SlideShare a Scribd company logo
A NEIGHBOR COVERAGE BASED
PROBABILISTIC REBROADCAST FOR
REDUCING ROUTING OVERHEAD IN
MOBILE AD-HOC NETWORK
ABHIRAM.S
ROLL NO :20181
MTECH COMM. ENGG
Add-Hoc Network
• It is a decentralized type of wireless network.
• It does not rely on a pre-existing infrastructure, such as routers in wired
networks or access points in wireless networks.
• The routing decisions are made by the node itself.
• Ad-hoc network can be broadly classified into MANET and VANET.
MANET
• mobile ad hoc network (MANET) is a self-routing network of mobile
devices connected wirelessly
• MANETs have many applications : such as
military communication,
in search and rescue operations,
in home and enterprise networks,
in entertainment,
and in sensor networks
ROUTING PROTOCOLS IN MANET
• There are number of routing protocols in manet such as AODV,DSDV,DSR
etc..
• The routing protocols in MANET is classified into four types
1) PROACTIVE ROUTING
2) REACTIVE ROUTING
3) HYBRID ROUTING
4) HIERARCHICAL ROUTING
REACTIVE ROUTING
• This protocol do not have any pre determined routing table, it is otherwise
called On Demand Routing Protocol
• Here node initiates a route discovery process throughout the network, only
when it wants to send packets to its destination.
• Route discovery is done by using flooding of route request packets
• Eg: AODV
BROADCASTING
• Broadcasting is the simplest way for route discovery
• Broadcasting protocols are classified into 4 types
1)Simple flooding
2)Probability based method
3)Area based method
4)Neighbor knowledge method
• Performance of
neighbor knowledge based method>area based method>probability based method
A NEIGHBOR COVERAGE BASED
PROBABILISTIC REBROADCAST(NCPR)
• NCPR is used to reduce routing overhead in mobile ad-hoc network.
• Here we use two parameter to obtain ‘rebroadcast probability’; they are
connectivity factor and additional coverage ratio.
• Additional coverage ratio=No. of nodes covered in a single broadcast/Total
number of neighbors
• Connectivity Factor: It gives the relationship of network connectivity &
number of neighbors of a given node
PROTOCOL IMPLEMENTATION
• Proposed NCPR requires hello packets to obtain neighbor information.
• Here we use some technique to reduce the routing overhead of hello packets.
1) We don't use periodic hello mechanism. The hello messages are send by
nodes if and only if
time elapsed from last broadcasting packet> hello interval
2)in order to reduce the overhead of neighbor list in the RREQ packet, each
node monitor the variation in neighbor table and maintain a cache of
neighbor list
• We modify the RREQ header of AODV and a fixed field “num_neighbors”
and this field is followed by dynamic neighbor list.
• If neighbor table of ‘ni’ adds at least one neighbor ‘nj’; then node ‘ni’ set the
num_neighbor to the number of listed neighbors plus a +ve integer.
• If neighbor table of ‘ni’ deletes some neighbors then the node ‘ni’ set the
num_neighbors to a –ve integer, which is equal and opposite to number of
deleted nodes
• If neighbor table of ‘ni’ does not vary then num_neigbors set to zero & ‘ni’
does not need to list its neighbors.
• LIST OF FILES THAT NEED TO BE MODIFIED
• ~/ns-allinone-2.35/ns-2.35/common/packet.h
• ~/ns-allinone-2.35/ns-2.35/trace/cmu-trace.h
• ~/ns-allinone-2.35/ns-2.35/trace/cmu-trace.cc
• ~/ns-allinone-2.35/ns-2.35/tcl/lib/ns-packet.tcl
• ~/ns-allinone-2.35/ns-2.35/tcl/lib/ns-default.tcl
• ~/ns-allinone-2.35/ns-2.35/tcl/lib/ns-lib.tcl
• ~/ns-allinone-2.35/ns-2.35/queue/priqueue.cc
SIMULATION TOOL AND PARAMETERS
• The simulation is done by using NETWORK SIMULATOR-2 (NS 2)
• The parameters of the scenario is given in the table shown below.
Parameter value
Simulator NS
Version 2.35
Protocol studied NCPR
Number of nodes 30 and 50
Simulation Time 60 sec
Simulation Area 2000x2000
Traffic Type UDP
Data Payload Bytes/packet
Bandwidth 600kbps
SIMULATION RESULTS
FUTURE WORKS
• Constant bit rate (CBR) NCPR protocol can be changed to variable bit rate
(VBR), in order to get better
1)Throughput
2)end to end delay
3)packet delivery ratio
REFERENCES
• Performance Analysis of MANET Routing Protocols Using An Elegant Visual Simulation Tool
Nazmus Saquib1, Md. Sabbir Rahman Sakib, and Al-Sakib Khan Pathan2Department of Electrical and Electronic
Engineering, BRAC University Department of Computer Science and Engineering, BRAC University66 Mohakhali, Dhaka
1212, Bangladesh{nsaquib, srsakib}@bracu.ac.bd, sakib.pathan@gmail.com
• Simulation and Evaluation of MANET Routing Protocols for Educational Purposes
Alexandros Kaponias, Anastasios Politis, and Constantinos Hilas, Department of Informatics and Communications T.E.I. of
Serres Serres, Greece pli1542@teiser.gr. anpol@teiser.gr, chilas@teiser.gr
• Performance analysis of AODV, DSR & TORA Routing Protocols
Anuj K. Gupta, Member, IACSIT, Dr. Harsh Sadawarti, Dr. Anil K. Verma
• A comprehensive overview about selected Ad-Hoc Networking Routing Protocols
Daniel Lang March 14, 2003
THANK YOU

More Related Content

What's hot

CA-Carrier Aggregation || LTRE Advance
CA-Carrier Aggregation || LTRE AdvanceCA-Carrier Aggregation || LTRE Advance
CA-Carrier Aggregation || LTRE Advance
ankur tomar
 
Managing Redundant Links & Inter-VLAN Routing
Managing Redundant Links & Inter-VLAN RoutingManaging Redundant Links & Inter-VLAN Routing
Managing Redundant Links & Inter-VLAN Routing
Sandeep Sharma IIMK Smart City,IoT,Bigdata,Cloud,BI,DW
 
Network's Type
Network's TypeNetwork's Type
Network's Type
Mohammed Sheikh Salem
 
Satellite link using 16 psk
Satellite link using 16 pskSatellite link using 16 psk
Satellite link using 16 psk
chintanajoshi
 
Offline SD SF Mapping
Offline SD SF MappingOffline SD SF Mapping
Offline SD SF Mapping
Jay Mehta
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7
Tutun Juhana
 
Wireless Sensor Network
Wireless Sensor Network Wireless Sensor Network
Wireless Sensor Network
Dr Praveen Jain
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area Network
Atakan ATAK
 
Dynamic Routing Protocol OSPF
Dynamic Routing Protocol OSPFDynamic Routing Protocol OSPF
Dynamic Routing Protocol OSPF
Atakan ATAK
 
Bluetooth
BluetoothBluetooth
EIGRP Project Report
EIGRP Project ReportEIGRP Project Report
EIGRP Project Report
Zahid Hasan Zinnah
 
Part 10 : Routing in IP networks and interdomain routing with BGP
Part 10 : Routing in IP networks and interdomain routing with BGPPart 10 : Routing in IP networks and interdomain routing with BGP
Part 10 : Routing in IP networks and interdomain routing with BGP
Olivier Bonaventure
 
Switch
SwitchSwitch
Gb over ip
Gb over ipGb over ip
Gb over ip
sriwijayamataram
 
Bss par
Bss parBss par
Synchronization of telecom network
Synchronization of telecom networkSynchronization of telecom network
Synchronization of telecom network
Deepak Kumar
 
Lecture#5 21 4-2013
Lecture#5 21 4-2013Lecture#5 21 4-2013
Lecture#5 21 4-2013
Muhammed Mustafa
 
OpenSDWN: Programmatic control over home and enterprise Wi-Fi
OpenSDWN: Programmatic control over home and enterprise Wi-FiOpenSDWN: Programmatic control over home and enterprise Wi-Fi
OpenSDWN: Programmatic control over home and enterprise Wi-Fi
Julius Schulz-Zander
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
assinha
 
ospf routing protocol
ospf routing protocolospf routing protocol
ospf routing protocol
Ameer Agel
 

What's hot (20)

CA-Carrier Aggregation || LTRE Advance
CA-Carrier Aggregation || LTRE AdvanceCA-Carrier Aggregation || LTRE Advance
CA-Carrier Aggregation || LTRE Advance
 
Managing Redundant Links & Inter-VLAN Routing
Managing Redundant Links & Inter-VLAN RoutingManaging Redundant Links & Inter-VLAN Routing
Managing Redundant Links & Inter-VLAN Routing
 
Network's Type
Network's TypeNetwork's Type
Network's Type
 
Satellite link using 16 psk
Satellite link using 16 pskSatellite link using 16 psk
Satellite link using 16 psk
 
Offline SD SF Mapping
Offline SD SF MappingOffline SD SF Mapping
Offline SD SF Mapping
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7
 
Wireless Sensor Network
Wireless Sensor Network Wireless Sensor Network
Wireless Sensor Network
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area Network
 
Dynamic Routing Protocol OSPF
Dynamic Routing Protocol OSPFDynamic Routing Protocol OSPF
Dynamic Routing Protocol OSPF
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
EIGRP Project Report
EIGRP Project ReportEIGRP Project Report
EIGRP Project Report
 
Part 10 : Routing in IP networks and interdomain routing with BGP
Part 10 : Routing in IP networks and interdomain routing with BGPPart 10 : Routing in IP networks and interdomain routing with BGP
Part 10 : Routing in IP networks and interdomain routing with BGP
 
Switch
SwitchSwitch
Switch
 
Gb over ip
Gb over ipGb over ip
Gb over ip
 
Bss par
Bss parBss par
Bss par
 
Synchronization of telecom network
Synchronization of telecom networkSynchronization of telecom network
Synchronization of telecom network
 
Lecture#5 21 4-2013
Lecture#5 21 4-2013Lecture#5 21 4-2013
Lecture#5 21 4-2013
 
OpenSDWN: Programmatic control over home and enterprise Wi-Fi
OpenSDWN: Programmatic control over home and enterprise Wi-FiOpenSDWN: Programmatic control over home and enterprise Wi-Fi
OpenSDWN: Programmatic control over home and enterprise Wi-Fi
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
 
ospf routing protocol
ospf routing protocolospf routing protocol
ospf routing protocol
 

Viewers also liked

A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
IJMER
 
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
JPINFOTECH JAYAPRAKASH
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
IOSR Journals
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
Sayed Chhattan Shah
 
Performance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackPerformance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attack
Mehedi
 
Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34
Shaikhul Islam Chowdhury
 

Viewers also liked (6)

A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Performance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackPerformance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attack
 
Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34
 

Similar to A neighbor coverage based probabilistic rebroadcast for reducing routing overhead in manet

A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingA comparative study of reactive and proactive routing
A comparative study of reactive and proactive routing
Abhiram Subhagan
 
Cloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptxCloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptx
RahulBhole12
 
Ultra sonic sensor network communicating using NRF 24L01 radio
Ultra sonic sensor network communicating using NRF 24L01 radioUltra sonic sensor network communicating using NRF 24L01 radio
Ultra sonic sensor network communicating using NRF 24L01 radio
Ashok Raj
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
Murtadha Alsabbagh
 
Network layer
Network layerNetwork layer
Network layer
TharuniDiddekunta
 
Globecom 2015: Adaptive Raptor Carousel for 802.11
Globecom 2015: Adaptive Raptor Carousel for 802.11Globecom 2015: Adaptive Raptor Carousel for 802.11
Globecom 2015: Adaptive Raptor Carousel for 802.11
Andrew Nix
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
Sourabh Goyal
 
Routed networks sydney
Routed networks sydneyRouted networks sydney
Routed networks sydney
Miguel Lavalle
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
ArunChokkalingam
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of network
jpstudcorner
 
Simulation Evaluation Algorithm of GSR in MANET.pptx
Simulation Evaluation Algorithm of GSR in MANET.pptxSimulation Evaluation Algorithm of GSR in MANET.pptx
Simulation Evaluation Algorithm of GSR in MANET.pptx
Sandeep Maurya
 
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewAttacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A Review
IRJET Journal
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
nooralleema
 
IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay ...
IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay ...IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay ...
IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay ...
IRJET Journal
 
Cross-Layer Design of Raptor Codes for Video Multicast over 802.11n MIMO Chan...
Cross-Layer Design of Raptor Codes for Video Multicast over 802.11n MIMO Chan...Cross-Layer Design of Raptor Codes for Video Multicast over 802.11n MIMO Chan...
Cross-Layer Design of Raptor Codes for Video Multicast over 802.11n MIMO Chan...
Berna Bulut
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.ppt
Tekle12
 
IP essentials
IP essentialsIP essentials
IP essentials
Luca Matteo Ruberto
 
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
IRJET Journal
 
Wcdma planning
Wcdma planningWcdma planning
Wcdma planning
Shantanu Mukherjee
 
H ip qo s for 3g
H ip qo s for 3gH ip qo s for 3g
H ip qo s for 3g
Socnho Kit
 

Similar to A neighbor coverage based probabilistic rebroadcast for reducing routing overhead in manet (20)

A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingA comparative study of reactive and proactive routing
A comparative study of reactive and proactive routing
 
Cloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptxCloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptx
 
Ultra sonic sensor network communicating using NRF 24L01 radio
Ultra sonic sensor network communicating using NRF 24L01 radioUltra sonic sensor network communicating using NRF 24L01 radio
Ultra sonic sensor network communicating using NRF 24L01 radio
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Network layer
Network layerNetwork layer
Network layer
 
Globecom 2015: Adaptive Raptor Carousel for 802.11
Globecom 2015: Adaptive Raptor Carousel for 802.11Globecom 2015: Adaptive Raptor Carousel for 802.11
Globecom 2015: Adaptive Raptor Carousel for 802.11
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Routed networks sydney
Routed networks sydneyRouted networks sydney
Routed networks sydney
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of network
 
Simulation Evaluation Algorithm of GSR in MANET.pptx
Simulation Evaluation Algorithm of GSR in MANET.pptxSimulation Evaluation Algorithm of GSR in MANET.pptx
Simulation Evaluation Algorithm of GSR in MANET.pptx
 
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewAttacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A Review
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
 
IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay ...
IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay ...IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay ...
IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay ...
 
Cross-Layer Design of Raptor Codes for Video Multicast over 802.11n MIMO Chan...
Cross-Layer Design of Raptor Codes for Video Multicast over 802.11n MIMO Chan...Cross-Layer Design of Raptor Codes for Video Multicast over 802.11n MIMO Chan...
Cross-Layer Design of Raptor Codes for Video Multicast over 802.11n MIMO Chan...
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.ppt
 
IP essentials
IP essentialsIP essentials
IP essentials
 
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
 
Wcdma planning
Wcdma planningWcdma planning
Wcdma planning
 
H ip qo s for 3g
H ip qo s for 3gH ip qo s for 3g
H ip qo s for 3g
 

Recently uploaded

Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 

Recently uploaded (20)

Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 

A neighbor coverage based probabilistic rebroadcast for reducing routing overhead in manet

  • 1. A NEIGHBOR COVERAGE BASED PROBABILISTIC REBROADCAST FOR REDUCING ROUTING OVERHEAD IN MOBILE AD-HOC NETWORK ABHIRAM.S ROLL NO :20181 MTECH COMM. ENGG
  • 2. Add-Hoc Network • It is a decentralized type of wireless network. • It does not rely on a pre-existing infrastructure, such as routers in wired networks or access points in wireless networks. • The routing decisions are made by the node itself. • Ad-hoc network can be broadly classified into MANET and VANET.
  • 3. MANET • mobile ad hoc network (MANET) is a self-routing network of mobile devices connected wirelessly • MANETs have many applications : such as military communication, in search and rescue operations, in home and enterprise networks, in entertainment, and in sensor networks
  • 4. ROUTING PROTOCOLS IN MANET • There are number of routing protocols in manet such as AODV,DSDV,DSR etc.. • The routing protocols in MANET is classified into four types 1) PROACTIVE ROUTING 2) REACTIVE ROUTING 3) HYBRID ROUTING 4) HIERARCHICAL ROUTING
  • 5. REACTIVE ROUTING • This protocol do not have any pre determined routing table, it is otherwise called On Demand Routing Protocol • Here node initiates a route discovery process throughout the network, only when it wants to send packets to its destination. • Route discovery is done by using flooding of route request packets • Eg: AODV
  • 6. BROADCASTING • Broadcasting is the simplest way for route discovery • Broadcasting protocols are classified into 4 types 1)Simple flooding 2)Probability based method 3)Area based method 4)Neighbor knowledge method • Performance of neighbor knowledge based method>area based method>probability based method
  • 7. A NEIGHBOR COVERAGE BASED PROBABILISTIC REBROADCAST(NCPR) • NCPR is used to reduce routing overhead in mobile ad-hoc network. • Here we use two parameter to obtain ‘rebroadcast probability’; they are connectivity factor and additional coverage ratio. • Additional coverage ratio=No. of nodes covered in a single broadcast/Total number of neighbors • Connectivity Factor: It gives the relationship of network connectivity & number of neighbors of a given node
  • 8. PROTOCOL IMPLEMENTATION • Proposed NCPR requires hello packets to obtain neighbor information. • Here we use some technique to reduce the routing overhead of hello packets. 1) We don't use periodic hello mechanism. The hello messages are send by nodes if and only if time elapsed from last broadcasting packet> hello interval 2)in order to reduce the overhead of neighbor list in the RREQ packet, each node monitor the variation in neighbor table and maintain a cache of neighbor list
  • 9. • We modify the RREQ header of AODV and a fixed field “num_neighbors” and this field is followed by dynamic neighbor list. • If neighbor table of ‘ni’ adds at least one neighbor ‘nj’; then node ‘ni’ set the num_neighbor to the number of listed neighbors plus a +ve integer. • If neighbor table of ‘ni’ deletes some neighbors then the node ‘ni’ set the num_neighbors to a –ve integer, which is equal and opposite to number of deleted nodes • If neighbor table of ‘ni’ does not vary then num_neigbors set to zero & ‘ni’ does not need to list its neighbors.
  • 10. • LIST OF FILES THAT NEED TO BE MODIFIED • ~/ns-allinone-2.35/ns-2.35/common/packet.h • ~/ns-allinone-2.35/ns-2.35/trace/cmu-trace.h • ~/ns-allinone-2.35/ns-2.35/trace/cmu-trace.cc • ~/ns-allinone-2.35/ns-2.35/tcl/lib/ns-packet.tcl • ~/ns-allinone-2.35/ns-2.35/tcl/lib/ns-default.tcl • ~/ns-allinone-2.35/ns-2.35/tcl/lib/ns-lib.tcl • ~/ns-allinone-2.35/ns-2.35/queue/priqueue.cc
  • 11. SIMULATION TOOL AND PARAMETERS • The simulation is done by using NETWORK SIMULATOR-2 (NS 2) • The parameters of the scenario is given in the table shown below. Parameter value Simulator NS Version 2.35 Protocol studied NCPR Number of nodes 30 and 50 Simulation Time 60 sec Simulation Area 2000x2000 Traffic Type UDP Data Payload Bytes/packet Bandwidth 600kbps
  • 13. FUTURE WORKS • Constant bit rate (CBR) NCPR protocol can be changed to variable bit rate (VBR), in order to get better 1)Throughput 2)end to end delay 3)packet delivery ratio
  • 14. REFERENCES • Performance Analysis of MANET Routing Protocols Using An Elegant Visual Simulation Tool Nazmus Saquib1, Md. Sabbir Rahman Sakib, and Al-Sakib Khan Pathan2Department of Electrical and Electronic Engineering, BRAC University Department of Computer Science and Engineering, BRAC University66 Mohakhali, Dhaka 1212, Bangladesh{nsaquib, srsakib}@bracu.ac.bd, sakib.pathan@gmail.com • Simulation and Evaluation of MANET Routing Protocols for Educational Purposes Alexandros Kaponias, Anastasios Politis, and Constantinos Hilas, Department of Informatics and Communications T.E.I. of Serres Serres, Greece pli1542@teiser.gr. anpol@teiser.gr, chilas@teiser.gr • Performance analysis of AODV, DSR & TORA Routing Protocols Anuj K. Gupta, Member, IACSIT, Dr. Harsh Sadawarti, Dr. Anil K. Verma • A comprehensive overview about selected Ad-Hoc Networking Routing Protocols Daniel Lang March 14, 2003