SlideShare a Scribd company logo
1 of 18
Download to read offline
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014
DOI : 10.5121/ijcsit.2014.6105 59
Clustering Effects on Wireless Mobile Ad-Hoc
Networks Performances
Gideon Naah1
and Edwin Boadu Okoampa2
1
School of Electronic Engineering, University of Electronic Science and Technology of
China, Chengdu - China
2
School of Micro-Electronics and Solid State Electronics, University of Electronic
Science and Technology of China, Chengdu - China
ABSTRACT
A new era is dawning for wireless mobile ad hoc networks where communication will be done using a
group of mobile devices called cluster, hence clustered network. In a clustered network, protocols used by
these mobile devices are different from those used in a wired network; which helps to save computation
time and resources efficiently. This paper focuses on Cluster-Based Routing Protocol and Dynamic Source
Routing. The results presented in this paper illustrates the implementation of Ad-hoc On-Demand Distance
Vector routing protocol for enhancing mobile nodes performance and lifetime in a clustered network and to
demonstrate how this routing protocol results in time efficient and resource saving in wireless mobile ad
hoc networks.
KEYWORDS
AODV, CBRP, DSR, MANETs, Routing.
1. Introduction
A wireless mobile ad-hoc network is a group of mobile devices that forms a network which does
not require the usage of wires or cables for communication. Mobile nodes in this network are able
to detect the presence of nodes that are in close proximity. Due to the limited transmission range
of wireless network interfaces, multiple networks “hops” may be needed for one node to
exchange data with another across the network. Wireless ad-hoc networks have some properties
such as the dynamic network topology, limited bandwidth and energy constraint in the network as
described by Kumar et al [1]. Mobile ad hoc network (MANET) is useful for different purposes
e.g. military operation to provide communication between squads, collaborative and distributed
computing, wireless mesh control, wireless sensor networks, hybrid network, medical control etc.
Kumar et al [1] said “routing protocol plays very important part in implementation of mobile ad
hoc networks. The following are the main protocols used in routing:
Proactive or table driven routing protocols and Reactive or on-demand routing protocols. DSR
(Dynamic Source Routing) requires no periodic packets of any kind at any level within the
network as stated by Johnson et al [2].
DSR does not use any periodic routing advertisement, link status sensing, or neighbour detection
packets, and does not rely on these functions from any underlying protocols in the network. This
entirely on-demand behaviour and lack of periodic activity allows the number of overhead
packets caused by DSR to scale all the way down to zero, when all nodes are approximately
stationary with respect to each other and all routes needed for current communication have
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014
60
already been discovered also as stated by Johnson et al [2]. As nodes begin to move more or as
communication patterns change, the routing packet overhead of DSR automatically scales to only
that needed to track the routes currently in use. In response to a single Route Discovery (as well
as through routing information from other packets overheard), a node may learn and cache
multiple routes to any destination. This allows the reaction to routing changes to be much more
rapid, since a node with multiple routes to a destination can try another cached route if the one it
has been using should fail. This caching of multiple routes also avoids the overhead of needing to
perform a new Route Discovery each time a route in use breaks. The operation of Route
Discovery and Route Maintenance in DSR are designed to allow unidirectional links and
asymmetric routes to be easily supported. In wireless networks, it is possible that a link between
two nodes may not work equally well in both directions, due to differing antenna or propagation
patterns or sources of interference as described by Johnson et al [2]. DSR allows such
unidirectional links to be used when necessary, improving overall performance and network
connectivity in the system [1].
DSR also supports internetworking between different types of wireless networks allowing a
source route to be composed of hops over a combination of any types of networks available by
Johnson et al [2]. For example, some nodes in the ad hoc network may have only short-range
radios, while other nodes have both short-range and long-range radios; the combination of these
nodes together can be considered by DSR as a single ad hoc network [2].
DSR is an on-demand routing protocol and cannot perform well in a large MANET and the
reason is that it has scalability issues when the size of the network increases, mostly when there is
node mobility simultaneously.
Proactive routing requires control overhead for building and updating this table, having
information about the state of the network. For on-demand routing protocols, routes are found
when required; however this causes it to suffer significant route setup delay which becomes
intolerable in the presence of both a large number of nodes movement. The fundamental idea of
on-demand routing protocols is that, an initial node sends a route request and makes a decision
based on the reply received, which may be sent by an intermediate mobile node. However, on-
demand routing algorithms have the disadvantage of increasing per-packet overhead. This per-
packet overhead reduces the available bandwidth for information transmission in the network.
Due to the routine of dissemination of path requests (flooding), it is difficult to reduce the
dissemination of packets unnecessarily [1]. Management of large number of nodes is one of the
essential issues ad-hoc network faces.
The nodes of a wireless ad-hoc network are divided into numerous fragmented or intersecting
clusters. Each cluster elects one node as the so-called cluster head and these distinct nodes are
accountable for the routing process. Neighbours of cluster heads cannot be cluster heads as well.
But cluster heads are able to communicate with each other by using gateway nodes. A gateway is
a node that has two or more cluster heads as its neighbours or— when the clusters are disjoint—at
least one cluster head and another gateway node.
Cluster heads helps in the reduction of traffic and this is because requests will only be sent
through them. Information transmission is therefore done only by these cluster heads from one
cluster to the other. As in any other categorized protocol used in routing, there are overheads
associated with cluster formation and maintenance as described by Sk. Munwar and Dr.
V.V.Rama Prasad [3].
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014
61
Figure 1: A cluster based Ad Hoc network: [4]
Pattern used by CBRP:
Source → Cluster head → Gateway → Cluster head → Gateway → ··· → Destination
This paper presents the implementation of Ad-hoc On-Demand Distance Vector (AODV) routing
protocol to enhance the performance and lifetime of nodes in a clustered network and to
demonstrate how this routing protocol results in time efficient and resource saving in mobile ad
hoc networks. AODV is implemented using Network Simulator-2 (NS-2) which is the simulation
environment. NS-2[5] is an object-oriented discrete event driven network simulator developed at
University of California (UC) Berkeley written in C++ and Object Tool Command Language
(OTcl).
2.0 Related works
2.1 Ad-Hoc Network
Toh [6] described an ad-hoc network as “a collection of two or more devices equipped with
wireless communications and networking capability.” Communication in ad hoc network can be
done directly between nearby nodes in close proximity or use an intermediate node to reach nodes
that other nodes cannot reach.
There are two main merits ad hoc networks can boast of and they are as follows:
(a) Has no wired/cable connected systems put in place
(b) Has the ability of creating its own network easily
That is in a conventional network, devices like switches, cabling/wiring, base-stations, and
routers are not required. A deployment strategy was proposed to increase the probability of a
‘reliable path’. No other protocol has been developed to efficiently enhance the performance and
lifetime of nodes in ad-hoc network.
Ad hoc network’s issues of design was introduced by [7], summarizing an ad-hoc networking
design as follows: “operate each mobile node as a specialized router, which periodically
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014
62
advertises its view of the interconnection topology with other mobile nodes within the network.”
The exceptional part here is dealing with the effects of nodes mobility. That is, ad-hoc
networking protocols must be able to sense and then react to changes in the network’s
environment. Freebersyser and Leiner [8] described the implementations of the MANET for
Department of Defence (DoD) applications.
2.2 Cluster-based MANET
The clustered MANET is an extension of the ubiquitous MANET schema. As the size of the
network (number of mobile nodes) increases, resources such as bandwidth becomes limited.
Clustering however, is able to break the network into groups which makes dissemination of
packets easily and at the long run; it enhances and widens the usage of resources that were
previously limited. This is done by dividing the ad hoc network into numerous smaller sub
networks. This sub networks are then brought together by what is termed back-bone network.
Numerous nodes are then selected as the back-bone nodes. Together they form the back-bone
network. A popular network design includes two back-bone networks.
The use of cluster based MANET for wireless sensor networks were also addressed. In the
literatures, the researchers developed a Medium Access Control (MAC) scheme that is event
driven.
However, clustering consumes bandwidth, drain mobile nodes energy quickly, causes congestion,
collision and data delay in larger networks because of beacon messages i.e. periodic hello
messages been broadcast at every interval.
Some simulation results for DSR, Destination Sequenced Distance Vector (DSDV) and
Temporarily Ordered Routing Algorithm (TORA) have been presented in earlier papers, those
simulations used considerably different input parameters which differ from this paper and did not
simulate the wireless network as accurately. Currently, there is no awareness of any previously
published performance enhancement results for mobile nodes using AODV in wireless mobile ad
hoc networks environments.
2.3 TORA
Some researchers named Park and Corson, also worked on another protocol named
Temporarily Ordered Routing Algorithm (TORA) as named above. In order to avoid congestion,
their simulation used a packet transmission rate of only 4, 1.5, or 0.6 packets per minute per node.
Their work showed that the nodes were divided by links and these nodes had two states namely
active state and inactive state. Active state means that the node is operational and inactive state
also means that the node is not operational. These links were error free and no dynamics below
the network layer were modeled.
2.4 Johnson and Maltz
Johnson and Maltz previously simulated DSR [9] using the same mobility model as in other
papers.
Their work had issues with the MAC layer and the way its radio was propagated. Furthermore,
broadcast and unicast packets were delivered with the same probability and this is not a realistic
assumption.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014
63
2.5 Freisleben and Jansen
Freisleben and Jansen [10] did a simulation and a comparison on DSR and DSDV. Their
simulations used configurations of 10 mobile nodes, with movement speeds relative to
transmission range, making some of their results unrealistic. All events in their simulator took
place in regular time steps, resulting in perfectly synchronized behaviour of a number of separate
mobile nodes in some cases.
3.0 Methodology used
Recently, a diversity of different and novel routing protocols have been developed to study the
movement of nodes in wireless mobile ad hoc networks, but employing a mechanism for
enhancing mobile nodes performance and lifetime in a larger and dense clustered networks and to
demonstrate how this routing protocol results in time efficient and resource saving in mobile ad-
hoc networks is not yet available. This paper adaptively optimizes the frequent needs of those
messages using AODV protocol. The proposed AODV algorithm used to model the uncertainties
for updating local connectivity successfully in time. AODV routing algorithm was developed
from two other routing protocols namely DSDV (Destination Sequenced Distance Vector) and
DSR routing algorithms. The AODV protocol took two properties from the DSDV routing
algorithm and one property from the DSR routing algorithm. These properties are as follows:
1) The Sequence Numbering Process and Periodic Hello Messaging from the DSDV routing
protocol.
2) The Route Discovery Process from the DSR routing protocol.
The following describes how the AODV protocol operates within the wireless network:
Figure 2 [11]
AODV is a technique of routing messages between mobile devices. It allows these mobile
devices or nodes to transmit messages through their neighbours to nodes they cannot
communicate with directly.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014
64
These nodes do not keep or maintain routing tables but rather stores information about the
network in a form of pointers for easy referencing. AODV is able to do this by discovering the
routes along which messages can be transmitted. This protocol sees to it that paths that are
required for transmitting and receiving data does not repeat itself over and over again termed loop
and tries to find the most shortest path if the need be. When there are alterations in paths required
for transmitting and receiving data, and if there are errors in these paths; this protocol is also able
to handle all these. This can be seen as shown in the figure above.
Figure 3 [11]
When nodes have a bidirectional link with one other, which means that they can communicate
with each other directly; they are referred to as neighbours. For a node to know the location of
other nodes (neighbours), it listens to messages broadcasted at certain time intervals and it uses
this process to track its neighbours. For a node to send a message to another node that is not in
close proximity, it transmits what is called a Route Request (RREQ) message. This message has
several kinds of information namely: the source, the destination, the lifespan of the message and a
Sequence Number which serves as a unique ID.
In the example as shown in Figure 3 above, Node 1 wishes to send a message to Node 3. Node
1’s Neighbours are Nodes 2 and 4. Since mobile node 1 cannot directly communicate with mobile
node 3, mobile node 1 sends out a RREQ. The RREQ is heard by mobile nodes 2 and 4.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014
65
Figure 4 [11]
For neighbours of mobile nodes that are not in close proximity such as neighbours of mobile node
1 receives a message, they check to see whether the message is meant for them or they know the
best path to transmit this message to the rightful owner. If the message is meant for them, they
will just send back a reply message to node 1; other than that will retransmit the request message
to their set of neighbours. This message keeps getting retransmitted until its lifespan is over.
If node 1 does not receive a reply in a certain time interval, it will retransmit the request except
this time the request message will have a longer lifespan than previous and a new ID number.
These mobile nodes uses what is called Sequence Number in the request message to insure that
they do not retransmit a request message. This can be seen in the figure above as shown.
SEQUENCE NUMBERS
Figure 5 [11]
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014
66
Sequence numbers serve as time stamps. They allow mobile nodes to compare how current their
information on other nodes are. A mobile node always increases its sequence number any time it
transmits information/data. Every time a mobile node communicates with its neighbours, it keeps
records of sequence numbers belonging to all the mobile nodes it had interacted with. When the
sequence number is high, it tells that that is the current and newer path which can or must be used
for transmitting and receiving information. In other words, a higher Sequence number signifies a
fresher route. More accurate and current information can be obtained as a result of using this
process.
This can be seen as shown in the figure above.
ERROR MESSAGES
Figure 6 [11]
For AODV to adjust and make updates to changes in paths that are required for communication, it
uses what is called the route error message (RERR) in doing this. It uses this RERR message in
omitting/deleting mobile nodes paths that are irrelevant and no more in use or required, and it
does this by using its referencing point.
There are situations whereby these mobile nodes cannot communicate with one or more mobile
nodes and when this happens, it looks at its referencing point for Route that uses the Neighbour
for a next hop and marks them as invalid. Then it sends out a RERR with the Neighbour and the
invalid routes.
This can also be seen in the figure above.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014
67
4.0 Experimental Results
Figure 7: Console Mode In Red Hat Enterprise Linux Server 5 Operating System
Figure 7 above shows the console mode of Red Hat Enterprise Linux Server 5 Operating System
Edition where the NS-2 applications and Tcl codes can be run for the required animator called
NAM in NS-2 to be displayed.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014
68
Figure 8: Showing Nam (Network Animator) Meant For The Simulation Process
In Figure 8 above, this is where the simulation of the AODV routing protocol will take place
between the nodes. The nodes in the nam are what to be used for the simulation. The nodes are at
their initial positions as shown above and they are 5 in all. Five nodes were used for clearer view
of the simulation.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014
69
Figure 9: Nam With Nodes Mobility
In Figure 9 above, this is where mobile nodes within the wireless ad-hoc network began the
clustering process i.e. organizing themselves to form a cluster before communication takes place
between them. The 5 nodes in the nam have now completely formed a cluster at time 7.325251
seconds and each node therefore knows the location of its neighbours’. Therefore sending data
packets to any other node would not cause any difficulty. Communication of data packets among
these mobile nodes took place mainly between nodes 1, 0 and 4.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014
70
Figure 10: Nam Displaying The Signals Each Mobile Node Is Transmitting Within The Wireless Ad-Hoc
Network And Also Showing That Communication Is Still Possible Though There Is Congestion Within
The Wireless Ad-Hoc Network.
In Figure 10 above, each node within the wireless ad-hoc network is transmitting a signal in order
to sense the presence of its members before communication takes place. After connection is
established between the wireless mobile nodes, any data packets can now be transmitted between
these mobile nodes. In the diagram, communication is still taking place between the nodes such
as nodes 1 and 4 though these mobile nodes are congested. The routing process i.e. choosing the
best path to transmit and receive a message by mobile nodes began at time 10.491251 seconds.
All the nodes are overlapping at this stage for easy transfer of data packets. When it gets to a
point where a node is out of its original position i.e. out of its coverage area, intermediate nodes
are able to relay data packets on behalf of other nodes and this is one of the main purposes of ad-
hoc network.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014
71
Figure 11: Nam Showing That Mobile Nodes Lifetime Is Enhanced When Node 1 Went Out Of Its Range
Totally And There Is Still Communication Between Nodes 1 And 4.
Figure 11 above shows that the mobile nodes 3, 2, and 4 are now overlapping each other while
nodes 1 and 0 are separate nodes and also out of their initial position. This occurred at time
49.666109 seconds. Therefore, lifetime in a wireless ad-hoc network has been enhanced though
node 1 is out of its coverage area and there is still communication between nodes 1 and 4. When
it happens this way, the node sending the data packets i.e. node 4 uses so much energy in
transmitting this message to node 1 just to ensure that node 1 receives the message. Unless node 1
is out of the network before it cannot receive the message. While this was going on, node 0 was
also moving due to frequent mobility that takes place in the wireless environment. The distances
of nodes 1 and 0 are relative to node 4.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014
72
Figure 12: Nam Displaying Packets Dropped When Node 1 Went Out Of Its Coverage Area
In Figure 12 above, nodes 1 and 4 are no more communicating and as a result both nodes dropped
their data packets. The squared-like structures falling from nodes 1 and 4 are the data packets
been dropped or lost. This happened due to mobility of nodes within the wireless environment.
This is because node 1 changed its original position and went further away from its radius. Node
4 then uses its point of reference to quickly look for nearby nodes who can relay data packets on
its behalf. Node 4 then finds the nearest neighbour node which is node 0 which finally relayed its
data packets to node 1 which were communicating initially.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014
73
Figure 13: Nam Showing That Communication Is Still Taking Place Between Nodes 1 And 4.
Figure 13 above shows that though node 1 went further away from its coverage area due to
mobility of wireless mobile nodes in ad-hoc network, node 4 quickly looks at its referencing point
and uses the nearest node i.e. node 0 to still relay packets to node 1. In this way, node 0 transmits
packets on-behalf of node 4. This process also took place at time 79.791880 seconds. However, it
uses sequence numbers to indicate how fresh or current the information is within the network.
When a mobile node receives a message, it checks to see if the message is meant for it. If the
message is intended for it, it then sends a reply back to the source and if not; it sends the message
to other nodes within the network. In this case, the node checks the sequence number within the
message received and if it is higher than what it has, it automatically increases or updates its own
to the current one before either sending or accepting the message. The nodes also do not maintain
routing tables but rather stores information about the network in a form of pointers for easy
referencing.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014
74
Figure 14: Xgraph Animator Displaying End Of Simulation Results.
Graph: Distance Of Mobile Nodes In Metres(M) On (Y-Axis) Against Time In Seconds(Sec) On X-Axis.
Xgraph is a graph plotting software in NS-2 that plots a graph and displays the results after
simulating the Tcl script. After simulating the tcl script, the output of the tcl script is then sent as
input to the xgraph which then plots the graph for the simulation based on this input. From the
graph, the Y-axis stands for the distances of mobile nodes 0, 1, 4 and the X-axis stands for the
time used by these nodes for the simulation in seconds. The distances of these mobile nodes i.e.
nodes 0 and 1 are relative to node 4. These were the main nodes used for communication within
the simulation. The clustering process began at time 0.0000seconds and the routing process also
at time 10.0000seconds. The highest peak which is blue in colour indicates the node mobility of
node 1. As node 1 moved further away from its coverage area, it is still possible to receive data
packets from Node 4. The next peak in rank which is also green in colour indicates the node
mobility of node 0. It also moved further away from its coverage area as node 1 moves. Node 0 is
therefore able to transmit data packets on behalf of node 4. This is the purpose of ad-hoc
networks i.e. intermediate nodes should be able to forward or relay data packets on behalf of
other nodes that are totally out of its transmission range.
Finally, the last peak which is red in colour indicates node 4 which also moved slightly away
from its initial position in order to still make communication possible between itself and node 1.
The simulation ended at time 60.0000seconds.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014
75
The rise in peak indicates the point at which mobile nodes are able to receive data packets at a
higher rate and the fall in peak indicates the point at which mobile nodes are still able to receive
data packets but at a lower rate due to mobility of nodes within the wireless environment. Certain
environmental factors such as rain and foliage can also limit the transmission of data packets.
Table 1: routing time for mobile nodes from nam
MOBILE NODES DATA TRANSFER AODV ROUTING TIME (SECONDS)
ALL NODES
7.565666 - (CLUSTERING PROCESS)
10.777777- (ROUTING PROCESS)
BETWEEN NODES
1 AND 4
49.999999
BETWEEN NODES
1, 0 AND 4
79.989898
5.0 Conclusions
A lot of research had been conducted within the wireless mobile ad hoc network environments
these recent years using numerous protocols. Mobile Ad hoc network has a brighter future and
more prospects to deliver. A lot of computing devices are being developed day in day out with
very high processing speeds at a faster rate. However, not much have been said or done for
clustering systems in mobile ad hoc networks using AODV protocol. This paper presents on such
kind. The study conducted in this paper reveals that the AODV protocol does not maintain any
routing tables in the nodes but rather stores information about the network in a form of pointers
for easy referencing which results in less overhead and more bandwidth availability. The AODV
routing protocol also consumes less bandwidth, decreases overhead and able to support very large
number of mobile nodes in a congested and clustered network. As a result, it enhanced mobile
nodes life time and performance in clustering systems within MANETs.
The challenges faced by the AODV routing protocol used within the clustering system in a
wireless MANET environment are as follows:
Mobile nodes that are transitional can lead to inconsistent routes if the source sequence number is
very old and obsolete; and these transitional nodes may have a higher but not the latest
destination sequence number, thereby having out-of-date entries. Secondly, multiple Route Reply
packets that is in response to a single Route Request packet can lead to a heavy control overhead.
When data transfer is taking place between mobile nodes and one of the nodes changes its
position, the data packets been transferred are loss. The node sending the data packets has to use
its referencing point in a form of pointer to look for the immediate neighbour node quickly that
can relay data packets on its behalf to that particular node it was communicating with earlier on.
The loss of data packets are normally triggered either by mobility of mobile nodes or
environmental factors such as rain or foliage. The loss of data packets between mobile nodes 1
and 4 as shown in Figure 12 above occurred at time 55.125298seconds. Further study will be
focused on solving AODV’s routing protocol limitations for clustered networks in MANETs.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014
76
References
[1] Ravi Kumar Bansal “Performance Analysis Of Cluster Based Routing Protocol In Manets
“,http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.134.7909&rep=rep1&type=pdf
[2] Johnson “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks”,
http://www.csun.edu/~andrzej/COMP529-S05/papers/dsr%20-
%20dynamic%20source%20routing.pdf
[3] Sk. Munwar and Dr. V.V.Rama Prasad "Comparative Study of Reactive Routing Protocols for
MANETs", http://www.ijcnwc.org/papers/vol2no22012/4vol2no2.pdf
[4] Tony Larsson and Nicklas Hedman "Routing Protocosl in Wireless Ad hoc Networks - A Simulation
Study", http://www.ietf.org/proceedings/44/slides/manet-thesis-99mar.pdf
[5] Kevin Fall and Kannan Varadhan (2001): Editors, “Ns notes and documentation”, The VINT Project,
UC Berkeley, LBL, USC/ISI, and Xerox PARC, Viewed on March 04, 2013
http://www.isi.edu/nsnam/ns
[6] Toh, C-K (2001), “Ad Hoc Mobile Wireless Networks.” Prentice Hall, New Jersey 2001.
[7] Perkins C. E. and Royer E. M., “Ad-Hoc On-Demand Distance Vector Routing,” In Proceedings of
the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, USA, pp.
90-100, February 1999.
[8] Freebersyser, James A. and Leiner, Barry. (2001), “A DoD Perspective on Mobile Ad Hoc
Networks,” Ad Hoc Networking, Chapter 2, © 2001, pp. 29-51.
[9] David B. Johnson and David A. Maltz, “Dynamic source routing in ad hoc wireless networks,” In
Mobile Computing, edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153–181. Kluwer
Academic Publishers, 1996.
[10] Bernd Freisleben and Ralph Jansen, “Analysis of routing protocols for ad hoc networks of mobile
computers,” In Proceedings of the 15th IASTED International Conference on Applied Informatics,
pages 133–136, Innsbruck, Austria, February 1997. IASTED-Acts Press.
[11] Luke Klein-Berndt (2011) : “A Quick Guide to AODV Routing”, Wireless Communications
Technologies Group, National Institute of Standards and Technology, IETF Manet Working Group
AODV Draft, Viewed on March 04, 2013 http://w3.antd.nist.gov/wctg/aodv_kernel/aodv_guide.pdf
[12] Luo, Jun; Eugster, Patrick Th.; and Hubaux, Jean-Pierre. (2004), “Probabilistic Reliable Multicast In
Ad Hoc Networks,” Ad Hoc Networks, Vol. 2, Issue 4, October 2004, pp. 369-386.
[13] Abolhasan, Mehran; Wysocki, Tadeusz; and Dutkiewicz, Eryk. (2004), “A Review Of Routing
Protocols For Mobile Ad Hoc Networks,” Elsevier’s Ad Hoc Networks, Vol. 2, Issue 1, January
2004, pp. 1-22.
[14] Ghosh, R.K., Garg, Vijay, Meiti, M.S, Raman, S., Kumar, A., and Tewari, N. (2006), “Dense cluster
gateway based routing protocol for multi-hop mobile ad hoc networks,” Ad Hoc Networks, Volume
4, pp. 168-185.
[15] Vincent D. Park and M. Scott Corson, “A performance comparison of TORA and Ideal Link State
routing,” In Proceedings of IEEE Symposium on Computers and Communication ’98, June 1998.
[16] M. Scott Corson and Anthony Ephremides, “A distributed routing algorithm for mobile wireless
networks,” Wireless Networks, 1(1):61–81, February 1995.
[17] Cook, Jason L. and Ramirez-Marquez, Jose E. (2007) Reliability Analysis of Cluster Based Ad-hoc
Networks. (In Press, Reliability Engineering & System Safety).
[18] Cook, Jason L. and Ramirez-Marquez, Jose E. (2006) Two-terminal reliability analyses for a mobile
ad-hoc wireless network. Reliability Engineering & System Safety Volume 92, Issue 6, June 2007,
Pages 821-829.
[19] Kumar, Anup; Pathak, Rakesh; and Gupta, Yash (1995) Genetic algorithm based reliability
optimization for computer network expansion. IEEE Transactions on reliability, Vol 44, No. 1, March
1995, pp. 63-72.
[20] Cook, Jason L. and Ramirez-Marquez, Jose E. (2006) Mobility and reliability modeling for a mobile
ad-hoc network. (In Press, IIE Transactions).

More Related Content

What's hot

Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backupcsandit
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijasuc
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijsptm
 
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsIRJET Journal
 
QoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networksQoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networksjournalBEEI
 
ETX METRIC FOR EXTREMELY OPPORTUNISTIC ROUTING TO IMPROVE THE PERFORMANCE OF ...
ETX METRIC FOR EXTREMELY OPPORTUNISTIC ROUTING TO IMPROVE THE PERFORMANCE OF ...ETX METRIC FOR EXTREMELY OPPORTUNISTIC ROUTING TO IMPROVE THE PERFORMANCE OF ...
ETX METRIC FOR EXTREMELY OPPORTUNISTIC ROUTING TO IMPROVE THE PERFORMANCE OF ...ijasuc
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015parry prabhu
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSIJMIT JOURNAL
 
5113jgraph01
5113jgraph015113jgraph01
5113jgraph01graphhoc
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

What's hot (15)

Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backup
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
Ijcnc050209
Ijcnc050209Ijcnc050209
Ijcnc050209
 
Ttacca
TtaccaTtacca
Ttacca
 
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
 
QoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networksQoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networks
 
B0781013215
B0781013215B0781013215
B0781013215
 
ETX METRIC FOR EXTREMELY OPPORTUNISTIC ROUTING TO IMPROVE THE PERFORMANCE OF ...
ETX METRIC FOR EXTREMELY OPPORTUNISTIC ROUTING TO IMPROVE THE PERFORMANCE OF ...ETX METRIC FOR EXTREMELY OPPORTUNISTIC ROUTING TO IMPROVE THE PERFORMANCE OF ...
ETX METRIC FOR EXTREMELY OPPORTUNISTIC ROUTING TO IMPROVE THE PERFORMANCE OF ...
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015
 
IJET-V2I6P5
IJET-V2I6P5IJET-V2I6P5
IJET-V2I6P5
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
 
5113jgraph01
5113jgraph015113jgraph01
5113jgraph01
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Viewers also liked

Survey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesSurvey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesIJMER
 
Plenzogan technology
Plenzogan technologyPlenzogan technology
Plenzogan technologyplenzogan
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
 
Address allocation for MANET merge and partition using cluster based routing
Address allocation for MANET merge and partition using cluster based routingAddress allocation for MANET merge and partition using cluster based routing
Address allocation for MANET merge and partition using cluster based routingsugandhasinghhooda
 
Ieee 2015 ns2 project list
Ieee 2015 ns2 project listIeee 2015 ns2 project list
Ieee 2015 ns2 project listigeeks1234
 
Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)Ambreen Zafar
 
Porting aodv uu implementation to ns-2
Porting aodv uu implementation to ns-2Porting aodv uu implementation to ns-2
Porting aodv uu implementation to ns-2Xaris1985
 
Cluster based routing protocol 1
Cluster based routing protocol 1Cluster based routing protocol 1
Cluster based routing protocol 1Sudhansu Dash
 
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECTPerformance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECTRavi Teja P
 
Performance analysis of AODV And OLSR
Performance analysis of AODV And OLSRPerformance analysis of AODV And OLSR
Performance analysis of AODV And OLSRMitesh Thakore
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networksNarendra Singh Yadav
 
Using Omnet++ in Simulating Ad-Hoc Network
Using Omnet++ in Simulating Ad-Hoc Network Using Omnet++ in Simulating Ad-Hoc Network
Using Omnet++ in Simulating Ad-Hoc Network Ahmed Nour
 
Vanet ns2 simulation
Vanet ns2 simulationVanet ns2 simulation
Vanet ns2 simulationciza2013
 
Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34Shaikhul Islam Chowdhury
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsGiancarlo Romeo
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)IJCNCJournal
 

Viewers also liked (20)

Survey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesSurvey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering Techniques
 
Plenzogan technology
Plenzogan technologyPlenzogan technology
Plenzogan technology
 
Sixth sense
Sixth senseSixth sense
Sixth sense
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
Address allocation for MANET merge and partition using cluster based routing
Address allocation for MANET merge and partition using cluster based routingAddress allocation for MANET merge and partition using cluster based routing
Address allocation for MANET merge and partition using cluster based routing
 
Ieee 2015 ns2 project list
Ieee 2015 ns2 project listIeee 2015 ns2 project list
Ieee 2015 ns2 project list
 
Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)
 
Porting aodv uu implementation to ns-2
Porting aodv uu implementation to ns-2Porting aodv uu implementation to ns-2
Porting aodv uu implementation to ns-2
 
Cluster based routing protocol 1
Cluster based routing protocol 1Cluster based routing protocol 1
Cluster based routing protocol 1
 
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECTPerformance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECT
 
Performance analysis of AODV And OLSR
Performance analysis of AODV And OLSRPerformance analysis of AODV And OLSR
Performance analysis of AODV And OLSR
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
 
Omnet++
Omnet++Omnet++
Omnet++
 
Using Omnet++ in Simulating Ad-Hoc Network
Using Omnet++ in Simulating Ad-Hoc Network Using Omnet++ in Simulating Ad-Hoc Network
Using Omnet++ in Simulating Ad-Hoc Network
 
Vanet ns2 simulation
Vanet ns2 simulationVanet ns2 simulation
Vanet ns2 simulation
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing Algorithms
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
 

Similar to Clustering effects on wireless mobile ad hoc networks performances

Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...IJERA Editor
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
 
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc NetworksOptimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc Networksijasuc
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
 

Similar to Clustering effects on wireless mobile ad hoc networks performances (20)

Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
Ds35676681
Ds35676681Ds35676681
Ds35676681
 
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 
J018216275
J018216275J018216275
J018216275
 
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc NetworksOptimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
 
2 sima singh-6-13
2 sima singh-6-132 sima singh-6-13
2 sima singh-6-13
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 

Clustering effects on wireless mobile ad hoc networks performances

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014 DOI : 10.5121/ijcsit.2014.6105 59 Clustering Effects on Wireless Mobile Ad-Hoc Networks Performances Gideon Naah1 and Edwin Boadu Okoampa2 1 School of Electronic Engineering, University of Electronic Science and Technology of China, Chengdu - China 2 School of Micro-Electronics and Solid State Electronics, University of Electronic Science and Technology of China, Chengdu - China ABSTRACT A new era is dawning for wireless mobile ad hoc networks where communication will be done using a group of mobile devices called cluster, hence clustered network. In a clustered network, protocols used by these mobile devices are different from those used in a wired network; which helps to save computation time and resources efficiently. This paper focuses on Cluster-Based Routing Protocol and Dynamic Source Routing. The results presented in this paper illustrates the implementation of Ad-hoc On-Demand Distance Vector routing protocol for enhancing mobile nodes performance and lifetime in a clustered network and to demonstrate how this routing protocol results in time efficient and resource saving in wireless mobile ad hoc networks. KEYWORDS AODV, CBRP, DSR, MANETs, Routing. 1. Introduction A wireless mobile ad-hoc network is a group of mobile devices that forms a network which does not require the usage of wires or cables for communication. Mobile nodes in this network are able to detect the presence of nodes that are in close proximity. Due to the limited transmission range of wireless network interfaces, multiple networks “hops” may be needed for one node to exchange data with another across the network. Wireless ad-hoc networks have some properties such as the dynamic network topology, limited bandwidth and energy constraint in the network as described by Kumar et al [1]. Mobile ad hoc network (MANET) is useful for different purposes e.g. military operation to provide communication between squads, collaborative and distributed computing, wireless mesh control, wireless sensor networks, hybrid network, medical control etc. Kumar et al [1] said “routing protocol plays very important part in implementation of mobile ad hoc networks. The following are the main protocols used in routing: Proactive or table driven routing protocols and Reactive or on-demand routing protocols. DSR (Dynamic Source Routing) requires no periodic packets of any kind at any level within the network as stated by Johnson et al [2]. DSR does not use any periodic routing advertisement, link status sensing, or neighbour detection packets, and does not rely on these functions from any underlying protocols in the network. This entirely on-demand behaviour and lack of periodic activity allows the number of overhead packets caused by DSR to scale all the way down to zero, when all nodes are approximately stationary with respect to each other and all routes needed for current communication have
  • 2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014 60 already been discovered also as stated by Johnson et al [2]. As nodes begin to move more or as communication patterns change, the routing packet overhead of DSR automatically scales to only that needed to track the routes currently in use. In response to a single Route Discovery (as well as through routing information from other packets overheard), a node may learn and cache multiple routes to any destination. This allows the reaction to routing changes to be much more rapid, since a node with multiple routes to a destination can try another cached route if the one it has been using should fail. This caching of multiple routes also avoids the overhead of needing to perform a new Route Discovery each time a route in use breaks. The operation of Route Discovery and Route Maintenance in DSR are designed to allow unidirectional links and asymmetric routes to be easily supported. In wireless networks, it is possible that a link between two nodes may not work equally well in both directions, due to differing antenna or propagation patterns or sources of interference as described by Johnson et al [2]. DSR allows such unidirectional links to be used when necessary, improving overall performance and network connectivity in the system [1]. DSR also supports internetworking between different types of wireless networks allowing a source route to be composed of hops over a combination of any types of networks available by Johnson et al [2]. For example, some nodes in the ad hoc network may have only short-range radios, while other nodes have both short-range and long-range radios; the combination of these nodes together can be considered by DSR as a single ad hoc network [2]. DSR is an on-demand routing protocol and cannot perform well in a large MANET and the reason is that it has scalability issues when the size of the network increases, mostly when there is node mobility simultaneously. Proactive routing requires control overhead for building and updating this table, having information about the state of the network. For on-demand routing protocols, routes are found when required; however this causes it to suffer significant route setup delay which becomes intolerable in the presence of both a large number of nodes movement. The fundamental idea of on-demand routing protocols is that, an initial node sends a route request and makes a decision based on the reply received, which may be sent by an intermediate mobile node. However, on- demand routing algorithms have the disadvantage of increasing per-packet overhead. This per- packet overhead reduces the available bandwidth for information transmission in the network. Due to the routine of dissemination of path requests (flooding), it is difficult to reduce the dissemination of packets unnecessarily [1]. Management of large number of nodes is one of the essential issues ad-hoc network faces. The nodes of a wireless ad-hoc network are divided into numerous fragmented or intersecting clusters. Each cluster elects one node as the so-called cluster head and these distinct nodes are accountable for the routing process. Neighbours of cluster heads cannot be cluster heads as well. But cluster heads are able to communicate with each other by using gateway nodes. A gateway is a node that has two or more cluster heads as its neighbours or— when the clusters are disjoint—at least one cluster head and another gateway node. Cluster heads helps in the reduction of traffic and this is because requests will only be sent through them. Information transmission is therefore done only by these cluster heads from one cluster to the other. As in any other categorized protocol used in routing, there are overheads associated with cluster formation and maintenance as described by Sk. Munwar and Dr. V.V.Rama Prasad [3].
  • 3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014 61 Figure 1: A cluster based Ad Hoc network: [4] Pattern used by CBRP: Source → Cluster head → Gateway → Cluster head → Gateway → ··· → Destination This paper presents the implementation of Ad-hoc On-Demand Distance Vector (AODV) routing protocol to enhance the performance and lifetime of nodes in a clustered network and to demonstrate how this routing protocol results in time efficient and resource saving in mobile ad hoc networks. AODV is implemented using Network Simulator-2 (NS-2) which is the simulation environment. NS-2[5] is an object-oriented discrete event driven network simulator developed at University of California (UC) Berkeley written in C++ and Object Tool Command Language (OTcl). 2.0 Related works 2.1 Ad-Hoc Network Toh [6] described an ad-hoc network as “a collection of two or more devices equipped with wireless communications and networking capability.” Communication in ad hoc network can be done directly between nearby nodes in close proximity or use an intermediate node to reach nodes that other nodes cannot reach. There are two main merits ad hoc networks can boast of and they are as follows: (a) Has no wired/cable connected systems put in place (b) Has the ability of creating its own network easily That is in a conventional network, devices like switches, cabling/wiring, base-stations, and routers are not required. A deployment strategy was proposed to increase the probability of a ‘reliable path’. No other protocol has been developed to efficiently enhance the performance and lifetime of nodes in ad-hoc network. Ad hoc network’s issues of design was introduced by [7], summarizing an ad-hoc networking design as follows: “operate each mobile node as a specialized router, which periodically
  • 4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014 62 advertises its view of the interconnection topology with other mobile nodes within the network.” The exceptional part here is dealing with the effects of nodes mobility. That is, ad-hoc networking protocols must be able to sense and then react to changes in the network’s environment. Freebersyser and Leiner [8] described the implementations of the MANET for Department of Defence (DoD) applications. 2.2 Cluster-based MANET The clustered MANET is an extension of the ubiquitous MANET schema. As the size of the network (number of mobile nodes) increases, resources such as bandwidth becomes limited. Clustering however, is able to break the network into groups which makes dissemination of packets easily and at the long run; it enhances and widens the usage of resources that were previously limited. This is done by dividing the ad hoc network into numerous smaller sub networks. This sub networks are then brought together by what is termed back-bone network. Numerous nodes are then selected as the back-bone nodes. Together they form the back-bone network. A popular network design includes two back-bone networks. The use of cluster based MANET for wireless sensor networks were also addressed. In the literatures, the researchers developed a Medium Access Control (MAC) scheme that is event driven. However, clustering consumes bandwidth, drain mobile nodes energy quickly, causes congestion, collision and data delay in larger networks because of beacon messages i.e. periodic hello messages been broadcast at every interval. Some simulation results for DSR, Destination Sequenced Distance Vector (DSDV) and Temporarily Ordered Routing Algorithm (TORA) have been presented in earlier papers, those simulations used considerably different input parameters which differ from this paper and did not simulate the wireless network as accurately. Currently, there is no awareness of any previously published performance enhancement results for mobile nodes using AODV in wireless mobile ad hoc networks environments. 2.3 TORA Some researchers named Park and Corson, also worked on another protocol named Temporarily Ordered Routing Algorithm (TORA) as named above. In order to avoid congestion, their simulation used a packet transmission rate of only 4, 1.5, or 0.6 packets per minute per node. Their work showed that the nodes were divided by links and these nodes had two states namely active state and inactive state. Active state means that the node is operational and inactive state also means that the node is not operational. These links were error free and no dynamics below the network layer were modeled. 2.4 Johnson and Maltz Johnson and Maltz previously simulated DSR [9] using the same mobility model as in other papers. Their work had issues with the MAC layer and the way its radio was propagated. Furthermore, broadcast and unicast packets were delivered with the same probability and this is not a realistic assumption.
  • 5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014 63 2.5 Freisleben and Jansen Freisleben and Jansen [10] did a simulation and a comparison on DSR and DSDV. Their simulations used configurations of 10 mobile nodes, with movement speeds relative to transmission range, making some of their results unrealistic. All events in their simulator took place in regular time steps, resulting in perfectly synchronized behaviour of a number of separate mobile nodes in some cases. 3.0 Methodology used Recently, a diversity of different and novel routing protocols have been developed to study the movement of nodes in wireless mobile ad hoc networks, but employing a mechanism for enhancing mobile nodes performance and lifetime in a larger and dense clustered networks and to demonstrate how this routing protocol results in time efficient and resource saving in mobile ad- hoc networks is not yet available. This paper adaptively optimizes the frequent needs of those messages using AODV protocol. The proposed AODV algorithm used to model the uncertainties for updating local connectivity successfully in time. AODV routing algorithm was developed from two other routing protocols namely DSDV (Destination Sequenced Distance Vector) and DSR routing algorithms. The AODV protocol took two properties from the DSDV routing algorithm and one property from the DSR routing algorithm. These properties are as follows: 1) The Sequence Numbering Process and Periodic Hello Messaging from the DSDV routing protocol. 2) The Route Discovery Process from the DSR routing protocol. The following describes how the AODV protocol operates within the wireless network: Figure 2 [11] AODV is a technique of routing messages between mobile devices. It allows these mobile devices or nodes to transmit messages through their neighbours to nodes they cannot communicate with directly.
  • 6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014 64 These nodes do not keep or maintain routing tables but rather stores information about the network in a form of pointers for easy referencing. AODV is able to do this by discovering the routes along which messages can be transmitted. This protocol sees to it that paths that are required for transmitting and receiving data does not repeat itself over and over again termed loop and tries to find the most shortest path if the need be. When there are alterations in paths required for transmitting and receiving data, and if there are errors in these paths; this protocol is also able to handle all these. This can be seen as shown in the figure above. Figure 3 [11] When nodes have a bidirectional link with one other, which means that they can communicate with each other directly; they are referred to as neighbours. For a node to know the location of other nodes (neighbours), it listens to messages broadcasted at certain time intervals and it uses this process to track its neighbours. For a node to send a message to another node that is not in close proximity, it transmits what is called a Route Request (RREQ) message. This message has several kinds of information namely: the source, the destination, the lifespan of the message and a Sequence Number which serves as a unique ID. In the example as shown in Figure 3 above, Node 1 wishes to send a message to Node 3. Node 1’s Neighbours are Nodes 2 and 4. Since mobile node 1 cannot directly communicate with mobile node 3, mobile node 1 sends out a RREQ. The RREQ is heard by mobile nodes 2 and 4.
  • 7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014 65 Figure 4 [11] For neighbours of mobile nodes that are not in close proximity such as neighbours of mobile node 1 receives a message, they check to see whether the message is meant for them or they know the best path to transmit this message to the rightful owner. If the message is meant for them, they will just send back a reply message to node 1; other than that will retransmit the request message to their set of neighbours. This message keeps getting retransmitted until its lifespan is over. If node 1 does not receive a reply in a certain time interval, it will retransmit the request except this time the request message will have a longer lifespan than previous and a new ID number. These mobile nodes uses what is called Sequence Number in the request message to insure that they do not retransmit a request message. This can be seen in the figure above as shown. SEQUENCE NUMBERS Figure 5 [11]
  • 8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014 66 Sequence numbers serve as time stamps. They allow mobile nodes to compare how current their information on other nodes are. A mobile node always increases its sequence number any time it transmits information/data. Every time a mobile node communicates with its neighbours, it keeps records of sequence numbers belonging to all the mobile nodes it had interacted with. When the sequence number is high, it tells that that is the current and newer path which can or must be used for transmitting and receiving information. In other words, a higher Sequence number signifies a fresher route. More accurate and current information can be obtained as a result of using this process. This can be seen as shown in the figure above. ERROR MESSAGES Figure 6 [11] For AODV to adjust and make updates to changes in paths that are required for communication, it uses what is called the route error message (RERR) in doing this. It uses this RERR message in omitting/deleting mobile nodes paths that are irrelevant and no more in use or required, and it does this by using its referencing point. There are situations whereby these mobile nodes cannot communicate with one or more mobile nodes and when this happens, it looks at its referencing point for Route that uses the Neighbour for a next hop and marks them as invalid. Then it sends out a RERR with the Neighbour and the invalid routes. This can also be seen in the figure above.
  • 9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014 67 4.0 Experimental Results Figure 7: Console Mode In Red Hat Enterprise Linux Server 5 Operating System Figure 7 above shows the console mode of Red Hat Enterprise Linux Server 5 Operating System Edition where the NS-2 applications and Tcl codes can be run for the required animator called NAM in NS-2 to be displayed.
  • 10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014 68 Figure 8: Showing Nam (Network Animator) Meant For The Simulation Process In Figure 8 above, this is where the simulation of the AODV routing protocol will take place between the nodes. The nodes in the nam are what to be used for the simulation. The nodes are at their initial positions as shown above and they are 5 in all. Five nodes were used for clearer view of the simulation.
  • 11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014 69 Figure 9: Nam With Nodes Mobility In Figure 9 above, this is where mobile nodes within the wireless ad-hoc network began the clustering process i.e. organizing themselves to form a cluster before communication takes place between them. The 5 nodes in the nam have now completely formed a cluster at time 7.325251 seconds and each node therefore knows the location of its neighbours’. Therefore sending data packets to any other node would not cause any difficulty. Communication of data packets among these mobile nodes took place mainly between nodes 1, 0 and 4.
  • 12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014 70 Figure 10: Nam Displaying The Signals Each Mobile Node Is Transmitting Within The Wireless Ad-Hoc Network And Also Showing That Communication Is Still Possible Though There Is Congestion Within The Wireless Ad-Hoc Network. In Figure 10 above, each node within the wireless ad-hoc network is transmitting a signal in order to sense the presence of its members before communication takes place. After connection is established between the wireless mobile nodes, any data packets can now be transmitted between these mobile nodes. In the diagram, communication is still taking place between the nodes such as nodes 1 and 4 though these mobile nodes are congested. The routing process i.e. choosing the best path to transmit and receive a message by mobile nodes began at time 10.491251 seconds. All the nodes are overlapping at this stage for easy transfer of data packets. When it gets to a point where a node is out of its original position i.e. out of its coverage area, intermediate nodes are able to relay data packets on behalf of other nodes and this is one of the main purposes of ad- hoc network.
  • 13. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014 71 Figure 11: Nam Showing That Mobile Nodes Lifetime Is Enhanced When Node 1 Went Out Of Its Range Totally And There Is Still Communication Between Nodes 1 And 4. Figure 11 above shows that the mobile nodes 3, 2, and 4 are now overlapping each other while nodes 1 and 0 are separate nodes and also out of their initial position. This occurred at time 49.666109 seconds. Therefore, lifetime in a wireless ad-hoc network has been enhanced though node 1 is out of its coverage area and there is still communication between nodes 1 and 4. When it happens this way, the node sending the data packets i.e. node 4 uses so much energy in transmitting this message to node 1 just to ensure that node 1 receives the message. Unless node 1 is out of the network before it cannot receive the message. While this was going on, node 0 was also moving due to frequent mobility that takes place in the wireless environment. The distances of nodes 1 and 0 are relative to node 4.
  • 14. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014 72 Figure 12: Nam Displaying Packets Dropped When Node 1 Went Out Of Its Coverage Area In Figure 12 above, nodes 1 and 4 are no more communicating and as a result both nodes dropped their data packets. The squared-like structures falling from nodes 1 and 4 are the data packets been dropped or lost. This happened due to mobility of nodes within the wireless environment. This is because node 1 changed its original position and went further away from its radius. Node 4 then uses its point of reference to quickly look for nearby nodes who can relay data packets on its behalf. Node 4 then finds the nearest neighbour node which is node 0 which finally relayed its data packets to node 1 which were communicating initially.
  • 15. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014 73 Figure 13: Nam Showing That Communication Is Still Taking Place Between Nodes 1 And 4. Figure 13 above shows that though node 1 went further away from its coverage area due to mobility of wireless mobile nodes in ad-hoc network, node 4 quickly looks at its referencing point and uses the nearest node i.e. node 0 to still relay packets to node 1. In this way, node 0 transmits packets on-behalf of node 4. This process also took place at time 79.791880 seconds. However, it uses sequence numbers to indicate how fresh or current the information is within the network. When a mobile node receives a message, it checks to see if the message is meant for it. If the message is intended for it, it then sends a reply back to the source and if not; it sends the message to other nodes within the network. In this case, the node checks the sequence number within the message received and if it is higher than what it has, it automatically increases or updates its own to the current one before either sending or accepting the message. The nodes also do not maintain routing tables but rather stores information about the network in a form of pointers for easy referencing.
  • 16. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014 74 Figure 14: Xgraph Animator Displaying End Of Simulation Results. Graph: Distance Of Mobile Nodes In Metres(M) On (Y-Axis) Against Time In Seconds(Sec) On X-Axis. Xgraph is a graph plotting software in NS-2 that plots a graph and displays the results after simulating the Tcl script. After simulating the tcl script, the output of the tcl script is then sent as input to the xgraph which then plots the graph for the simulation based on this input. From the graph, the Y-axis stands for the distances of mobile nodes 0, 1, 4 and the X-axis stands for the time used by these nodes for the simulation in seconds. The distances of these mobile nodes i.e. nodes 0 and 1 are relative to node 4. These were the main nodes used for communication within the simulation. The clustering process began at time 0.0000seconds and the routing process also at time 10.0000seconds. The highest peak which is blue in colour indicates the node mobility of node 1. As node 1 moved further away from its coverage area, it is still possible to receive data packets from Node 4. The next peak in rank which is also green in colour indicates the node mobility of node 0. It also moved further away from its coverage area as node 1 moves. Node 0 is therefore able to transmit data packets on behalf of node 4. This is the purpose of ad-hoc networks i.e. intermediate nodes should be able to forward or relay data packets on behalf of other nodes that are totally out of its transmission range. Finally, the last peak which is red in colour indicates node 4 which also moved slightly away from its initial position in order to still make communication possible between itself and node 1. The simulation ended at time 60.0000seconds.
  • 17. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014 75 The rise in peak indicates the point at which mobile nodes are able to receive data packets at a higher rate and the fall in peak indicates the point at which mobile nodes are still able to receive data packets but at a lower rate due to mobility of nodes within the wireless environment. Certain environmental factors such as rain and foliage can also limit the transmission of data packets. Table 1: routing time for mobile nodes from nam MOBILE NODES DATA TRANSFER AODV ROUTING TIME (SECONDS) ALL NODES 7.565666 - (CLUSTERING PROCESS) 10.777777- (ROUTING PROCESS) BETWEEN NODES 1 AND 4 49.999999 BETWEEN NODES 1, 0 AND 4 79.989898 5.0 Conclusions A lot of research had been conducted within the wireless mobile ad hoc network environments these recent years using numerous protocols. Mobile Ad hoc network has a brighter future and more prospects to deliver. A lot of computing devices are being developed day in day out with very high processing speeds at a faster rate. However, not much have been said or done for clustering systems in mobile ad hoc networks using AODV protocol. This paper presents on such kind. The study conducted in this paper reveals that the AODV protocol does not maintain any routing tables in the nodes but rather stores information about the network in a form of pointers for easy referencing which results in less overhead and more bandwidth availability. The AODV routing protocol also consumes less bandwidth, decreases overhead and able to support very large number of mobile nodes in a congested and clustered network. As a result, it enhanced mobile nodes life time and performance in clustering systems within MANETs. The challenges faced by the AODV routing protocol used within the clustering system in a wireless MANET environment are as follows: Mobile nodes that are transitional can lead to inconsistent routes if the source sequence number is very old and obsolete; and these transitional nodes may have a higher but not the latest destination sequence number, thereby having out-of-date entries. Secondly, multiple Route Reply packets that is in response to a single Route Request packet can lead to a heavy control overhead. When data transfer is taking place between mobile nodes and one of the nodes changes its position, the data packets been transferred are loss. The node sending the data packets has to use its referencing point in a form of pointer to look for the immediate neighbour node quickly that can relay data packets on its behalf to that particular node it was communicating with earlier on. The loss of data packets are normally triggered either by mobility of mobile nodes or environmental factors such as rain or foliage. The loss of data packets between mobile nodes 1 and 4 as shown in Figure 12 above occurred at time 55.125298seconds. Further study will be focused on solving AODV’s routing protocol limitations for clustered networks in MANETs.
  • 18. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No1, February 2014 76 References [1] Ravi Kumar Bansal “Performance Analysis Of Cluster Based Routing Protocol In Manets “,http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.134.7909&rep=rep1&type=pdf [2] Johnson “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks”, http://www.csun.edu/~andrzej/COMP529-S05/papers/dsr%20- %20dynamic%20source%20routing.pdf [3] Sk. Munwar and Dr. V.V.Rama Prasad "Comparative Study of Reactive Routing Protocols for MANETs", http://www.ijcnwc.org/papers/vol2no22012/4vol2no2.pdf [4] Tony Larsson and Nicklas Hedman "Routing Protocosl in Wireless Ad hoc Networks - A Simulation Study", http://www.ietf.org/proceedings/44/slides/manet-thesis-99mar.pdf [5] Kevin Fall and Kannan Varadhan (2001): Editors, “Ns notes and documentation”, The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC, Viewed on March 04, 2013 http://www.isi.edu/nsnam/ns [6] Toh, C-K (2001), “Ad Hoc Mobile Wireless Networks.” Prentice Hall, New Jersey 2001. [7] Perkins C. E. and Royer E. M., “Ad-Hoc On-Demand Distance Vector Routing,” In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, USA, pp. 90-100, February 1999. [8] Freebersyser, James A. and Leiner, Barry. (2001), “A DoD Perspective on Mobile Ad Hoc Networks,” Ad Hoc Networking, Chapter 2, © 2001, pp. 29-51. [9] David B. Johnson and David A. Maltz, “Dynamic source routing in ad hoc wireless networks,” In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153–181. Kluwer Academic Publishers, 1996. [10] Bernd Freisleben and Ralph Jansen, “Analysis of routing protocols for ad hoc networks of mobile computers,” In Proceedings of the 15th IASTED International Conference on Applied Informatics, pages 133–136, Innsbruck, Austria, February 1997. IASTED-Acts Press. [11] Luke Klein-Berndt (2011) : “A Quick Guide to AODV Routing”, Wireless Communications Technologies Group, National Institute of Standards and Technology, IETF Manet Working Group AODV Draft, Viewed on March 04, 2013 http://w3.antd.nist.gov/wctg/aodv_kernel/aodv_guide.pdf [12] Luo, Jun; Eugster, Patrick Th.; and Hubaux, Jean-Pierre. (2004), “Probabilistic Reliable Multicast In Ad Hoc Networks,” Ad Hoc Networks, Vol. 2, Issue 4, October 2004, pp. 369-386. [13] Abolhasan, Mehran; Wysocki, Tadeusz; and Dutkiewicz, Eryk. (2004), “A Review Of Routing Protocols For Mobile Ad Hoc Networks,” Elsevier’s Ad Hoc Networks, Vol. 2, Issue 1, January 2004, pp. 1-22. [14] Ghosh, R.K., Garg, Vijay, Meiti, M.S, Raman, S., Kumar, A., and Tewari, N. (2006), “Dense cluster gateway based routing protocol for multi-hop mobile ad hoc networks,” Ad Hoc Networks, Volume 4, pp. 168-185. [15] Vincent D. Park and M. Scott Corson, “A performance comparison of TORA and Ideal Link State routing,” In Proceedings of IEEE Symposium on Computers and Communication ’98, June 1998. [16] M. Scott Corson and Anthony Ephremides, “A distributed routing algorithm for mobile wireless networks,” Wireless Networks, 1(1):61–81, February 1995. [17] Cook, Jason L. and Ramirez-Marquez, Jose E. (2007) Reliability Analysis of Cluster Based Ad-hoc Networks. (In Press, Reliability Engineering & System Safety). [18] Cook, Jason L. and Ramirez-Marquez, Jose E. (2006) Two-terminal reliability analyses for a mobile ad-hoc wireless network. Reliability Engineering & System Safety Volume 92, Issue 6, June 2007, Pages 821-829. [19] Kumar, Anup; Pathak, Rakesh; and Gupta, Yash (1995) Genetic algorithm based reliability optimization for computer network expansion. IEEE Transactions on reliability, Vol 44, No. 1, March 1995, pp. 63-72. [20] Cook, Jason L. and Ramirez-Marquez, Jose E. (2006) Mobility and reliability modeling for a mobile ad-hoc network. (In Press, IIE Transactions).