Mobile Ad-Hoc Networks Part I. Based on presentation from Matthias Hollick (Technische Universität Darmstadt)

Size: px
Start display at page:

Download "Mobile Ad-Hoc Networks Part I. Based on presentation from Matthias Hollick (Technische Universität Darmstadt)"

Transcription

1 Mobile Ad-Hoc Networks Part I Thomas Plagemann Based on presentation from Matthias Hollick (Technische Universität Darmstadt) Outline Part I: Introduction and Motivation Terminology, Basics and Applications Ad Hoc vs. the Internet Model Understanding Ad Hoc Routing Characteristics of Ad Hoc Communication Ad Hoc Routing Paradigms Part II: Selected Ad Hoc Routing Protocols The Ad Hoc On-demand Distance Vector Protocol (AODV) Dynamic Source Routing (DSR) Location Aided Routing (LAR) Optimized Links-State Routing (OLSR) Current Research Optimized forwarding in MANETs Problem and Solution Space 3 1

2 Goal & Contents Goals Identify and highlight application requirements for Mobile Ad Hoc Networks (MANET) Understand the MANET ecosystem : mobility, user density, etc. Derive requirements for MANET routing Contents (1) Terminology and Definitions (2) Basic Operation of MANETs (3) Application scenarios for MANETs (4) Mobility characteristics and feasibility of MANETs (5) Requirements for MANET routing 4 The Promise of Ad Hoc Networks Networking without infrastructure [Source: [Source: 5 2

3 Terminology and Paradigms Ad hoc often improvised or impromptu; an ad hoc committee meeting Wordnet formed or used for specific or immediate problems or needs; ad hoc solutions fashioned from whatever is immediately available: improvised; large ad hoc parades and demonstrations Encyclopædia Britannica Spontaneous arising from a momentary impulse controlled and directed internally; self-acting produced without being planted or without human labor; indigenous developing without apparent external influence, force, cause, or treatment Encyclopædia Britannica 6 Basics (Mobile) Ad Hoc Communication Networks - MANET Historical successor of packet radio networks Self-organizing, mobile and wireless nodes Absence of infrastructure, multi-hop routing necessary Systems are both, terminals (end-systems) and routers (nodes) Constraints (dynamics, energy, bandwidth, link asymmetry 7 3

4 Traditional Wired Networks endsystem (source) router endsystem (destination) separation between endsystems and routers routers responsible for finding stable path 8 [M. Ammar, Co-Next 2005] Mobile Ad-hoc Wireless Networks node (source) node (destination) node = endsystem + router no separation between endsystems and routers nodes responsible for finding stable path 9 [M. Ammar, Co-Next 2005] 4

5 Mobile Ad-hoc Wireless Networks node (source) node (destination) nodes may move routing layer responsible for reconstructing (repairing) stable paths when movement occurs 10 [M. Ammar, Co-Next 2005] The MANET Wireless Paradigm The Network is Connected There exists a (possibly multi-hop) path from any source to any destination The path exists for a long-enough period of time to allow meaningful communication If the path is disrupted it can be repaired in short order Looks like the Internet above the network layer 11 [M. Ammar, Co-Next 2005] 5

6 Wireless Mesh Network 12 Ad Hoc vs. The Internet Model User Demands Spontaneous App. Behavior P2P App. Characteristics Service Discovery Disconnected Operations Ad Hoc Routing Distributed Medium Access Wireless Communication WWW IPtel IMS..." SMTP HTTP RTP..." TCP UDP " " IP" " ethernet" CSMA sonet..." copper fiber radio..." New Apps. Name Resolution Gateway Discovery Addressing Power Control User / Device Mobility Absence of Infrastructure 13 6

7 Peer to Peer vs. Ad Hoc 14 Peer to Peer vs. Ad Hoc P2P Relevant resources located at nodes at the edges ("peers") Variable connectivity is the norm e.g. does it support dial-up users with variable IP addresses Combined Client and Server functionality for all end system nodes also for intermediate nodes Peers with significant autonomy e.g. storage / processing done by autonomous end-systems Direct data transfer between peers e.g. more-or-less no central control Content locations widely distributed and most often replicated 15 7

8 Peer to Peer vs. Ad Hoc (cont.) Ad Hoc and P2P share paradigms Ad Hoc focuses on network level and below P2P focuses on application level Coexistence of Ad Hoc and P2P is possible / synergetic 16 Applications Military applications Battlefield communication (soldiers, tanks, planes, ) Smart dust (sensor networks to detect chemical, biological threats) Civilian applications Vehicular environment (telematics, car to car communication, taxi cab network, ) Entertainment (filesharing, gaming,... in train, car, plane, school, ) Event support (conferences, sport-events, exhibitions, meetings, lectures) Home networking / Personal Area Networking (VCR, DVD, home entertainment, remote control, cell phone, laptop, watch, ) Disaster recovery (emergency services, ambulance, police, ) Smart dust (sensor networks for civilian applications) Ubiquitous computers with short-range interactions (embedded systems, smart buildings/artefacts, ) Cellular range extension, moveable base stations (UMTS, WLAN, 17 WMAN, ) 8

9 Applications (cont.) 18 (Source: Daimler Chrysler) [ 19 9

10 Outline Part I: Introduction and Motivation Terminology, Basics and Applications Ad Hoc vs. the Internet Model Understanding Ad Hoc Routing Characteristics of Ad Hoc Communication Ad Hoc Routing Paradigms Part II: Selected Ad Hoc Routing Protocols The Ad Hoc On-demand Distance Vector Protocol (AODV) Dynamic Source Routing (DSR) Location Aided Routing (LAR) Optimized Links-State Routing (OLSR) Current Research Optimized forwarding in MANETs Problem and Solution Space 20 Characteristics of Ad Hoc Communications Characteristics are dominated by heterogeneity and variability Mobility characteristics (speed, predictability, uniformity, synthetic vs. empirical models, ) Wireless characteristics (broadcast nature of the net, packet losses due to transmission errors, limited range, hidden and exposed terminals, partitioning) Application / traffic characteristics and patterns (P2P, real time, unicast, multicast, geocast, CBR, VBR, self-similar, ) System characteristics (distribution, absence of infrastructure, (unpredictable) high dynamics, (a)symmetry ) Inherent heterogeneity Do nodes have identical capabilities, responsibilities, and constraints? Transmission ranges and radios may differ, battery life may differ, processing capacity may differ, (asymmetric capabilities) Only some nodes may route packets, some nodes may act as leaders of nearby nodes, e.g. cluster head (asymmetric responsibilities) 21 Adaptation is crucial 10

11 Mobility Characteristics Synthetic Random waypoint Select a random destination (within the specified area) Select a random speed (0 < v max_speed) Move After reaching the destination, pause a random time (0 < p max_pause_time) 22 Example User Mobility: What is Realistic? 10 nodes? 100 nodes? 1000 nodes? nodes? 4000m x 3000m 1000m 1 m/s à 1000s 5 m/s à 200s 20m/s à 50s 1000m x 1000m, 333 nodes 11

12 Macroscopic Workload / Mobility Model Synthetic mobility models (see demo) Easy to use Strict separation from traffic models Unrealistic for large scenarios (e.g. random waypoint) Empirical workload / mobility models Data is hard to obtain Can often not be separated in mobility vs. traffic Available for past scenarios (may not be generalized easily) Hybrid workload / mobility model (synthetic traffic, empirical mobility) (see demo) Pros: flexibility, realism Cons: lots of parameters, data is hard to obtain Trade-off 24 Demo of Mobility Models Synthetic mobility model e.g. random walk, random waypoint Demo: ANSim, see

13 Wireless Characteristics Wireless signal strength Transmit power Loss over distance (falls off by d 2 ) Shadowing (e.g. absorption by walls) Multi-path (e.g. bouncing off of metal objects) 26 Wireless Characteristics (cont.) Figure 4-26.(a)The hidden terminal problem. (b) The exposed station problem 27 [Source: A. Tanenbaum Computer Networks] 13

14 Why specialized Ad Hoc Routing Within MANETs Some nodes may be out of range of others Must use other peer nodes as routers to forward packets Need to find new routes as nodes move or conditions change (highly dynamic and unpredictable) Routing protocol captures and distributes state of network Routing strategy (algorithm) computes shortest paths 28 Requirements for Ad Hoc Routing The routing protocol needs to Converge fast Minimize signaling overhead The routing strategy (algorithm) may include Shortest distance Minimum delay Minimum loss Minimum congestion (load-balancing) Minimal interference Maximum stability of routes or maximal signal strength Minimum energy (power aware routing) Standard Internet routing cannot fulfill these requirements Assumes infrastructure, assumes symmetrical conditions, assumes plenty of resources, to slow, misses metrics, 29 14

15 Ad Hoc Routing Paradigms Flooding of Data Packets Simple approach, extremely high overhead Many protocols perform (limited) flooding of control packets To discover routes Overhead of control packet flooding is amortized over data packets transmitted between consecutive control packet floods Uniform Protocols Topology-based (e.g. source routing) Destination-based (usually distance vector paradigm) Proactive (table-driven) vs. reactive (on-demand) paradigms Trade-off latency vs. overhead Non-Uniform Protocols Hierarchical protocols, Cluster-based, flat protocols Geographical protocols Hybrid protocols (e.g. combination of proactive and reactive) There is no silver bullet to ad hoc routing 30 Taxonomy of Routing Protocols Based on [Feeney 99] 31 15

16 Some Routing Protocols / Frameworks AODV - Ad Hoc On Demand Distance Vector (Perkins, NOKIA; Belding-Royer, UCSB; Das, UC) CEDAR - Core-Extraction Distributed Ad Hoc Routing DREAM - Distance Routing Effect Algorithm for Mobility DSDV - Destination-Sequenced Distance Vector DSR - Dynamic Source Routing (Johnson, CMU) FSR - Fisheye State Routing LANMAR - Landmark Ad Hoc Routing LAR - Location Aided Routing OLSR - Optimized Link State Routing (Clausen, Jacquet, INRIA) TBRPF - Topology Broadcast based on Reverse-Path Forwarding (Ogier,Templin, SRI) Tora / IMEP - Temporally-Ordered Routing Algorithm / Internet Manet Encapsulation Protocol ZRP - Zone Routing Protocol (Haas, Cornell) see also 32 Mobile Ad-Hoc Networks Part II Thomas Plagemann Based on presentation from Matthias Hollick (Technische Universität Darmstadt) 16

17 Outline Part I: Introduction and Motivation Terminology, Basics and Applications Ad Hoc vs. the Internet Model Understanding Ad Hoc Routing Characteristics of Ad Hoc Communication Ad Hoc Routing Paradigms Part II: Selected Ad Hoc Routing Protocols The Ad Hoc On-demand Distance Vector Protocol (AODV) Dynamic Source Routing (DSR) Location Aided Routing (LAR) Optimized Links-State Routing (OLSR) Current Research Optimized forwarding in MANETs Problem and Solution Space 34 Goal of this Lecture & Contents of this Module Goals Discuss working of selected MANET routing protocols/paradigms Explain the detailed working of the discussed routing protocols Understand trade-offs in choosing appropriate routing protocols Contents (1) The Ad Hoc On-demand Distance Vector Protocol (AODV) (2) Dynamic Source Routing (DSR) (3) Location Aided Routing (LAR) (4) Optimized Links-State Routing (OLSR) 35 17

18 Ad hoc On-demand Distance Vector Protocol (AODV) Reactive routing protocol All nodes are treated equal Based on distance vector principle Route discovery cycle for route finding Flooded / Broadcast Route Request (RREQ) Unicast Route Reply (RREP) along reverse path of RREQ Unicast Route Error (RERR) No overhead on data packets Loop freedom is achieved through sequence numbers, also solves count to infinity problem Status Implementations available (IPv4, IPv6) Interoperability testing (successful) 36 Experimental RFC status issued (July 2003) Routing Table Fields Destination IP address Destination Sequence Number Valid Destination Sequence Number Flag Other state and routing flags Network Interface Hop Count (needed to reach destination) Next Hop Precursor List Lifetime (route expiration or deletion time) 37 18

19 AODV Route Discovery Overview Route discovery Broadcast flood acquisition using Route Request (RREQ) A RREQ must never be broadcast more than once by any node Nodes sets up a reverse path pointing towards the source Route Reply (RREP) propagation D S 38 Route Request (RREQ) Message When node S wants to send a message to node D, S searches its route table for a route to D. If there is no route, S initiates a RREQ message with the following components : The IP addresses of S and D The current sequence number of S and the last known sequence number of D A broadcast ID from S. This broadcast ID is incremented each time S sends a RREQ message. [Source: Dr. R. B. Patel CSE 302-manet-aodv] 39 19

20 Processing a RREQ Message The <broadcast ID, IP address> pair of the source S forms a unique identifier for the RREQ. Suppose a node P receives the RREQ from S. P first checks whether it has received this RREQ before. Each node stores the <broadcast ID, IPaddress> pairs for all the recent RREQs it has received. [Source: Dr. R. B. Patel CSE 302-manet-aodv] 40 Processing a RREQ Message (cont.) S Q P D If P has seen this RREQ from S already, P discards the RREQ. Otherwise, P processes the RREQ : P sets up a reverse route entry in its route table for the source S. This entry contains the IP address and current sequence number of S, number of hops to S and the address of the neighbour from whom P got the RREQ. [Source: Dr. R. B. Patel CSE 302-manet-aodv] 41 20

21 Lifetime of a Route-Table Entry A lifetime is associated with the entry in the route table. This is an important feature of AODV. If a route entry is not used within the specified lifetime, it is deleted. A route is maintained only when it is used. A route that is unused for a long time is assumed to be stale. [Source: Dr. R. B. Patel CSE 302-manet-aodv] 42 Route Requests in AODV Y S E Z A B H C I G F K J M D N L Represents a node that has received RREQ for D from S [Source: Dr. R. B. Patel CSE 302-manet-aodv] 43 21

22 Route Requests in AODV (cont.) Broadcast transmission Y Z A B H S C I E G F K J M D N L Represents transmission of RREQ 44 [Source: Dr. R. B. Patel CSE 302-manet-aodv] Route Requests in AODV (cont.) Y Z A B H S C I E G F K J M D N L Represents links on Reverse Path [Source: Dr. R. B. Patel CSE 302-manet-aodv] 45 22

23 Route Requests in AODV (cont.) Y Z A B H S C I E G F K J M D N L Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once [Source: Dr. R. B. Patel CSE 302-manet-aodv] 46 Reverse Path Setup in AODV Y Z A B H S C I E G F K J M D N L [Source: Dr. R. B. Patel CSE 302-manet-aodv] 47 23

24 Reverse Path Setup in AODV A nodes replies to a RREQ with RREP if there is a route to D with sequence number sequence number in RREQ If D responds it includes in RREP IP address of S and D Current sequence number Hop count := 0 Length of time the route is valid If any other node responds it includes in RREP IP address of S and D Record of destination s sequence number Hop count := distance from destination Calculated length of time route to destination will be valid 48 Reverse Path Setup in AODV Y Z S E A B H C I G F K J D M N L Node D does not forward RREQ, because node D is the intended target of the RREQ [Source: Dr. R. B. Patel CSE 302-manet-aodv] 49 24

25 Forward Path Setup in AODV Intermediate nodes set-up up a forwarding path entry when they receive RREP IP address of destination IP address of neighbor the RREP arrived from Hop count to destination Lifetime := lifetime in RREP Forward RREP towards S If multiple RREPs for one destination are received Process and forward the first one Handle later RREPs only if it contains a greater destination sequence number or a smaller hop count 50 Forward Path Setup in AODV Y Z S E A B H C I G F K J D M N L Forward links are setup when RREP travels along the reverse path Represents a link on the forward path [Source: Dr. R. B. Patel CSE 302-manet-aodv] 51 25

26 AODV Route Maintenance Timers to keep route alive A routing table entry maintaining a reverse path is purged after a timeout interval Timeout should be long enough to allow RREP to come back A routing table entry maintaining a forward path is purged if not used for a active_route_timeout interval If no data is being sent using a particular routing table entry, that entry will be deleted from the routing table (even if the route may actually still be valid) Destination Sequence numbers to determine fresh routes To avoid using old/broken routes To prevent formation of loops B E C D A 52 AODV Route Error Link failure reporting / repairing routes When node X is unable to forward packet P (from node S to node D) on link (X,Y), it generates a Route Error (RERR) message Node X increments the destination sequence number for D cached at node X The incremented sequence number N is included in the RERR, which is sent out based upon precursor lists When node S receives the RERR, it initiates a new route discovery for D using destination sequence number at least as large as N S X Y D 53 26

27 Additional Features of AODV Target networks Where routing churn is high enough that proactively maintaining routes is unproductive, and that can absorb a network wide broadcast rate The authors claim scalability up to 10,000 nodes (performance suffers, simulation results) Multiple optimizations AODV-LR - Local Repair AODV-ESP - Expanding-Ring Search Multi-path extension proposed (AODVM, AOMDV) Multiple open issues Security QoS Protocol needs operational experience to discover further issues 54 Concluding Quiz Why MANETs? Principles of MANETs? Difference between P2P & MANETs? How to evaluate MANETs? Which classes of routing protocols? What are the key ideas of AODV? How does the ring search work? 55 27

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network Ad Hoc and Wireless Mesh Networking Laura Marie Feeney lmfeeney@sics.se Datakommunikation III, HT 00 Overview Ad hoc and wireless mesh networks Ad hoc network (MANet) operates independently of network

More information

A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks. Laura Marie Feeney Swedish Institute of Computer Science

A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks. Laura Marie Feeney Swedish Institute of Computer Science A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks Laura Marie Feeney Swedish Institute of Computer Science http://www.sics.se/~lmfeeney Overview mobile ad hoc networks routing protocols communication

More information

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:

More information

International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn:

International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn: Modified Route Maintenance in AODV Routing Protocol ChiragBhalodia (M.Tech, Research Scholar) 1, Prof. Amit M. Lathigara 2 Pg Scholar, Computer Engineering Department & R K University, chiragsbhalodia@gmail.com

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Prepared For: UMIACS/LTS Seminar March 3, 2004 Telcordia Contact: Stephanie Demers Robert A. Ziegler ziegler@research.telcordia.com 732.758.5494

More information

Survey of MANET based on Routing Protocols

Survey of MANET based on Routing Protocols Survey of MANET based on Routing Protocols M.Tech CSE & RGPV ABSTRACT Routing protocols is a combination of rules and procedures for combining information which also received from other routers. Routing

More information

Wireless Internet Routing. IEEE s

Wireless Internet Routing. IEEE s Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:

More information

More Efficient Routing Algorithm for Ad Hoc Network

More Efficient Routing Algorithm for Ad Hoc Network More Efficient Routing Algorithm for Ad Hoc Network ENSC 835: HIGH-PERFORMANCE NETWORKS INSTRUCTOR: Dr. Ljiljana Trajkovic Mark Wang mrw@sfu.ca Carl Qian chunq@sfu.ca Outline Quick Overview of Ad hoc Networks

More information

Scalable Routing Protocols for Mobile Ad Hoc Networks

Scalable Routing Protocols for Mobile Ad Hoc Networks Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview

More information

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT

More information

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 6.047 Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey

More information

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR 802.11P INCLUDING PROPAGATION MODELS Mit Parmar 1, Kinnar Vaghela 2 1 Student M.E. Communication Systems, Electronics & Communication Department, L.D. College

More information

Papers. Ad Hoc Routing. Outline. Motivation

Papers. Ad Hoc Routing. Outline. Motivation CS 15-849E: Wireless Networks (Spring 2006) Ad Hoc Routing Discussion Leads: Abhijit Deshmukh Sai Vinayak Srinivasan Seshan Dave Andersen Papers Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms

More information

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724 ROUTING PROTOCOLS Dr. Ahmed Khattab EECE Department Cairo University Fall 2012 ELC 659/ELC724 Dr. Ahmed Khattab Fall 2012 2 Routing Network-wide process the determine the end to end paths that packets

More information

Wireless Mesh Networks

Wireless Mesh Networks Wireless Mesh Networks Renato Lo Cigno www.disi.unitn.it/locigno/teaching Part of this material (including some pictures) features and are freely reproduced from: Ian F.Akyildiz, Xudong Wang,Weilin Wang,

More information

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET Latest Research Topics on MANET Routing Protocols Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET In this topic, the existing Route Repair method in AODV can be enhanced

More information

Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic

Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 67-71 Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic Dhiraj

More information

Performance Comparison of AODV, DSDV and ZRP Routing Protocols

Performance Comparison of AODV, DSDV and ZRP Routing Protocols Performance Comparison of AODV, DSDV and ZRP Routing Protocols Ajay Singh 1, Anil yadav 2, Dr. mukesh Sharma 2 1 Research Scholar (M.Tech), Department of Computer Science, T.I.T&S, bhiwani 1 Faculty, Department

More information

OLSR Standards. Emmanuel BACCELLI. INRIA / Hitachi

OLSR Standards. Emmanuel BACCELLI. INRIA / Hitachi OLSR Standards Emmanuel BACCELLI INRIA / Hitachi Main Topics Standardization of OSLR Where are we at? What are we dealing with? The IETF. The future of OLSR Standards and Concepts. Example: MANET WG (Mobile

More information

A Consolidated Analysis of MANET Routing Protocols

A Consolidated Analysis of MANET Routing Protocols A Consolidated Analysis of MANET Routing Protocols Leelavathi School of IT, SEGI University leelavathiraj@segi.edu.my Raja Mohan School of IT, SEGI University rajamohanp@segi.edu.my Thinaharan.R School

More information

Analysis and Design of Link Metrics for Quality Routing in Wireless Multi-hop Networks

Analysis and Design of Link Metrics for Quality Routing in Wireless Multi-hop Networks Analysis and Design of Link Metrics for Quality Routing PhD Thesis Defense by Nadeem JAVAID Dec 15, 2010 Thesis Director Prof. Karim DJOUANI Jury : Rapporteur B.J. VAN WYK Prof. Tshwane University of Technology

More information

GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu

GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT by Yi Zhu A thesis submitted to the Faculty of the University of Delaware in partial fulfillment of the requirements for the degree of Master of Science

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS PERFORMANCE ANALYSIS OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS by Lee Kok Thong December 24 Thesis Advisor: Second Reader: Geoffrey Xie Su Wen

More information

PERFORMANCE ANALYSIS OF UNICAST ROUTING PROTOCOL IN IEEE S WIRELESS MESH NETWORK

PERFORMANCE ANALYSIS OF UNICAST ROUTING PROTOCOL IN IEEE S WIRELESS MESH NETWORK PERFORMANCE ANALYSIS OF UNICAST ROUTING PROTOCOL IN IEEE 802.11S WIRELESS MESH NETWORK Aneri Fumtiwala 1, Himani Modi 2, Pinal Patel 3, Mrs.Payal T. Mahida 4 1,2,3,4 Department of Computer Science & Engineering

More information

Performance Evaluation of MANET Using Quality of Service Metrics

Performance Evaluation of MANET Using Quality of Service Metrics Performance Evaluation of MANET Using Quality of Service Metrics C.Jinshong Hwang 1, Ashwani Kush 2, Ruchika,S.Tyagi 3 1 Department of Computer Science Texas State University, San Marcos Texas, USA 2,

More information

EVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS

EVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS EVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS 1 ALOK KUMAR JAGADEV, 2 BINOD KUMAR PATTANAYAK *, 3 AJIT KUMAR NAYAK, 4 MANOJRANJAN NAYAK Institute Of Technical Education And Research,

More information

Link Duration, Path Stability and Comparesion of MANET. Routing Protcols. Sanjay Kumar, Haresh Kumar and Zahid Yousif

Link Duration, Path Stability and Comparesion of MANET. Routing Protcols. Sanjay Kumar, Haresh Kumar and Zahid Yousif Link Duration, Path Stability and Comparesion of MANET Routing Protcols Sanjay Kumar, Haresh Kumar and Zahid Yousif A Bachelor thesis submitted to the Department of Electrical Engineering COMSATS Institute

More information

The Pennsylvania State University. The Graduate School. College of Engineering PERFORMANCE ANALYSIS OF END-TO-END

The Pennsylvania State University. The Graduate School. College of Engineering PERFORMANCE ANALYSIS OF END-TO-END The Pennsylvania State University The Graduate School College of Engineering PERFORMANCE ANALYSIS OF END-TO-END SMALL SEQUENCE NUMBERS ROUTING PROTOCOL A Thesis in Computer Science and Engineering by Jang

More information

PERFORMANCE EVALUATION OF VARIOUS TRAFFIC LOADS IN MANET WITH AODV, OLSR AND DSR ROUTING PROTOCOLS

PERFORMANCE EVALUATION OF VARIOUS TRAFFIC LOADS IN MANET WITH AODV, OLSR AND DSR ROUTING PROTOCOLS PERFORMANCE EVALUATION OF VARIOUS TRAFFIC LOADS IN MANET WITH AODV, OLSR AND DSR ROUTING PROTOCOLS Puneet Mittal, Paramjeet Singh* and Shaveta Rani** Dept. of Computer Engg. Govt. Poly. College, Bathinda,

More information

Comparative Analysis of Routing Protocols AODV DSDV and DSR in MANET

Comparative Analysis of Routing Protocols AODV DSDV and DSR in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,

More information

IMPROVED OLSR AND TORA ROUTING PROTOCOLS FOR MANETS

IMPROVED OLSR AND TORA ROUTING PROTOCOLS FOR MANETS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,

More information

PERFORMANCE EVALUATION OF AODV AND DSR IN FEASIBLE AND RANDOM PLACEMENT MODELS

PERFORMANCE EVALUATION OF AODV AND DSR IN FEASIBLE AND RANDOM PLACEMENT MODELS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.487

More information

LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR MULTI-HOP WIRELESS MESH NETWORKS

LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR MULTI-HOP WIRELESS MESH NETWORKS SHIV SHAKTI International Journal in Multidisciplinary and Academic Research (SSIJMAR) Vol. 2, No. 6, November- December (ISSN 2278 5973) LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 3,

More information

Modeling of data networks by example: NS-2 (III) Wireless Networks

Modeling of data networks by example: NS-2 (III) Wireless Networks Modeling of data networks by example: NS-2 (III) Wireless Networks Holger Füßler, Hannes Hartenstein Holger Füßler, Hannes Hartenstein Universität Mannheim, Universität Karlsruhe (TH) Summer 2004 Course

More information

A REVIEW OF AD-HOC NETWORK

A REVIEW OF AD-HOC NETWORK A REVIEW OF AD-HOC NETWORK Dr. N. Elamathi Asst. Professor, Dept.of Computer Science Trinity college for Women, Namakkal Dt., Tamilnadu, India ABSTRACT ---- This paper focus on the study of Ad hoc network

More information

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work

More information

On Probability of Link Availability in Original and Modified AODV, FSR and OLSR Using and p

On Probability of Link Availability in Original and Modified AODV, FSR and OLSR Using and p 1 On Probability of Link Availability in Original and AODV, FSR and OLSR Using 82.11 and 82.11p S. Sagar, N. Javaid, J. Saqib, Z. A. Khan $, U. Qasim, M. A. Khan arxiv:1212.4244v1 [cs.ni] 18 Dec 212 COMSATS

More information

Babel A flexible routing protocol

Babel A flexible routing protocol Babel A flexible routing protocol Juliusz Chroboczek PPS Université Paris-Diderot (Paris 7) 11 March 2014 1/33 The story In December 2006, I started on a quest to bring wifi to the Ph.D. students couch:

More information

Link-state protocols and Open Shortest Path First (OSPF)

Link-state protocols and Open Shortest Path First (OSPF) Fixed Internetworking Protocols and Networks Link-state protocols and Open Shortest Path First (OSPF) Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 0 ITIFN Objectives Describe the basic

More information

Performance characteristics of OLSR and AODV protocols in Wireless Mesh Network

Performance characteristics of OLSR and AODV protocols in Wireless Mesh Network Performance characteristics of OLSR and AODV protocols in Wireless Mesh Network Navtej Singh Sandhu 1, Navdeep Kaur Sandhu 2, Ashwinder Singh 3 M.Tech Student 1 Guru Nanak Dev University Amritsar, Assistant

More information

Interlayer routing issues for wireless networks

Interlayer routing issues for wireless networks NRL Cross-Layer Workshop Interlayer routing issues for wireless networks June 2, 2004 Tom Henderson Marcelo Albuquerque Phil Spagnolo Jae H. Kim Boeing Phantom Works 1 Report Documentation Page Form Approved

More information

Simulating AODV and DSDV For Adynamic Wireless Sensor Networks

Simulating AODV and DSDV For Adynamic Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.7, July 2010 219 Simulating AODV and DSDV For Adynamic Wireless Sensor Networks Fasee Ullah, Muhammad Amin and Hamid ul

More information

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes IN4181 Lecture 2 Ad-hoc and Sensor Networks Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes Outline: discuss impact of wireless Ad-hoc networks link layer: medium access control network layer:

More information

Ad Hoc Networks - Routing and Security Issues

Ad Hoc Networks - Routing and Security Issues Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)

More information

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network Performance comparison of AODV, DSDV and EE-DSDV routing algorithm for wireless sensor network Mohd.Taufiq Norhizat a, Zulkifli Ishak, Mohd Suhaimi Sauti, Md Zaini Jamaludin a Wireless Sensor Network Group,

More information

Secure Ad-Hoc Routing Protocols

Secure Ad-Hoc Routing Protocols Secure Ad-Hoc Routing Protocols ARIADNE (A secure on demand RoutIng protocol for Ad-Hoc Networks & TESLA ARAN (A Routing protocol for Ad-hoc Networks SEAD (Secure Efficient Distance Vector Routing Protocol

More information

ENHANCEMENT OF LINK STABILITY USING RDGR IN VANET

ENHANCEMENT OF LINK STABILITY USING RDGR IN VANET ENHANCEMENT OF LINK STABILITY USING RDGR IN VANET D.Mithila 1, R.Revathy 2, Rozamber Marline 3, P.Sathiyanarayanan 4 4 Assistant professor, Department of Computer Science and Engineering, sathiyanarayanan89@gmail.com.

More information

Keywords mobile ad hoc network, fading, interference, shadowing, QualNet 6.1.

Keywords mobile ad hoc network, fading, interference, shadowing, QualNet 6.1. Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Effects of Shadowing,

More information

MASTER THESIS. Ad Hoc Networks: Performance Evaluation Of Proactive, Reactive And Hybrid Routing Protocols In NS2

MASTER THESIS. Ad Hoc Networks: Performance Evaluation Of Proactive, Reactive And Hybrid Routing Protocols In NS2 2010-08-23 Ad Hoc Networks: Performance Evaluation Of Proactive, Reactive And Hybrid Routing Protocols In NS2 Author Salar Askar Zada THESIS PROJECT Master program in Computer science Abstract No infrastructure,

More information

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA and Improvement with PCF in TORA using OPNET tool Anupam Sharma, Deepinderjeet Kaur Dhaliwal Desh Bhagat University Mandi Gobindgarh Punjab

More information

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models Rohit Kumar Department of Computer Sc. & Engineering Chandigarh University, Gharuan Mohali, Punjab

More information

Configuring OSPF. Information About OSPF CHAPTER

Configuring OSPF. Information About OSPF CHAPTER CHAPTER 22 This chapter describes how to configure the ASASM to route data, perform authentication, and redistribute routing information using the Open Shortest Path First (OSPF) routing protocol. The

More information

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR 5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden

More information

Performance Analysis of AODV, DSR and OLSR Routing Protocols in WSN

Performance Analysis of AODV, DSR and OLSR Routing Protocols in WSN Performance Analysis of AODV, DSR and OLSR Routing Protocols in WSN Rajinder Kaur Research Scholar, Department of ECE Shaheed Bhagat Singh State Technical Campus, Moga Road ABSTRACT Real implementation

More information

CS 457 Lecture 16 Routing Continued. Spring 2010

CS 457 Lecture 16 Routing Continued. Spring 2010 CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing

More information

Analysis on Privacy and Reliability of Ad Hoc Network-Based in Protecting Agricultural Data

Analysis on Privacy and Reliability of Ad Hoc Network-Based in Protecting Agricultural Data Send Orders for Reprints to reprints@benthamscience.ae The Open Electrical & Electronic Engineering Journal, 2014, 8, 777-781 777 Open Access Analysis on Privacy and Reliability of Ad Hoc Network-Based

More information

Sensitivity Analysis of EADARP Multicast Protocol

Sensitivity Analysis of EADARP Multicast Protocol www.ijcsi.org 273 Sensitivity Analysis of EADARP Multicast Protocol Dina Darwish Mutlimedia and Internet Department, International Academy for Engineering and Media Science 6 th October city, Egypt Abstract

More information

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic M U LT I C A S T C O M M U N I C AT I O N S Tarik Cicic 9..08 O V E R V I E W One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic

More information

Evaluating the performance of Mesh network protocols for disaster scenarios

Evaluating the performance of Mesh network protocols for disaster scenarios Evaluating the performance of Mesh network protocols for disaster scenarios Maggie Chimbwanda Supervisor: Professor I. M. Venter Co-Supervisor: Dr W. D. Tucker Contents Mesh network introduction Project

More information

Data Dissemination in Wireless Sensor Networks

Data Dissemination in Wireless Sensor Networks Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks

More information

Propagating Trust in Ad-hoc Networks for Reliable Routing

Propagating Trust in Ad-hoc Networks for Reliable Routing Propagating Trust in Ad-hoc Networks for Reliable Routing Asad Amir Pirzada, Amitava Datta and Chris McDonald School of Computer Science & Software Engineering The University of Western Australia Sequence

More information

Performance Evaluation of DSDV, OLSR and DYMO using and p MAC-Protocols

Performance Evaluation of DSDV, OLSR and DYMO using and p MAC-Protocols Performance Evaluation of DSDV, OLSR and DYMO using 82.11 and 82.11p MAC-Protocols Final Year Project Report Presented By Saad Wasiq CIIT/FA8-BET-96/ISB Muhammad Waqar Arshad CIIT/FA8-BET-87/ISB In Partial

More information

The application trends to the real systems of an Ad hoc network. Susumu MATSUI

The application trends to the real systems of an Ad hoc network. Susumu MATSUI The application trends to the real systems of an Ad hoc network Susumu MATSUI 1980 1990 1990 2000 1 1980 1) 1990 2) 1997 IETF MANET(Mobile Adhoc Network) WG 3) 2003 12 4) 2000 5) 1 2 2.1 1 Topology Base

More information

PSA-HD: Path Selection Algorithm based on Hamming Distance to Enhance the Link Stability in Mobile Ad-hoc Networks

PSA-HD: Path Selection Algorithm based on Hamming Distance to Enhance the Link Stability in Mobile Ad-hoc Networks Received: September, 07 59 PSA-HD: Path Selection Algorithm based on Hamming Distance to Enhance the Link Stability in Mobile Ad-hoc Networks Calduwel Newton Pitchai * Nismon Rio Robert Department of Computer

More information

CS649 Sensor Networks IP Lecture 9: Synchronization

CS649 Sensor Networks IP Lecture 9: Synchronization CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization

More information

NETWORK CONNECTIVITY FOR IoT. Hari Balakrishnan. Lecture #5 6.S062 Mobile and Sensor Computing Spring 2017

NETWORK CONNECTIVITY FOR IoT. Hari Balakrishnan. Lecture #5 6.S062 Mobile and Sensor Computing Spring 2017 NETWORK CONNECTIVITY FOR IoT Hari Balakrishnan Lecture #5 6.S062 Mobile and Sensor Computing Spring 2017 NETWORKING: GLUE FOR THE IOT IoT s technology push from the convergence of Embedded computing Sensing

More information

ENHANCEMENT OF OLSR ROUTING PROTOCOL IN MANET Kanu Bala 1, Monika Sachdeva 2 1,2

ENHANCEMENT OF OLSR ROUTING PROTOCOL IN MANET Kanu Bala 1, Monika Sachdeva 2 1,2 ENHANCEMENT OF OLSR ROUTING PROTOCOL IN MANET Kanu Bala 1, Monika Sachdeva 2 1,2 CSE Department, SBSCET Ferozepur, Punjab Email: kanubala89@gmail.com 1, monika.sal@rediffmail.com 2 Abstract MANET stands

More information

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network K.T. Sze, K.M. Ho, and K.T. Lo Abstract in this paper, we study the performance of a video-on-demand (VoD) system in wireless

More information

Performance Comparison of AODV and OLSR in VANETs Urban Environments under Realistic Mobility Patterns

Performance Comparison of AODV and OLSR in VANETs Urban Environments under Realistic Mobility Patterns Performance Comparison of AODV and OLSR in VANETs Urban Environments under Realistic Mobility Patterns Jérôme Haerri Institut Eurécom Department of Mobile Communications B.P. 93 694, Sophia Antipolis,

More information

Link State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01

Link State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01 Link State Routing Stefano Vissicchio UCL Computer Science CS 335/GZ Reminder: Intra-domain Routing Problem Shortest paths problem: What path between two vertices offers minimal sum of edge weights? Classic

More information

Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET.

Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET. Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET. Adel Aneiba, Mohammed Melad Department of Computer Networks and Communication Faculty of Information Technology,

More information

AODV and GPSR in a realistic VANET context. Jonathan Ledy, Benoît Hilt, Hervé Boeglen, Anne-Marie Poussard, Frédéric Drouhin, Rodolphe Vauzelle

AODV and GPSR in a realistic VANET context. Jonathan Ledy, Benoît Hilt, Hervé Boeglen, Anne-Marie Poussard, Frédéric Drouhin, Rodolphe Vauzelle 1 AODV and GPSR in a realistic VANET context Jonathan Ledy, Benoît Hilt, Hervé Boeglen, Anne-Marie Poussard, Frédéric Drouhin, Rodolphe Vauzelle 2 Summary The VANETs context AODV & GPSR Performance comparison

More information

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1 ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,

More information

OLSR-L. Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig

OLSR-L. Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig OLSR-L 1 2 3 4 2 ROULA OLSR OLSR ROULA ROULA OLSR OLSR-L Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig Kazuyoshi Soga, 1 Tomoya Takenaka, 2 Yoshiaki Terashima,

More information

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute

More information

Modeling Hop Length Distributions for Reactive Routing Protocols in One Dimensional MANETs

Modeling Hop Length Distributions for Reactive Routing Protocols in One Dimensional MANETs This full tet paper was peer reviewed at the direction of IEEE Communications Society subject matter eperts for publication in the ICC 27 proceedings. Modeling Hop Length Distributions for Reactive Routing

More information

Agenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime

Agenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime CITI Wireless Sensor Networks in a Nutshell Séminaire Internet du Futur, ASPROM Paris, 24 octobre 2012 Prof. Fabrice Valois, Université de Lyon, INSA-Lyon, INRIA fabrice.valois@insa-lyon.fr 1 Agenda A

More information

Exhaustive Study on the Infulence of Hello Packets in OLSR Routing Protocol

Exhaustive Study on the Infulence of Hello Packets in OLSR Routing Protocol International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 399-404 International Research Publications House http://www. irphouse.com /ijict.htm Exhaustive

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Impact of Radio Irregularity on Wireless Sensor Networks

Impact of Radio Irregularity on Wireless Sensor Networks Impact of Radio Irregularity on Wireless Sensor Networks Gang Zhou, Tian He, Sudha Krishnamurthy, John A. Stankovic Department of Computer Science University of Virginia, Charlottesville, VA 2293 {gz5d,

More information

Link State Routing. Brad Karp UCL Computer Science. CS 3035/GZ01 3 rd December 2013

Link State Routing. Brad Karp UCL Computer Science. CS 3035/GZ01 3 rd December 2013 Link State Routing Brad Karp UCL Computer Science CS 33/GZ 3 rd December 3 Outline Link State Approach to Routing Finding Links: Hello Protocol Building a Map: Flooding Protocol Healing after Partitions:

More information

Control issues in cognitive networks. Marko Höyhtyä and Tao Chen CWC-VTT-Gigaseminar 4th December 2008

Control issues in cognitive networks. Marko Höyhtyä and Tao Chen CWC-VTT-Gigaseminar 4th December 2008 Control issues in cognitive networks Marko Höyhtyä and Tao Chen CWC-VTT-Gigaseminar 4th December 2008 Outline Cognitive wireless networks Cognitive mesh Topology control Frequency selection Power control

More information

Introduction to Local and Wide Area Networks

Introduction to Local and Wide Area Networks Introduction to Local and Wide Area Networks Lecturers Amnach Khawne Jirasak Sittigorn Chapter 1 1 Routing Protocols and Concepts Chapter 10 : Link-State Routing Protocols Chapter 11 : OSPF Chapter 1 2

More information

Modeling Infrared LANs in GloMoSim. Sarah M. Carroll and Jeffrey B. Carruthers Dept. of Electrical and Computer Engineering Boston University

Modeling Infrared LANs in GloMoSim. Sarah M. Carroll and Jeffrey B. Carruthers Dept. of Electrical and Computer Engineering Boston University Modeling Infrared LANs in GloMoSim Sarah M. Carroll and Jeffrey B. Carruthers Dept. of Electrical and Computer Engineering Boston University Talk Outline Motivation and Applications for Infrared Wireless

More information

Introduction to Mesh

Introduction to Mesh Introduction to Mesh ICTP School on Radio-based Computer Networking February 24 th 2005 Tomas B. Krag wire.less.dk What is Mesh? "A mesh network is a network that employs one of two connection arrangements,

More information

Experimental evaluation of IEEE s path selection protocols in a mesh testbed

Experimental evaluation of IEEE s path selection protocols in a mesh testbed University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2010 Experimental evaluation of IEEE 802.11s path selection protocols

More information

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous

More information

Keywords - Ad-hoc Networks, TCP variants, Routing Protocols, AODV, DSR.

Keywords - Ad-hoc Networks, TCP variants, Routing Protocols, AODV, DSR. Applications (IJERA) ISSN: 224-922 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.12-1 Performance Evaluation Of Congestion Control Tcp Variants In Vanet Using Omnet++ Ravinder Kaur*, Gurpreet

More information

Studying Routing Issues in VANETs by Using NS-3 Bachelor Thesis on Informatics

Studying Routing Issues in VANETs by Using NS-3 Bachelor Thesis on Informatics Studying Routing Issues in VANETs by Using NS-3 Bachelor Thesis on Informatics by Christos Profentzas Thesis supervisor Dr. Periklis Chatzimisios Alexander Technological Educational Institute of Thessaloniki

More information

Link State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.3, 2017/03/09 11:25:31)

Link State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.3, 2017/03/09 11:25:31) Link State Routing In particular OSPF Karst Koymans Informatics Institute University of Amsterdam (version 16.3, 2017/03/09 11:25:31) Tuesday, March 7, 2017 Karst Koymans (UvA) Link State Routing Tuesday,

More information

Link State Routing. In particular OSPF. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. March 4, 2008

Link State Routing. In particular OSPF. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. March 4, 2008 Link State Routing In particular OSPF dr. C. P. J. Koymans Informatics Institute University of Amsterdam March 4, 2008 dr. C. P. J. Koymans (UvA) Link State Routing March 4, 2008 1 / 70 1 Link State Protocols

More information

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area

More information

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database OSPF - Open Shortest Path First OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP distance vector protocols like RIP have several dramatic disadvantages: slow adaptation

More information

Introduction to OSPF. ISP Workshops. Last updated 11 November 2013

Introduction to OSPF. ISP Workshops. Last updated 11 November 2013 Introduction to OSPF ISP Workshops Last updated 11 November 2013 1 OSPF p Open Shortest Path First p Open: n Meaning an Open Standard n Developed by IETF (OSPF Working Group) for IP RFC1247 n Current standard

More information

ENSC 427: Communica1on Networks

ENSC 427: Communica1on Networks ENSC 427: Communica1on Networks Spring 2014 Final Project Presenta1on Performance of Mobile Ad- Hoc Network Rou9ng Protocols Project website: hbp://www.sfu.ca/~rtariq/proj.html Tariq Rizvi (rtariq@sfu.ca)

More information

Jamming Attacks with its Various Techniques and AODV in Wireless Networks

Jamming Attacks with its Various Techniques and AODV in Wireless Networks IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 4 Ver. II (Jul. Aug. 2016), PP 48-52 www.iosrjournals.org Jamming Attacks with its

More information

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN ISSN 0976 6464(Print)

More information

OSPF Domain / OSPF Area. OSPF Advanced Topics. OSPF Domain / OSPF Area. Agenda

OSPF Domain / OSPF Area. OSPF Advanced Topics. OSPF Domain / OSPF Area. Agenda OSPF Domain / OSPF Area OSPF Advanced Topics Areas,, Backbone, Summary-LSA, ASBR, Stub Area, Route Summarization, Virtual Links, Header Details OSPF domain can be divided in multiple OSPF areas to improve

More information