SlideShare a Scribd company logo
1 of 5
Download to read offline
Ms. Kunjal Patel et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1276-1280

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Study of load balancing protocols in MANET
First A. Prof. S.A.Jain, Research Scholar ; Second B. Ms. Kunjal Patel, Student
Abstract
Mobile ad hoc network is a collection of wireless mobile nodes, such devices as PDAs, mobile phones, laptops
etc. that are connected over a wireless medium. There is no pre-existing communication infrastructure (no
access points, no base stations) and the nodes can freely move and self-organize into a network topology. Such a
network can contain two or more nodes. Hence, balancing the load in a MANET is important because the nodes
in MANET have limited communication resources such as bandwidth, buffer space, and battery power. Most
current routing protocols for mobile Ad-hoc networks consider the shortest path with minimum hop count as
optimal route without any consideration of any particular node’s traffic and thus degrading the performance by
causing serious problems in mobile node like congestion, power depletion and queuing delay. Therefore it is
very attractive to investigate Routing protocols which use a Routing Metric to Balance Load in Ad-hoc
networks. This paper discusses various load metric and various load balancing routing protocols for efficient
data transmission in MANETs.
Keywords: Load Balancing, Mobile Ad hoc Networks, Routing

I. Introduction
MANET is a temporary wireless network
formed by a group of mobile nodes which may not be
within the transmission range of each other. The nodes
in MANET are self organizing, Self-configuring, Selfmaintaining and characterized by multi-hop wireless
connectivity and frequently changing topology.
Mobile nodes in MANET are connected by wireless
links and each node act as host end router in the
network. It is a collection of mobile nodes, such
devices as PDAs, mobile phones, laptops etc. that are
connected over a wireless medium The routing
protocols in MANET can be categorized in to three
different groups: Table Driven/Proactive, Ondemand/Reactive and Hybrid routing protocols. In
Table Driven routing protocols, each node stores and
maintains routing information to every other node in
the network. These are done by periodically
exchanging routing table throughout the networks.
These protocols maintain tables at each node which
store updated routing information for every node to
every another node within the network. In on-demand
routing protocols, routes are created when required by
the source node, rather than storing up-to-date routing
tables. Hybrid routing protocols combine the basic
properties of the two classes of protocols.
This paper is organized as follows. In section
2, we described the characteristics of Ad-hoc networks
and existing routing protocols. Section 3 provides
considerable insight into various Load Balanced
routing protocols, finally we include the comparison
of the protocols and conclude the paper.

www.ijera.com

II. Previous Works
2.1 Ad-Hoc Network
In recent, the proliferation of portable devices
like PDAs and Laptop computers with diverse wireless
communication capabilities has made a mobility
support on the Internet an important issue. A mobile
computing Environment includes both infrastructure
wireless network and novel infrastructure-less mobile
ad-hoc networks. A MANET [1] is a self organizing
system of mobile nodes connected by multi-hop
wireless links forming a temporary network which is
based on Radio to Radio multi-hoping and has neither
fixed base station nor a wired backbone infrastructure.
Since this network can communicate without a base
station and a fixed cable network, the network can be
configured dynamically and are deployed in
applications such as search and rescue, automated
battle fields, disaster recovery, crowd control, sensor
networks, military settings, mine site operations and
wireless classrooms or meeting rooms in which
participants wish to share information or to acquire
data. Major challenge in such a network is that nodes
can freely move, hence the network topology
continuously change. In addition, the characteristics of
wireless channel such as limited data transmission
range, low bandwidth ,high error rate, limited battery
power, frequent mobility, high interference, link
failure due to mobility[2] make routing on ad-hoc
network a difficult problem to deal with. The routing
issues in infrastructure-based networks are very
different from routing in infrastructure-less networks.
Each intermediate host between source and target node
acts as router in an ad-hoc network and the topology of
the network changes frequently. Therefore distribution
of up-to-date information about the nodes can saturate
the network. Also, late arrival of the information can
drive the network into instability. Besides this, another
1276 | P a g e
Ms. Kunjal Patel et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1276-1280

www.ijera.com

problem is that link failure due to mobility is usually
very high. Thus for efficient data transmission in
MANETs a lot of research effort has been dedicated to
the development of efficient routing protocols.

3. Routing topology
4. Utilization of specific resources.
A classification tree is shown in the figure below.

2.2 Routing Protocols for MANETs
Routing protocols for ad hoc wireless
networks can be classified into several types based on
different criteria [3].
These protocols can be broadly classified into
four categories based on:
1. Routing information update mechanism
2. Use of temporal information for routing

AODV [4,5] is an on-demand, single path,
loop-free distance vector protocol. It combines the ondemand route discovery mechanism in DSR [1] with
the concept of destination sequence numbers from
DSDV [6]. However, unlike DSR which uses source
routing,

III. AODV

Routing
protocols for
Ad Hoc
Wireless
Networks

Based on
Routing
information
Update
Mechanism

Based On
Topology
Information
Organization

Based on use Of
Temporal
Information for
Routing

Miscellaneous
Classification
based on
Utilization of
specific
resources
resources

On
Demand
(Reactive)

Table
Driven
(Proactive)

Path
Selection
Using
Prediction

Path
Selection
using Past
History

Flat
Routing

Hierarc
hical
Routing

Power aware
Routing

Routing using
geographical
information

100
80
60

East

Hybrid

Routing with
Efficient
Flooding

West

40

North
20
0
1st Qtr 2nd Qtr 3rd Qtr 4th Qtr

Fig 1: Classifications of Ad hoc Routing protocols

AODV takes a hop-by-hop routing
approach. Below we give an overview of some key
features of the AODV.
Route Discovery and Route Maintenance
In on-demand protocols, route discovery
procedure is used by nodes to obtain routes on an ‘as
needed’ basis. In AODV, route discovery works as
follows. Whenever a traffic source needs a route to a
destination, it initiates a route discovery by flooding a
route request (RREQ) for the destination in the
network and then waits for a route reply (RREP).
When an intermediate node receives the first copy of
a RREQ packet, it sets up a reverse path to the source
using the previous hop of the RREQ as the next hop
www.ijera.com

on the rever path. In addition, if there is a valid route
available for the destination, it unicasts a RREP back
to the source via the reverse path; otherwise, it rebroadcasts the RREQ packet. Duplicate copies of the
RREQ are immediately discarded upon reception at
every node. The destination on receiving the first
copy of a RREQ packet forms a reverse path in the
same way as the intermediate nodes; it also unicasts a
RREP back to the source along the reverse path. As
the RREP proceeds towards the source, it establishes
a forward path to the destination at each hop. Route
maintenance is done by means of route error (RERR)
packets. When an intermediate node detects a link
failure (via a link-layer feedback, e.g.), it generates a
RERR packet. The RERR propagates towards all
1277 | P a g e
Ms. Kunjal Patel et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1276-1280
traffic sources having a route via the failed link, and
erases all broken routes on the way. A source upon
receiving the RERR initiates a new route discovery if
it still needs the route. Apart from this route
maintenance mechanism, AODV also has a timerbased mechanism to purge stale routes.

IV. Ad hoc On-Demand Multipath
Distance Vector Routing
Our objective in this section is to extend the
AODV protocol to compute multiple disjoint loopfree paths in a route discovery.
AOMDV shares several characteristics with
AODV. It is based on the distance vector concept and
uses hop-by-hop routing approach. Moreover,
AOMDV also finds routes on demand using a route
discovery procedure. The main difference lies in the
number of routes found in each route discovery. In
AOMDV RREQ propagation from the source
towards the destination establishes multiple reverse
paths both at intermediate nodes as well as the
destination. Multiple RREPs traverse these reverse
paths back to form multiple forward paths to the
destination at the source and intermediate nodes.
Note that AOMDV also provides intermediate nodes
with alternate paths as they are found to be useful in
reducing route discovery frequency [7]. The core of
the AOMDV protocol lies in ensuring that multiple
paths discovered are loop-free and disjoint, and in
efficiently finding such paths using a flood-based
route discovery. AOMDV route update rules, applied
locally at each node, play a key role in maintaining
loop-freedom and disjointness properties.
Here we discuss the main ideas to achieve
these two desired properties. Next subsection deals
with incorporating those ideas into the AOMDV
protocol including detailed description of route
update rules used at each node and the multipath
route discovery procedure.
AOMDV relies as much as possible on the
routing information already available in the
Destination

Destination

Sequence No

underlying AODV protocol, thereby limiting the
overhead incurred in discovering multiple paths. In
particular, it does not employ any special control
packets. In fact, extra RREPs and RERRs for
multipath discovery and maintenance along with a
few extra fields in routing control packets (i.e.,
RREQs, RREPs, and RERRs) constitute the only
additional overhead in AOMDV relative to AODV.
Figure 2 shows the difference in the routing table
entry structure between AODV and AOMDV.
AOMDV route table entry has a new field for the
advertised hop count. Besides a route list is used in
AOMDV to store additional information for each
alternate path including: next hop, last hop, hop
count, and expiration timeout.
Consider a destination d and a node i. whenever the
destination sequence number for d at i is updated, the
corresponding advertised hop count is initialized. For
a given destination sequence number, let hop_count
denote the hop count of kth path (for some k) in the
routing table entry for d at i.
Route discovery
As in AODV, when a traffic source needs a
route to a destination, the source initiates a route
discovery process by generating a RREQ. Since the
RREQ is flooded network-wide, a node may receive
several copies of the same RREQ. In AODV, only
the first copy of the RREQ is used to form reverse
paths; the duplicate copies that arrive later are simply
discarded. Note that some of these duplicate copies
can be gainfully used to form alternate reverse paths.
Thus, all duplicate copies are examined in AOMDV
for potential alternate reverse paths, but reverse paths
are formed only using those copies that preserve
loop-freedom and disjointness among the resulting
set of paths to the source. When an intermediate node
obtains a reverse path via a RREQ copy, it checks
whether there are one or more valid forward paths to
the destination. If

Hop count
Next hop
(a) AODV

Sequence No

www.ijera.com

Advertised Hop count

Timeout

Route list

(b) AOMDV
Figure 2 Routing table entry structure in (a) AODV and (b) AOMDV
so, the node generates a RREP and sends it back to
the source along the reverse path; the RREP includes
a forward path that was not used in any previous
RREPs for this route discovery. In this case, the
intermediate node does not propagate the RREQ
further. Otherwise, the node re-broadcasts the RREQ
copy if it has not previously forwarded any other
copy of this RREQ and this copy resulted in the
formation/updation of a reverse path.

www.ijera.com

V. Scalable multipath ondemand routing
(SMORT)
The principal objective of SMORT is to
reduce the amount of routing overhead generated by
an unipath on-demand routing protocol, using
multipath routing. Alternate paths to destination
avoid the overhead generated by the additional
routing discoveries and route error transmissions,
during route break recovery. Reduction in routing
1278 | P a g e
Ms. Kunjal Patel et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1276-1280
overhead allows the protocol to scale to larger
networks. Multiple paths between a source and a
destination are of two types, namely node-disjoint
and link-disjoint multiple paths. Node-disjoint paths
do not have any nodes in common, except the source
and destination. Nodes labeled S and D are source
and destination nodes, respectively. Node-disjoint
multiple paths are used for traffic load-balancing (by
dispersing data over multiple paths), and provide
fault-tolerance towards route breaks. The advantage
of node-disjoint multiple paths is that they fail
independent of each other. Breakage of any link on
one path can be corrected by resuming the data
session through one of the other paths. Link-disjoint
paths do not have common links, but may have nodes
in common. A set of link-disjoint paths are formed by
a series of node-disjoint segments. Each segment is a
node-disjoint path between any two nodes.
SMORT is a multipath extension to the
well-known unipath ad hoc routing protocol AODV.
SMORT has three basic phases; namely route
discovery, route reply and route maintenance.
When a node needs a route to some
destination, it initiates route discovery process, by
flooding a route-request packet into the network.
Intermediate nodes receiving the route-request, send
a routereply packet back to source if they have a
valid path to the destination. Otherwise, they rebroadcast the request. Finally, when the destination
receives the request, it initiates route reply process by
sending a route-reply packet back to the source node.
Unlike AODV, SMORT allows nodes to accept
multiple copies of route-request packet, in order to
enable computation of multiple fail-safe paths. Also,
the destination replies to multiple copies of
routerequest for the same reason.
Route reply reaches the source node through
the reverse path recorded in a special table, during
the route discovery phase. In order to avoid loops in
the routes that may form due to the acceptance of
multiple copies of route-request, route-reply packets
carry the full path to the destination. Although, loops
can be avoided in the route discovery phase itself, by
carrying the list of nodes traversed in the routerequest packet, SMORT does not carry full path in
route-request packets as it may increase network
wide collisions due to the flooding of large sized
route-request packet across the entire network.
On the contrary, the number of route-reply
packets communicated are limited when compared to
the number of route-request packet transmissions
(many copies of the route-request do not generate
reply as they move away from destination), and they
traverse on the actual routes between source and
destination.
Finally, when the source receives the first
route, it starts sending data packets to the destination.
Intermediate nodes may receive multiple route-reply
packets as the destination replies to multiple copies
of route-request, but they relay only the first reply.
www.ijera.com

www.ijera.com

The reply is relayed through multiple neighbors
through which nodes received the routerequest packet
previously. Extra replies are dropped after nodes
copy secondary paths carried in them into their
routing tables.
Route maintenance involves two important
actions. Firstly, re-establishing the connection
between source and destination, if all the routes
between them fail in the middle of the session.
Secondly, deleting the expired routes from
the routing table.

VI. Conclusion
In this paper we have discussed some
important issues related to the load-balanced routing
protocols for mobile ad hoc networks Load balanced
routing protocols have different load metric as route
selection criteria to better use MANET recourses and
improves MANET performance. The heavily loaded
nodes are also likely to incur high power
consumption. MANET can maximize mobile nodes
packet delivery ratio, throughput lifetime and load
unbalanced as a result end-to-end delay can be
minimized.

References
[1]

[2]

[3]

[4]

[5]

[6]

D. B. Johnson, D. A. Maltz, “Dynamic
source routing in ad hoc wireless networks,”
Mobile Computing, pp. 153–181, 1996.
Josh Broch, David A. Maltz, David B.
Johnson, Yih-Chun Hu, Jorjeta Jetcheva. “A
Performance Comparison of Multi-Hop
Wireless Ad Hoc Network Routing
Protocols,” The Fourth Annual ACM/IEEE
International Conference on Mobile
Computing and Networking, pp. 1-13, 1998
Chen, X., H. M. Jones, A .D .S. Jayalath,
“Congestion-Aware Routing Protocol for
Mobile Ad Hoc Networks,” Vehicular
Technology Conference 2007, pp. 21-25,
2007
S. Ramanathan, M. E. Steenstrup, “A survey
of
routing
techniques
for
mobile
communications networks, mobile networks
and applications,” Vol. 1, pp. 98–104, 1996.
C. E. Perkins, “Ad hoc on demand distance
vector (AODV) routing,” IEFT Internet
Draft, November 1998,
H.
Raghavendra
and
D.A.
Tran,
“Congestion Adaptive Routing in Ad Hoc
Networks (Short Version),” Proc. ACM Int’l
Conf. Mobile Computing and Networking
(MOBI-COM), Oct. 2004. [7] H.
Raghavendra and D.A. Tran, “Congestion
Adaptive Routing in Ad Hoc Networks”
IEEE Transactions on Paral-lel and
Distributed Systems, Vol. 17, No. 11,
November 2006.

1279 | P a g e
Ms. Kunjal Patel et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1276-1280

www.ijera.com

Biographies
FIRST A. S.A.JAIN received the B.S. degree in
Computer Engineering from the University of Pune,
Pune, Maharash-tra, in 2000, the M.E. degree in
Computer Engineering from the University of Pune,
Pune, Maharashtra, in 2002, and pursuing the Ph.D.
degree in Wireless Network from the University of
Pune, Pune, Maharashtra, respectively. Cur-rently,
He is an associate Professor of Computer
Engineering at University of Pune. His teaching and
research areas in-clude Network Design and
Modeling Computer Network.
SECOND B. KUNJAL PATEL received the B.E.
degree in Computer Engineering from the Gujarat
University,in 2007. Pursuing M.E. degree in
Computer Engineering from the University of Pune,
Pune, Maharashtra, respectively. Currently, she is an
Lecturer of Computer Engineering at Gujarat
technological university. Her teaching and research
areas include networking.

www.ijera.com

1280 | P a g e

More Related Content

What's hot

Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...ijasuc
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...Narendra Singh Yadav
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)inventionjournals
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...ijceronline
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 

What's hot (18)

Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
O26087092
O26087092O26087092
O26087092
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 

Viewers also liked (20)

He3612811285
He3612811285He3612811285
He3612811285
 
Hb3612621270
Hb3612621270Hb3612621270
Hb3612621270
 
Ha3612571261
Ha3612571261Ha3612571261
Ha3612571261
 
Hl3613171320
Hl3613171320Hl3613171320
Hl3613171320
 
Hj3613041308
Hj3613041308Hj3613041308
Hj3613041308
 
Hf3612861290
Hf3612861290Hf3612861290
Hf3612861290
 
Hh3612951298
Hh3612951298Hh3612951298
Hh3612951298
 
Gy3612471250
Gy3612471250Gy3612471250
Gy3612471250
 
Gz3612511256
Gz3612511256Gz3612511256
Gz3612511256
 
Hc3612711275
Hc3612711275Hc3612711275
Hc3612711275
 
Hg3612911294
Hg3612911294Hg3612911294
Hg3612911294
 
Hk3613091316
Hk3613091316Hk3613091316
Hk3613091316
 
Makalah motorik anak usia dini
Makalah motorik anak usia diniMakalah motorik anak usia dini
Makalah motorik anak usia dini
 
Peran komputer terhadap administrasi perkantoran kevin
Peran komputer terhadap administrasi perkantoran kevinPeran komputer terhadap administrasi perkantoran kevin
Peran komputer terhadap administrasi perkantoran kevin
 
Atameken Startup Aktobe 6-8 dec 2013 "Zerek"
Atameken Startup Aktobe 6-8 dec 2013 "Zerek"Atameken Startup Aktobe 6-8 dec 2013 "Zerek"
Atameken Startup Aktobe 6-8 dec 2013 "Zerek"
 
Ii
IiIi
Ii
 
Perkembangan motorik anak nursia
Perkembangan motorik anak nursiaPerkembangan motorik anak nursia
Perkembangan motorik anak nursia
 
Makalah perkembangan motorik anak
Makalah perkembangan motorik anakMakalah perkembangan motorik anak
Makalah perkembangan motorik anak
 
hi there
hi therehi there
hi there
 
Perkembangan motorik anak nurjana
Perkembangan motorik anak nurjanaPerkembangan motorik anak nurjana
Perkembangan motorik anak nurjana
 

Similar to Hd3612761280

Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 
Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET  Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET pijans
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewBRNSSPublicationHubI
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...IOSR Journals
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
 

Similar to Hd3612761280 (20)

Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET  Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
 
Br31467472
Br31467472Br31467472
Br31467472
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
 
Q01821111115
Q01821111115Q01821111115
Q01821111115
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
Mane ts
Mane tsMane ts
Mane ts
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Ij3415561561
Ij3415561561Ij3415561561
Ij3415561561
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 
En33838844
En33838844En33838844
En33838844
 
En33838844
En33838844En33838844
En33838844
 

Recently uploaded

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 

Recently uploaded (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 

Hd3612761280

  • 1. Ms. Kunjal Patel et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1276-1280 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Study of load balancing protocols in MANET First A. Prof. S.A.Jain, Research Scholar ; Second B. Ms. Kunjal Patel, Student Abstract Mobile ad hoc network is a collection of wireless mobile nodes, such devices as PDAs, mobile phones, laptops etc. that are connected over a wireless medium. There is no pre-existing communication infrastructure (no access points, no base stations) and the nodes can freely move and self-organize into a network topology. Such a network can contain two or more nodes. Hence, balancing the load in a MANET is important because the nodes in MANET have limited communication resources such as bandwidth, buffer space, and battery power. Most current routing protocols for mobile Ad-hoc networks consider the shortest path with minimum hop count as optimal route without any consideration of any particular node’s traffic and thus degrading the performance by causing serious problems in mobile node like congestion, power depletion and queuing delay. Therefore it is very attractive to investigate Routing protocols which use a Routing Metric to Balance Load in Ad-hoc networks. This paper discusses various load metric and various load balancing routing protocols for efficient data transmission in MANETs. Keywords: Load Balancing, Mobile Ad hoc Networks, Routing I. Introduction MANET is a temporary wireless network formed by a group of mobile nodes which may not be within the transmission range of each other. The nodes in MANET are self organizing, Self-configuring, Selfmaintaining and characterized by multi-hop wireless connectivity and frequently changing topology. Mobile nodes in MANET are connected by wireless links and each node act as host end router in the network. It is a collection of mobile nodes, such devices as PDAs, mobile phones, laptops etc. that are connected over a wireless medium The routing protocols in MANET can be categorized in to three different groups: Table Driven/Proactive, Ondemand/Reactive and Hybrid routing protocols. In Table Driven routing protocols, each node stores and maintains routing information to every other node in the network. These are done by periodically exchanging routing table throughout the networks. These protocols maintain tables at each node which store updated routing information for every node to every another node within the network. In on-demand routing protocols, routes are created when required by the source node, rather than storing up-to-date routing tables. Hybrid routing protocols combine the basic properties of the two classes of protocols. This paper is organized as follows. In section 2, we described the characteristics of Ad-hoc networks and existing routing protocols. Section 3 provides considerable insight into various Load Balanced routing protocols, finally we include the comparison of the protocols and conclude the paper. www.ijera.com II. Previous Works 2.1 Ad-Hoc Network In recent, the proliferation of portable devices like PDAs and Laptop computers with diverse wireless communication capabilities has made a mobility support on the Internet an important issue. A mobile computing Environment includes both infrastructure wireless network and novel infrastructure-less mobile ad-hoc networks. A MANET [1] is a self organizing system of mobile nodes connected by multi-hop wireless links forming a temporary network which is based on Radio to Radio multi-hoping and has neither fixed base station nor a wired backbone infrastructure. Since this network can communicate without a base station and a fixed cable network, the network can be configured dynamically and are deployed in applications such as search and rescue, automated battle fields, disaster recovery, crowd control, sensor networks, military settings, mine site operations and wireless classrooms or meeting rooms in which participants wish to share information or to acquire data. Major challenge in such a network is that nodes can freely move, hence the network topology continuously change. In addition, the characteristics of wireless channel such as limited data transmission range, low bandwidth ,high error rate, limited battery power, frequent mobility, high interference, link failure due to mobility[2] make routing on ad-hoc network a difficult problem to deal with. The routing issues in infrastructure-based networks are very different from routing in infrastructure-less networks. Each intermediate host between source and target node acts as router in an ad-hoc network and the topology of the network changes frequently. Therefore distribution of up-to-date information about the nodes can saturate the network. Also, late arrival of the information can drive the network into instability. Besides this, another 1276 | P a g e
  • 2. Ms. Kunjal Patel et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1276-1280 www.ijera.com problem is that link failure due to mobility is usually very high. Thus for efficient data transmission in MANETs a lot of research effort has been dedicated to the development of efficient routing protocols. 3. Routing topology 4. Utilization of specific resources. A classification tree is shown in the figure below. 2.2 Routing Protocols for MANETs Routing protocols for ad hoc wireless networks can be classified into several types based on different criteria [3]. These protocols can be broadly classified into four categories based on: 1. Routing information update mechanism 2. Use of temporal information for routing AODV [4,5] is an on-demand, single path, loop-free distance vector protocol. It combines the ondemand route discovery mechanism in DSR [1] with the concept of destination sequence numbers from DSDV [6]. However, unlike DSR which uses source routing, III. AODV Routing protocols for Ad Hoc Wireless Networks Based on Routing information Update Mechanism Based On Topology Information Organization Based on use Of Temporal Information for Routing Miscellaneous Classification based on Utilization of specific resources resources On Demand (Reactive) Table Driven (Proactive) Path Selection Using Prediction Path Selection using Past History Flat Routing Hierarc hical Routing Power aware Routing Routing using geographical information 100 80 60 East Hybrid Routing with Efficient Flooding West 40 North 20 0 1st Qtr 2nd Qtr 3rd Qtr 4th Qtr Fig 1: Classifications of Ad hoc Routing protocols AODV takes a hop-by-hop routing approach. Below we give an overview of some key features of the AODV. Route Discovery and Route Maintenance In on-demand protocols, route discovery procedure is used by nodes to obtain routes on an ‘as needed’ basis. In AODV, route discovery works as follows. Whenever a traffic source needs a route to a destination, it initiates a route discovery by flooding a route request (RREQ) for the destination in the network and then waits for a route reply (RREP). When an intermediate node receives the first copy of a RREQ packet, it sets up a reverse path to the source using the previous hop of the RREQ as the next hop www.ijera.com on the rever path. In addition, if there is a valid route available for the destination, it unicasts a RREP back to the source via the reverse path; otherwise, it rebroadcasts the RREQ packet. Duplicate copies of the RREQ are immediately discarded upon reception at every node. The destination on receiving the first copy of a RREQ packet forms a reverse path in the same way as the intermediate nodes; it also unicasts a RREP back to the source along the reverse path. As the RREP proceeds towards the source, it establishes a forward path to the destination at each hop. Route maintenance is done by means of route error (RERR) packets. When an intermediate node detects a link failure (via a link-layer feedback, e.g.), it generates a RERR packet. The RERR propagates towards all 1277 | P a g e
  • 3. Ms. Kunjal Patel et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1276-1280 traffic sources having a route via the failed link, and erases all broken routes on the way. A source upon receiving the RERR initiates a new route discovery if it still needs the route. Apart from this route maintenance mechanism, AODV also has a timerbased mechanism to purge stale routes. IV. Ad hoc On-Demand Multipath Distance Vector Routing Our objective in this section is to extend the AODV protocol to compute multiple disjoint loopfree paths in a route discovery. AOMDV shares several characteristics with AODV. It is based on the distance vector concept and uses hop-by-hop routing approach. Moreover, AOMDV also finds routes on demand using a route discovery procedure. The main difference lies in the number of routes found in each route discovery. In AOMDV RREQ propagation from the source towards the destination establishes multiple reverse paths both at intermediate nodes as well as the destination. Multiple RREPs traverse these reverse paths back to form multiple forward paths to the destination at the source and intermediate nodes. Note that AOMDV also provides intermediate nodes with alternate paths as they are found to be useful in reducing route discovery frequency [7]. The core of the AOMDV protocol lies in ensuring that multiple paths discovered are loop-free and disjoint, and in efficiently finding such paths using a flood-based route discovery. AOMDV route update rules, applied locally at each node, play a key role in maintaining loop-freedom and disjointness properties. Here we discuss the main ideas to achieve these two desired properties. Next subsection deals with incorporating those ideas into the AOMDV protocol including detailed description of route update rules used at each node and the multipath route discovery procedure. AOMDV relies as much as possible on the routing information already available in the Destination Destination Sequence No underlying AODV protocol, thereby limiting the overhead incurred in discovering multiple paths. In particular, it does not employ any special control packets. In fact, extra RREPs and RERRs for multipath discovery and maintenance along with a few extra fields in routing control packets (i.e., RREQs, RREPs, and RERRs) constitute the only additional overhead in AOMDV relative to AODV. Figure 2 shows the difference in the routing table entry structure between AODV and AOMDV. AOMDV route table entry has a new field for the advertised hop count. Besides a route list is used in AOMDV to store additional information for each alternate path including: next hop, last hop, hop count, and expiration timeout. Consider a destination d and a node i. whenever the destination sequence number for d at i is updated, the corresponding advertised hop count is initialized. For a given destination sequence number, let hop_count denote the hop count of kth path (for some k) in the routing table entry for d at i. Route discovery As in AODV, when a traffic source needs a route to a destination, the source initiates a route discovery process by generating a RREQ. Since the RREQ is flooded network-wide, a node may receive several copies of the same RREQ. In AODV, only the first copy of the RREQ is used to form reverse paths; the duplicate copies that arrive later are simply discarded. Note that some of these duplicate copies can be gainfully used to form alternate reverse paths. Thus, all duplicate copies are examined in AOMDV for potential alternate reverse paths, but reverse paths are formed only using those copies that preserve loop-freedom and disjointness among the resulting set of paths to the source. When an intermediate node obtains a reverse path via a RREQ copy, it checks whether there are one or more valid forward paths to the destination. If Hop count Next hop (a) AODV Sequence No www.ijera.com Advertised Hop count Timeout Route list (b) AOMDV Figure 2 Routing table entry structure in (a) AODV and (b) AOMDV so, the node generates a RREP and sends it back to the source along the reverse path; the RREP includes a forward path that was not used in any previous RREPs for this route discovery. In this case, the intermediate node does not propagate the RREQ further. Otherwise, the node re-broadcasts the RREQ copy if it has not previously forwarded any other copy of this RREQ and this copy resulted in the formation/updation of a reverse path. www.ijera.com V. Scalable multipath ondemand routing (SMORT) The principal objective of SMORT is to reduce the amount of routing overhead generated by an unipath on-demand routing protocol, using multipath routing. Alternate paths to destination avoid the overhead generated by the additional routing discoveries and route error transmissions, during route break recovery. Reduction in routing 1278 | P a g e
  • 4. Ms. Kunjal Patel et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1276-1280 overhead allows the protocol to scale to larger networks. Multiple paths between a source and a destination are of two types, namely node-disjoint and link-disjoint multiple paths. Node-disjoint paths do not have any nodes in common, except the source and destination. Nodes labeled S and D are source and destination nodes, respectively. Node-disjoint multiple paths are used for traffic load-balancing (by dispersing data over multiple paths), and provide fault-tolerance towards route breaks. The advantage of node-disjoint multiple paths is that they fail independent of each other. Breakage of any link on one path can be corrected by resuming the data session through one of the other paths. Link-disjoint paths do not have common links, but may have nodes in common. A set of link-disjoint paths are formed by a series of node-disjoint segments. Each segment is a node-disjoint path between any two nodes. SMORT is a multipath extension to the well-known unipath ad hoc routing protocol AODV. SMORT has three basic phases; namely route discovery, route reply and route maintenance. When a node needs a route to some destination, it initiates route discovery process, by flooding a route-request packet into the network. Intermediate nodes receiving the route-request, send a routereply packet back to source if they have a valid path to the destination. Otherwise, they rebroadcast the request. Finally, when the destination receives the request, it initiates route reply process by sending a route-reply packet back to the source node. Unlike AODV, SMORT allows nodes to accept multiple copies of route-request packet, in order to enable computation of multiple fail-safe paths. Also, the destination replies to multiple copies of routerequest for the same reason. Route reply reaches the source node through the reverse path recorded in a special table, during the route discovery phase. In order to avoid loops in the routes that may form due to the acceptance of multiple copies of route-request, route-reply packets carry the full path to the destination. Although, loops can be avoided in the route discovery phase itself, by carrying the list of nodes traversed in the routerequest packet, SMORT does not carry full path in route-request packets as it may increase network wide collisions due to the flooding of large sized route-request packet across the entire network. On the contrary, the number of route-reply packets communicated are limited when compared to the number of route-request packet transmissions (many copies of the route-request do not generate reply as they move away from destination), and they traverse on the actual routes between source and destination. Finally, when the source receives the first route, it starts sending data packets to the destination. Intermediate nodes may receive multiple route-reply packets as the destination replies to multiple copies of route-request, but they relay only the first reply. www.ijera.com www.ijera.com The reply is relayed through multiple neighbors through which nodes received the routerequest packet previously. Extra replies are dropped after nodes copy secondary paths carried in them into their routing tables. Route maintenance involves two important actions. Firstly, re-establishing the connection between source and destination, if all the routes between them fail in the middle of the session. Secondly, deleting the expired routes from the routing table. VI. Conclusion In this paper we have discussed some important issues related to the load-balanced routing protocols for mobile ad hoc networks Load balanced routing protocols have different load metric as route selection criteria to better use MANET recourses and improves MANET performance. The heavily loaded nodes are also likely to incur high power consumption. MANET can maximize mobile nodes packet delivery ratio, throughput lifetime and load unbalanced as a result end-to-end delay can be minimized. References [1] [2] [3] [4] [5] [6] D. B. Johnson, D. A. Maltz, “Dynamic source routing in ad hoc wireless networks,” Mobile Computing, pp. 153–181, 1996. Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, Jorjeta Jetcheva. “A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols,” The Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 1-13, 1998 Chen, X., H. M. Jones, A .D .S. Jayalath, “Congestion-Aware Routing Protocol for Mobile Ad Hoc Networks,” Vehicular Technology Conference 2007, pp. 21-25, 2007 S. Ramanathan, M. E. Steenstrup, “A survey of routing techniques for mobile communications networks, mobile networks and applications,” Vol. 1, pp. 98–104, 1996. C. E. Perkins, “Ad hoc on demand distance vector (AODV) routing,” IEFT Internet Draft, November 1998, H. Raghavendra and D.A. Tran, “Congestion Adaptive Routing in Ad Hoc Networks (Short Version),” Proc. ACM Int’l Conf. Mobile Computing and Networking (MOBI-COM), Oct. 2004. [7] H. Raghavendra and D.A. Tran, “Congestion Adaptive Routing in Ad Hoc Networks” IEEE Transactions on Paral-lel and Distributed Systems, Vol. 17, No. 11, November 2006. 1279 | P a g e
  • 5. Ms. Kunjal Patel et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1276-1280 www.ijera.com Biographies FIRST A. S.A.JAIN received the B.S. degree in Computer Engineering from the University of Pune, Pune, Maharash-tra, in 2000, the M.E. degree in Computer Engineering from the University of Pune, Pune, Maharashtra, in 2002, and pursuing the Ph.D. degree in Wireless Network from the University of Pune, Pune, Maharashtra, respectively. Cur-rently, He is an associate Professor of Computer Engineering at University of Pune. His teaching and research areas in-clude Network Design and Modeling Computer Network. SECOND B. KUNJAL PATEL received the B.E. degree in Computer Engineering from the Gujarat University,in 2007. Pursuing M.E. degree in Computer Engineering from the University of Pune, Pune, Maharashtra, respectively. Currently, she is an Lecturer of Computer Engineering at Gujarat technological university. Her teaching and research areas include networking. www.ijera.com 1280 | P a g e