SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. I (Mar-Apr. 2016), PP 111-115
www.iosrjournals.org
DOI: 10.9790/0661-1821111115 www.iosrjournals.org 111 | Page
Intermediate Guardianship Based Routing Protocol In MANET
Arati Patel1
, Rajan Patel2
12
(Department of Computer Engineering, Sankalchand Patel College of Engineering, Visnagar, India)
Abstract : Mobile Ad hoc network (MANET) is wireless infrastructure-free network. Nodes are connected via
wireless channels and can use multiple hops to exchange data. MANETs are characterized by large end to end
communication latency and lack of end to end path from a source node to its destination node. Energy is
indispensable factor in case of Ad hoc networks. Routing in such networks is a challenge because of
characteristics. We proposed to improve the performance of AODV as intermediate hop. This intermediate hop
takes custody of message when energy of other nodes is low or in the case of link failure. It is intermediate hop’s
responsibility to forward this message to destination. During flooding of RREQ, the node only receives RREQ if
there is sufficient energy compare to threshold value. This mechanism is used to maintain the energy
consumption balanced among all participating nodes. In this Approach Intermediate nodes behaves as guardian
of that message leads to Performance results close to best case.
Keywords: AODV, Energy Consumption, Routing
I. Introduction
In recent years, mobile computing has acquired a remarkable rise in popularity which has largely been
facilitated by the improvements in technology and computing power of the devices. A mobile Ad hoc network is
a collection of mobile nodes that communicate to each-other over relatively bandwidth constrained wireless
links [1]. The IEEE 802.11 subcommittee defines an Ad hoc network as a wireless network composed of
stations within mutual communication range of each other, created in a spontaneous manner and is limited only
by temporal and spatial constraints [2]. They have the advantages of rapid deployment, robustness, flexibility
and inherent support for mobility [2].
In MANETs, mobile nodes equipped with the transmitter and receiver, connected wirelessly without
any existing infrastructure. This type of network is defined with characteristics such as purpose-specific,
dynamic and autonomous [3]. Devices are connected through distributed system in fixed wireless network while
in Ad hoc network, mobile nodes are connected through decentralize manner. Node can use multiple hops to
communicate with other nodes. Nodes rely on each other, so that each node acts as a router for forwarding and
receiving messages to/from other nodes. Therefore in mobile Ad hoc network, a message can transfer from
source to destination either with the help of intermediate nodes, or directly. Mobile Ad hoc network routing
protocols classified in three parts: Reactive or on demand routing protocols, Proactive or tables driven routing
protocols and Hybrid [4].
Routing in Ad hoc networks is different from traditional fixed routing protocols, since most of the
existing internet protocols, whose were designed to support routing with fixed structure in a network while Ad
hoc network’s routing protocols have to be capable of dealing with the dynamic nature of these networks.
Several routing schemes have been proposed to deal with routings in MANETs. For example, in a military
application a low probability of detection and interception is a key factor, while in a sensor application
minimum energy usage is more important [5]. Some of them algorithms use unicast and others use broadcasting
message. One of the popular reactive routing protocol is Ad hoc On-demand Distance Vector (AODV) routing
protocol, which is capable of both multicast and unicast Routing [6].
We propose an intermediate guardianship based routing protocol, which is the extended version of
AODV routing protocol. In intermittent connected ad hoc networks, the destination is not always reachable by
the source node. In our protocol, source needs intermediate nodes to relay messages to the destination. With the
use of this message passing strategy, the probability of reaching to the destination is high.
The rest of the paper is organized as follows, Section 2 discusses background theory of MANET.
Section 3 discusses some existing approaches and related work in the area. Section 4 describes the intermediate
guardianship based routing protocol and Section 5 presents some concluding remarks and discusses the plan of
future work.
II. Background Theory
Ad hoc networks are based on the assumption that all nodes collaborate to realize network services.
These Networks are said to be future networks and have been receiving attention during the last few years. This
Intermediate Guardianship Based Routing Protocol In MANET
DOI: 10.9790/0661-1821111115 www.iosrjournals.org 112 | Page
popularity of MANET is because of wide range of available wireless services providing ubiquitous computing at
low cost. AODV Routing Protocol in MANET, is the on demand type Protocol.
The Ad hoc On-Demand Distance Vector Routing Protocol (AODV) [4] is a routing protocol classified
under the category of reactive protocol of MANETs. AODV is capable of both multicast and unicast routing.
2.1 Working of AODV
In AODV routing algorithm have mainly three control messages: Route Requests (RREQs), Route
Replies (RREPs), and Route Errors (RERRs). AODV Routing protocol is working in two phases: Route
Discovery and Route Maintenance.
Route Discovery
In the network, a source node needs a path to destination node, But In the routing table, there is not
valid information. To find the Route of destination node, the source node broadcasts a route request (RREQ) in
network. When each node receives the RREQ, it creates or updates a reverse route to the source node in the
routing table and maintains it until message reaches to destination or path failure message receives. In the
routing table, if it does not have a valid path to the destination node. It rebroadcasts the RREQ to neighbor
nodes. When RREQ flooding from the source node to destination node, the destination node creates the reverse
route, unicast route reply (RREP).
For example, Fig. 1 shows the process of the route discovery, in which the source node S broadcasts
the RREQ and Fig. 2 shows that the destination node D unicast the RREP. If any intermediate node has the valid
route to the destination node in their routing table when it receives the RREQ, then it unicast the RREP to the
source node instead of the destination node. During the route discovery, when each node receives the RREQ that
it has already processed, it discards the RREQ, so the loop is avoided and the overhead becomes low.
Fig. 1. Mobile nodes in MANETs Fig. 2. Mobile nodes in MANETs
broadcast RREQ unicast RREP
Route Maintenance
Each node broadcast a Hello message periodically to ensure the local connectivity. It broadcast the
RREP with TTL value 1 as the Hello message. When the node does not receive any control packets from a
neighbor node during few seconds, it assumes that link break to the neighbor node. In addition, when the node
has the link break to the neighbor, such failures could be detected by using link layer acknowledgments. When
the node that detects the link break is close to the destination node, it requires a new route to the destination
node, which is known as Local Repair.
When the local repair is unsuccessful, or when the link break is far from the destination node, the node
propagates a route error packet (RERR) to the source node.
Fig. 3. Intermediate node propagates RERR message
III. Related Work
MANETs are partitioned wireless Ad hoc networks with intermittent connectivity. Nodes rarely have
information on the changing network topology in an intermittently connected network or a mobile network.
Intermediate Guardianship Based Routing Protocol In MANET
DOI: 10.9790/0661-1821111115 www.iosrjournals.org 113 | Page
Nodes may not know the availability of future connection, but the network may benefit from routing entry of
nodes contact over time.
There are many approaches proposed for routing in MANETs. One of the popular routing protocol is
the AODV [6]. AODV Routing protocol is reactive type protocol and is working in two phases, Route
Discovery and Route Maintenance. In AODV routing algorithm have mainly three control messages: Route
Requests (RREQs), Route Errors (RERRs), and Route Replies (RREPs). When a source node needs a path to
destination node and there is not the valid route information in the routing table, the source node broadcasts a
route request packet (RREQ) in the network for find route of destination node. When each node receives the
RREQ, it creates or updates a reverse route to the source node in the routing table and maintains it until message
reaches to destination or path failure message receives. Source node checks the sequence number, updates the
forward route and starts communications.
Another popular traditional protocol is Dynamic Source Routing (DSR), which used the source
routing instead of depending on the routing table at each intermediate device [7]. It is analogous to AODV
because it creates a route on-demand when a transmitting node requests one. In Ad hoc networks, DSR is an on-
demand protocol presented to control the bandwidth consumed by control packets by eliminating the periodic
table-update messages mandatory in the table-driven approach. The weakness of this protocol is that the route
maintenance strategy does not locally repair a broken link. The connection configuration delay is higher than in
table-driven approach.
In multi-hop AODV algorithm, author implemented new approach, AODV-2T [8], By applying a
conservative and circumspect concept, an improved AODV designed to compromise link failures problems.
Before Link Breaking, AODV-2T could beat the problem by preparing a backup route just-in-time. AODV-2T
provides route maintenance strategy, how to find a backup route. Thus, if we improve backup route establishing
function of AODV-2T to support Multi-hop backup route, the improved protocol should enhance the Ad hoc
networking performance both in term of number of route break decrement which in turn increases the network’s
throughput.
AODV-2T which is improves the throughput of Ad hoc network and reducing the broken route to
applying 2 level threshold concept. AODV-2T is gives better performance compared to original AODV.
Another energy efficient LEA-AODV routing protocol [9] is simple but efficient algorithm which is balance
energy consumption among all participating nodes. That will extending the network lifetime of the batteries that
power these MANET based on one of the most important routing protocols AODV. Nodes don’t have the
appropriate quantity of energy to be used in routing process that LEA-AODV is difficult to take off. The
established routes will rely on the local decision of each node.
IV. Proposed Approach
In the discontinuous mobile Ad hoc network, there is no direct path available between all source and
destination and nodes are moving so link failure during transmission is happened frequently. The proposed
algorithm is described in two phases. The first phase of the algorithm concentrates on energy efficient routing.
We referenced LEA-AODV protocol [9] to minimize the power consumption of nodes. In LEA-AODV
algorithm, the author has used mechanism of balancing the energy consumption among all participating nodes.
Due to dynamic nature of mobile network, nodes are free to move at any time so the maintenance of routing
path during message transmission is very difficult, and it may lead to link failure. We are focusing this problem
by giving the responsibility of message to the intermediate node and it is covered in another phase of algorithm.
When node wants to send message and destination is not in range then it starts the broadcasting of
RREQ control message. The neighbour nodes receive RREQ and compare its current battery level with the
threshold (θ). Threshold value is dynamically changing and will be derived based on the average power of
participated nodes along the path. Using the following formula, which is referred from LEA_AODV [6], nodes
calculate the threshold
------( i )
Where n is the number of nodes inside current node region, 𝑛_𝑝𝑜𝑤𝑒𝑟𝑖 is the power level of each node
link. If node’s current energy is higher than threshold, it will respond to the RREQ as usual. Otherwise, it will
simply drop it. This technique leads the network to ensure that all the nodes are balanced in their energy
consumption.
In the another phase of this proposed algorithm, we extended AODV algorithm as intermediate nodes
become guardian, which is useful in the case of link failure between two nodes. Source node is broadcasting
RREQ and intermediate nodes receive it and continue this process until RREQ reaches to destination node.
After receiving RREQ message, destination forwards RREP message to the source through the same path with
the help of intermediate nodes. Finally source sends message when it receives RREP from destination. Any
Intermediate Guardianship Based Routing Protocol In MANET
DOI: 10.9790/0661-1821111115 www.iosrjournals.org 114 | Page
node from routing path may be disconnected with his neighbour node and link failure occurs between them. In
this situation, node closest to source, who participated in link failure, sends RERR to inform about link error to
source in traditional AODV. We modified this procedure as in the situation of link failure, intermediate node
takes responsibility of coming data message instead of sending RERR message to source node. And the
intermediate node takes custody of message. Now this node pretends as source node and broadcasts RREQ to
find path of destination node. In most of the scenario, this guardianship based approach optimizes the routing
and reduces the overhead of network.
We consider an example to explain this proposed solution. Suppose MANET consist of seven mobile
nodes, which is shown in below figures.
Fig. 4. Nodes broadcast RREQ Fig. 5. Nodes unicast RREP
Source node A has message M which destination is node F. Based on the scenario, we assume the
initial value of the threshold is 0.5, it can be calculated as the average ratio of remaining energy of each link
node. If A is connected by the direct edge B and C, here A -> B is 0.3 and A -> C is 0.6, the θ > 0.3 so RREQ is
simply dropped by node B and the request path is passing through node C. This procedure will be executed up to
RREQ is received by destination.
When destination received RREQ, it sends back route reply to inform source about routing path.
Algorithm chooses the best routing path in terms of hop count for sending message, here A -> C -> G -> F is
optimal path because of fewer hop count so destination sends RREP through this path. link failure between G –
F, G sends RERR message to A.
In proposed algorithm, we modify route error message procedure and don’t send RERR to source and
last node of that available path takes custody of message. In this scenario, node G takes responsibility of
message M. Now node G broadcasts RREQ message to find destination node of message M. Hypothetically it’s
reduce the overhead and delay of network.
Fig. 6. Nodes forwards RERR Fig. 7. Source Node sends data message to guardian node
The Fig. 8. Intermediate Guardianship approach is work on this below Algorithm
Algorithm
Step 1. Source node, which has message to send, broadcasts RREQ in the network to find route of destination
Node.
Step 2. When there is an interaction between two nodes n1 and n2, n1 sends RREQ to n2.
Step 3. After receiving RREQ, node n2 will calculate the threshold value θ as
Where,
n = number of nodes around the backward path,
𝑛_𝑝𝑜𝑤𝑒𝑟𝑖 = power level of each node link.
Step 4. If energy of node n2 > θ , then node n2 will make an entry in the routing table and will broadcast it
further.
Step 5. Otherwise node n2 drops RREQ.
Step 6. Continue these steps [2-4] until RREQ reaches to the destination.
Step 7. Destination node will send RREP to source when RREQ has reached the destination node and source
Intermediate Guardianship Based Routing Protocol In MANET
DOI: 10.9790/0661-1821111115 www.iosrjournals.org 115 | Page
forwards data through this route.
Step 8. During data transmission, if any link of route is disconnected, then instead of sending RERR,
intermediate nodes receives data message and become guardian. Now this guardian node broadcasts
RREQ to find remaining path and follow these steps until message reaches to destination
Fig. 8. Intermediate Guardianship approch
V. Conclusion
Detail study of routing protocols show that there are many approach to use intermediate node and its
behavior for routing decision. In Ad hoc network, for efficiency and reducing overhead of network, routing
decision has been a focal point of research in this area. As discuss in propose solution, we try to improve the
performance by enhancing LEA-AODV routing protocol by applying modified procedure in the circumstance of
link failure and using energy threshold for remain energy when battery’s level is critical. We are planning to
implement propose routing strategy in NS-2 simulator. Take results and do performance evolution and analysis
and make conclusion of policy.
References
[1]. Toh,C.-K., Delwar, M., Allen,D.: Evaluating the communication performance of an ad hoc wireless network. Wireless
Communications, IEEE Transactions on , vol.1, no.3, 2002, pp. 402-414
[2]. IEEE Standard for Information Technology- Telecommunications and Information Exchange Between Systems-Local and
Metropolitan Area Networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer
(PHY) Specifications, IEEE 1997
[3]. Lidong, Z. ,Zygmunt, J.H. :Securing Ad Hoc Networks, Network, IEEE Volume 13, Issue 6, 1999, pp, 24-30
[4]. Uma Rathore Bhatt, Priyanka Jain, RakshaUpadhyay.: Enhanced AODV- An Energy Efficient Routing Protocol for MANET, IEEE
2013
[5]. Kuosmanen, P. Classification of Ad Hoc routing protocols. Finnish Defence Forces, Naval Academy, Finland, petteri.kuosmanen@
mil.fi 2002
[6]. C. Perkins, E. Belding Royer ,S. Das .:Ad hoc on-demand Distance Vector (AODV) Routing, IETF RFC3561,2003
[7]. Johnson DB, Maltz DA. Dynamic source routing in ad hoc wireless networks. In: Mobile computing: Springer; 1996
[8]. Akkaphop, O., Mayuree, L.:An Improvement of Ad Hoc NetworkRoute Maintenance, Proceeding of International Symposium on
Communication and Information Technologies, (Vientiane, LaoPDR, October 2008), 102-105
[9]. AL-GabriMalek, Chunlin LI, Zhiyong Yang, Naji Hasan.: Improved the Energy of Ad Hoc On-Demand Distance Vector Routing
Protocol, Science Direct, IERI Procedia 2, pp:355-361,2012

More Related Content

What's hot

Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928IJRAT
 
Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2IAEME Publication
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDVRajesh Piryani
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...IOSR Journals
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Networkijsrd.com
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
 
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Senthil Kanth
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...IOSR Journals
 

What's hot (17)

Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928
 
As33259263
As33259263As33259263
As33259263
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
 
E010322531
E010322531E010322531
E010322531
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
 

Viewers also liked

Parametric Studies on Detergent Using Low Cost Sorbent
Parametric Studies on Detergent Using Low Cost SorbentParametric Studies on Detergent Using Low Cost Sorbent
Parametric Studies on Detergent Using Low Cost SorbentIOSR Journals
 
Enhancement of New Channel Equalizer Using Adaptive Neuro Fuzzy Inference System
Enhancement of New Channel Equalizer Using Adaptive Neuro Fuzzy Inference SystemEnhancement of New Channel Equalizer Using Adaptive Neuro Fuzzy Inference System
Enhancement of New Channel Equalizer Using Adaptive Neuro Fuzzy Inference SystemIOSR Journals
 
Process Parametric Optimization of CNC Vertical Milling Machine Using Taguchi...
Process Parametric Optimization of CNC Vertical Milling Machine Using Taguchi...Process Parametric Optimization of CNC Vertical Milling Machine Using Taguchi...
Process Parametric Optimization of CNC Vertical Milling Machine Using Taguchi...IOSR Journals
 
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...Relationship of Kabaddi Performance with Selected Coordinative Ability of the...
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...IOSR Journals
 
Thermal conductivity Characterization of Bamboo fiber reinforced in Epoxy Resin
Thermal conductivity Characterization of Bamboo fiber reinforced in Epoxy ResinThermal conductivity Characterization of Bamboo fiber reinforced in Epoxy Resin
Thermal conductivity Characterization of Bamboo fiber reinforced in Epoxy ResinIOSR Journals
 

Viewers also liked (20)

P01213112116
P01213112116P01213112116
P01213112116
 
B012530710
B012530710B012530710
B012530710
 
P18030492101
P18030492101P18030492101
P18030492101
 
N0106198102
N0106198102N0106198102
N0106198102
 
A010420106
A010420106A010420106
A010420106
 
C010211319
C010211319C010211319
C010211319
 
I010114657
I010114657I010114657
I010114657
 
F012623642
F012623642F012623642
F012623642
 
L017368189
L017368189L017368189
L017368189
 
B017340511
B017340511B017340511
B017340511
 
D017532629
D017532629D017532629
D017532629
 
Parametric Studies on Detergent Using Low Cost Sorbent
Parametric Studies on Detergent Using Low Cost SorbentParametric Studies on Detergent Using Low Cost Sorbent
Parametric Studies on Detergent Using Low Cost Sorbent
 
Enhancement of New Channel Equalizer Using Adaptive Neuro Fuzzy Inference System
Enhancement of New Channel Equalizer Using Adaptive Neuro Fuzzy Inference SystemEnhancement of New Channel Equalizer Using Adaptive Neuro Fuzzy Inference System
Enhancement of New Channel Equalizer Using Adaptive Neuro Fuzzy Inference System
 
Process Parametric Optimization of CNC Vertical Milling Machine Using Taguchi...
Process Parametric Optimization of CNC Vertical Milling Machine Using Taguchi...Process Parametric Optimization of CNC Vertical Milling Machine Using Taguchi...
Process Parametric Optimization of CNC Vertical Milling Machine Using Taguchi...
 
M010427686
M010427686M010427686
M010427686
 
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...Relationship of Kabaddi Performance with Selected Coordinative Ability of the...
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...
 
Thermal conductivity Characterization of Bamboo fiber reinforced in Epoxy Resin
Thermal conductivity Characterization of Bamboo fiber reinforced in Epoxy ResinThermal conductivity Characterization of Bamboo fiber reinforced in Epoxy Resin
Thermal conductivity Characterization of Bamboo fiber reinforced in Epoxy Resin
 
A013150107
A013150107A013150107
A013150107
 
B018140813
B018140813B018140813
B018140813
 
H017645560
H017645560H017645560
H017645560
 

Similar to Q01821111115

Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksIJCNCJournal
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...CSEIJJournal
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122IJRAT
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
Energy Consumption of Intermediate node in AODV
Energy Consumption of Intermediate node in AODVEnergy Consumption of Intermediate node in AODV
Energy Consumption of Intermediate node in AODViosrjce
 
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...IJECEIAES
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)IJMER
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
 
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...pijans
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 

Similar to Q01821111115 (20)

Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122
 
B03406010
B03406010B03406010
B03406010
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Energy Consumption of Intermediate node in AODV
Energy Consumption of Intermediate node in AODVEnergy Consumption of Intermediate node in AODV
Energy Consumption of Intermediate node in AODV
 
D017262429
D017262429D017262429
D017262429
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
 
En33838844
En33838844En33838844
En33838844
 
En33838844
En33838844En33838844
En33838844
 
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Q01821111115

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. I (Mar-Apr. 2016), PP 111-115 www.iosrjournals.org DOI: 10.9790/0661-1821111115 www.iosrjournals.org 111 | Page Intermediate Guardianship Based Routing Protocol In MANET Arati Patel1 , Rajan Patel2 12 (Department of Computer Engineering, Sankalchand Patel College of Engineering, Visnagar, India) Abstract : Mobile Ad hoc network (MANET) is wireless infrastructure-free network. Nodes are connected via wireless channels and can use multiple hops to exchange data. MANETs are characterized by large end to end communication latency and lack of end to end path from a source node to its destination node. Energy is indispensable factor in case of Ad hoc networks. Routing in such networks is a challenge because of characteristics. We proposed to improve the performance of AODV as intermediate hop. This intermediate hop takes custody of message when energy of other nodes is low or in the case of link failure. It is intermediate hop’s responsibility to forward this message to destination. During flooding of RREQ, the node only receives RREQ if there is sufficient energy compare to threshold value. This mechanism is used to maintain the energy consumption balanced among all participating nodes. In this Approach Intermediate nodes behaves as guardian of that message leads to Performance results close to best case. Keywords: AODV, Energy Consumption, Routing I. Introduction In recent years, mobile computing has acquired a remarkable rise in popularity which has largely been facilitated by the improvements in technology and computing power of the devices. A mobile Ad hoc network is a collection of mobile nodes that communicate to each-other over relatively bandwidth constrained wireless links [1]. The IEEE 802.11 subcommittee defines an Ad hoc network as a wireless network composed of stations within mutual communication range of each other, created in a spontaneous manner and is limited only by temporal and spatial constraints [2]. They have the advantages of rapid deployment, robustness, flexibility and inherent support for mobility [2]. In MANETs, mobile nodes equipped with the transmitter and receiver, connected wirelessly without any existing infrastructure. This type of network is defined with characteristics such as purpose-specific, dynamic and autonomous [3]. Devices are connected through distributed system in fixed wireless network while in Ad hoc network, mobile nodes are connected through decentralize manner. Node can use multiple hops to communicate with other nodes. Nodes rely on each other, so that each node acts as a router for forwarding and receiving messages to/from other nodes. Therefore in mobile Ad hoc network, a message can transfer from source to destination either with the help of intermediate nodes, or directly. Mobile Ad hoc network routing protocols classified in three parts: Reactive or on demand routing protocols, Proactive or tables driven routing protocols and Hybrid [4]. Routing in Ad hoc networks is different from traditional fixed routing protocols, since most of the existing internet protocols, whose were designed to support routing with fixed structure in a network while Ad hoc network’s routing protocols have to be capable of dealing with the dynamic nature of these networks. Several routing schemes have been proposed to deal with routings in MANETs. For example, in a military application a low probability of detection and interception is a key factor, while in a sensor application minimum energy usage is more important [5]. Some of them algorithms use unicast and others use broadcasting message. One of the popular reactive routing protocol is Ad hoc On-demand Distance Vector (AODV) routing protocol, which is capable of both multicast and unicast Routing [6]. We propose an intermediate guardianship based routing protocol, which is the extended version of AODV routing protocol. In intermittent connected ad hoc networks, the destination is not always reachable by the source node. In our protocol, source needs intermediate nodes to relay messages to the destination. With the use of this message passing strategy, the probability of reaching to the destination is high. The rest of the paper is organized as follows, Section 2 discusses background theory of MANET. Section 3 discusses some existing approaches and related work in the area. Section 4 describes the intermediate guardianship based routing protocol and Section 5 presents some concluding remarks and discusses the plan of future work. II. Background Theory Ad hoc networks are based on the assumption that all nodes collaborate to realize network services. These Networks are said to be future networks and have been receiving attention during the last few years. This
  • 2. Intermediate Guardianship Based Routing Protocol In MANET DOI: 10.9790/0661-1821111115 www.iosrjournals.org 112 | Page popularity of MANET is because of wide range of available wireless services providing ubiquitous computing at low cost. AODV Routing Protocol in MANET, is the on demand type Protocol. The Ad hoc On-Demand Distance Vector Routing Protocol (AODV) [4] is a routing protocol classified under the category of reactive protocol of MANETs. AODV is capable of both multicast and unicast routing. 2.1 Working of AODV In AODV routing algorithm have mainly three control messages: Route Requests (RREQs), Route Replies (RREPs), and Route Errors (RERRs). AODV Routing protocol is working in two phases: Route Discovery and Route Maintenance. Route Discovery In the network, a source node needs a path to destination node, But In the routing table, there is not valid information. To find the Route of destination node, the source node broadcasts a route request (RREQ) in network. When each node receives the RREQ, it creates or updates a reverse route to the source node in the routing table and maintains it until message reaches to destination or path failure message receives. In the routing table, if it does not have a valid path to the destination node. It rebroadcasts the RREQ to neighbor nodes. When RREQ flooding from the source node to destination node, the destination node creates the reverse route, unicast route reply (RREP). For example, Fig. 1 shows the process of the route discovery, in which the source node S broadcasts the RREQ and Fig. 2 shows that the destination node D unicast the RREP. If any intermediate node has the valid route to the destination node in their routing table when it receives the RREQ, then it unicast the RREP to the source node instead of the destination node. During the route discovery, when each node receives the RREQ that it has already processed, it discards the RREQ, so the loop is avoided and the overhead becomes low. Fig. 1. Mobile nodes in MANETs Fig. 2. Mobile nodes in MANETs broadcast RREQ unicast RREP Route Maintenance Each node broadcast a Hello message periodically to ensure the local connectivity. It broadcast the RREP with TTL value 1 as the Hello message. When the node does not receive any control packets from a neighbor node during few seconds, it assumes that link break to the neighbor node. In addition, when the node has the link break to the neighbor, such failures could be detected by using link layer acknowledgments. When the node that detects the link break is close to the destination node, it requires a new route to the destination node, which is known as Local Repair. When the local repair is unsuccessful, or when the link break is far from the destination node, the node propagates a route error packet (RERR) to the source node. Fig. 3. Intermediate node propagates RERR message III. Related Work MANETs are partitioned wireless Ad hoc networks with intermittent connectivity. Nodes rarely have information on the changing network topology in an intermittently connected network or a mobile network.
  • 3. Intermediate Guardianship Based Routing Protocol In MANET DOI: 10.9790/0661-1821111115 www.iosrjournals.org 113 | Page Nodes may not know the availability of future connection, but the network may benefit from routing entry of nodes contact over time. There are many approaches proposed for routing in MANETs. One of the popular routing protocol is the AODV [6]. AODV Routing protocol is reactive type protocol and is working in two phases, Route Discovery and Route Maintenance. In AODV routing algorithm have mainly three control messages: Route Requests (RREQs), Route Errors (RERRs), and Route Replies (RREPs). When a source node needs a path to destination node and there is not the valid route information in the routing table, the source node broadcasts a route request packet (RREQ) in the network for find route of destination node. When each node receives the RREQ, it creates or updates a reverse route to the source node in the routing table and maintains it until message reaches to destination or path failure message receives. Source node checks the sequence number, updates the forward route and starts communications. Another popular traditional protocol is Dynamic Source Routing (DSR), which used the source routing instead of depending on the routing table at each intermediate device [7]. It is analogous to AODV because it creates a route on-demand when a transmitting node requests one. In Ad hoc networks, DSR is an on- demand protocol presented to control the bandwidth consumed by control packets by eliminating the periodic table-update messages mandatory in the table-driven approach. The weakness of this protocol is that the route maintenance strategy does not locally repair a broken link. The connection configuration delay is higher than in table-driven approach. In multi-hop AODV algorithm, author implemented new approach, AODV-2T [8], By applying a conservative and circumspect concept, an improved AODV designed to compromise link failures problems. Before Link Breaking, AODV-2T could beat the problem by preparing a backup route just-in-time. AODV-2T provides route maintenance strategy, how to find a backup route. Thus, if we improve backup route establishing function of AODV-2T to support Multi-hop backup route, the improved protocol should enhance the Ad hoc networking performance both in term of number of route break decrement which in turn increases the network’s throughput. AODV-2T which is improves the throughput of Ad hoc network and reducing the broken route to applying 2 level threshold concept. AODV-2T is gives better performance compared to original AODV. Another energy efficient LEA-AODV routing protocol [9] is simple but efficient algorithm which is balance energy consumption among all participating nodes. That will extending the network lifetime of the batteries that power these MANET based on one of the most important routing protocols AODV. Nodes don’t have the appropriate quantity of energy to be used in routing process that LEA-AODV is difficult to take off. The established routes will rely on the local decision of each node. IV. Proposed Approach In the discontinuous mobile Ad hoc network, there is no direct path available between all source and destination and nodes are moving so link failure during transmission is happened frequently. The proposed algorithm is described in two phases. The first phase of the algorithm concentrates on energy efficient routing. We referenced LEA-AODV protocol [9] to minimize the power consumption of nodes. In LEA-AODV algorithm, the author has used mechanism of balancing the energy consumption among all participating nodes. Due to dynamic nature of mobile network, nodes are free to move at any time so the maintenance of routing path during message transmission is very difficult, and it may lead to link failure. We are focusing this problem by giving the responsibility of message to the intermediate node and it is covered in another phase of algorithm. When node wants to send message and destination is not in range then it starts the broadcasting of RREQ control message. The neighbour nodes receive RREQ and compare its current battery level with the threshold (θ). Threshold value is dynamically changing and will be derived based on the average power of participated nodes along the path. Using the following formula, which is referred from LEA_AODV [6], nodes calculate the threshold ------( i ) Where n is the number of nodes inside current node region, 𝑛_𝑝𝑜𝑤𝑒𝑟𝑖 is the power level of each node link. If node’s current energy is higher than threshold, it will respond to the RREQ as usual. Otherwise, it will simply drop it. This technique leads the network to ensure that all the nodes are balanced in their energy consumption. In the another phase of this proposed algorithm, we extended AODV algorithm as intermediate nodes become guardian, which is useful in the case of link failure between two nodes. Source node is broadcasting RREQ and intermediate nodes receive it and continue this process until RREQ reaches to destination node. After receiving RREQ message, destination forwards RREP message to the source through the same path with the help of intermediate nodes. Finally source sends message when it receives RREP from destination. Any
  • 4. Intermediate Guardianship Based Routing Protocol In MANET DOI: 10.9790/0661-1821111115 www.iosrjournals.org 114 | Page node from routing path may be disconnected with his neighbour node and link failure occurs between them. In this situation, node closest to source, who participated in link failure, sends RERR to inform about link error to source in traditional AODV. We modified this procedure as in the situation of link failure, intermediate node takes responsibility of coming data message instead of sending RERR message to source node. And the intermediate node takes custody of message. Now this node pretends as source node and broadcasts RREQ to find path of destination node. In most of the scenario, this guardianship based approach optimizes the routing and reduces the overhead of network. We consider an example to explain this proposed solution. Suppose MANET consist of seven mobile nodes, which is shown in below figures. Fig. 4. Nodes broadcast RREQ Fig. 5. Nodes unicast RREP Source node A has message M which destination is node F. Based on the scenario, we assume the initial value of the threshold is 0.5, it can be calculated as the average ratio of remaining energy of each link node. If A is connected by the direct edge B and C, here A -> B is 0.3 and A -> C is 0.6, the θ > 0.3 so RREQ is simply dropped by node B and the request path is passing through node C. This procedure will be executed up to RREQ is received by destination. When destination received RREQ, it sends back route reply to inform source about routing path. Algorithm chooses the best routing path in terms of hop count for sending message, here A -> C -> G -> F is optimal path because of fewer hop count so destination sends RREP through this path. link failure between G – F, G sends RERR message to A. In proposed algorithm, we modify route error message procedure and don’t send RERR to source and last node of that available path takes custody of message. In this scenario, node G takes responsibility of message M. Now node G broadcasts RREQ message to find destination node of message M. Hypothetically it’s reduce the overhead and delay of network. Fig. 6. Nodes forwards RERR Fig. 7. Source Node sends data message to guardian node The Fig. 8. Intermediate Guardianship approach is work on this below Algorithm Algorithm Step 1. Source node, which has message to send, broadcasts RREQ in the network to find route of destination Node. Step 2. When there is an interaction between two nodes n1 and n2, n1 sends RREQ to n2. Step 3. After receiving RREQ, node n2 will calculate the threshold value θ as Where, n = number of nodes around the backward path, 𝑛_𝑝𝑜𝑤𝑒𝑟𝑖 = power level of each node link. Step 4. If energy of node n2 > θ , then node n2 will make an entry in the routing table and will broadcast it further. Step 5. Otherwise node n2 drops RREQ. Step 6. Continue these steps [2-4] until RREQ reaches to the destination. Step 7. Destination node will send RREP to source when RREQ has reached the destination node and source
  • 5. Intermediate Guardianship Based Routing Protocol In MANET DOI: 10.9790/0661-1821111115 www.iosrjournals.org 115 | Page forwards data through this route. Step 8. During data transmission, if any link of route is disconnected, then instead of sending RERR, intermediate nodes receives data message and become guardian. Now this guardian node broadcasts RREQ to find remaining path and follow these steps until message reaches to destination Fig. 8. Intermediate Guardianship approch V. Conclusion Detail study of routing protocols show that there are many approach to use intermediate node and its behavior for routing decision. In Ad hoc network, for efficiency and reducing overhead of network, routing decision has been a focal point of research in this area. As discuss in propose solution, we try to improve the performance by enhancing LEA-AODV routing protocol by applying modified procedure in the circumstance of link failure and using energy threshold for remain energy when battery’s level is critical. We are planning to implement propose routing strategy in NS-2 simulator. Take results and do performance evolution and analysis and make conclusion of policy. References [1]. Toh,C.-K., Delwar, M., Allen,D.: Evaluating the communication performance of an ad hoc wireless network. Wireless Communications, IEEE Transactions on , vol.1, no.3, 2002, pp. 402-414 [2]. IEEE Standard for Information Technology- Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE 1997 [3]. Lidong, Z. ,Zygmunt, J.H. :Securing Ad Hoc Networks, Network, IEEE Volume 13, Issue 6, 1999, pp, 24-30 [4]. Uma Rathore Bhatt, Priyanka Jain, RakshaUpadhyay.: Enhanced AODV- An Energy Efficient Routing Protocol for MANET, IEEE 2013 [5]. Kuosmanen, P. Classification of Ad Hoc routing protocols. Finnish Defence Forces, Naval Academy, Finland, petteri.kuosmanen@ mil.fi 2002 [6]. C. Perkins, E. Belding Royer ,S. Das .:Ad hoc on-demand Distance Vector (AODV) Routing, IETF RFC3561,2003 [7]. Johnson DB, Maltz DA. Dynamic source routing in ad hoc wireless networks. In: Mobile computing: Springer; 1996 [8]. Akkaphop, O., Mayuree, L.:An Improvement of Ad Hoc NetworkRoute Maintenance, Proceeding of International Symposium on Communication and Information Technologies, (Vientiane, LaoPDR, October 2008), 102-105 [9]. AL-GabriMalek, Chunlin LI, Zhiyong Yang, Naji Hasan.: Improved the Energy of Ad Hoc On-Demand Distance Vector Routing Protocol, Science Direct, IERI Procedia 2, pp:355-361,2012