SlideShare a Scribd company logo
1 of 11
Download to read offline
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 57
e-ISSN: 2349-9745
p-ISSN: 2393-8161
ANovelMessageDrivenLocalRepairAlgorithmforMANET
A.E.NARAYANAN1
,A.VINCENTJEYAKUMAR2
1,2
PeriyarManiammaiUniversity,Thanjavur,Tamilnadu,613403
Abstract
Mostly MANET is used for emergency situation like disaster management which has the task of
supplying QoS in an effort to provide the right information to the right place at the right time. In this
scenario with the capability to send and receive reliable real-time video and voice packets, the involved
network must be able to provide a certain level of QoS. So thet the QoS impact in the face of network
failures must be minimized in MANET like temporary emergency networks..In such a situation,when
an intermediate node fails the network has no built in protocol to respond to this link breakage, the
connection will have to be rerouted from the source and QoS will have to be re-established. This global
fault-tolerance method means the source will have to recomputed and renegotiate a new QoS path
which, depending on the network size, could be costly in terms of computation and communication
time necessary for path negotiation (negotiation includes implementation of the new path). In contra ,
the proposed fault-tolerant algorithm makes it possible for the Intermediate nodes to efficiently repair
the failed connection locally and reroute the packets to the destination.
Keywords:Quality of service(QoS) , Fault tolerant routing ,message driven
I. Introduction
Over the decades, the use of personnal communication devices like mobile phones, personal digital
assistants(PDAs) and mobile computers have taken an exponential growth. This tendency is reinforced
when the cost of these small devices are reduced and further equipped with one or more wireless
interfaces. The wireless interfaces allow the devices to get connected with the
access points available in various location such as air ports, railway stations, restaurants, city centers
etc.. At the same time, they also enable the devices to interconnect directly with each other in a
decentralized way and self-organize into “Ad Hoc Networks. During the situation of natural calamity,
when the fixed infrastructure networks damaged , for the disaster management and mitigation the
MANET is very much relied upon.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 58
The fault tolerant approach is used in possibly prevent the malfunctioning node will affect the overall
task of the network. Fault tolerance is used to enhance system reliability. It may be of different types as
follows:
a. Fault tolerance in Node Failures
b. Fault tolerance in Link failure and Network Failure
c. Fault tolerance in Transmission Power and Energy
d. Fault tolerance using check-pointing, message logging, reducing overload etc.
II.Fault-tolerance in QoS Ad Hoc Networks
Chen and Nahrstedt [26] propose fault-tolerance techniques in an effort to reduce the impact on QoS
disruptions due to link failures caused by network dynamics. It is important to note that Chen and
Nahrstedt only consider applications which do not require hard guarantees. “Soft QoS means that there
may exist transient time periods when the required QoS is not guaranteed due to path breaking or
network partition” [26]. Further, Chen and Nahrstedt state that many multimedia applications accept
soft QoS and use adaptation techniques to reduce the level of QoS disruption [6], [15], [28]. One
technique presented is to repair the broken path at the node failed by shifting the traffic over to a
neighboring node and then routing around the breaking point. This method avoids the costly process of
rerouting the traffic from the source.
The second technique involves using a multilevel path redundancy scheme. The idea is to establish
multiple paths for the same connection. The First-Level Redundancy sends all data along all paths
independently. independently. This redundancy level is used for ‘critical’ QoS connections. The
Second-Level Redundancy sends data along only the primary path and uses any secondary paths only in
the event that the primary path is lost. This redundancy level is used for QoS connections which can
tolerate a certain degree of QoS failure. The Third-Level Redundancy is similar to the second level
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 59
except the secondary paths are not reserved; only calculated. If a failure should occur, an attempt will
be made to reserve the secondary path. The first technique, the repair algorithm, is proposed as the
single approach to the following cases:
1) The source moves out of range of the first intermediate node in the path
2) An intermediate node moves out of range of either a preceding or successive
node (preceding node is on the source’s side of the intermediate node, successive is on the destination’s
side of the intermediate node)
3) The destination moves out of range of its preceding node (preceding node is
the last intermediate node before the destination)
4) Any node in the path leaves the network
When case 2 occurs, the preceding node broadcasts a repair-requesting message to all its neighbors
asking if any of them are able to take over the job of the defunct intermediate node. The neighbors that
have links to the successive node reply their resource availabilities to the preceding node. If, based on
the replies, the preceding node finds node i has sufficient resources for that role, it adds the link from
itself to node i to the routing path and then sends i a path-repairing message. When i receives the path
Fig 2.Clustered ad hoc network
repairing message, it reserves the required resources and adds the link from itself to the successive
node to the routing path. Once the path has been repaired, a path-validation message is generated to
insure that the repaired path does not violate any of the end-to end requirements. The path-validation
message is sent to the destination which then sends the message to the source. The source then checks
to see if the end-to-end requirements have been violated. If they have, the source will reroute the traffic
or some QoS negotiation will take place with the user application. The performance metric used during
simulation of the repair algorithm is the QoS ratio, defined as:
Total QoS time
QoS ratio= _____________________
Total QoS time+ best-effort time
Where best-effort time is defined as the amount of time spent repairing the brokenpath. The x-axis is
the mobility ratio, defined as:
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 60
total moving time
Mobility ratio =__________________________
total stationary time+ total moving time
The simulation results provided include a single graph which shows for a mobility ratio of less than
10%, the QoS ratio is above 95%. As expected, the QoS ratio decreases as the mobility ratio increases.
For a mobility ratio more than 35%, the QoS ratio is below 80%. The conclusion is that Chen and
Nahrstedt’s routing algorithm should not be used in networks with high node mobility.
III. Proposed local repair algorithm
An intermediate (I) node is any node that supports a Quality of Services (QoS) connection. A
defunct (D) node is a cluster node that previously was an I node; but has either moved out range or has
failed. A gateway node (GWN) is defined as a cluster node which is used to communicate with a
neighbor cluster. A potential GWN (P-GWN) is a node which has the ability to communicate with the
same neighbor cluster as the current GWN. But it is only used in the event that the current GWN
becomes a defunct node. As an example, in the following n3 is a P-GWN since it can communicate
with n1 and the current GWN is n4 since it is currently communicating with n1. A cluster-head (CH) is
a cluster node which has the responsibility of monitoring and updating a cluster table which records all
QoS connections currently supported by the cluster. The CH is also responsible for initiating QoS
connection repairs. A CH can also be a GWN. An ordinary node is a node that is neither a CH nor a
GWN. In figure 2 n0 be the source, n10 the destination and P the QoS path. Each node i in P has a
successive node except n10. Further, each node i in P has a preceding node except n0.
3.1 Situations for path breakage:
Ordinary I node moves out of range of a successor I node in the cluster (i.e., n5 moves out of range of
n7)
1) Ordinary I node moves out of range of a predecessor I in the cluster (i.e., n5 moves out of range
of n4)
2) I GWN moves out of range of a successor I node in the cluster (i.e., n4 moves out of range of
n5)
3) I GWN moves out of range of a predecessor I node in the cluster (i.e., n7 moves out of range of
n5)
4) I GWN moves out of range of a successor I GWN in the cluster (i.e., if n4 were connected to n7
and n4 moves out of range of n7)
5) I GWN moves out of range of a predecessor I GWN in the cluster (i.e., if n4 were connected to
n7 and n7 moves out of range of n4)
6) I GWN moves out of range of a successor GWN in the cluster (i.e., n7 moves out of range of
n9)
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 61
7) I GWN moves out of range of a predecessor GWN in the cluster (i.e., n4 moves out of range of
n1)
8) I CH moves out of range of a successor or predecessor I node in the cluster (i.e., if P were such
that n8 had n4 as a predecessor node and n7 as a successor node and n8 moved out of range of
either node)
3.2 Assumptions:
• All nodes have a unique identifier
• Two nodes can be cluster members of the same cluster if and only if their Euclidean
distance is ≤30m (approximate range of 802.11g)
• Nodes signal their presence via a periodic beacon message and the drifting in of a new
node is realized when its new neighbors hear its beacon.
• When a node does not hear signals from a known neighbor within a certain amount of
time, it assumes the neighbor to be either “dead” or out of range due to mobility
• Determining a node has failed or moved out of range will prompt the corresponding
procedure
• All nodes have a single larger bandwidth interface (eg., FSO transceiver, directional RF
transceiver, etc.) for each node they can communicate with via 802.11 ( the link state
data is based on this link)
All procedures are atomic expect the Route_traffic (u) procedure and the procedures excepted
for receipt of the PATH (v.rsrcs, dst) and CTS (u) messages. Order to discuss the relevant
features of EECHSFT, it is assumed that, all gateway nodes in the network have path routing
table entries for all network destinations. Also it is assumed that is assumed that the associated
applications using this QoS network have soft QoS constraints and use adaptive techniques to
help minimize QoS disruptions. Combinatorial stability is also adopted. Further, with this
model, nodes have the ability to send and receive 802.11 best-effort traffic while sending and
receiving QoS traffic along larger bandwidth, directional links. Finally, resources allocated for
a QoS connection are de-allocated after a specified period of inactivity
3.3 Messages:
A node v uses message CH (v) to communicate with its neighbors, when it intends be a cluster-head.
To become a part of cluster u node v will sent a message JOIN (v,u), to communicate to its neighbors.
To require the resignation of any receiving cluster heads with weight ≤ w RESIGN (w) message is
used. Source v uses PATH (v.rsrcs,dst) message to request each node u along the path of a new
potential QoS connection to destination dst. The CTS (u) message is sent by destination v back to
source u along the initialized path to finalize the resource allocations. The information about
supported connections (v.NT), as well as the available resources (v.AT), of node v to the cluster-head
will be sent by using PMETS (v.NT, v.AT, Cluster-head). The cluster node’s QoS table is updated by
broadcasting message CLSTR_PMTS_UPDT (v, CT) at regular intervals. The cluster head sends
message REPAIR (ConnexPmets (p), v, Cluster-head) to notify node v to restore a connection using
the information in the ConnexPmets (p) table. After the failed link has been repaired, to ensure the
end-to-end QoS constraints sustainability QOS_VALID (u, v) is sent. The source u will initialize a
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 62
QoS validation message once LINK_REPAIRED (failed_node, v, u) message is received from the
node that is new to the path v. When the attempts of v to repair the failure, fails REPAIR_FAILURE
(v, Cluster-head) message is sent. When the failed connection supporting path p could not be repaired
a message FAILED_CONNEX (failed_node, p, v) is sent to source v of source v of QoS path v. In
different clusters gateways are created using HELLO (u, Cluster-head, Init) through neighboring
nodes. Node u sends HELLO (u, Cluster-head, Init) message to receive HELLO (v, Cluster-head,
Reply) in a periodic intervals.
3.3 Procedures for Fault Tolerence:
3.3.1 Node_failure Procedure
When node b knows the failure of node a, b checks, whether its role is cluster head and a was in its
cluster. If it is so, b removes a from cluster (b). In this situation, if a was a node which was supporting a
connection, cluster head b collects all cluster resources and all supported QoS traffic and decides the
possible QoS paths. Then all suitable cluster nodes are advised by node b to support the appropriate
QoS connection with the REPAIR message. If the cluster head determines an impossible situation, that
is the cluster resources currently available cannot support all QoS connections, the cluster head sends a
FAILED_CONNECT message to the sources, which are using the resources on the failed node and no
path changes made in the cluster. If node a was the cluster head, supporting a QoS connection, the new
cluster head will try to repair the fail connection of a if and only if, when it is an ordinary node with the
next weight Wb in descending order after Wa (ie.,϶ b | ∀z ϵ{ τ(b)-{a}}:wb>wz), then node b will be the
new cluster head and tries to fix the failed connection of a. When b is an ordinary cluster member node
and doesn’t have the next weight Wb after Wa, and a was the cluster head, node b will wait for a period
of time for the message CH(c) from node c, which possesses the next highest weight Wc. If the message
CH (c) is not received by node b, then b joins to the cluster head with highest weight and sends its NT
and AT to the new cluster head. The re-clustering process is invoked, when node b is not the new
cluster head. As the time needed for the re-clustering process will increase the time of the connection
recovery process, re-clustering is engaged in this situation. Since the combinatorial stability is already
assumed, when the cluster head fails, there will be a slight in the cluster. As the information of potential
cluster heads are announced through CT periodically, once a cluster head fails, other ordinary nodes wait
for a short period of time to receive the CH (b) message from the next new cluster head. The short
period is to manage propagation delay, processing delay and error. If the nodes don’t receive the ch(b)
message, with in the given time, they will decide their new roles.
3.3.2. New_link procedure:
When a new node ‘a’ is found by node ‘b’, it will check, whether a is a cluster head. If it is true and the weight
is higher than the current cluster-head of cluster (b), a will be cluster-head and b sends PMETS message to a.
In contrast, if b is the cluster-head and the member of its neighboring cluster-heads greater than b, the weight
of the cluster-head d that violates the k=0 condition is fixed. If Wb>Wd, then node d will receive RESIGN
message. If there is no cluster-heads such that Wb>Wd, b will no longer be a cluster-head and will join the
cluster-head with biggest weight. Then node b will send PMETS message to the new cluster-head
3.3.3 Route traffic (a) procedure:
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 63
The associated application will make aware source node b, the need to route the new traffic. Node b
verifies that its cluster members to see whether a is in this set of nodes. If a is within the cluster, the
available resources of a are obtained from CT table. If the necessary resources are available, they are
reserved and the traffic is sent. If the destination is not in the cluster, b forwards PATH (b, rsrcs,dst) to
the cluster gateway nodes.
IV. Result Discussion
The proposed message driven fault tolerant algorithm is tested in NS2 environment. The results are
discussed with the existing global fault tolerant algorithm FDCB inter interms of the important QoS
factors Throughput, Dropped packets, Recovery time.
The figure 3 shows that the recovery time of LRAFT is much better than the existing global technique.
The plot drawn between recovery time and failures per second. As this algorithm rectify in the
proximity
itself the time taken for recovery is very less.
Fig 3: Recovery Time Vs Failure Rate
Figure 4 shows the plot between the dropped packets and failure rate. The number of dropped packets
is high in FDCB.
0
1
2
3
4
0 10 20 30
RecoveryTime(seconds)
Failures Per Second
Recovery Time Vs Failure
Rate
LRAFT
FDCB
0
1000
2000
3000
0 10 20 30
NumberofDroppedPackets
Failure Rate
Dropped Packets Vs Failure
Rate
FDCB
LRAFT
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 64
Fig 4: Dropped Packets Vs Failure Rate
The throughput is an important QoS factor as this decides the performance of the network. The optimal
throughput can be calculated by dividing the realized throughput by throughput without failures.
LRAFT provides better optimal throughput as shown in the graph.
Percentage of optimal throughput =Realized throughput / Throughput without failures
0
0.2
0.4
0.6
0.8
1
1.2
0 10 20 30
PercentageofOptimalThroughput
Failure Rate
Percentage of Optimal
Throughput Vs Failure
Rate
LRAFT
FDCB
Fig 5: Optimal Throughput Vs Failure Rate
V. Conclusions
The important design characteristics of the fault tolerant algorithm is explaied . One of the main objective is
to employ a cluster head model to extenuate the link failures. In this algorithm the cluster head is made aware
of the present corroborated QoS connections in the cluster by applying a cluster state knowledge sharing
process. All cluster members of the cluster are also be shared the cluster state knowledge to support, when the
cluster head failures. As this Fault tolerance algorithm handles the connection failures locally, rather rerouting
the traffic from the source, which reduces the packet transmission delay. This fault tolerant approach dissent
from Chen and Nahrstedt’s work. In this work a clustered formulation is used that avert the disadvantages of
Chen and Nahrstedt’s repair algorithm . Esecially The limitation predecessor of the failed node is able to reach
the successor of the failed node. There for this fault tolerent protocol show an progressive solution for fault-
tolerance in MANET which support QoS.
As a summary this local repair method is more efficient thand than the global approach. This is ensured by
performance metrics evaluation and analysis.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 65
References
1. D. Maheshwari and A.Dhanalakshmi, "Fault tolerance in Mobile ad hoc Network: A Survey,"
International Journal of Advanced Research in Computer Science and Software Engineering,
Volume 3, Issue 3, March 2013.
2. Nargunam, A.S. and M.P. Sebastian. "Fully distributed cluster based routing architecture for
mobile ad hoc networks," Proceedings in the Wireless And Mobile Computing, Networking And
Communications (WiMob'2005), IEEE International Conference. 383-389. IEEE, 2005.
3. Ghosh, R. and S. Basagni, "Limiting the impact of mobility on ad hoc clustering,"Proceedings of
the 2nd ACM international workshop on Performance evaluationof wireless ad hoc, sensor, and
ubiquitous networks. 197-204, ACM Press: 2005.
4. The network simulator--ns-2. Version 2.29, Computer Software. Informaiton Sciences Institute,
Marina del Rey CA, 2006.
5. Yuan Xue and Klara Nahrstedt, "Fault tolerant routing in mobile ad hoc networks," IEEE wireless
communications and networking conference (WCNC), New Orleans, Louisiana, pp. 1174–1179,
March 2003.
6. Chen, S., Routing Support For Providing Guaranteed End-to-end Quality-of-Service, PhD
dissertation. University of Illinois: Urbana. 1999.
A Novel Message Driven Local Repair Algorithm for MANET
A Novel Message Driven Local Repair Algorithm for MANET

More Related Content

What's hot

IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETIMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETijcsa
 
Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorIRJET Journal
 
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET Journal
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
 
Security Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsSecurity Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsIJTET Journal
 
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...ijwmn
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...IEEEGLOBALSOFTTECHNOLOGIES
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...ijdpsjournal
 
An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...IAEME Publication
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)ijngnjournal
 
2011 & 2012 ieee projects
2011 & 2012 ieee projects2011 & 2012 ieee projects
2011 & 2012 ieee projectsColege Buz
 
08 6622 9059-1-pb
08 6622 9059-1-pb08 6622 9059-1-pb
08 6622 9059-1-pbIAESIJEECS
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
 
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 

What's hot (18)

IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETIMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
 
[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S
[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S
[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S
 
D0431013019
D0431013019D0431013019
D0431013019
 
Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulator
 
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
 
A2546035115
A2546035115A2546035115
A2546035115
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
 
Security Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsSecurity Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETs
 
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
 
B031201016019
B031201016019B031201016019
B031201016019
 
An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
 
2011 & 2012 ieee projects
2011 & 2012 ieee projects2011 & 2012 ieee projects
2011 & 2012 ieee projects
 
08 6622 9059-1-pb
08 6622 9059-1-pb08 6622 9059-1-pb
08 6622 9059-1-pb
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
 
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 

Viewers also liked

A Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsA Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsEditor IJMTER
 
Take the Plunge with OOP from #pnwphp
Take the Plunge with OOP from #pnwphpTake the Plunge with OOP from #pnwphp
Take the Plunge with OOP from #pnwphpAlena Holligan
 
Quiz maker
Quiz makerQuiz maker
Quiz makeradigowri
 
публичный доклад 2014 2015
публичный доклад 2014 2015публичный доклад 2014 2015
публичный доклад 2014 2015Maya_Chehova
 
herman olerid biografia
herman olerid biografia herman olerid biografia
herman olerid biografia 1221pablo
 
Prepositions
PrepositionsPrepositions
Prepositionshaque1971
 
The Affordable Care Act – Compliance Challenges for Employers
The Affordable Care Act – Compliance Challenges for EmployersThe Affordable Care Act – Compliance Challenges for Employers
The Affordable Care Act – Compliance Challenges for EmployersWinston & Strawn LLP
 
B2 book 10 - elisama -
B2   book 10 - elisama -B2   book 10 - elisama -
B2 book 10 - elisama -Gerson Moura
 
Automation augmentation-and-the-fifteen-hour-work-week
Automation augmentation-and-the-fifteen-hour-work-weekAutomation augmentation-and-the-fifteen-hour-work-week
Automation augmentation-and-the-fifteen-hour-work-weekJeremy Hayes
 
Who wil sing the song the 144000
Who wil sing the song the 144000Who wil sing the song the 144000
Who wil sing the song the 144000jb1955
 
Mathematical concepts applied to monetary systems in 20 slides
Mathematical concepts applied to monetary systems in 20 slidesMathematical concepts applied to monetary systems in 20 slides
Mathematical concepts applied to monetary systems in 20 slidesRakesh Kariholoo
 

Viewers also liked (19)

A Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsA Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition Systems
 
Take the Plunge with OOP from #pnwphp
Take the Plunge with OOP from #pnwphpTake the Plunge with OOP from #pnwphp
Take the Plunge with OOP from #pnwphp
 
Quiz maker
Quiz makerQuiz maker
Quiz maker
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
Utflykt till Kaknästornet av Ingemar Pongratz
Utflykt till Kaknästornet av Ingemar PongratzUtflykt till Kaknästornet av Ingemar Pongratz
Utflykt till Kaknästornet av Ingemar Pongratz
 
публичный доклад 2014 2015
публичный доклад 2014 2015публичный доклад 2014 2015
публичный доклад 2014 2015
 
Investseftonlinkedin222
Investseftonlinkedin222Investseftonlinkedin222
Investseftonlinkedin222
 
SYNERGY FX SIGNIFICANT INVESTOR VISA
SYNERGY FX  SIGNIFICANT INVESTOR VISASYNERGY FX  SIGNIFICANT INVESTOR VISA
SYNERGY FX SIGNIFICANT INVESTOR VISA
 
Ppt marriage 8
Ppt marriage 8Ppt marriage 8
Ppt marriage 8
 
Fall15, Module 3.2
Fall15, Module 3.2Fall15, Module 3.2
Fall15, Module 3.2
 
herman olerid biografia
herman olerid biografia herman olerid biografia
herman olerid biografia
 
Prepositions
PrepositionsPrepositions
Prepositions
 
Serenity Proximus
Serenity ProximusSerenity Proximus
Serenity Proximus
 
The Affordable Care Act – Compliance Challenges for Employers
The Affordable Care Act – Compliance Challenges for EmployersThe Affordable Care Act – Compliance Challenges for Employers
The Affordable Care Act – Compliance Challenges for Employers
 
B2 book 10 - elisama -
B2   book 10 - elisama -B2   book 10 - elisama -
B2 book 10 - elisama -
 
Automation augmentation-and-the-fifteen-hour-work-week
Automation augmentation-and-the-fifteen-hour-work-weekAutomation augmentation-and-the-fifteen-hour-work-week
Automation augmentation-and-the-fifteen-hour-work-week
 
On Attention & The Focused Life
On Attention & The Focused LifeOn Attention & The Focused Life
On Attention & The Focused Life
 
Who wil sing the song the 144000
Who wil sing the song the 144000Who wil sing the song the 144000
Who wil sing the song the 144000
 
Mathematical concepts applied to monetary systems in 20 slides
Mathematical concepts applied to monetary systems in 20 slidesMathematical concepts applied to monetary systems in 20 slides
Mathematical concepts applied to monetary systems in 20 slides
 

Similar to A Novel Message Driven Local Repair Algorithm for MANET

Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...ijiert bestjournal
 
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...cscpconf
 
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...ijasuc
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...IOSR Journals
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendeSAT Publishing House
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122IJRAT
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and linkIJCNCJournal
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...IJMER
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manetAlexander Decker
 
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc NetworkReview of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Networkijsrd.com
 
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...cscpconf
 
A fuzzy based congestion controller for control and balance congestion in gri...
A fuzzy based congestion controller for control and balance congestion in gri...A fuzzy based congestion controller for control and balance congestion in gri...
A fuzzy based congestion controller for control and balance congestion in gri...csandit
 
Performance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVPerformance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVIJERA Editor
 
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...IRJET Journal
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
 
Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...eSAT Publishing House
 
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS cscpconf
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...IRJET Journal
 

Similar to A Novel Message Driven Local Repair Algorithm for MANET (20)

Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
 
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
 
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defend
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet
 
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc NetworkReview of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
 
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
 
A fuzzy based congestion controller for control and balance congestion in gri...
A fuzzy based congestion controller for control and balance congestion in gri...A fuzzy based congestion controller for control and balance congestion in gri...
A fuzzy based congestion controller for control and balance congestion in gri...
 
Performance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVPerformance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODV
 
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...
 
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetEditor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSEditor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

Recently uploaded

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 

Recently uploaded (20)

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 

A Novel Message Driven Local Repair Algorithm for MANET

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 57 e-ISSN: 2349-9745 p-ISSN: 2393-8161 ANovelMessageDrivenLocalRepairAlgorithmforMANET A.E.NARAYANAN1 ,A.VINCENTJEYAKUMAR2 1,2 PeriyarManiammaiUniversity,Thanjavur,Tamilnadu,613403 Abstract Mostly MANET is used for emergency situation like disaster management which has the task of supplying QoS in an effort to provide the right information to the right place at the right time. In this scenario with the capability to send and receive reliable real-time video and voice packets, the involved network must be able to provide a certain level of QoS. So thet the QoS impact in the face of network failures must be minimized in MANET like temporary emergency networks..In such a situation,when an intermediate node fails the network has no built in protocol to respond to this link breakage, the connection will have to be rerouted from the source and QoS will have to be re-established. This global fault-tolerance method means the source will have to recomputed and renegotiate a new QoS path which, depending on the network size, could be costly in terms of computation and communication time necessary for path negotiation (negotiation includes implementation of the new path). In contra , the proposed fault-tolerant algorithm makes it possible for the Intermediate nodes to efficiently repair the failed connection locally and reroute the packets to the destination. Keywords:Quality of service(QoS) , Fault tolerant routing ,message driven I. Introduction Over the decades, the use of personnal communication devices like mobile phones, personal digital assistants(PDAs) and mobile computers have taken an exponential growth. This tendency is reinforced when the cost of these small devices are reduced and further equipped with one or more wireless interfaces. The wireless interfaces allow the devices to get connected with the access points available in various location such as air ports, railway stations, restaurants, city centers etc.. At the same time, they also enable the devices to interconnect directly with each other in a decentralized way and self-organize into “Ad Hoc Networks. During the situation of natural calamity, when the fixed infrastructure networks damaged , for the disaster management and mitigation the MANET is very much relied upon.
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 58 The fault tolerant approach is used in possibly prevent the malfunctioning node will affect the overall task of the network. Fault tolerance is used to enhance system reliability. It may be of different types as follows: a. Fault tolerance in Node Failures b. Fault tolerance in Link failure and Network Failure c. Fault tolerance in Transmission Power and Energy d. Fault tolerance using check-pointing, message logging, reducing overload etc. II.Fault-tolerance in QoS Ad Hoc Networks Chen and Nahrstedt [26] propose fault-tolerance techniques in an effort to reduce the impact on QoS disruptions due to link failures caused by network dynamics. It is important to note that Chen and Nahrstedt only consider applications which do not require hard guarantees. “Soft QoS means that there may exist transient time periods when the required QoS is not guaranteed due to path breaking or network partition” [26]. Further, Chen and Nahrstedt state that many multimedia applications accept soft QoS and use adaptation techniques to reduce the level of QoS disruption [6], [15], [28]. One technique presented is to repair the broken path at the node failed by shifting the traffic over to a neighboring node and then routing around the breaking point. This method avoids the costly process of rerouting the traffic from the source. The second technique involves using a multilevel path redundancy scheme. The idea is to establish multiple paths for the same connection. The First-Level Redundancy sends all data along all paths independently. independently. This redundancy level is used for ‘critical’ QoS connections. The Second-Level Redundancy sends data along only the primary path and uses any secondary paths only in the event that the primary path is lost. This redundancy level is used for QoS connections which can tolerate a certain degree of QoS failure. The Third-Level Redundancy is similar to the second level
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 59 except the secondary paths are not reserved; only calculated. If a failure should occur, an attempt will be made to reserve the secondary path. The first technique, the repair algorithm, is proposed as the single approach to the following cases: 1) The source moves out of range of the first intermediate node in the path 2) An intermediate node moves out of range of either a preceding or successive node (preceding node is on the source’s side of the intermediate node, successive is on the destination’s side of the intermediate node) 3) The destination moves out of range of its preceding node (preceding node is the last intermediate node before the destination) 4) Any node in the path leaves the network When case 2 occurs, the preceding node broadcasts a repair-requesting message to all its neighbors asking if any of them are able to take over the job of the defunct intermediate node. The neighbors that have links to the successive node reply their resource availabilities to the preceding node. If, based on the replies, the preceding node finds node i has sufficient resources for that role, it adds the link from itself to node i to the routing path and then sends i a path-repairing message. When i receives the path Fig 2.Clustered ad hoc network repairing message, it reserves the required resources and adds the link from itself to the successive node to the routing path. Once the path has been repaired, a path-validation message is generated to insure that the repaired path does not violate any of the end-to end requirements. The path-validation message is sent to the destination which then sends the message to the source. The source then checks to see if the end-to-end requirements have been violated. If they have, the source will reroute the traffic or some QoS negotiation will take place with the user application. The performance metric used during simulation of the repair algorithm is the QoS ratio, defined as: Total QoS time QoS ratio= _____________________ Total QoS time+ best-effort time Where best-effort time is defined as the amount of time spent repairing the brokenpath. The x-axis is the mobility ratio, defined as:
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 60 total moving time Mobility ratio =__________________________ total stationary time+ total moving time The simulation results provided include a single graph which shows for a mobility ratio of less than 10%, the QoS ratio is above 95%. As expected, the QoS ratio decreases as the mobility ratio increases. For a mobility ratio more than 35%, the QoS ratio is below 80%. The conclusion is that Chen and Nahrstedt’s routing algorithm should not be used in networks with high node mobility. III. Proposed local repair algorithm An intermediate (I) node is any node that supports a Quality of Services (QoS) connection. A defunct (D) node is a cluster node that previously was an I node; but has either moved out range or has failed. A gateway node (GWN) is defined as a cluster node which is used to communicate with a neighbor cluster. A potential GWN (P-GWN) is a node which has the ability to communicate with the same neighbor cluster as the current GWN. But it is only used in the event that the current GWN becomes a defunct node. As an example, in the following n3 is a P-GWN since it can communicate with n1 and the current GWN is n4 since it is currently communicating with n1. A cluster-head (CH) is a cluster node which has the responsibility of monitoring and updating a cluster table which records all QoS connections currently supported by the cluster. The CH is also responsible for initiating QoS connection repairs. A CH can also be a GWN. An ordinary node is a node that is neither a CH nor a GWN. In figure 2 n0 be the source, n10 the destination and P the QoS path. Each node i in P has a successive node except n10. Further, each node i in P has a preceding node except n0. 3.1 Situations for path breakage: Ordinary I node moves out of range of a successor I node in the cluster (i.e., n5 moves out of range of n7) 1) Ordinary I node moves out of range of a predecessor I in the cluster (i.e., n5 moves out of range of n4) 2) I GWN moves out of range of a successor I node in the cluster (i.e., n4 moves out of range of n5) 3) I GWN moves out of range of a predecessor I node in the cluster (i.e., n7 moves out of range of n5) 4) I GWN moves out of range of a successor I GWN in the cluster (i.e., if n4 were connected to n7 and n4 moves out of range of n7) 5) I GWN moves out of range of a predecessor I GWN in the cluster (i.e., if n4 were connected to n7 and n7 moves out of range of n4) 6) I GWN moves out of range of a successor GWN in the cluster (i.e., n7 moves out of range of n9)
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 61 7) I GWN moves out of range of a predecessor GWN in the cluster (i.e., n4 moves out of range of n1) 8) I CH moves out of range of a successor or predecessor I node in the cluster (i.e., if P were such that n8 had n4 as a predecessor node and n7 as a successor node and n8 moved out of range of either node) 3.2 Assumptions: • All nodes have a unique identifier • Two nodes can be cluster members of the same cluster if and only if their Euclidean distance is ≤30m (approximate range of 802.11g) • Nodes signal their presence via a periodic beacon message and the drifting in of a new node is realized when its new neighbors hear its beacon. • When a node does not hear signals from a known neighbor within a certain amount of time, it assumes the neighbor to be either “dead” or out of range due to mobility • Determining a node has failed or moved out of range will prompt the corresponding procedure • All nodes have a single larger bandwidth interface (eg., FSO transceiver, directional RF transceiver, etc.) for each node they can communicate with via 802.11 ( the link state data is based on this link) All procedures are atomic expect the Route_traffic (u) procedure and the procedures excepted for receipt of the PATH (v.rsrcs, dst) and CTS (u) messages. Order to discuss the relevant features of EECHSFT, it is assumed that, all gateway nodes in the network have path routing table entries for all network destinations. Also it is assumed that is assumed that the associated applications using this QoS network have soft QoS constraints and use adaptive techniques to help minimize QoS disruptions. Combinatorial stability is also adopted. Further, with this model, nodes have the ability to send and receive 802.11 best-effort traffic while sending and receiving QoS traffic along larger bandwidth, directional links. Finally, resources allocated for a QoS connection are de-allocated after a specified period of inactivity 3.3 Messages: A node v uses message CH (v) to communicate with its neighbors, when it intends be a cluster-head. To become a part of cluster u node v will sent a message JOIN (v,u), to communicate to its neighbors. To require the resignation of any receiving cluster heads with weight ≤ w RESIGN (w) message is used. Source v uses PATH (v.rsrcs,dst) message to request each node u along the path of a new potential QoS connection to destination dst. The CTS (u) message is sent by destination v back to source u along the initialized path to finalize the resource allocations. The information about supported connections (v.NT), as well as the available resources (v.AT), of node v to the cluster-head will be sent by using PMETS (v.NT, v.AT, Cluster-head). The cluster node’s QoS table is updated by broadcasting message CLSTR_PMTS_UPDT (v, CT) at regular intervals. The cluster head sends message REPAIR (ConnexPmets (p), v, Cluster-head) to notify node v to restore a connection using the information in the ConnexPmets (p) table. After the failed link has been repaired, to ensure the end-to-end QoS constraints sustainability QOS_VALID (u, v) is sent. The source u will initialize a
  • 6. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 62 QoS validation message once LINK_REPAIRED (failed_node, v, u) message is received from the node that is new to the path v. When the attempts of v to repair the failure, fails REPAIR_FAILURE (v, Cluster-head) message is sent. When the failed connection supporting path p could not be repaired a message FAILED_CONNEX (failed_node, p, v) is sent to source v of source v of QoS path v. In different clusters gateways are created using HELLO (u, Cluster-head, Init) through neighboring nodes. Node u sends HELLO (u, Cluster-head, Init) message to receive HELLO (v, Cluster-head, Reply) in a periodic intervals. 3.3 Procedures for Fault Tolerence: 3.3.1 Node_failure Procedure When node b knows the failure of node a, b checks, whether its role is cluster head and a was in its cluster. If it is so, b removes a from cluster (b). In this situation, if a was a node which was supporting a connection, cluster head b collects all cluster resources and all supported QoS traffic and decides the possible QoS paths. Then all suitable cluster nodes are advised by node b to support the appropriate QoS connection with the REPAIR message. If the cluster head determines an impossible situation, that is the cluster resources currently available cannot support all QoS connections, the cluster head sends a FAILED_CONNECT message to the sources, which are using the resources on the failed node and no path changes made in the cluster. If node a was the cluster head, supporting a QoS connection, the new cluster head will try to repair the fail connection of a if and only if, when it is an ordinary node with the next weight Wb in descending order after Wa (ie.,϶ b | ∀z ϵ{ τ(b)-{a}}:wb>wz), then node b will be the new cluster head and tries to fix the failed connection of a. When b is an ordinary cluster member node and doesn’t have the next weight Wb after Wa, and a was the cluster head, node b will wait for a period of time for the message CH(c) from node c, which possesses the next highest weight Wc. If the message CH (c) is not received by node b, then b joins to the cluster head with highest weight and sends its NT and AT to the new cluster head. The re-clustering process is invoked, when node b is not the new cluster head. As the time needed for the re-clustering process will increase the time of the connection recovery process, re-clustering is engaged in this situation. Since the combinatorial stability is already assumed, when the cluster head fails, there will be a slight in the cluster. As the information of potential cluster heads are announced through CT periodically, once a cluster head fails, other ordinary nodes wait for a short period of time to receive the CH (b) message from the next new cluster head. The short period is to manage propagation delay, processing delay and error. If the nodes don’t receive the ch(b) message, with in the given time, they will decide their new roles. 3.3.2. New_link procedure: When a new node ‘a’ is found by node ‘b’, it will check, whether a is a cluster head. If it is true and the weight is higher than the current cluster-head of cluster (b), a will be cluster-head and b sends PMETS message to a. In contrast, if b is the cluster-head and the member of its neighboring cluster-heads greater than b, the weight of the cluster-head d that violates the k=0 condition is fixed. If Wb>Wd, then node d will receive RESIGN message. If there is no cluster-heads such that Wb>Wd, b will no longer be a cluster-head and will join the cluster-head with biggest weight. Then node b will send PMETS message to the new cluster-head 3.3.3 Route traffic (a) procedure:
  • 7. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 63 The associated application will make aware source node b, the need to route the new traffic. Node b verifies that its cluster members to see whether a is in this set of nodes. If a is within the cluster, the available resources of a are obtained from CT table. If the necessary resources are available, they are reserved and the traffic is sent. If the destination is not in the cluster, b forwards PATH (b, rsrcs,dst) to the cluster gateway nodes. IV. Result Discussion The proposed message driven fault tolerant algorithm is tested in NS2 environment. The results are discussed with the existing global fault tolerant algorithm FDCB inter interms of the important QoS factors Throughput, Dropped packets, Recovery time. The figure 3 shows that the recovery time of LRAFT is much better than the existing global technique. The plot drawn between recovery time and failures per second. As this algorithm rectify in the proximity itself the time taken for recovery is very less. Fig 3: Recovery Time Vs Failure Rate Figure 4 shows the plot between the dropped packets and failure rate. The number of dropped packets is high in FDCB. 0 1 2 3 4 0 10 20 30 RecoveryTime(seconds) Failures Per Second Recovery Time Vs Failure Rate LRAFT FDCB 0 1000 2000 3000 0 10 20 30 NumberofDroppedPackets Failure Rate Dropped Packets Vs Failure Rate FDCB LRAFT
  • 8. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 64 Fig 4: Dropped Packets Vs Failure Rate The throughput is an important QoS factor as this decides the performance of the network. The optimal throughput can be calculated by dividing the realized throughput by throughput without failures. LRAFT provides better optimal throughput as shown in the graph. Percentage of optimal throughput =Realized throughput / Throughput without failures 0 0.2 0.4 0.6 0.8 1 1.2 0 10 20 30 PercentageofOptimalThroughput Failure Rate Percentage of Optimal Throughput Vs Failure Rate LRAFT FDCB Fig 5: Optimal Throughput Vs Failure Rate V. Conclusions The important design characteristics of the fault tolerant algorithm is explaied . One of the main objective is to employ a cluster head model to extenuate the link failures. In this algorithm the cluster head is made aware of the present corroborated QoS connections in the cluster by applying a cluster state knowledge sharing process. All cluster members of the cluster are also be shared the cluster state knowledge to support, when the cluster head failures. As this Fault tolerance algorithm handles the connection failures locally, rather rerouting the traffic from the source, which reduces the packet transmission delay. This fault tolerant approach dissent from Chen and Nahrstedt’s work. In this work a clustered formulation is used that avert the disadvantages of Chen and Nahrstedt’s repair algorithm . Esecially The limitation predecessor of the failed node is able to reach the successor of the failed node. There for this fault tolerent protocol show an progressive solution for fault- tolerance in MANET which support QoS. As a summary this local repair method is more efficient thand than the global approach. This is ensured by performance metrics evaluation and analysis.
  • 9. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 65 References 1. D. Maheshwari and A.Dhanalakshmi, "Fault tolerance in Mobile ad hoc Network: A Survey," International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 3, March 2013. 2. Nargunam, A.S. and M.P. Sebastian. "Fully distributed cluster based routing architecture for mobile ad hoc networks," Proceedings in the Wireless And Mobile Computing, Networking And Communications (WiMob'2005), IEEE International Conference. 383-389. IEEE, 2005. 3. Ghosh, R. and S. Basagni, "Limiting the impact of mobility on ad hoc clustering,"Proceedings of the 2nd ACM international workshop on Performance evaluationof wireless ad hoc, sensor, and ubiquitous networks. 197-204, ACM Press: 2005. 4. The network simulator--ns-2. Version 2.29, Computer Software. Informaiton Sciences Institute, Marina del Rey CA, 2006. 5. Yuan Xue and Klara Nahrstedt, "Fault tolerant routing in mobile ad hoc networks," IEEE wireless communications and networking conference (WCNC), New Orleans, Louisiana, pp. 1174–1179, March 2003. 6. Chen, S., Routing Support For Providing Guaranteed End-to-end Quality-of-Service, PhD dissertation. University of Illinois: Urbana. 1999.