period, route expires. Orwise, each time route is used, lifetime period is updated so that route is not prematurely deleted [17]. When a source node has data packets to send to some destination, it first checks its route table to determine wher it already has a route to destination. If such a route exists, it can use that route for data packet transmissions. Orwise, it must initiate a route discovery procedure to find a route [17] Temporally Ordered Routing Algorithm (TORA) TORA is anor source-initiated on-demand routing protocol, built on concept of link reversal of Directed Acyclic Graph (ACG) [18]. In addition to being loop-free and bandwidth-efficient, TORA has property of being highly adaptive and quick in route repair during link failure, while providing multiple routes for any desired source/destination pair. These features make it especially suitable for large highly dynamic mobile ad hoc environments with dense populations of nodes. The limitation in TORA s applicability comes from its reliance on synchronized clocks. If a node does not have a GPS positioning system or some or external time source, or if time source fails, algorithm cannot be used [17]. TORA is designed to operate in a highly dynamic mobile networking environment. It is sourceinitiated and provides multiple routes for any desired source destination pair. The key design concept of TORA is localization of control messages to a very small set of nodes near occurrence of a topological change. To accomplish this, nodes need to maintain routing information about adjacent (one-hop) nodes. The protocol performs three basic functions: Route creation, Route maintenance and Route erasure [19] 3. Performance Parameters OPNET modeler supports different parameters for measurement performance evaluation of MANET network under different routing protocols. These parameters have different behaviors for overall network performance [8]. We evaluate three parameters in our study on overall network performance. These parameters are delay, network load, and throughput Delay The packet end-to-end delay is time from generation of a packet by source up to destination reception, so this is time that a packet takes to go across network. This time is expressed in seconds (sec) [8] Network Load Network load represents total load in bit/sec submitted to wireless LAN layers by all higher layers in all WLAN nodes of network [20]. When re is more traffic coming into network, and it is difficult for network to handle all this traffic it is called network load. An efficient network can easily cope with large traffic coming in, and to make best possible network, many techniques have been introduced [8]
4 3.3. Throughput Throughput: Representing total data traffic in bits/sec successfully received and forwarded to higher layer by WLAN MAC [21] 4. The Simulation Methodology The Optimized Network Engineering Tool (OPNET v14.5) software used for simulations implemented in this paper. The first step is to create and design network. Figure (1) showss simulation environment of one scenario containing 25 mobile nodes and one fixed WLAN server running GRP. We used MANET model library provided by version 14.5, wlan_wkstn_adv node model which represents a workstation with client-server applications running over TCP/IP and UDP/IP. The workstation supports one underlying WLAN connection at 1 Mbps, 2 Mbps, 5.5 Mbps, and 11 Mbps. we configure entire node in scenario to work with 5.5 Mbps. The network size is of 1500 x 1500 meters. After that IPv4 addressing was assigned to all nodes. We use The Rx Group Config node to speed up simulation time. This scenario is used to compute set of possible receivers that a node can communicate with, so all possible receivers that have a channel match with transmitter channel(s), and fall within distance and path loss thresholds are receivers that a node can communicate with. It is configured to eliminate all receivers that are over 1500 meters away. The "Application Config" node is used to specify applications using available application types. FTP application type was chosen to all nodes in network with multiple FTP sessions, and FTP was selected as traffic High Load. We ran four scenarios, for each type of routing protocol, in every scenario re were 25, 50, 75 and 100 mobile nodes. Alll attributes remained same except for number of nodes, which was increased. The routing protocol of network also changed. Each scenario was run for 30 minutes (simulation time). The MANET network under AODV, DSR, OLSR, GRP, and TORA were tested against three parameters i.e. delay, network load and throughput. Figure 1. Simulating 25 Nodes Results_ The First Scenario for MANET 25 Nodes Throughput Figure (2) shows WLAN throughput for first scenario. The peak value of throughput when number of nodes is 25 under OLSR is equal to bit/sec and it remains constant along simulation period, under GRP equal to bits/sec but value degrades to bit/sec and remains approximately constant along simulation period. Under AODV, throughput were 0 until minute 8 of simulation period n value changed to peak value equals to bit/sec but it didn t remain constant along simulation period. Under DSR value of throughput like AODV was 0 until 7 minutes of simulation period n value changed to peak value equal to bit/sec but it didn t remain constant along simulation period. Under TORA value of throughput was 0 until 7 minutes of simulation period n value changed to peak - 4 -
5 15133bit/sec but it didn t remain constant along simulation period. Figure (2) shows a good stable throughput for MANET running OLSR as routing protocol of network. Figure 2. Wireless LAN Throughput in bit/sec for MANET 25 Nodes Delay Figure (3) shows delay of WLAN for first scenario. The value of delay when number of nodes is 25 under OLSR is smallest value and is equal to seconds and remains constant along simulation period. Under GRP, peak value was equal to seconds and re were very slight changes in GRP delay to value seconds and remained constant along simulation period. Under AODV, peak value of delay was seconds and remained constant to this value along simulation period. Under TORA, peak value of delay was equal to seconds and ree was a change in this value equal to seconds and remaining constant along simulation period. Under DSR, delay was at 7 minutes, n re were slight changes in DSR delay to peak value which remained constant to this value along simulation period Load Figure 3. Time Average in Wireless LAN Delay in sec for MANET 25 Nodes Figure (4) shows load of WLAN for first scenario. The value of load when number of nodes is 25 under OLSR is largest value with a peak value equal to bit/sec and remaining constant along simulation period. Under GRP, value of load start with its peak value equal to bit/sec and starting to decrease along simulation period to reach value 4137 bit/sec which remains constant to this value along simulation period. Under AODV, load begins with its smallest value which is equal to 0 until minute 7 of simulation period n starts to increase to reach its peak value equal to 3034 bit/sec and remaining constant along simulation period. Under TORA, load begins with its smallest value which is equal to 1048 bit/sec until minute 7 of simulation period n starts to increase to reach its peak value which is equal to 2985 bit/sec and - 5 -
6 remains constant along simulation period, under load begins with its smallest value equals to 0 until minute 7 of simulation period n startss to increase to reach its peak value equals to 2404 bit/sec and remains constant along simulation period. Figure 4. Time Average in Wireless LAN Load in bit/sec for MANET 25 Nodes The Second scenario for MANET 50 nodes Throughput Figure (5) shows WLAN throughput for second scenario. The peak value of throughput when number of nodes is 50 under OLSR is equal to bit/sec and remains constant along simulation period, and comparing this value with value of throughput for 25 nodes we notice a difference between two values. The value for 50 nodes is higher than throughput for 25 nodes, and this is because of increase in number of nodes. Under GRP, peak value of throughput is equal to bits/sec comparing with 25 nodes re is increase with value. This is of course because of increase in number of nodes, but value degrades to bit/sec and remains approximately constant along simulation period. Under AODV throughput was 0 until minute 6 of simulation period n value changed to peak value to be equal to 8629 bit/sec and remained constant along simulation period. Under TORA, value of throughput was equal to 5538 at starting of simulation period n increased to value 8401 bit/sec and remained constant along simulation period. Under DSR, value of throughput was 0 until 7 minutes of simulation period n value changed to peak 3855bit/sec and remained constant along simulation period. This figure showed a good stable throughput for MANET running OLSR as routing protocol of network and increased of this value. Figure 5. WLAN Throughput in bit/sec for MANET 50 Nodes - 6 -
7 4.2.2 Delay Figure (6) shows delay metric of WLAN for second scenario. The value of delay when number of nodes is 50 under OLSR is smallest value and is equal to seconds and remains constant along simulation period, but a slight increase in delay is noticed comparing with 25 nodes. Under GRP peak value is equal to seconds and re are very slight changes in GRP delay to seconds but it remains constant along simulation period. Under AODV peak value of delay was seconds at 6 minutes of simulation period. There was a slight decrease in value of AODV delay to reach seconds and it remained constant to this value along simulation period. Under TORA, peak value of delay was equal to seconds and re was a change in this value to equal seconds. Under DSR delay was at minute 6, but re was an increase in DSR delay to peak value seconds. Figure 6. Time Average in Wireless LAN Delay in sec for MANET 50 Nodes Load Figure (7) shows load of WLAN for second scenario. The value of load when number of nodes is 50 under OLSR is largest value with a peak value equal to bit/sec and remaining constant for simulation period. Under GRP, value of load starts with its peak value equal to bit/sec and starting to decrease along simulation period to reach value 7760 bit/sec and remaining constant to this value along simulation period. Under AODV, load begin with its smallest value equal to 0 until minute 7 of simulation period n starting to increase to reach its peak value equal to 4983bit/sec. Under TORA, load begins with a value equal to 3644 bit/sec n starting to increase to reach its peak value equal to 5956 bit/sec. Under DSR load begins with its smallest value equal to 0 until minute 6 of simulation period n starting to increase to reach its peak value equal to 3605 bit/sec and remaining constant along simulation period. Under AODV, load begins with its smallest value equal to 0 until minute 6 of simulation period n starting to increase to reach its peak value equal to 5209 bit/sec and remaining constant along simulation period. Figure 7. Time Average in WLAN Load in bit/sec for MANET 50 Nodes - 7 -
8 4.3.. The Third Scenario for MANET 75 Nodes Throughput Figure (8) shows WLAN throughput for third scenario. The peak value of throughput when number of nodes is 75 is under OLSR and is equal to /sec (starting with value bit/sec) and remaining constant along simulation period. Comparing this value with value of throughput for 50 nodes, we notice differences between two values. The throughput value for 75 nodes is higher than throughput for 50 nodes, and this is because of increase in number of nodes. Under GRP throughputt starts with value bits/sec and decreases to value bit/sec comparing with 50 nodes re are increase with value and this is of course because of increase in number of nodes. Under AODV, throughput was 0 until minute 3 of simulation period n value changed to peak value equal to 2637 bit/sec. The value n kept increasing to reach value 23162bit/sec and remained constant along simulation period. Under TORA, value of throughput was equal to bit/sec at start of simulation period n increased to value bit/sec and remained constant along simulation period. Under DSR, value of throughput was 0 until 6 minute of simulation period n value changed to become 518 bit/sec and kept increasing to reach to its peak value 7009 bit/sec and remained constant along simulation period. This figure showed a good stable throughput for MANET running OLSR as a routing protocol for network. Figure 8. WLAN Throughput in bit/sec for MANET 75 Nodes Delay Figure (9) shows delay of WLAN for third scenario. The value of delay when number of nodes is 75 under OLSR is smallest value and is equal to seconds and remains constant along simulation period. Under GRP delay value starts with seconds, n re are slight changes in GRP delay to value seconds which remains constant along simulation period. Under AODV, peak value of delay was seconds at minute 3 of simulation period. There is a slight decrease in value of AODV delay to reach second and remaining constant to this value along simulation period. Under TORA peak value of delay was equal to seconds at beginning of simulation period and re were changes in this value to decreasee along simulation period to reach value second. Under DSR, delay was at minute 6 n increased in DSR delay to reach to peak value second
9 Figure 9. Time Average in WLAN Delay in sec for MANET 75 Nodes Load Figure (10) shows load of WLAN for third scenario. The value of load when number of nodes is 75 under OLSR is largest value starting with bit/sec to reach peak value equal to bit/sec and remaining constant along simulation period. Under GRP value of load starts with its peak value equal to bit/sec and starts to decrease along simulation period to reach value bit/sec and remains constant to this value along simulation period. Under AODV, load begins with its smallest value equals to 0 until minute 3 of simulation period n starts to increase to reach its peak value equal to 8840 bit/sec. Under TORA, load begins with value equal to 8266 bit/ /sec n starts to increase to reach its peak value equal to bit/sec. Under DSR, load begins with its smallest value equal to 0 until minute 6 of simulation period n starts to increase to reach its peak value equal to 8820 bit/sec. Under AODV, load begins with its smallest value equal to 0 until minute 3 of simulation period n starts to increase to reach it peak value equal to 8790 bit/sec and remaining constant along simulation period. Figure 10. Time average in WLAN Load in bit/sec for MANET 75 nodes The Fourth scenario for MANET 100 nodes Throughput Figure (11) shows WLAN throughput for fourth scenario. The peak value of throughput when number of nodes is 100 under OLSR is equal to /sec (starting with value bit/sec) and remains constant along simulation period. Comparing this value with value of throughputt for 75 nodes, we notice a difference between two values. The throughput value for 100 nodes is higher than throughput for 75 nodes. This is because of increase in number of nodes. Under GRP, throughput starts with value bits/sec and decreases to value bit/sec. Comparing with 75 nodes re was an increase with throughput value, and this of - 9 -
10 course, is becausee of increase in number of nodes. Under AODV, throughput was 0 until minute 2 of simulation period n value changed to peak value equal to 2416 bit/sec and keeps increasing to reach value of 45508bit/sec and remain constant along simulation period. Under TORA value of throughput was bit/sec at start of simulation period n increased to value of bit/sec and remained constant along simulation period. Under DSR, value of throughput was 0 until minute 3 of simulation period n value changed to 1371 bit/sec and kept increasing to reach its peak value 12286bit/sec and remain constant along simulation period. This figure showed a good stable throughput for MANET running OLSR as routing protocol of network. Figure 11. Wireless LAN Throughput in bit/sec for MANET 100 nodes Delay Figure (12) shows delay of WLAN for fourth scenario. The value of delay when number of nodes is 100 under OLSR is smallest value and equal to second and remains constant along simulation period. Under GRP delay value starts at second and n slightly changes in GRP delay to value second and remains constant along simulation period. Under AODV, peak value of delay was second at minute 3 of simulation period, and n re was a slight decrease in value of AODV delay to reach second and remain constant to this value along simulation period. Under TORA, peak value of delay equals to second at begging of simulation period and re was change in this value to decrease along simulation period to reach value second. Under DSR, delay was at.63minutes n re was an increase in DSR delay to reach peak value second Load Figure 12. Time average in WLAN delay in sec for MANET 100 nodes Figure (13) shows load of WLAN for fourth scenario. The value of load when number of nodes is 100 under OLSR is largest value starting with bit/ /sec to reach peak value equal to bit/ /sec and remaining constant along simulation period. Under GRP, value of load starts with its peak value equal to bit/sec and starting to decrease along simulation period to reach value bit/sec and remaining constant to this value along
11 simulation period. Under AODV, load begins with its smallest value equal to 0 until minute 2 of simulation period n starting to increase to reach its peak value equal to bit/sec. Under TORA, load begins with value equal to bit/sec n starting to increase to reach its peak value equal to bit/sec. Under DSR, load begins with its smallest value equal to 0 until minute 3 of simulation period n starting to increasee to reach it peak value equal to bit/sec. Figure 13. Time average in Wireless LAN Load in bit/sec for MANET 1000 nodes 5. Conclusionss The simulation study of our paper for MANET network under five routing protocols AODV, DSR OLSR, TORA and GRP were deployed using FTP traffic analyzing. We checked behavior of se protocols with respect to three performance metrics: delay, network load and throughput. Figures of 2 to 13 show behavior of MANET under all routing protocols for different numbers of mobile nodes. Obviously some routing protocols performed better than ors. From above analysis of routing protocols, OLSR outperforms fourth AODV, DSR, TORRA and GRP in both delay and throughput. 6. References [1] [2] [3] [4] [5] [6] [7] [8] M. Gerl and J.T. Tsai, Multicluster, mobile, multimedia radio network ACM Wireless Networks Vol 1, No3,ppp , 1995 Natarajan Meghanthan," A Simulation-based Performance Analysis of Multicast Routing in Mobile Ad hoc Networks",International Journal of Informationn Processing and Management (IJIPM),Volume 1, Number 1, July 2010 Xiaogeng Zhao, An Adaptive Approach for Optimized Opportunistic Routing Over Delay Tolerant Mobile Ad Hoc Networks, Computer Science Department, Rhodes University, PhD sis, December 2007 M. G. Kaosar, H. M. Asif, T R. Sheltami, A. S. H. Mahmoud. Simulation-Based Comparative Study of On Demand for MANET. International Conference on Wireless Networking and Mobile Computing (ICWNMC'05) Chennai, India. Vol. 1, pp , 2005 S. Lee, J. Hsu, R. Hayashida, M. Gerla, and R. Bagrodia, Selecting a Routing Strategy for Your Ad Hoc Network, Computer Communications, vol. 26, no. 7, pp , May C. E. Perkins and P. Bhagwat. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers, ACM SIGCOMM Computer Communication Review, Vol 24, Isse 4, pp , October 1994 Wesam Almobaideen, Khaled Hushaidan, Azzam Sleit, Mohammad Qatawneh," A Cluster-Based Approach for Supporting QoS in Mobile Ad Hoc Networks", International Journal of Digital Content Technology and its Applications(JDCTA). Volume 5, Number 1, January 2011 Sajjad Ali & Asad Ali, Performance Analysis of AODV, DSR and OLSR in MANET, department of Electrical Engineering with emphasis on Telecommunication, Blekinge Institute of Technology Sweden, MSc Thesis,
12 [9] Hassan, A.M. Youssef, M.I. Zahra, M.M, Evaluation of Ad Hoc in Real Simulation Environments,Computer Engineering and Systems, The 2006 International Conference on, pp , [10] Hossein Ashtiani, Mohsen Nikpour and Hamed Moradipour, A Comprehensive Evaluation of for Ordinary and Large-Scale Wireless MANETs, nas, pp IEEE International Conference on Networking, Architecture, and Storage, 2009 [11] C.Mbarushimana and A. Shahrabi, Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad Hoc Networks, In Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops AINAW '07, Vol. 2, pp , May 2007 [12] Mamoun Hussein Mamoun,"A Secure DSR Routing Protocol for MANET ", Journal of Convergence Information Technology,(JCIT),Volume 4, Number 1, March 2009,pp3-10 [13]. Johnson, D. Maltz, Y.-C. Hu, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR) - Experimental RFC, IETF MANET Working Group. July Access Available from website: org/internet-drafts/draft-ietf-manet-dsr-10.txt [14] Stephane Maag, Cyril Grepet, Ana Cavalli, A formal validation methodology for MANET routing protocols based on nodes self similarity, Journal Computer Communications Vol. 31,Issue 4, pp , 5 March2008 [15] Maashri, A. and Ould-Khaoua, M., Performance analysis of MANET routing protocols in presence of self-similar traffic, In Proceedings of 31st IEEE Conference on Local Computer Networks, pp 14-16, November 2006, [16] Carlos Miguel,Tavares Calafate, Roman Garcia, Pietro Manzoni, Optimizing implementation of a MANET routing protocol in a heterogeneous environment, in Proceedings of Eighth IEEE International Symposium on Computers and Communication (ISCC 03).Vol. 1,pp ,2003 [17] C. E. Perkins and E. M. Royer, The Ad Hoc On-Demand Distance Vector Routing, In preceding of 2end IEEE Workshop on Mobile computing systems and Application,pp ,1999 [18] Stefano Basagni, Marco Conti, Silvia Giordano, Ivan Stojmenovic, Mobile Ad Hoc Networking, Willey- IEEE Press. April 2004 [19] V. D. Park and M. S. Corson, A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks, in Proceedings of INFOCOM 97, Sixteenth Annual Joint Conference of IEEE Computer and Communications Societies., pp , April 1997 [20] Belding-Royer, E.M., and C.-K. Toh, A Review of Current for Ad Hoc Mobile Wireless Networks, IEEE Personal Communications Magazine, Vol.6, Issue 2, pp ,1999. [21] Bin Abd. Latif, S. Rashid, M.A. Alam, Profiling Delay and Throughput Characteristics of Interactive Multimedia Traffic over WLANs using OPNET, 21st International Conference on Advanced Information Networking and Applications Workshops ( AINAW '07),Vol. 2,pp ,
Performance Evaluation of MANET Using Quality of Service Metrics
Performance Evaluation of MANET Using Quality of Service Metrics C.Jinshong Hwang 1, Ashwani Kush 2, Ruchika,S.Tyagi 3 1 Department of Computer Science Texas State University, San Marcos Texas, USA 2,
More informationPerformance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic
International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 67-71 Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic Dhiraj
More informationOverview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network
Ad Hoc and Wireless Mesh Networking Laura Marie Feeney lmfeeney@sics.se Datakommunikation III, HT 00 Overview Ad hoc and wireless mesh networks Ad hoc network (MANet) operates independently of network
More informationA Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks
A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT
More informationPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR 802.11P INCLUDING PROPAGATION MODELS Mit Parmar 1, Kinnar Vaghela 2 1 Student M.E. Communication Systems, Electronics & Communication Department, L.D. College
More informationInternational Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn:
Modified Route Maintenance in AODV Routing Protocol ChiragBhalodia (M.Tech, Research Scholar) 1, Prof. Amit M. Lathigara 2 Pg Scholar, Computer Engineering Department & R K University, chiragsbhalodia@gmail.com
More informationEnergy-Efficient MANET Routing: Ideal vs. Realistic Performance
Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:
More informationAdvanced Modeling and Simulation of Mobile Ad-Hoc Networks
Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Prepared For: UMIACS/LTS Seminar March 3, 2004 Telcordia Contact: Stephanie Demers Robert A. Ziegler ziegler@research.telcordia.com 732.758.5494
More informationMore Efficient Routing Algorithm for Ad Hoc Network
More Efficient Routing Algorithm for Ad Hoc Network ENSC 835: HIGH-PERFORMANCE NETWORKS INSTRUCTOR: Dr. Ljiljana Trajkovic Mark Wang mrw@sfu.ca Carl Qian chunq@sfu.ca Outline Quick Overview of Ad hoc Networks
More informationEVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS
EVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS 1 ALOK KUMAR JAGADEV, 2 BINOD KUMAR PATTANAYAK *, 3 AJIT KUMAR NAYAK, 4 MANOJRANJAN NAYAK Institute Of Technical Education And Research,
More informationPerformance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET.
Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET. Adel Aneiba, Mohammed Melad Department of Computer Networks and Communication Faculty of Information Technology,
More informationA Taxonomy for Routing Protocols in Mobile Ad Hoc Networks. Laura Marie Feeney Swedish Institute of Computer Science
A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks Laura Marie Feeney Swedish Institute of Computer Science http://www.sics.se/~lmfeeney Overview mobile ad hoc networks routing protocols communication
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University
More informationSurvey of MANET based on Routing Protocols
Survey of MANET based on Routing Protocols M.Tech CSE & RGPV ABSTRACT Routing protocols is a combination of rules and procedures for combining information which also received from other routers. Routing
More informationIMPROVED OLSR AND TORA ROUTING PROTOCOLS FOR MANETS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
More informationPerformance Comparison of AODV, DSDV and ZRP Routing Protocols
Performance Comparison of AODV, DSDV and ZRP Routing Protocols Ajay Singh 1, Anil yadav 2, Dr. mukesh Sharma 2 1 Research Scholar (M.Tech), Department of Computer Science, T.I.T&S, bhiwani 1 Faculty, Department
More informationDynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET
Latest Research Topics on MANET Routing Protocols Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET In this topic, the existing Route Repair method in AODV can be enhanced
More informationENHANCEMENT OF OLSR ROUTING PROTOCOL IN MANET Kanu Bala 1, Monika Sachdeva 2 1,2
ENHANCEMENT OF OLSR ROUTING PROTOCOL IN MANET Kanu Bala 1, Monika Sachdeva 2 1,2 CSE Department, SBSCET Ferozepur, Punjab Email: kanubala89@gmail.com 1, monika.sal@rediffmail.com 2 Abstract MANET stands
More informationPERFORMANCE EVALUATION OF AODV AND DSR IN FEASIBLE AND RANDOM PLACEMENT MODELS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.487
More informationScalable Routing Protocols for Mobile Ad Hoc Networks
Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview
More informationWireless Internet Routing. IEEE s
Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:
More informationVolume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 6.047 Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey
More informationPerformance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network
Performance comparison of AODV, DSDV and EE-DSDV routing algorithm for wireless sensor network Mohd.Taufiq Norhizat a, Zulkifli Ishak, Mohd Suhaimi Sauti, Md Zaini Jamaludin a Wireless Sensor Network Group,
More informationExhaustive Study on the Infulence of Hello Packets in OLSR Routing Protocol
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 399-404 International Research Publications House http://www. irphouse.com /ijict.htm Exhaustive
More informationEvaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models
Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models Rohit Kumar Department of Computer Sc. & Engineering Chandigarh University, Gharuan Mohali, Punjab
More informationAnalysis on Privacy and Reliability of Ad Hoc Network-Based in Protecting Agricultural Data
Send Orders for Reprints to reprints@benthamscience.ae The Open Electrical & Electronic Engineering Journal, 2014, 8, 777-781 777 Open Access Analysis on Privacy and Reliability of Ad Hoc Network-Based
More informationSimulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool
Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA and Improvement with PCF in TORA using OPNET tool Anupam Sharma, Deepinderjeet Kaur Dhaliwal Desh Bhagat University Mandi Gobindgarh Punjab
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 3,
More informationOLSR-L. Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig
OLSR-L 1 2 3 4 2 ROULA OLSR OLSR ROULA ROULA OLSR OLSR-L Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig Kazuyoshi Soga, 1 Tomoya Takenaka, 2 Yoshiaki Terashima,
More informationROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724
ROUTING PROTOCOLS Dr. Ahmed Khattab EECE Department Cairo University Fall 2012 ELC 659/ELC724 Dr. Ahmed Khattab Fall 2012 2 Routing Network-wide process the determine the end to end paths that packets
More informationPapers. Ad Hoc Routing. Outline. Motivation
CS 15-849E: Wireless Networks (Spring 2006) Ad Hoc Routing Discussion Leads: Abhijit Deshmukh Sai Vinayak Srinivasan Seshan Dave Andersen Papers Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms
More informationOLSR Standards. Emmanuel BACCELLI. INRIA / Hitachi
OLSR Standards Emmanuel BACCELLI INRIA / Hitachi Main Topics Standardization of OSLR Where are we at? What are we dealing with? The IETF. The future of OLSR Standards and Concepts. Example: MANET WG (Mobile
More informationSimulating AODV and DSDV For Adynamic Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.7, July 2010 219 Simulating AODV and DSDV For Adynamic Wireless Sensor Networks Fasee Ullah, Muhammad Amin and Hamid ul
More informationPERFORMANCE EVALUATION OF VARIOUS TRAFFIC LOADS IN MANET WITH AODV, OLSR AND DSR ROUTING PROTOCOLS
PERFORMANCE EVALUATION OF VARIOUS TRAFFIC LOADS IN MANET WITH AODV, OLSR AND DSR ROUTING PROTOCOLS Puneet Mittal, Paramjeet Singh* and Shaveta Rani** Dept. of Computer Engg. Govt. Poly. College, Bathinda,
More informationPERFORMANCE ANALYSIS OF UNICAST ROUTING PROTOCOL IN IEEE S WIRELESS MESH NETWORK
PERFORMANCE ANALYSIS OF UNICAST ROUTING PROTOCOL IN IEEE 802.11S WIRELESS MESH NETWORK Aneri Fumtiwala 1, Himani Modi 2, Pinal Patel 3, Mrs.Payal T. Mahida 4 1,2,3,4 Department of Computer Science & Engineering
More informationolsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra
olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work
More informationSensitivity Analysis of EADARP Multicast Protocol
www.ijcsi.org 273 Sensitivity Analysis of EADARP Multicast Protocol Dina Darwish Mutlimedia and Internet Department, International Academy for Engineering and Media Science 6 th October city, Egypt Abstract
More informationTRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS
TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS Juan Carlos García, Mari-Carmen Bañuls, Pablo Galdámez and Rubén Quintero Instituto Tecnológico de Informática, Universidad
More informationVulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR
5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden
More informationENHANCEMENT OF LINK STABILITY USING RDGR IN VANET
ENHANCEMENT OF LINK STABILITY USING RDGR IN VANET D.Mithila 1, R.Revathy 2, Rozamber Marline 3, P.Sathiyanarayanan 4 4 Assistant professor, Department of Computer Science and Engineering, sathiyanarayanan89@gmail.com.
More informationWireless Mesh Networks
Wireless Mesh Networks Renato Lo Cigno www.disi.unitn.it/locigno/teaching Part of this material (including some pictures) features and are freely reproduced from: Ian F.Akyildiz, Xudong Wang,Weilin Wang,
More informationLSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR MULTI-HOP WIRELESS MESH NETWORKS
SHIV SHAKTI International Journal in Multidisciplinary and Academic Research (SSIJMAR) Vol. 2, No. 6, November- December (ISSN 2278 5973) LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR
More informationMobile Ad-Hoc Networks Part I. Based on presentation from Matthias Hollick (Technische Universität Darmstadt)
Mobile Ad-Hoc Networks Part I Thomas Plagemann Based on presentation from Matthias Hollick (Technische Universität Darmstadt) Outline Part I: Introduction and Motivation Terminology, Basics and Applications
More informationGAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu
GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT by Yi Zhu A thesis submitted to the Faculty of the University of Delaware in partial fulfillment of the requirements for the degree of Master of Science
More informationEvaluating the performance of Mesh network protocols for disaster scenarios
Evaluating the performance of Mesh network protocols for disaster scenarios Maggie Chimbwanda Supervisor: Professor I. M. Venter Co-Supervisor: Dr W. D. Tucker Contents Mesh network introduction Project
More informationLink-state protocols and Open Shortest Path First (OSPF)
Fixed Internetworking Protocols and Networks Link-state protocols and Open Shortest Path First (OSPF) Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 0 ITIFN Objectives Describe the basic
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationA Consolidated Analysis of MANET Routing Protocols
A Consolidated Analysis of MANET Routing Protocols Leelavathi School of IT, SEGI University leelavathiraj@segi.edu.my Raja Mohan School of IT, SEGI University rajamohanp@segi.edu.my Thinaharan.R School
More informationPerformance Evaluation of a Video Broadcasting System over Wireless Mesh Network
Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network K.T. Sze, K.M. Ho, and K.T. Lo Abstract in this paper, we study the performance of a video-on-demand (VoD) system in wireless
More informationIN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes
IN4181 Lecture 2 Ad-hoc and Sensor Networks Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes Outline: discuss impact of wireless Ad-hoc networks link layer: medium access control network layer:
More informationThe Pennsylvania State University. The Graduate School. College of Engineering PERFORMANCE ANALYSIS OF END-TO-END
The Pennsylvania State University The Graduate School College of Engineering PERFORMANCE ANALYSIS OF END-TO-END SMALL SEQUENCE NUMBERS ROUTING PROTOCOL A Thesis in Computer Science and Engineering by Jang
More informationGeoMAC: Geo-backoff based Co-operative MAC for V2V networks.
GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. Sanjit Kaul and Marco Gruteser WINLAB, Rutgers University. Ryokichi Onishi and Rama Vuyyuru Toyota InfoTechnology Center. ICVES 08 Sep 24 th
More informationSecure Ad-Hoc Routing Protocols
Secure Ad-Hoc Routing Protocols ARIADNE (A secure on demand RoutIng protocol for Ad-Hoc Networks & TESLA ARAN (A Routing protocol for Ad-hoc Networks SEAD (Secure Efficient Distance Vector Routing Protocol
More informationThe application trends to the real systems of an Ad hoc network. Susumu MATSUI
The application trends to the real systems of an Ad hoc network Susumu MATSUI 1980 1990 1990 2000 1 1980 1) 1990 2) 1997 IETF MANET(Mobile Adhoc Network) WG 3) 2003 12 4) 2000 5) 1 2 2.1 1 Topology Base
More informationLink Duration, Path Stability and Comparesion of MANET. Routing Protcols. Sanjay Kumar, Haresh Kumar and Zahid Yousif
Link Duration, Path Stability and Comparesion of MANET Routing Protcols Sanjay Kumar, Haresh Kumar and Zahid Yousif A Bachelor thesis submitted to the Department of Electrical Engineering COMSATS Institute
More informationComparative Analysis of Routing Protocols AODV DSDV and DSR in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,
More informationMASTER THESIS. Ad Hoc Networks: Performance Evaluation Of Proactive, Reactive And Hybrid Routing Protocols In NS2
2010-08-23 Ad Hoc Networks: Performance Evaluation Of Proactive, Reactive And Hybrid Routing Protocols In NS2 Author Salar Askar Zada THESIS PROJECT Master program in Computer science Abstract No infrastructure,
More informationNAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS PERFORMANCE ANALYSIS OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS by Lee Kok Thong December 24 Thesis Advisor: Second Reader: Geoffrey Xie Su Wen
More informationENSC 427: Communica1on Networks
ENSC 427: Communica1on Networks Spring 2014 Final Project Presenta1on Performance of Mobile Ad- Hoc Network Rou9ng Protocols Project website: hbp://www.sfu.ca/~rtariq/proj.html Tariq Rizvi (rtariq@sfu.ca)
More informationIntroduction to Mesh
Introduction to Mesh ICTP School on Radio-based Computer Networking February 24 th 2005 Tomas B. Krag wire.less.dk What is Mesh? "A mesh network is a network that employs one of two connection arrangements,
More informationEfficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases.
Biomedical Research 2017; Special Issue: S315-S320 ISSN 0970-938X www.biomedres.info Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases. Deepa R 1*, Sutha J
More informationOptimal Multicast Routing in Ad Hoc Networks
Mat-2.108 Independent esearch Projects in Applied Mathematics Optimal Multicast outing in Ad Hoc Networks Juha Leino 47032J Juha.Leino@hut.fi 1st December 2002 Contents 1 Introduction 2 2 Optimal Multicasting
More informationKeywords mobile ad hoc network, fading, interference, shadowing, QualNet 6.1.
Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Effects of Shadowing,
More informationSimple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas
Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas Muhammad Irfan Rafique, Marco Porsch, Thomas Bauschert Chair for Communication Networks, TU Chemnitz irfan.rafique@etit.tu-chemnitz.de
More informationChapter 1 Introduction
Chapter 1 Introduction 1.1Motivation The past five decades have seen surprising progress in computing and communication technologies that were stimulated by the presence of cheaper, faster, more reliable
More informationA Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks
A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu
More informationInterlayer routing issues for wireless networks
NRL Cross-Layer Workshop Interlayer routing issues for wireless networks June 2, 2004 Tom Henderson Marcelo Albuquerque Phil Spagnolo Jae H. Kim Boeing Phantom Works 1 Report Documentation Page Form Approved
More informationON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM) ABSTRACT Sidi Ould CHEIKH Nouackchott University, Nouackchott, Mauritania The IEEE 802.11s Wireless Mesh Networks (WMN) is a new multi-hop
More information第 XVII 部 災害時における情報通信基盤の開発
XVII W I D E P R O J E C T 17 1 LifeLine Station (LLS) WG LifeLine Station (LLS) WG was launched in 2008 aiming for designing and developing an architecture of an information package for post-disaster
More informationIntroduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1
ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,
More informationPerformance characteristics of OLSR and AODV protocols in Wireless Mesh Network
Performance characteristics of OLSR and AODV protocols in Wireless Mesh Network Navtej Singh Sandhu 1, Navdeep Kaur Sandhu 2, Ashwinder Singh 3 M.Tech Student 1 Guru Nanak Dev University Amritsar, Assistant
More informationPerformance Analysis of AODV, DSR and OLSR Routing Protocols in WSN
Performance Analysis of AODV, DSR and OLSR Routing Protocols in WSN Rajinder Kaur Research Scholar, Department of ECE Shaheed Bhagat Singh State Technical Campus, Moga Road ABSTRACT Real implementation
More informationAnalysis and Design of Link Metrics for Quality Routing in Wireless Multi-hop Networks
Analysis and Design of Link Metrics for Quality Routing PhD Thesis Defense by Nadeem JAVAID Dec 15, 2010 Thesis Director Prof. Karim DJOUANI Jury : Rapporteur B.J. VAN WYK Prof. Tshwane University of Technology
More informationM U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic
M U LT I C A S T C O M M U N I C AT I O N S Tarik Cicic 9..08 O V E R V I E W One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic
More informationCROSS-LAYER DESIGNS FOR MITIGATING RANGE ATTACKS IN AD HOC NETWORKS
CROSS-LAYER DESIGNS FOR MITIGATING RANGE ATTACKS IN AD HOC NETWORKS Jarmo V. E. Mölsä Communications Laboratory Helsinki University of Technology P.O. Box 3, FI-25 HUT, Finland email: jarmo.molsa@tkk.fi
More informationKeywords - Ad-hoc Networks, TCP variants, Routing Protocols, AODV, DSR.
Applications (IJERA) ISSN: 224-922 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.12-1 Performance Evaluation Of Congestion Control Tcp Variants In Vanet Using Omnet++ Ravinder Kaur*, Gurpreet
More informationSmart Antenna Techniques and Their Application to Wireless Ad Hoc Networks. Plenary Talk at: Jack H. Winters. September 13, 2005
Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks Plenary Talk at: Jack H. Winters September 13, 2005 jwinters@motia.com 12/05/03 Slide 1 1 Outline Service Limitations Smart Antennas
More informationWireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale
Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks
More informationSense in Order: Channel Selection for Sensing in Cognitive Radio Networks
Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationINTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN ISSN 0976 6464(Print)
More informationSemiring Pruning for Information Dissemination in Mobile Ad Hoc Networks
2009 First International Conference on Networks & Communications Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks Kiran K. Somasundaram, John S. Baras Institute of Systems Research
More informationCS 457 Lecture 16 Routing Continued. Spring 2010
CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing
More informationResource Optimization in Video Transmission Using Manet for Defence
European Journal of Applied Sciences 9 (2): 57-61, 2017 ISSN 2079-2077 IDOSI Publications, 2017 DOI: 10.5829/idosi.ejas.2017.57.61 Resource Optimization in Video Transmission Using Manet for Defence 1
More informationIntroduction to Local and Wide Area Networks
Introduction to Local and Wide Area Networks Lecturers Amnach Khawne Jirasak Sittigorn Chapter 1 1 Routing Protocols and Concepts Chapter 10 : Link-State Routing Protocols Chapter 11 : OSPF Chapter 1 2
More informationT. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University
Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer
More informationAN AUTONOMOUS SIMULATION BASED SYSTEM FOR ROBOTIC SERVICES IN PARTIALLY KNOWN ENVIRONMENTS
AN AUTONOMOUS SIMULATION BASED SYSTEM FOR ROBOTIC SERVICES IN PARTIALLY KNOWN ENVIRONMENTS Eva Cipi, PhD in Computer Engineering University of Vlora, Albania Abstract This paper is focused on presenting
More informationModeling Hop Length Distributions for Reactive Routing Protocols in One Dimensional MANETs
This full tet paper was peer reviewed at the direction of IEEE Communications Society subject matter eperts for publication in the ICC 27 proceedings. Modeling Hop Length Distributions for Reactive Routing
More informationReliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks
Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks Giuseppe Anastasi Pervasive Computing & Networking Lab () Dept. of Information Engineering, University of Pisa E-mail:
More informationDetection and Prevention of Physical Jamming Attacks in Vehicular Environment
Detection and Prevention of Physical Jamming Attacks in Vehicular Environment M-Tech Student 1 Mahendri 1, Neha Sawal 2 Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal,
More informationA REVIEW OF AD-HOC NETWORK
A REVIEW OF AD-HOC NETWORK Dr. N. Elamathi Asst. Professor, Dept.of Computer Science Trinity college for Women, Namakkal Dt., Tamilnadu, India ABSTRACT ---- This paper focus on the study of Ad hoc network
More informationIEEE based Wireless Mesh Network Testbed
IEEE 802.11-based Wireless Mesh Network Testbed Heecheol Song, Bong Chan Kim, Jae Young Lee, and Hwang Soo Lee Division of Electrical Engineering, School of EECS, KAIST 373-1, Guseong-dong, Yuseong-gu,
More informationAchieving Network Consistency. Octav Chipara
Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures
More informationAvoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks
Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute
More informationAd Hoc Networks - Routing and Security Issues
Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)
More informationCapacity Enhancement in Wireless Networks using Directional Antennas
Capacity Enhancement in Wireless Networks using Directional Antennas Sedat Atmaca, Celal Ceken, and Ismail Erturk Abstract One of the biggest drawbacks of the wireless environment is the limited bandwidth.
More informationDiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers
DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,
More informationCollaborative transmission in wireless sensor networks
Collaborative transmission in wireless sensor networks Cooperative transmission schemes Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg
More informationFault-tolerant Coverage in Dense Wireless Sensor Networks
Fault-tolerant Coverage in Dense Wireless Sensor Networks Akshaye Dhawan and Magdalena Parks Department of Mathematics and Computer Science, Ursinus College, 610 E Main Street, Collegeville, PA, USA {adhawan,
More informationSCAM: Scenario-based Clustering Algorithm for Mobile Ad Hoc networks. V. S. Anitha & M. P. Sebastian National Institute of Technology Calicut Kerala
SCAM: Scenario-based Clustering Algorithm for Mobile Ad Hoc networks V. S. Anitha & M. P. Sebastian National Institute of Technology Calicut Kerala 07.01.2009 Contents Introduction Related works Design
More information