SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 1 Issue 1 ǁ May. 2013 ǁ PP.01-04
www.ijres.org 1 | Page
Categorization and Selection of Routing Protocols for
Wireless Mesh Network
Rahul R. Dhulekar1
, Pornima Niranjane2
1
M.E. 1st
Year (Computer Science and Engineering) Babasaheb Naik College of Engineering
Pusad, District-Yavatmal, Maharashtra, India
2
M.Tech. (Computer Science and Engineering) Asst. Professor (Dept. of CSE & IT),
Babasaheb Naik College of Engineering, Pusad, District-Yavatmal, Maharashtra, India
Abstract:- The fundamental characteristic of Wireless Mesh Network (WMN) is routing. Routing
protocols directly enables many of the advantages of WMNs over competing technologies. WMNs
requires a routing protocols that provide flexibility to work with different topologies, low control traffic
overhead, low latency for route (re-) discovery, mobile user support, scalability with respect to mobility
and network dimension, efficient handover, multicast which is important for emergency response cases
and more desirable one – multipath. Here in this paper, some of the appropriate and relevant routing
protocols for WMNs, their behavior, and comparison is presented.
Keywords:- Protocols, Wireless Mesh Networks, WMNs, Routing
I. INTRODUCTION
Wireless Mesh Network (WMN) can be seen as a special type of wireless ad-hoc network. A wireless
mesh network often has a more planned configuration, and may be deployed to provide dynamic and cost
effective connectivity over a certain geographic area. An ad-hoc network, on the other hand, is formed ad hoc
when wireless devices come within communication range of each other. The mesh routers may be mobile, and be
moved according to specific demands arising in the network. Often the mesh routers are not limited in terms of
resources compared to other nodes in the network and thus can be exploited to perform more resource intensive
functions. In this way, since these nodes are often constrained by resources, the WMNs differs from an ad-hoc
network.
II. CATEGORIZATION
Routing protocols for WMNs are mostly based on protocols designed for mobile adhoc networks. These
can be classified in the three categories as;
1.1 Proactive Routing Protocols
A proactive routing protocol is also called "table driven" routing protocol and is based on the traditional
Link State and Distance Vector algorithms, which were originally designed for wired networks. Using proactive
routing algorithms, mobile nodes continuously evaluate routes to all reachable nodes and attempt to maintain
consistent, up-to-date routing information regardless of whether data traffic exists or not. So the overhead to
maintain up-to-date network topology information is high. Thus, a source node can get a routing path
immediately if it needs one. Proactive routing protocols maintain a table for each node representing the entire
network topology which is regularly updated in order to maintain the freshness of routing information. At any
given time, any node knows how to reach another node of the network. This approach minimizes the route
discovery delay at the cost of exchanging data periodically, which consumes network bandwidth. Proactive
protocols are preferred for small networks because of low routing, table lookups. Destination Sequenced Distance
Vector (DSDV), Optimized Link State Routing (OLSR), Topology dissemination Based on Reverse-Path
Forwarding (TBRPF), Open Shortest Path First – MANET (OSPF-MANET), Fish-eye State Routing (FSR) are
some of proactive routing protocols.
1.2 Reactive Routing Protocols
Reactive routing protocols for WMNs are also called "on-demand" routing protocols. In a reactive
routing protocol, routing paths are searched only when needed. A route discovery operation invokes a route-
determination procedure. The discovery procedure terminates either when a route has been found or no route
available after examination for all route permutations.
Categorization And Selection…
www.ijres.org 2 | Page
In reactive routing protocols, nodes are not aware of the net-work topology. Routing table is constructed
on-demand. They find routes by flooding network with route requests. This leads to higher latency due to the fact
that the route has to be discovered, however it minimizes control traffic overhead. Usually, reactive routing
protocols are better suited in net-works with low node density and static traffic patterns. Since the traffic patterns
are static, the first request encompasses the route discovery, while the subsequent use the previous discovery to
route the traffic. On the other hand, proactive proto-cols are more efficient in dense networks with bursty traffic
due to the continuous exchange of topology information, reducing route discovery delay. Reactive protocols are
preferred for high mobility networks. Dynamic Source Routing (DSR), Ad hoc On-Demand Vector (AODV) and
some other extensions derived from AODV are reactive routing protocols.
1.3 Hybrid Routing Protocols
Hybrid Wireless Mesh Networks (HWMN) is wireless multi-hop networks consisting of two types of
nodes, mesh-router and mesh-client. Mesh-routers are more static and less resource constrained than mobile
mesh-clients and forms the wireless backhaul of the network. Hybrid routing protocols are mixed design of two
approaches mentioned above. The protocols typically use a proactive approach to keep routes to neighborhood
nodes (nodes within the vicinity of the source). But for the nodes beyond the vicinity area the protocol behaves
like a reactive one. Alternatively, multiple algorithms can be used simultaneously, if WMN is segmented into
clusters. Within each cluster a proactive algorithm is used, whereas between clusters a reactive algorithm is used.
The challenge is to choose a point, a point from which the protocol should change from proactive to reactive.
III. ARCHITECTURE
Wireless mesh architecture design is a first step towards providing high-bandwidth Internet access over a
specific coverage area. WMNs consist of Mesh Clients (MCs) and Wireless Mesh Routers (WMRs), which
relaying each other’s packets in a multi-hop fashion, where mesh routers have minimal mobility and form the
Backbone of WMNs (BWMNs). To illustrate more, it is made up of wireless communication nodes, each of
which can communicate with other nodes. Mesh architecture breaks the long distance into a series of shorter hops
to boost the signal by intermediate nodes. Intermediate nodes not only sustain signal strength, but also forward
packages on behalf of other nodes based on their knowledge of the network. Such architecture allows continuous
connections and reconfiguration around broken or blocked. A typical WMN is illustrated in following Figure.
Fig.4.WMN Architecture
IV. WNS COMPONENTS
There are three types of node in a WMN: WMN client, WMN router, and WMN gateway
4.1 WMN clients
These are the end-user devices such as: laptops, PDAs, smart phones, etc that can access the network for
using applications like email, VoIP, game, location detection, etc. These devices are assumed to be mobile; they
have limited power, they may have routing capability, and may or may not be always connected to the network.
4.2 WMN routers
These are in the network to route the network traffic. They cannot terminate nor originate the traffic. The
routers have limitation in mobility and they have reliable characteristics. Transmission power consumption in
mesh routers is low, for multi-hop communications strategy. Additionally, the Medium Access Control (MAC)
Categorization And Selection…
www.ijres.org 3 | Page
protocol in a mesh router supports multiple-channels and multiple interfaces to enable scalability in a multi-hop
mesh environment.
4.3 WMN gateways
These are routers with direct access to the wired infrastructure/Internet. Since the gateways in WMNs
have multiple interfaces to connect to both wired and wireless networks, they are expensive. Therefore, there are
a few number of WMN gateways in the network. Moreover, their placement has a significant impact on the
performance of the network.
V. APPLICATIONS OF WMNS
There are some applications cannot be directed and fully support by other wireless technologies rather
than WMNs. It was a motivation to develop WMNs.
5.1 Broadband Wireless Access:
Currently, Broadband access has an important role in information economy. It provides services for real
time applications such as: video telephony, online-gaming, video on demand, and telecommunications. Each new
application has a significant impact on quality of life. For example, Telecommuting can reduce daily travelling of
individuals. It leads to increased productivity for the time saving. It also reduces traffic on the streets, thus it has a
positive impact on the environment.
5.2 Industrial Applications:
Building automation: In a building, there are many devices need to be monitored and controlled like
electrical devices including power, light, air conditioner, elevator etc. Today, the wired networks are taking care
of such environment. This is very expensive due to the complexity in deployment and maintenance of a wired
network. Currently, Wi-Fi networks are another option to reduce the cost of such networks. But, this solution has
not achieved satisfactory performance yet for expensive wiring of Ethernet which is needed for Wi-Fi Access
Points (APs).
5.3 Hospitality:
In hotels and resorts, one of their services is high-speed Internet connectivity which is free. Wireless
mesh networks are easy to set-up, lower in cost, and without having to change the existing structures or disrupt
business for both indoor and outdoor.
VI. CONCLUSION
The analytical study of this thesis demonstrates that WMN technology proved to be a revolutionary and
modern technology which has remarkable impacts in the field of Telecommunications and Internet Systems.
Routing protocols play vital role to increase the credibility of WMNs. The selection of appropriate routing
protocol with respect to network improves the efficiency and reliability of network. There are some suggestions
regarding analytical study, routing protocols should not be centralized. These should be distributed in nature.
Routing protocols used in ad-hoc networks should develop loop free routes; due to loop free environment
bandwidth consumption becomes low. Routing protocols should have capability to maintain QOS in terms of
different parameters such as delay, load, jitter and throughput etc. Mainly there are two categories of protocols
used in WMNs or MANETs i.e. reactive and proactive. Both types of protocols have different utilization in
MANETs; both categories have advantages and disadvantages discussed in this thesis. Thus to achieve good
results and efficiency in communication according to scenarios and parameters, selection of suitable category of
protocol is very important.
REFERENCES
[1]. Jangeun Jun, Mihail L. Sichitiu, “MRP: Wireless Mesh Networks Routing protocol” Published in:
Journal - Computer Communications archive - Volume 31 Issue 7, May, 2008.
[2]. Held, Gilbert. Wireless MeshNetwork”. Auerbach Publications, June 23, 2005. R. Draves, J. Padhye,
and B. Zill, “Routing in multi-radio, multi-hop wireless mesh networks,” in ACM International
Conference on Mobile Computing and Networking (MobiCom), Sept. 2004, pp. 114–128.
[3]. Bharat Kumar Addagada, Vineeth Kisara and Kiran Desai,”A Survey: Routing Metrics for Wireless
Mesh Networks” May 05, 2009.
[4]. V.Srikanth, A.Chenchu Jeevan, B.Avinash, T.Sai kiran, S.Suresh Babu, “A Review of Routing
Protocols in Wireless Mesh Networks (WMN)”, International Journal of Computer Applications (0975-
8887) Volume 1-No.11.
Categorization And Selection…
www.ijres.org 4 | Page
[5]. Miguel Elias M. Campista1, Diego G. Passos “Routing Metrics and Protocols for Wireless Mesh
Networks” in IEEE Network magazine, vol.22, pp.6-12, Jan/Feb 2008.
[6]. Muhammad Shoaib Siddiqui, Choong Seon HongO Department of Computer Engineering, Kyung Hee
University “HRP: A Hybrid Routing Protocol for Wireless Mesh Network”
[7]. Venkat Mohan.S, Dr. Kasiviswanath.N “Routing Protocols for Wireless Mesh Networks” International
Journal of Scientific & Engineering Research Volume 2, Issue 8, August-2011 1 ISSN 2229-5518

More Related Content

What's hot

Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Editor IJMTER
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc networkAman Saurabh
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 
Mobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelMobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelIOSR Journals
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...ijceronline
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksijasuc
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
 

What's hot (17)

Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
Mobile computing Mobile Adhoc Networks (MANETs)
Mobile computing Mobile Adhoc Networks (MANETs)Mobile computing Mobile Adhoc Networks (MANETs)
Mobile computing Mobile Adhoc Networks (MANETs)
 
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc network
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
Mane ts
Mane tsMane ts
Mane ts
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
Mobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelMobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility Model
 
eaodv
eaodveaodv
eaodv
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
 
J018216275
J018216275J018216275
J018216275
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 

Viewers also liked

Htvh uc huynh_hoangvien
Htvh uc huynh_hoangvienHtvh uc huynh_hoangvien
Htvh uc huynh_hoangvienHo Vien
 
Varying Load Voltage Magnitude Impacts on Fault Level Constrained Optimal Pow...
Varying Load Voltage Magnitude Impacts on Fault Level Constrained Optimal Pow...Varying Load Voltage Magnitude Impacts on Fault Level Constrained Optimal Pow...
Varying Load Voltage Magnitude Impacts on Fault Level Constrained Optimal Pow...IJRES Journal
 
Tara Briscoe - Resume
Tara Briscoe - ResumeTara Briscoe - Resume
Tara Briscoe - ResumeOrigenie
 
Problemas ciudadanos y sus soluciones tecnológicas
Problemas  ciudadanos y sus soluciones tecnológicasProblemas  ciudadanos y sus soluciones tecnológicas
Problemas ciudadanos y sus soluciones tecnológicasErick Anderson Silva Nuñez
 
Htvh nhat ban-huynhhoangvien
Htvh nhat ban-huynhhoangvienHtvh nhat ban-huynhhoangvien
Htvh nhat ban-huynhhoangvienHo Vien
 
Munish - Resume
Munish - ResumeMunish - Resume
Munish - Resumemunish02
 
PSoC BASED SPEECH RECOGNITION SYSTEM
PSoC BASED SPEECH RECOGNITION SYSTEMPSoC BASED SPEECH RECOGNITION SYSTEM
PSoC BASED SPEECH RECOGNITION SYSTEMIJRES Journal
 
Natural gas engine combustion research based on bench test
Natural gas engine combustion research based on bench testNatural gas engine combustion research based on bench test
Natural gas engine combustion research based on bench testIJRES Journal
 
Design Of 64-Bit Parallel Prefix VLSI Adder For High Speed Arithmetic Circuits
Design Of 64-Bit Parallel Prefix VLSI Adder For High Speed Arithmetic CircuitsDesign Of 64-Bit Parallel Prefix VLSI Adder For High Speed Arithmetic Circuits
Design Of 64-Bit Parallel Prefix VLSI Adder For High Speed Arithmetic CircuitsIJRES Journal
 

Viewers also liked (18)

C0151823
C0151823C0151823
C0151823
 
Htvh uc huynh_hoangvien
Htvh uc huynh_hoangvienHtvh uc huynh_hoangvien
Htvh uc huynh_hoangvien
 
Varying Load Voltage Magnitude Impacts on Fault Level Constrained Optimal Pow...
Varying Load Voltage Magnitude Impacts on Fault Level Constrained Optimal Pow...Varying Load Voltage Magnitude Impacts on Fault Level Constrained Optimal Pow...
Varying Load Voltage Magnitude Impacts on Fault Level Constrained Optimal Pow...
 
B0151017
B0151017B0151017
B0151017
 
Tara Briscoe - Resume
Tara Briscoe - ResumeTara Briscoe - Resume
Tara Briscoe - Resume
 
B120512
B120512B120512
B120512
 
Lks radhit 3 feb 2015
Lks radhit 3 feb 2015Lks radhit 3 feb 2015
Lks radhit 3 feb 2015
 
Problemas ciudadanos y sus soluciones tecnológicas
Problemas  ciudadanos y sus soluciones tecnológicasProblemas  ciudadanos y sus soluciones tecnológicas
Problemas ciudadanos y sus soluciones tecnológicas
 
Htvh nhat ban-huynhhoangvien
Htvh nhat ban-huynhhoangvienHtvh nhat ban-huynhhoangvien
Htvh nhat ban-huynhhoangvien
 
Munish - Resume
Munish - ResumeMunish - Resume
Munish - Resume
 
PSoC BASED SPEECH RECOGNITION SYSTEM
PSoC BASED SPEECH RECOGNITION SYSTEMPSoC BASED SPEECH RECOGNITION SYSTEM
PSoC BASED SPEECH RECOGNITION SYSTEM
 
F124144
F124144F124144
F124144
 
B131626
B131626B131626
B131626
 
Automatizacion de procesoso de negocios
Automatizacion de procesoso de negocios Automatizacion de procesoso de negocios
Automatizacion de procesoso de negocios
 
Natural gas engine combustion research based on bench test
Natural gas engine combustion research based on bench testNatural gas engine combustion research based on bench test
Natural gas engine combustion research based on bench test
 
Design Of 64-Bit Parallel Prefix VLSI Adder For High Speed Arithmetic Circuits
Design Of 64-Bit Parallel Prefix VLSI Adder For High Speed Arithmetic CircuitsDesign Of 64-Bit Parallel Prefix VLSI Adder For High Speed Arithmetic Circuits
Design Of 64-Bit Parallel Prefix VLSI Adder For High Speed Arithmetic Circuits
 
10 inventos tecnológicos
10 inventos tecnológicos10 inventos tecnológicos
10 inventos tecnológicos
 
H0114857
H0114857H0114857
H0114857
 

Similar to A0110104

Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...IOSR Journals
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Natasha Barnett
 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networkschetan1nonly
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444IJRAT
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsidescitation
 
Survey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesSurvey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesIJMER
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsprjpublications
 
cse Wireless Mesh Networks ppt.pptx
cse  Wireless Mesh Networks ppt.pptxcse  Wireless Mesh Networks ppt.pptx
cse Wireless Mesh Networks ppt.pptxSANTHAKUMARP5
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksjake henry
 

Similar to A0110104 (20)

Mobile adhoc
Mobile adhocMobile adhoc
Mobile adhoc
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
 
H010524049
H010524049H010524049
H010524049
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
Survey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesSurvey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering Techniques
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocols
 
Aodv
AodvAodv
Aodv
 
cse Wireless Mesh Networks ppt.pptx
cse  Wireless Mesh Networks ppt.pptxcse  Wireless Mesh Networks ppt.pptx
cse Wireless Mesh Networks ppt.pptx
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
E1073644
E1073644E1073644
E1073644
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 

More from IJRES Journal

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...IJRES Journal
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...IJRES Journal
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityIJRES Journal
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...IJRES Journal
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesIJRES Journal
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresIJRES Journal
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...IJRES Journal
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodIJRES Journal
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningIJRES Journal
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchIJRES Journal
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowIJRES Journal
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...IJRES Journal
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsIJRES Journal
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalIJRES Journal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...IJRES Journal
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...IJRES Journal
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesIJRES Journal
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...IJRES Journal
 

More from IJRES Journal (20)

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil properties
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their Structures
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible Rod
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioning
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision Workbench
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and Now
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirs
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound Signal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubes
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

A0110104

  • 1. International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 www.ijres.org Volume 1 Issue 1 ǁ May. 2013 ǁ PP.01-04 www.ijres.org 1 | Page Categorization and Selection of Routing Protocols for Wireless Mesh Network Rahul R. Dhulekar1 , Pornima Niranjane2 1 M.E. 1st Year (Computer Science and Engineering) Babasaheb Naik College of Engineering Pusad, District-Yavatmal, Maharashtra, India 2 M.Tech. (Computer Science and Engineering) Asst. Professor (Dept. of CSE & IT), Babasaheb Naik College of Engineering, Pusad, District-Yavatmal, Maharashtra, India Abstract:- The fundamental characteristic of Wireless Mesh Network (WMN) is routing. Routing protocols directly enables many of the advantages of WMNs over competing technologies. WMNs requires a routing protocols that provide flexibility to work with different topologies, low control traffic overhead, low latency for route (re-) discovery, mobile user support, scalability with respect to mobility and network dimension, efficient handover, multicast which is important for emergency response cases and more desirable one – multipath. Here in this paper, some of the appropriate and relevant routing protocols for WMNs, their behavior, and comparison is presented. Keywords:- Protocols, Wireless Mesh Networks, WMNs, Routing I. INTRODUCTION Wireless Mesh Network (WMN) can be seen as a special type of wireless ad-hoc network. A wireless mesh network often has a more planned configuration, and may be deployed to provide dynamic and cost effective connectivity over a certain geographic area. An ad-hoc network, on the other hand, is formed ad hoc when wireless devices come within communication range of each other. The mesh routers may be mobile, and be moved according to specific demands arising in the network. Often the mesh routers are not limited in terms of resources compared to other nodes in the network and thus can be exploited to perform more resource intensive functions. In this way, since these nodes are often constrained by resources, the WMNs differs from an ad-hoc network. II. CATEGORIZATION Routing protocols for WMNs are mostly based on protocols designed for mobile adhoc networks. These can be classified in the three categories as; 1.1 Proactive Routing Protocols A proactive routing protocol is also called "table driven" routing protocol and is based on the traditional Link State and Distance Vector algorithms, which were originally designed for wired networks. Using proactive routing algorithms, mobile nodes continuously evaluate routes to all reachable nodes and attempt to maintain consistent, up-to-date routing information regardless of whether data traffic exists or not. So the overhead to maintain up-to-date network topology information is high. Thus, a source node can get a routing path immediately if it needs one. Proactive routing protocols maintain a table for each node representing the entire network topology which is regularly updated in order to maintain the freshness of routing information. At any given time, any node knows how to reach another node of the network. This approach minimizes the route discovery delay at the cost of exchanging data periodically, which consumes network bandwidth. Proactive protocols are preferred for small networks because of low routing, table lookups. Destination Sequenced Distance Vector (DSDV), Optimized Link State Routing (OLSR), Topology dissemination Based on Reverse-Path Forwarding (TBRPF), Open Shortest Path First – MANET (OSPF-MANET), Fish-eye State Routing (FSR) are some of proactive routing protocols. 1.2 Reactive Routing Protocols Reactive routing protocols for WMNs are also called "on-demand" routing protocols. In a reactive routing protocol, routing paths are searched only when needed. A route discovery operation invokes a route- determination procedure. The discovery procedure terminates either when a route has been found or no route available after examination for all route permutations.
  • 2. Categorization And Selection… www.ijres.org 2 | Page In reactive routing protocols, nodes are not aware of the net-work topology. Routing table is constructed on-demand. They find routes by flooding network with route requests. This leads to higher latency due to the fact that the route has to be discovered, however it minimizes control traffic overhead. Usually, reactive routing protocols are better suited in net-works with low node density and static traffic patterns. Since the traffic patterns are static, the first request encompasses the route discovery, while the subsequent use the previous discovery to route the traffic. On the other hand, proactive proto-cols are more efficient in dense networks with bursty traffic due to the continuous exchange of topology information, reducing route discovery delay. Reactive protocols are preferred for high mobility networks. Dynamic Source Routing (DSR), Ad hoc On-Demand Vector (AODV) and some other extensions derived from AODV are reactive routing protocols. 1.3 Hybrid Routing Protocols Hybrid Wireless Mesh Networks (HWMN) is wireless multi-hop networks consisting of two types of nodes, mesh-router and mesh-client. Mesh-routers are more static and less resource constrained than mobile mesh-clients and forms the wireless backhaul of the network. Hybrid routing protocols are mixed design of two approaches mentioned above. The protocols typically use a proactive approach to keep routes to neighborhood nodes (nodes within the vicinity of the source). But for the nodes beyond the vicinity area the protocol behaves like a reactive one. Alternatively, multiple algorithms can be used simultaneously, if WMN is segmented into clusters. Within each cluster a proactive algorithm is used, whereas between clusters a reactive algorithm is used. The challenge is to choose a point, a point from which the protocol should change from proactive to reactive. III. ARCHITECTURE Wireless mesh architecture design is a first step towards providing high-bandwidth Internet access over a specific coverage area. WMNs consist of Mesh Clients (MCs) and Wireless Mesh Routers (WMRs), which relaying each other’s packets in a multi-hop fashion, where mesh routers have minimal mobility and form the Backbone of WMNs (BWMNs). To illustrate more, it is made up of wireless communication nodes, each of which can communicate with other nodes. Mesh architecture breaks the long distance into a series of shorter hops to boost the signal by intermediate nodes. Intermediate nodes not only sustain signal strength, but also forward packages on behalf of other nodes based on their knowledge of the network. Such architecture allows continuous connections and reconfiguration around broken or blocked. A typical WMN is illustrated in following Figure. Fig.4.WMN Architecture IV. WNS COMPONENTS There are three types of node in a WMN: WMN client, WMN router, and WMN gateway 4.1 WMN clients These are the end-user devices such as: laptops, PDAs, smart phones, etc that can access the network for using applications like email, VoIP, game, location detection, etc. These devices are assumed to be mobile; they have limited power, they may have routing capability, and may or may not be always connected to the network. 4.2 WMN routers These are in the network to route the network traffic. They cannot terminate nor originate the traffic. The routers have limitation in mobility and they have reliable characteristics. Transmission power consumption in mesh routers is low, for multi-hop communications strategy. Additionally, the Medium Access Control (MAC)
  • 3. Categorization And Selection… www.ijres.org 3 | Page protocol in a mesh router supports multiple-channels and multiple interfaces to enable scalability in a multi-hop mesh environment. 4.3 WMN gateways These are routers with direct access to the wired infrastructure/Internet. Since the gateways in WMNs have multiple interfaces to connect to both wired and wireless networks, they are expensive. Therefore, there are a few number of WMN gateways in the network. Moreover, their placement has a significant impact on the performance of the network. V. APPLICATIONS OF WMNS There are some applications cannot be directed and fully support by other wireless technologies rather than WMNs. It was a motivation to develop WMNs. 5.1 Broadband Wireless Access: Currently, Broadband access has an important role in information economy. It provides services for real time applications such as: video telephony, online-gaming, video on demand, and telecommunications. Each new application has a significant impact on quality of life. For example, Telecommuting can reduce daily travelling of individuals. It leads to increased productivity for the time saving. It also reduces traffic on the streets, thus it has a positive impact on the environment. 5.2 Industrial Applications: Building automation: In a building, there are many devices need to be monitored and controlled like electrical devices including power, light, air conditioner, elevator etc. Today, the wired networks are taking care of such environment. This is very expensive due to the complexity in deployment and maintenance of a wired network. Currently, Wi-Fi networks are another option to reduce the cost of such networks. But, this solution has not achieved satisfactory performance yet for expensive wiring of Ethernet which is needed for Wi-Fi Access Points (APs). 5.3 Hospitality: In hotels and resorts, one of their services is high-speed Internet connectivity which is free. Wireless mesh networks are easy to set-up, lower in cost, and without having to change the existing structures or disrupt business for both indoor and outdoor. VI. CONCLUSION The analytical study of this thesis demonstrates that WMN technology proved to be a revolutionary and modern technology which has remarkable impacts in the field of Telecommunications and Internet Systems. Routing protocols play vital role to increase the credibility of WMNs. The selection of appropriate routing protocol with respect to network improves the efficiency and reliability of network. There are some suggestions regarding analytical study, routing protocols should not be centralized. These should be distributed in nature. Routing protocols used in ad-hoc networks should develop loop free routes; due to loop free environment bandwidth consumption becomes low. Routing protocols should have capability to maintain QOS in terms of different parameters such as delay, load, jitter and throughput etc. Mainly there are two categories of protocols used in WMNs or MANETs i.e. reactive and proactive. Both types of protocols have different utilization in MANETs; both categories have advantages and disadvantages discussed in this thesis. Thus to achieve good results and efficiency in communication according to scenarios and parameters, selection of suitable category of protocol is very important. REFERENCES [1]. Jangeun Jun, Mihail L. Sichitiu, “MRP: Wireless Mesh Networks Routing protocol” Published in: Journal - Computer Communications archive - Volume 31 Issue 7, May, 2008. [2]. Held, Gilbert. Wireless MeshNetwork”. Auerbach Publications, June 23, 2005. R. Draves, J. Padhye, and B. Zill, “Routing in multi-radio, multi-hop wireless mesh networks,” in ACM International Conference on Mobile Computing and Networking (MobiCom), Sept. 2004, pp. 114–128. [3]. Bharat Kumar Addagada, Vineeth Kisara and Kiran Desai,”A Survey: Routing Metrics for Wireless Mesh Networks” May 05, 2009. [4]. V.Srikanth, A.Chenchu Jeevan, B.Avinash, T.Sai kiran, S.Suresh Babu, “A Review of Routing Protocols in Wireless Mesh Networks (WMN)”, International Journal of Computer Applications (0975- 8887) Volume 1-No.11.
  • 4. Categorization And Selection… www.ijres.org 4 | Page [5]. Miguel Elias M. Campista1, Diego G. Passos “Routing Metrics and Protocols for Wireless Mesh Networks” in IEEE Network magazine, vol.22, pp.6-12, Jan/Feb 2008. [6]. Muhammad Shoaib Siddiqui, Choong Seon HongO Department of Computer Engineering, Kyung Hee University “HRP: A Hybrid Routing Protocol for Wireless Mesh Network” [7]. Venkat Mohan.S, Dr. Kasiviswanath.N “Routing Protocols for Wireless Mesh Networks” International Journal of Scientific & Engineering Research Volume 2, Issue 8, August-2011 1 ISSN 2229-5518