SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 642 – 647
_______________________________________________________________________________________________
642
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the
Performance in Mobile Ad-hoc Networks
C.R.Raman
Dept. of CS&SE
Andhra University
Visakhapatnam, AP, India
raman_6858@yahoo.com
Dr.S.Pallam Setty
Dept. of CS&SE
Andhra University
Visakhapatnam, AP, India
drspsetty @gmail.com
Abstract— A Mobile Ad hoc network (MANET) consists of mobile nodes, a router with multiple hosts and wireless communication devices.
Mobile Adhoc Networks can operate without any fixed infrastructure and can survive rapid changes in the network topology. Link failure and
route failure takes place. Provisioning of QoS is a problem in MANETs. TORA is the only protocol which supports either Proactive or Reactive
modes in routing. In this paper, we incorporated the ANFIS to the existing TORA to enhance the performance. Evaluating the performance of
ANFIS-TORA is the simulation by using OPNET MODELLER. Evaluating the relative performance with respect to performance metrics are
Throughput, End-to-End delay, and Network Load. We generate various simulation scenarios with varying network size such as small, medium
and large. In this paper, ANFIS based TORA for MANETs are considered and their performance was analyzed for different network size. From
the simulation results, we conclude that ANFIS based TORA outperforms for small medium and large network. Throughput was increased by
48.27% in small network, 61.29% in medium network and 8.29% in the large network in Reactive mode. In Proactive, the throughput is
increased by 103.46% in small network, 4.58% in medium network and 5.05% in large network.
Keywords- MANET, TORA, Proactive, Reactive, ANFIS-TORA
__________________________________________________*****_________________________________________________
I. INTRODUCTION
The emergence of wireless networks has gone a long way in
solving the growing service demands. The focus of research
and development endeavour has almost shifted from wired
networks to wireless networks. The limitations of wireless
network techniques such as power restrictions high error rate,
bandwidth limitations and other constraints have not lead to the
growth of wireless networks. Mobile Ad-hoc network
(MANET) is one of the most demanding fields in the area of
the wireless network. MANET [1][2][3] consists of mobile
devices or users which are generally known as nodes, and each
one of nodes which are equipped with a radio transceiver.
MANET is a temporary network of wireless mobile nodes
which have no fixed infrastructure. There are no dedicated
routers, servers, access points, base stations, and cables. The
mobile nodes which are within each other’s transmission range
can communicate with each other directly; or else, other nodes
in between can forward the packets if the source and the
destination node are ―out of each other’s range. Every node
acts as a router to forward the packets to other nodes whenever
required [4]. Mobile ad-hoc network is ―infrastructure-less
networks having nodes which can act as a transmitter, router or
receiver [5]. MANETs have a dynamic topology where nodes
are mobile [11]. To monitor the workings of these nodes and
the nature in which they behave while sending, receiving or
forwarding data is classified by a set of rules known as routing
protocols [6].As the organization of the paper is organized as
follows, Section I contains the introduction of MANETs,
Section II explains Temporally Ordered Routing Algorithm,
Section III explains the methodology, Section IV explains
simulation environment, section V explain the performance,
Section VI describes results and conclusion.
II. TEMPORALLY ORDERED ROUTING ALGORITHM
TORA is an adaptive routing protocol for multi-hop
networks that include the following attribute:
* Distributed execution,
* Loop-free routing,
* Multipath routing,
* Reactive or proactive route establishment and maintenance,
and
* Minimization of communication overhead via localization of
algorithmic reaction to topological changes.
TORA [7] is distributed, in that routers need only
maintain information about adjacent routers (i.e., one-hop
knowledge). TORA maintains state on a per-destination basis
like a distance vector routing approach. However, TORA does
not continuously execute a shortest-path computation and thus
the metric used to establish the routing structure does not
represent a distance. The destination-oriented nature of the
routing structure in TORA supports either reactive or
proactive routing on a per-destination basis. During reactive
operation, sources initiate the establishment of routes to a
given destination on-demand. This mode of operation may be
advantageous in a dynamic environment with relatively sparse
traffic patterns, since it may not be necessary to maintain
routes between every source/destination pair at all times.
Concurrently selected destinations can initiate proactive
operation, resembling traditional table-driven routing
approaches. This allows routes to be proactively maintained to
destinations for which routing is frequently required.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 642 – 647
_______________________________________________________________________________________________
643
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
III. METHODOLOGY
ANFIS [8][9] derives its name from Adaptive Neuro-fuzzy
inference system ANFIS constructs a fuzzy inference system
(FIS) whose membership function parameters are tuned
(adjusted) using either a back propagation algorithm alone or
in combination with a least squares type of method. The idea
behind ANFIS is to design a system that utilizes a fuzzy system
to represent the knowledge and use the learning ability of a
neural network to adjust membership function parameters and
linguistic rules directly from data in order to improve system
performance. The ANFIS [10] is used in many fields namely
medicine, manufacturing, industrial, forecasting, delay
prediction in communication networks, decision making, signal
processing and 43 controllers, pattern recognition and
neurological decisions. Therefore, ANFIS may be incorporated
in TORA routing protocol to check the suitability for various
network sizes. TORA considers the defaults constants in the
dynamic environment. The proposed method concentrates on
the Beacon Period value which plays an important role in
calculating dynamic environment, the attribute which specifies
how often the Beacon Packet will be sent out to the neighbor.
The TORA suggests that the BP value should be constant but
does not mention how this value should be adjusted with
network size. The proposed method‖ ANFIS Based TORA
(ANFIS-TORA)‖ suggests that the Beacon Period should be a
suitable value with the Network size. The dynamic value of
beacon period is calculated by using ANFIS by taking network
size and mobility as inputs. We implemented ANFIS-TORA
protocol to enhance the scalability of TORA routing protocol
by using OPNET simulator.
Figure: Loading data in ANFIS
Figure: rule view in ANFIS
IV. SIMULATION ENVIRONMENT
Simulators like NS2, Glomosim, Opnet, and Qualnet etc.,
were developed to evaluate the performance of routing
protocols. The experiments for evaluating the ANFIS-TORA
model were implemented using the OPNET. OPNET [12] is a
network simulator that provides virtual network
communication environment. It is prominent for the research
studies, network modelling and engineering, R & D Operation
and performance analysis. It is extensive and powerful
simulation software with a wide variety of possibilities and
Enables the possibility to simulate entire heterogeneous
networks with various protocols. The simulation parameters
used in the method was given in the table below.
ROUTING PROTOCOL TORA
Area 1000m x 1000m
Nodes 30,60,90
Nodes Placement Random
Mobility Model Random Way Point
Node Transmission Power 0.005mw
Operational mode 802.11b
Data rate 11Mbps
Simulation time 300 sec
Routing mode of operation Proactive, Reactive
Table1: Parametric Values for TORA
V. PERFORMANCE METRICS
Throughput: Throughput means the rate or a number of
successful data packets obtained at the receiver end from the
source node to destination node involving a communication
channel or network. So the higher throughput value means
greater outcomes. Generally, throughput is determined in bits
per seconds (bits/sec).
End to End Delay: End-to-end delay is referred as the amount
of time taken by the packet to reach the destination from the
source node.
Network load: Network load represents the total load in bit/sec
submitted to wireless LAN layers by all higher layers in all
WLAN nodes of the network.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 642 – 647
_______________________________________________________________________________________________
644
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Figure 3: Throughput for Small network in Reactive
mode
Figure 4: Delay for Small network in Reactive
mode
Figure 5: Network Load for Small network in
Reactive mode
Figure 6: Throughput for Medium network in
Reactive mode
Figure 7: Delay for Medium network in Reactive
mode
Figure 8: Network Load for Medium network in
Reactive mode
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 642 – 647
_______________________________________________________________________________________________
645
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Figure 9: Throughput for Large network in
Reactive mode
Figure 10: Delay for Medium network in Reactive
mode
Figure 11: Network Load for Large network in
Reactive model
Figure 12: Throughput for Small network in
Proactive mode
Figure 13: Delay for Small network in Proactive
mode
Figure 14: Network Load for Large network in
Proactive model
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 642 – 647
_______________________________________________________________________________________________
646
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Figure 15: Throughput for Medium network in
Proactive mode
Figure 16: Delay for Medium network in Proactive
mode
Figure 17: Network Load for Medium network in
Proactive model
Figure 18: Throughput for Large network in
Proactive mode
Figure 19: Delay for Large network in
Proactive mode
Figure 20: Network Load for Large network in
Proactive model
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 642 – 647
_______________________________________________________________________________________________
647
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
VI. CONCLUSION
ANFIS based TORA outperforms for Small, Medium,
Large networks when compared to TORA in Reactive Mode
and in Proactive Mode.
Throughput was increased by 48.27% in small
network, 61.29 in the medium network, 8.59% in the larger
network when compared with de-facto TORA in Reactive
Mode.
Throughput was increased by 103.46% in small network,
4.58% in medium network, 5.05% in the larger network when
compared with de-facto TORA in Proactive Mode.
In future, this paper can be enhanced for real time
applications.
REFERENCES
[1] D. P. Agrawal and Q-A Zeng. ―Introduction to Wireless and Mobile
Systems,‖ Brooks/Cole Publishing, ISBN No. 0534-40851-6, 436 pages,
2003.
[2] Siva, C., R. Murthy and B.S. Manoj, 2004. Ad Hoc Wireless Networks
Architectures and Protocols. Prentice Hall.
[3] C.-K. Toh, Ad hoc MobileWireless Networks: Protocols and Systems,
Prentice-Hall PTR, Englewood Cliffs, NJ, 2002.
[4] S. Giordano and W. W. Lu, ―Challenges in mobile ad hoc networking,‖
IEEE Communications Magazine, vol. 39, no. 6, pp. 129–181, June
2001.
[5] Hongbo Zhou, ―A Survey on Routing Protocols in MANETs,‖
Technical. Note March 2003.
[6] E. M. Royer, and C.-K. Toh,―A review of current routing protocols for
ad hoc mobile wireless networks‖, IEEE Personal Communications, Apr.
1999, pp. 46–55.
[7] V. D. Park and M. S. Corson. Temporally-Ordered Routing Algorithm
(TORA) Version 1 Functional Specification. Internet Draft, July 2001.
Available from: http://tools.ietf.org/id/draft-ietf-manet-tora-spec-
04.txt
[8] T. J. Ross, Fuzzy Logic With Engineering Applications. New York:
McGraw-Hill, Inc., 1995.
[9] V.R. Budyal, S.S.Manvi, ―ANFIS and agent based bandwidth and delay
aware anycast routing in mobile ad hoc networks‖, Journal of Network
and Computer Applications 39(2014)140–151, 2013 Elsevier.
[10] Horacio Martinez-Alfaro, Marcos A. Hernandez-Vazquez ―DSR
Protocol Scalability Optimization in Mobile Ad-Hoc Networks With
ANFIS‖, 0-7SOS-7952-7/0S, 2005 IEEE.
[11] A. Nasipuri, R. Castaneda, and S. R. Das, ―Performance of multipath
routing for on-demand protocols in ad hoc networks,‖ Mobile Networks
Application. (MONET) J, vol. 6, no. 4, pp. 339–349, 2001.
[12] OPNET Simulator: http://www.riverbed.com/products/performance-
management-control/opnet.html

More Related Content

What's hot

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
IT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IVIT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IVpkaviya
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...IRJET Journal
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...IRJET Journal
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET Journal
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsprjpublications
 
Wmn Tutorial
Wmn TutorialWmn Tutorial
Wmn Tutorialtritv
 
Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...iosrjce
 

What's hot (18)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
L045037278
L045037278L045037278
L045037278
 
IT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IVIT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IV
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
 
Ad hoc
Ad hocAd hoc
Ad hoc
 
Ismail&&ziko 2003
Ismail&&ziko 2003Ismail&&ziko 2003
Ismail&&ziko 2003
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocols
 
Mobile adhoc
Mobile adhocMobile adhoc
Mobile adhoc
 
Wmn Tutorial
Wmn TutorialWmn Tutorial
Wmn Tutorial
 
Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...
 

Similar to ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance in Mobile Ad-hoc Networks

A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfLaurie Smith
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksIRJET Journal
 
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocolsrahulmonikasharma
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
 
Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...
Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...
Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...rahulmonikasharma
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
 
Evaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsEvaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsIAEME Publication
 
A Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling RouterA Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling RouterIJERA Editor
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
 
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET-	 Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET-	 Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET Journal
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444IJRAT
 

Similar to ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance in Mobile Ad-hoc Networks (20)

A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdf
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 
Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...
Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...
Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
 
Evaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsEvaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocols
 
Ijetr021261
Ijetr021261Ijetr021261
Ijetr021261
 
A340105
A340105A340105
A340105
 
A Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling RouterA Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling Router
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
 
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET-	 Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET-	 Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 

More from rahulmonikasharma

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paperrahulmonikasharma
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Techniquerahulmonikasharma
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 

Recently uploaded

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance in Mobile Ad-hoc Networks

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 642 – 647 _______________________________________________________________________________________________ 642 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance in Mobile Ad-hoc Networks C.R.Raman Dept. of CS&SE Andhra University Visakhapatnam, AP, India raman_6858@yahoo.com Dr.S.Pallam Setty Dept. of CS&SE Andhra University Visakhapatnam, AP, India drspsetty @gmail.com Abstract— A Mobile Ad hoc network (MANET) consists of mobile nodes, a router with multiple hosts and wireless communication devices. Mobile Adhoc Networks can operate without any fixed infrastructure and can survive rapid changes in the network topology. Link failure and route failure takes place. Provisioning of QoS is a problem in MANETs. TORA is the only protocol which supports either Proactive or Reactive modes in routing. In this paper, we incorporated the ANFIS to the existing TORA to enhance the performance. Evaluating the performance of ANFIS-TORA is the simulation by using OPNET MODELLER. Evaluating the relative performance with respect to performance metrics are Throughput, End-to-End delay, and Network Load. We generate various simulation scenarios with varying network size such as small, medium and large. In this paper, ANFIS based TORA for MANETs are considered and their performance was analyzed for different network size. From the simulation results, we conclude that ANFIS based TORA outperforms for small medium and large network. Throughput was increased by 48.27% in small network, 61.29% in medium network and 8.29% in the large network in Reactive mode. In Proactive, the throughput is increased by 103.46% in small network, 4.58% in medium network and 5.05% in large network. Keywords- MANET, TORA, Proactive, Reactive, ANFIS-TORA __________________________________________________*****_________________________________________________ I. INTRODUCTION The emergence of wireless networks has gone a long way in solving the growing service demands. The focus of research and development endeavour has almost shifted from wired networks to wireless networks. The limitations of wireless network techniques such as power restrictions high error rate, bandwidth limitations and other constraints have not lead to the growth of wireless networks. Mobile Ad-hoc network (MANET) is one of the most demanding fields in the area of the wireless network. MANET [1][2][3] consists of mobile devices or users which are generally known as nodes, and each one of nodes which are equipped with a radio transceiver. MANET is a temporary network of wireless mobile nodes which have no fixed infrastructure. There are no dedicated routers, servers, access points, base stations, and cables. The mobile nodes which are within each other’s transmission range can communicate with each other directly; or else, other nodes in between can forward the packets if the source and the destination node are ―out of each other’s range. Every node acts as a router to forward the packets to other nodes whenever required [4]. Mobile ad-hoc network is ―infrastructure-less networks having nodes which can act as a transmitter, router or receiver [5]. MANETs have a dynamic topology where nodes are mobile [11]. To monitor the workings of these nodes and the nature in which they behave while sending, receiving or forwarding data is classified by a set of rules known as routing protocols [6].As the organization of the paper is organized as follows, Section I contains the introduction of MANETs, Section II explains Temporally Ordered Routing Algorithm, Section III explains the methodology, Section IV explains simulation environment, section V explain the performance, Section VI describes results and conclusion. II. TEMPORALLY ORDERED ROUTING ALGORITHM TORA is an adaptive routing protocol for multi-hop networks that include the following attribute: * Distributed execution, * Loop-free routing, * Multipath routing, * Reactive or proactive route establishment and maintenance, and * Minimization of communication overhead via localization of algorithmic reaction to topological changes. TORA [7] is distributed, in that routers need only maintain information about adjacent routers (i.e., one-hop knowledge). TORA maintains state on a per-destination basis like a distance vector routing approach. However, TORA does not continuously execute a shortest-path computation and thus the metric used to establish the routing structure does not represent a distance. The destination-oriented nature of the routing structure in TORA supports either reactive or proactive routing on a per-destination basis. During reactive operation, sources initiate the establishment of routes to a given destination on-demand. This mode of operation may be advantageous in a dynamic environment with relatively sparse traffic patterns, since it may not be necessary to maintain routes between every source/destination pair at all times. Concurrently selected destinations can initiate proactive operation, resembling traditional table-driven routing approaches. This allows routes to be proactively maintained to destinations for which routing is frequently required.
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 642 – 647 _______________________________________________________________________________________________ 643 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ III. METHODOLOGY ANFIS [8][9] derives its name from Adaptive Neuro-fuzzy inference system ANFIS constructs a fuzzy inference system (FIS) whose membership function parameters are tuned (adjusted) using either a back propagation algorithm alone or in combination with a least squares type of method. The idea behind ANFIS is to design a system that utilizes a fuzzy system to represent the knowledge and use the learning ability of a neural network to adjust membership function parameters and linguistic rules directly from data in order to improve system performance. The ANFIS [10] is used in many fields namely medicine, manufacturing, industrial, forecasting, delay prediction in communication networks, decision making, signal processing and 43 controllers, pattern recognition and neurological decisions. Therefore, ANFIS may be incorporated in TORA routing protocol to check the suitability for various network sizes. TORA considers the defaults constants in the dynamic environment. The proposed method concentrates on the Beacon Period value which plays an important role in calculating dynamic environment, the attribute which specifies how often the Beacon Packet will be sent out to the neighbor. The TORA suggests that the BP value should be constant but does not mention how this value should be adjusted with network size. The proposed method‖ ANFIS Based TORA (ANFIS-TORA)‖ suggests that the Beacon Period should be a suitable value with the Network size. The dynamic value of beacon period is calculated by using ANFIS by taking network size and mobility as inputs. We implemented ANFIS-TORA protocol to enhance the scalability of TORA routing protocol by using OPNET simulator. Figure: Loading data in ANFIS Figure: rule view in ANFIS IV. SIMULATION ENVIRONMENT Simulators like NS2, Glomosim, Opnet, and Qualnet etc., were developed to evaluate the performance of routing protocols. The experiments for evaluating the ANFIS-TORA model were implemented using the OPNET. OPNET [12] is a network simulator that provides virtual network communication environment. It is prominent for the research studies, network modelling and engineering, R & D Operation and performance analysis. It is extensive and powerful simulation software with a wide variety of possibilities and Enables the possibility to simulate entire heterogeneous networks with various protocols. The simulation parameters used in the method was given in the table below. ROUTING PROTOCOL TORA Area 1000m x 1000m Nodes 30,60,90 Nodes Placement Random Mobility Model Random Way Point Node Transmission Power 0.005mw Operational mode 802.11b Data rate 11Mbps Simulation time 300 sec Routing mode of operation Proactive, Reactive Table1: Parametric Values for TORA V. PERFORMANCE METRICS Throughput: Throughput means the rate or a number of successful data packets obtained at the receiver end from the source node to destination node involving a communication channel or network. So the higher throughput value means greater outcomes. Generally, throughput is determined in bits per seconds (bits/sec). End to End Delay: End-to-end delay is referred as the amount of time taken by the packet to reach the destination from the source node. Network load: Network load represents the total load in bit/sec submitted to wireless LAN layers by all higher layers in all WLAN nodes of the network.
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 642 – 647 _______________________________________________________________________________________________ 644 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Figure 3: Throughput for Small network in Reactive mode Figure 4: Delay for Small network in Reactive mode Figure 5: Network Load for Small network in Reactive mode Figure 6: Throughput for Medium network in Reactive mode Figure 7: Delay for Medium network in Reactive mode Figure 8: Network Load for Medium network in Reactive mode
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 642 – 647 _______________________________________________________________________________________________ 645 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Figure 9: Throughput for Large network in Reactive mode Figure 10: Delay for Medium network in Reactive mode Figure 11: Network Load for Large network in Reactive model Figure 12: Throughput for Small network in Proactive mode Figure 13: Delay for Small network in Proactive mode Figure 14: Network Load for Large network in Proactive model
  • 5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 642 – 647 _______________________________________________________________________________________________ 646 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Figure 15: Throughput for Medium network in Proactive mode Figure 16: Delay for Medium network in Proactive mode Figure 17: Network Load for Medium network in Proactive model Figure 18: Throughput for Large network in Proactive mode Figure 19: Delay for Large network in Proactive mode Figure 20: Network Load for Large network in Proactive model
  • 6. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 642 – 647 _______________________________________________________________________________________________ 647 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ VI. CONCLUSION ANFIS based TORA outperforms for Small, Medium, Large networks when compared to TORA in Reactive Mode and in Proactive Mode. Throughput was increased by 48.27% in small network, 61.29 in the medium network, 8.59% in the larger network when compared with de-facto TORA in Reactive Mode. Throughput was increased by 103.46% in small network, 4.58% in medium network, 5.05% in the larger network when compared with de-facto TORA in Proactive Mode. In future, this paper can be enhanced for real time applications. REFERENCES [1] D. P. Agrawal and Q-A Zeng. ―Introduction to Wireless and Mobile Systems,‖ Brooks/Cole Publishing, ISBN No. 0534-40851-6, 436 pages, 2003. [2] Siva, C., R. Murthy and B.S. Manoj, 2004. Ad Hoc Wireless Networks Architectures and Protocols. Prentice Hall. [3] C.-K. Toh, Ad hoc MobileWireless Networks: Protocols and Systems, Prentice-Hall PTR, Englewood Cliffs, NJ, 2002. [4] S. Giordano and W. W. Lu, ―Challenges in mobile ad hoc networking,‖ IEEE Communications Magazine, vol. 39, no. 6, pp. 129–181, June 2001. [5] Hongbo Zhou, ―A Survey on Routing Protocols in MANETs,‖ Technical. Note March 2003. [6] E. M. Royer, and C.-K. Toh,―A review of current routing protocols for ad hoc mobile wireless networks‖, IEEE Personal Communications, Apr. 1999, pp. 46–55. [7] V. D. Park and M. S. Corson. Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification. Internet Draft, July 2001. Available from: http://tools.ietf.org/id/draft-ietf-manet-tora-spec- 04.txt [8] T. J. Ross, Fuzzy Logic With Engineering Applications. New York: McGraw-Hill, Inc., 1995. [9] V.R. Budyal, S.S.Manvi, ―ANFIS and agent based bandwidth and delay aware anycast routing in mobile ad hoc networks‖, Journal of Network and Computer Applications 39(2014)140–151, 2013 Elsevier. [10] Horacio Martinez-Alfaro, Marcos A. Hernandez-Vazquez ―DSR Protocol Scalability Optimization in Mobile Ad-Hoc Networks With ANFIS‖, 0-7SOS-7952-7/0S, 2005 IEEE. [11] A. Nasipuri, R. Castaneda, and S. R. Das, ―Performance of multipath routing for on-demand protocols in ad hoc networks,‖ Mobile Networks Application. (MONET) J, vol. 6, no. 4, pp. 339–349, 2001. [12] OPNET Simulator: http://www.riverbed.com/products/performance- management-control/opnet.html