SlideShare a Scribd company logo
International Journal of Modern Trends in Engineering and
Research
www.ijmter.com
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 52
A Review of Ad hoc on demand distance vector routing and
proposed AR-AODV
Bhavana Gupta1
, Rajesh Tiwari2
, Vikas Jain3
1
Asst.Professor, Computer Science & Engg, CIST
2
Asst.Professor, Computer Science & Engg, CIST
3
Asst.Professor, Computer Science & Engg, CIST
Abstract: Mobile Ad-hoc networks are a key in the evolution of wireless networks. In mobile
ad hoc networks, there is no centralized infrastructure to monitor or allocate the resources
used by the mobile nodes. The absence of any central coordinator makes the routing a
complex one compared to cellular networks. The Ad hoc On Demand Distance Vector
(AODV) routing algorithm is a routing protocol designed for ad hoc mobile devices. AODV
uses an on demand approach for finding routes .A class of routing protocols called on-
demand protocols has recently found attention because of their low routing overhead. The on-
demand protocols depend on query floods to discover routes whenever a new route is needed.
Such floods take up a substantial portion of network bandwidth. The routing in Mobile ad hoc
network is difficult and number of reactive routing protocols like AODV, DSR, and DSDV
has been implemented. In this paper, an attempt has been made to thoroughly study all
AODVs and a new AODV is proposed called AR-AODV
Keywords: Mobile Ad hoc Network, Reactive, AODV, DSR, DSDV.
I. INTRODUCTION
A Mobile Ad hoc network consists of auto configuring node and these nodes
communicate with each other via wireless equipment. Mobile nodes create a network on their
own. Network topology change invariably and no condensed monitoring is there. Each node
participating in the network can acts both as host and a router with willingness to forward
packets for the others.
Routing protocol in Ad hoc networks has received wide interest in the past year due to
the fact that existing internet routing protocol were designed to support fixed infrastructure
and their properties are unsuitable for mobile ad hoc networks, the up to date standardized
protocols are classified into three major categories based on the routing information update
mechanism.
1. Proactive or table driven routing protocols: In this, each node maintains the network
topology information in the form of routing tables by periodically exchanging routing
information. Routing information is generally flooded in the whole network. Whenever a
node needs a route to the destination it runs an appropriate path finding algorithm on the
topology information it maintains.
2. Reactive or on demand routing protocols: Such protocols do not maintain the network
topology information. They obtain the necessary route when it is required, by using a
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 53
connection establishment process. Hence these protocols do not exchange routing
information periodically.
3. Hybrid routing protocols: These protocols combine the best features of the above two
categories. Nodes with a certain distance from the source node concerned or within a
particular geographical region are said to be within the routing zone of the given node. For
routing within this zone, a table-driven approach is used. For nodes located beyond this zone,
an on-demand approach is used. We focus our study on on-demand routing protocols.
Reactive protocols, such as DSR [1] and AODV [2], find route only when there is data to be
transmitted and as a result, generate low control traffic and routing overhead. Proactive
protocols on the other hand, find path in advance for all the source and destination pairs and
periodically exchange topology information to maintain them.
1.1 AODV (Ad hoc on demand distance vector routing)
AODV is a reactive routing protocol that minimizes the number of broadcasts by creating
routes on demand. Routes are discovered through a route discovery cycle, whereby the
network nodes are queried in search of a route to the destination node. When a node with a
route to the destination is discovered, that route is reported back to the source node that
requested the route.
In this paper, we proposed modifications to AODV called AR-AODV works in case of when
mobility increases and nodes are unreachable or traffic on that route occurs. The
conservative nature of proposed protocol helps to find new routes in case of high mobility
and network congestion, while at the same time maintaining good performance in application
oriented metrics such as delay and varying network load. In the first part of work, survey is
done on AODV. In the second part small modification is done in AODV Algorithm called
AR-AODV.Section II provides a brief description of the analysis of existing AODV. Section
III defines the Proposed Method. The Section IV concludes the paper.
II. RELATED WORK
To enhance the performance of routing protocols in MANET, a lot of approaches have been
presented so far. The approaches can be mainly classified into two groups: Reliability based
approaches efficiency and security based approaches.
Many Existing researchers proposed AODV using the concept of reliable distance,
distance vector, source routing approach and link-disjoint multipath routing approach. Some
rely on path accumulation during the route discovery process.
Perkins and Royer (1999) shown that AODV is based on a traditional distance vector
routing mechanism, where the route is determined on a hop-by-hop basis [1]. The route is
established by leaving a backward route to the source at intermediate nodes when
propagating RREQ messages and by leaving a forward route to the destination at
intermediate nodes when relaying the RREP message to the source.
Das et. al. (2001) compared performance of DSR and AODV, two prominent on-
demand routing protocols for ad hoc networks [2]. Their performance comparisons are
analyzed using varying network load, mobility and network size. They showed that the
results DSR generates less routing load than AODV. In case of smaller number of nodes and
lower load and/or mobility DSR performs better. And in case of more load and higher
mobility AODV do better than DSR.
Mesut Gunes et. al. (2002) presented the approach that is based on swarm intelligence
and especially on the ant colony optimization meta-heuristic. These fascinating families of
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 54
algorithms try to apply the ability of swarms to mathematical problems and were applied
successfully to several optimization problems in [3].
Gwalani and Belding-Royer (2003) presented a new approach of AODV-PA [4]
incorporates path accumulation during the route discovery process in AODV to attain extra
routing information. And it scales better in the large networks It is evident from the results
that AODV-PA improves the performance of AODV under conditions of high load and
moderate to high mobility. AODV-PA can be used either as an alternative to AODV or as an
optimization under moderate to high load scenarios.
Chonggun Kim, Elmurod Talipov, and Byoungchul Ahn (2006) [5] propose a reverse
AODV which tries multiple route replies. It reduces path fail correction messages and obtains
better performance than the AODV. According to them Successful delivery of RREP
messages are important in on-demand routing protocols for ad hoc networks. The loss of
RREPs causes serious impairment on the routing performance. This is because the cost of a
RREP is very high. If the RREP is lost, a large amount of route discovery effort will be
wasted. Furthermore, the source node has to initiate another round of route discovery to
establish a route to the destination.
Qiang and Hongbo (2008) propose an optimized AODV (OAODV) [6] using the
concept of reliable distance which is always smaller than transmission range, is depended on
the nodes velocity and direction information. The new protocol restricts the region of
flooding RREQ in route discovery process. They show that by their mechanism the routes are
more reliable. They had also compared the performance of their algorithm with existing
AODV.
Zahary and Ayesh (2008) presented the concept of ORMAD [7] in which is a link-
disjoint multipath routing approach in MANETs it tries to optimize routing overhead of both
Route Discovery Process (RDP) and Route Maintenance Process (RMP) of multipath
extension to AODV. When detecting a link failure in the primary route, ORMAD invokes a
local repair procedure between the upstream and the downstream nodes of the broken link.
For route efficiency and minimization of routing overhead it applies RMP to only efficient
route.
III. PROPOSED METHOD
a. AR-AODV (Alternate Route Ad hoc on demand distance vector routing)
AR-AODV is a reactive routing protocol. The route discovery (Route Request and
Route Reply) process of AR-AODV is similar to the AODV protocol. We slightly change the
AODV protocol by establishing Alternate route feature in case of high mobility and traffic.
Here we assume the nodes follows mesh topology.
(i) Creation of route: In the route discovery process sender node searches a route by
flooding a RREQ packet. A middle node, upon receiving a non-duplicate RREQ, records the
previous hop and the source node information in its route table. It then broadcasts the packet
or sends back a Route Reply (RREP) packet to the source if it has a route to the destination.
Alternate route are established during the route reply phase. Because of the broadcast
nature of Mobile Ad hoc network, a node constantly “overhears” packets that are transmitted
by their neighboring nodes. From these packets, a node obtains temporary route information.
When a node that is not part of the route overhears a RREP packet not directed to itself
transmit by a neighbor it records that neighbor as the next hop to the destination in its
alternate route table. A node may receive numerous RREPs for the same route if the node is
within the radio propagation range of more than one intermediate node of the primary route.
In this way the source node also selects the best route to send the packet to the destination.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 55
(ii) Maintain Route: Initially data packets are send via the main route if there is no link
disconnection. When a node detects a high mobility means the node is not now in the
frequency range, it accomplishes a one hop data broadcast to its adjacent neighbors. The node
specifies in the data header that the link is not connected and thus the packet is candidate for
Alternate route. Upon receiving this packet, neighbor nodes that have an entry for the
destination in their alternate route table, unicast the packet to their next hop node. Data
packets therefore can be passed through one or more alternate routes and are not dropped.
When any node receive data packet from the alternate route its check the packet id to
prevent from duplicate copy and operate normally and send packet to the next hop. The node
that detected the link failure also sends a ROUTE ERROR (RERR) packet to the source to
start a salvage route rediscovery.
Example: Figure 1 shows the alternate route construction in case of high mobility
Figure 1: Alternate route construction
When the route request packet reaches the destination R then the main route < S-A-B-R > is
selected. The destination node R send route reply packet to node B. the node X and Z is in the
communication range of R overhear the packet and change the alternate routing table
accordingly. After receiving this RREP packet, only node B relaying the packet to node A
since it is in the main route. Nodes W and Y record node B as the next hop to the destination
R in their alternate. route table. Finally node A send RREP packet to the Source node S.Now
suppose Source node S wants to send data packet to the destination node R and the node B
is moved out from the transmission range of A. After receiving the data packet from node S
node A forward it to node B. The packet will fail to deliver because node B is not in the
communication range of node A, then node A broadcast the packet to its neighbor (W and Y)
for temporary route. Node W and Y identify the main route disconnection by reading the
packet header. And looks up in its alternate route table and finds the path to the destination.
Therefore the packet is delivered through the path < S-A-Y-Z-R>.
IV. COMPARISION
All the methods briefed in Literature survey are trying to improve the performance of AODV
protocol. Some are based on Swarm intelligence and ant colony optimization meta heuristic
, some presented the path accumulation approach that scales better in large network and
under high load .One keeps the multiple route reply, according to them RREP messages are
important because of its high cost. If RREP is lost a large amount of route discovery effort
will be wasted. One of the authors proposed the concept of reliable distance in their work.
Their new protocol restricts the region of flooding of RREQ and provides more reliable route.
One of the authors extended the AODV by optimizing the overhead of both route discovery
and route maintenance process. According to them when a link failure occurs in the main
W
A
B
R
Y
X
Z
S
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 56
route then a local repair procedure is invoked between broken links. This increases the route
efficiency and minimize overhead.
V. CONCLUSION
We conclude that most of the authors work to increase the performance of AODV protocol in
large and high loaded network .As the use of mobile ad hoc networks (MANET) has
increased manifolds, the reliability and security in MANETs has become of vital importance.
In this paper we presented a new on-demand routing approach for mobile multi-hop
ad hoc networks. The approach is based on providing Alternate Route feature in case of high
mobility and RREP Loss condition. And the approach shows its ability to perform well in
such kind of networks.
We are working further on the implementation of the proposed protocol and compare the
results with existing AODV protocol. Our future work will focus on studying practical design
and implementation of the AR-AODV.
REFERENCES
[1] C. E. Perkins and E. M. Royer, “Ad hoc On-Demand Distance Vector Routing,” in Proceedings of the 2nd
IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp. 90–
100.
[2] S. R. Das, C. E. Perkins, E. M. Royer, and M. K. Marina,“Performance Comparison of Two On-Demand
Routing Protocols for Ad Hoc Networks”, in IEEE Personal Communications Magazine special issue on Ad hoc
Networking, February 2001, pp. 16–28.
[3] Mesut Gunes¸, Udo Sorges, Imed Bouazizi, “ARA -The Ant-Colony Based Routing Algorithm for
MANETs”,.International Workshop on Ad Hoc Networking (IWAHN 2002), ancouver, British Columbia,
Canada, August 18-21, 2002
[4] S.Gwalani,E.M. Belding-Royer, C.E. Perkins, “AODV-PA: AODV with path accumulation”, in Proceedings
of the IEEE Symposium on Next Generation Internet (NGI), Anchorage, AK, May 2003.
[5] Chonggun Kim, Elmurod Talipov, and Byoungchul Ahn,“A Reverse AODV Routing Protocol in Ad Hoc
Mobile Networks” IFIP International Federation for Information Processing 2006 pp. 522 – 531.
[6] Zhao Qiang Zhu Hongbo, “An optimized AODV protocol in mobile ad hoc Network”, in Wireless comm.
networking &mobile computing 2008(WiCOM’08), 4th international conference on Oct 12-14, 2008, pp.1-4.
[7] Ammar Zahary and Aladdin Ayesh,“On-demand Multiple Route Maintenance in AODV”,in Computer
Engineering &System, 2008, International Conference on Nov 25-27 , 2008, pp.225-230.
[8] Sung-Ju Lee and Mario Gerla,”AODV-BR: Backup Routing in Mobile Ad hoc Networks”,Proceeding of
IEEE WCNC, 6 Aug 2000,Vol 3,pp.1311-1316.
[9] John Jubin and Janet D. Tornow. The DARPA packet radio net-work protocols. Proceedings of the IEEE,
75(1):21–32, January 1987.
[10] J. Macker and S. Corson. Mobile ad hoc networks (MANET).http: //www.ietf.org/ html.charters/manet-
charter.html, 1997.IETFWorking Group Charter.
[11] David Maltz, Josh Broch, Jorjeta Jetcheva, and David Johnson.The effects of on-demand behavior in
routing protocols for multi-hop wireless ad hoc networks. IEEE Journal on Selected Areas in Communication,
1999. to appear.
[12] Charles Perkins and Elizabeth Royer. Ad hoc on-demand distance vector routing. In Proceedings of the 2nd
IEEE Workshop on Mobile Computing Systems and Applications, pages 90–100, Feb1999.
[13] Charles Perkins, Elizabeth Royer, and Samir Das. Ad hoc on demand distance vector (AODV) routing.
http:// www.ietf.org/ internet-drafts/ draft-ietf-manet-aodv-03.txt, June 1999. IETF In- ternet Draft (work in
progress).
[14] F. A. Tobagi and L. Kleinrock. Packet switching in radio chan-nels: Part-II - the hidden terminal problem
in carrier sense multiple-access models and the busy-tone solution. IEEE Trans-actions in Communications,
COM-23(12):1417–1433, 1975.
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV

More Related Content

What's hot

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
ijwmn
 
A Performance Comparison of Routing Protocols for Ad Hoc Networks
A Performance Comparison of Routing Protocols for Ad Hoc NetworksA Performance Comparison of Routing Protocols for Ad Hoc Networks
A Performance Comparison of Routing Protocols for Ad Hoc Networks
IJERA Editor
 
Bx4201493498
Bx4201493498Bx4201493498
Bx4201493498
IJERA Editor
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET Journal
 
Analysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANETAnalysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANET
idescitation
 
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ijasuc
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
IRJET Journal
 
Performance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networksPerformance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networks
ijujournal
 
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
ijujournal
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
IOSR Journals
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocols
IJCNCJournal
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
IOSR Journals
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
ijceronline
 
Multipath routing protocol for effective local route recovery
Multipath routing protocol for effective local route recoveryMultipath routing protocol for effective local route recovery
Multipath routing protocol for effective local route recovery
IJARBEST JOURNAL
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IJCNCJournal
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
ijctet
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing Protocols
IOSR Journals
 

What's hot (18)

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
 
A Performance Comparison of Routing Protocols for Ad Hoc Networks
A Performance Comparison of Routing Protocols for Ad Hoc NetworksA Performance Comparison of Routing Protocols for Ad Hoc Networks
A Performance Comparison of Routing Protocols for Ad Hoc Networks
 
Bx4201493498
Bx4201493498Bx4201493498
Bx4201493498
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing Protocol
 
Analysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANETAnalysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANET
 
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
 
Performance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networksPerformance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networks
 
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocols
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Multipath routing protocol for effective local route recovery
Multipath routing protocol for effective local route recoveryMultipath routing protocol for effective local route recovery
Multipath routing protocol for effective local route recovery
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing Protocols
 

Viewers also liked

An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
Aws Ali
 
JUF0646518
JUF0646518JUF0646518
JUF0646518
Suzan T. S. Awinat
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing Algorithms
Giancarlo Romeo
 
Ns2programs
Ns2programsNs2programs
Ns2programs
Meenakshi Devi
 
Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34
Shaikhul Islam Chowdhury
 
Protocol implementation on NS2
Protocol implementation on NS2Protocol implementation on NS2
Protocol implementation on NS2
amreshrai02
 
Porting aodv uu implementation to ns-2
Porting aodv uu implementation to ns-2Porting aodv uu implementation to ns-2
Porting aodv uu implementation to ns-2
Xaris1985
 

Viewers also liked (7)

An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
 
JUF0646518
JUF0646518JUF0646518
JUF0646518
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing Algorithms
 
Ns2programs
Ns2programsNs2programs
Ns2programs
 
Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34
 
Protocol implementation on NS2
Protocol implementation on NS2Protocol implementation on NS2
Protocol implementation on NS2
 
Porting aodv uu implementation to ns-2
Porting aodv uu implementation to ns-2Porting aodv uu implementation to ns-2
Porting aodv uu implementation to ns-2
 

Similar to A Review of Ad hoc on demand distance vector routing and proposed AR-AODV

Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
idescitation
 
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
Editor IJMTER
 
Ab25144148
Ab25144148Ab25144148
Ab25144148
IJERA Editor
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
ijwmn
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Bandwidth aware on demand multipath routing in manets
Bandwidth aware on demand multipath routing in manetsBandwidth aware on demand multipath routing in manets
Bandwidth aware on demand multipath routing in manets
ijwmn
 
En33838844
En33838844En33838844
En33838844
IJERA Editor
 
En33838844
En33838844En33838844
En33838844
IJERA Editor
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
Narendra Singh Yadav
 
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
IOSR Journals
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
IJERA Editor
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
IOSR Journals
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
IJERA Editor
 
Performance Evaluation of Routing Protocols for MAC Layer Models
Performance Evaluation of Routing Protocols for MAC Layer ModelsPerformance Evaluation of Routing Protocols for MAC Layer Models
Performance Evaluation of Routing Protocols for MAC Layer Models
IOSR Journals
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
IOSR Journals
 
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
cscpconf
 
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSSURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
graphhoc
 
Jj3416911698
Jj3416911698Jj3416911698
Jj3416911698
IJERA Editor
 
IMPROVING MANET ROUTING PROTOCOLS THROUGH THE USE OF GEOGRAPHICAL INFORMATION
IMPROVING MANET ROUTING PROTOCOLS  THROUGH THE USE OF GEOGRAPHICAL  INFORMATIONIMPROVING MANET ROUTING PROTOCOLS  THROUGH THE USE OF GEOGRAPHICAL  INFORMATION
IMPROVING MANET ROUTING PROTOCOLS THROUGH THE USE OF GEOGRAPHICAL INFORMATION
ijwmn
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
IJMER
 

Similar to A Review of Ad hoc on demand distance vector routing and proposed AR-AODV (20)

Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
 
Ab25144148
Ab25144148Ab25144148
Ab25144148
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Bandwidth aware on demand multipath routing in manets
Bandwidth aware on demand multipath routing in manetsBandwidth aware on demand multipath routing in manets
Bandwidth aware on demand multipath routing in manets
 
En33838844
En33838844En33838844
En33838844
 
En33838844
En33838844En33838844
En33838844
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
Performance Evaluation of Routing Protocols for MAC Layer Models
Performance Evaluation of Routing Protocols for MAC Layer ModelsPerformance Evaluation of Routing Protocols for MAC Layer Models
Performance Evaluation of Routing Protocols for MAC Layer Models
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
 
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSSURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
 
Jj3416911698
Jj3416911698Jj3416911698
Jj3416911698
 
IMPROVING MANET ROUTING PROTOCOLS THROUGH THE USE OF GEOGRAPHICAL INFORMATION
IMPROVING MANET ROUTING PROTOCOLS  THROUGH THE USE OF GEOGRAPHICAL  INFORMATIONIMPROVING MANET ROUTING PROTOCOLS  THROUGH THE USE OF GEOGRAPHICAL  INFORMATION
IMPROVING MANET ROUTING PROTOCOLS THROUGH THE USE OF GEOGRAPHICAL INFORMATION
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
Editor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
Editor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
Editor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
Editor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
Editor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
Editor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
Editor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
Editor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
Editor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
Editor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
Editor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
Editor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
Editor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
Editor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
Editor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
Editor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

Recently uploaded

[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 

Recently uploaded (20)

[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 

A Review of Ad hoc on demand distance vector routing and proposed AR-AODV

  • 1. International Journal of Modern Trends in Engineering and Research www.ijmter.com e-ISSN: 2349-9745 p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 52 A Review of Ad hoc on demand distance vector routing and proposed AR-AODV Bhavana Gupta1 , Rajesh Tiwari2 , Vikas Jain3 1 Asst.Professor, Computer Science & Engg, CIST 2 Asst.Professor, Computer Science & Engg, CIST 3 Asst.Professor, Computer Science & Engg, CIST Abstract: Mobile Ad-hoc networks are a key in the evolution of wireless networks. In mobile ad hoc networks, there is no centralized infrastructure to monitor or allocate the resources used by the mobile nodes. The absence of any central coordinator makes the routing a complex one compared to cellular networks. The Ad hoc On Demand Distance Vector (AODV) routing algorithm is a routing protocol designed for ad hoc mobile devices. AODV uses an on demand approach for finding routes .A class of routing protocols called on- demand protocols has recently found attention because of their low routing overhead. The on- demand protocols depend on query floods to discover routes whenever a new route is needed. Such floods take up a substantial portion of network bandwidth. The routing in Mobile ad hoc network is difficult and number of reactive routing protocols like AODV, DSR, and DSDV has been implemented. In this paper, an attempt has been made to thoroughly study all AODVs and a new AODV is proposed called AR-AODV Keywords: Mobile Ad hoc Network, Reactive, AODV, DSR, DSDV. I. INTRODUCTION A Mobile Ad hoc network consists of auto configuring node and these nodes communicate with each other via wireless equipment. Mobile nodes create a network on their own. Network topology change invariably and no condensed monitoring is there. Each node participating in the network can acts both as host and a router with willingness to forward packets for the others. Routing protocol in Ad hoc networks has received wide interest in the past year due to the fact that existing internet routing protocol were designed to support fixed infrastructure and their properties are unsuitable for mobile ad hoc networks, the up to date standardized protocols are classified into three major categories based on the routing information update mechanism. 1. Proactive or table driven routing protocols: In this, each node maintains the network topology information in the form of routing tables by periodically exchanging routing information. Routing information is generally flooded in the whole network. Whenever a node needs a route to the destination it runs an appropriate path finding algorithm on the topology information it maintains. 2. Reactive or on demand routing protocols: Such protocols do not maintain the network topology information. They obtain the necessary route when it is required, by using a
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 04, [October - 2014] e-ISSN: 2349-9745 p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 53 connection establishment process. Hence these protocols do not exchange routing information periodically. 3. Hybrid routing protocols: These protocols combine the best features of the above two categories. Nodes with a certain distance from the source node concerned or within a particular geographical region are said to be within the routing zone of the given node. For routing within this zone, a table-driven approach is used. For nodes located beyond this zone, an on-demand approach is used. We focus our study on on-demand routing protocols. Reactive protocols, such as DSR [1] and AODV [2], find route only when there is data to be transmitted and as a result, generate low control traffic and routing overhead. Proactive protocols on the other hand, find path in advance for all the source and destination pairs and periodically exchange topology information to maintain them. 1.1 AODV (Ad hoc on demand distance vector routing) AODV is a reactive routing protocol that minimizes the number of broadcasts by creating routes on demand. Routes are discovered through a route discovery cycle, whereby the network nodes are queried in search of a route to the destination node. When a node with a route to the destination is discovered, that route is reported back to the source node that requested the route. In this paper, we proposed modifications to AODV called AR-AODV works in case of when mobility increases and nodes are unreachable or traffic on that route occurs. The conservative nature of proposed protocol helps to find new routes in case of high mobility and network congestion, while at the same time maintaining good performance in application oriented metrics such as delay and varying network load. In the first part of work, survey is done on AODV. In the second part small modification is done in AODV Algorithm called AR-AODV.Section II provides a brief description of the analysis of existing AODV. Section III defines the Proposed Method. The Section IV concludes the paper. II. RELATED WORK To enhance the performance of routing protocols in MANET, a lot of approaches have been presented so far. The approaches can be mainly classified into two groups: Reliability based approaches efficiency and security based approaches. Many Existing researchers proposed AODV using the concept of reliable distance, distance vector, source routing approach and link-disjoint multipath routing approach. Some rely on path accumulation during the route discovery process. Perkins and Royer (1999) shown that AODV is based on a traditional distance vector routing mechanism, where the route is determined on a hop-by-hop basis [1]. The route is established by leaving a backward route to the source at intermediate nodes when propagating RREQ messages and by leaving a forward route to the destination at intermediate nodes when relaying the RREP message to the source. Das et. al. (2001) compared performance of DSR and AODV, two prominent on- demand routing protocols for ad hoc networks [2]. Their performance comparisons are analyzed using varying network load, mobility and network size. They showed that the results DSR generates less routing load than AODV. In case of smaller number of nodes and lower load and/or mobility DSR performs better. And in case of more load and higher mobility AODV do better than DSR. Mesut Gunes et. al. (2002) presented the approach that is based on swarm intelligence and especially on the ant colony optimization meta-heuristic. These fascinating families of
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 04, [October - 2014] e-ISSN: 2349-9745 p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 54 algorithms try to apply the ability of swarms to mathematical problems and were applied successfully to several optimization problems in [3]. Gwalani and Belding-Royer (2003) presented a new approach of AODV-PA [4] incorporates path accumulation during the route discovery process in AODV to attain extra routing information. And it scales better in the large networks It is evident from the results that AODV-PA improves the performance of AODV under conditions of high load and moderate to high mobility. AODV-PA can be used either as an alternative to AODV or as an optimization under moderate to high load scenarios. Chonggun Kim, Elmurod Talipov, and Byoungchul Ahn (2006) [5] propose a reverse AODV which tries multiple route replies. It reduces path fail correction messages and obtains better performance than the AODV. According to them Successful delivery of RREP messages are important in on-demand routing protocols for ad hoc networks. The loss of RREPs causes serious impairment on the routing performance. This is because the cost of a RREP is very high. If the RREP is lost, a large amount of route discovery effort will be wasted. Furthermore, the source node has to initiate another round of route discovery to establish a route to the destination. Qiang and Hongbo (2008) propose an optimized AODV (OAODV) [6] using the concept of reliable distance which is always smaller than transmission range, is depended on the nodes velocity and direction information. The new protocol restricts the region of flooding RREQ in route discovery process. They show that by their mechanism the routes are more reliable. They had also compared the performance of their algorithm with existing AODV. Zahary and Ayesh (2008) presented the concept of ORMAD [7] in which is a link- disjoint multipath routing approach in MANETs it tries to optimize routing overhead of both Route Discovery Process (RDP) and Route Maintenance Process (RMP) of multipath extension to AODV. When detecting a link failure in the primary route, ORMAD invokes a local repair procedure between the upstream and the downstream nodes of the broken link. For route efficiency and minimization of routing overhead it applies RMP to only efficient route. III. PROPOSED METHOD a. AR-AODV (Alternate Route Ad hoc on demand distance vector routing) AR-AODV is a reactive routing protocol. The route discovery (Route Request and Route Reply) process of AR-AODV is similar to the AODV protocol. We slightly change the AODV protocol by establishing Alternate route feature in case of high mobility and traffic. Here we assume the nodes follows mesh topology. (i) Creation of route: In the route discovery process sender node searches a route by flooding a RREQ packet. A middle node, upon receiving a non-duplicate RREQ, records the previous hop and the source node information in its route table. It then broadcasts the packet or sends back a Route Reply (RREP) packet to the source if it has a route to the destination. Alternate route are established during the route reply phase. Because of the broadcast nature of Mobile Ad hoc network, a node constantly “overhears” packets that are transmitted by their neighboring nodes. From these packets, a node obtains temporary route information. When a node that is not part of the route overhears a RREP packet not directed to itself transmit by a neighbor it records that neighbor as the next hop to the destination in its alternate route table. A node may receive numerous RREPs for the same route if the node is within the radio propagation range of more than one intermediate node of the primary route. In this way the source node also selects the best route to send the packet to the destination.
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 04, [October - 2014] e-ISSN: 2349-9745 p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 55 (ii) Maintain Route: Initially data packets are send via the main route if there is no link disconnection. When a node detects a high mobility means the node is not now in the frequency range, it accomplishes a one hop data broadcast to its adjacent neighbors. The node specifies in the data header that the link is not connected and thus the packet is candidate for Alternate route. Upon receiving this packet, neighbor nodes that have an entry for the destination in their alternate route table, unicast the packet to their next hop node. Data packets therefore can be passed through one or more alternate routes and are not dropped. When any node receive data packet from the alternate route its check the packet id to prevent from duplicate copy and operate normally and send packet to the next hop. The node that detected the link failure also sends a ROUTE ERROR (RERR) packet to the source to start a salvage route rediscovery. Example: Figure 1 shows the alternate route construction in case of high mobility Figure 1: Alternate route construction When the route request packet reaches the destination R then the main route < S-A-B-R > is selected. The destination node R send route reply packet to node B. the node X and Z is in the communication range of R overhear the packet and change the alternate routing table accordingly. After receiving this RREP packet, only node B relaying the packet to node A since it is in the main route. Nodes W and Y record node B as the next hop to the destination R in their alternate. route table. Finally node A send RREP packet to the Source node S.Now suppose Source node S wants to send data packet to the destination node R and the node B is moved out from the transmission range of A. After receiving the data packet from node S node A forward it to node B. The packet will fail to deliver because node B is not in the communication range of node A, then node A broadcast the packet to its neighbor (W and Y) for temporary route. Node W and Y identify the main route disconnection by reading the packet header. And looks up in its alternate route table and finds the path to the destination. Therefore the packet is delivered through the path < S-A-Y-Z-R>. IV. COMPARISION All the methods briefed in Literature survey are trying to improve the performance of AODV protocol. Some are based on Swarm intelligence and ant colony optimization meta heuristic , some presented the path accumulation approach that scales better in large network and under high load .One keeps the multiple route reply, according to them RREP messages are important because of its high cost. If RREP is lost a large amount of route discovery effort will be wasted. One of the authors proposed the concept of reliable distance in their work. Their new protocol restricts the region of flooding of RREQ and provides more reliable route. One of the authors extended the AODV by optimizing the overhead of both route discovery and route maintenance process. According to them when a link failure occurs in the main W A B R Y X Z S
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 04, [October - 2014] e-ISSN: 2349-9745 p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 56 route then a local repair procedure is invoked between broken links. This increases the route efficiency and minimize overhead. V. CONCLUSION We conclude that most of the authors work to increase the performance of AODV protocol in large and high loaded network .As the use of mobile ad hoc networks (MANET) has increased manifolds, the reliability and security in MANETs has become of vital importance. In this paper we presented a new on-demand routing approach for mobile multi-hop ad hoc networks. The approach is based on providing Alternate Route feature in case of high mobility and RREP Loss condition. And the approach shows its ability to perform well in such kind of networks. We are working further on the implementation of the proposed protocol and compare the results with existing AODV protocol. Our future work will focus on studying practical design and implementation of the AR-AODV. REFERENCES [1] C. E. Perkins and E. M. Royer, “Ad hoc On-Demand Distance Vector Routing,” in Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp. 90– 100. [2] S. R. Das, C. E. Perkins, E. M. Royer, and M. K. Marina,“Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, in IEEE Personal Communications Magazine special issue on Ad hoc Networking, February 2001, pp. 16–28. [3] Mesut Gunes¸, Udo Sorges, Imed Bouazizi, “ARA -The Ant-Colony Based Routing Algorithm for MANETs”,.International Workshop on Ad Hoc Networking (IWAHN 2002), ancouver, British Columbia, Canada, August 18-21, 2002 [4] S.Gwalani,E.M. Belding-Royer, C.E. Perkins, “AODV-PA: AODV with path accumulation”, in Proceedings of the IEEE Symposium on Next Generation Internet (NGI), Anchorage, AK, May 2003. [5] Chonggun Kim, Elmurod Talipov, and Byoungchul Ahn,“A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks” IFIP International Federation for Information Processing 2006 pp. 522 – 531. [6] Zhao Qiang Zhu Hongbo, “An optimized AODV protocol in mobile ad hoc Network”, in Wireless comm. networking &mobile computing 2008(WiCOM’08), 4th international conference on Oct 12-14, 2008, pp.1-4. [7] Ammar Zahary and Aladdin Ayesh,“On-demand Multiple Route Maintenance in AODV”,in Computer Engineering &System, 2008, International Conference on Nov 25-27 , 2008, pp.225-230. [8] Sung-Ju Lee and Mario Gerla,”AODV-BR: Backup Routing in Mobile Ad hoc Networks”,Proceeding of IEEE WCNC, 6 Aug 2000,Vol 3,pp.1311-1316. [9] John Jubin and Janet D. Tornow. The DARPA packet radio net-work protocols. Proceedings of the IEEE, 75(1):21–32, January 1987. [10] J. Macker and S. Corson. Mobile ad hoc networks (MANET).http: //www.ietf.org/ html.charters/manet- charter.html, 1997.IETFWorking Group Charter. [11] David Maltz, Josh Broch, Jorjeta Jetcheva, and David Johnson.The effects of on-demand behavior in routing protocols for multi-hop wireless ad hoc networks. IEEE Journal on Selected Areas in Communication, 1999. to appear. [12] Charles Perkins and Elizabeth Royer. Ad hoc on-demand distance vector routing. In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pages 90–100, Feb1999. [13] Charles Perkins, Elizabeth Royer, and Samir Das. Ad hoc on demand distance vector (AODV) routing. http:// www.ietf.org/ internet-drafts/ draft-ietf-manet-aodv-03.txt, June 1999. IETF In- ternet Draft (work in progress). [14] F. A. Tobagi and L. Kleinrock. Packet switching in radio chan-nels: Part-II - the hidden terminal problem in carrier sense multiple-access models and the busy-tone solution. IEEE Trans-actions in Communications, COM-23(12):1417–1433, 1975.