MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
A Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions and do not adapt well with high mobility conditions. Therefore, considering mobility is a demanding task that should be performed efficiently and accurately. Here, we proposed novel mobility-aware routing protocol based on the well known Ad-hoc On Demand Distance Vector (AODV) routing protocol called: MA-AODV (Mobility Aware Ad-hoc On Demand Distance Vector) in an attempt to improve the handling of high mobility factor in ad-hoc networks. MA-AODV protocols perform periodic quantification of nodes mobility for the sake of establishing more stable paths between source/destination pairs, hence, avoiding the frequent link breakages associated with using unstable paths that contain high mobile nodes.
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks (WSNs) consist of smallnodes with sensing, computation and wireless
communicationscapabilities. These sensor networks interconnect a several othernodes when established in large
and this opens up severaltechnical challenges and immense application possibilities.These wireless sensor
networks communicate using multi-hopwireless communications, regular ad hoc routing techniquescannot be
directly applied to sensor networks domain due tothe limited processing power and the finite power available
toeach sensor nodes hence recent advances in wireless sensornetworks have developed many protocols
depending on theapplication and network architecture and are specificallydesigned for sensor networks where
energy awareness is anessential consideration. This paper presents routingprotocols for sensor networks and
compares the routingprotocols that are presently of increasing importance.
In this paper, we propose Hybrid Routing Protocol whichcombines the merits of proactive and reactive approach
andovercome their demerits.
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
A Wireless Sensor Networks is a network formed with sensors that have characteristics to sensor an area to
extract a specific metric, depending of the application.
We would like to analyse the feasibility to use sensors in a coffee crop.In this work we are evaluating routing protocolsusing real dimensions and characteristics of a coffee crop. We evaluate, through simulation, AODV, DSDV and AOMDV and two variants known in this work as AODVMOD and AOMDVMOD with 802.15.4 MAC Protocol
.For this comparison, we defined three performance metrics: Packet Delivery Ratio (PDR), End-to-End Delay
and Average Energy Consumption. Simulation results show that AOMDVMOD overall, outperforms others
routing protocols evaluated, showing that is possible to use WSN in a real coffee crop environment.
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
Wireless mesh network has recently received a great deal of attention as a promising technology to provideubiquitous high bandwidth access for a large number of users. Such network may face a significant broadcast traffic that may consequently degrade the network reliability.
In this paper, we have focused interest to wireless mesh network based IEEE 802.11s and we have designed
a self-pruning method to control and reduce the broadcast traffic forwarding. Our scheme, namely Control of Broadcast Forwarding (CBF), defines two behaviours to manage the broadcasting operation. Routing
packets are managed differently from data broadcast messages to avoid afflicting the routing process.
The simulations results show that CBF ameliorates the network capacity by reducing considerably the
number of redundant packets, improving the end to end delay and providing high reachability and packet
delivery ration.
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
A Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions and do not adapt well with high mobility conditions. Therefore, considering mobility is a demanding task that should be performed efficiently and accurately. Here, we proposed novel mobility-aware routing protocol based on the well known Ad-hoc On Demand Distance Vector (AODV) routing protocol called: MA-AODV (Mobility Aware Ad-hoc On Demand Distance Vector) in an attempt to improve the handling of high mobility factor in ad-hoc networks. MA-AODV protocols perform periodic quantification of nodes mobility for the sake of establishing more stable paths between source/destination pairs, hence, avoiding the frequent link breakages associated with using unstable paths that contain high mobile nodes.
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks (WSNs) consist of smallnodes with sensing, computation and wireless
communicationscapabilities. These sensor networks interconnect a several othernodes when established in large
and this opens up severaltechnical challenges and immense application possibilities.These wireless sensor
networks communicate using multi-hopwireless communications, regular ad hoc routing techniquescannot be
directly applied to sensor networks domain due tothe limited processing power and the finite power available
toeach sensor nodes hence recent advances in wireless sensornetworks have developed many protocols
depending on theapplication and network architecture and are specificallydesigned for sensor networks where
energy awareness is anessential consideration. This paper presents routingprotocols for sensor networks and
compares the routingprotocols that are presently of increasing importance.
In this paper, we propose Hybrid Routing Protocol whichcombines the merits of proactive and reactive approach
andovercome their demerits.
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
A Wireless Sensor Networks is a network formed with sensors that have characteristics to sensor an area to
extract a specific metric, depending of the application.
We would like to analyse the feasibility to use sensors in a coffee crop.In this work we are evaluating routing protocolsusing real dimensions and characteristics of a coffee crop. We evaluate, through simulation, AODV, DSDV and AOMDV and two variants known in this work as AODVMOD and AOMDVMOD with 802.15.4 MAC Protocol
.For this comparison, we defined three performance metrics: Packet Delivery Ratio (PDR), End-to-End Delay
and Average Energy Consumption. Simulation results show that AOMDVMOD overall, outperforms others
routing protocols evaluated, showing that is possible to use WSN in a real coffee crop environment.
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
Wireless mesh network has recently received a great deal of attention as a promising technology to provideubiquitous high bandwidth access for a large number of users. Such network may face a significant broadcast traffic that may consequently degrade the network reliability.
In this paper, we have focused interest to wireless mesh network based IEEE 802.11s and we have designed
a self-pruning method to control and reduce the broadcast traffic forwarding. Our scheme, namely Control of Broadcast Forwarding (CBF), defines two behaviours to manage the broadcasting operation. Routing
packets are managed differently from data broadcast messages to avoid afflicting the routing process.
The simulations results show that CBF ameliorates the network capacity by reducing considerably the
number of redundant packets, improving the end to end delay and providing high reachability and packet
delivery ration.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
Wireless Sensor Network (WSN) is partially distributed autonomous sensors to monitor physical or environmental conditions such as temperature, pressure etc. and to cooperatively pass their data through the network to the central location. The technique referred to as multi-hop wireless communications is used by the WSN’s to communicate. Due to the limited processing power and the finite power accessible to each sensor nodes, the application of regular routing techniques is not recommended. Hence recent advances in wireless sensor networks have made the routing protocols more efficient. This paper surveys and compares the advanced routing protocols. The three main categories discussed here are flat based, hierarchical based and location based. The paper concludes with open research issues.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
Abstract Physical layer security can be considered to solve the security problem from the point of view of information theory in wireless networks. The combination of cryptographic schemes with channel coding techniques is called for in the basic principle of information-theoretic security. Due to the presence of one or more eavesdropper in wireless relay networks, secrecy of communication is in jeopardy. For such a scenario secrecy rate of the network provide a good measure of performance of the system. In this paper our focus is on secrecy capacity and its optimization with appropriate weight designs of relays taking into consideration the channels through which the eavesdroppers are connected to the relays. We propose the AF and DF based optimal beam forming scheme to improve the wireless security against eavesdropping attack by detecting and removing the eavesdroppers from the wireless relay networks and thus finding measures to maximize the efficiency, response time and the throughput of the system It includes an auto-regression technique as first approach and the use of RC6 algorithm for encrypting the confidential messages. The scheme is a two way approach that will not only provides security to the confidential messages, to be communicated within a wireless relay network in presence of multiple relays and eavesdroppers, but also it will deal with the saving the consumed power by detecting and removing the nodes which are malicious or defected which in turn will consume more power in order to perform malicious activity on the messages or may try to create interferences in the network. The eavesdropper nodes in the proposed system are considered to be working as relays so it may either be connected to source or destination directly or in between the relays. Keywords: Beamforming, Channel State Information, Eavesdropper Attack, Power Consumption, Secrecy Capacity.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
Mobile Ad Hoc Networks (MANET) is an important and challenging research area. The routing protocol should detect and maintain a good route between source and destination nodes in these dynamic networks. Many routing protocols have been proposed for mobile ad hoc networks, and none can be considered as the best under all conditions. This thesis work consist a systematic comparative evaluation of a new multipath routing protocol for MANETS. The new protocol, called Multipath Destination Sequenced Distance Vector (MDSDV) is based on the well known single path Destination Sequenced Distance Vector (DSDV) is compared with known protocol DSDV. This work containing evaluates the protocols on a range of MANETS with between 50, 75 and 100 nodes, which are static nodes. The protocol comparison metrics are Throughput and Residual Energy.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
Wireless Sensor Network (WSN) is partially distributed autonomous sensors to monitor physical or environmental conditions such as temperature, pressure etc. and to cooperatively pass their data through the network to the central location. The technique referred to as multi-hop wireless communications is used by the WSN’s to communicate. Due to the limited processing power and the finite power accessible to each sensor nodes, the application of regular routing techniques is not recommended. Hence recent advances in wireless sensor networks have made the routing protocols more efficient. This paper surveys and compares the advanced routing protocols. The three main categories discussed here are flat based, hierarchical based and location based. The paper concludes with open research issues.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
Abstract Physical layer security can be considered to solve the security problem from the point of view of information theory in wireless networks. The combination of cryptographic schemes with channel coding techniques is called for in the basic principle of information-theoretic security. Due to the presence of one or more eavesdropper in wireless relay networks, secrecy of communication is in jeopardy. For such a scenario secrecy rate of the network provide a good measure of performance of the system. In this paper our focus is on secrecy capacity and its optimization with appropriate weight designs of relays taking into consideration the channels through which the eavesdroppers are connected to the relays. We propose the AF and DF based optimal beam forming scheme to improve the wireless security against eavesdropping attack by detecting and removing the eavesdroppers from the wireless relay networks and thus finding measures to maximize the efficiency, response time and the throughput of the system It includes an auto-regression technique as first approach and the use of RC6 algorithm for encrypting the confidential messages. The scheme is a two way approach that will not only provides security to the confidential messages, to be communicated within a wireless relay network in presence of multiple relays and eavesdroppers, but also it will deal with the saving the consumed power by detecting and removing the nodes which are malicious or defected which in turn will consume more power in order to perform malicious activity on the messages or may try to create interferences in the network. The eavesdropper nodes in the proposed system are considered to be working as relays so it may either be connected to source or destination directly or in between the relays. Keywords: Beamforming, Channel State Information, Eavesdropper Attack, Power Consumption, Secrecy Capacity.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
Mobile Ad Hoc Networks (MANET) is an important and challenging research area. The routing protocol should detect and maintain a good route between source and destination nodes in these dynamic networks. Many routing protocols have been proposed for mobile ad hoc networks, and none can be considered as the best under all conditions. This thesis work consist a systematic comparative evaluation of a new multipath routing protocol for MANETS. The new protocol, called Multipath Destination Sequenced Distance Vector (MDSDV) is based on the well known single path Destination Sequenced Distance Vector (DSDV) is compared with known protocol DSDV. This work containing evaluates the protocols on a range of MANETS with between 50, 75 and 100 nodes, which are static nodes. The protocol comparison metrics are Throughput and Residual Energy.
Prevalence of anemia and socio-demographic factors associated with anemia amo...IOSR Journals
Objective: To study the prevalence of anemia and socio-demographic factors associated with anemia among pregnant women attending antenatal hospital. Material and methods: Total 100 pregnant women were selected for the study and the study was carried out from Sep 2011 to Jan 2012. Pretested and prestructured questionnaire was used to collect general information. Blood samples were collected by qualified technician for hemoglobin estimation. Socio-economic classification by B.G. Prasad was adopted. Classification of anemia by WHO was used. Chi-square test was used for statistical analysis. Results: Overall prevalence of anemia among the pregnant women was found to be 63%. Factors such as level of education and socio-economic status were found to be significantly associated with prevalence of anemia. Conclusion: There is a need for realization that health system should focus on various factors that contribute to the occurrence of anemia and include them as important mediators in the National Health Policy.
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration schemeIOSR Journals
Abstract: The AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme proposed three methods for data transmiting from master to slave for on chip communication. Multilayer advanced high-performance bus (ML-AHB) busmatrix employs slave-side arbitration. Slave-side arbitration is different from master-side arbitration in terms of request and grant signals since, in the former, the master merely starts a burst transaction and waits for the slave response to proceed to the next transfer. Therefore, in the former, the unit of arbitration can be a transaction or a transfer. However, the ML-AHB busmatrix of ARM offers only transfer-based fixed-pri-ority and round-robin arbitration schemes. In this paper, we propose the design and implementation of a flexible arbiter for the ML-AHB busmatrix to support three priority policies fixed priority, round robin, and dynamic priority and three data multiplexing modes transfer, transaction, and desired transfer length. In total, there are nine possible arbitration schemes. The proposed arbiter, which is self-motivated (SM), selects one of the nine possible arbitration schemes based upon the priority-level notifications and the desired transfer length from the masters so that arbitration leads to the maximum performance. Experimental results show that, although the area overhead of the proposed SM arbitration scheme is 9%–25% larger than those of the other arbitration schemes, our arbiter improves the throughput by 14%–62% compared to other schemes.
Bryophyllum Pinnatum: A Potential Attenuator of Cadmium-Induced Oxidative Str...IOSR Journals
Cadmium has been famously implicated in the stimulation of free radical production in biosystems resulting in oxidative deterioration of lipids, proteins and DNA, and initiating various pathological conditions in humans and animals. This study therefore, examined the antidotal and ameliorative capacity of crude ethanolic extract of Bryophyllum pinnatum on cadmium-induced oxidative stress using rabbit models. A total of fifteen rabbits (1.30±0.05kg) were used for the study. After two weeks of acclimatization, the rabbits were randomly rifted into three experimental groups- (N, CD & CB) with five animals per group. The control group (N) was injected normal saline intraperitoneally (3mg/kg body weight) and the test groups (CD & CB) were administered cadmium once daily by subcutaneous injection (3mg/kg body weight). The ethanolic extract of the plant was orally administered once daily at a dose of 100mg/kg body weight. The oxidative and antioxidative stress parameters were assessed in tissues. The results showed significant difference (p˂ 0.05)in treated groups relative to the control group with the exception of glutathione peroxidase activity in leg muscles. Therefore, the results obtained in this study confirmed the potency of the plant to annihilate cadmium toxicity in animals
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
Abstract Mobile ad hoc network (MANET) is a dynamic network without fixed infrastructure due to their wireless nature and can be deployed as multi-hop packet networks. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. A Reactive (on-demand) routing strategy is a popular routing category for wireless adhoc routing. The primary objective of this paper is to do comparative study of the performance of routing protocols Destination-Sequenced Distance-Vector (DSDV), Dynamic Source Routing (DSR) and Ad-hoc on demand Distance Vector (AODV) for wireless ad hoc networks in a simulated environment against varying network parameters. The evaluations are done by means of simulations using NS-2 network simulator. The study was done on the basis of performance metrics: throughput, packet delivery function, end-to-end delay, routing overhead and packet lost. Simulation results show that despite in most simulations reactive routing protocols DSR and AODV performed significantly better than proactive routing protocol DSDV for the CBR based traffic. Keywords- component; Mobile Adhoc Network, Routing protocol, DSR, AODV, DSDV
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Eswar Publications
Routing in mobile ad-hoc networks is an integral aspect of communication between devices. Routing is considered to
be a challenging task in MANETs due to the drastic and unpredictable changes in network topologies as a result of
the random and frequent movement of the nodes and due to the absence of any centralized control. Several routing protocols have been designed and developed to perform under various network environments. In this work a systematic simulation based performance study of the four prominent routing protocols: Ad hoc on Demand Multipath Routing Distance Vector (AOMDV), Dynamic Source Routing (DSR), Ad Hoc On Demand Distance Vector (AODV) and Temporarily Ordered Routing (TORA) protocols in the simulated networking environment under varying number of nodes in various scenarios is performed. These protocols use on-demand routing and have different protocol mechanisms leading to differences in performance. The performance is analyzed and evaluated based on end to end delay, packet delivery ratio, routing overheads and through-put done by varying network load, and the size of the network. Based on the observations, we make recommendations about the performance of the
protocols.
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
Ad-hoc networks are basically peer to peer multihop
mobile wireless networks in which the information packets
are transmitted in a ‘store and forward’ manner from a source
to an arbitrary destination via intermediate nodes. The main
objective of this paper is to evaluate the performance of various
ad-hoc networks routing protocols viz. DSDV (Destination
Sequence Distance Vector), DSR (Dynamic Source Routing)
and AODV (Ad-hoc On Demand Distance Vector). The
comparison of these protocols is based on different
performance metrics, which are throughput, packet delivery
ratio, routing overheads, packet drop and average end to end
delay. The performance evaluation has been done by using
simulation tool NS2 (Network Simulator) which is the main
simulator.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
The Internet of Things (IoT) is a revolutionary concept that connects everyday objects and devices to the internet, enabling them to communicate, collect, and exchange data. Imagine a world where your refrigerator notifies you when you’re running low on groceries, or streetlights adjust their brightness based on traffic patterns – that’s the power of IoT. In essence, IoT transforms ordinary objects into smart, interconnected devices, creating a network of endless possibilities.
Here is a blog on the role of electrical and electronics engineers in IOT. Let's dig in!!!!
For more such content visit: https://nttftrg.com/
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
Cooperative Data Forwarding In AODV Routing Protocol
1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 1, Ver. III (Jan - Feb. 2015), PP 05-08
www.iosrjournals.org
DOI: 10.9790/2834-10130508 www.iosrjournals.org 5 | Page
Cooperative Data Forwarding In AODV Routing Protocol
Sarath Menon1
Mr. Jose Anand 2
KCG College of Technology, Karapakkam, Chennai - 600097.
Abstract: A Wireless sensor Network uses thousands of miniature devices that communicate among each other
and sense data from the environment. The success of the communication in a WSN inherently lies in the routing
protocol used by the architecture. This work enables reliable communication for Reactive Routing Protocol
such as, Ad hoc On-demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) in Wireless
Sensor Networks. These protocols are on-demand routing protocols and has the capability to only detect Link
Failures. This hampers the packet delivery ratio and increases the end-to-end delay. AODV Protocol when
faced with a link failure condition has the source node reinitiate the route discovery phase by broadcasting
Route Request Messages to its neighbours without considering the affected link. The system calls for a Reliable
Reactive Routing Enhancement (R3E) as an extension over the AODV protocol. Here the nodes maintain a list
of forwarding candidates and their priorities with the help of routing table enabling forwarding of data towards
destination as per node priority and thereby removing the need for re-initiation of route discovery phase. Thus
R3E successfully augments the aforementioned AODV protocol, thereby improving the packet delivery ratio and
also achieving a significant reduction in end-to-end delay in the Wireless Sensor Network.
Keywords: Wireless Sensor Networks, Ad-Hoc On Demand distance Vector, Dynamic Source Routing, Link
Failure.
I. Introduction
Wireless Sensor Networks
Wireless Sensor Networks (WSN) can be defined as a computer network consisting of thousands of
miniature devices capable of computation, communication and sensing data from its environment. They
represent the next big step in creating the smart environment. The success of the smart environment depends on
the sensory data and hence the WSN’s. They provide a bridge between the physical and virtual worlds. The
challenges in the hierarchy of detecting the relevant quantities, monitoring and collecting the data, assessing and
evaluating the information, formulating meaningful user displays and performing decision-making and alarm
functions are enormous.
II. Components In Wireless Sensor Networks
The Fig 1.1 shows the various components in the WSN. Typically WSNs contain hundreds or
thousands of sensor nodes, and these sensors have the ability to communicate either among each other or
directly to an external base station (BS). A greater number of sensors allows for sensing over larger
geographical regions with greater accuracy. Basically each sensor node comprises sensing, processing,
transmission, mobilizer, position finding system, and power units (some of these components are optional, like
the mobilizer). Sensor nodes are usually scattered in a sensor field, which is an area where the sensor nodes are
deployed. Sensor nodes coordinate among themselves to produce high-quality information about the physical
environment. Each sensor node bases its decisions on its mission, the information it currently has, and its
knowledge of its computing, communication and energy resources. Each of these scattered sensor nodes has the
capability to collect and route data either to other sensors or back to an external BS(s). A BS may be a fixed or a
mobile node capable of connecting the sensor network to an existing communications infrastructure or to the
Internet where a user can have access to the reported data.
Fig 1.1 Components in WSN
2. Cooperative Data Forwarding In AODV Routing Protocol
DOI: 10.9790/2834-10130508 www.iosrjournals.org 6 | Page
III. Routing In Wsn
Routing in WSNs is very challenging due to the inherent characteristics that distinguish these networks
from other wireless networks like mobile ad hoc networks or cellular networks. First, due to the relatively large
number of sensor nodes, it is not possible to build a global addressing scheme for the deployment of a large
number of sensor nodes as the overhead of ID maintenance is high. Thus traditional IP-based protocols may not
be applied to WSNs. Furthermore sensor nodes that are deployed in an ad hoc manner need to be self-organizing
as the ad hoc deployment of these nodes requires the system to form connections and cope with the resultant
nodal distribution, especially as the operation of sensor networks is unattended. In WSNs sometimes getting the
data is more important than knowing the IDs of which nodes sent the data. Second in contrast to typical
communication networks almost all applications of sensor networks require the flow of sensed data from
multiple sources to a particular BS. This however does not prevent the flow of data to be in other forms (e.g.,
multicast or peer to peer). Third sensor nodes are tightly constrained in terms of energy, processing and storage
capacities. Thus they require careful resource management. Fourth in most application scenarios nodes in WSNs
are generally stationary after deployment except for maybe a few mobile nodes. Nodes in other traditional
wireless networks are free to move which results in unpredictable and frequent topological changes. However in
some applications some sensor nodes may be allowed to move and change their location (although with very
low mobility). Fifth sensor networks are application-specific. Sixth position awareness of sensor nodes is
important since data collection is normally based on the location. Finally data collected by many sensors in
WSNs is typically based on common phenomena, so there is a high probability that this data has some
redundancy. Such redundancy needs to be exploited by the routing protocols to improve energy and bandwidth
utilization. Usually WSNs are data centric networks in the sense that data is requested based on certain
attributes.
IV. Existing System
Ad Hoc On Demand Distance Vector Routing is the most prominently used reactive routing protocol in
wireless sensor networks. This protocol has the ability to detect only the link failure condition in the network.
Link failure conditions are detected by the absence of HELLO messages between the neighbour nodes in the
network. Thus in case of link failure condition in the network the source node again reinitiates the route
discovery phase by flooding the network with Route request packet. This hampers the throughput and the packet
delivery ratio (PDR), while the end to end delay is also on the ascendancy.
V. Proposed System
The system calls for augmenting the existing AODV routing protocol with a concept of Reliable
Routing Reactive Routing (R3E). This concept is used as an extension to the AODV routing protocol which
enables the network to bypass the link failure condition. Thereby during a link failure condition the source node
greedily progresses the data towards the destination using the guide path. Thus there is no need for the source
node to re- initiate the route discovery phase in case of link failure. This increases the throughput, packet
delivery ratio (PDR) while reducing the end to end delay in the network.
Reliable Reactive Routing Enhancement (R3E)
The project proposes an idea of R3E which is used as an extension over the AODV protocol. This
enhances the AODV routing protocol to provide reliable and energy efficient packet delivery against the
condition of Link Failure which may occur in a wireless sensor network.
Fig 1.2 shows the functional architecture overview of R3E. It is a middle-ware design across the MAC
and the network layer. The R3E enhancement layer module consists of three main modules. They are Reliable
Route discovery module, potential forwarder selection and prioritization module and forwarding selection
module. The reliable route discovery module finds and maintains the route information for each node. The other
two modules are responsible for the runtime forwarding phase. Forwarding decision module will check whether
the node receiving a packet is one of the intended receivers if it is true then the node will cache the incoming
packet. The potential forwarder selection and prioritization module attaches the ordered forwarder list in the
data packet header for the next hop. Lately the outgoing packet will be submitted to the MAC layer and
forwarded towards the destination.
3. Cooperative Data Forwarding In AODV Routing Protocol
DOI: 10.9790/2834-10130508 www.iosrjournals.org 7 | Page
Fig 1.2 Functional Architecture overview of R3E
AODV-R3E Implementation
Fig 1.3 AODV-R3E Implementation
Fig 1.3 shows the steps followed to implement the R3E protocol over the AODV Routing Protocol.
Creation of c/c++ files in the folder is the primary step in this process. Modifying the files in NS2 is done so that
the system can recognize the R3E protocol in the simulation. Registration of packet header is done in c++ so
that the simulator will recognize the above idea. Modification of the existing AODV protocol is done.
Modification is done with the existing header files and there is a need to add some extra header files as well
which will take care of the node priority TTL expiration cases and routing table updation. Connection of
interfacing queue and routing agent to each other is essential. Last step is to add new compile options to the
―Make- file‖ and rebuild the NS2 software.
AODV-R3E
R3E is implemented with the AODV routing protocol to achieve AODV-R3E. It acts along with the
AODV routing protocol and enhances its resilience to the condition of link failure. Source Node wishes to send
data to the destination node. It first checks its routing table to find the neighbouring nodes and broadcasts RREQ
packets to them. The intermediate node then broadcasts the RREQ packet to downstream nodes. This is done till
the packet reaches the destination node or the node that is one hop path away from the destination. This node
sends Route Reply packet to the source node through the intermediate nodes. A Source node will get many
Route Request packets. It will accept one of them and will reject all others. The data forwarding will happen
along the way that was traversed by the Route Reply packet. In case a link failure occurs in the network which is
indicated by profound drop in packets or the absence of beacon signals in the network. In the above case the
source node refers to its routing table and will forward the packet to the next preferable neighbour nodes and in
this way the packet from the source to destination will reach without using the broken link and without
undergoing the process of Route discovery again. This can happen as long as the data forwarding is between the
same source- destination pair. In case some other node wants to send the data towards a destination node it
should be done only after Route discovery phase.
VI. Results And Analysis
The reliable Reactive Routing Enhancement (R3E) is implemented over the AODV routing protocol. Simulation
is carried out in NS-2.29 for two cases namely
1) Link failure condition in AODV Routing Protocol.
2) Link failure condition in AODV-R3E Routing Protocol.
It is seen that in case of the link failure condition in the network AODV-R3E greedily progresses the data
towards the destination as opposed to the AODV Routing Protocol. AODV- R3E does not have the source node
4. Cooperative Data Forwarding In AODV Routing Protocol
DOI: 10.9790/2834-10130508 www.iosrjournals.org 8 | Page
reinitiate the route discovery phase in the above scenario. While for AODV Routing Protocol Route discovery
phase is an essentiality in case of link failure condition in the network.
Comparison
Simulation was done for the above scenarios. The Graph was plotted for 3 parameters throughput,
packet delivery ratio and end to end delay taken in y-axis vs increasing node density taken on x axis. The
comparison is given in the form of a table given below.
Parameters AODV AODV-R3E
Throughput 0.9Mbps 5.5 Mbps
End to end delay (Min) 20 ms 12 ms
Packet delivery ratio 90% 100%
VII. Conclusion
The Proposed R3E protocol served as an efficient Protocol acting as an extension to the AODV
Routing protocol as figuratively indicated by the Table. It increased the resilience of the network against the
condition of link failure. It reduced the end to end delay and did appreciably well in increasing the Throughput
and the Packet delivery Ratio as compared with the aforementioned Ad hoc On Demand Routing Protocol.
Future Work
The future work will focus on introducing the Concept of Intrusion detection System (IDS) by
implementing the idea of Enhanced Adaptive ACKnowledgement(EAACK).This system will focus on ideas to
protect the network from malicious attack of the nodes in the network itself. Thus it will make the network
robust against any intruder that may be encountered by the network.
References
[1]. Vehbi Cagri, Gungor, Özgür B. Akan and Ian F. Akyildiz, (April 2008), ―A Real-Time and Reliable Transport (RT)2
Protocol for
Wireless Sensor and Actor Networks‖, IEEE Trans. Networking,Vol.16,No.2, pp. 359-370.
[2]. X. Huang, H. Zhai, and Y. Fang, (Dec 2008), ―Robust cooperative routing protocol in mobile wireless sensor networks‖, IEEE
Trans. Wireless Commun., Vol. 7, No. 12, pp. 5278–5285.
[3]. Xufei Mao, Shaojie Tang, Xiahua Xu, Xiang-Yang Li and Huadong Ma, (Nov 2011), ―Energy Efficient Opportunistic Routing in
Wireless Sensor Networks‖, IEEE Trans. Parallel and Distrib. Syst., Vol. 22, No. 11, pp 1934-1942.
[4]. Jianwei Niu, Long Cheng, Yu Gu, Lei Shu and Sajal K. Das, (Feb 2014), ―R3E: Reliable Reactive Routing Enhancement for
Wireless Sensor Networks‖, IEEE Trans. Industrial informatics, Vol.10, No.1, pp. 784-794.
[5]. Eric Rozner, Jayesh Seshadri, Yogita Ashok Mehta and Lili Qiu, (Dec 2009) ―Soar: Simple opportunistic adaptive routing protocol
for wireless mesh networks‖, IEEE Trans. Mobile Comput., Vol. 8, No. 12 pp. 1622–1635.
[6]. Elhadi M. Shakshuki, , Nan Kang and Tarek R. Sheltami, (March 2013), ―EAACK—A Secure Intrusion-Detection System for
MANETs‖, IEEE Trans Industrial Electronics, VOL. 60, NO. 3, pp 1089-1098.