A Mobile Ad-hoc Network (MANET) is a self configuring network which consists of
mobile nodes with no permanent infrastructure. In a MANETs, there is no difference between a host
node and a router so that all nodes can be source plus forwarders of traffic. The task of finding routes
in Mobile Ad-hoc Network (MANET) is an important factor in determining the efficiency of any
MANET routing protocols. This paper describes about the basic idea of different routing protocols
and its efficient use in MANET. There are several routing protocols based on UNICAST and
MULTICAST. This paper will conclude the main characteristics of these protocols with comparison
and suggest the best suited protocol for particular topology or network.
On-Demand Multicast Routing Protocol.
This paper presents a novel multicast routing protocol for mobile ad hoc wireless networks. The protocol, termed ODMRP (On-Demand Multicast Routing Protocol), is a mesh-based, rather than a conventional tree- based, multicast scheme and uses a forwarding group concept (only a sub- set of nodes forwards the multicast packets via scoped flooding). It applies on-demand procedures to dynamically build routes and maintain multicast group membership. ODMRP is well suited for ad hoc wireless networks with mobile hosts where bandwidth is limited, topology changes frequently, and power is constrained. We evaluate ODMRP’s scalability and performance via simulation.
In multicast communication, there is one source and a group of destination.
In multicasting, the router may forward the received packet through several of its interfaces.
The source address is a unicast address, but destination address is a group address.
In multicast communication, there is one source and a group of destination.
In multicasting, the router may forward the received packet through several of its interfaces.
The source address is a unicast address, but destination address is a group address.
On-Demand Multicast Routing Protocol.
This paper presents a novel multicast routing protocol for mobile ad hoc wireless networks. The protocol, termed ODMRP (On-Demand Multicast Routing Protocol), is a mesh-based, rather than a conventional tree- based, multicast scheme and uses a forwarding group concept (only a sub- set of nodes forwards the multicast packets via scoped flooding). It applies on-demand procedures to dynamically build routes and maintain multicast group membership. ODMRP is well suited for ad hoc wireless networks with mobile hosts where bandwidth is limited, topology changes frequently, and power is constrained. We evaluate ODMRP’s scalability and performance via simulation.
In multicast communication, there is one source and a group of destination.
In multicasting, the router may forward the received packet through several of its interfaces.
The source address is a unicast address, but destination address is a group address.
In multicast communication, there is one source and a group of destination.
In multicasting, the router may forward the received packet through several of its interfaces.
The source address is a unicast address, but destination address is a group address.
IP Multicast Routing Part One.
Concepts explained inside are : Internet Multicast Backbone, Multicast Addressing and Mapping, Multicast: How it works, IGMP v1,v2,v3 and more.
Note: All slides care of a more detailed explanation about the concepts involved. If you need just that, send me a message and I'll reply with a pdf document with just that. All explanations are in English or/and Portuguese.
Thanks, Pedro Almeida.
This ppt describes about the Different protocols of Ad-Hoc Network .It is a pure survey report which will make clarification about each protocols used in ad-hoc network and helps to future generation to make more publishing of recent trends of ad-hoc networks.
Simulation (http://www.tetcos.com/ ) of Sink Hole Attack in Mobile Ad-Hoc Networks can be done NetSim Network Simulator
follow this link for more Details: http://www.tetcos.com/
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IP Multicast Routing Part One.
Concepts explained inside are : Internet Multicast Backbone, Multicast Addressing and Mapping, Multicast: How it works, IGMP v1,v2,v3 and more.
Note: All slides care of a more detailed explanation about the concepts involved. If you need just that, send me a message and I'll reply with a pdf document with just that. All explanations are in English or/and Portuguese.
Thanks, Pedro Almeida.
This ppt describes about the Different protocols of Ad-Hoc Network .It is a pure survey report which will make clarification about each protocols used in ad-hoc network and helps to future generation to make more publishing of recent trends of ad-hoc networks.
Simulation (http://www.tetcos.com/ ) of Sink Hole Attack in Mobile Ad-Hoc Networks can be done NetSim Network Simulator
follow this link for more Details: http://www.tetcos.com/
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A quick overview on REST : what it is and what it is not. REST has strict contraints and many internet Apis are not so REST. It’s also very popular today because RESTfull services can be consumed easily by any client or device. Soap is also still valid in a few circomstaces. It has never been so easy to create Rest-like services in .net since asp.net Web Api.
International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
Efficient and stable route selection by using cross layer concept for highly mobile network with predictive features by Rupali Singh, Gajendra Singh Dhakad
published in International Journal of Research & Technology, Volume 3, Issue 4_November_2015
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...graphhoc
This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which witness the need of energy management and security in ad hoc wireless networks. The objective of a multicast routing protocol for MANETs is to support the propagation of data from a sender to all the receivers of a multicast group while trying to use the available bandwidth efficiently in the presence of frequent topology changes. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Secure multicast routing plays a significant role in MANETs. However, offering energy efficient and secure multicast routing is a difficult and challenging task. In recent years, various multicast routing protocols have been proposed for MANETs. These protocols have distinguishing features and use different mechanisms.
Analysis of Multicast Routing Protocols: Puma and OdmrpIJMER
ABSTRACT: In general, Wireless communication is defined as sharing of information between one or more systems
through wireless links. Wireless networks can be categorized into two different modes as infrastructure based and
infrastructure less. Infrastructure based mode is the most common use wireless mode for the end user loop. Infrastructure
fewer modes also called as the Ad hoc mode relies on wireless communications without any fixed infrastructure.
Infrastructure based networks are characterized by their use of access points (AP), or base stations. The most known
example of infrastructure based wireless network is GSM and more recently, Wi-Fi. Ad Hoc networks introduce a new way
of communication. An ad hoc network is a collection of wireless mobile nodes that dynamically functions as a network
without the use of any existing infrastructure and centralized administration. Mobile Ad-hoc networking (MANET), an
emerging field of wireless networking is an autonomous system of wireless mobile hosts, connected by wireless links that
dynamically create a temporary network and establish an infrastructure less network. The topology of the network may
change frequently and unpredictably. Multicast routing has been widely applied in mobile ad hoc networks (MANETs), to
support different group oriented applications like video conferencing, interactions with Special interest groups etc.,
efficiently. This paper presents the comparative analysis of two multicast routing protocols, PUMA and ODMRP.
Keywords: MANET, PUMA, ODMRP, AODV, WMN’s.
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
Mobile Ad Hoc Networks (MANET) is an important and challenging research area. The routing protocol should detect and maintain a good route between source and destination nodes in these dynamic networks. Many routing protocols have been proposed for mobile ad hoc networks, and none can be considered as the best under all conditions. This thesis work consist a systematic comparative evaluation of a new multipath routing protocol for MANETS. The new protocol, called Multipath Destination Sequenced Distance Vector (MDSDV) is based on the well known single path Destination Sequenced Distance Vector (DSDV) is compared with known protocol DSDV. This work containing evaluates the protocols on a range of MANETS with between 50, 75 and 100 nodes, which are static nodes. The protocol comparison metrics are Throughput and Residual Energy.
3 a survey analysis on manet routing protocols and mobility models for variou...INFOGAIN PUBLICATION
Ad-hoc network is a collection of wireless mobile nodes which dynamically form a temporary network without the use of any existing network infrastructure. It may connect hundreds to thousands of mobile nodes. The primary goal of such an ad-hoc network is correct and efficient route establishment between a pair of nodes so that message can be delivered easily and in a timely manner. The main objective of this paper is to address different MANET routing protocols and different types of mobility models used in MANETs. This paper also put emphasis on the work done by various researches using routing protocols and mobility models. This paper would be great help for the people who are conducting research for the problems in MANETs.
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksijasuc
Wireless Mobile Ad-Hoc Networks is one of the attractive research field that growing exponentially in the
last decade. it surrounded by much challenges that should be solved the improve establishment of such
networks. Failure of wireless link is considered as one of popular challenges faced by Mobile Ad-Hoc
Networks (MANETs). As this type of networks does not require any pre-exist hardware. As well as, every
node have the ability of roaming where it can be connected to other nodes dynamically. Therefore, the
network internal structure will be unpredictably changed frequently according to continuous activities
between nodes that simultaneously update network topology in the basis of active ad-hoc nature. This
model puts the functionality of routing operation in crucial angle in the area of research under mobile adhoc
network field due to highly dynamic nature. Adapting such kernel makes MANET indigence new
routing techniques to settle these challenges. Thereafter, tremendous amount of routing protocols proposed
to argue with ad-hoc nature. Thus, it is quite difficult to specify which protocols operate efficiently under
different mobile ad-hoc scenarios. This paper examines some of the prominent routing protocols that are
designed for mobile ad-hoc networks by describing their structures, operations, features and then
comparing their various characteristics.
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksjake henry
Wireless Mobile Ad-Hoc Networks is one of the attractive research field that growing exponentially in the
last decade. it surrounded by much challenges that should be solved the improve establishment of such
networks. Failure of wireless link is considered as one of popular challenges faced by Mobile Ad-Hoc
Networks (MANETs). As this type of networks does not require any pre-exist hardware. As well as, every
node have the ability of roaming where it can be connected to other nodes dynamically. Therefore, the
network internal structure will be unpredictably changed frequently according to continuous activities
between nodes that simultaneously update network topology in the basis of active ad-hoc nature. This
model puts the functionality of routing operation in crucial angle in the area of research under mobile adhoc
network field due to highly dynamic nature. Adapting such kernel makes MANET indigence new
routing techniques to settle these challenges. Thereafter, tremendous amount of routing protocols proposed
to argue with ad-hoc nature. Thus, it is quite difficult to specify which protocols operate efficiently under
different mobile ad-hoc scenarios. This paper examines some of the prominent routing protocols that are
designed for mobile ad-hoc networks by describing their structures, operations, features and then
comparing their various characteristics.
Manet review characteristics, routing protocols, attacks and performance metricsIJARIIT
The term “mobile” is termed as moving and “ad hoc” is termed as a temporary network without any centralized
administration or permanent infrastructure. Because of the dynamic MANET topology, this review is mainly concentrated on
diverse routing techniques that are considered as the main challenges these days. A variety of strategies has been given for the
effective routing for providing the enhanced performance. Different routing protocols have been presented for MANET that
makes it’s hard to decide which protocol is appropriate for different network conditions. This paper gives an overview of MANET
with its applications and characteristics, its routing protocols, attacks and its performance parameters.
Similar to Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc Networks (20)
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
System-on-chip (soc) based system has so many disadvantages in power-dissipation as
well as clock rate while the data transfer from one system to another system in on-chip. At the same
time, a higher operated system does not support the lower operated bus network for data transfer.
However an alternative scheme is proposed for high speed data transfer. But this scheme is limited to
SOCs. Unlike soc, network-on-chip (NOC) has so many advantages for data transfer. It has a special
feature to transfer the data in on-chip named as transitional encoder. Its operation is based on input
transitions. At the same time it supports systems which are higher operated frequencies. In this
project, a low-power encoding scheme is proposed. The proposed system yields lower dynamic
power dissipation due to the reduction of switching activity and coupling switching activity when
compared to existing system. Even-though many factors which is based on power dissipation, the
dynamic power dissipation is only considerable for reasonable advantage. The proposed system is
synthesized using quartus II 9.1 software. Besides, the proposed system will be extended up to
interlink PE communication with help of routers and PE’s which are performed by various
operations. To implement this system in real NOC’s contains the proposed encoders and decoders for
data transfer with regular traffic scenarios should be considered.
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
Coins are important part of our life. We use coins in a places like stores, banks, buses, trains
etc. So it becomes a basic need that coins can be sorted, counted automatically. For this, there is
necessary that the coins can be recognized automatically. Automated Coin Recognition System for the
Indian Coins of Rs. 1, 2, 5 and 10 with the rotation invariance. We have taken images from the both
sides of coin. So this system is capable to recognizing coins from both sides. Features are taken from the
images using techniques as a Hough Transformation, Pattern Averaging etc.
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
Worldwide Interoperability for Microwave Access (WiMAX) is currently one of the
hottest technologies in wireless communication. It is a standard based on the IEEE 802.16 wireless
technology that provides a very high throughput broadband connections over long distances. In
parallel, Voice Over Internet Protocol (VoIP) is a new technology which provides access to voice
communication over internet protocol and hence it is becomes an alternative to public switched
telephone networks (PSTN) due to its capability of transmission of voice as packets over IP
networks. A lot of research has been done in analyzing the performances of VoIP traffic over
WiMAX network. In this paper we review the analysis carried out by several authors for the most
common VoIP codec’s which are G.711, G.723.1 and G.729 over a WiMAX network using various
service classes. The objective is to compare the results for different types of service classes with
respect to the QoS parameters such as throughput, average delay and average jitter.
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
The cloud backup is used for the personal storage of the people in terms of reducing the
mainlining process and managing the structure and storage space managing process. The challenging
process is the deduplication process in both the local and global backup de-duplications. In the prior
work they only provide the local storage de-duplication or vice versa global storage de-duplication in
terms of improving the storage capacity and the processing time. In this paper, the proposed system
is called as the ALG- Dedupe. It means the Application aware Local-Global Source De-duplication
proposed system to provide the efficient de-duplication process. It can provide the efficient deduplication process with the low system load, shortened backup window, and increased power
efficiency in the user’s personal storage. In the proposed system the large data is partitioned into
smaller part which is called as chunks of data. Here the data may contain the redundancy it will be
avoided before storing into the storage area.
Aging protocols that could incapacitate the InternetEditor IJMTER
The biggest threat to the Internet is the fact that it was never really designed. For e.g., the
BGP protocol is used by Internet routers to exchange information about changes to the Internet's
network topologies. However, it also is among the most fundamentally broken; as Internet routing
information can be poisoned with bogus routing information. Instead, it evolved in fits and start,
thanks to various protocols that have been cobbled together to fulfill the needs of the moment. Few
of protocols from them were designed with security in mind. or if they were sported no more than
was needed to keep out a nosy neighbor, not a malicious attacker. The result is a welter of aging
protocols susceptible to exploit on an Internet scale. Here are six Internet protocols that could stand
to be replaced sooner rather than later or are (mercifully) on the way out.
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
The emergence of exactitude agriculture has been promoted by the numerous developments within
the field of wireless sensing element actor networks (WSAN). These WSANs offer important data
for gathering, work management, development of crops, and limitation of crop diseases. Goals of
this paper to introducing cloud computing as a brand new way (technique) to be utilized in addition
to WSANs to any enhance their application and benefits to the area of agriculture.
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
Carpooling (also car-sharing, ride-sharing, lift-sharing), is the sharing of car journeys so
that more than one person travels in a car. It helps to resolve a variety of problems that continue to
plague urban areas, ranging from energy demands and traffic congestion to environmental pollution.
Most of the existing method used stochastic disturbances arising from variations in vehicle travel
times for carpooling. However it doesn’t deal with the unmet demand with uncertain demand of the
vehicle for car pooling. To deal with this the proposed system uses Chance constrained
formulation/Programming (CCP) approach of the problem with stochastic demand and travel time
parameters, under mild assumptions on the distribution of stochastic parameters; and relates it with a
robust optimization approach. Since real problem sizes can be large, it could be difficult to find
optimal solutions within a reasonable period of time. Therefore solution algorithm using tabu
heuristic solution approach is developed to solve the model. Therefore, we constructed a stochastic
carpooling model that considers the in- fluence of stochastic travel times. The model is formulated as
an integer multiple commodity network flow problem. Since real problem sizes can be large, it could
be difficult to find optimal solutions within a reasonable period of time.
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
A green building is an environmentally sustainable building, designed, constructed and
operated to minimise the total environmental impacts. Carbon dioxide (CO2) is the primary
greenhouse gas emitted through human activities. It is claimed that 5% of the world’s carbon dioxide
emission is attributed to cement industry, which is the vital constituent of concrete. Due to the
significant contribution to the environmental pollution, there is a need for finding an optimal solution
along with satisfying the civil construction needs. Apart from normal concrete bricks, a clay brick,
Foam concrete is a new innovative technology for sustainable building and civil construction which
fulfills the criteria of being a Green Material. This paper concludes that Foam Concrete can be an
effective sustainable material for construction and also focuses on the cost effectiveness in using
Foam Concrete as a building material in replacement with Clay Brick or other bricks.
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
A good education system is required for overall prosperity of a nation. A tremendous
growth in the education sector had made the administration of education institutions complex. Any
researches reveal that the integration of ICT helps to reduce the complexity and enhance the overall
administration of education. This study has been undertaken to identify the various functional areas
to which ICT is deployed for information administration in education institutions and to find the
current extent of usage of ICT in all these functional areas pertaining to information administration.
The various factors that contribute to these functional areas were identified. A theoretical model was
derived and validated.
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
Data partitioning methods are used to partition the data values with similarity. Similarity
measures are used to estimate transaction relationships. Hierarchical clustering model produces tree
structured results. Partitioned clustering produces results in grid format. Text documents are
unstructured data values with high dimensional attributes. Document clustering group ups unlabeled text
documents into meaningful clusters. Traditional clustering methods require cluster count (K) for the
document grouping process. Clustering accuracy degrades drastically with reference to the unsuitable
cluster count.
Textual data elements are divided into two types’ discriminative words and nondiscriminative
words. Only discriminative words are useful for grouping documents. The involvement of
nondiscriminative words confuses the clustering process and leads to poor clustering solution in return.
A variation inference algorithm is used to infer the document collection structure and partition of
document words at the same time. Dirichlet Process Mixture (DPM) model is used to partition
documents. DPM clustering model uses both the data likelihood and the clustering property of the
Dirichlet Process (DP). Dirichlet Process Mixture Model for Feature Partition (DPMFP) is used to
discover the latent cluster structure based on the DPM model. DPMFP clustering is performed without
requiring the number of clusters as input.
Document labels are used to estimate the discriminative word identification process. Concept
relationships are analyzed with Ontology support. Semantic weight model is used for the document
similarity analysis. The system improves the scalability with the support of labels and concept relations
for dimensionality reduction process.
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
There are many algorithms we found for matrices multiplication. Until now it has been
found that complexity of matrix multiplication is O(n3). Though Further research found that this
complexity can be decreased. This paper focus on the algorithm and its complexity of matrices
multiplication methods.
Malware is a worldwide pandemic. It is designed to damage computer systems without
the knowledge of the owner using the system. Software‟s from reputable vendors also contain
malicious code that affects the system or leaks information‟s to remote servers. Malware‟s includes
computer viruses, spyware, dishonest ad-ware, rootkits, Trojans, dialers etc. Malware detectors are
the primary tools in defense against malware. The quality of such a detector is determined by the
techniques it uses. It is therefore imperative that we study malware detection techniques and
understand their strengths and limitations. This survey examines different types of Malware and
malware detection methods.
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
GLAUCOMA is a chronic eye disease that can damage optic nerve. According to WHO It
is the second leading cause of blindness, and is predicted to affect around 80 million people by 2020.
Development of the disease leads to loss of vision, which occurs increasingly over a long period of
time. As the symptoms only occur when the disease is quite advanced so that glaucoma is called the
silent thief of sight. Glaucoma cannot be cured, but its development can be slowed down by
treatment. Therefore, detecting glaucoma in time is critical. However, many glaucoma patients are
unaware of the disease until it has reached its advanced stage. In this paper, some manual and
automatic methods are discussed to detect glaucoma. Manual analysis of the eye is time consuming
and the accuracy of the parameter measurements also varies with different clinicians. To overcome
these problems with manual analysis, the objective of this survey is to introduce a method to
automatically analyze the ultrasound images of the eye. Automatic analysis of this disease is much
more effective than manual analysis.
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
Reliability is playing very vital role in some application of Wireless Sensor Networks
and multipath routing is one of the ways to increase the probability of reliability. More over energy
consumption is constraint. In this paper, we provide a survey of the state-of-the-art of proposed
multipath routing algorithm for Wireless Sensor Networks. We study the design, analyze the tradeoff
of each design, and overview several presenting algorithms.
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
This paper is devoted to the Quasi Z source network based DC Drive. The cascaded
(two-stage) Quasi Z Source network could be derived by the adding of one diode, one inductor,
and two capacitors to the traditional quasi-Z-source inverter The proposed cascaded qZSI inherits all
the advantages of the traditional solution (voltage boost and buck functions in a single stage,
continuous input current, and improved reliability). Moreover, as compared to the conventional qZSI,
the proposed solution reduces the shoot-through duty cycle by over 30% at the same voltage boost
factor. Theoretical analysis of the two-stage qZSI in the shoot-through and non-shoot-through
operating modes is described. The proposed and traditional qZSI-networks are compared. A
prototype of a Quasi Z Source network based DC Drive was built to verify the theoretical
assumptions. The experimental results are presented and analyzed.
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
The paper reflects the spiritual philosophy of Aurobindo Ghosh which is helpful in today’s
education. In 19th century he wrote about spirituality, in accordance with that it is a core and vital part
of today’s education. It is very much essential for today’s kid. Here I propose the overview of that
philosophy.At the utmost regeneration of those values in today’s generation is the great deal with
education system. To develop the values and spiritual education in the youngers is the great moto of
mine. It is the materialistic world and without value redefinition among them is the harder task but not
difficult.
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
The software test coverage is used measure the safety measures. The safety critical analysis is
carried out for the source code designed in Java language. Testing provides a primary means for
assuring software in safety-critical systems. To demonstrate, particularly to a certification authority, that
sufficient testing has been performed, it is necessary to achieve the test coverage levels recommended or
mandated by safety standards and industry guidelines. Mutation testing provides an alternative or
complementary method of measuring test sufficiency, but has not been widely adopted in the safetycritical industry. The system provides an empirical evaluation of the application of mutation testing to
airborne software systems which have already satisfied the coverage requirements for certification.
The system mutation testing to safety-critical software developed using high-integrity subsets of
C and Ada, identify the most effective mutant types and analyze the root causes of failures in test cases.
Mutation testing could be effective where traditional structural coverage analysis and manual peer
review have failed. They also show that several testing issues have origins beyond the test activity and
this suggests improvements to the requirements definition and coding process. The system also
examines the relationship between program characteristics and mutation survival and considers how
program size can provide a means for targeting test areas most likely to have dormant faults. Industry
feedback is also provided, particularly on how mutation testing can be integrated into a typical
verification life cycle of airborne software. The system also covers the safety and criticality levels of
Java source code.
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
The software defect factors are used to measure the quality of the software. The software
effort estimation is used to measure the effort required for the software development process. The defect
factor makes an impact on the software development effort. Software development and cost factors are
also decided with reference to the defect and effort factors. The software defects are predicted with
reference to the module information. Module link information are used in the effort estimation process.
Data mining techniques are used in the software analysis process. Clustering techniques are used
in the property grouping process. Rule mining methods are used to learn rules from clustered data
values. The “WHERE” clustering scheme and “WHICH” rule mining scheme are used in the defect
prediction and effort estimation process. The system uses the module information for the defect
prediction and effort estimation process.
The proposed system is designed to improve the defect prediction and effort estimation process.
The Single Objective Genetic Algorithm (SOGA) is used in the clustering process. The rule learning
operations are carried out sing the Apriori algorithm. The system improves the cluster accuracy levels.
The defect prediction and effort estimation accuracy is also improved by the system. The system is
developed using the Java language and Oracle relation database environment.
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
Software cost estimation is an important task in the software design and development process.
Planning and budgeting tasks are carried out with reference to the software cost values. A variety of
software properties are used in the cost estimation process. Hardware, products, technology and
methodology factors are used in the cost estimation process. The software cost estimation quality is
measured with reference to the accuracy levels.
Software cost estimation is carried out using three types of techniques. They are regression based
model, anology based model and machine learning model. Each model has a set of technique for the
software cost estimation process. 11 cost estimation techniques fewer than 3 different categories are
used in the system. The Attribute Relational File Format (ARFF) is used maintain the software product
property values. The ARFF file is used as the main input for the system.
The proposed system is designed to perform the clustering and ranking of software cost
estimation methods. Non overlapped clustering technique is enhanced with optimal centroid estimation
mechanism. The system improves the clustering and ranking process accuracy. The system produces
efficient ranking results on software cost estimation methods.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc Networks
1. Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 191
e-ISSN: 2349-9745
p-ISSN: 2393-8161
Comparison of Various Unicast-Multicast Routing Protocols for Mobile
Ad-Hoc Networks
Chirag R. Patel1
, Rajesh H. Davda2
1,2
Computer Engineering Department, C. U. Shah College of Engineering & Technology, Wadhwan (Gujarat)
Abstract: A Mobile Ad-hoc Network (MANET) is a self configuring network which consists of
mobile nodes with no permanent infrastructure. In a MANETs, there is no difference between a host
node and a router so that all nodes can be source plus forwarders of traffic. The task of finding routes
in Mobile Ad-hoc Network (MANET) is an important factor in determining the efficiency of any
MANET routing protocols. This paper describes about the basic idea of different routing protocols
and its efficient use in MANET. There are several routing protocols based on UNICAST and
MULTICAST. This paper will conclude the main characteristics of these protocols with comparison
and suggest the best suited protocol for particular topology or network.
Keywords: MANET, Unicast Routing Protocol, Multicast Routing Protocol.
I. INTRODUCTION
The rapid growth in the mobile communication is mainly due to the mobility offered to end users,
providing information access to anywhere, easy deployment, and user friendliness. These types of
networks have independent centralized administration; user can enter the networks and leave the
networks easily. One of the important research areas in MANET is establishing and maintaining the
ad hoc network through the use of routing protocols. Wireless communication technology have been
developed with two primary models one is fix infrastructure based model in which much of the
nodes are mobile and connected through fixed backbone nodes using wireless medium. Another
model is Mobile Ad-hoc network. Mobile Ad-Hoc Networks (MANETs) are comprised of mobile
nodes (MNs) that are self-organizing and there are no specific routers, servers, access points for
MANET. Design issue for developing a routing protocol for wireless environment with mobility is
very different and more complex than those for wired network with static nodes [1]. Each device in a
MANET is free to move independently in any direction, and will therefore change its links to other
devices frequently. Depending upon the nature of application, appropriate routing protocol is
implemented. UNICAST and MULTICAST protocols are the two classes of MANET routing
protocols and each constitute a set of protocols.
1.1. Characteristics of MANET
MANETS have some characteristics:
Bandwidth-constrained: Variable capacity links: Wireless links will continue to have significantly
lower capacity than their hardwired counterparts. In addition, the realized throughput of wireless
communications after accounting for the effects of multiple access, fading, noise, and interference
conditions, etc. is often much less than a radio's maximum transmission rate. One effect of the
relatively low to moderate link capacities is that congestion is typically the norm rather than the
exception, i.e. aggregate application demand will likely approach or exceed network capacity
2. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 192
frequently. As the mobile network is often simply an extension of the fixed network infrastructure,
mobile ad hoc users will demand similar services. These demands will continue to increase as
multimedia computing and collaborative networking applications rise.
Dynamic Topologies: Nodes are free to move arbitrarily; thus, the network topology which is
typically multichip may change randomly and rapidly at unpredictable times, and may consist of
both bidirectional and unidirectional links.
Energy-constrained operation: Some or all of the nodes in a MANET may rely on batteries or
other exhaustible means for their energy. For these nodes, the most important system design criteria
for optimization may be energy conservation.
Limited physical security: Mobile wireless networks are generally more prone to physical security
threats than are fixed- cable nets. The increased possibility of eavesdropping, spoofing, and denial-
of-service attacks should be carefully considered.
Hidden problem: Node A and node C are in range for communicating with node B, but not with
each other. In the event that both try to communicate with node B simultaneously, A and C might not
detect any interference on the wireless medium. Thus, the signals collide at node B, which in turn
will be unable to receive the transmissions from either node. The typical solution for this so-called
“Hidden terminal” problem is that the nodes coordinate transmissions themselves by asking and
granting permission to send and receive packets. This scheme is often called RTS/CTS (Request To
Send/Clear To Send).
1.2. Issues in MANET
MANET faces many challenges [2] like issue of scalability, clock synchronization, Energy
conservation, Routing etc. This paper describes about the problem of Routing. It is an important
factor of reliable communication in MANET.
II. ROUTING PROTOCOLS IN MANET
Routing[3,4] is the act of moving information from a source to a destination in an internetwork.
During this process, at least one intermediate node within the internetwork is encountered. This
concept is not new to computer science since routing was used in the networks in early 1970’s. But
this concept has achieved popularity from the mid-1980’s. The major reason for this is because the
earlier networks were very simple and homogeneous environments; but, now high end and large
scale internetworking has become popular with the latest advancements in the networks and
telecommunication technology. The routing concept basically involves, two activities: firstly,
determining optimal routing paths and secondly, transferring the information groups (called packets)
through an internetwork.
2.1. Classification of Routing Protocols in MANET
MANET’s protocols are generally divided into two parts: Unicast and Multicast. Again in each part
they are divided in three parts:
Proactive routing protocols are very useful for a small-scale MANETs with high mobility, while
Reactive routing protocols are very useful for a large-scale MANETs with moderate or less
topology changes. Hybrid routing protocol attempts to strike balance between the two such a
proactive for neighborhood, and reactive for far away.
3. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 193
Figure 1. Classification of MANET’s Protocol
III. UNICAST ROUTING PROTOCOLS
In Unicast routing protocols, one source transmits information to one destination. The Unicast
protocols are also the most common in ad-hoc environment to be developed and they are the basis on
which it is a possibility to construct other type of protocols. Unicast protocols have thought some
lacks when there is a need to send same message or stream of data to multiple destinations. So there
is an evitable need for multicast protocols. While forwarding data packet dispatch node use the
destination address in the data packet to look it up in routing table. If the destination address found in
routing table the data packet will send to the corresponding next hop. But in such condition every
node maintains the routing table in network. So the problem is that how the routing table is created
and maintained in MANET.
3.1. Proactive Unicast Routing Protocols
In Proactive Unicast routing protocol each node in MANET maintains routing information to every
other node in network to compute shortest path from the source to every destination node, which
consumes lots of bandwidth. Such routing information is kept in many different types of tables. Such
tables are time to time updates if network topology changes or a node moves from network.
Proactive routing is unsuitable for highly dynamic networks because routing tables must be updated
with each topology change, this leads to increased control message overheads which can degrade
network performance at high loads.
Proactive Unicast routing protocols are divided as Fishey State Routing Protocol (FSR), Optimized
Link State Routing Protocol (OLSR), and Topology Broadcast Based on Reverse Path Forwarding
Routing Protocol (TBRPF).
3.1.1. Fishey State Routing Protocol (FSR): FSR was proposed in [5] for aim at large scale and wit
high mobility MANET. Name of this protocol comes from property of eye‘s fish. Fishey State
Routing Algorithm works on following method.
4. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 194
• Based on distances the network is divided into different scopes. For example if the nodes are
in 3 hops distance, they will come in same scope. Other node will come outer scope.
• The nodes which are in different scope, Routing entries corresponding to these nodes are sent
at different frequencies and routing entries for inner nodes are sent at highest frequency and
other entries are sent at lower frequency. Because of this reason the nearby node will receive
more up to date link state updates compare to the node far away node.
3.1.2. Optimized Link State Routing Protocol (OLSR): OSLR proposed in [6] for aim at large and
dense Mobile Ad-Hoc Network. OLSR works on Multipoint Relaying flooding techniques to
reduced topology broadcast packets. OLSR works according to the following points.
• Every mobile node broadcast “hello” message periodically to its neighbor. With this hello
message every mobile node can obtain topological information for every node in MANET.
• Now based on topological Information, A node will select a subset of its neighbor to act as
multipoint relaying nodes.
• Every node contains its global topological information and update, shortest path from source
node to every other node can computed with Dijkstra‘s Algorithm.
3.1.3. Topology Broadcast Based on Reverse Path Forwarding Routing Protocol (TBRPF):
TBRPF was proposed in [7] for several hundred of mobile nodes or high mobility in MANET. In
TBRPF each mobile node in network keeps incomplete global topological information. To reduce
routing overhead TBRPF adopts following optimization steps:
• “hello” messages are exchanged among neighboring nodes periodic and differential. Only the
changes of neighbor status are included in “hello” message.
• A part of spanning tree is broadcast to its neighbors if mobile node ‘A’ finds itself is on the
path from its neighbor ‘B’ to a destination ‘C’ in the ‘A’ rooted spanning tree, it will put node
‘C’ and its adjacent links in the reportable topology sent to neighbors.
• Whenever required like network topology updated, mobile node mobility etc, it will update
with “hello” message.
Table-1 gives the characteristics comparison of Proactive Unicast Routing Protocols.
Table 1. Characteristics of Proactive Unicast Routing Protocols
Characteristics FSR OLSR TBRPF
Scope
Large scale
MANETs with high
mobility
Large and dense
MANETs
MANETs with
hundreds of nodes
and high mobility
Organization of the
network
Hierarchical Flat Flat
Neighbor Detection
method
Periodical link state
updates
Periodical HELLO
messages
Differential HELLO
Messages
Optimized Broadcast
Combined with
neighbor Detection
Multipoint relaying
Combined with
HELLO messages
Broadcast
Information
Link state update MPR selector
(Partial) Spanning
tree
Route freshness
Maybe not up-to-
date
Up-to-date Up-to-date
5. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 195
3.2. Reactive Unicast Routing Protocols
Reactive protocols are also known as on-demand routing protocol. Such protocol were reduced the
overheads of proactive protocol by maintaining route information for active routes. Its mean the
routing information is required and maintained only when one node wants to send data packet to
destination. The concept of Reactive protocol was proposed to keep the waste of bandwidth as little
as possible.
Reactive Unicast routing protocols are divided as Ad Hoc On-demand Distance Vector Routing
Protocol (AODV), Optimized Link State Routing Protocol (DSR), and Temporally Ordered Routing
Algorithm (TORA).
3.2.1. Ad Hoc On-demand Distance Vector Routing Protocol (AODV): AODV [8] is a reactive
Unicast routing protocol for mobile ad hoc networks. As a reactive routing protocol, AODV only
needs to maintain the routing information about the active paths. In AODV, routing information is
maintained in routing tables at nodes. Every mobile node keeps a next-hop routing table, which
contains the destinations to which it currently has a route. A routing table entry expires if it has not
been used or reactivated for a pre-specified expiration time. Moreover, AODV adopts the destination
sequence number technique used by DSDV in an on-demand way.
3.2.2. Dynamic Source Routing (DSR): DSR [9] is an On Demand Unicast routing protocol that
utilizes source routing algorithm. In source routing algorithm, each data packet contains complete
routing information to reach its dissemination. Additionally, in DSR each node uses caching
technology to maintain route information that it has discovered. For example, the intermediate nodes
cache the route towards the destination and backward to the source. Furthermore, because the data
packet contains the source route in the header, the overhearing nodes are able to cache the route in its
routing cache.
3.2.3. Temporally Ordered Routing Algorithm (TORA): TORA [10, 11] is a On Demand routing
algorithm based on the concept of link reversal. This Routing protocol improves the partial link
reversal method by detecting partitions and stopping non-productive link reversals. TORA can be
used for highly dynamic mobile ad hoc networks. TORA has three basic steps: route creation, route
maintenance and route erasure. In TORA the DAG provides the capability that many nodes can send
packets to a given destination and guarantees that all routes are loop-free. Because of node mobility
the DAG in TORA may be disconnected. So, route maintenance step is a very important part of
TORA. This routing protocol has the unique feature that control messages are localized into a small
set of nodes near the topology changes occurred.
Table-2 gives the characteristics comparison of Reactive Unicast Routing Protocols.
Table 2. Characteristics of Reactive Unicast Routing Protocols
Characteristics AODV DSR TORA
Updating of Destination at Multiple Route Source Source Neighbors
Multicast Capability YES NO NO
Control Hello Message Requirement NO NO YES
Design Structure Flat Flat Flat
Unidirectional Link NO YES YES
Multiple Route NO YES YES
Loop free YES YES YES
Route maintained in Route table Route cache Route table
6. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 196
Advantage
Adaptive to
highly,
dynamic
topologies,
Low
overhead
Multiple
routes, Loop
free,
promiscuous
overhead
Multiple
routes
Disadvantage
Scalability
problems,
Large
delays, hello
message
Scalability
problems,
Large
delays, hello
message
Temporary
routing loops,
overall
complexity
3.3. Hybrid Unicast Routing Protocols
Hybrid Unicast routing protocols are the protocol which combines the nature of both proactive
routing protocol and reactive routing protocol. Hybrid protocols are known as new generation
protocols. Hybrid protocol reduced route discovery overheads by allowing nodes with closeness to
work together to from some short of a backbone. Hybrid protocols are proposed based on zone
(region). It means a network is divided into number of zone by each mobile node. ZRP is hybrid
Unicast routing protocol.
Hybrid Unicast routing protocols are divided as Zone Routing Protocol (ZRP) and Zone-Based
Hierarchical Link State (ZHLS).
3.3.1. Zone Routing Protocol (ZRP): ZRP [12] is a hybrid routing protocol for mobile ad hoc
networks. The hybrid protocols are proposed to reduce the control overhead of proactive routing
approaches and decrease the latency caused by route search operations in reactive routing
approaches.
3.3.2. Zone-Based Hierarchical Link State (ZHLS): In ZHLS [13] routing protocols are divided
into hierarchical structures. The complete network is divided into non-overlapping zones. Such non-
overlapping zones has unique zone ID and each node in such zone has unique node ID which is
calculated by GPS. The hierarchical structure of network (topology) is form in two levels on the
basis of node level topology and zone level topology. In ZHLS no cluster head is required for data
transmission. This reduces extra processing overhead while data transmission. When a node want to
send data packet to the node which is located in other zone, in such conditions source node broadcast
a zone level location request to all other zones, which required significantly low overhead if
compared to flooding approach in reactive protocols. ZHLS is Hierarchical in routing structure and
can have multiple routes if more than one virtual link exists in between mobile nodes. Routing
maintenance is required for both interzone and intrazone.
Table-3 gives the characteristics comparison of Hybrid Unicast Routing Protocols.
Table 3. Characteristics of Hybrid Unicast Routing Protocols
Characteristics ZRP ZHLS
Loop free Yes Yes
Routing philosophy Flat Hierarchical
7. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 197
IV. MULTICAST ROUTING PROTOCOLS
Multicast routing protocols try to construct a desirable routing tree or a mesh from one source to
several destinations. These protocols have also to keep up with information of joins and leave ups to
a multicast group which efficiently support to the group communication with the high throughput.
The use of multicasting within MANETs has many benefits. It can decrease the cost of wireless
communication and increase the efficiency and throughput of the wireless link between two nodes
whenever we are sending multiple copies of the same messages by accomplishment the inherent
broadcasting properties of wireless transmission. In place of sending same data through multiple
Unicasts, multicasting decrease channel capacity consumption, sender nodes and routers processing,
energy utilization , and data delivery delay, which are deliberate important for MANETs.
4.1. Proactive Multicast Routing Protocols
Proactive multicast routing protocols are divided as Ad-hoc Multicast Routing (AMRoute), Ad hoc
Multicast Routing Protocol Increasing id-numbers (AMRIS), and Core-Assisted Mesh protocol
(CAMP).
4.1.1. Ad-hoc Multicast Routing (AMRoute) [14] is a tree based multicast routing protocol for
mobile ad hoc networks. AMRoute creates a multicast shared-tree over mesh. AMRoute relies on the
existence of an underlying Unicast routing protocol. AMRoute has two key phases: mesh creation
and tree creation. This protocol can be used for networks in which only a set of nodes supports
AMRoute routing function.
4.1.2. Ad hoc Multicast Routing Protocol Increasing id-numbers (AMRIS) [15] is a proactive
shared tree based multicast routing protocol, which is independent of the fundamental Unicast
routing protocol. In AMRIS, the tree maintenance procedure operates continuously and locally to
ensure a node’s connection to the multicast session delivery tree. In AMRIS, the tree maintenance
procedure operates continuously and locally to ensure a node’s connection to the multicast session
delivery tree. AMRIS is an on demand protocol that constructs a shared delivery tree to support
multiple senders and receivers within a multicast session.
4.1.3. Core-Assisted Mesh protocol (CAMP) [16, 17] is a proactive multicast routing protocol
based on shared meshes. The mesh structure provides at least one path from each source to each
receiver in the multicast group. CAMP relies on an underlying Unicast protocol which can provide
correct distances to all destinations within finite time. Every node maintains a Routing Table (RT)
that is created by the underlying Unicast routing protocol. CAMP modifies this table when a
multicast group joins or leaves the network. A Multicast Routing Table (MRT) is based on the
Routing Table that contains the set of known groups.
Table-4 gives the characteristics comparison of Proactive Multicast Routing Protocols.
Table 4. Characteristics of Proactive Multicast Routing Protocols
Characteristics AMRoute AMRIS CAMP
Structure of Multicast delivery Tree Tree Mesh
Loop free No Yes Yes
Dependency on Unicast routing protocol Yes No Yes
Scalability Yes No Yes
Control Packet flooding Fair Fair Good
Dependency on Unicast Flat Flat Flat
Periodic message requirement Yes Yes Yes
8. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 198
4.2. Reactive Multicast Routing Protocols
Reactive multicast routing protocols are divided as On-Demand Multicast Routing Protocol
(ODMRP) and Multicast Ad-hoc On-demand Distance Vector (MAODV).
4.2.1. On-Demand Multicast Routing Protocol (ODMRP) [18] is a reactive mesh based multicast
routing protocol. ODMRP is not only a multicast routing protocol, but also provides Unicast routing
capability.
4.2.2. Multicast Ad-hoc On-demand Distance Vector (MAODV) [19] is a reactive tree-based
multicast routing protocol. MAODV is an extension of the Unicast routing protocol Ad-hoc On-
demand Distance Vector (AODV).
Table-5 gives the characteristics comparison of Reactive Unicast Routing Protocols.
Table 5. Characteristics of Reactive Multicast Routing Protocols
Characteristics ODMRP MAODV
Multicast delivery structure Mesh Core based Tree
Loop free YES YES
Periodic messages requirement YES NO
Routing Hierarchy Flat Flat
Scalability Fair Fair
4.3. Hybrid Multicast Routing Protocols
Hybrid multicast routing protocols are divided as Optimized Polymorphic Hybrid Multicast Routing
Protocol (OPHMR).
4.3.1. Optimized Polymorphic Hybrid Multicast Routing Protocol (OPHMR): This protocol [20]
is invested with different operational modes that are either proactive or reactive based on a MN’s
power remainder, mobility level, and vicinity density level. It attempts to address the issues of power
efficiency, latency, and protocol overhead in an adaptive manner. OPHMR’s reactive behaviour is
based on the On-Demand Multicast Routing Protocol (ODMRP). It’s relatively simplistic. It
generates on-demand route paths for multicast message requests. OPHMR’s proactive behaviour is
based on the Multicast Zone Routing (MZR) protocol. It builds a zone around each Mobile Node (in
hops) and periodically sends updates within each defined zone. For added efficiency, OPHMR
utilizes an optimizing scheme adapted from the Optimized Link State Routing (OLSR) protocol. It
used to decrease the amount of control overhead that is produced. OPHMR is, after a very lengthy
period of time, able to extend battery life and enhance the survivability of the mobile ad hoc nodes.
As a result, it decreases the end-to-end delay and increases the packet delivery ratio.
V. CONCLUSION
A Mobile Ad-hoc Network (MANET) is a self configuring network which consists of mobile nodes
with no permanent infrastructure. In a MANETs, there is no difference between a host node and a
router so that all nodes can be source plus forwarders of traffic. Routing is an essential component of
communication protocols in mobile ad hoc networks. Routing protocols typically fall under two
categories; Unicast routing protocol and Multicast routing protocol. The design of the protocols are
9. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 199
driven by specific goals and requirements based on respective assumptions about the network
properties or application area. According to the description and comparison of their characteristics,
we can arrive at the conclusions: Hybrid Unicast or multicast routing protocol seems to be a better
candidate than pure proactive and reactive routing protocols. Many of the application use Unicast
protocol whereas in group communication Multicast routing gives comparatively better performance.
However, its performance needs to be fully exploited and the OPHMR is a batter than another
Routing Protocol because OPHMR is a hybrid multicast routing protocol. For added efficiency
OPHMR utilizes an optimizing scheme through a Multipoint Relay (MPR). It used to decrease the
amount of control overhead that is produced. So we can say that OPHMR is a better than another
routing protocol. This paper gives the comparison of various Unicast-Multicast routing protocols for
Mobile Ad-Hoc Networks.
REFERENCES
[1] Murthy, S. and J.J. Garcia-Luna-Aceves, “An Efficient Routing Protocol for Wireless Networks”, ACM Mobile
Networks and App. J., Special Issue on Routing in Mobile Communication Networks, Oct. 1996, pp. 183-97.
[2] C. M. Cordeiro, D.P.Agrawal “Ad-hoc & Sensor Networks Theory and Applications”.
[3] Cisco. Cisco Internetworking. Cisco Press, 2002.
[4] R F Sari, A Syarif, K Ramli, B Budiardjo “Performance Evaluation of AODV Routing Protocol on Ad-hoc Hybrid
Network Testbed Using PDAS”, IEEE 2005.
[5] Mario Gerla, Ziaoyan Hong, and Guangyu Pei, ―Fisheye State Routing Protocol (FSR) for Ad Hoc Networksǁ,
draft-ietf—manet-fsr-03.txt, June 2002.
[6] Amir Qayyum, Laurent Viennot, and Anis Laouiti, ― Optmized Link State Routing Protocolǁ, draft-ieft-manet-olsr-
06.txt, September 2002.
[7] Richard G. Ogier, Fred L. Templin, Bhargav Bellur, and Mark G. Lewis, ―Topology Broadcast Based on Reverse-
Path Forwading (TBRPF)ǁ, draft-ietf-manet-tbrpf-05.txt, March 2002.
[8] C.E. Perkins and E.M. Royer, “Ad hoc on demand Distance Vector routing”, mobile computing systems and
applications, 1999. Proceedings. WMCSA ’99. Second IEEE Workshop on, 1999, p90 -p100.
[9] D. Johnson, D. A. Maltz, “Dynamic source routing in ad hoc wireless networks”, in Mobile Computing (T. Imielinski
and H. Korth, eds.), Kluwer Acad. Publ., 1996.
[10] V. Park, and S. Corson, “Temporally-Ordered Routing Algorithm (TORA)”, Version 1 Functional Specification.
IETF Internet draft, 1997.
[11] V. D. Park and M. S. Corson. “A highly adaptive distributed routing algorithm for mobile wireless networks”,
INFOCOM ’97, Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving
the Information Revolution, Proceedings IEEE, Volume: 3, 1997 Page(s): 1405 -1413 vol.3.
[12] Z. J. Haas and M.R Pearlman, “The Zone Routing Protocol (ZRP) for ad hoc networks”, IETF Internet draft ,
August 1998.
[13] M. Joa-Ng, I.-TLu, A peer-to-peer zone based tow-level link state routing for mobile ad hoc networks, IEEE Journal
on Selected Areas in Communications 17(8) (1999) 1415-1425.
[14] M. Liu, R. Talpade, A. McAuley, and E. Bommaiah, “AMRoute: Adhoc multicast routing protocol”, Technical
Report, CSHCN T. R. 99-1, University of Maryland.
[15] C.W. Wu, Y.C. Tay, “AMRIS: a multicast protocol for ad hoc wireless networks”, Proceedings IEEE MILCOM’99,
Atlantic City, Nov. 1999.
[16] J.J. Garcia-Luna-Aceves, E.L. Madruga, “A Multicast Routing Protocol for Ad-Hoc Networks”, Proceedings of
IEEE INFOCOM’99, New York, pages 784-792, March 1999.
[17] J.J. Garcia-Luna-Aceves and E.L. Madruga, “The Core-Assisted Mesh Protocol”, The IEEE Journal on Selected
Area in Communication, vol.17, no.8, Aug. 1999, pp1380-1394.
[18] S.J. Lee, M. Gerla, C.C. Chiang, “On Demand Multicast Routing Protocol”, Proceedings of IEEE WCNC’99, New
Orleans, pages 1298-1302, Sept 1999.
[19] E. M. Royer and C. E. Perkins, “Multicast Operation of the Ad hoc On-Demand Distance Vector Routing Protocol”,
Proceedings of IEEE MOBICOM’99, Seattle, WA, August 1999, pp. 207-218.
[20]A.B.Mnaouer, L. Chen, C. H. Foh, and J.W.Tantra, “OPHMR: An Optimized Polymorphic Hybrid Multicast
Routing for MANETs”, IEEE transaction on mobile computing. Vol 5, No. 6, May 2007.
[21] Kamal Kant, Lalit K. Awasthi, “Unicast And Multicast Routing Protocols For Manets: A Comparative Survey”.
[22] Sunil Pathak, Dr. Sonal Jain,. “A Survey: On Unicast Routing Protocols for Mobile Ad Hoc Network”, International
Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, pp 204-210, Volume 3, Issue 1,
January 2013.