SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 1, Ver. III (Jan - Feb. 2015), PP 05-08
www.iosrjournals.org
DOI: 10.9790/2834-10130508 www.iosrjournals.org 5 | Page
Cooperative Data Forwarding In AODV Routing Protocol
Sarath Menon1
Mr. Jose Anand 2
KCG College of Technology, Karapakkam, Chennai - 600097.
Abstract: A Wireless sensor Network uses thousands of miniature devices that communicate among each other
and sense data from the environment. The success of the communication in a WSN inherently lies in the routing
protocol used by the architecture. This work enables reliable communication for Reactive Routing Protocol
such as, Ad hoc On-demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) in Wireless
Sensor Networks. These protocols are on-demand routing protocols and has the capability to only detect Link
Failures. This hampers the packet delivery ratio and increases the end-to-end delay. AODV Protocol when
faced with a link failure condition has the source node reinitiate the route discovery phase by broadcasting
Route Request Messages to its neighbours without considering the affected link. The system calls for a Reliable
Reactive Routing Enhancement (R3E) as an extension over the AODV protocol. Here the nodes maintain a list
of forwarding candidates and their priorities with the help of routing table enabling forwarding of data towards
destination as per node priority and thereby removing the need for re-initiation of route discovery phase. Thus
R3E successfully augments the aforementioned AODV protocol, thereby improving the packet delivery ratio and
also achieving a significant reduction in end-to-end delay in the Wireless Sensor Network.
Keywords: Wireless Sensor Networks, Ad-Hoc On Demand distance Vector, Dynamic Source Routing, Link
Failure.
I. Introduction
Wireless Sensor Networks
Wireless Sensor Networks (WSN) can be defined as a computer network consisting of thousands of
miniature devices capable of computation, communication and sensing data from its environment. They
represent the next big step in creating the smart environment. The success of the smart environment depends on
the sensory data and hence the WSN’s. They provide a bridge between the physical and virtual worlds. The
challenges in the hierarchy of detecting the relevant quantities, monitoring and collecting the data, assessing and
evaluating the information, formulating meaningful user displays and performing decision-making and alarm
functions are enormous.
II. Components In Wireless Sensor Networks
The Fig 1.1 shows the various components in the WSN. Typically WSNs contain hundreds or
thousands of sensor nodes, and these sensors have the ability to communicate either among each other or
directly to an external base station (BS). A greater number of sensors allows for sensing over larger
geographical regions with greater accuracy. Basically each sensor node comprises sensing, processing,
transmission, mobilizer, position finding system, and power units (some of these components are optional, like
the mobilizer). Sensor nodes are usually scattered in a sensor field, which is an area where the sensor nodes are
deployed. Sensor nodes coordinate among themselves to produce high-quality information about the physical
environment. Each sensor node bases its decisions on its mission, the information it currently has, and its
knowledge of its computing, communication and energy resources. Each of these scattered sensor nodes has the
capability to collect and route data either to other sensors or back to an external BS(s). A BS may be a fixed or a
mobile node capable of connecting the sensor network to an existing communications infrastructure or to the
Internet where a user can have access to the reported data.
Fig 1.1 Components in WSN
Cooperative Data Forwarding In AODV Routing Protocol
DOI: 10.9790/2834-10130508 www.iosrjournals.org 6 | Page
III. Routing In Wsn
Routing in WSNs is very challenging due to the inherent characteristics that distinguish these networks
from other wireless networks like mobile ad hoc networks or cellular networks. First, due to the relatively large
number of sensor nodes, it is not possible to build a global addressing scheme for the deployment of a large
number of sensor nodes as the overhead of ID maintenance is high. Thus traditional IP-based protocols may not
be applied to WSNs. Furthermore sensor nodes that are deployed in an ad hoc manner need to be self-organizing
as the ad hoc deployment of these nodes requires the system to form connections and cope with the resultant
nodal distribution, especially as the operation of sensor networks is unattended. In WSNs sometimes getting the
data is more important than knowing the IDs of which nodes sent the data. Second in contrast to typical
communication networks almost all applications of sensor networks require the flow of sensed data from
multiple sources to a particular BS. This however does not prevent the flow of data to be in other forms (e.g.,
multicast or peer to peer). Third sensor nodes are tightly constrained in terms of energy, processing and storage
capacities. Thus they require careful resource management. Fourth in most application scenarios nodes in WSNs
are generally stationary after deployment except for maybe a few mobile nodes. Nodes in other traditional
wireless networks are free to move which results in unpredictable and frequent topological changes. However in
some applications some sensor nodes may be allowed to move and change their location (although with very
low mobility). Fifth sensor networks are application-specific. Sixth position awareness of sensor nodes is
important since data collection is normally based on the location. Finally data collected by many sensors in
WSNs is typically based on common phenomena, so there is a high probability that this data has some
redundancy. Such redundancy needs to be exploited by the routing protocols to improve energy and bandwidth
utilization. Usually WSNs are data centric networks in the sense that data is requested based on certain
attributes.
IV. Existing System
Ad Hoc On Demand Distance Vector Routing is the most prominently used reactive routing protocol in
wireless sensor networks. This protocol has the ability to detect only the link failure condition in the network.
Link failure conditions are detected by the absence of HELLO messages between the neighbour nodes in the
network. Thus in case of link failure condition in the network the source node again reinitiates the route
discovery phase by flooding the network with Route request packet. This hampers the throughput and the packet
delivery ratio (PDR), while the end to end delay is also on the ascendancy.
V. Proposed System
The system calls for augmenting the existing AODV routing protocol with a concept of Reliable
Routing Reactive Routing (R3E). This concept is used as an extension to the AODV routing protocol which
enables the network to bypass the link failure condition. Thereby during a link failure condition the source node
greedily progresses the data towards the destination using the guide path. Thus there is no need for the source
node to re- initiate the route discovery phase in case of link failure. This increases the throughput, packet
delivery ratio (PDR) while reducing the end to end delay in the network.
Reliable Reactive Routing Enhancement (R3E)
The project proposes an idea of R3E which is used as an extension over the AODV protocol. This
enhances the AODV routing protocol to provide reliable and energy efficient packet delivery against the
condition of Link Failure which may occur in a wireless sensor network.
Fig 1.2 shows the functional architecture overview of R3E. It is a middle-ware design across the MAC
and the network layer. The R3E enhancement layer module consists of three main modules. They are Reliable
Route discovery module, potential forwarder selection and prioritization module and forwarding selection
module. The reliable route discovery module finds and maintains the route information for each node. The other
two modules are responsible for the runtime forwarding phase. Forwarding decision module will check whether
the node receiving a packet is one of the intended receivers if it is true then the node will cache the incoming
packet. The potential forwarder selection and prioritization module attaches the ordered forwarder list in the
data packet header for the next hop. Lately the outgoing packet will be submitted to the MAC layer and
forwarded towards the destination.
Cooperative Data Forwarding In AODV Routing Protocol
DOI: 10.9790/2834-10130508 www.iosrjournals.org 7 | Page
Fig 1.2 Functional Architecture overview of R3E
AODV-R3E Implementation
Fig 1.3 AODV-R3E Implementation
Fig 1.3 shows the steps followed to implement the R3E protocol over the AODV Routing Protocol.
Creation of c/c++ files in the folder is the primary step in this process. Modifying the files in NS2 is done so that
the system can recognize the R3E protocol in the simulation. Registration of packet header is done in c++ so
that the simulator will recognize the above idea. Modification of the existing AODV protocol is done.
Modification is done with the existing header files and there is a need to add some extra header files as well
which will take care of the node priority TTL expiration cases and routing table updation. Connection of
interfacing queue and routing agent to each other is essential. Last step is to add new compile options to the
―Make- file‖ and rebuild the NS2 software.
AODV-R3E
R3E is implemented with the AODV routing protocol to achieve AODV-R3E. It acts along with the
AODV routing protocol and enhances its resilience to the condition of link failure. Source Node wishes to send
data to the destination node. It first checks its routing table to find the neighbouring nodes and broadcasts RREQ
packets to them. The intermediate node then broadcasts the RREQ packet to downstream nodes. This is done till
the packet reaches the destination node or the node that is one hop path away from the destination. This node
sends Route Reply packet to the source node through the intermediate nodes. A Source node will get many
Route Request packets. It will accept one of them and will reject all others. The data forwarding will happen
along the way that was traversed by the Route Reply packet. In case a link failure occurs in the network which is
indicated by profound drop in packets or the absence of beacon signals in the network. In the above case the
source node refers to its routing table and will forward the packet to the next preferable neighbour nodes and in
this way the packet from the source to destination will reach without using the broken link and without
undergoing the process of Route discovery again. This can happen as long as the data forwarding is between the
same source- destination pair. In case some other node wants to send the data towards a destination node it
should be done only after Route discovery phase.
VI. Results And Analysis
The reliable Reactive Routing Enhancement (R3E) is implemented over the AODV routing protocol. Simulation
is carried out in NS-2.29 for two cases namely
1) Link failure condition in AODV Routing Protocol.
2) Link failure condition in AODV-R3E Routing Protocol.
It is seen that in case of the link failure condition in the network AODV-R3E greedily progresses the data
towards the destination as opposed to the AODV Routing Protocol. AODV- R3E does not have the source node
Cooperative Data Forwarding In AODV Routing Protocol
DOI: 10.9790/2834-10130508 www.iosrjournals.org 8 | Page
reinitiate the route discovery phase in the above scenario. While for AODV Routing Protocol Route discovery
phase is an essentiality in case of link failure condition in the network.
Comparison
Simulation was done for the above scenarios. The Graph was plotted for 3 parameters throughput,
packet delivery ratio and end to end delay taken in y-axis vs increasing node density taken on x axis. The
comparison is given in the form of a table given below.
Parameters AODV AODV-R3E
Throughput 0.9Mbps 5.5 Mbps
End to end delay (Min) 20 ms 12 ms
Packet delivery ratio 90% 100%
VII. Conclusion
The Proposed R3E protocol served as an efficient Protocol acting as an extension to the AODV
Routing protocol as figuratively indicated by the Table. It increased the resilience of the network against the
condition of link failure. It reduced the end to end delay and did appreciably well in increasing the Throughput
and the Packet delivery Ratio as compared with the aforementioned Ad hoc On Demand Routing Protocol.
Future Work
The future work will focus on introducing the Concept of Intrusion detection System (IDS) by
implementing the idea of Enhanced Adaptive ACKnowledgement(EAACK).This system will focus on ideas to
protect the network from malicious attack of the nodes in the network itself. Thus it will make the network
robust against any intruder that may be encountered by the network.
References
[1]. Vehbi Cagri, Gungor, Özgür B. Akan and Ian F. Akyildiz, (April 2008), ―A Real-Time and Reliable Transport (RT)2
Protocol for
Wireless Sensor and Actor Networks‖, IEEE Trans. Networking,Vol.16,No.2, pp. 359-370.
[2]. X. Huang, H. Zhai, and Y. Fang, (Dec 2008), ―Robust cooperative routing protocol in mobile wireless sensor networks‖, IEEE
Trans. Wireless Commun., Vol. 7, No. 12, pp. 5278–5285.
[3]. Xufei Mao, Shaojie Tang, Xiahua Xu, Xiang-Yang Li and Huadong Ma, (Nov 2011), ―Energy Efficient Opportunistic Routing in
Wireless Sensor Networks‖, IEEE Trans. Parallel and Distrib. Syst., Vol. 22, No. 11, pp 1934-1942.
[4]. Jianwei Niu, Long Cheng, Yu Gu, Lei Shu and Sajal K. Das, (Feb 2014), ―R3E: Reliable Reactive Routing Enhancement for
Wireless Sensor Networks‖, IEEE Trans. Industrial informatics, Vol.10, No.1, pp. 784-794.
[5]. Eric Rozner, Jayesh Seshadri, Yogita Ashok Mehta and Lili Qiu, (Dec 2009) ―Soar: Simple opportunistic adaptive routing protocol
for wireless mesh networks‖, IEEE Trans. Mobile Comput., Vol. 8, No. 12 pp. 1622–1635.
[6]. Elhadi M. Shakshuki, , Nan Kang and Tarek R. Sheltami, (March 2013), ―EAACK—A Secure Intrusion-Detection System for
MANETs‖, IEEE Trans Industrial Electronics, VOL. 60, NO. 3, pp 1089-1098.

More Related Content

What's hot

Wireless sensor network
Wireless sensor network  Wireless sensor network
Wireless sensor network Sandeep Kumar
 
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...IAEME Publication
 
The detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksThe detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksiaemedu
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 
Qualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSNQualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSNEswar Publications
 
Routing protocols
Routing protocolsRouting protocols
Routing protocolsmehulpatira
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksDarpan Dekivadiya
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
 

What's hot (18)

Mw2522122216
Mw2522122216Mw2522122216
Mw2522122216
 
E0942531
E0942531E0942531
E0942531
 
Wireless sensor network
Wireless sensor network  Wireless sensor network
Wireless sensor network
 
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
 
The detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksThe detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networks
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
Qualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSNQualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSN
 
Mane ts
Mane tsMane ts
Mane ts
 
011001010 a
011001010 a011001010 a
011001010 a
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Cw25585588
Cw25585588Cw25585588
Cw25585588
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 

Viewers also liked

Lace cocktail dresses gudeer.com
Lace cocktail dresses   gudeer.comLace cocktail dresses   gudeer.com
Lace cocktail dresses gudeer.comGudeer Kitty
 
IT PRODUK TERTENTU - MAINAN ANAK-ANAK
IT PRODUK TERTENTU - MAINAN ANAK-ANAKIT PRODUK TERTENTU - MAINAN ANAK-ANAK
IT PRODUK TERTENTU - MAINAN ANAK-ANAKlegalservice
 
Matrix Transformations on Some Difference Sequence Spaces
Matrix Transformations on Some Difference Sequence SpacesMatrix Transformations on Some Difference Sequence Spaces
Matrix Transformations on Some Difference Sequence SpacesIOSR Journals
 
NKY Tri-ED Kenton County Community Meeting Presentation
NKY Tri-ED Kenton County Community Meeting PresentationNKY Tri-ED Kenton County Community Meeting Presentation
NKY Tri-ED Kenton County Community Meeting PresentationKate Ferrer
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentationmjwilson144
 
Broadband Availability Near NYS Capitol (albany, columbia & greene counties)
Broadband Availability Near NYS Capitol (albany, columbia & greene counties)Broadband Availability Near NYS Capitol (albany, columbia & greene counties)
Broadband Availability Near NYS Capitol (albany, columbia & greene counties)Rich Frank
 
Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02
Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02
Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02Marioly Ch
 

Viewers also liked (20)

Lace cocktail dresses gudeer.com
Lace cocktail dresses   gudeer.comLace cocktail dresses   gudeer.com
Lace cocktail dresses gudeer.com
 
IT PRODUK TERTENTU - MAINAN ANAK-ANAK
IT PRODUK TERTENTU - MAINAN ANAK-ANAKIT PRODUK TERTENTU - MAINAN ANAK-ANAK
IT PRODUK TERTENTU - MAINAN ANAK-ANAK
 
Matrix Transformations on Some Difference Sequence Spaces
Matrix Transformations on Some Difference Sequence SpacesMatrix Transformations on Some Difference Sequence Spaces
Matrix Transformations on Some Difference Sequence Spaces
 
NKY Tri-ED Kenton County Community Meeting Presentation
NKY Tri-ED Kenton County Community Meeting PresentationNKY Tri-ED Kenton County Community Meeting Presentation
NKY Tri-ED Kenton County Community Meeting Presentation
 
H1803064257
H1803064257H1803064257
H1803064257
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Broadband Availability Near NYS Capitol (albany, columbia & greene counties)
Broadband Availability Near NYS Capitol (albany, columbia & greene counties)Broadband Availability Near NYS Capitol (albany, columbia & greene counties)
Broadband Availability Near NYS Capitol (albany, columbia & greene counties)
 
S01725119124
S01725119124S01725119124
S01725119124
 
K018137073
K018137073K018137073
K018137073
 
D1303041618
D1303041618D1303041618
D1303041618
 
J017625966
J017625966J017625966
J017625966
 
Mt Everest - pics
Mt Everest - picsMt Everest - pics
Mt Everest - pics
 
I017265357
I017265357I017265357
I017265357
 
H017376369
H017376369H017376369
H017376369
 
J1303045360
J1303045360J1303045360
J1303045360
 
A010430108
A010430108A010430108
A010430108
 
E018122530
E018122530E018122530
E018122530
 
B1302030812
B1302030812B1302030812
B1302030812
 
Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02
Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02
Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02
 
Technology Commercialization Center (Russian presentation)
Technology Commercialization Center (Russian presentation)Technology Commercialization Center (Russian presentation)
Technology Commercialization Center (Russian presentation)
 

Similar to B010130508

Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksIRJET Journal
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...IRJET Journal
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
 
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Eswar Publications
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsidescitation
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...IRJET Journal
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...IRJET Journal
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxGomathi454280
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxGomathi454280
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxGeetha336913
 

Similar to B010130508 (20)

Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
 
C017371624
C017371624C017371624
C017371624
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
 
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
 
2 sima singh-6-13
2 sima singh-6-132 sima singh-6-13
2 sima singh-6-13
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

B010130508

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 1, Ver. III (Jan - Feb. 2015), PP 05-08 www.iosrjournals.org DOI: 10.9790/2834-10130508 www.iosrjournals.org 5 | Page Cooperative Data Forwarding In AODV Routing Protocol Sarath Menon1 Mr. Jose Anand 2 KCG College of Technology, Karapakkam, Chennai - 600097. Abstract: A Wireless sensor Network uses thousands of miniature devices that communicate among each other and sense data from the environment. The success of the communication in a WSN inherently lies in the routing protocol used by the architecture. This work enables reliable communication for Reactive Routing Protocol such as, Ad hoc On-demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) in Wireless Sensor Networks. These protocols are on-demand routing protocols and has the capability to only detect Link Failures. This hampers the packet delivery ratio and increases the end-to-end delay. AODV Protocol when faced with a link failure condition has the source node reinitiate the route discovery phase by broadcasting Route Request Messages to its neighbours without considering the affected link. The system calls for a Reliable Reactive Routing Enhancement (R3E) as an extension over the AODV protocol. Here the nodes maintain a list of forwarding candidates and their priorities with the help of routing table enabling forwarding of data towards destination as per node priority and thereby removing the need for re-initiation of route discovery phase. Thus R3E successfully augments the aforementioned AODV protocol, thereby improving the packet delivery ratio and also achieving a significant reduction in end-to-end delay in the Wireless Sensor Network. Keywords: Wireless Sensor Networks, Ad-Hoc On Demand distance Vector, Dynamic Source Routing, Link Failure. I. Introduction Wireless Sensor Networks Wireless Sensor Networks (WSN) can be defined as a computer network consisting of thousands of miniature devices capable of computation, communication and sensing data from its environment. They represent the next big step in creating the smart environment. The success of the smart environment depends on the sensory data and hence the WSN’s. They provide a bridge between the physical and virtual worlds. The challenges in the hierarchy of detecting the relevant quantities, monitoring and collecting the data, assessing and evaluating the information, formulating meaningful user displays and performing decision-making and alarm functions are enormous. II. Components In Wireless Sensor Networks The Fig 1.1 shows the various components in the WSN. Typically WSNs contain hundreds or thousands of sensor nodes, and these sensors have the ability to communicate either among each other or directly to an external base station (BS). A greater number of sensors allows for sensing over larger geographical regions with greater accuracy. Basically each sensor node comprises sensing, processing, transmission, mobilizer, position finding system, and power units (some of these components are optional, like the mobilizer). Sensor nodes are usually scattered in a sensor field, which is an area where the sensor nodes are deployed. Sensor nodes coordinate among themselves to produce high-quality information about the physical environment. Each sensor node bases its decisions on its mission, the information it currently has, and its knowledge of its computing, communication and energy resources. Each of these scattered sensor nodes has the capability to collect and route data either to other sensors or back to an external BS(s). A BS may be a fixed or a mobile node capable of connecting the sensor network to an existing communications infrastructure or to the Internet where a user can have access to the reported data. Fig 1.1 Components in WSN
  • 2. Cooperative Data Forwarding In AODV Routing Protocol DOI: 10.9790/2834-10130508 www.iosrjournals.org 6 | Page III. Routing In Wsn Routing in WSNs is very challenging due to the inherent characteristics that distinguish these networks from other wireless networks like mobile ad hoc networks or cellular networks. First, due to the relatively large number of sensor nodes, it is not possible to build a global addressing scheme for the deployment of a large number of sensor nodes as the overhead of ID maintenance is high. Thus traditional IP-based protocols may not be applied to WSNs. Furthermore sensor nodes that are deployed in an ad hoc manner need to be self-organizing as the ad hoc deployment of these nodes requires the system to form connections and cope with the resultant nodal distribution, especially as the operation of sensor networks is unattended. In WSNs sometimes getting the data is more important than knowing the IDs of which nodes sent the data. Second in contrast to typical communication networks almost all applications of sensor networks require the flow of sensed data from multiple sources to a particular BS. This however does not prevent the flow of data to be in other forms (e.g., multicast or peer to peer). Third sensor nodes are tightly constrained in terms of energy, processing and storage capacities. Thus they require careful resource management. Fourth in most application scenarios nodes in WSNs are generally stationary after deployment except for maybe a few mobile nodes. Nodes in other traditional wireless networks are free to move which results in unpredictable and frequent topological changes. However in some applications some sensor nodes may be allowed to move and change their location (although with very low mobility). Fifth sensor networks are application-specific. Sixth position awareness of sensor nodes is important since data collection is normally based on the location. Finally data collected by many sensors in WSNs is typically based on common phenomena, so there is a high probability that this data has some redundancy. Such redundancy needs to be exploited by the routing protocols to improve energy and bandwidth utilization. Usually WSNs are data centric networks in the sense that data is requested based on certain attributes. IV. Existing System Ad Hoc On Demand Distance Vector Routing is the most prominently used reactive routing protocol in wireless sensor networks. This protocol has the ability to detect only the link failure condition in the network. Link failure conditions are detected by the absence of HELLO messages between the neighbour nodes in the network. Thus in case of link failure condition in the network the source node again reinitiates the route discovery phase by flooding the network with Route request packet. This hampers the throughput and the packet delivery ratio (PDR), while the end to end delay is also on the ascendancy. V. Proposed System The system calls for augmenting the existing AODV routing protocol with a concept of Reliable Routing Reactive Routing (R3E). This concept is used as an extension to the AODV routing protocol which enables the network to bypass the link failure condition. Thereby during a link failure condition the source node greedily progresses the data towards the destination using the guide path. Thus there is no need for the source node to re- initiate the route discovery phase in case of link failure. This increases the throughput, packet delivery ratio (PDR) while reducing the end to end delay in the network. Reliable Reactive Routing Enhancement (R3E) The project proposes an idea of R3E which is used as an extension over the AODV protocol. This enhances the AODV routing protocol to provide reliable and energy efficient packet delivery against the condition of Link Failure which may occur in a wireless sensor network. Fig 1.2 shows the functional architecture overview of R3E. It is a middle-ware design across the MAC and the network layer. The R3E enhancement layer module consists of three main modules. They are Reliable Route discovery module, potential forwarder selection and prioritization module and forwarding selection module. The reliable route discovery module finds and maintains the route information for each node. The other two modules are responsible for the runtime forwarding phase. Forwarding decision module will check whether the node receiving a packet is one of the intended receivers if it is true then the node will cache the incoming packet. The potential forwarder selection and prioritization module attaches the ordered forwarder list in the data packet header for the next hop. Lately the outgoing packet will be submitted to the MAC layer and forwarded towards the destination.
  • 3. Cooperative Data Forwarding In AODV Routing Protocol DOI: 10.9790/2834-10130508 www.iosrjournals.org 7 | Page Fig 1.2 Functional Architecture overview of R3E AODV-R3E Implementation Fig 1.3 AODV-R3E Implementation Fig 1.3 shows the steps followed to implement the R3E protocol over the AODV Routing Protocol. Creation of c/c++ files in the folder is the primary step in this process. Modifying the files in NS2 is done so that the system can recognize the R3E protocol in the simulation. Registration of packet header is done in c++ so that the simulator will recognize the above idea. Modification of the existing AODV protocol is done. Modification is done with the existing header files and there is a need to add some extra header files as well which will take care of the node priority TTL expiration cases and routing table updation. Connection of interfacing queue and routing agent to each other is essential. Last step is to add new compile options to the ―Make- file‖ and rebuild the NS2 software. AODV-R3E R3E is implemented with the AODV routing protocol to achieve AODV-R3E. It acts along with the AODV routing protocol and enhances its resilience to the condition of link failure. Source Node wishes to send data to the destination node. It first checks its routing table to find the neighbouring nodes and broadcasts RREQ packets to them. The intermediate node then broadcasts the RREQ packet to downstream nodes. This is done till the packet reaches the destination node or the node that is one hop path away from the destination. This node sends Route Reply packet to the source node through the intermediate nodes. A Source node will get many Route Request packets. It will accept one of them and will reject all others. The data forwarding will happen along the way that was traversed by the Route Reply packet. In case a link failure occurs in the network which is indicated by profound drop in packets or the absence of beacon signals in the network. In the above case the source node refers to its routing table and will forward the packet to the next preferable neighbour nodes and in this way the packet from the source to destination will reach without using the broken link and without undergoing the process of Route discovery again. This can happen as long as the data forwarding is between the same source- destination pair. In case some other node wants to send the data towards a destination node it should be done only after Route discovery phase. VI. Results And Analysis The reliable Reactive Routing Enhancement (R3E) is implemented over the AODV routing protocol. Simulation is carried out in NS-2.29 for two cases namely 1) Link failure condition in AODV Routing Protocol. 2) Link failure condition in AODV-R3E Routing Protocol. It is seen that in case of the link failure condition in the network AODV-R3E greedily progresses the data towards the destination as opposed to the AODV Routing Protocol. AODV- R3E does not have the source node
  • 4. Cooperative Data Forwarding In AODV Routing Protocol DOI: 10.9790/2834-10130508 www.iosrjournals.org 8 | Page reinitiate the route discovery phase in the above scenario. While for AODV Routing Protocol Route discovery phase is an essentiality in case of link failure condition in the network. Comparison Simulation was done for the above scenarios. The Graph was plotted for 3 parameters throughput, packet delivery ratio and end to end delay taken in y-axis vs increasing node density taken on x axis. The comparison is given in the form of a table given below. Parameters AODV AODV-R3E Throughput 0.9Mbps 5.5 Mbps End to end delay (Min) 20 ms 12 ms Packet delivery ratio 90% 100% VII. Conclusion The Proposed R3E protocol served as an efficient Protocol acting as an extension to the AODV Routing protocol as figuratively indicated by the Table. It increased the resilience of the network against the condition of link failure. It reduced the end to end delay and did appreciably well in increasing the Throughput and the Packet delivery Ratio as compared with the aforementioned Ad hoc On Demand Routing Protocol. Future Work The future work will focus on introducing the Concept of Intrusion detection System (IDS) by implementing the idea of Enhanced Adaptive ACKnowledgement(EAACK).This system will focus on ideas to protect the network from malicious attack of the nodes in the network itself. Thus it will make the network robust against any intruder that may be encountered by the network. References [1]. Vehbi Cagri, Gungor, Özgür B. Akan and Ian F. Akyildiz, (April 2008), ―A Real-Time and Reliable Transport (RT)2 Protocol for Wireless Sensor and Actor Networks‖, IEEE Trans. Networking,Vol.16,No.2, pp. 359-370. [2]. X. Huang, H. Zhai, and Y. Fang, (Dec 2008), ―Robust cooperative routing protocol in mobile wireless sensor networks‖, IEEE Trans. Wireless Commun., Vol. 7, No. 12, pp. 5278–5285. [3]. Xufei Mao, Shaojie Tang, Xiahua Xu, Xiang-Yang Li and Huadong Ma, (Nov 2011), ―Energy Efficient Opportunistic Routing in Wireless Sensor Networks‖, IEEE Trans. Parallel and Distrib. Syst., Vol. 22, No. 11, pp 1934-1942. [4]. Jianwei Niu, Long Cheng, Yu Gu, Lei Shu and Sajal K. Das, (Feb 2014), ―R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Networks‖, IEEE Trans. Industrial informatics, Vol.10, No.1, pp. 784-794. [5]. Eric Rozner, Jayesh Seshadri, Yogita Ashok Mehta and Lili Qiu, (Dec 2009) ―Soar: Simple opportunistic adaptive routing protocol for wireless mesh networks‖, IEEE Trans. Mobile Comput., Vol. 8, No. 12 pp. 1622–1635. [6]. Elhadi M. Shakshuki, , Nan Kang and Tarek R. Sheltami, (March 2013), ―EAACK—A Secure Intrusion-Detection System for MANETs‖, IEEE Trans Industrial Electronics, VOL. 60, NO. 3, pp 1089-1098.