SlideShare a Scribd company logo
1 of 3
Download to read offline
Archana S. Chitte et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.97-99
www.ijera.com 97 | P a g e
Reducing Collision In Multipacket Transfer And Receiver Using
Token Passing Techniques In Wireless Ad Hoc Network
P. P. Rewagad*, Archana S. Chitte*
*GUIDE (Department of Computer Science and Enginnering, North Maharashtra University, Jalgaon)
** ME SCHOLAR (Department of Computer Science and Enginnering, North Maharashtra University, Jalgaon)
Abstract
Transmitting and Receiving the multiple packet on a single channel through a route node is very critical task.
There may be a collision between more than one routes. One route node can send and receive the data to the two
routes. It may generate a collision and may be the data exchange between more than one routes. That’s why, we
used here a token passing technique and time interval for successful transmission. The theoretical analysis show
the total scenario and reduce the collision between routes.
Keywords— Token passing, Time slots, transfer/receive packets , MANET
I. Introduction
A day by day the uses of internet increases
whether it is wired or wireless. The goal of internet
uses is to less effort for physical connection and
faster communication. That’s why, user chooses
wireless communication than wired. Now a days,
wireless ad hoc network is very popular because of its
structures. The wireless ad hoc network does not
required any pre-infrastructures.[14] That’s why it is
mostly used in tactical field, battle field where secret
message communication is more important without
pre-establishing infrastructure for internet.
In mobile ad hoc neteork, all the nodes are
wireless, they can communicate with each other using
self confuring route nodes. [14]That’s why, it is very
preference able. The node i.e. source node want to
communicate with other node i.e. destination node.
The source node has to discover the the route nodes.
There are many protocols available like DSR, DSDV,
AODV etc.[14] when source node want to
communicate with destination node he has to know
the information about neighbor node. Also, source
node has to count the hops that means the source
node can select minimum hop count for
communication[9].
There are many nodes available in routes.
After selecting the route nodes using any route
finding protocols, one node may be a route node of
more than one route.[5] There may be a collision
between neighbor discovery and communication
between more than one source-destination nodes. The
following fig. shows the collision between neighbour
available for routes.
Fig.1 Multipacket Transfer/Receive at the same node
The above fig. shows the problem for
multipacket transfer/ receiver. There are two source
nodes nd two destination node. They has to
communicate with each other. Node7 is a route node
of two routes. When both routes nodes want to to
communicate taking account of node7 at that time,
there is a collision may occur which route first give
the response and keep the routes information to
securely send the message to particular routes. To
avoid this collision, we used a token passing[2][6].
II. NETWORK MODEL AND
AUUMPTIONS
MANET is a self configuring network. In
which aource node decides route nodes itself. The
source node broead cast the route request to the nodes
which are in a radio range with its MAC address.[14]
The route node which are free, they accept the request
, add its MAC address and forward the route request
RESEARCH ARTICLE OPEN ACCESS
Archana S. Chitte et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.97-99
www.ijera.com 98 | P a g e
to its neighbor still they don’t have find out the
destination node. At the destination node, the MAC
address will check , if the MAC address is correct
sending by source node, it means it is reached to
destination node. Then the destination node sends the
acknowledgement to source node through route
nodes. This is the simplest way for communication.
If there may problem occur like collision
which is describes in Fib1. To solve this problem, we
give the solution. Theoretically we prove the collision
problem will solve.
Here we introduce the network model and
several Assumptions, under which we will present the
token passing technic and and corresponding
analysis.[2]
 Each node has a unique MAC address
 All nodes are in a same or different radio range.
 Nodes use bidirectional antennas
 Nodes can transmit and receive on the same
channel simultaneously.
A. Using Token
When one node is a route node of two
routes, there may may be collision occur. That’s why,
we used here token.
Fig.2 Token Slot
Here, we used 1bit for token. This token is
generated by source ode with unique number. This
number is decided by source node . when the source
node will broadcast the route request message. Then
source node sends the token also with that message.
The route node also having a 1bit stored that unique
token number for temporary upto the communication
will not be finished. This token bit is used for
temporary. After completing communication. The
node may delete that token number. Now if the
source node want to become an another route of node,
the same procedure will follow. The route node can
divide that bit slots into sub slots and stored the
another sources unique token number. Here we are
giving suggestion only for two routes. If we increase
the routes for communication, these may be more
memory space is required and there is a costly. That’s
why, a single bit can divide into subslots only two
subslots.
Algorithm: Token passing
1: Source node add unique number as a token.
2: Source node broadcast the route request with
token and monitor channel.
3: if it has already two route request, the request
will discard.
4: if route node is free accept the request.
5: Add the sequence number and ID to route
request message.
6: Forward the route request message.
8: If destination node is found, the destination node
sends the acknowledgement to source node.
B. Time Interval
After circulation of token, the route node
having a unique token of every separate routes source
and destination node. The route node has two token
now there is confusion between which route node has
to give the response. Then every node has to add a
slot i.e. time interval slot[15] .
Fig. 3 Time Sub Slot
To avoid the collision between two routes.
The node has assign a time slot. For first time slot,
the route node give the response to the first node.
After completion of time interval to route node gives
the response to other route. It means, it can reduce the
collision.
Discussion Here, we discussed some issues
related to token passing and time interval and their
corresponding analysis results.
1)Multiple nodes may be route node of more than one
routes
Here, we discuss the situation when n
number of nodes within the route having a multiple
routes to communication.[10] At this situation, there
may be more time required for transmission.
To solve this problem, we decide the only
two token slots assign to nodes. Means they can only
route nodes of two route. Also proving a time
interval. If within timeslot the source node doesn’t
get the reply from destination node, the source node
again repeat the steps from route request.
III. RELATED WORK
There are many researchers has focused on
securely transmission in a MANET without occurring
a collision between them and the node can transmit
and receive the message from a single channel[9][10].
Vasudevan sl at[1] later pointed out that the
expected time slots needed to finish the neighbor
discovery process by using birthday protocols in[3] is
neHn, where Hn is the nth
harmonie number. The
authors also proposed protocols for more realistic
situations, where the size of a clique is unknown to
nodes a feedback mechanism is introduced into the
system and the clocks of nodes are not identical.
Navneet malpani[2] discuss the token
circulation in MANET. In which the authors decide a
Archana S. Chitte et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.97-99
www.ijera.com 99 | P a g e
token and circulate to the route node for successful
communication with every node.
With the development of MPR[6] Zeng et
al[4] extended the result of [3] to the MPR situation
where no collision occurs if and only if there are no
more than k(K≥2) nodes simultaneously time needed
to discover all nodes.
IV. CONCLUSION
In this paper, we proposed a token passing
techniques by adding a time slot into every nodes
before going to start communication. First we add a
bit slot for dtoring a unique token ID created by
source node. Further more, we add time slot.
According to time slot, the route node can transmit
and receive the message at a single channel.
This aadition of time slot, it may reduce the
collision in Neighbour Discovery and secured
communication without collision.
References
[1] M. J. McGlynn and S. A. Borbash,
―Birthday protocols for low energy
deployment and flexible neighbor discovery
in ad hoc wireless networks,‖ in Proc. ACM
MobiHoc, 2001, pp. 137–145.
[2] Navneet Malpani, Yu Chen, Nitin H.
Vaidya, Senior Member,‖Distributed Token
Circulation in Mobile Ad Hoc Networks‖, in
IEEE transaction,s on Mobile Computing,
2005
[3] S. Vasudevan, D. Towsley, D. Goeckel, and
R. Khalili, ―Neighbor discovery in wireless
networks and the coupon collector’s
problem,‖ in Proc. ACM MobiCom, 2009,
pp. 181–192.
[4] W. Zeng, X. Chen, A. Russell, S.
Vasudevan, B. Wang, and W. Wei,
―Neighbor discovery in wireless networks
with multipacket reception,‖ in Proc. ACM
MobiHoc, 2011, p. 3.
[5] R. Motwani and P. Raghavan, Randomized
Algorithms. Cambridge, U.K.: Cambridge
Univ. Press, 1995.
[6] J. Jeon and A. Ephremides, ―Neighbor
discovery in a wireless sensor network:
Multipacket reception capability and
physical-layer signal processing,‖ in Proc.
48th Annu. Allerton Conf. Commun.,
Control, Comput., 2010, pp. 310–317.
[7] J. I. Choi, M. Jain, K. Srinivasan, P. Levis,
and S. Katti, ―Achieving single channel, full
duplex wireless communication,‖ in Proc.
ACM MobiCom, 2010, pp. 1–12.
[8] M. Jain, J. I. Choi, T. M. Kim, D. Bharadia,
S. Seth, K. Srinivasan, P. Levis, S. Katti, and
P. Sinha, ―Practical, real-time, full duplex
wireless,‖ in Proc. ACM MobiCom, 2011,
pp. 301–312.
[9] Z. Zhang and B. Li, ―Neighbor discovery in
mobile ad hoc self configuring networks
with directional antennas:Algorithms and
comparisons,‖ IEEE Trans. Wireless
Commun., vol. 7, no. 5, pp. 1540–1549, May
2008.
[10] L. You, X. Zhu, and G. Chen, ―Neighbor
discovery in peer-to-peer wireless networks
with multi-channel MPR capability,‖ in
Proc. IEEE ICC, 2012, pp. 4975–4979.
[11] Y. Wang, G. Pan, and Z. Huang, ―Direct
multi-hop time synchronization with
constructive interference,‖ in Proc. IPSN,
2012, pp. 115–116.
[12] L. Venturino, X. Wang, M. Lops, ‖Multiuser
detection for cooperative networks and
performance analysis ‖, IEEE Transaction
on Signal Processing, Vol. 54, Issue 9, pp.
3315–3329, September 2006.
[13] S. Vasudevan, J. Kurose, D. Towsley, ‖On
neighbor discovery in wireless networks
with directional antennas‖, INFOCOM 2005,
Vol. 4, pp. 2502–2512, March 2005. S.
Verd´u, Multiuser Detection, Cambridge
University Press, 1998.
[14] Magnus Frodish, Rer Johnson and Peter
Larson,‖Wireless Ad Hoc Networking-The
art of Networking without a network, in
Ericsson Review No.4, 2000.
[15] Guobao Sun, Fan Wu, Xiaofeng Gao, Wei
Wang,‖Time-Efficient Protocols for
Neighbour Discovery in Wireless Ad Hoc
Networks‖,IEEE Transaction on Vehicular
Technology, Vol.62,No.6,July 2013.

More Related Content

What's hot

Z02417321735
Z02417321735Z02417321735
Z02417321735IJMER
 
New strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocolNew strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocolijwmn
 
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...ijmnct
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingijwmn
 
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In ManetAn Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manetidescitation
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedDebesh Sadhukhan
 
ISM29jun06.doc
ISM29jun06.docISM29jun06.doc
ISM29jun06.docVideoguy
 
sarasism2006.doc
sarasism2006.docsarasism2006.doc
sarasism2006.docVideoguy
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...TELKOMNIKA JOURNAL
 

What's hot (20)

Z02417321735
Z02417321735Z02417321735
Z02417321735
 
F0313539
F0313539F0313539
F0313539
 
New strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocolNew strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocol
 
Distributed Hash Table
Distributed Hash TableDistributed Hash Table
Distributed Hash Table
 
Ac24204209
Ac24204209Ac24204209
Ac24204209
 
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
As03402620266
As03402620266As03402620266
As03402620266
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
 
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In ManetAn Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
 
ISM29jun06.doc
ISM29jun06.docISM29jun06.doc
ISM29jun06.doc
 
sarasism2006.doc
sarasism2006.docsarasism2006.doc
sarasism2006.doc
 
Gu2412131219
Gu2412131219Gu2412131219
Gu2412131219
 
560 229-237
560 229-237560 229-237
560 229-237
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
 
06775257
0677525706775257
06775257
 
Ijcatr04041022
Ijcatr04041022Ijcatr04041022
Ijcatr04041022
 

Viewers also liked

A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksA Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksIJERA Editor
 
Cambio Radical
Cambio  RadicalCambio  Radical
Cambio Radicaljorgelpg
 
Thinksheet 3 - Word Choice
Thinksheet 3 - Word ChoiceThinksheet 3 - Word Choice
Thinksheet 3 - Word Choicethechenster
 
Iv Etapa Responsabilidad Social....
Iv Etapa Responsabilidad  Social....Iv Etapa Responsabilidad  Social....
Iv Etapa Responsabilidad Social....guestd05e4df
 
Connecting Users And Developers
Connecting Users And DevelopersConnecting Users And Developers
Connecting Users And DevelopersKenji Hiranabe
 
Example of WEB 2.0 Environment
Example of WEB 2.0 EnvironmentExample of WEB 2.0 Environment
Example of WEB 2.0 Environmentlilith
 

Viewers also liked (20)

S04405107111
S04405107111S04405107111
S04405107111
 
Bi4201403406
Bi4201403406Bi4201403406
Bi4201403406
 
I43065157
I43065157I43065157
I43065157
 
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksA Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
 
Data Management
Data ManagementData Management
Data Management
 
I42055158
I42055158I42055158
I42055158
 
ufm1104
ufm1104ufm1104
ufm1104
 
What we do...
What we do...What we do...
What we do...
 
Bv4201481484
Bv4201481484Bv4201481484
Bv4201481484
 
Cambio Radical
Cambio  RadicalCambio  Radical
Cambio Radical
 
Ak04605259264
Ak04605259264Ak04605259264
Ak04605259264
 
Thinksheet 3 - Word Choice
Thinksheet 3 - Word ChoiceThinksheet 3 - Word Choice
Thinksheet 3 - Word Choice
 
Finance Outline
Finance OutlineFinance Outline
Finance Outline
 
O4101101103
O4101101103O4101101103
O4101101103
 
Iv Etapa Responsabilidad Social....
Iv Etapa Responsabilidad  Social....Iv Etapa Responsabilidad  Social....
Iv Etapa Responsabilidad Social....
 
Lb35189919904
Lb35189919904Lb35189919904
Lb35189919904
 
Oi2423352339
Oi2423352339Oi2423352339
Oi2423352339
 
Connecting Users And Developers
Connecting Users And DevelopersConnecting Users And Developers
Connecting Users And Developers
 
Ji3516041608
Ji3516041608Ji3516041608
Ji3516041608
 
Example of WEB 2.0 Environment
Example of WEB 2.0 EnvironmentExample of WEB 2.0 Environment
Example of WEB 2.0 Environment
 

Similar to R44089799

Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621IJRAT
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...IJERA Editor
 
Cyclic Sensing MAC Protocol for Multicast Routing in Mobile
Cyclic Sensing MAC Protocol for Multicast Routing in MobileCyclic Sensing MAC Protocol for Multicast Routing in Mobile
Cyclic Sensing MAC Protocol for Multicast Routing in Mobilessrgjournals
 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)IJMER
 
An Investigation of DAF Protocol in Wireless Communication
An Investigation of DAF Protocol in Wireless CommunicationAn Investigation of DAF Protocol in Wireless Communication
An Investigation of DAF Protocol in Wireless CommunicationIRJET Journal
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic NetworksAuwal Amshi
 
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...IJECEIAES
 

Similar to R44089799 (20)

Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
D0441722
D0441722D0441722
D0441722
 
G343741
G343741G343741
G343741
 
G343741
G343741G343741
G343741
 
As33259263
As33259263As33259263
As33259263
 
As33259263
As33259263As33259263
As33259263
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
F41023946
F41023946F41023946
F41023946
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
 
B03406010
B03406010B03406010
B03406010
 
Cyclic Sensing MAC Protocol for Multicast Routing in Mobile
Cyclic Sensing MAC Protocol for Multicast Routing in MobileCyclic Sensing MAC Protocol for Multicast Routing in Mobile
Cyclic Sensing MAC Protocol for Multicast Routing in Mobile
 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
 
An Investigation of DAF Protocol in Wireless Communication
An Investigation of DAF Protocol in Wireless CommunicationAn Investigation of DAF Protocol in Wireless Communication
An Investigation of DAF Protocol in Wireless Communication
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
 
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

R44089799

  • 1. Archana S. Chitte et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.97-99 www.ijera.com 97 | P a g e Reducing Collision In Multipacket Transfer And Receiver Using Token Passing Techniques In Wireless Ad Hoc Network P. P. Rewagad*, Archana S. Chitte* *GUIDE (Department of Computer Science and Enginnering, North Maharashtra University, Jalgaon) ** ME SCHOLAR (Department of Computer Science and Enginnering, North Maharashtra University, Jalgaon) Abstract Transmitting and Receiving the multiple packet on a single channel through a route node is very critical task. There may be a collision between more than one routes. One route node can send and receive the data to the two routes. It may generate a collision and may be the data exchange between more than one routes. That’s why, we used here a token passing technique and time interval for successful transmission. The theoretical analysis show the total scenario and reduce the collision between routes. Keywords— Token passing, Time slots, transfer/receive packets , MANET I. Introduction A day by day the uses of internet increases whether it is wired or wireless. The goal of internet uses is to less effort for physical connection and faster communication. That’s why, user chooses wireless communication than wired. Now a days, wireless ad hoc network is very popular because of its structures. The wireless ad hoc network does not required any pre-infrastructures.[14] That’s why it is mostly used in tactical field, battle field where secret message communication is more important without pre-establishing infrastructure for internet. In mobile ad hoc neteork, all the nodes are wireless, they can communicate with each other using self confuring route nodes. [14]That’s why, it is very preference able. The node i.e. source node want to communicate with other node i.e. destination node. The source node has to discover the the route nodes. There are many protocols available like DSR, DSDV, AODV etc.[14] when source node want to communicate with destination node he has to know the information about neighbor node. Also, source node has to count the hops that means the source node can select minimum hop count for communication[9]. There are many nodes available in routes. After selecting the route nodes using any route finding protocols, one node may be a route node of more than one route.[5] There may be a collision between neighbor discovery and communication between more than one source-destination nodes. The following fig. shows the collision between neighbour available for routes. Fig.1 Multipacket Transfer/Receive at the same node The above fig. shows the problem for multipacket transfer/ receiver. There are two source nodes nd two destination node. They has to communicate with each other. Node7 is a route node of two routes. When both routes nodes want to to communicate taking account of node7 at that time, there is a collision may occur which route first give the response and keep the routes information to securely send the message to particular routes. To avoid this collision, we used a token passing[2][6]. II. NETWORK MODEL AND AUUMPTIONS MANET is a self configuring network. In which aource node decides route nodes itself. The source node broead cast the route request to the nodes which are in a radio range with its MAC address.[14] The route node which are free, they accept the request , add its MAC address and forward the route request RESEARCH ARTICLE OPEN ACCESS
  • 2. Archana S. Chitte et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.97-99 www.ijera.com 98 | P a g e to its neighbor still they don’t have find out the destination node. At the destination node, the MAC address will check , if the MAC address is correct sending by source node, it means it is reached to destination node. Then the destination node sends the acknowledgement to source node through route nodes. This is the simplest way for communication. If there may problem occur like collision which is describes in Fib1. To solve this problem, we give the solution. Theoretically we prove the collision problem will solve. Here we introduce the network model and several Assumptions, under which we will present the token passing technic and and corresponding analysis.[2]  Each node has a unique MAC address  All nodes are in a same or different radio range.  Nodes use bidirectional antennas  Nodes can transmit and receive on the same channel simultaneously. A. Using Token When one node is a route node of two routes, there may may be collision occur. That’s why, we used here token. Fig.2 Token Slot Here, we used 1bit for token. This token is generated by source ode with unique number. This number is decided by source node . when the source node will broadcast the route request message. Then source node sends the token also with that message. The route node also having a 1bit stored that unique token number for temporary upto the communication will not be finished. This token bit is used for temporary. After completing communication. The node may delete that token number. Now if the source node want to become an another route of node, the same procedure will follow. The route node can divide that bit slots into sub slots and stored the another sources unique token number. Here we are giving suggestion only for two routes. If we increase the routes for communication, these may be more memory space is required and there is a costly. That’s why, a single bit can divide into subslots only two subslots. Algorithm: Token passing 1: Source node add unique number as a token. 2: Source node broadcast the route request with token and monitor channel. 3: if it has already two route request, the request will discard. 4: if route node is free accept the request. 5: Add the sequence number and ID to route request message. 6: Forward the route request message. 8: If destination node is found, the destination node sends the acknowledgement to source node. B. Time Interval After circulation of token, the route node having a unique token of every separate routes source and destination node. The route node has two token now there is confusion between which route node has to give the response. Then every node has to add a slot i.e. time interval slot[15] . Fig. 3 Time Sub Slot To avoid the collision between two routes. The node has assign a time slot. For first time slot, the route node give the response to the first node. After completion of time interval to route node gives the response to other route. It means, it can reduce the collision. Discussion Here, we discussed some issues related to token passing and time interval and their corresponding analysis results. 1)Multiple nodes may be route node of more than one routes Here, we discuss the situation when n number of nodes within the route having a multiple routes to communication.[10] At this situation, there may be more time required for transmission. To solve this problem, we decide the only two token slots assign to nodes. Means they can only route nodes of two route. Also proving a time interval. If within timeslot the source node doesn’t get the reply from destination node, the source node again repeat the steps from route request. III. RELATED WORK There are many researchers has focused on securely transmission in a MANET without occurring a collision between them and the node can transmit and receive the message from a single channel[9][10]. Vasudevan sl at[1] later pointed out that the expected time slots needed to finish the neighbor discovery process by using birthday protocols in[3] is neHn, where Hn is the nth harmonie number. The authors also proposed protocols for more realistic situations, where the size of a clique is unknown to nodes a feedback mechanism is introduced into the system and the clocks of nodes are not identical. Navneet malpani[2] discuss the token circulation in MANET. In which the authors decide a
  • 3. Archana S. Chitte et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.97-99 www.ijera.com 99 | P a g e token and circulate to the route node for successful communication with every node. With the development of MPR[6] Zeng et al[4] extended the result of [3] to the MPR situation where no collision occurs if and only if there are no more than k(K≥2) nodes simultaneously time needed to discover all nodes. IV. CONCLUSION In this paper, we proposed a token passing techniques by adding a time slot into every nodes before going to start communication. First we add a bit slot for dtoring a unique token ID created by source node. Further more, we add time slot. According to time slot, the route node can transmit and receive the message at a single channel. This aadition of time slot, it may reduce the collision in Neighbour Discovery and secured communication without collision. References [1] M. J. McGlynn and S. A. Borbash, ―Birthday protocols for low energy deployment and flexible neighbor discovery in ad hoc wireless networks,‖ in Proc. ACM MobiHoc, 2001, pp. 137–145. [2] Navneet Malpani, Yu Chen, Nitin H. Vaidya, Senior Member,‖Distributed Token Circulation in Mobile Ad Hoc Networks‖, in IEEE transaction,s on Mobile Computing, 2005 [3] S. Vasudevan, D. Towsley, D. Goeckel, and R. Khalili, ―Neighbor discovery in wireless networks and the coupon collector’s problem,‖ in Proc. ACM MobiCom, 2009, pp. 181–192. [4] W. Zeng, X. Chen, A. Russell, S. Vasudevan, B. Wang, and W. Wei, ―Neighbor discovery in wireless networks with multipacket reception,‖ in Proc. ACM MobiHoc, 2011, p. 3. [5] R. Motwani and P. Raghavan, Randomized Algorithms. Cambridge, U.K.: Cambridge Univ. Press, 1995. [6] J. Jeon and A. Ephremides, ―Neighbor discovery in a wireless sensor network: Multipacket reception capability and physical-layer signal processing,‖ in Proc. 48th Annu. Allerton Conf. Commun., Control, Comput., 2010, pp. 310–317. [7] J. I. Choi, M. Jain, K. Srinivasan, P. Levis, and S. Katti, ―Achieving single channel, full duplex wireless communication,‖ in Proc. ACM MobiCom, 2010, pp. 1–12. [8] M. Jain, J. I. Choi, T. M. Kim, D. Bharadia, S. Seth, K. Srinivasan, P. Levis, S. Katti, and P. Sinha, ―Practical, real-time, full duplex wireless,‖ in Proc. ACM MobiCom, 2011, pp. 301–312. [9] Z. Zhang and B. Li, ―Neighbor discovery in mobile ad hoc self configuring networks with directional antennas:Algorithms and comparisons,‖ IEEE Trans. Wireless Commun., vol. 7, no. 5, pp. 1540–1549, May 2008. [10] L. You, X. Zhu, and G. Chen, ―Neighbor discovery in peer-to-peer wireless networks with multi-channel MPR capability,‖ in Proc. IEEE ICC, 2012, pp. 4975–4979. [11] Y. Wang, G. Pan, and Z. Huang, ―Direct multi-hop time synchronization with constructive interference,‖ in Proc. IPSN, 2012, pp. 115–116. [12] L. Venturino, X. Wang, M. Lops, ‖Multiuser detection for cooperative networks and performance analysis ‖, IEEE Transaction on Signal Processing, Vol. 54, Issue 9, pp. 3315–3329, September 2006. [13] S. Vasudevan, J. Kurose, D. Towsley, ‖On neighbor discovery in wireless networks with directional antennas‖, INFOCOM 2005, Vol. 4, pp. 2502–2512, March 2005. S. Verd´u, Multiuser Detection, Cambridge University Press, 1998. [14] Magnus Frodish, Rer Johnson and Peter Larson,‖Wireless Ad Hoc Networking-The art of Networking without a network, in Ericsson Review No.4, 2000. [15] Guobao Sun, Fan Wu, Xiaofeng Gao, Wei Wang,‖Time-Efficient Protocols for Neighbour Discovery in Wireless Ad Hoc Networks‖,IEEE Transaction on Vehicular Technology, Vol.62,No.6,July 2013.