COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as a router, forwarding information packets for other mobile nodes. There are many routing protocols that possess different performance levels in different scenarios. The main task is to evaluate the existing routing
protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV, OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational conditions for each MANETs protocol. We study these five MANETs routing protocols by different simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay, Normalized Routing Load and Average Throughput.
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
MANET is a temporary connection of mobile nodes via wireless links having no centralized base station.
We developed a protocol with an enhanced route discovery mechanism that avoids the pre-transmission
delay. When a source node wants to communicate with another node, it broadcast RREQ. EAODV give
priority to the source node of real time transmission. When RREQ packet send to neighbor node, for real
time transmission it accept route request on priority basis and the drop ratio of packets decreased, then
throughput increases by receiving more packets at destination and delivery ratio also increased through
these QOS improved.
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
Mobile Ad-hoc Network is a kind of wireless network. It is a backbone of new generation advanced communication technology. MANET is an ideal applicant for rescue and emergency situation due to its independence of connected devices of fixed wires. This paper represents a work on trust based system in MANET cluster that can be used to improve the performance of the network even in the existence of not trusted nodes. In the cluster architecture, cluster head and gateway nodes form a communication for routing among neighbouring clusters. But selection of cluster head is the important problem in dynamic Ad-hoc network because cluster head work as coordinator in clustered architecture. In this work, some values have used correspond to the threshold values of forward packet and dropped packet of each node within the network cluster. These values have been used dynamically updated every time and the node is selected as cluster head. In this technique of selecting the node as cluster head, the node which has maximum trusted value is elected as cluster head and this information is updated in every node’s trusted table. After implementation of our desired work, the proposed Dynamic Trust Evaluation of Cluster Head (DTE-CH) technique is analysed with traditional routing protocols and traditional clustering technique viz. Highest Degree Algorithm. The simulation is done by using network simulator software on the basis of different performance metrics throughput, packet delivery ratio, routing overhead, packet drop, average end to end delay and remain energy. Simulation result presents that proposed DTE-CH technique improves the performance of network as compare to most suitable existing AODV MANET protocol based technique as well as traditional highest degree clustering technique.
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as a router, forwarding information packets for other mobile nodes. There are many routing protocols that possess different performance levels in different scenarios. The main task is to evaluate the existing routing
protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV, OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational conditions for each MANETs protocol. We study these five MANETs routing protocols by different simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay, Normalized Routing Load and Average Throughput.
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
MANET is a temporary connection of mobile nodes via wireless links having no centralized base station.
We developed a protocol with an enhanced route discovery mechanism that avoids the pre-transmission
delay. When a source node wants to communicate with another node, it broadcast RREQ. EAODV give
priority to the source node of real time transmission. When RREQ packet send to neighbor node, for real
time transmission it accept route request on priority basis and the drop ratio of packets decreased, then
throughput increases by receiving more packets at destination and delivery ratio also increased through
these QOS improved.
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
Mobile Ad-hoc Network is a kind of wireless network. It is a backbone of new generation advanced communication technology. MANET is an ideal applicant for rescue and emergency situation due to its independence of connected devices of fixed wires. This paper represents a work on trust based system in MANET cluster that can be used to improve the performance of the network even in the existence of not trusted nodes. In the cluster architecture, cluster head and gateway nodes form a communication for routing among neighbouring clusters. But selection of cluster head is the important problem in dynamic Ad-hoc network because cluster head work as coordinator in clustered architecture. In this work, some values have used correspond to the threshold values of forward packet and dropped packet of each node within the network cluster. These values have been used dynamically updated every time and the node is selected as cluster head. In this technique of selecting the node as cluster head, the node which has maximum trusted value is elected as cluster head and this information is updated in every node’s trusted table. After implementation of our desired work, the proposed Dynamic Trust Evaluation of Cluster Head (DTE-CH) technique is analysed with traditional routing protocols and traditional clustering technique viz. Highest Degree Algorithm. The simulation is done by using network simulator software on the basis of different performance metrics throughput, packet delivery ratio, routing overhead, packet drop, average end to end delay and remain energy. Simulation result presents that proposed DTE-CH technique improves the performance of network as compare to most suitable existing AODV MANET protocol based technique as well as traditional highest degree clustering technique.
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...cscpconf
In VANET high speed is the real characteristics which leads to frequent breakdown,
interference etc. Therefore Performance of adhoc routing protocols is helpful to improve the
Quality of Service (QOS). In this paper we studied various adhoc routing protocols, Reactive,
Proactive & Hybrid, taking in to consideration parameters like speed, altitude, mobility etc in
real VANET scenario. The AODV and DYMO (Reactive), OLSR (Proactive) and ZRP (hybrid)
protocols are compared for IEEE 802.11(MAC) and IEEE 802.11(DCF) standard using
Qualnet as a Simulation tool. Since IEEE 802.11, covers both physical and data link layer.
Hence performance of the protocols in these layers helps to make a right selection of Protocol
for high speed mobility. Varying parameters of VANET shows that in the real traffic scenarios
proactive protocol performs more efficiently for IEEE 802.11 (MAC) and IEEE 802.11(DCF)
Mobile Ad hoc Networks (MANETs) are characterized by open structure, lack of standard infrastructure
and un-accessibility to the trusted servers. The performance of various MANET routing protocols is
significantly affected due to frequently changing network topology, confined network resources and
security of data packets. In this paper, a simulation based performance comparison of one of the most
commonly used on-demand application oriented routing protocols, AODV (Ad hoc on-demand Distance
Vector) and its optimized versions R-AODV (Reverse AODV) and PHR-AODV (Path hopping based
Reverse AODV) has been presented. Basically the paper evaluates these protocols based on a wide set of
performance metrics by varying both the number of nodes and the nodes maximum speed. A NS-2 based
simulation study shows that, as compared to AODV and PHR-AODV, R-AODV enhances the packet
delivery fraction by 15-20% and reduces the latency approximately by 50%. R-AODV requires lesser node
energy for data transmission.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksIJCNCJournal
A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance the link break provision of the ad hoc on-demand remote protocol (AODV). The proposed algorithm is called the AODV Link Break Prediction (AODVLBP). The AODVLBP prevents link breaks by the use of a predictive measure of the changing signal. The AODVLBP was evaluated using the network simulator version 2.35 (NS2) and compared with the AODV Link prediction (AODVLP) and the AODV routing protocols. The simulation results reveal the effectiveness of AODVLBP in improving network performance in terms of average end-to-end delay, packet delivery ratio, packet overhead ratio, and packet drop-neighbour break.
Survey of Modified Routing Protocols for Mobile Ad-hoc Networkijsrd.com
In last few years extensive research work has been done in the field of routing protocols for Ad-hoc Network. Various routing protocols have been evaluated in different network conditions using different performance metrics. A lot of research has been done how to modify standard routing protocol in ad-hoc network to improve its performance. The hop count is not only metric that gives efficient routing path. There are various modified protocols which make the use of other parameters along with hop count to select the best routing path to the destination. In standard Ad-hoc On-demand Distance Vector (AODV) routing protocol only hop count is used for selecting the routing path. In this paper we have studied variants of AODV protocols with modified routing metric.
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
The growth in wireless communication technologies has resulted in a considerable amount of
attention given to mobile adhoc networks. All mobile hosts in an adhoc network are embedded with
packet forwarding capabilities. It is decentralized and is independent of infrastructure. Since mobile
hosts in an adhoc network usually move freely, the topology of the network changes dynamically and
disconnection occurs frequently. These characteristics require the routing protocols to find an
alternative path towards the destination for data transfer. The existing on-demand routing protocols
does the alternative path establishment only after the disconnection of links in the existing path. The
data sent by the source during alternate path establishment period will be lost leading to incomplete
data transfer. The network traffic will therefore increase considerably. This problem can be overcome
by establishing an alternative path when the existing path is more likely to be broken, by sending a
warning message to the source indicating the likelihood of disconnection. In this paper an attempt has
been made to analyze a protocol that improves the network connectivity by preempting the alternative
path before the existing link gets failed by monitoring the signal strength and ‘age of the path’.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Mobile ad hoc networks communicate without any fixed infrastructure or ant centralized domain. All the
nodes are free to move randomly within the network and share information dynamically. To achieve an
efficient routing various protocols have been developed so far which vary in their nature and have their
own salient properties. In this paper, we have discussed one of the latest protocols i.e. Dynamic Manet on
demand (DYMO) routing Protocol, implemented and analysed its performance with other similar protocols
against different parameters. Finally a comparison has been presented between all of them.
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...IOSR Journals
Abstract: In the last couple of years, the use of wireless networks has become more and more popular. A
MANET is a collection of self-organizing mobile nodes which is infrastructure less, autonomous, and standalone
networks. Each node in a MANET is free to move independently in any direction and will therefore change its
links to other devices frequently. Each must forward traffic unrelated to its own use and therefore be a router.
Simulation result has been obtained by a performance comparison of three routing protocols i.e. Ad hoc Ondemand
Distance Vector (AODV), Dynamic Source Routing (DSR), Location Aided Routing (LAR1) against
Simulation time. The Result is obtained using QualNet simulator version 6.1. Different protocols are evaluated
based on measures such as Average End to End delay (s), Average Jitter(s), and Packet delivery ratio.
Keywords: MANET, AODV, DSR, LAR1, QualNet 6.1
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance Evalution of MANET Routing Protocols using Reference Point Group ...ijasuc
An ad hoc network is often defined as an “infrastructureless” network, meaning a network without the
usual routing infrastructure like fixed routers and routing backbones. Typically, the ad hoc nodes are
mobile and the underlying communication medium is wireless. Each ad hoc node may be capable of acting
as a router.it’s charactrizied by multihop wireless connection and frequently changing networks.we
compare the performance of on-demand routing protocols for mobile ad-hoc networks are distributed
cache updating for the dynamic source routing protocol(DSR) and ad hoc on-demand distance vector
routing (AODV).the simulation model of the medium access control(MAC) layer is evaluting the
performance of MANET protocols.DSR and AODV protocols share similar behavours.we evalute the
both on demand protocols DSR and AODV based on packet delivery ratio , packet delivery latency,mobility
variation with total number of errors, packet and normalized routing overhead,end-to-end delay by varying
in node density.the performance and characterictics are explained by the graph models.
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
This paper evaluates the energy consumption of well-known routing protocols, along with other metrics
such as throughput, packet delivery ratio (PDR), and delay in different scenarios. We consider two other
metrics in order to capture the efficiency of the energy consumption: e-throughput which is the ratio
between the consumed energy and the throughput; and the e-PDR which is the ratio between the
consumed energy and the PDR. We compare four routing protocols: AODV, OLSR, and HWMP in
Reactive and Proactive modes. The number of nodes is varying between 25 and 81 nodes, with different
mobility models. Simulations are conducted using NS3 and the parameters of a real network interface
card. From the results, AODV presents the lowest energy consumption and a better e-Throughput. OLSR
provides a better e-PDR in mobile scenarios. With a smaller e-PDR and e-Throughput, the proactive
mode of HWMP is more energy efficient than the reactive mode.
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2IJERA Editor
Mobile ad hoc network (MANETS) consists of wireless nodes communicating without any centralized administration .thus each node acts as a host and a router. There are many routing protocols designed for MANETS. The Dynamic Source Routing protocol (DSR) is a simple and efficient Routing protocol designed specifically for use in multi-hop wireless mobile nodes. This paper describes the design the implementation of DSR protocol in NS-2 simulator environment. We also analyze the performance of the DSR for various performance matrixes such as average end to- end delay, throughput and packet delivery ratio. The analysis was made for different number of nodes using the NS-2 simulator.
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
An ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple “hops” may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. This paper presents performance comparison of the three routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and pause time. Simulation revealed that although DSDV perfectly scales to small networks with low node speeds, AODV is preferred due to its more efficient use of bandwidth.
The Myth of Softening behavior of the Cohesive Zone Model Exact derivation of...ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Study on groundwater quality in and around sipcot industrial complex, area cu...ijceronline
STATE INDUSTRIES PROMOTION CORPORATION OF TAMIL NADU(SIPCOT) cuddalore phase 1 has estabilished in 1984 at an extent of 518.79 acres. currently between 26 and 29 functional units are lie within phase1 of the industrial estates.At least 10 villages lie within or in the vicinity of the industrial complex. Till date no sites has been developed for secure storage of hazardous wastes generated by the industries in the estate. In absence of such facilities factories have dumped these wastes on neighbouring lands and in open pits. By the industries own admission,out of the 20 million litres of fresh water required by the companies, 18 million litres (90%) of the water is released back to their environment as toxic effluents.These poisons have leached into the ground water and contaminated the water resources of communities living around the factory. This study was carried out to asses the Quality of ground water in and around SIPCOT industrial complex in cuddalore district. The Quality was assessed in terms of physico chemical parameters.Ground water samples were collected from 30 locations in and around the study area and analyzed (APHA,1998) to know the present status of the Ground water Quality. The results were compared with standards prescribed by ISI 10500-91.It was found that the ground water was contaminated at few sampling locations.The remaining locations shows that the parameters are within the desirable limits and fit for drinking purpose
Stress Analysis of a Centrifugal Supercharger Impeller Bladeijceronline
A supercharger is an air compressor that increases the pressure or density of air supplied to an internal combustion engine. This gives each intake cycle of the engine more oxygen, letting it burn
more fuel and do more work, thus increasing power. Power for the supercharger can be provided mechanically by means of a belt, gear, shaft, or chain connected to the engine's crankshaft. Superchargers are a type of forced induction system. They compress the air flowing into the engine.
The advantage of compressing the air is that it lets the engine squeeze more air into a cylinder, and more air means that more fuel can be added. Therefore, you get more power from each explosion in each cylinder. Here in this project we are designing the compressor wheel by using Pro-E and doing
analysis by using FEA package. An attempt has been made to investigate the effect of pressure and induced stresses on the blade. By identifying the true design feature, the extended service life and long term stability is assured. A
structural analysis has been carried out to investigate the stresses, strains and displacements of the blade. An attempt is also made to suggest the best material for an blade of a turbocharger by comparing the results obtained for different materials. Based on the results best material is recommended for the blade of a turbocharger
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...cscpconf
In VANET high speed is the real characteristics which leads to frequent breakdown,
interference etc. Therefore Performance of adhoc routing protocols is helpful to improve the
Quality of Service (QOS). In this paper we studied various adhoc routing protocols, Reactive,
Proactive & Hybrid, taking in to consideration parameters like speed, altitude, mobility etc in
real VANET scenario. The AODV and DYMO (Reactive), OLSR (Proactive) and ZRP (hybrid)
protocols are compared for IEEE 802.11(MAC) and IEEE 802.11(DCF) standard using
Qualnet as a Simulation tool. Since IEEE 802.11, covers both physical and data link layer.
Hence performance of the protocols in these layers helps to make a right selection of Protocol
for high speed mobility. Varying parameters of VANET shows that in the real traffic scenarios
proactive protocol performs more efficiently for IEEE 802.11 (MAC) and IEEE 802.11(DCF)
Mobile Ad hoc Networks (MANETs) are characterized by open structure, lack of standard infrastructure
and un-accessibility to the trusted servers. The performance of various MANET routing protocols is
significantly affected due to frequently changing network topology, confined network resources and
security of data packets. In this paper, a simulation based performance comparison of one of the most
commonly used on-demand application oriented routing protocols, AODV (Ad hoc on-demand Distance
Vector) and its optimized versions R-AODV (Reverse AODV) and PHR-AODV (Path hopping based
Reverse AODV) has been presented. Basically the paper evaluates these protocols based on a wide set of
performance metrics by varying both the number of nodes and the nodes maximum speed. A NS-2 based
simulation study shows that, as compared to AODV and PHR-AODV, R-AODV enhances the packet
delivery fraction by 15-20% and reduces the latency approximately by 50%. R-AODV requires lesser node
energy for data transmission.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksIJCNCJournal
A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance the link break provision of the ad hoc on-demand remote protocol (AODV). The proposed algorithm is called the AODV Link Break Prediction (AODVLBP). The AODVLBP prevents link breaks by the use of a predictive measure of the changing signal. The AODVLBP was evaluated using the network simulator version 2.35 (NS2) and compared with the AODV Link prediction (AODVLP) and the AODV routing protocols. The simulation results reveal the effectiveness of AODVLBP in improving network performance in terms of average end-to-end delay, packet delivery ratio, packet overhead ratio, and packet drop-neighbour break.
Survey of Modified Routing Protocols for Mobile Ad-hoc Networkijsrd.com
In last few years extensive research work has been done in the field of routing protocols for Ad-hoc Network. Various routing protocols have been evaluated in different network conditions using different performance metrics. A lot of research has been done how to modify standard routing protocol in ad-hoc network to improve its performance. The hop count is not only metric that gives efficient routing path. There are various modified protocols which make the use of other parameters along with hop count to select the best routing path to the destination. In standard Ad-hoc On-demand Distance Vector (AODV) routing protocol only hop count is used for selecting the routing path. In this paper we have studied variants of AODV protocols with modified routing metric.
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
The growth in wireless communication technologies has resulted in a considerable amount of
attention given to mobile adhoc networks. All mobile hosts in an adhoc network are embedded with
packet forwarding capabilities. It is decentralized and is independent of infrastructure. Since mobile
hosts in an adhoc network usually move freely, the topology of the network changes dynamically and
disconnection occurs frequently. These characteristics require the routing protocols to find an
alternative path towards the destination for data transfer. The existing on-demand routing protocols
does the alternative path establishment only after the disconnection of links in the existing path. The
data sent by the source during alternate path establishment period will be lost leading to incomplete
data transfer. The network traffic will therefore increase considerably. This problem can be overcome
by establishing an alternative path when the existing path is more likely to be broken, by sending a
warning message to the source indicating the likelihood of disconnection. In this paper an attempt has
been made to analyze a protocol that improves the network connectivity by preempting the alternative
path before the existing link gets failed by monitoring the signal strength and ‘age of the path’.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Mobile ad hoc networks communicate without any fixed infrastructure or ant centralized domain. All the
nodes are free to move randomly within the network and share information dynamically. To achieve an
efficient routing various protocols have been developed so far which vary in their nature and have their
own salient properties. In this paper, we have discussed one of the latest protocols i.e. Dynamic Manet on
demand (DYMO) routing Protocol, implemented and analysed its performance with other similar protocols
against different parameters. Finally a comparison has been presented between all of them.
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...IOSR Journals
Abstract: In the last couple of years, the use of wireless networks has become more and more popular. A
MANET is a collection of self-organizing mobile nodes which is infrastructure less, autonomous, and standalone
networks. Each node in a MANET is free to move independently in any direction and will therefore change its
links to other devices frequently. Each must forward traffic unrelated to its own use and therefore be a router.
Simulation result has been obtained by a performance comparison of three routing protocols i.e. Ad hoc Ondemand
Distance Vector (AODV), Dynamic Source Routing (DSR), Location Aided Routing (LAR1) against
Simulation time. The Result is obtained using QualNet simulator version 6.1. Different protocols are evaluated
based on measures such as Average End to End delay (s), Average Jitter(s), and Packet delivery ratio.
Keywords: MANET, AODV, DSR, LAR1, QualNet 6.1
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance Evalution of MANET Routing Protocols using Reference Point Group ...ijasuc
An ad hoc network is often defined as an “infrastructureless” network, meaning a network without the
usual routing infrastructure like fixed routers and routing backbones. Typically, the ad hoc nodes are
mobile and the underlying communication medium is wireless. Each ad hoc node may be capable of acting
as a router.it’s charactrizied by multihop wireless connection and frequently changing networks.we
compare the performance of on-demand routing protocols for mobile ad-hoc networks are distributed
cache updating for the dynamic source routing protocol(DSR) and ad hoc on-demand distance vector
routing (AODV).the simulation model of the medium access control(MAC) layer is evaluting the
performance of MANET protocols.DSR and AODV protocols share similar behavours.we evalute the
both on demand protocols DSR and AODV based on packet delivery ratio , packet delivery latency,mobility
variation with total number of errors, packet and normalized routing overhead,end-to-end delay by varying
in node density.the performance and characterictics are explained by the graph models.
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
This paper evaluates the energy consumption of well-known routing protocols, along with other metrics
such as throughput, packet delivery ratio (PDR), and delay in different scenarios. We consider two other
metrics in order to capture the efficiency of the energy consumption: e-throughput which is the ratio
between the consumed energy and the throughput; and the e-PDR which is the ratio between the
consumed energy and the PDR. We compare four routing protocols: AODV, OLSR, and HWMP in
Reactive and Proactive modes. The number of nodes is varying between 25 and 81 nodes, with different
mobility models. Simulations are conducted using NS3 and the parameters of a real network interface
card. From the results, AODV presents the lowest energy consumption and a better e-Throughput. OLSR
provides a better e-PDR in mobile scenarios. With a smaller e-PDR and e-Throughput, the proactive
mode of HWMP is more energy efficient than the reactive mode.
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2IJERA Editor
Mobile ad hoc network (MANETS) consists of wireless nodes communicating without any centralized administration .thus each node acts as a host and a router. There are many routing protocols designed for MANETS. The Dynamic Source Routing protocol (DSR) is a simple and efficient Routing protocol designed specifically for use in multi-hop wireless mobile nodes. This paper describes the design the implementation of DSR protocol in NS-2 simulator environment. We also analyze the performance of the DSR for various performance matrixes such as average end to- end delay, throughput and packet delivery ratio. The analysis was made for different number of nodes using the NS-2 simulator.
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
An ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple “hops” may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. This paper presents performance comparison of the three routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and pause time. Simulation revealed that although DSDV perfectly scales to small networks with low node speeds, AODV is preferred due to its more efficient use of bandwidth.
The Myth of Softening behavior of the Cohesive Zone Model Exact derivation of...ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Study on groundwater quality in and around sipcot industrial complex, area cu...ijceronline
STATE INDUSTRIES PROMOTION CORPORATION OF TAMIL NADU(SIPCOT) cuddalore phase 1 has estabilished in 1984 at an extent of 518.79 acres. currently between 26 and 29 functional units are lie within phase1 of the industrial estates.At least 10 villages lie within or in the vicinity of the industrial complex. Till date no sites has been developed for secure storage of hazardous wastes generated by the industries in the estate. In absence of such facilities factories have dumped these wastes on neighbouring lands and in open pits. By the industries own admission,out of the 20 million litres of fresh water required by the companies, 18 million litres (90%) of the water is released back to their environment as toxic effluents.These poisons have leached into the ground water and contaminated the water resources of communities living around the factory. This study was carried out to asses the Quality of ground water in and around SIPCOT industrial complex in cuddalore district. The Quality was assessed in terms of physico chemical parameters.Ground water samples were collected from 30 locations in and around the study area and analyzed (APHA,1998) to know the present status of the Ground water Quality. The results were compared with standards prescribed by ISI 10500-91.It was found that the ground water was contaminated at few sampling locations.The remaining locations shows that the parameters are within the desirable limits and fit for drinking purpose
Stress Analysis of a Centrifugal Supercharger Impeller Bladeijceronline
A supercharger is an air compressor that increases the pressure or density of air supplied to an internal combustion engine. This gives each intake cycle of the engine more oxygen, letting it burn
more fuel and do more work, thus increasing power. Power for the supercharger can be provided mechanically by means of a belt, gear, shaft, or chain connected to the engine's crankshaft. Superchargers are a type of forced induction system. They compress the air flowing into the engine.
The advantage of compressing the air is that it lets the engine squeeze more air into a cylinder, and more air means that more fuel can be added. Therefore, you get more power from each explosion in each cylinder. Here in this project we are designing the compressor wheel by using Pro-E and doing
analysis by using FEA package. An attempt has been made to investigate the effect of pressure and induced stresses on the blade. By identifying the true design feature, the extended service life and long term stability is assured. A
structural analysis has been carried out to investigate the stresses, strains and displacements of the blade. An attempt is also made to suggest the best material for an blade of a turbocharger by comparing the results obtained for different materials. Based on the results best material is recommended for the blade of a turbocharger
A Study on Video Steganographic Techniquesijceronline
Data hiding techniques have taken important role with the rapid growth of intensive transfer of multimedia content and secret communications. The method of Steganography is used to share the data secretly and securely. It is the science of embedding secret information into the cover media with the modification to the cover image, which cannot be easily identified by human eyes. Steganography algorithms can be applied in audio, video and image file. Hiding secret information in video file is known as video steganography. Video Steganography means hiding a secret message that can be either a secret text message or an image within a larger one in such a way that just by looking at it, an unwanted person cannot detect the presence of any hidden message. For hiding secret information in the video, there are many Steganography techniques which are further explained in this paper along with some of the research works done in some fields under video steganography by some authors. The paper describes the progress in the field of video Steganography and intends to give the comparison between its different uses and techniques
Strong (Weak) Triple Connected Domination Number of a Fuzzy Graphijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Rocker arms are part of the valve-actuating mechanism. A rocker arm is designed to pivot on a pivot
pin or shaft that is secured to a bracket. The bracket is mounted on the cylinder head. One end of a
rocker arm is in contact with the top of the valve stem, and the other end is actuated by the camshaft.
In installations where the camshaft is located below the cylinder head, the rocker arms
are actuated by pushrods. The lifters have rollers which are forced by the valve springs to follow the
profiles of the cams. Failure of rocker arm is a measure concern as it is one of the important
components of push rod IC engines.Present work finds the various stresses under extreme load
condition. For this we are modeling the arm using design software and the stressed regions are
found out usingAnsys software. Here in this thesis we are observing that by changing different
materials how the stresses are varying in the rocker arm under extreme load condition. And after
comparing results we are proposing best suitable material for the rocker arm under extreme load conditions.
Engendering sustainable socio-spatial environment for tourism activities in t...ijceronline
The South Eastern part of Nigeria was a single state of the twelve states of Nigeria before 1976 – East Central State. Presently, the area is made up of five states. This Paper presents a study carried out to assess the possibility of knitting the once-one-state and presently five states, together to form a tourist destination worthy of international importance. Although the unprecedented dearth of infrastructural development in the zone continues to be a subject of discussion, little attention has
been given to investigate the place of synergized intervention. Descriptive analysis was employed, in which the tourism potentials in the zone that are of national recognition were itemized. Data were collected on available amenities, resident population and accessibility of such potentials. Existing literature on various Environmental Management Systems were explored to elicit a system that is
capable of affording a sustainable environment for tourism matters in the zone. The study revealed that the zone exhibits similar socio-economic and physical characteristics that are replete with potentials for improvement for optimum tourism utility in the entire zone. Several measures were advanced in the study to achieve this, chief of which is the adoption of the Environmental Planning and Management (EPM) process
Development of a Cassava Starch Extraction Machineijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
Mobile Ad-hoc Networks (MANETS) consists of a collection of mobile nodes without having a central
coordination. In MANET, node mobility and dynamic topology play an important role in the performance.
MANET provide a solution for network connection at anywhere and at any time. The major features of
MANET are quick set up, self organization and self maintenance. Routing is a major challenge in MANET
due to it’s dynamic topology and high mobility. Several routing algorithms have been developed for
routing. This paper studies the AODV protocol and how AODV is performed under multiple connections in
the network. Several issues have been identified. The bandwidth is recognized as the prominent factor
reducing the performance of the network. This paper gives an improvement of normal AODV for
simultaneous multiple connections under the consideration of bandwidth of node.
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
Appropriate routing protocol in data transfer is a challenging problem of network in terms of lower end-to-end delay in delivery of data packets with improving packet delivery ratio and lower overhead as well. In this paper we explain an effective and scalable AODV (called as AODV-ES) for Wireless Ad hoc Sensor Networks (WASN) by using third party reply model, n-hop local ring and time-to-live based local recovery. Our goal is to reduce time delay for delivery of the data packets, routing overhead and improve the data packet delivery ratio. The resulting algorithm AODV-ES is then simulated by NS-2 under Linux operating system. The performance of routing protocol is evaluated under various mobility rates and found that the proposed routing protocol is better than AODV.
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have
elaborated several routing protocols that possess different performance levels. In this paper we give a
performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing
protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their
performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to
End Delay, Normalised Routing Load and Average Throughput.
Performance comparison of routing protocols in mobile ad hoc networksijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have elaborated several routing protocols that possess different performance levels. In this paper we give a performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to End Delay, Normalised Routing Load and Average Throughput.
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...ijujournal
Routing protocols have
an important
role in any
Mobile Ad Hoc Network
(MANET).
Researchers
have
elaborated several routing protocols that possess different performance levels
. In this
p
aper
we
give a
performance evaluation of
AODV,
DSR,
DSDV
, OLSR and DYMO
routing protocol
s
in
Mobile Ad Hoc
Networks
(MANETS)
to
determine
the best
in different scenarios
. We
analyse
these
MANET
routing
protocols by
using
NS
-
2 simulator
. We specify how
the
Number of No
d
es
parameter influences
their
performance. In this study
,
performance is
calculated
in terms
of Packet Delivery Ratio,
Average
End to
End Delay, Normalised Routing Load and Average Throughput
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have
elaborated several routing protocols that possess different performance levels. In this paper we give a
performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing
protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their
performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to
End Delay, Normalised Routing Load and Average Throughput.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Bandwidth aware on demand multipath routing in manetsijwmn
Mobile Ad-hoc Networks (MANETs) are self configuring, decentralized and dynamic nature wireless
networks which have no infrastructure. These offer a number of advantages, however the demand of high
traffic flows in MANETs increases rapidly. For these demands, limited bandwidth of wireless network is the
important parameter that restrains the development of real time multimedia applications. In this work, we
propose a solution to utilize available bandwidth of the channel for on demand multiple disjoint paths. The
approximate bandwidth of a node is used to find the available bandwidth of the path. The source chooses
the primary route for data forwarding on the basis of path bandwidth. The simulation results show that the
proposed solution reduces the frequency of broadcast and performs well in improving the end to end
throughput, packet delivery ratio, and the end to end delay.
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any
pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as
a router, forwarding information packets for other mobile nodes. There are many routing protocols that
possess different performance levels in different scenarios. The main task is to evaluate the existing routing
protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV,
OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational
conditions for each MANETs protocol. We study these five MANETs routing protocols by different
simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This
performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay,
Normalized Routing Load and Average Throughput.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
B03406010
1. International Journal of Computational Engineering Research||Vol, 03||Issue, 4||
www.ijceronline.com ||April||2013|| Page 6
A RELIABLE NODE-DISJOINT MULTIPATH ROUTING
PROTOCOL FOR MANET
A.Monisha1
K.Vijayalakshmi2
1
PG Scholar,S.K.P Engineering College, Thiruvannamalai.
2
Asst professor, S.K.P Engineering College,Thiruvannamalai
INTRODUCTION:
A mobile ad-hoc network (MANET) is a self-configuring infrastructure less network of mobile devices
connected by wireless. Ad hoc is Latin and means "for this purpose".Each device in a MANET is free to move
independently in any direction, and will therefore change its links to other devices frequently. Each must
forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET
is equipping each device to continuously maintain the information required to properly route traffic. Such
networks may operate by themselves or may be connected to the larger Internet.
MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment
on top of a Link Layer ad hoc network.The growth of laptops and 802.11/Wi-Fi wireless networking has made
MANETs a popular research topic since the mid-1990s. Many academic papers evaluate protocols and their
abilities, assuming varying degrees of mobility within a bounded space, usually with all nodes within a few hops
of each other. Different protocols are then evaluated based on measure such as the packet drop rate, the
overhead introduced by the routing protocol, end-to-end packet delays, network throughput etc. Routing
protocols that discover and store more than one route in their routing table for each destination node are referred
to as multipath routing protocols. In wireless scenarios, routes are broken due to node movement. Also, the
wireless links used for data transmission are inherently unreliable and error prone. Therefore, multipath routing
protocols are used to overcome the disadvantages of shortest path routing protocols. Multipath routing protocols
are used to increase the reliability (by sending the same packet on each path) and fault tolerance (by ensuring the
availability of backup routes at all times). It can also be used to provide load balancing, which reduces the
congestion on a single path caused by bursty traffic [9].The remainder of the paper is structured as follows. In
Section II, we present related work in our area by providing a brief description of existing multipath extensions
of AODV routing protocol. The proposed method AOMDV used for discovering multiple paths is presented in
Section III. In Section IV, we present the experimental setup details and provide results with analysis obtained
through various simulations. Finally, the conclusions and directions for future work are provided in Section V.
II.EXTENSION WORK:
In this section, we discuss the previous work done on multipath routing methods on AODV. Ad hoc
On-Demand Distance Vector (AODV) Routing is a routing protocol for mobile ad hoc networks (MANETs) and
other wireless ad-hoc networks. It is a reactive routing protocol, meaning that it establishes a route to a
destination only on demand. In contrast, the most common routing protocols of the Internet are proactive,
Abstract:
Frequent link failures are caused in mobile ad-hoc networks due to node’s mobility and use of
unreliable wireless channels for data transmission. Due to this, multipath routing protocols become an
important research issue. In this paper, we propose and implement a reliable node-disjoint multipath
routing protocol. The main goal of the proposed method is to determine all available reliable node-
disjoint routes from source to destination with minimum routing control overhead. In the route
discovery method, the routes with good link quality and route expiration time are selected as the
primary and backup routes. If there is any route failure during the data transmission through primary
path, the next available backup route with good link quality and route expiration time is selected from
the list. The performance of the proposed protocol will be evaluated using NS-2 and will be shown that
it reduces the packet drop and delay there by increasing the packet delivery ratio.
Keywords: Average End-to-End Delay, Node-disjoint, Packet drop, Primary and Backup Routes,
Routing protocols.
2. A Reliable Node-Disjoint Multipath Routing...
www.ijceronline.com ||April||2013|| Page 7
meaning they find routing paths independently of the usage of the paths. AODV is, as the name indicates, a
distance-vector routing protocol. AODV avoids the counting-to-infinity problem of other distance-vector
protocols by using sequence numbers on route updates, a technique pioneered by DSDV. AODV is capable of
both unicast and multicast routing.
In AODV, the network is silent until a connection is needed. At that point the network node that needs
a connection broadcasts a request for connection. Other AODV nodes forward this message, and record the node
that they heard it from, creating an explosion of temporary routes back to the needy node. When a node receives
such a message and already has a route to the desired node, it sends a message backwards through a temporary
route to the requesting node. The needy node then begins using the route that has the least number of hops
through other nodes. Unused entries in the routing tables are recycled after a time. Much of the complexity of
the protocol is to lower the number of messages to conserve the capacity of the network. For example, each
request for a route has a sequence number. Nodes use this sequence number so that they do not repeat route
requests that they have already passed on. Another such feature is that the route requests have a "time to live"
number that limits how many times they can be retransmitted. Another such feature is that if a route request
fails, another route request may not be sent until twice as much time has passed as the timeout of the previous
route request.
The advantage of AODV is that it creates no extra traffic for communication along existing links. Also,
distance vector routing is simple, and doesn't require much memory or calculation. However AODV requires
more time to establish a connection, and the initial communication to establish a route is heavier than some
other approaches [3].In this section, the existing NDMP-AODV protocol is described [4]. The main goal of
NDMP-AODV is to find all available node-disjoint routes between a source-destination pair with minimum
routing overhead When a source node has a data packet to send, it checks its routing table for the next-hop
towards the destination of the packet. If there is an active entry for the destination in the routing table, the data
packet is forwarded to the next hop. Otherwise, the route discovery phase begins. In route discovery phase,
routes are determined using two types of control messages: (i) Route request messages (RREQs) and (ii) Route
reply messages (RREPs). The source node floods the RREQ message into the network. Each intermediate node
that receives a RREQ, checks whether it is a duplicate or a fresh one by searching an entry in the Seen Table.
Seen Table stores two entries (i.e. source 𝐼𝑃 address and RREQ flooding ID ( 𝑓 𝑖𝑑)) that uniquely identifies a
RREQ message in the network. If an entry is present in the Seen Table for the received RREQ n message, it is
considered a duplicate RREQ message and discarded without further broadcasting. Otherwise, the node creates
an entry in the Seen Table and updates its routing table for forward path before broadcasting the RREQ
message.
Fig. 1. NDMP-AODV Seen Table structure
Fig. 2. NDMP-AODV RREP structure
In NDMP-AODV, only the destination node can send RREPs upon reception of a RREQ message. The
intermediate nodes are forbidden to send RREPs even if they have an active route to destination. This is done so
as to get the node-disjoint routes. In NDMP-AODV, the destination node has to send a RREP message for each
RREQ received, even if the RREQ is a duplicate one. We add an extra field that works as a flag known as
seenflag. This flag is set to FALSE at start i.e. when an entry is first inserted in the Seen Table after a node gets
its first RREQ message. The RREP messages initiated by destination node in NDMP-AODV contain one extra
field known as broadcast ID ( 𝑏 𝑖𝑑). The route discovery method used to discover node-disjoint paths .When a
destination node receives a RREQ message, it creates the corresponding RREP message. The destination node
copies the 𝑓 𝑖𝑑 from the received RREQ message into the 𝑏 𝑖𝑑 field of sent RREP message.
3. A Reliable Node-Disjoint Multipath Routing...
www.ijceronline.com ||April||2013|| Page 8
Figure shows the route discovery process of traditional AODV protocol. In Figure we demonstrate with
an example how the route discovery process in NDMP-AODV gets all node-disjoint routes between a source-
destination pair. Suppose, node 𝑆 is the source node and node 𝐷 is the destination node. When node 𝑆 has data
to send, it initiates the route discovery process by flooding RREQ in the network. Let us assume that destination
𝐷 receives its first RREQ from intermediate node 𝐽 at time 𝑡1 and 𝐷 initiates the RREP1 message. RREP1 is
unicast towards source 𝑆 by creating the reverse path D→J→M→H→E→S. When RREP1 is received by an
intermediate node along the reverse route each intermediate node resets the value of seenflag in their Seen
Table. Suppose, 𝐷 receives the first duplicate RREQ message from 𝐴 at time 𝑡2. Again node 𝐷 initiates a
RREP2 for this duplicate RREQ and sends it back towards node 𝑆 through the same path it came to 𝐷 (i.e.
S→F→C→K→P→D→D) to make the reverse route D→A→P→K→C→F→S. This helps to create a forward
route towards node D. Finally, say at time 𝑡3, node 𝐷 receives the third duplicate RREQ message from node 𝑁.
Node 𝐷 initiates RREP3 for this duplicate RREQ and sends it towards 𝑆 through 𝑁. The RREP3 reaches node 𝐽
through 𝑁. Node 𝐽 checks the value of seenflag for RREP3 before forwarding it to next hop. Node j determines
that the seenflag is set to TRUE. So node 𝐽 considers RREP3 as a duplicate message and drops it. This helps to
maintain the node-disjoint property of our method.
III. RESULTS
In this section, we discuss the results obtained from intensive simulations that have been performed to
show the effectiveness of proposed route discovery and route maintenance methods. The simulation results
include the average packet delivery ratio (PDR), average end-to-end delay (EED), percentage availability of
backup routes and routing control overhead caused by route discovery and route maintenance processes. The
effectiveness of proposed methods are checked against the effect of node mobility.
Fig.5. Routing control packet overhead with change in mobility
4. A Reliable Node-Disjoint Multipath Routing...
www.ijceronline.com ||April||2013|| Page 9
Figure 5 shows the overhead caused by routing control messages during route discovery process.
Routing overhead created during transmission of one video stream are calculated and plotted in Figure 5. The
routing overhead is calculated by dividing the total number of routing control messages with the total number of
packets in the network (i.e. control messages plus data packets). As we can see in Figure 5, AODV causes
approximately 50% more routing overhead in moderate or low mobility networks (i.e. when node pause time is
greater than 100 sec) as compared to NDMP-AODV. This is due to the fact that NDMP-AODV uses one RREQ
flooding to calculate all node-disjoint routes as compared to AODV which uses one RREQ flooding for each
route discovery.
Fig.6. Average End-to-End delay with change in node mobility.
The number of RREP messages in NDMP-AODV is greater than AODV but they are very few in
number because the RREPs are unicast towards source. Also, the intermediate nodes will not forward the
duplicate RREPs. Low routing overhead saves the scarce network bandwidth, thus increasing the network
capacity. The number of routes stored in routing table for a destination from the available node-disjoint routes
greatly depends on the mobility of network. If the network mobility is high, the probability that the secondary
route is expired with the primary route is high. As shown in Figure 5, BR-AODV has the highest routing
overhead because only two routes for destination are stored in the routing table. Due to this, BRAODV has to
flood the RREQ messages whenever anyone route is broken to maintain the backup route at all times. In this
case, the overhead for route maintenance is approximately more or equal to AODV protocol.
Fig.7. Packet delivery ratio with change in node Mobility.
Effect of mobility on EED and PDR are shown in Figure 6 and Figure 7. The delay in NDMP-AODV
is less as compared to other protocols. This is because NDMP-AODV keeps a backup routing path more than
50% of the time when the primary route fails with the lowest routing overhead. We can observe from Figure 6,
that EED of all routing protocols decreases with increase in node pause time. NDMP-AODV EED again
increases at the end of simulation due to increase in its PDR. Also, IM-AODV causes the highest delay because
it uses the backup route from the point the link is broken. We compare the performance of AODV and AOMDV
according to the following performance metrics:
Packet delivery fraction: the ratio of data packets delivered to the destinations to those generated by the
constant bit rate. Average End-to-End delay of data packets: this includes all possible delays caused by
buffering during route discovery, queuing at the interface queue, retransmission delays at the MAC, propagation
and transfer times. Routing Overhead: the total number of routing packets transmitted during the simulation. For
packets sent over multiple hops, each transmission of the packet (each hop) counts as one transmission.
5. A Reliable Node-Disjoint Multipath Routing...
www.ijceronline.com ||April||2013|| Page 10
IV. CONCLUSION
In this we propose method known as an on-demand, multipath distance vector routing protocol for
mobile ad hoc networks. Specifically, we propose multipath extensions to a well-studied single path routing
protocol known as ad hoc on-demand distance vector (AODV). The resulting protocol is referred to as ad hoc
on-demand multipath distance vector (AOMDV). The protocol guarantees loop freedom and disjoint ness of
alternate paths. Performance comparison of AOMDV with AODV using ns-2 simulations shows that AOMDV
is able to effectively cope with mobility-induced route failures.
A new class of on-demand routing protocols (e.g., DSR, TORA, AODV)for mobile ad hoc networks
has been developed with the goal of minimizing the routing overhead. These protocols reactively discover and
maintain only the needed routes, in contrast to proactive protocols (e.g., DSDV) which maintain all routes
regardless of their usage. The key characteristic of an on-demand protocol is the source-initiated route discovery
procedure. Whenever a traffic source needs a route, it initiates a route discovery process by sending a route
request for the destination (typically via a network-wide flood) and waits for a route reply. Each route discovery
flood is associated with significant latency and overhead. This is particularly true for large networks. Therefore,
for on-demand routing to be effective, it is desirable to keep the route discovery frequency low
Comparison was based on of packet delivery fraction, routing overhead incurred, average end-to-end delay and
number of packets dropped, we conclude that AOMDV is better than AODV. AOMDV is a better on-demand
routing protocol than AODV since it provide better statistics for packet delivery and number of packets dropped.
But if routing overhead is a concern, then AODV is preferred over AOMDV.
REFERENCES
[1] CHHAGAN LAL , V.LAXMI, M.S.GAUR, A Node Disjoint Multipath Routing Method based on AODV protocol for
MANETs, 2012 26th IEEE International Conference on Advanced Information Networking and Applications.
[2] S. R. Biradar, Koushik Majumder, Subir Kumar Sarkar, Puttamadappa C.Performance Evaluation and Comparison of AODV and
AOMDV, (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 02, 2010, 373- 377.
[3] Fubao Yang and Baolin Sun. Ad hoc on-demand distance vector multipath routing protocol with path selection entropy. In
Consumer Electronics, Communications and Networks (CECNet), 2011 International Conference on, pages 4715 –4718, april
2011.
[4] Chang-Woo Ahn, Sang-Hwa Chung, Tae-Hun Kim, and S Young Kang. A node-disjoint multipath routing protocol based on
aodv in mobile ad hoc networks. In Information Technology: New Generations (ITNG), 2010 Seventh International Conference
on, pages 828 –833, april 2010.
[5] Shunli Ding and Liping Liu. A node-disjoint multipath routing protocol based on aodv. In Distributed Computing and
Applications to Business Engineering and Science (DCABES), 2010 Ninth International Symposium on, pages 312 –316, aug.
2010
[6] MOHAMMED TARIQUE, KEMAL E. TAPE, SASAN ADIBI AND SHERVIN ERFANI. SURVEY OF MULTIPATH ROUTING PROTOCOLS OF
MOBILE AD HOC NETWORKS, JOURNAL OF COMPUTER AND NETWORKS, 32(6):1125-1143,2009.
[7] S. Rimac-Drlje, O. Nemcic, and M. Vranjes. Scalable coding extension of the h.264/avc standard. In ELMAR,2008 50th
International Symposium, volume 1, pages 9 –12, sept. 2008.
[8] C. Perkins and E. Royer. Ad hoc on-demand distance vector routing.1999.
[9] YuHua Yuan, HuiMin Chen, and Min Jia. An optimized ad-hoc ondemand multipath distance VECTOR (aomdv) routing
protocol. In Communications, 2005 Asia-Pacific Conference on pages 569 –573, oct. 2005.
[10] Z.Ye, S.V. Krishnamurthy, and S.K. Tripathi. A framework for reliable routing in mobile ad hoc networks. In INFOCOM
2003.Twenty-Second Annual Joint CONFERENCES of the IEE Computer and Communications. IEEE Societies, volume 1,
pages 270 – 280 vol.1, march-3 april 2003.
[11] S.Corson, J. Macker, Mobile Ad Hoc Networking (MANET): Routing Protocols Performance Issues and evaluation,
RFC2501,1999