SlideShare a Scribd company logo
1 of 11
Download to read offline
International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 93
A Review on Mobile AD HOC Networks
Kirti (M.Tech N.S.)
Sonal Beniwal (Assistant Professor in CSE/IT Dept.)
School of Engineering & Sciences
B.P.S.M.V (Khanpur Kalan, Sonipat)
1. INTRODUCTION
A Mobile ad hoc network is a group of
wireless mobile computers (or nodes). In
which nodes collaborate by forwarding
packets for each other to allow them to
communicate outside range of direct
wireless transmission. Ad hoc networks
require no centralized administration or
fixed network infrastructure such as base
stations or access points, and can be quickly
and inexpensively set up as needed. A
MANET is an autonomous group of mobile
users that communicate over reasonably
slow wireless links. The network topology
may vary rapidly and unpredictably over
time, because the nodes are mobile. The
network is decentralized, where all network
activity, including discovering the topology
and delivering messages must be executed
by the nodes themselves. Hence routing
functionality will have to be incorporated
into the mobile nodes.
2. HISTORY
We can classified the mobile ad hoc
network into first, second and third
generation. Present work on the third
generation ad hoc network.The first
generation of ad hoc network , these are
called Packet Radio Network (PRNET) can
be traced back to 1970’s. In 1970’s. The
Defence Advanced Research Project
Agency (DARPA) initiated research of
using packet- switched radio technology
that provide reliable communication
between computers and urbanized PRNET.
Basically PRNET uses the combination of
two most popular technology Areal
Location of Hazardous Atmospheres
(ALOHA) and Carrier Sense Multiple
Access (CSMA) for multiple access and
distance vector routing. The PRNET is then
evolved into the Survivable Adaptive Radio
Network (SURAN) that provides some
benefits by improving the radio performance
through making them smaller, cheaper and
power thrifty. United State Department of
Defence (DOD) continued work for
programs of improve the performance such
as technologies Globe Mobile Information
System (GloMo) and Near Term Digital
Radio (NTDR). GloMo allow use of
CSMA/CA and TDMA and provides self-
organizing and self-healing network for
instance ATM over wireless, Satellite
Communication Network. The NTDR make
and allow use of clustering and link state
RESEARCH ARTICLE OPEN ACCESS
Abstract:
A MANET is an autonomous group of mobile users that communicate over reasonably slow
wireless links. The network topology may vary rapidly and unpredictably over time, because the nodes
are mobile. The network is decentralized, where all network activity, including discovering the topology
and delivering messages must be executed by the nodes themselves. Hence routing functionality will
have to be incorporated into the mobile nodes. MANET is a kind of wireless ad-hoc network and it is a
self-configuring network of mobile routers (and associated hosts) connected by wireless links – the union
of which forms an arbitrary topology. Such a network may operate in a standalone fashion, or may be
connected to the larger Internet Problems in Ad Hoc Networks.
International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 94
routing that organized an ad hoc network.
NTDR is introduced by US Army. This is
the only one existing ad hoc network in
use.The functioning group of MANET is
born in Internet Engineering Task Force
(IETF) who worked for routing protocols on
MANET and gives rise to the development
of various mobile devices like PDA’s,
palmtops, notebooks, etc.
2. CHARACTERISTICS OF
MANET
Mobile ad hoc network nodes are
furnished with wireless transmitters and
receivers using [7] antennas, which may be
highly directional (point-to-point), Omni
directional (broadcast), probably steer
able, At a given point in time, depending
on positions of nodes, their transmitter and
receiver coverage patterns, communication
power levels and co-channel interference
levels, a wireless connectivity in the form
of a random, multi-hop graph or "ad hoc"
network exists among the nodes. This ad
hoc topology may modify with time as the
nodes move or adjust their transmission
and reception parameters.The
characteristics of these networks are as
follows:
Communication via wireless
means.
Nodes can perform the roles of
both hosts and routers.
Bandwidth-constrained, variable
capacity links.
Limited Physical Security.
Dynamic network topology.
3. ADVANTAGES OF
MANET
The following are the advantages of
MANET:
They provide access to information
and services regardless of
geographic position.
These networks can be set up at any
place and time [10].
a. DISADVANTAGES OF MANET
Some of the disadvantages of MANETs
are as follows:
Limited resources and physical
security.
Intrinsic mutual trust vulnerable to
attacks.
Lack of authorization facilities.
Volatile network topology makes it
hard to detect malicious nodes.
Security protocols for wired
networks cannot work for ad hoc
networks.
b. APPLICATIONS OF MANET
Some of the applications of MANETs
are as follows:
Military or police exercises.
Disaster relief operations.
Mine cite operations.
Urgent Business meetings.
4. PROPERTIES OF MANET
ROUTING PROTOCOLS
The properties that are desirable in
MANET Routing protocols are:
a). Distributed operation:
The protocol should be distributed. It
should not be dependent on a centralized
controlling node. This is the case even for
stationary networks. The dissimilarity is
that the nodes in an ad-hoc network can
enter or leave the network very easily and
because of mobility the network can be
partitioned.
b). Loop free:
To improve the overall performance, the
routing protocol should assurance that the
routes supplied are loop free. This avoids
any misuse of bandwidth or CPU
consumption.
c). Demand based operation:
To minimize the control overhead in the
network and thus not misuse the network
resources the protocol should be reactive.
This means that the protocol should react
only when needed and should not
periodically broadcast control information.
International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 95
d). Unidirectional link support:
The radio environment can cause the
formation of unidirectional links.
Utilization of these links and not only the
bi-directional links improves the routing
protocol performance.
e). Security:
The radio environment is especially
vulnerable to impersonation attacks so to
ensure the wanted behavior of the routing
protocol we need some sort of security
measures. Authentication and encryption is
the way to go and problem here lies within
distributing the keys among the nodes in
the ad-hoc network.
f). Power conservation:
The nodes in the ad-hoc network can be
laptops and thin clients such as PDA‘s that
are limited in battery power and therefore
uses some standby mode to save the
power. It is therefore very important that
the routing protocol has support for these
sleep modes.
g). Multiple routes:
To reduce the number of reactions to
topological changes and congestion
multiple routes can be used. If one route
becomes invalid, it is possible that another
stored route could still be valid and thus
saving the routing protocol from initiating
another route discovery procedure.
h). Quality of Service Support:
Some sort of Quality of service is
necessary to incorporate into the routing
protocol. This helps to find what these
networks will be used for. It could be for
instance real time traffic support [12].
5. PROBLEMS IN ROUTING ITH
MOBILE AD HOC NETWORKS
c. Asymmetric links: Most of the wired
networks rely on the symmetric links
which are always fixed. But this is not a
case with ad-hoc networks as the nodes are
mobile and constantly changing their
position within network
d. Routing Overhead: In wireless ad hoc
networks, nodes often change their
location within network. So, some stale
routes are generated in the routing table
which leads to unnecessary routing
overhead.
e. Interference: This is the major problem
with mobile ad-hoc networks as links
come and go depending on the
transmission characteristics, one
transmission might interfere with another
one and node might overhear
transmissions of other nodes and can
corrupt the total transmission.
f. Dynamic Topology: Since the topology
is not constant; so the mobile node might
move or medium characteristics might
change. In ad-hoc networks, routing tables
must somehow reflect these changes in
topology and routing algorithms have to be
adapted. For example in a fixed network
routing table updating takes place for
every 30sec. This updating frequency
might be very low for ad-hoc networks
6. ROUTING PROTOCOLS
Classification of routing protocols in mobile ad hoc network can be done in many ways, but
most of these are done depending on routing strategy and network structure.
The routing protocols can be categorized as flat routing, hierarchical routing and geographic
position assisted routing while depending on the network structure.
According to the routing strategy routing protocols can be classified as Table-driven and
source initiated.
International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 96
Ad-hoc Routing Protocol
Flat Routing Hierarchical Routing Geographic Position
Assisted Routing
Proactive Reactive
HSR CGSR ZRP LANMAR Geo-Cast LAR DREAM GPSR
AODV DSR
FSR FSLS OLSR TBRPF
Routing Protocols
9.1. Flat Routing Protocols
Flat routing protocols are divided mainly
into two classes; the first one is proactive
routing (table driven) protocols and other
is reactive (on-demand) routing protocols.
One thing is general for both protocol
classes is that every node participating in
routing play an equal role. They have
further been classified after their design
principles; proactive routing is mostly
based on LS (link-state) while on-demand
routing is based on DV (distance-vector).
9.1.1. Pro-Active / Table Driven
routing Protocols
Proactive MANET protocols are also
called as table-driven protocols and will
actively determine the layout of the
network. Through a regular exchange of
network topology packets between the
nodes of the network, at every single node
an absolute picture of the Network is
maintained. There is hence minimal delay
in determining the route to be taken.
This is especially important for time-
critical traffic .When the routing
information becomes worthless quickly,
there are many short-lived routes that are
being determined and not used before they
turn invalid. Therefore, another drawback
resulting from the increased mobility is the
amount of traffic overhead generated when
evaluating these unnecessary routes. This
is especially altered when the network size
increases. The portion of the total control
traffic that consists of actual practical data
is further decreased.
Lastly, if the nodes transmit infrequently,
most of the routing information is
considered redundant. The nodes,
however, continue to expend energy by
continually updating these unused entries
in their routing tables as mentioned,
International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 97
energy conservation is very important in a
MANET system design. Therefore, this
excessive expenditure of energy is not
desired. Thus, proactive MANET
protocols work best in networks that have
low node mobility or where the nodes
transmit data frequently. Examples of
Proactive MANET [4] Protocols include:
Optimized Link State Routing
(OLSR)
Fish-eye State Routing (FSR)
Destination-Sequenced Distance
Vector (DSDV)
Cluster-head Gateway Switch
Routing Protocol (CGSR)
9.1.2. Reactive (On Demand)
protocols
Portable nodes- Notebooks, palmtops or
even mobile phones usually compose
wireless ad-hoc networks. This portability
also brings a significant issue of mobility.
This is a key issue in ad-hoc networks. The
mobility of the nodes causes the topology
of the network to change constantly.
Keeping track of this topology is not an
easy task, and too many resources may be
consumed in signalling.
Reactive routing protocols were intended
for these types of environments.[4] These
are based on the design that there is no
point on trying to have an image of the
entire network topology, since it will be
constantly changing. Instead, whenever a
node needs a route to a given target, it
initiates a route discovery process on the
fly, for discovering out a pathway
.Reactive protocols start to set up routes
on-demand.
The routing protocol will try to establish
such a route, whenever any node wants to
initiate communication with another node
to which it has no route. This kind of
protocols is usually based on flooding the
network with Route Request (RREQ) and
Route reply (RERP) messages .
By the help of Route request message the
route is discovered from source to target
node; and as the target node gets a RREQ
message it send RERP message for the
confirmation that the route has been
established. This kind of protocol is
usually very effective on single-rate
networks. It usually minimizes the number
of hops of the selected path. However, on
multi-rate networks, the number of hops is
not as important as the throughput that can
be obtained on a given path.
The different types of On Demand driven
protocols are:
Ad hoc On Demand Distance
Vector (AODV)
Dynamic Source routing protocol
(DSR)
Temporally ordered routing
algorithm (TORA)
Associability Based routing (ABR)
Signal Stability-Based Adaptive
Routing (SSA)
Location-Aided Routing Protocol
9.2. Hierarchical Routing Protocols
As the size of the wireless network
increases, the flat routing protocols may
produce too much overhead for the
MANET. In this case a hierarchical
solution may be preferable.
• Hierarchical State Routing (HSR)
• Zone Routing Protocol (ZRP)
International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 98
• Cluster-head Gateway Switch
Routing Protocol (CGSR)
• Landmark Ad Hoc Routing
Protocol (LANMAR)
9.3. Geographical Routing Protocols
There are two approaches to geographic
mobile ad hoc networks:
1. Actual geographic coordinates (as
obtained through GPS – the Global
Positioning System).
2. Reference points in some fixed
coordinate system.
An advantage of geographic routing
protocols is that they prevent network-
wide searches for destinations. If the
recent geographical coordinates are known
then control and data packets can be sent
in the general direction of the destination.
This trim downs control overhead in the
network. A disadvantage is that all nodes
must have access to their geographical
coordinates all the time to make the
geographical routing protocols useful. The
routing updates must be done faster in
compare of the network mobility rate to
consider the location-based routing
effective. This is because locations of
nodes may change quickly in a MANET.
Examples of geographical routing
protocols are:
• Geo-Cast (Geographic Addressing
and Routing)
• DREAM (Distance Routing Effect
Algorithm for Mobility)
• GPSR (Greedy Perimeter Stateless
Routing)
10.DESCRIPTION OF
REACTIVE PROTOCOLS
Reactive protocol is identified as On-
demand protocols because it creates routes
only when these routes are needed.. The
various Reactive Routing Protocols are
discussed below:
10.1. Ad-hoc On Demand
Distance Vector Routing
(AODV)
Ad hoc On-Demand Distance Vector
(AODV) routing is a routing protocol for
mobile ad-hoc networks and other wireless
ad-hoc networks. It is jointly developed in
Nokia Research Centre of University of
California, Santa Barbara and University
of Cincinnati by C. Perkins and S. Das. It
is an on-demand and distance-vector
routing protocol, meaning that a route is
established by AODV from a destination
only on demand. AODV is capable of both
unicast and multicast routing. It keeps
these routes as long as they are desirable
by the sources. Additionally, AODV
creates trees which connect multicast
group members. The trees are composed of
the group members and the nodes needed
to connect the members. The sequence
numbers are used by AODV to ensure the
freshness of routes. It is loop-free, self-
starting, and scales to large numbers of
mobile nodes.
Characteristics of AODV
• Unicast, Broadcast, and Multicast
communication.
• On-demand route establishment with small
delay.
• Multicast trees connecting group members
maintained for lifetime of multicast group.
• Link breakages in active routes efficiently
repaired and All routes are loop-free
through use of sequence numbers.
• Use of Sequence numbers to track
accuracy of information.
• Only keeps track of next hop for a route
instead of the entire route.
International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 99
• Use of periodic HELLO messages to track
neighbors.
Advantages and Disadvantages
The main advantage of AODV protocol is
that routes are established on demand and
destination sequence numbers are used to
find the latest route to the destination. The
connection setup delay is less. The
HELLO messages supporting the routes
maintenance are range-limited, so they do
not cause unnecessary overhead in the
network.
One of the disadvantages of this protocol
is that intermediate nodes can lead to
inconsistent routes if the source sequence
number is very old and the intermediate
nodes have a higher but not the latest
destination sequence number, thereby
having stale entries. Also multiple Route-
Reply packets in response to a single
Route-Request packet can lead to heavy
control overhead. Another disadvantage of
AODV is that the periodic beaconing leads
to unnecessary bandwidth consumption.
10.2. Dynamic Source Routing
(DSR)
Dynamic Source Routing (DSR) is a
routing protocol for wireless mesh
networks. It is similar to AODV in that it
establishes a route on-demand when a
transmitting mobile node requests one.
However, it uses source routing instead of
relying on the routing table at each
intermediate device. Dynamic source
routing protocol (DSR) is an on-demand,
source routing protocol, whereby all the
routing information is maintained
(continually updated) at mobile nodes.
DSR allows the network to be completely
self-organizing and self-configuring,
without the need for any existing network
infrastructure or administration. The
protocol is composed of the two main
mechanisms of "Route Discovery" and
"Route Maintenance", which work
together to allow nodes to discover and
maintain routes to arbitrary destinations in
the ad hoc network.
An optimum path for a communication
between a source node and target node is
determined by Route Discovery process.
Route Maintenance ensures that the
communication path remains optimum and
loop-free according the change in network
conditions, even if this requires altering
the route during a transmission. Route
Reply would only be generated if the
message has reached the projected
destination node (route record which is
firstly contained in Route Request would
be inserted into the Route Reply).
Advantages and Disadvantages
DSR uses a reactive approach which
eliminates the need to periodically flood
the network with table update messages
which are required in a table-driven
approach. The intermediate nodes also
utilize the route cache information
efficiently to reduce the control overhead.
The disadvantage of DSR is that the route
maintenance mechanism does not locally
repair a broken down link. The connection
setup delay is higher than in table-driven
protocols. Even though the protocol
performs well in static and low-mobility
environments, the performance degrades
rapidly with increasing mobility. Also,
considerable routing overhead is involved
due to the source-routing mechanism
International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 100
employed in DSR. This routing overhead
is directly proportional to the path length.
11.DESCRIPTION OF PROACTIVE
PROTOCOL
11.1. DSDV Protocol: (Destination
Sequenced Distance Vector (DSDV)
Protocol)
The destination address
– The number of hops required to reach the
destination and
– The new sequence number, originally
stamped by the destination
The transmitted routing tables will also
contain the hardware address, network
address of the mobile host transmitting
them. The routing tables will contain the
sequence number created by the
transmitter and hence the most new
destination sequence number is preferred
as the basis for making forwarding
decisions. This new sequence number is
also updated to all the hosts in the network
which may decide on how to maintain the
routing entry for that originating mobile
host. After receiving the route information,
receiving node increments the metric and
transmits information by broadcasting.
Incrementing metric is done before
transmission because, incoming packet
will have to travel one more hop to reach
its destination.
Time between broadcasting the routing
information packets is the other important
factor to be considered. When the new
information is received by the mobile host
it will be retransmitted soon effecting the
most rapid possible dissemination of
routing information among all the
cooperating mobile hosts. The mobile host
cause broken links as they move from
place to place within the network. The
broken link may be detected by the layer2
protocol, which may be described as
infinity. When the route is broken in a
network, then immediately that metric is
assigned an infinity metric there by
determining that there is no hop and the
sequence number is updated. Sequence
numbers originating from the mobile hosts
are defined to be even number and the
sequence numbers generated to indicate
infinity metrics are odd numbers.
The broadcasting of the information in the
DSDV protocol is of two types namely:
full dump and incremental dump. Full
dump broadcasting will carry all the
routing information while the incremental
dump will carry only information that has
changed since last full dump. Irrespective
of the two types, broadcasting is done in
network protocol data units (NPDU). Full
dump requires multiple NPDU’s while
incremental requires only one NPDU to fit
in all the information.
When an information packet is received
from another node, it compares the
sequence number with the available
sequence number for that entry. If the
sequence number is larger, then it will
update the routing information with the
new sequence number else if the
information arrives with the same
sequence number it looks for the metric
entry and if the number of hops is less than
the previous entry the new information is
updated (if information is same or metric
is more then it will discard the
information).
International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 101
While the nodes information is being
updated the metric is increased by 1 and
the sequence number is also increased by
1. Similarly, if a new node enters the
network, it will announce itself in the
network and the nodes in the network
update their routing information with a
new entry for the new node.During
broadcasting, the mobile hosts will
transmit their routing tables periodically
but due to the frequent movements by the
hosts in the networks, this will lead to
continuous burst of new routes
transmissions upon every new sequence
number from that destination. The solution
for this is to delay the advertisement of
such routes until it shows up a better
metric.
12. COMPARISON OF DSDV, AODV, DSR
DSDV AODV DSR
1) (DSDV) is a table driven
routing scheme for ad hoc
mobile networks based on the
Bellman-ford algorithm.
1) AODV is an on –Demand
routing protocol which is
confluence of DSDV and
DSR.
1) Dynamic Source
Routing is a Pure On-
Demand routing protocol
2) Each node acts as a router
where a routing table is
maintained and periodic routing
updates are exchange, even if
the routes are not needed.
2) Route is calculated
on demand
2) Route is calculated
only
when it is required.
3) A sequence number is
associated with each route or
path to the destination to
prevent routing loops.
3) AODV provides loop free
routes while repairing link
breakages. but unlike DSDV,
it doesn’t require global
periodic routing
advertisements.
3) It uses no periodic
routing messages like
AODV
4) (DSDV) is a table driven
routing scheme for ad hoc
mobile networks.
4) AODV maintains a routing
table where it maintains one
entry per destination unlike the
DSR that maintains multiple
route cache
4) DSR uses source
routing where the whole
route is carried as an
overhead.
CONCLUSION
In this research paper we have discussed
about a new technology in information
technology: MANET. We have seen the
advancement in this field even day by day
of internet due to wireless networking
technologies. It gives rise to many new
applications that work on wireless
technology. In the past few decades, we
have seen the advancement in wireless
networks. The rising capabilities of mobile
International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 102
devices are giving a new direction to the
internet, which decreases the cost and
allow us to use infrastructure wireless
networks and infrastructure less wireless
networks that called as MANET (Mobile
Ad hoc Wireless Network). We have also
described the architecture,
characteristics,apploications, advantages
and desadvantages, routing protocols.
There is no doubt that MANET is
development trend for the future.
REFERENCES
[1] Umang Singh, ‘’ Secure Routing
Protocols in mobile Ad hoc networks-A
survey and Taxanomy’’
[2] International Journal of Reviews in
Computing, 30th September 2011, Vol. 7
[3] Qunwei Zheng, Xiaoyan Hong and
Sibabrata Ray,
[4] “Recent Advances in Mobility
Modeling for Mobile Ad hoc Network
Research’’, 2004
[5] B. SOUJANYA, T.
SITAMAHALAXSHMI, CH. DIWAKAR
“ STUDY OF ROUTING PROTOCOLS
IN MOBILE AD HOC NETWORKS”,B.
Soujanya et al./ International Journal of
Engineering Science and
Technology(IJEST), ISSN:0975-5462 Vol.
3, No 4 April 2011.
[6] Kavita Taneja, R.B. Patel “An
Overview of Mobile Ad hoc Networks:
Challenges and Future.”
[7] Vikaram Patalbasi, Sonali Mote
“Mobile Ad hoc Networks: Opportunities
and Future.”
[8] Humayun Bakht “History of Mobile
Ad hoc Networks”
http://www.oocities.org/humayunbakht/H
MANET.pdf
[9] Ram Ramanathan and Jason Redi “A
Brief Overview of Ad Hoc Networks:
Challenges and Directions” IEEE
Communications Magazine- 50th
Anniversary Commemorative Issue/May
2002
[10] Amitabh Mishra and Ketan M.
Nadkarni, Security in Wireless Ad Hoc
Networks, in Book The Handbook of Ad
Hoc Wireless Networks (Chapter 30),
CRC Press LLC, 2003.
[11] . M. Conti, Body, personal, and local
wireless ad hoc networks, in: M. Ilyas
(Ed.), Handbook of Ad Hoc Networks,
CRC Press, New York, 2003 (Chapter 1).
[12] [10] On demand routing in multi hop
wireless mobile Ad hoc networks (chapter
3- Overview of mobile Ad hoc network.
pdf)
[12] [13]Wei-Jie Yu," Pheromone-Distribution-
Based Adaptive Ant Colony System",
GECCO’10, July 7–11, 2010, Portland,
Oregon, USA. ACM 978-1-4503-0072-
8/10/07
[13] [14]Ana Cristina B. Kochem Vendramin,"
CGrAnt: A Swarm Intelligence-based
Routing Protocol for Delay Tolerant
Networks", GECCO’12, July 7–11, 2012,
Philadelphia, Pennsylvania, USA. ACM
978-1-4503-1177-9/12/07
[14] [15]Anuj K. Gupta," Analysis of various
Swarm-based & Ant-based Algorithms",
ACAI '11, July 21 - July 22 2011,
Rajpura/Punjab, India ACM 978-1-4503-
0635-5/11/10
[15] [16]Carlos M. Fernandes," Binary Ant
Algorithm", GECCO’07, July 7–11, 2007,
London, England, United Kingdom. ACM
978-1-59593-697-4/07/0007
[17] Marcelo Portela Sousa," Ant
Colony Optimization with Fuzzy Heuristic
International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 103
InformationDesigned for Cooperative
Wireless Sensor Networks", MSWiM’11,
October 31–November 4, 2011, Miami,
Florida, USA. ACM 978-1-4503-0898-
4/11/10
[18] Rendong Bai," Salvaging Route
Reply for On-Demand Routing Protocols
in Mobile Ad-Hoc Networks",
MSWiM’05, October 10–13, 2005,
Montreal, Quebec, Canada.

More Related Content

What's hot

Manet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metricsManet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metricsIJARIIT
 
To mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANETTo mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANETIJERA Editor
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...IOSR Journals
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a reviewijitjournal
 
Cp3210151018
Cp3210151018Cp3210151018
Cp3210151018IJMER
 
Mobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsMobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsSushant Kushwaha
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile ComputingKABILESH RAMAR
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
 
AODV information
AODV informationAODV information
AODV informationanilds02
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...graphhoc
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologiesshashi712
 
Analysis of Multicast Routing Protocols: Puma and Odmrp
Analysis of Multicast Routing Protocols: Puma and OdmrpAnalysis of Multicast Routing Protocols: Puma and Odmrp
Analysis of Multicast Routing Protocols: Puma and OdmrpIJMER
 

What's hot (18)

Unit 7
Unit 7Unit 7
Unit 7
 
Manet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metricsManet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metrics
 
To mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANETTo mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANET
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
Cp3210151018
Cp3210151018Cp3210151018
Cp3210151018
 
Manet
ManetManet
Manet
 
Mobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsMobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) Applications
 
MANET
MANETMANET
MANET
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile Computing
 
H010524049
H010524049H010524049
H010524049
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 
AODV information
AODV informationAODV information
AODV information
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologies
 
Analysis of Multicast Routing Protocols: Puma and Odmrp
Analysis of Multicast Routing Protocols: Puma and OdmrpAnalysis of Multicast Routing Protocols: Puma and Odmrp
Analysis of Multicast Routing Protocols: Puma and Odmrp
 

Similar to [IJET-V1I6P19] Authors : Kirti

Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol ineSAT Publishing House
 
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networkseSAT Journals
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksjake henry
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486Sathish Pilla
 
A Background Study Of MANET
A Background Study Of MANETA Background Study Of MANET
A Background Study Of MANETAngela Shin
 
BEE BASED ROUTING PROTOCOL FOR MANET
BEE BASED ROUTING PROTOCOL FOR MANETBEE BASED ROUTING PROTOCOL FOR MANET
BEE BASED ROUTING PROTOCOL FOR MANETEditor IJCTER
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in ManetProf Ansari
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkSanjeev Kumar Jaiswal
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 

Similar to [IJET-V1I6P19] Authors : Kirti (20)

Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
Mane ts
Mane tsMane ts
Mane ts
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol in
 
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
 
Security issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc NetworksSecurity issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc Networks
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486
 
Mobile computing Mobile Adhoc Networks (MANETs)
Mobile computing Mobile Adhoc Networks (MANETs)Mobile computing Mobile Adhoc Networks (MANETs)
Mobile computing Mobile Adhoc Networks (MANETs)
 
A Background Study Of MANET
A Background Study Of MANETA Background Study Of MANET
A Background Study Of MANET
 
BEE BASED ROUTING PROTOCOL FOR MANET
BEE BASED ROUTING PROTOCOL FOR MANETBEE BASED ROUTING PROTOCOL FOR MANET
BEE BASED ROUTING PROTOCOL FOR MANET
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 

More from IJET - International Journal of Engineering and Techniques

More from IJET - International Journal of Engineering and Techniques (20)

healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
Ijet v5 i6p18
Ijet v5 i6p18Ijet v5 i6p18
Ijet v5 i6p18
 
Ijet v5 i6p17
Ijet v5 i6p17Ijet v5 i6p17
Ijet v5 i6p17
 
Ijet v5 i6p16
Ijet v5 i6p16Ijet v5 i6p16
Ijet v5 i6p16
 
Ijet v5 i6p15
Ijet v5 i6p15Ijet v5 i6p15
Ijet v5 i6p15
 
Ijet v5 i6p14
Ijet v5 i6p14Ijet v5 i6p14
Ijet v5 i6p14
 
Ijet v5 i6p13
Ijet v5 i6p13Ijet v5 i6p13
Ijet v5 i6p13
 
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p12
 
Ijet v5 i6p11
Ijet v5 i6p11Ijet v5 i6p11
Ijet v5 i6p11
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
Ijet v5 i6p2
Ijet v5 i6p2Ijet v5 i6p2
Ijet v5 i6p2
 
IJET-V3I2P24
IJET-V3I2P24IJET-V3I2P24
IJET-V3I2P24
 
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P23
 
IJET-V3I2P22
IJET-V3I2P22IJET-V3I2P22
IJET-V3I2P22
 
IJET-V3I2P21
IJET-V3I2P21IJET-V3I2P21
IJET-V3I2P21
 
IJET-V3I2P20
IJET-V3I2P20IJET-V3I2P20
IJET-V3I2P20
 
IJET-V3I2P19
IJET-V3I2P19IJET-V3I2P19
IJET-V3I2P19
 
IJET-V3I2P18
IJET-V3I2P18IJET-V3I2P18
IJET-V3I2P18
 
IJET-V3I2P17
IJET-V3I2P17IJET-V3I2P17
IJET-V3I2P17
 

Recently uploaded

Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxhublikarsn
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessorAshwiniTodkar4
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...ssuserdfc773
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information SystemsAnge Felix NSANZIYERA
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 

Recently uploaded (20)

Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 

[IJET-V1I6P19] Authors : Kirti

  • 1. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 93 A Review on Mobile AD HOC Networks Kirti (M.Tech N.S.) Sonal Beniwal (Assistant Professor in CSE/IT Dept.) School of Engineering & Sciences B.P.S.M.V (Khanpur Kalan, Sonipat) 1. INTRODUCTION A Mobile ad hoc network is a group of wireless mobile computers (or nodes). In which nodes collaborate by forwarding packets for each other to allow them to communicate outside range of direct wireless transmission. Ad hoc networks require no centralized administration or fixed network infrastructure such as base stations or access points, and can be quickly and inexpensively set up as needed. A MANET is an autonomous group of mobile users that communicate over reasonably slow wireless links. The network topology may vary rapidly and unpredictably over time, because the nodes are mobile. The network is decentralized, where all network activity, including discovering the topology and delivering messages must be executed by the nodes themselves. Hence routing functionality will have to be incorporated into the mobile nodes. 2. HISTORY We can classified the mobile ad hoc network into first, second and third generation. Present work on the third generation ad hoc network.The first generation of ad hoc network , these are called Packet Radio Network (PRNET) can be traced back to 1970’s. In 1970’s. The Defence Advanced Research Project Agency (DARPA) initiated research of using packet- switched radio technology that provide reliable communication between computers and urbanized PRNET. Basically PRNET uses the combination of two most popular technology Areal Location of Hazardous Atmospheres (ALOHA) and Carrier Sense Multiple Access (CSMA) for multiple access and distance vector routing. The PRNET is then evolved into the Survivable Adaptive Radio Network (SURAN) that provides some benefits by improving the radio performance through making them smaller, cheaper and power thrifty. United State Department of Defence (DOD) continued work for programs of improve the performance such as technologies Globe Mobile Information System (GloMo) and Near Term Digital Radio (NTDR). GloMo allow use of CSMA/CA and TDMA and provides self- organizing and self-healing network for instance ATM over wireless, Satellite Communication Network. The NTDR make and allow use of clustering and link state RESEARCH ARTICLE OPEN ACCESS Abstract: A MANET is an autonomous group of mobile users that communicate over reasonably slow wireless links. The network topology may vary rapidly and unpredictably over time, because the nodes are mobile. The network is decentralized, where all network activity, including discovering the topology and delivering messages must be executed by the nodes themselves. Hence routing functionality will have to be incorporated into the mobile nodes. MANET is a kind of wireless ad-hoc network and it is a self-configuring network of mobile routers (and associated hosts) connected by wireless links – the union of which forms an arbitrary topology. Such a network may operate in a standalone fashion, or may be connected to the larger Internet Problems in Ad Hoc Networks.
  • 2. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 94 routing that organized an ad hoc network. NTDR is introduced by US Army. This is the only one existing ad hoc network in use.The functioning group of MANET is born in Internet Engineering Task Force (IETF) who worked for routing protocols on MANET and gives rise to the development of various mobile devices like PDA’s, palmtops, notebooks, etc. 2. CHARACTERISTICS OF MANET Mobile ad hoc network nodes are furnished with wireless transmitters and receivers using [7] antennas, which may be highly directional (point-to-point), Omni directional (broadcast), probably steer able, At a given point in time, depending on positions of nodes, their transmitter and receiver coverage patterns, communication power levels and co-channel interference levels, a wireless connectivity in the form of a random, multi-hop graph or "ad hoc" network exists among the nodes. This ad hoc topology may modify with time as the nodes move or adjust their transmission and reception parameters.The characteristics of these networks are as follows: Communication via wireless means. Nodes can perform the roles of both hosts and routers. Bandwidth-constrained, variable capacity links. Limited Physical Security. Dynamic network topology. 3. ADVANTAGES OF MANET The following are the advantages of MANET: They provide access to information and services regardless of geographic position. These networks can be set up at any place and time [10]. a. DISADVANTAGES OF MANET Some of the disadvantages of MANETs are as follows: Limited resources and physical security. Intrinsic mutual trust vulnerable to attacks. Lack of authorization facilities. Volatile network topology makes it hard to detect malicious nodes. Security protocols for wired networks cannot work for ad hoc networks. b. APPLICATIONS OF MANET Some of the applications of MANETs are as follows: Military or police exercises. Disaster relief operations. Mine cite operations. Urgent Business meetings. 4. PROPERTIES OF MANET ROUTING PROTOCOLS The properties that are desirable in MANET Routing protocols are: a). Distributed operation: The protocol should be distributed. It should not be dependent on a centralized controlling node. This is the case even for stationary networks. The dissimilarity is that the nodes in an ad-hoc network can enter or leave the network very easily and because of mobility the network can be partitioned. b). Loop free: To improve the overall performance, the routing protocol should assurance that the routes supplied are loop free. This avoids any misuse of bandwidth or CPU consumption. c). Demand based operation: To minimize the control overhead in the network and thus not misuse the network resources the protocol should be reactive. This means that the protocol should react only when needed and should not periodically broadcast control information.
  • 3. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 95 d). Unidirectional link support: The radio environment can cause the formation of unidirectional links. Utilization of these links and not only the bi-directional links improves the routing protocol performance. e). Security: The radio environment is especially vulnerable to impersonation attacks so to ensure the wanted behavior of the routing protocol we need some sort of security measures. Authentication and encryption is the way to go and problem here lies within distributing the keys among the nodes in the ad-hoc network. f). Power conservation: The nodes in the ad-hoc network can be laptops and thin clients such as PDA‘s that are limited in battery power and therefore uses some standby mode to save the power. It is therefore very important that the routing protocol has support for these sleep modes. g). Multiple routes: To reduce the number of reactions to topological changes and congestion multiple routes can be used. If one route becomes invalid, it is possible that another stored route could still be valid and thus saving the routing protocol from initiating another route discovery procedure. h). Quality of Service Support: Some sort of Quality of service is necessary to incorporate into the routing protocol. This helps to find what these networks will be used for. It could be for instance real time traffic support [12]. 5. PROBLEMS IN ROUTING ITH MOBILE AD HOC NETWORKS c. Asymmetric links: Most of the wired networks rely on the symmetric links which are always fixed. But this is not a case with ad-hoc networks as the nodes are mobile and constantly changing their position within network d. Routing Overhead: In wireless ad hoc networks, nodes often change their location within network. So, some stale routes are generated in the routing table which leads to unnecessary routing overhead. e. Interference: This is the major problem with mobile ad-hoc networks as links come and go depending on the transmission characteristics, one transmission might interfere with another one and node might overhear transmissions of other nodes and can corrupt the total transmission. f. Dynamic Topology: Since the topology is not constant; so the mobile node might move or medium characteristics might change. In ad-hoc networks, routing tables must somehow reflect these changes in topology and routing algorithms have to be adapted. For example in a fixed network routing table updating takes place for every 30sec. This updating frequency might be very low for ad-hoc networks 6. ROUTING PROTOCOLS Classification of routing protocols in mobile ad hoc network can be done in many ways, but most of these are done depending on routing strategy and network structure. The routing protocols can be categorized as flat routing, hierarchical routing and geographic position assisted routing while depending on the network structure. According to the routing strategy routing protocols can be classified as Table-driven and source initiated.
  • 4. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 96 Ad-hoc Routing Protocol Flat Routing Hierarchical Routing Geographic Position Assisted Routing Proactive Reactive HSR CGSR ZRP LANMAR Geo-Cast LAR DREAM GPSR AODV DSR FSR FSLS OLSR TBRPF Routing Protocols 9.1. Flat Routing Protocols Flat routing protocols are divided mainly into two classes; the first one is proactive routing (table driven) protocols and other is reactive (on-demand) routing protocols. One thing is general for both protocol classes is that every node participating in routing play an equal role. They have further been classified after their design principles; proactive routing is mostly based on LS (link-state) while on-demand routing is based on DV (distance-vector). 9.1.1. Pro-Active / Table Driven routing Protocols Proactive MANET protocols are also called as table-driven protocols and will actively determine the layout of the network. Through a regular exchange of network topology packets between the nodes of the network, at every single node an absolute picture of the Network is maintained. There is hence minimal delay in determining the route to be taken. This is especially important for time- critical traffic .When the routing information becomes worthless quickly, there are many short-lived routes that are being determined and not used before they turn invalid. Therefore, another drawback resulting from the increased mobility is the amount of traffic overhead generated when evaluating these unnecessary routes. This is especially altered when the network size increases. The portion of the total control traffic that consists of actual practical data is further decreased. Lastly, if the nodes transmit infrequently, most of the routing information is considered redundant. The nodes, however, continue to expend energy by continually updating these unused entries in their routing tables as mentioned,
  • 5. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 97 energy conservation is very important in a MANET system design. Therefore, this excessive expenditure of energy is not desired. Thus, proactive MANET protocols work best in networks that have low node mobility or where the nodes transmit data frequently. Examples of Proactive MANET [4] Protocols include: Optimized Link State Routing (OLSR) Fish-eye State Routing (FSR) Destination-Sequenced Distance Vector (DSDV) Cluster-head Gateway Switch Routing Protocol (CGSR) 9.1.2. Reactive (On Demand) protocols Portable nodes- Notebooks, palmtops or even mobile phones usually compose wireless ad-hoc networks. This portability also brings a significant issue of mobility. This is a key issue in ad-hoc networks. The mobility of the nodes causes the topology of the network to change constantly. Keeping track of this topology is not an easy task, and too many resources may be consumed in signalling. Reactive routing protocols were intended for these types of environments.[4] These are based on the design that there is no point on trying to have an image of the entire network topology, since it will be constantly changing. Instead, whenever a node needs a route to a given target, it initiates a route discovery process on the fly, for discovering out a pathway .Reactive protocols start to set up routes on-demand. The routing protocol will try to establish such a route, whenever any node wants to initiate communication with another node to which it has no route. This kind of protocols is usually based on flooding the network with Route Request (RREQ) and Route reply (RERP) messages . By the help of Route request message the route is discovered from source to target node; and as the target node gets a RREQ message it send RERP message for the confirmation that the route has been established. This kind of protocol is usually very effective on single-rate networks. It usually minimizes the number of hops of the selected path. However, on multi-rate networks, the number of hops is not as important as the throughput that can be obtained on a given path. The different types of On Demand driven protocols are: Ad hoc On Demand Distance Vector (AODV) Dynamic Source routing protocol (DSR) Temporally ordered routing algorithm (TORA) Associability Based routing (ABR) Signal Stability-Based Adaptive Routing (SSA) Location-Aided Routing Protocol 9.2. Hierarchical Routing Protocols As the size of the wireless network increases, the flat routing protocols may produce too much overhead for the MANET. In this case a hierarchical solution may be preferable. • Hierarchical State Routing (HSR) • Zone Routing Protocol (ZRP)
  • 6. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 98 • Cluster-head Gateway Switch Routing Protocol (CGSR) • Landmark Ad Hoc Routing Protocol (LANMAR) 9.3. Geographical Routing Protocols There are two approaches to geographic mobile ad hoc networks: 1. Actual geographic coordinates (as obtained through GPS – the Global Positioning System). 2. Reference points in some fixed coordinate system. An advantage of geographic routing protocols is that they prevent network- wide searches for destinations. If the recent geographical coordinates are known then control and data packets can be sent in the general direction of the destination. This trim downs control overhead in the network. A disadvantage is that all nodes must have access to their geographical coordinates all the time to make the geographical routing protocols useful. The routing updates must be done faster in compare of the network mobility rate to consider the location-based routing effective. This is because locations of nodes may change quickly in a MANET. Examples of geographical routing protocols are: • Geo-Cast (Geographic Addressing and Routing) • DREAM (Distance Routing Effect Algorithm for Mobility) • GPSR (Greedy Perimeter Stateless Routing) 10.DESCRIPTION OF REACTIVE PROTOCOLS Reactive protocol is identified as On- demand protocols because it creates routes only when these routes are needed.. The various Reactive Routing Protocols are discussed below: 10.1. Ad-hoc On Demand Distance Vector Routing (AODV) Ad hoc On-Demand Distance Vector (AODV) routing is a routing protocol for mobile ad-hoc networks and other wireless ad-hoc networks. It is jointly developed in Nokia Research Centre of University of California, Santa Barbara and University of Cincinnati by C. Perkins and S. Das. It is an on-demand and distance-vector routing protocol, meaning that a route is established by AODV from a destination only on demand. AODV is capable of both unicast and multicast routing. It keeps these routes as long as they are desirable by the sources. Additionally, AODV creates trees which connect multicast group members. The trees are composed of the group members and the nodes needed to connect the members. The sequence numbers are used by AODV to ensure the freshness of routes. It is loop-free, self- starting, and scales to large numbers of mobile nodes. Characteristics of AODV • Unicast, Broadcast, and Multicast communication. • On-demand route establishment with small delay. • Multicast trees connecting group members maintained for lifetime of multicast group. • Link breakages in active routes efficiently repaired and All routes are loop-free through use of sequence numbers. • Use of Sequence numbers to track accuracy of information. • Only keeps track of next hop for a route instead of the entire route.
  • 7. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 99 • Use of periodic HELLO messages to track neighbors. Advantages and Disadvantages The main advantage of AODV protocol is that routes are established on demand and destination sequence numbers are used to find the latest route to the destination. The connection setup delay is less. The HELLO messages supporting the routes maintenance are range-limited, so they do not cause unnecessary overhead in the network. One of the disadvantages of this protocol is that intermediate nodes can lead to inconsistent routes if the source sequence number is very old and the intermediate nodes have a higher but not the latest destination sequence number, thereby having stale entries. Also multiple Route- Reply packets in response to a single Route-Request packet can lead to heavy control overhead. Another disadvantage of AODV is that the periodic beaconing leads to unnecessary bandwidth consumption. 10.2. Dynamic Source Routing (DSR) Dynamic Source Routing (DSR) is a routing protocol for wireless mesh networks. It is similar to AODV in that it establishes a route on-demand when a transmitting mobile node requests one. However, it uses source routing instead of relying on the routing table at each intermediate device. Dynamic source routing protocol (DSR) is an on-demand, source routing protocol, whereby all the routing information is maintained (continually updated) at mobile nodes. DSR allows the network to be completely self-organizing and self-configuring, without the need for any existing network infrastructure or administration. The protocol is composed of the two main mechanisms of "Route Discovery" and "Route Maintenance", which work together to allow nodes to discover and maintain routes to arbitrary destinations in the ad hoc network. An optimum path for a communication between a source node and target node is determined by Route Discovery process. Route Maintenance ensures that the communication path remains optimum and loop-free according the change in network conditions, even if this requires altering the route during a transmission. Route Reply would only be generated if the message has reached the projected destination node (route record which is firstly contained in Route Request would be inserted into the Route Reply). Advantages and Disadvantages DSR uses a reactive approach which eliminates the need to periodically flood the network with table update messages which are required in a table-driven approach. The intermediate nodes also utilize the route cache information efficiently to reduce the control overhead. The disadvantage of DSR is that the route maintenance mechanism does not locally repair a broken down link. The connection setup delay is higher than in table-driven protocols. Even though the protocol performs well in static and low-mobility environments, the performance degrades rapidly with increasing mobility. Also, considerable routing overhead is involved due to the source-routing mechanism
  • 8. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 100 employed in DSR. This routing overhead is directly proportional to the path length. 11.DESCRIPTION OF PROACTIVE PROTOCOL 11.1. DSDV Protocol: (Destination Sequenced Distance Vector (DSDV) Protocol) The destination address – The number of hops required to reach the destination and – The new sequence number, originally stamped by the destination The transmitted routing tables will also contain the hardware address, network address of the mobile host transmitting them. The routing tables will contain the sequence number created by the transmitter and hence the most new destination sequence number is preferred as the basis for making forwarding decisions. This new sequence number is also updated to all the hosts in the network which may decide on how to maintain the routing entry for that originating mobile host. After receiving the route information, receiving node increments the metric and transmits information by broadcasting. Incrementing metric is done before transmission because, incoming packet will have to travel one more hop to reach its destination. Time between broadcasting the routing information packets is the other important factor to be considered. When the new information is received by the mobile host it will be retransmitted soon effecting the most rapid possible dissemination of routing information among all the cooperating mobile hosts. The mobile host cause broken links as they move from place to place within the network. The broken link may be detected by the layer2 protocol, which may be described as infinity. When the route is broken in a network, then immediately that metric is assigned an infinity metric there by determining that there is no hop and the sequence number is updated. Sequence numbers originating from the mobile hosts are defined to be even number and the sequence numbers generated to indicate infinity metrics are odd numbers. The broadcasting of the information in the DSDV protocol is of two types namely: full dump and incremental dump. Full dump broadcasting will carry all the routing information while the incremental dump will carry only information that has changed since last full dump. Irrespective of the two types, broadcasting is done in network protocol data units (NPDU). Full dump requires multiple NPDU’s while incremental requires only one NPDU to fit in all the information. When an information packet is received from another node, it compares the sequence number with the available sequence number for that entry. If the sequence number is larger, then it will update the routing information with the new sequence number else if the information arrives with the same sequence number it looks for the metric entry and if the number of hops is less than the previous entry the new information is updated (if information is same or metric is more then it will discard the information).
  • 9. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 101 While the nodes information is being updated the metric is increased by 1 and the sequence number is also increased by 1. Similarly, if a new node enters the network, it will announce itself in the network and the nodes in the network update their routing information with a new entry for the new node.During broadcasting, the mobile hosts will transmit their routing tables periodically but due to the frequent movements by the hosts in the networks, this will lead to continuous burst of new routes transmissions upon every new sequence number from that destination. The solution for this is to delay the advertisement of such routes until it shows up a better metric. 12. COMPARISON OF DSDV, AODV, DSR DSDV AODV DSR 1) (DSDV) is a table driven routing scheme for ad hoc mobile networks based on the Bellman-ford algorithm. 1) AODV is an on –Demand routing protocol which is confluence of DSDV and DSR. 1) Dynamic Source Routing is a Pure On- Demand routing protocol 2) Each node acts as a router where a routing table is maintained and periodic routing updates are exchange, even if the routes are not needed. 2) Route is calculated on demand 2) Route is calculated only when it is required. 3) A sequence number is associated with each route or path to the destination to prevent routing loops. 3) AODV provides loop free routes while repairing link breakages. but unlike DSDV, it doesn’t require global periodic routing advertisements. 3) It uses no periodic routing messages like AODV 4) (DSDV) is a table driven routing scheme for ad hoc mobile networks. 4) AODV maintains a routing table where it maintains one entry per destination unlike the DSR that maintains multiple route cache 4) DSR uses source routing where the whole route is carried as an overhead. CONCLUSION In this research paper we have discussed about a new technology in information technology: MANET. We have seen the advancement in this field even day by day of internet due to wireless networking technologies. It gives rise to many new applications that work on wireless technology. In the past few decades, we have seen the advancement in wireless networks. The rising capabilities of mobile
  • 10. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 102 devices are giving a new direction to the internet, which decreases the cost and allow us to use infrastructure wireless networks and infrastructure less wireless networks that called as MANET (Mobile Ad hoc Wireless Network). We have also described the architecture, characteristics,apploications, advantages and desadvantages, routing protocols. There is no doubt that MANET is development trend for the future. REFERENCES [1] Umang Singh, ‘’ Secure Routing Protocols in mobile Ad hoc networks-A survey and Taxanomy’’ [2] International Journal of Reviews in Computing, 30th September 2011, Vol. 7 [3] Qunwei Zheng, Xiaoyan Hong and Sibabrata Ray, [4] “Recent Advances in Mobility Modeling for Mobile Ad hoc Network Research’’, 2004 [5] B. SOUJANYA, T. SITAMAHALAXSHMI, CH. DIWAKAR “ STUDY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS”,B. Soujanya et al./ International Journal of Engineering Science and Technology(IJEST), ISSN:0975-5462 Vol. 3, No 4 April 2011. [6] Kavita Taneja, R.B. Patel “An Overview of Mobile Ad hoc Networks: Challenges and Future.” [7] Vikaram Patalbasi, Sonali Mote “Mobile Ad hoc Networks: Opportunities and Future.” [8] Humayun Bakht “History of Mobile Ad hoc Networks” http://www.oocities.org/humayunbakht/H MANET.pdf [9] Ram Ramanathan and Jason Redi “A Brief Overview of Ad Hoc Networks: Challenges and Directions” IEEE Communications Magazine- 50th Anniversary Commemorative Issue/May 2002 [10] Amitabh Mishra and Ketan M. Nadkarni, Security in Wireless Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 30), CRC Press LLC, 2003. [11] . M. Conti, Body, personal, and local wireless ad hoc networks, in: M. Ilyas (Ed.), Handbook of Ad Hoc Networks, CRC Press, New York, 2003 (Chapter 1). [12] [10] On demand routing in multi hop wireless mobile Ad hoc networks (chapter 3- Overview of mobile Ad hoc network. pdf) [12] [13]Wei-Jie Yu," Pheromone-Distribution- Based Adaptive Ant Colony System", GECCO’10, July 7–11, 2010, Portland, Oregon, USA. ACM 978-1-4503-0072- 8/10/07 [13] [14]Ana Cristina B. Kochem Vendramin," CGrAnt: A Swarm Intelligence-based Routing Protocol for Delay Tolerant Networks", GECCO’12, July 7–11, 2012, Philadelphia, Pennsylvania, USA. ACM 978-1-4503-1177-9/12/07 [14] [15]Anuj K. Gupta," Analysis of various Swarm-based & Ant-based Algorithms", ACAI '11, July 21 - July 22 2011, Rajpura/Punjab, India ACM 978-1-4503- 0635-5/11/10 [15] [16]Carlos M. Fernandes," Binary Ant Algorithm", GECCO’07, July 7–11, 2007, London, England, United Kingdom. ACM 978-1-59593-697-4/07/0007 [17] Marcelo Portela Sousa," Ant Colony Optimization with Fuzzy Heuristic
  • 11. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 103 InformationDesigned for Cooperative Wireless Sensor Networks", MSWiM’11, October 31–November 4, 2011, Miami, Florida, USA. ACM 978-1-4503-0898- 4/11/10 [18] Rendong Bai," Salvaging Route Reply for On-Demand Routing Protocols in Mobile Ad-Hoc Networks", MSWiM’05, October 10–13, 2005, Montreal, Quebec, Canada.