SlideShare a Scribd company logo
1 of 21
Download to read offline
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
113
June
2013
Analysis and overview of Flooding Attack in
Optimized link State Routing protocol
Akshat Khaskalam
Mr.Sandeep Sahu
Abstract—During this last decade, mesh networks have experienced strong growth due to
their ability to provide an additional and complementary support for existing infrastructure
communication systems. In such a network, routers are supposed to be fixed for short (e.g.
public safety deployment) or long (e.g. network operator extension) period. This relative
stability of infrastructure makes proactive routing protocols appropriate. One of the well
known proactive routing protocols is OLSR (Optimized Link State Routing), which
routing decisions are based on exchanges of topology information using all-to-all flooding of
local information in order for each router to build a global knowledge of the topology. This
study first goal is to improve the performance of topology information flooding in OLSR by
introducing network coding techniques, which leads to a decrease of signaling overhead.
Keywords-Network coding; Wireless Networks; Network re- source efficiency; Topology
information dissemination; Broad- cast all-to-all; Multi-Point Relays

M.E.Scholar, Shri Ram Institute of Technology, Jabalpur, India

Asst.Prof, Shri Ram Institute of Technology, Jabalpur, India
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
114
June
2013
I. INTRODUCTIO N
Rapidly deployable mesh networks have gained wide popularity in recent years due to their
deployment ease and low cost implementation. They are used in many application areas such as
communication networks for public security forces and temporary extensions of operator
networks.
Given that mesh networks are self-organizing, data for- warding between users is a challenge
and requires consider- erable efforts from the scientific community. Several types of routing
protocols have been proposed, each with its own variants. Most common routing protocols
are either reactive ([1], [2], [3], [4]) or proactive ([5], [6], [7]), even if some hybrid routing
protocols exist ( [8], [9]). On one hand, reactive protocols do generate control messages only
when necessary. Thus, mechanism for route computation is activated only when a request to
establish communication occurs. On the other hand, proactive protocols exchange control
messages on a regular basis in order to insure up-to- date routing tables. It is therefore clear that
reactive routing protocols generate less control messages than proactive ones, but require more
delay for communication establishment. The choice of using either type of routing is based on a
tradeoff between network overhead introduced by topology dissemination and the time for
communication establishment one wishes to tolerate. In cases where mobility exists but is not
permanent nor very important, proactive protocols are more advantageous, especially if energy,
resources, memory, and CPU are not critical, as it is the case in ad hoc network consisting of
emergency vehicles (e.g. fire trucks, police cars, or ambulances) in public safety
interventions. In such a situation, rather it is the radio resource that should be saved. Thus,
the exchange of control messages, considered as overload since it does not convey data
information, should be optimized in order to minimize radio resource waste.
Economy of radio resources in a proactive routing pro- tocol requires the amount of control
messages that allow operation of the protocol to be optimized. In this paper, we focus on OLSR
(Optimize Link State Routing protocol), the most used proactive routing protocol. OLSR operates
in four steps: (i) local topology discovery, ensured by the exchange of HELLO messages
between neighboring nodes, (ii) local information sharing by TC (Topology Control) diffusion
over the whole network, (iii) route calculation through shortest path algorithm, and (iv) routing
table update according to route calculation.
In this paper, we focus on TC message diffusion within the network and investigate how to
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
115
June
2013
optimize radio resource usage while achieving a successful dissemination, i.e. all nodes have the
required information for global network knowledge. Initially, TC message diffusion consisted
in PF (Pure Flooding), where every node broadcasts every message it receives. Obviously, PF
generates transmission redundancy and one of the major impacts of such a protocol is the radio
resource waste to achieve complete disseminate- tion.
In order to make diffusion of topology information more efficient, several techniques, which
actually reduce signaling overhead, have been proposed. Traditionally, this all-to- all
broadcast is implemented by letting each node store and forward received packets. Some
of these techniques are based on the selection of a subset of nodes, form- ing a CDS
(Connected Dominating Set) [10], in charge of relaying topology information. Among
these methods, we can mention the so called MPR (Multi point Relay), which has been
adopted by OLSR. More recent proposals are based on information coding techniques,
especially NC (Network Coding) mechanisms, which aim to reduce the amount of data
required to transmit information in the network. In NC-based approaches, each node
overhears
#$
" !
! ! " "
" !
#%
(a) Pure Flooding.
#$
!#"
! ! " "
!#"
#%
(c) Network coding flooding.
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
116
June
2013
#$
" !
! ! " "
#%
(b) CDS-based flooding.
#$
!#"
! ! " "
#%
(d) CDS and network coding flood- ing.
describe main flooding solutions developed either for OLSR or for other goals. In Section III,
we summarize existing techniques and describe novel approaches proposed within this paper
that aim at filling gaps. Performance comparison between existing and new proposed solutions
is performed within Section IV, while Section V discusses the results and concludes the paper.
II. FL OODING ALGORITHMS
A.Preliminary definitions
Let us consider an ad hoc network represented by a graph G = (V, E) where V is the set of
wireless nodes and E the set of edges. Each node of V is characterized by its geographic
coordinates and the power of transmission. The
transmission range of a host u ∈ V is represented by a
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
117
June
2013
Figure 1. This figure compares, in a simple example, the various existing techniques and
shows the number of generated packets for a total diffusion. In this example, Pure Flooding
needs 6 transmissions when Connected Dominating Set based solution and Network Coding
needs 4. The combination of both Connected Dominating Set based flooding and Network
Coding requires only 3 to achieve the same goal.
packets transmitted from neighboring nodes, combines them, and forwards the resulting
packets to its neighbors. The goal is to generate fewer transmissions, which helps to save
radio resources and energy. Finally, some works strive to reduce redundant transmissions by
combining MPR-based flooding and Network Coding either determinist [11] or random [12].
The combination of CDS-based flooding and network coding shows considerable performance
gains for topology information dissemination. Figure 1 illustrates, by a simple example, the
concept and benefits of previously described approaches: Pure Flooding, CDS-based Flooding,
Network Coding, and CDS-based Flooding using Network Coding.
The purpose of this paper is to summarize existing solutions in order to explore possible
optimization of TC message dissemination in OLSR. The goal here is not to radically change
the functioning of OLSR but to maintain an efficient dissemination of TC messages by
reducing the induced overhead. The contributions of this paper are the following:
• Overview of existing TC message diffusion proposals for OLSR, either based on relay selection
and/or net- work coding,
• Proposal of new methods not yet explored combining
Connected Dominating Set and Network Coding ap- porches,
• Performance gain assessment of all approaches, existing and proposed ones, by simulations,
under the same conditions and parameters, and Analysis of the results and enlightenment
about some Network Coding unexpected behaviors.
This paper is organized as follows. In Section II, we
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
118
June
2013
Circle of center u. For all nodes v in this circle there is exists an edge in E, noted (u, v).
We call 1-hop neighbors
of u, noted N (u), nodes v such as ∀ v ∈ V, ∃ (u, v) ∈ E
and 2-hop neighbors of u, noted N (N (u)), nodes w such as ∀ w ∈ N (N (u)), ∃ v ∈ N (u)|∃ (v,
w) ∈ E. Obviously, a
node in N (N (u) can also belong to N (u).
1) Local topology discovery: Periodically, node u sends an update message towards nodes
in N (u) and naturally, receives update message from nodes in N (u). This update message,
called HELLO message in OLSR, contains the list of nodes of N (u). After receiving all update
messages from N (u) nodes, u has now the knowledge of its 2-hop topology.
2) Local topology dissemination: Periodically, node u
disseminates its 2-hop topology knowledge towards all nodes of the network. It first creates a
2-hop topology message, also called a Topology Control (TC) message in OLSR. This
message contains the list of nodes in N (N (u)). Once created, the TC message is broadcasted
towards all nodes in N (u). When receiving a TC message, nodes forward it towards their
own 1-hop neighborhood, and so on. In order to avoid infinite loop, a node only forwards a TC
message once. A unique sequence number in the TC message header is used for message
identification. This process ends when all nodes have forwarded this TC message once. This
local topology dissemination algorithm is called Pure Flooding. As a main drawback, this
algorithm does not prevent from redundant transmissions, i.e. a transmission is considered to be
useless when a node u sends a TC message whereas all nodes in N (u) have already received it
before.
We now describe tree based Flooding, Network Coding
based approaches and finally Network Coding performed on top of tree based Flooding.
B.Connected Dominated Set based approaches
A Connected Dominated Set (CDS) of a graph G is a set
N nodes with the two following properties:
1) The sub graph of G induced by D is connected.
2) The set D is a dominating set of G, i.e. a node either belongs to D or is adjacent to a node in
D.
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
119
June
2013
Connected Dominated Set based approaches consist in selecting nodes to form a CDS and
activating forwarding only for this subset. The leaves of the tree do not forward any message.
Reducing the number of nodes in the CDS means reducing the number of transmissions required
to achieve successful dissemination.
However, finding the CDS with the smallest cardinality is
NP-Complete. In the depths of difficulty, building the CDS in ad hoc networks has to be
distributed. Many heuristics exist, in this paper we focus on three of them. First we present the
one implemented in OLSR -called MPR (Multi Point Relay). Then, we detail two other ones,
Dominant Pruning based and Total Dominant Pruning solutions that aim at reducing broadcast
Redundancy in ad hoc networks but not in the context of OLSR. The dominant Pruning is one of
the first Pruning-based solutions proposed and the Total Dominant Pruning is the most efficient
one according to literature.
1) Connected Do mi n ated S et: MPR h e u r i s t i c : MPR
stands for Multi Point Relay and is implemented in the last version of OLSR. The heuristic
consists, for each node
u ∈ G in proactively selecting the subset of nodes in N (u).
Each node acts locally and on a distributive manner. The Multi Point Relay selection process for
the node u is detailed in Algorithm 1.
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
120
June
2013
Algorithm 2 MPR Forwarding rules
1: procedure MPR (u)
2: if v ∈ M P R (u) and T Cu was not previously
Forwarded then
3: v Broadcasts T Cu
4: end if
5: end procedure
Clause, the TC message would be forwarded once again by
u and so on.
2) Connected Dominated Set: Pruning heuristic:
As the MPR heuristic, Pruning heuristics also use 2-hops information. However, opposing to
MPR heuristic where a node u defines a list of forwarding nodes whatever the source node, the
Pruning heuristic takes into account the node from which the message is received. Indeed, if the
node t has just sent this message then, all nodes in N (t) have received this message too.
Therefore, the node u can determine its Relay
Nodes list F (t, u) from B(t, u) = N (u) −N (t) in order to
Cover nodes in U(t, u) = N (N (u)) − N (t) −N (u) (resp.
U(t, u) = N (N (u)) −N (N (t))) for the Dominant Pruning
(resp. for the Total Dominant Pruning). Let Z be a subset of U (t, u) covered so far, Si the
neighbor set of vi ∈ N (u)
and K be the set of Si .
Algorithm 1 MPR heuristic
1: procedure MPR (u)
2: M P R (u) = []
3: UnC overed (u) = N (N (u))
4: while!∃ v ∈ N (u) | w ∈ N (v), w ∈ N (N (u) do
5: M P R (u) ← v
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
121
June
2013
6: UnC overed (u) = UnC overed (u) − N (v)
7: end while
8: while Uuncovered (u) = Ø do
9: if Uuncovered (u)N (vi) =
maxv∈ N (u)(Uuncovered (u) ∧ N (vi ))
then
10: M P R (u) ← v
11: end if
12: end while
13: return M P R (u)
14: end procedure
When receiving a TC message from u, noted T Cu , each node v ∈ N (u) follows the
forwarding rules detailed in
Algorithm 2.
Therefore, the MPR heuristic ensures a successful dis- semination of all TC messages in the
whole network. The procedure stops when all MPR have forwarded once the TC message of
nodes that select them as MPR. In the Algorithm 2, MPR nodes broadcast a TC message only
once in order to avoid forwarding loops. Indeed, it is possible for a node v to select the node u
in its MPR list. Without this
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
122
June
2013
Algorithm 3 Pruning Heuristic
1: procedure DOMINANT PRUNING(v)
2: F (u) = ∪ t∈ N (u)F (t, u)
3: for u ∈ N (v) do
4: F (t, u) = []
5: Z = Ø
6: K ∪ Si with Si = N (ui ) ∩ U(t, u) for ui ∈
B (t, u)
7: while Z = U(t, u) do
8: if Sk (uk) = maxSi ∈ K (|Si|) then
9: F (t, u) ← uk
10: Z = Z ∪ Sk
11: Sj = Sj −Sk ∀ Sj ∈ K
12: end if
13: end while
14: end for
15: return F (v)
16: end procedure
When receiving a TC message from u, noted T Cu that have been sent before by t, each
node v ∈ N (u) follows the
Forwarding rules detailed in Algorithm 4.
The node v has to know the 2-hops previous sender of the message before re-broadcasting
or not the message.
C. Network Coding Based approaches
Network Coding based approaches aim at reducing num- ber of transmissions by benefiting
of the broadcast nature
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
123
June
2013
Afi algorithm 4 Pruning Forwarding rules
1: procedure MPR(u)
2: if v ∈ F (t, u) and T Cu was not previously for-
Warded then
3: v Broadcasts T Cu
4: end if
5: end procedure
of the wireless medium. In contrary to the flooding tree based solutions, Network Coding techniques
do not exclude any nodes from the forwarding activity. Deciding which messages are encoded can be
done either deterministically or randomly.
1) Determinist Network Coding: Determinist Network Coding consists in selecting deterministically a
subset of messages to be encoded. In [11], messages are encoded in order to maximize the number of
neighbors that will be able to immediately decode it. To do so, nodes need to know the list of messages
that have all of their neighbor nodes. This can be achieved by an additional protocol [11].
2) Random Network Coding: Random Network Coding consists in combining messages randomly
without any knowledge of what have the nodes in the neighborhood.
Crisostomo et al. [13] performed a comparison between MPR diffusion and network coding technique.
As a main conclusion, the study shows that network coding clearly outperforms MPR in most of the
cases.
D. Hybrid approaches
We refer to hybrid approaches for proposals designed to reduce the number of transmissions required
for flooding in wireless ad-hoc networks using network coding on a a Connected Dominating Set.
Simple distributed coding scheme which can be applied at each node are proposed in [12] and [11]
where the efficiency of network coding is further enhanced by applying multiple point relays (MPR).
1) MPR-based flooding tree with Determinist Network Coding: As for simple Determinist Network
Coding, a sub- set of messages to be encoded is selected based on neighbor information knowledge. The
only difference comes from the fact that this process occurs only on a subset of nodes belonging to a
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
124
June
2013
previously defined dominating set. Authors from [11] have used MPR to implement the concept of
dominating set coupled with Determinist Network Coding.
2) MPR-based flooding tree with Random Network Cod- ing: A subset of messages to be encoded is
chosen randomly without any knowledge about neighbor’s data. Combining MPR-based flooding and
Random Network Coding is per- formed in [ 12].
III. Synthesis and Novel Approaches
Different solutions, flooding tree based, network coding based, or hybrid ones have been investigated.
Table I gives an overview of those studied solutions. Columns indicate from left to right flooding
algorithms that do not
Implement Network Coding (N o −N C), those using Deter-
minist Network Coding (D −N C), and those using Random
Network Coding (R −N C). Stars (⋆ ) indicate solutions that
have not yet been investigated but studied within this paper. Citations that appear in the cells of the table
help to position work in the literature.
Table I
CL A S S I FI C AT I O N O F D I FF U S I O N E X I S T I N G M E T H O D S .
No NC D-NC R-NC
PF [14] [11] [12]
MPR-based Flooding
Tree
[14][11][11] [12]
Dominant Pruning-
based
[15],[16
]
⋆ ⋆
Total Dominant
Pruning-based
[15],[16
]
⋆ ⋆
From this table, we can observe that most studies com- pared only two possible techniques. Only one
study [11] has compared three of them. The aim of this paper is to compare all possible combination
within this paper and fill the blank cells, represented by ⋆ : combination of Pruning-based flooding trees
and Network Coding techniques (random and deterministic).
IV. PE RFORMANCE ANALYSIS
The solutions that exist in the literature and discussed in this paper have obviously been evaluated by
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
125
June
2013
their respective authors. However, these studies were conducted separately and the assessments were made
under different conditions and assumptions. Herein we propose to make a synthesis of previous
conclusions and complete those works by propos- ing a global performance gain assessment by using the
same simulator developed for this study.
To evaluate the different techniques, both existing and the ones we have proposed in this paper, we
have conducted a number of simulations. All dissemination methods men- tioned in this article have been
evaluated under the same conditions and network parameters: a static ad hoc network with an average
degree equal to 4.5. Number of nodes in the topology varies from 20 to 80. Without loss of generality,
we consider that PHY/MAC layers ensure perfect collision avoidance for transmissions. Each point on the
following curves is the average result of a hundred simulations of the same scenario (number of nodes
and diffusion technique).
We evaluate here the required amount of data so that each node’s TC message is received by all nodes
in the network and required delay to disseminate data over the entire network.
A. Dissemination solutions for OLSR
According to Table I, Figure 2 shows the comparison results of six techniques that have been
proposed in the
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
126
June
2013
Numberoftransmittedpackets
Numberoftransmittedpackets
7000 7000
PF
MPR
6000 DPT
6000 T-DPT
5000
4000
3000
PF
MPR
R-PF
R-MPR
D-PF
D-MPR
5000
4000
3000
2000 2000
1000 1000
0
10 20 30 40 50 60 70 80
Number of nodes
0
10 20 30 40 50 60 70 80
Number of nodes
0
10 20 30 40 50 60 70 80
Number of nodes
Figure 2. Comparison of existing solutions for OLSR. Observe how random network coding
performs better than the deterministic one, whatever the technique it is associated to.
Literature: Pure Flooding (PF), Multi-Point Relay (MPR), Random Network Coding combined to
Pure Flooding (RNC- PF), Random Network Coding combined to Multi-Point Re- lay (RNC-
MPR), Deterministic Network Coding combined to Pure Flooding (DNC-PF), and
Deterministic Network Coding combined to Multi-Point Relay (DNC-MPR).
The first remark we can make is that PF is the method
that generates the most data to disseminate the information throughout the network. This result
is logical and expected because PF does not use any optimization technique. The second lesson
of this study is that the use of network coding gives better results than the use of a
broadcast tree in all cases. We can also see that both methods of network coding give
substantially the same results whether or not associated with a broadcast tree. Finally, we note
that the use of random network coding gives better results than the deterministic network
coding. This last result is surprising because the deterministic network coding is more intelligent
and expected to yield better results.
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
127
June
2013
Figure 3.Comparison of OLSR and non-OLSR message diffusion techniques. We can
remark that Total-Dominant Pruning Tree gives the best result, while the Partial-Dominant
Pruning tree is equivalent to MPR.
the framework of the diffusion of TC messages in OLSR. In this paper, we not only filled this
lack but, in addition, we compared the results obtained by our approach to the best technique
proposed for OLSR (Random-MPR) and the best offered in a more generic case (T-DPT ).
Figure 4 compares the results of the seven following
algorithms: Partial- and Total-Dominant Pruning Tree (re- spectively noted P-DPT and T-DPT)
without combination with network coding, Partial- and Total-Dominant Pruning Tree combined
with random network coding, respectively noted R-P-DPT and R-T-DPT, Partial- and Total-
Dominant Pruning Tree combined with deterministic network coding, respectively noted D-P-
DPT and D-T-DPT, and, finally, MPR technique combined to random network coding, noted
R-MPR.
6000
5000
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
128
June
2013
Numberoftransmittedpackets
B. TC message dissemination solutions: comparison
In Figure 3, we compare two methods proposed in the literature for message distribution in
a network, but not as part of OLSR. These methods are Partial- and Total- Dominant
Pruning tree, respectively noted P-DPT and T- DPT in this figure. We have implemented and
compared
4000
3000
2000
1000
DPT T-DPT R-DPT
R-T-DPT
D-DPT
D-T-DPT R-MPR
them with the two techniques available in OLSR: pure flooding (PF) and MPR.
We draw two important lessons from this figure: (i) P-
DPT yields results similar to MPR whatever the size of the topology and (ii) T-DPT is the best of
the four algorithms used here. Unsurprisingly, PF is the technique that generates the most
messages.
C. Proposed approaches
If we refer to Table 1, we can notice that no work, to the best of our knowledge, combining the
techniques of network coding and dominating pruning tree, has been performed in
0
10 20 30 40 50 60 70 80
Number of nodes
Figure 4. Proposed approaches compared to best existing ones. We observe that (i) random
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
129
June
2013
Numberofdecodedpackets
network coding still outperforms deterministic one and that (ii) using network coding reduces
the gap between tree-based techniques.
D. Random vs. Deterministic network coding
The first remark we can do here is on the significant interest in the use of network coding.
Therefore it is used; the amount of messages in the network has drastically reduced. Then we
can notice that T-DPT and P-DPT behave in
7000
6000
5000
4000
3000
2000
1000
0
Random Deterministic
0 10 20 30 40 50 60 70 80
Time (seconds)
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
130
June
2013
When different solutions have been proposed, they have been assessed separately.
As a main result, we show that network coding techniques Generally outperform tree based
ones, reducing by up to 50% the number of transmissions. However, we also show to
implement and requires less information exchanges to function, achieves a successful
dissemination by generating less transmissions than Determinist Network Coding. This is an
unexpected result in the sense that Determinist. Network Coding strives to find the best subset
of messages to encode in order to satisfy the maximum of neighbors. Once again, this result
shows that local optimization does not always lead to global optimal performances.
Figure 5. Number of useful packets as a function of time for Random and Deterministic
network coding.
almost identical ways since they are used with network coding, whether random or
deterministic. We note that using a random network coding on both DPT yields results similar
to those of MPR. Finally, we note, again, that the random network coding provides much better
results than the deterministic, regardless of the topology and whatever the technique to which
it is associated.
As stated in Sections IV-A and IV-C, random network coding provides, contrary to what one
might intuitively think, better results than deterministic. Because this result is somewhat non
intuitive, we wanted to understand why such behavior. For this, we analyzed the behavior of both
methods during a simulation and we have studied the evolution of the number of useful messages
in the network in both cases. The result of this study is presented in Figure 5.
We can observe, on this figure, two different behaviors for the two methods. On the one hand,
the number of messages relevant to the deterministic network coding scales linearly as the
encoding is done taking into account some neighbor knowledge so they can decode messages
when received. On the other hand, the number of messages relevant to the random
changes in a more chaotic way, because the encoding of messages is done completely
randomly. Thus, as can be seen in the figure, the nodes using random coding receive and store
messages that are not useful for a long time before receiving one message which allows to decode
a large number of stored messages, which increases the number of useful messages in the
network.
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
131
June
2013
V. CONCLUSION AND FURTHER WORK
In this study we investigate the problem of TC message dissemination in OLSR. The main
challenge in this context is to achieve a successful dissemination by minimizing the number of
required transmissions. To tackle this issue, two main approaches have been proposed yet. The
first consists in selecting a subset of nodes in charge of forwarding TC messages, and a second
one consists in using Network Coding techniques to optimize radio resource use. Moreover,
that the combination of tree based solutions and network coding improves performance gains in all
cases. For the first time, Random Network Coding and Determinist Network Random Network
Coding which is less complex the major point of this study is that Random Network Coding
presents better results of the most of studied solutions. Moreover, because it does not require
any addition in terms of data control, Random Network Coding based solutions seem to be one
of the most efficient solutions for information dissemination in wireless ad hoc networks.
As future work, we plan to implement those different
Solutions and integrate them into a test bed in order to both prove the concept of our solutions
and compare them under real conditions.
REFERENCES
[1] J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva, “A performance
comparison of multi-hop wireless ad hoc network routing protocols,” in Mobile Computing and
Networking, pp. 85–97, 1998.
[2] V. Park and M. Corson, “A Highly Adaptive Distributed Rout- ing Algorithm for Mobile
Wireless Networks,” in Proceedings of IEEE INFOCOM 1997, April 1997.
[3] C. Perkins, E. M. Royer and S. R. Das, “Ad Hoc On-Demand Distance Vector routing,” In
IETF Internet Draft, draft-ietf- manet-AODV-13.txt, February 2003.
[4].C.E.Perkins and E.M. Royer, “Ad hoc on demand distance
Vector (AODV) routing,”1999.
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
132
June
2013
[5] R. Ogier, F. Templin, and M. Lewis, “Topology Dissemination Based on Reverse-Path
Forwarding (TBRPF).” RFC, February 2004. IETF RFC-3684.
[6] T.clausen and P.Jaquet Optimized Link State Routing Protocol,”In IETF Internet
Draft,draft-ietf-manet-olsr-11.txt July 2003.
[7]C.E.Parkins and P.Bhagwat, Highly dynamic destination.
Sequenced distance vector routing (dsdv) for mobile computers,on”In SIGCOMM
’94:proceedings of the conference on communications architecture,protocols and
applications,(New York,NY,USA),pp
244,ACM Press,1994
[8] Z.J.Haas and M.P.Pearlman “Zm a hybrid framework For routing in ad hoc networks,”pp
221-253,2001.
[9] C.A Santivanez R.Ramanathan and I.Stavrakakis, “Mak-ing link-state routing scale for ad
hoc networks,” in MobiHoc’01: Proceedings of the 2nd ACM international symposium on
Mobile ad hoc networking & computing, (New York, NY, USA), pp. 22–32, ACM Press, 2001.
[10] S. Guha and S. Khuller, “an Approximation algorithm for connected dominating sets,”
Algorithmica, vol. 20, pp. 374–
387, 1996.
[11] N. Kadi and K. Al agha, “Optimized mpr-based flooding in wireless ad hoc network using
network coding,” in Wireless Days, 2008. WD ’08. 1st IFIP, pp. 1 –5, nov. 2008.
[12] N. Kadi and K. Al agha, “Mpr-based flooding with distributed fountain network coding,” in
IEEE WCNC 2010 Wireless Communication and Networking Conference, pp. 1 –5, nov.
2010.
[13] S. Crisostomo, J. Barros, and C. Bettstetter, “Flooding the network: Multipoint relays
IJESM Volume 2, Issue 2 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
133
June
2013
versus network coding,” in Cir- cuits and Systems for Communications, 2008. ICCSC 2008.
4th IEEE International Conference on, pp. 119 –124, May
2008.
[14] A. Qayyum, L. Viennot, and A. Laouiti, “Multipoint relaying for flooding broadcast messages
in mobile wireless networks,” in System Sciences, 2002. HICSS. Proceedings of the 35th
Annual Hawaii International Conference on, pp. 3866 – 3875, Jan. 2002.
[15] W. Peng and X.-C. Lu, “On the reduction of broadcast redundancy in mobile ad hoc
networks,” in Proceedings of the 1st ACM international symposium on Mobile ad hoc
networking & computing, MobiHoc ’00, (Piscataway, NJ, USA), pp. 129–130, IEEE Press,
2000.
[16] H. Lim and C. Kim, “Flooding in wireless ad hoc networks,”
Computer Communications, vol. 24, no. 3-4, pp. 353 – 363,
2001.

More Related Content

What's hot

Impacts of structural factors on
Impacts of structural factors onImpacts of structural factors on
Impacts of structural factors onijasuc
 
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...CSCJournals
 
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
 
Energy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LCEnergy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LCpaperpublications3
 
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...ijasuc
 
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...IJLT EMAS
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET Journal
 
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSA NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSIJCNCJournal
 
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...IJECEIAES
 
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETIMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETijcsa
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backupcsandit
 
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...ijasuc
 
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...IJCNCJournal
 
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...IJCNCJournal
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015parry prabhu
 

What's hot (17)

Impacts of structural factors on
Impacts of structural factors onImpacts of structural factors on
Impacts of structural factors on
 
Aps 10june2020
Aps 10june2020Aps 10june2020
Aps 10june2020
 
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
 
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
 
Energy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LCEnergy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LC
 
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
 
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
 
Hm2413291336
Hm2413291336Hm2413291336
Hm2413291336
 
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSA NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
 
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
 
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETIMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backup
 
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
 
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
 
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015
 

Similar to Analysis and overview of Flooding Attack in Optimized link State Routing protocol

SURVEY OF ENERGY EFFICIENT HIGH PERFORMANCE LOW POWER ROUTER FOR NETWORK ON CHIP
SURVEY OF ENERGY EFFICIENT HIGH PERFORMANCE LOW POWER ROUTER FOR NETWORK ON CHIPSURVEY OF ENERGY EFFICIENT HIGH PERFORMANCE LOW POWER ROUTER FOR NETWORK ON CHIP
SURVEY OF ENERGY EFFICIENT HIGH PERFORMANCE LOW POWER ROUTER FOR NETWORK ON CHIPIJESM JOURNAL
 
Enhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
Enhancing Energy Efficiency in WSN using Energy Potential and Energy BalancingEnhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
Enhancing Energy Efficiency in WSN using Energy Potential and Energy BalancingAM Publications,India
 
A Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor NetworksA Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor Networksijtsrd
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
 
IRJET- A Survey on Swarm Optimization Technique in Wireless Sensor Network
IRJET- A Survey on Swarm Optimization Technique in Wireless Sensor NetworkIRJET- A Survey on Swarm Optimization Technique in Wireless Sensor Network
IRJET- A Survey on Swarm Optimization Technique in Wireless Sensor NetworkIRJET Journal
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET Journal
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...M H
 
Cooperative ad hoc networks for energy efficient improve connectivity
Cooperative ad hoc networks for energy efficient improve connectivityCooperative ad hoc networks for energy efficient improve connectivity
Cooperative ad hoc networks for energy efficient improve connectivityeSAT Publishing House
 
A review on energy efficient clustering routing
A review on energy efficient clustering routingA review on energy efficient clustering routing
A review on energy efficient clustering routingeSAT Publishing House
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2IAEME Publication
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2IAEME Publication
 
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...ijasuc
 
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...ijasuc
 
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...ijasuc
 
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...ijasuc
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...rahulmonikasharma
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
 

Similar to Analysis and overview of Flooding Attack in Optimized link State Routing protocol (20)

SURVEY OF ENERGY EFFICIENT HIGH PERFORMANCE LOW POWER ROUTER FOR NETWORK ON CHIP
SURVEY OF ENERGY EFFICIENT HIGH PERFORMANCE LOW POWER ROUTER FOR NETWORK ON CHIPSURVEY OF ENERGY EFFICIENT HIGH PERFORMANCE LOW POWER ROUTER FOR NETWORK ON CHIP
SURVEY OF ENERGY EFFICIENT HIGH PERFORMANCE LOW POWER ROUTER FOR NETWORK ON CHIP
 
Enhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
Enhancing Energy Efficiency in WSN using Energy Potential and Energy BalancingEnhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
Enhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
 
A Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor NetworksA Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor Networks
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
 
IRJET- A Survey on Swarm Optimization Technique in Wireless Sensor Network
IRJET- A Survey on Swarm Optimization Technique in Wireless Sensor NetworkIRJET- A Survey on Swarm Optimization Technique in Wireless Sensor Network
IRJET- A Survey on Swarm Optimization Technique in Wireless Sensor Network
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
 
Cooperative ad hoc networks for energy efficient improve connectivity
Cooperative ad hoc networks for energy efficient improve connectivityCooperative ad hoc networks for energy efficient improve connectivity
Cooperative ad hoc networks for energy efficient improve connectivity
 
A review on energy efficient clustering routing
A review on energy efficient clustering routingA review on energy efficient clustering routing
A review on energy efficient clustering routing
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
 
1. 8481 1-pb
1. 8481 1-pb1. 8481 1-pb
1. 8481 1-pb
 
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
 
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
 
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
 
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
IMPACTS OF STRUCTURAL FACTORS ON ENERGY CONSUMPTION IN CLUSTER-BASED WIRELESS...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 

More from IJESM JOURNAL

SEMI-PARAMETRIC ESTIMATION OF Px,y({(x,y)/x >y}) FOR THE POWER FUNCTION DISTR...
SEMI-PARAMETRIC ESTIMATION OF Px,y({(x,y)/x >y}) FOR THE POWER FUNCTION DISTR...SEMI-PARAMETRIC ESTIMATION OF Px,y({(x,y)/x >y}) FOR THE POWER FUNCTION DISTR...
SEMI-PARAMETRIC ESTIMATION OF Px,y({(x,y)/x >y}) FOR THE POWER FUNCTION DISTR...IJESM JOURNAL
 
Comparative study of Terminating Newton Iterations: in Solving ODEs
Comparative study of Terminating Newton Iterations: in Solving ODEsComparative study of Terminating Newton Iterations: in Solving ODEs
Comparative study of Terminating Newton Iterations: in Solving ODEsIJESM JOURNAL
 
ON HOMOGENEOUS TERNARY QUADRATIC DIOPHANTINE EQUATION
ON HOMOGENEOUS TERNARY QUADRATIC DIOPHANTINE EQUATIONON HOMOGENEOUS TERNARY QUADRATIC DIOPHANTINE EQUATION
ON HOMOGENEOUS TERNARY QUADRATIC DIOPHANTINE EQUATIONIJESM JOURNAL
 
HOMOGENOUS BI-QUADRATIC WITH FIVE UNKNOWNS
HOMOGENOUS BI-QUADRATIC WITH FIVE UNKNOWNSHOMOGENOUS BI-QUADRATIC WITH FIVE UNKNOWNS
HOMOGENOUS BI-QUADRATIC WITH FIVE UNKNOWNSIJESM JOURNAL
 
STUDY OF RECESSIONAL PATTERN OF GLACIERS OF DHAULIGANGA VALLEY, UTTRAKHAND, I...
STUDY OF RECESSIONAL PATTERN OF GLACIERS OF DHAULIGANGA VALLEY, UTTRAKHAND, I...STUDY OF RECESSIONAL PATTERN OF GLACIERS OF DHAULIGANGA VALLEY, UTTRAKHAND, I...
STUDY OF RECESSIONAL PATTERN OF GLACIERS OF DHAULIGANGA VALLEY, UTTRAKHAND, I...IJESM JOURNAL
 
Implementation Of TPM with Case study
Implementation Of TPM with Case studyImplementation Of TPM with Case study
Implementation Of TPM with Case studyIJESM JOURNAL
 
DIFFERENTIAL OPERATORS AND STABILITY ANALYSIS OF THE WAGE FUNCTION
DIFFERENTIAL OPERATORS AND STABILITY ANALYSIS OF THE WAGE FUNCTIONDIFFERENTIAL OPERATORS AND STABILITY ANALYSIS OF THE WAGE FUNCTION
DIFFERENTIAL OPERATORS AND STABILITY ANALYSIS OF THE WAGE FUNCTIONIJESM JOURNAL
 
Vocal Translation For Muteness People Using Speech Synthesizer
Vocal Translation For Muteness People Using Speech SynthesizerVocal Translation For Muteness People Using Speech Synthesizer
Vocal Translation For Muteness People Using Speech SynthesizerIJESM JOURNAL
 
Green supply chain management in Indian Electronics & Telecommunication Industry
Green supply chain management in Indian Electronics & Telecommunication IndustryGreen supply chain management in Indian Electronics & Telecommunication Industry
Green supply chain management in Indian Electronics & Telecommunication IndustryIJESM JOURNAL
 
BER Performance Analysis of Open and Closed Loop Power Control in LTE
BER Performance Analysis of Open and Closed Loop Power Control in LTEBER Performance Analysis of Open and Closed Loop Power Control in LTE
BER Performance Analysis of Open and Closed Loop Power Control in LTEIJESM JOURNAL
 
Rainfall Trends and Variability in Tamil Nadu (1983 - 2012): Indicator of Cli...
Rainfall Trends and Variability in Tamil Nadu (1983 - 2012): Indicator of Cli...Rainfall Trends and Variability in Tamil Nadu (1983 - 2012): Indicator of Cli...
Rainfall Trends and Variability in Tamil Nadu (1983 - 2012): Indicator of Cli...IJESM JOURNAL
 
The Political, Legal & Technological Environment in Global Scenario
The Political, Legal & Technological Environment in Global ScenarioThe Political, Legal & Technological Environment in Global Scenario
The Political, Legal & Technological Environment in Global ScenarioIJESM JOURNAL
 
SUPPLIER SELECTION AND EVALUATION – AN INTEGRATED APPROACH OF QFD & AHP
SUPPLIER SELECTION AND EVALUATION – AN INTEGRATED APPROACH OF QFD & AHPSUPPLIER SELECTION AND EVALUATION – AN INTEGRATED APPROACH OF QFD & AHP
SUPPLIER SELECTION AND EVALUATION – AN INTEGRATED APPROACH OF QFD & AHPIJESM JOURNAL
 
FURTHER CHARACTERIZATIONS AND SOME APPLICATIONS OF UPPER AND LOWER WEAKLY QUA...
FURTHER CHARACTERIZATIONS AND SOME APPLICATIONS OF UPPER AND LOWER WEAKLY QUA...FURTHER CHARACTERIZATIONS AND SOME APPLICATIONS OF UPPER AND LOWER WEAKLY QUA...
FURTHER CHARACTERIZATIONS AND SOME APPLICATIONS OF UPPER AND LOWER WEAKLY QUA...IJESM JOURNAL
 
INVARIANCE OF SEPARATION AXIOMS IN ISOTONIC SPACES WITH RESPECT TO PERFECT MA...
INVARIANCE OF SEPARATION AXIOMS IN ISOTONIC SPACES WITH RESPECT TO PERFECT MA...INVARIANCE OF SEPARATION AXIOMS IN ISOTONIC SPACES WITH RESPECT TO PERFECT MA...
INVARIANCE OF SEPARATION AXIOMS IN ISOTONIC SPACES WITH RESPECT TO PERFECT MA...IJESM JOURNAL
 
MATHEMATICAL MODELLING OF POWER OUTPUT IN A WIND ENERGY CONVERSION SYSTEM
MATHEMATICAL MODELLING OF POWER OUTPUT IN A WIND ENERGY CONVERSION SYSTEMMATHEMATICAL MODELLING OF POWER OUTPUT IN A WIND ENERGY CONVERSION SYSTEM
MATHEMATICAL MODELLING OF POWER OUTPUT IN A WIND ENERGY CONVERSION SYSTEMIJESM JOURNAL
 
INTRODUCING AN INTEGRATING FACTOR IN STUDYING THE WAGE EQUATION
INTRODUCING AN INTEGRATING FACTOR IN STUDYING THE WAGE EQUATIONINTRODUCING AN INTEGRATING FACTOR IN STUDYING THE WAGE EQUATION
INTRODUCING AN INTEGRATING FACTOR IN STUDYING THE WAGE EQUATIONIJESM JOURNAL
 
Vocal Translation For Muteness People Using Speech Synthesizer
Vocal Translation For Muteness People Using Speech SynthesizerVocal Translation For Muteness People Using Speech Synthesizer
Vocal Translation For Muteness People Using Speech SynthesizerIJESM JOURNAL
 
ANALYTICAL STUDY OF WAVE MOTION OF A FALLING LIQUID FILM PAST A VERTICAL PLATE
ANALYTICAL STUDY OF WAVE MOTION OF A FALLING LIQUID FILM PAST A VERTICAL PLATEANALYTICAL STUDY OF WAVE MOTION OF A FALLING LIQUID FILM PAST A VERTICAL PLATE
ANALYTICAL STUDY OF WAVE MOTION OF A FALLING LIQUID FILM PAST A VERTICAL PLATEIJESM JOURNAL
 
APPLICATION OF THE METHOD OF VARIATION OF PARAMETERS: MATHEMATICAL MODEL FOR ...
APPLICATION OF THE METHOD OF VARIATION OF PARAMETERS: MATHEMATICAL MODEL FOR ...APPLICATION OF THE METHOD OF VARIATION OF PARAMETERS: MATHEMATICAL MODEL FOR ...
APPLICATION OF THE METHOD OF VARIATION OF PARAMETERS: MATHEMATICAL MODEL FOR ...IJESM JOURNAL
 

More from IJESM JOURNAL (20)

SEMI-PARAMETRIC ESTIMATION OF Px,y({(x,y)/x >y}) FOR THE POWER FUNCTION DISTR...
SEMI-PARAMETRIC ESTIMATION OF Px,y({(x,y)/x >y}) FOR THE POWER FUNCTION DISTR...SEMI-PARAMETRIC ESTIMATION OF Px,y({(x,y)/x >y}) FOR THE POWER FUNCTION DISTR...
SEMI-PARAMETRIC ESTIMATION OF Px,y({(x,y)/x >y}) FOR THE POWER FUNCTION DISTR...
 
Comparative study of Terminating Newton Iterations: in Solving ODEs
Comparative study of Terminating Newton Iterations: in Solving ODEsComparative study of Terminating Newton Iterations: in Solving ODEs
Comparative study of Terminating Newton Iterations: in Solving ODEs
 
ON HOMOGENEOUS TERNARY QUADRATIC DIOPHANTINE EQUATION
ON HOMOGENEOUS TERNARY QUADRATIC DIOPHANTINE EQUATIONON HOMOGENEOUS TERNARY QUADRATIC DIOPHANTINE EQUATION
ON HOMOGENEOUS TERNARY QUADRATIC DIOPHANTINE EQUATION
 
HOMOGENOUS BI-QUADRATIC WITH FIVE UNKNOWNS
HOMOGENOUS BI-QUADRATIC WITH FIVE UNKNOWNSHOMOGENOUS BI-QUADRATIC WITH FIVE UNKNOWNS
HOMOGENOUS BI-QUADRATIC WITH FIVE UNKNOWNS
 
STUDY OF RECESSIONAL PATTERN OF GLACIERS OF DHAULIGANGA VALLEY, UTTRAKHAND, I...
STUDY OF RECESSIONAL PATTERN OF GLACIERS OF DHAULIGANGA VALLEY, UTTRAKHAND, I...STUDY OF RECESSIONAL PATTERN OF GLACIERS OF DHAULIGANGA VALLEY, UTTRAKHAND, I...
STUDY OF RECESSIONAL PATTERN OF GLACIERS OF DHAULIGANGA VALLEY, UTTRAKHAND, I...
 
Implementation Of TPM with Case study
Implementation Of TPM with Case studyImplementation Of TPM with Case study
Implementation Of TPM with Case study
 
DIFFERENTIAL OPERATORS AND STABILITY ANALYSIS OF THE WAGE FUNCTION
DIFFERENTIAL OPERATORS AND STABILITY ANALYSIS OF THE WAGE FUNCTIONDIFFERENTIAL OPERATORS AND STABILITY ANALYSIS OF THE WAGE FUNCTION
DIFFERENTIAL OPERATORS AND STABILITY ANALYSIS OF THE WAGE FUNCTION
 
Vocal Translation For Muteness People Using Speech Synthesizer
Vocal Translation For Muteness People Using Speech SynthesizerVocal Translation For Muteness People Using Speech Synthesizer
Vocal Translation For Muteness People Using Speech Synthesizer
 
Green supply chain management in Indian Electronics & Telecommunication Industry
Green supply chain management in Indian Electronics & Telecommunication IndustryGreen supply chain management in Indian Electronics & Telecommunication Industry
Green supply chain management in Indian Electronics & Telecommunication Industry
 
BER Performance Analysis of Open and Closed Loop Power Control in LTE
BER Performance Analysis of Open and Closed Loop Power Control in LTEBER Performance Analysis of Open and Closed Loop Power Control in LTE
BER Performance Analysis of Open and Closed Loop Power Control in LTE
 
Rainfall Trends and Variability in Tamil Nadu (1983 - 2012): Indicator of Cli...
Rainfall Trends and Variability in Tamil Nadu (1983 - 2012): Indicator of Cli...Rainfall Trends and Variability in Tamil Nadu (1983 - 2012): Indicator of Cli...
Rainfall Trends and Variability in Tamil Nadu (1983 - 2012): Indicator of Cli...
 
The Political, Legal & Technological Environment in Global Scenario
The Political, Legal & Technological Environment in Global ScenarioThe Political, Legal & Technological Environment in Global Scenario
The Political, Legal & Technological Environment in Global Scenario
 
SUPPLIER SELECTION AND EVALUATION – AN INTEGRATED APPROACH OF QFD & AHP
SUPPLIER SELECTION AND EVALUATION – AN INTEGRATED APPROACH OF QFD & AHPSUPPLIER SELECTION AND EVALUATION – AN INTEGRATED APPROACH OF QFD & AHP
SUPPLIER SELECTION AND EVALUATION – AN INTEGRATED APPROACH OF QFD & AHP
 
FURTHER CHARACTERIZATIONS AND SOME APPLICATIONS OF UPPER AND LOWER WEAKLY QUA...
FURTHER CHARACTERIZATIONS AND SOME APPLICATIONS OF UPPER AND LOWER WEAKLY QUA...FURTHER CHARACTERIZATIONS AND SOME APPLICATIONS OF UPPER AND LOWER WEAKLY QUA...
FURTHER CHARACTERIZATIONS AND SOME APPLICATIONS OF UPPER AND LOWER WEAKLY QUA...
 
INVARIANCE OF SEPARATION AXIOMS IN ISOTONIC SPACES WITH RESPECT TO PERFECT MA...
INVARIANCE OF SEPARATION AXIOMS IN ISOTONIC SPACES WITH RESPECT TO PERFECT MA...INVARIANCE OF SEPARATION AXIOMS IN ISOTONIC SPACES WITH RESPECT TO PERFECT MA...
INVARIANCE OF SEPARATION AXIOMS IN ISOTONIC SPACES WITH RESPECT TO PERFECT MA...
 
MATHEMATICAL MODELLING OF POWER OUTPUT IN A WIND ENERGY CONVERSION SYSTEM
MATHEMATICAL MODELLING OF POWER OUTPUT IN A WIND ENERGY CONVERSION SYSTEMMATHEMATICAL MODELLING OF POWER OUTPUT IN A WIND ENERGY CONVERSION SYSTEM
MATHEMATICAL MODELLING OF POWER OUTPUT IN A WIND ENERGY CONVERSION SYSTEM
 
INTRODUCING AN INTEGRATING FACTOR IN STUDYING THE WAGE EQUATION
INTRODUCING AN INTEGRATING FACTOR IN STUDYING THE WAGE EQUATIONINTRODUCING AN INTEGRATING FACTOR IN STUDYING THE WAGE EQUATION
INTRODUCING AN INTEGRATING FACTOR IN STUDYING THE WAGE EQUATION
 
Vocal Translation For Muteness People Using Speech Synthesizer
Vocal Translation For Muteness People Using Speech SynthesizerVocal Translation For Muteness People Using Speech Synthesizer
Vocal Translation For Muteness People Using Speech Synthesizer
 
ANALYTICAL STUDY OF WAVE MOTION OF A FALLING LIQUID FILM PAST A VERTICAL PLATE
ANALYTICAL STUDY OF WAVE MOTION OF A FALLING LIQUID FILM PAST A VERTICAL PLATEANALYTICAL STUDY OF WAVE MOTION OF A FALLING LIQUID FILM PAST A VERTICAL PLATE
ANALYTICAL STUDY OF WAVE MOTION OF A FALLING LIQUID FILM PAST A VERTICAL PLATE
 
APPLICATION OF THE METHOD OF VARIATION OF PARAMETERS: MATHEMATICAL MODEL FOR ...
APPLICATION OF THE METHOD OF VARIATION OF PARAMETERS: MATHEMATICAL MODEL FOR ...APPLICATION OF THE METHOD OF VARIATION OF PARAMETERS: MATHEMATICAL MODEL FOR ...
APPLICATION OF THE METHOD OF VARIATION OF PARAMETERS: MATHEMATICAL MODEL FOR ...
 

Recently uploaded

Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)PraveenaKalaiselvan1
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsSumit Kumar yadav
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡anilsa9823
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...ssifa0344
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisDiwakar Mishra
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfSumit Kumar yadav
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
G9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptG9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptMAESTRELLAMesa2
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptxRajatChauhan518211
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxpradhanghanshyam7136
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 

Recently uploaded (20)

Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questions
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdf
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
G9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptG9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.ppt
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptx
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptx
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 

Analysis and overview of Flooding Attack in Optimized link State Routing protocol

  • 1. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 113 June 2013 Analysis and overview of Flooding Attack in Optimized link State Routing protocol Akshat Khaskalam Mr.Sandeep Sahu Abstract—During this last decade, mesh networks have experienced strong growth due to their ability to provide an additional and complementary support for existing infrastructure communication systems. In such a network, routers are supposed to be fixed for short (e.g. public safety deployment) or long (e.g. network operator extension) period. This relative stability of infrastructure makes proactive routing protocols appropriate. One of the well known proactive routing protocols is OLSR (Optimized Link State Routing), which routing decisions are based on exchanges of topology information using all-to-all flooding of local information in order for each router to build a global knowledge of the topology. This study first goal is to improve the performance of topology information flooding in OLSR by introducing network coding techniques, which leads to a decrease of signaling overhead. Keywords-Network coding; Wireless Networks; Network re- source efficiency; Topology information dissemination; Broad- cast all-to-all; Multi-Point Relays  M.E.Scholar, Shri Ram Institute of Technology, Jabalpur, India  Asst.Prof, Shri Ram Institute of Technology, Jabalpur, India
  • 2. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 114 June 2013 I. INTRODUCTIO N Rapidly deployable mesh networks have gained wide popularity in recent years due to their deployment ease and low cost implementation. They are used in many application areas such as communication networks for public security forces and temporary extensions of operator networks. Given that mesh networks are self-organizing, data for- warding between users is a challenge and requires consider- erable efforts from the scientific community. Several types of routing protocols have been proposed, each with its own variants. Most common routing protocols are either reactive ([1], [2], [3], [4]) or proactive ([5], [6], [7]), even if some hybrid routing protocols exist ( [8], [9]). On one hand, reactive protocols do generate control messages only when necessary. Thus, mechanism for route computation is activated only when a request to establish communication occurs. On the other hand, proactive protocols exchange control messages on a regular basis in order to insure up-to- date routing tables. It is therefore clear that reactive routing protocols generate less control messages than proactive ones, but require more delay for communication establishment. The choice of using either type of routing is based on a tradeoff between network overhead introduced by topology dissemination and the time for communication establishment one wishes to tolerate. In cases where mobility exists but is not permanent nor very important, proactive protocols are more advantageous, especially if energy, resources, memory, and CPU are not critical, as it is the case in ad hoc network consisting of emergency vehicles (e.g. fire trucks, police cars, or ambulances) in public safety interventions. In such a situation, rather it is the radio resource that should be saved. Thus, the exchange of control messages, considered as overload since it does not convey data information, should be optimized in order to minimize radio resource waste. Economy of radio resources in a proactive routing pro- tocol requires the amount of control messages that allow operation of the protocol to be optimized. In this paper, we focus on OLSR (Optimize Link State Routing protocol), the most used proactive routing protocol. OLSR operates in four steps: (i) local topology discovery, ensured by the exchange of HELLO messages between neighboring nodes, (ii) local information sharing by TC (Topology Control) diffusion over the whole network, (iii) route calculation through shortest path algorithm, and (iv) routing table update according to route calculation. In this paper, we focus on TC message diffusion within the network and investigate how to
  • 3. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 115 June 2013 optimize radio resource usage while achieving a successful dissemination, i.e. all nodes have the required information for global network knowledge. Initially, TC message diffusion consisted in PF (Pure Flooding), where every node broadcasts every message it receives. Obviously, PF generates transmission redundancy and one of the major impacts of such a protocol is the radio resource waste to achieve complete disseminate- tion. In order to make diffusion of topology information more efficient, several techniques, which actually reduce signaling overhead, have been proposed. Traditionally, this all-to- all broadcast is implemented by letting each node store and forward received packets. Some of these techniques are based on the selection of a subset of nodes, form- ing a CDS (Connected Dominating Set) [10], in charge of relaying topology information. Among these methods, we can mention the so called MPR (Multi point Relay), which has been adopted by OLSR. More recent proposals are based on information coding techniques, especially NC (Network Coding) mechanisms, which aim to reduce the amount of data required to transmit information in the network. In NC-based approaches, each node overhears #$ " ! ! ! " " " ! #% (a) Pure Flooding. #$ !#" ! ! " " !#" #% (c) Network coding flooding.
  • 4. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 116 June 2013 #$ " ! ! ! " " #% (b) CDS-based flooding. #$ !#" ! ! " " #% (d) CDS and network coding flood- ing. describe main flooding solutions developed either for OLSR or for other goals. In Section III, we summarize existing techniques and describe novel approaches proposed within this paper that aim at filling gaps. Performance comparison between existing and new proposed solutions is performed within Section IV, while Section V discusses the results and concludes the paper. II. FL OODING ALGORITHMS A.Preliminary definitions Let us consider an ad hoc network represented by a graph G = (V, E) where V is the set of wireless nodes and E the set of edges. Each node of V is characterized by its geographic coordinates and the power of transmission. The transmission range of a host u ∈ V is represented by a
  • 5. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 117 June 2013 Figure 1. This figure compares, in a simple example, the various existing techniques and shows the number of generated packets for a total diffusion. In this example, Pure Flooding needs 6 transmissions when Connected Dominating Set based solution and Network Coding needs 4. The combination of both Connected Dominating Set based flooding and Network Coding requires only 3 to achieve the same goal. packets transmitted from neighboring nodes, combines them, and forwards the resulting packets to its neighbors. The goal is to generate fewer transmissions, which helps to save radio resources and energy. Finally, some works strive to reduce redundant transmissions by combining MPR-based flooding and Network Coding either determinist [11] or random [12]. The combination of CDS-based flooding and network coding shows considerable performance gains for topology information dissemination. Figure 1 illustrates, by a simple example, the concept and benefits of previously described approaches: Pure Flooding, CDS-based Flooding, Network Coding, and CDS-based Flooding using Network Coding. The purpose of this paper is to summarize existing solutions in order to explore possible optimization of TC message dissemination in OLSR. The goal here is not to radically change the functioning of OLSR but to maintain an efficient dissemination of TC messages by reducing the induced overhead. The contributions of this paper are the following: • Overview of existing TC message diffusion proposals for OLSR, either based on relay selection and/or net- work coding, • Proposal of new methods not yet explored combining Connected Dominating Set and Network Coding ap- porches, • Performance gain assessment of all approaches, existing and proposed ones, by simulations, under the same conditions and parameters, and Analysis of the results and enlightenment about some Network Coding unexpected behaviors. This paper is organized as follows. In Section II, we
  • 6. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 118 June 2013 Circle of center u. For all nodes v in this circle there is exists an edge in E, noted (u, v). We call 1-hop neighbors of u, noted N (u), nodes v such as ∀ v ∈ V, ∃ (u, v) ∈ E and 2-hop neighbors of u, noted N (N (u)), nodes w such as ∀ w ∈ N (N (u)), ∃ v ∈ N (u)|∃ (v, w) ∈ E. Obviously, a node in N (N (u) can also belong to N (u). 1) Local topology discovery: Periodically, node u sends an update message towards nodes in N (u) and naturally, receives update message from nodes in N (u). This update message, called HELLO message in OLSR, contains the list of nodes of N (u). After receiving all update messages from N (u) nodes, u has now the knowledge of its 2-hop topology. 2) Local topology dissemination: Periodically, node u disseminates its 2-hop topology knowledge towards all nodes of the network. It first creates a 2-hop topology message, also called a Topology Control (TC) message in OLSR. This message contains the list of nodes in N (N (u)). Once created, the TC message is broadcasted towards all nodes in N (u). When receiving a TC message, nodes forward it towards their own 1-hop neighborhood, and so on. In order to avoid infinite loop, a node only forwards a TC message once. A unique sequence number in the TC message header is used for message identification. This process ends when all nodes have forwarded this TC message once. This local topology dissemination algorithm is called Pure Flooding. As a main drawback, this algorithm does not prevent from redundant transmissions, i.e. a transmission is considered to be useless when a node u sends a TC message whereas all nodes in N (u) have already received it before. We now describe tree based Flooding, Network Coding based approaches and finally Network Coding performed on top of tree based Flooding. B.Connected Dominated Set based approaches A Connected Dominated Set (CDS) of a graph G is a set N nodes with the two following properties: 1) The sub graph of G induced by D is connected. 2) The set D is a dominating set of G, i.e. a node either belongs to D or is adjacent to a node in D.
  • 7. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 119 June 2013 Connected Dominated Set based approaches consist in selecting nodes to form a CDS and activating forwarding only for this subset. The leaves of the tree do not forward any message. Reducing the number of nodes in the CDS means reducing the number of transmissions required to achieve successful dissemination. However, finding the CDS with the smallest cardinality is NP-Complete. In the depths of difficulty, building the CDS in ad hoc networks has to be distributed. Many heuristics exist, in this paper we focus on three of them. First we present the one implemented in OLSR -called MPR (Multi Point Relay). Then, we detail two other ones, Dominant Pruning based and Total Dominant Pruning solutions that aim at reducing broadcast Redundancy in ad hoc networks but not in the context of OLSR. The dominant Pruning is one of the first Pruning-based solutions proposed and the Total Dominant Pruning is the most efficient one according to literature. 1) Connected Do mi n ated S et: MPR h e u r i s t i c : MPR stands for Multi Point Relay and is implemented in the last version of OLSR. The heuristic consists, for each node u ∈ G in proactively selecting the subset of nodes in N (u). Each node acts locally and on a distributive manner. The Multi Point Relay selection process for the node u is detailed in Algorithm 1.
  • 8. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 120 June 2013 Algorithm 2 MPR Forwarding rules 1: procedure MPR (u) 2: if v ∈ M P R (u) and T Cu was not previously Forwarded then 3: v Broadcasts T Cu 4: end if 5: end procedure Clause, the TC message would be forwarded once again by u and so on. 2) Connected Dominated Set: Pruning heuristic: As the MPR heuristic, Pruning heuristics also use 2-hops information. However, opposing to MPR heuristic where a node u defines a list of forwarding nodes whatever the source node, the Pruning heuristic takes into account the node from which the message is received. Indeed, if the node t has just sent this message then, all nodes in N (t) have received this message too. Therefore, the node u can determine its Relay Nodes list F (t, u) from B(t, u) = N (u) −N (t) in order to Cover nodes in U(t, u) = N (N (u)) − N (t) −N (u) (resp. U(t, u) = N (N (u)) −N (N (t))) for the Dominant Pruning (resp. for the Total Dominant Pruning). Let Z be a subset of U (t, u) covered so far, Si the neighbor set of vi ∈ N (u) and K be the set of Si . Algorithm 1 MPR heuristic 1: procedure MPR (u) 2: M P R (u) = [] 3: UnC overed (u) = N (N (u)) 4: while!∃ v ∈ N (u) | w ∈ N (v), w ∈ N (N (u) do 5: M P R (u) ← v
  • 9. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 121 June 2013 6: UnC overed (u) = UnC overed (u) − N (v) 7: end while 8: while Uuncovered (u) = Ø do 9: if Uuncovered (u)N (vi) = maxv∈ N (u)(Uuncovered (u) ∧ N (vi )) then 10: M P R (u) ← v 11: end if 12: end while 13: return M P R (u) 14: end procedure When receiving a TC message from u, noted T Cu , each node v ∈ N (u) follows the forwarding rules detailed in Algorithm 2. Therefore, the MPR heuristic ensures a successful dis- semination of all TC messages in the whole network. The procedure stops when all MPR have forwarded once the TC message of nodes that select them as MPR. In the Algorithm 2, MPR nodes broadcast a TC message only once in order to avoid forwarding loops. Indeed, it is possible for a node v to select the node u in its MPR list. Without this
  • 10. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 122 June 2013 Algorithm 3 Pruning Heuristic 1: procedure DOMINANT PRUNING(v) 2: F (u) = ∪ t∈ N (u)F (t, u) 3: for u ∈ N (v) do 4: F (t, u) = [] 5: Z = Ø 6: K ∪ Si with Si = N (ui ) ∩ U(t, u) for ui ∈ B (t, u) 7: while Z = U(t, u) do 8: if Sk (uk) = maxSi ∈ K (|Si|) then 9: F (t, u) ← uk 10: Z = Z ∪ Sk 11: Sj = Sj −Sk ∀ Sj ∈ K 12: end if 13: end while 14: end for 15: return F (v) 16: end procedure When receiving a TC message from u, noted T Cu that have been sent before by t, each node v ∈ N (u) follows the Forwarding rules detailed in Algorithm 4. The node v has to know the 2-hops previous sender of the message before re-broadcasting or not the message. C. Network Coding Based approaches Network Coding based approaches aim at reducing num- ber of transmissions by benefiting of the broadcast nature
  • 11. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 123 June 2013 Afi algorithm 4 Pruning Forwarding rules 1: procedure MPR(u) 2: if v ∈ F (t, u) and T Cu was not previously for- Warded then 3: v Broadcasts T Cu 4: end if 5: end procedure of the wireless medium. In contrary to the flooding tree based solutions, Network Coding techniques do not exclude any nodes from the forwarding activity. Deciding which messages are encoded can be done either deterministically or randomly. 1) Determinist Network Coding: Determinist Network Coding consists in selecting deterministically a subset of messages to be encoded. In [11], messages are encoded in order to maximize the number of neighbors that will be able to immediately decode it. To do so, nodes need to know the list of messages that have all of their neighbor nodes. This can be achieved by an additional protocol [11]. 2) Random Network Coding: Random Network Coding consists in combining messages randomly without any knowledge of what have the nodes in the neighborhood. Crisostomo et al. [13] performed a comparison between MPR diffusion and network coding technique. As a main conclusion, the study shows that network coding clearly outperforms MPR in most of the cases. D. Hybrid approaches We refer to hybrid approaches for proposals designed to reduce the number of transmissions required for flooding in wireless ad-hoc networks using network coding on a a Connected Dominating Set. Simple distributed coding scheme which can be applied at each node are proposed in [12] and [11] where the efficiency of network coding is further enhanced by applying multiple point relays (MPR). 1) MPR-based flooding tree with Determinist Network Coding: As for simple Determinist Network Coding, a sub- set of messages to be encoded is selected based on neighbor information knowledge. The only difference comes from the fact that this process occurs only on a subset of nodes belonging to a
  • 12. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 124 June 2013 previously defined dominating set. Authors from [11] have used MPR to implement the concept of dominating set coupled with Determinist Network Coding. 2) MPR-based flooding tree with Random Network Cod- ing: A subset of messages to be encoded is chosen randomly without any knowledge about neighbor’s data. Combining MPR-based flooding and Random Network Coding is per- formed in [ 12]. III. Synthesis and Novel Approaches Different solutions, flooding tree based, network coding based, or hybrid ones have been investigated. Table I gives an overview of those studied solutions. Columns indicate from left to right flooding algorithms that do not Implement Network Coding (N o −N C), those using Deter- minist Network Coding (D −N C), and those using Random Network Coding (R −N C). Stars (⋆ ) indicate solutions that have not yet been investigated but studied within this paper. Citations that appear in the cells of the table help to position work in the literature. Table I CL A S S I FI C AT I O N O F D I FF U S I O N E X I S T I N G M E T H O D S . No NC D-NC R-NC PF [14] [11] [12] MPR-based Flooding Tree [14][11][11] [12] Dominant Pruning- based [15],[16 ] ⋆ ⋆ Total Dominant Pruning-based [15],[16 ] ⋆ ⋆ From this table, we can observe that most studies com- pared only two possible techniques. Only one study [11] has compared three of them. The aim of this paper is to compare all possible combination within this paper and fill the blank cells, represented by ⋆ : combination of Pruning-based flooding trees and Network Coding techniques (random and deterministic). IV. PE RFORMANCE ANALYSIS The solutions that exist in the literature and discussed in this paper have obviously been evaluated by
  • 13. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 125 June 2013 their respective authors. However, these studies were conducted separately and the assessments were made under different conditions and assumptions. Herein we propose to make a synthesis of previous conclusions and complete those works by propos- ing a global performance gain assessment by using the same simulator developed for this study. To evaluate the different techniques, both existing and the ones we have proposed in this paper, we have conducted a number of simulations. All dissemination methods men- tioned in this article have been evaluated under the same conditions and network parameters: a static ad hoc network with an average degree equal to 4.5. Number of nodes in the topology varies from 20 to 80. Without loss of generality, we consider that PHY/MAC layers ensure perfect collision avoidance for transmissions. Each point on the following curves is the average result of a hundred simulations of the same scenario (number of nodes and diffusion technique). We evaluate here the required amount of data so that each node’s TC message is received by all nodes in the network and required delay to disseminate data over the entire network. A. Dissemination solutions for OLSR According to Table I, Figure 2 shows the comparison results of six techniques that have been proposed in the
  • 14. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 126 June 2013 Numberoftransmittedpackets Numberoftransmittedpackets 7000 7000 PF MPR 6000 DPT 6000 T-DPT 5000 4000 3000 PF MPR R-PF R-MPR D-PF D-MPR 5000 4000 3000 2000 2000 1000 1000 0 10 20 30 40 50 60 70 80 Number of nodes 0 10 20 30 40 50 60 70 80 Number of nodes 0 10 20 30 40 50 60 70 80 Number of nodes Figure 2. Comparison of existing solutions for OLSR. Observe how random network coding performs better than the deterministic one, whatever the technique it is associated to. Literature: Pure Flooding (PF), Multi-Point Relay (MPR), Random Network Coding combined to Pure Flooding (RNC- PF), Random Network Coding combined to Multi-Point Re- lay (RNC- MPR), Deterministic Network Coding combined to Pure Flooding (DNC-PF), and Deterministic Network Coding combined to Multi-Point Relay (DNC-MPR). The first remark we can make is that PF is the method that generates the most data to disseminate the information throughout the network. This result is logical and expected because PF does not use any optimization technique. The second lesson of this study is that the use of network coding gives better results than the use of a broadcast tree in all cases. We can also see that both methods of network coding give substantially the same results whether or not associated with a broadcast tree. Finally, we note that the use of random network coding gives better results than the deterministic network coding. This last result is surprising because the deterministic network coding is more intelligent and expected to yield better results.
  • 15. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 127 June 2013 Figure 3.Comparison of OLSR and non-OLSR message diffusion techniques. We can remark that Total-Dominant Pruning Tree gives the best result, while the Partial-Dominant Pruning tree is equivalent to MPR. the framework of the diffusion of TC messages in OLSR. In this paper, we not only filled this lack but, in addition, we compared the results obtained by our approach to the best technique proposed for OLSR (Random-MPR) and the best offered in a more generic case (T-DPT ). Figure 4 compares the results of the seven following algorithms: Partial- and Total-Dominant Pruning Tree (re- spectively noted P-DPT and T-DPT) without combination with network coding, Partial- and Total-Dominant Pruning Tree combined with random network coding, respectively noted R-P-DPT and R-T-DPT, Partial- and Total- Dominant Pruning Tree combined with deterministic network coding, respectively noted D-P- DPT and D-T-DPT, and, finally, MPR technique combined to random network coding, noted R-MPR. 6000 5000
  • 16. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 128 June 2013 Numberoftransmittedpackets B. TC message dissemination solutions: comparison In Figure 3, we compare two methods proposed in the literature for message distribution in a network, but not as part of OLSR. These methods are Partial- and Total- Dominant Pruning tree, respectively noted P-DPT and T- DPT in this figure. We have implemented and compared 4000 3000 2000 1000 DPT T-DPT R-DPT R-T-DPT D-DPT D-T-DPT R-MPR them with the two techniques available in OLSR: pure flooding (PF) and MPR. We draw two important lessons from this figure: (i) P- DPT yields results similar to MPR whatever the size of the topology and (ii) T-DPT is the best of the four algorithms used here. Unsurprisingly, PF is the technique that generates the most messages. C. Proposed approaches If we refer to Table 1, we can notice that no work, to the best of our knowledge, combining the techniques of network coding and dominating pruning tree, has been performed in 0 10 20 30 40 50 60 70 80 Number of nodes Figure 4. Proposed approaches compared to best existing ones. We observe that (i) random
  • 17. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 129 June 2013 Numberofdecodedpackets network coding still outperforms deterministic one and that (ii) using network coding reduces the gap between tree-based techniques. D. Random vs. Deterministic network coding The first remark we can do here is on the significant interest in the use of network coding. Therefore it is used; the amount of messages in the network has drastically reduced. Then we can notice that T-DPT and P-DPT behave in 7000 6000 5000 4000 3000 2000 1000 0 Random Deterministic 0 10 20 30 40 50 60 70 80 Time (seconds)
  • 18. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 130 June 2013 When different solutions have been proposed, they have been assessed separately. As a main result, we show that network coding techniques Generally outperform tree based ones, reducing by up to 50% the number of transmissions. However, we also show to implement and requires less information exchanges to function, achieves a successful dissemination by generating less transmissions than Determinist Network Coding. This is an unexpected result in the sense that Determinist. Network Coding strives to find the best subset of messages to encode in order to satisfy the maximum of neighbors. Once again, this result shows that local optimization does not always lead to global optimal performances. Figure 5. Number of useful packets as a function of time for Random and Deterministic network coding. almost identical ways since they are used with network coding, whether random or deterministic. We note that using a random network coding on both DPT yields results similar to those of MPR. Finally, we note, again, that the random network coding provides much better results than the deterministic, regardless of the topology and whatever the technique to which it is associated. As stated in Sections IV-A and IV-C, random network coding provides, contrary to what one might intuitively think, better results than deterministic. Because this result is somewhat non intuitive, we wanted to understand why such behavior. For this, we analyzed the behavior of both methods during a simulation and we have studied the evolution of the number of useful messages in the network in both cases. The result of this study is presented in Figure 5. We can observe, on this figure, two different behaviors for the two methods. On the one hand, the number of messages relevant to the deterministic network coding scales linearly as the encoding is done taking into account some neighbor knowledge so they can decode messages when received. On the other hand, the number of messages relevant to the random changes in a more chaotic way, because the encoding of messages is done completely randomly. Thus, as can be seen in the figure, the nodes using random coding receive and store messages that are not useful for a long time before receiving one message which allows to decode a large number of stored messages, which increases the number of useful messages in the network.
  • 19. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 131 June 2013 V. CONCLUSION AND FURTHER WORK In this study we investigate the problem of TC message dissemination in OLSR. The main challenge in this context is to achieve a successful dissemination by minimizing the number of required transmissions. To tackle this issue, two main approaches have been proposed yet. The first consists in selecting a subset of nodes in charge of forwarding TC messages, and a second one consists in using Network Coding techniques to optimize radio resource use. Moreover, that the combination of tree based solutions and network coding improves performance gains in all cases. For the first time, Random Network Coding and Determinist Network Random Network Coding which is less complex the major point of this study is that Random Network Coding presents better results of the most of studied solutions. Moreover, because it does not require any addition in terms of data control, Random Network Coding based solutions seem to be one of the most efficient solutions for information dissemination in wireless ad hoc networks. As future work, we plan to implement those different Solutions and integrate them into a test bed in order to both prove the concept of our solutions and compare them under real conditions. REFERENCES [1] J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva, “A performance comparison of multi-hop wireless ad hoc network routing protocols,” in Mobile Computing and Networking, pp. 85–97, 1998. [2] V. Park and M. Corson, “A Highly Adaptive Distributed Rout- ing Algorithm for Mobile Wireless Networks,” in Proceedings of IEEE INFOCOM 1997, April 1997. [3] C. Perkins, E. M. Royer and S. R. Das, “Ad Hoc On-Demand Distance Vector routing,” In IETF Internet Draft, draft-ietf- manet-AODV-13.txt, February 2003. [4].C.E.Perkins and E.M. Royer, “Ad hoc on demand distance Vector (AODV) routing,”1999.
  • 20. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 132 June 2013 [5] R. Ogier, F. Templin, and M. Lewis, “Topology Dissemination Based on Reverse-Path Forwarding (TBRPF).” RFC, February 2004. IETF RFC-3684. [6] T.clausen and P.Jaquet Optimized Link State Routing Protocol,”In IETF Internet Draft,draft-ietf-manet-olsr-11.txt July 2003. [7]C.E.Parkins and P.Bhagwat, Highly dynamic destination. Sequenced distance vector routing (dsdv) for mobile computers,on”In SIGCOMM ’94:proceedings of the conference on communications architecture,protocols and applications,(New York,NY,USA),pp 244,ACM Press,1994 [8] Z.J.Haas and M.P.Pearlman “Zm a hybrid framework For routing in ad hoc networks,”pp 221-253,2001. [9] C.A Santivanez R.Ramanathan and I.Stavrakakis, “Mak-ing link-state routing scale for ad hoc networks,” in MobiHoc’01: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, (New York, NY, USA), pp. 22–32, ACM Press, 2001. [10] S. Guha and S. Khuller, “an Approximation algorithm for connected dominating sets,” Algorithmica, vol. 20, pp. 374– 387, 1996. [11] N. Kadi and K. Al agha, “Optimized mpr-based flooding in wireless ad hoc network using network coding,” in Wireless Days, 2008. WD ’08. 1st IFIP, pp. 1 –5, nov. 2008. [12] N. Kadi and K. Al agha, “Mpr-based flooding with distributed fountain network coding,” in IEEE WCNC 2010 Wireless Communication and Networking Conference, pp. 1 –5, nov. 2010. [13] S. Crisostomo, J. Barros, and C. Bettstetter, “Flooding the network: Multipoint relays
  • 21. IJESM Volume 2, Issue 2 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 133 June 2013 versus network coding,” in Cir- cuits and Systems for Communications, 2008. ICCSC 2008. 4th IEEE International Conference on, pp. 119 –124, May 2008. [14] A. Qayyum, L. Viennot, and A. Laouiti, “Multipoint relaying for flooding broadcast messages in mobile wireless networks,” in System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on, pp. 3866 – 3875, Jan. 2002. [15] W. Peng and X.-C. Lu, “On the reduction of broadcast redundancy in mobile ad hoc networks,” in Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing, MobiHoc ’00, (Piscataway, NJ, USA), pp. 129–130, IEEE Press, 2000. [16] H. Lim and C. Kim, “Flooding in wireless ad hoc networks,” Computer Communications, vol. 24, no. 3-4, pp. 353 – 363, 2001.