Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self
reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an
important issue. We are using routing protocol to save energy so as to extend network lifetime.
We have extended original Optimized Linked State Routing (OLSR) protocol by using two
algorithms and named it as Enhancement in OLSR using Residual Energy approach (EOLSRRE)
and Enhancement in OLSR using Energy Consumption approach (EOLSR-EC). To analyze
relative performance of modified protocol EOLSR-RE and EOLSR-EC over OLSR, we
performed various trials using Qualnet simulator. The performance of these routing protocols is
analyzed in terms of energy consumption, control overheads, end to end delay, packet delivery
ratio. The modified OLSR protocol improves energy efficiency of network by reducing 20 %
energy consumption and 50% control overheads.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
In ad hoc routing protocols the source node
may need an intermediate nodes to transmit the packets into
the destination if the destination is not within transmission
range of the source. This paper studies the impact of signal
strength of nodes over ad hoc routing protocols and explains
an important effect of signal strength on ad hoc routing
protocols in four different directions including the routes and
the nodes. As a result the study give an important
improvement in ad hoc routing protocols when using signal
strength compared to other ad hoc routing protocols without
considering signal strength.
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
This paper evaluates the energy consumption of well-known routing protocols, along with other metrics
such as throughput, packet delivery ratio (PDR), and delay in different scenarios. We consider two other
metrics in order to capture the efficiency of the energy consumption: e-throughput which is the ratio
between the consumed energy and the throughput; and the e-PDR which is the ratio between the
consumed energy and the PDR. We compare four routing protocols: AODV, OLSR, and HWMP in
Reactive and Proactive modes. The number of nodes is varying between 25 and 81 nodes, with different
mobility models. Simulations are conducted using NS3 and the parameters of a real network interface
card. From the results, AODV presents the lowest energy consumption and a better e-Throughput. OLSR
provides a better e-PDR in mobile scenarios. With a smaller e-PDR and e-Throughput, the proactive
mode of HWMP is more energy efficient than the reactive mode.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
This document summarizes a research paper that examines the performance of three mobile ad hoc network (MANET) routing protocols: AODV, DSR, and DSDV. Through network simulations varying the number of nodes and connections, the paper evaluates the routing protocols based on average end-to-end delay, normalized routing load, packet delivery fraction, and throughput. The simulation results show that AODV generally has better performance than DSR and DSDV in terms of lower delay, higher packet delivery, and better throughput, especially as the network size increases. However, DSDV maintains more consistent performance than the reactive protocols as network conditions change.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
In ad hoc routing protocols the source node
may need an intermediate nodes to transmit the packets into
the destination if the destination is not within transmission
range of the source. This paper studies the impact of signal
strength of nodes over ad hoc routing protocols and explains
an important effect of signal strength on ad hoc routing
protocols in four different directions including the routes and
the nodes. As a result the study give an important
improvement in ad hoc routing protocols when using signal
strength compared to other ad hoc routing protocols without
considering signal strength.
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
This paper evaluates the energy consumption of well-known routing protocols, along with other metrics
such as throughput, packet delivery ratio (PDR), and delay in different scenarios. We consider two other
metrics in order to capture the efficiency of the energy consumption: e-throughput which is the ratio
between the consumed energy and the throughput; and the e-PDR which is the ratio between the
consumed energy and the PDR. We compare four routing protocols: AODV, OLSR, and HWMP in
Reactive and Proactive modes. The number of nodes is varying between 25 and 81 nodes, with different
mobility models. Simulations are conducted using NS3 and the parameters of a real network interface
card. From the results, AODV presents the lowest energy consumption and a better e-Throughput. OLSR
provides a better e-PDR in mobile scenarios. With a smaller e-PDR and e-Throughput, the proactive
mode of HWMP is more energy efficient than the reactive mode.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
This document summarizes a research paper that examines the performance of three mobile ad hoc network (MANET) routing protocols: AODV, DSR, and DSDV. Through network simulations varying the number of nodes and connections, the paper evaluates the routing protocols based on average end-to-end delay, normalized routing load, packet delivery fraction, and throughput. The simulation results show that AODV generally has better performance than DSR and DSDV in terms of lower delay, higher packet delivery, and better throughput, especially as the network size increases. However, DSDV maintains more consistent performance than the reactive protocols as network conditions change.
The document summarizes an Efficient Position-Based Opportunistic Routing (EPOR) protocol proposed for mobile ad hoc networks. EPOR takes advantage of geographic routing and the broadcast nature of wireless transmissions. When a packet is transmitted, overhearing nodes can act as forwarding candidates. The best forwarder is chosen, but if it fails to forward in time, a suboptimal candidate will forward instead to avoid transmission interruptions. Simulation results show EPOR achieves higher packet delivery ratios and lower end-to-end delays than GPSR and AOMDV routing protocols, even under high node mobility.
This document analyzes and compares the scalability of three mobile ad hoc network (MANET) routing protocols - AODV, TORA, and OLSR - by simulating them using varying numbers of nodes. The key findings are:
1) In terms of end-to-end delay, OLSR consistently performs better than AODV and TORA as the number of nodes increases from 25 to 75.
2) For throughput, OLSR outperforms AODV and TORA across all network sizes tested.
3) The study concludes that OLSR demonstrates better scalability than AODV and TORA based on its performance with increasing numbers of nodes in terms of
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
This document summarizes and compares two extended versions of the AODV routing protocol for mobile ad hoc networks (MANETs): Reverse AODV (RAODV) and Multicast AODV (MAODV). RAODV aims to improve routing performance by allowing multiple route reply messages, while MAODV allows nodes to send multicast data packets through a multicast group tree. The document outlines the key features and operations of each protocol, including route discovery processes. It then evaluates and compares the performance of RAODV and MAODV using metrics like end-to-end delay and overhead while varying the number of nodes.
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
This document summarizes a study that compares the performance of two routing protocols, AODV and MCF, in a layered wireless sensor network (WSN) using the network simulator NS-2. It first provides background on AODV, describing how it establishes and maintains routes. It then describes the MCF protocol, which formulates lightpath routing as an integer linear program to minimize the impact of fiber failures. The document outlines how both protocols were implemented in NS-2 and compares their performance based on metrics like throughput, packet loss, and end-to-end delay. The simulation results show that MCF generally has better throughput and reliability than AODV in the scenario of a 80-node WSN.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)IJCNCJournal
Ad hoc networks are a collection of mobile nodes communicating via wireless channels without any fixed
infrastructure. Because of their ease and low cost of building, ad hoc networks have a lot of attractive
applications in different fields. The topology of ad hoc networks changes dynamically, and each node in the
network can act as a host or router. With the increase in the number of wireless devices and large amount
of traffic to be exchanged, the demand for scalable routing protocols has increased. This paper presents a
scalable routing protocol, based on AODV protocol, called the Extended Clustering Ad Hoc Routing
Protocol (ECRP). This is a hybrid protocol, which combines reactive and proactive approaches in routing.
The protocol uses the Global Positioning System to determine the position of certain nodes in the network.
The evaluation methodology and simulation results obtained show that the protocol is efficient and scales
well in large networks
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
This document discusses using the Address Resolution Protocol (ARP) routing protocol for multi-hop transmissions in IEEE 802.11 ad hoc networks. It proposes using ARP messages between nodes to establish routes for sending data when the source and destination nodes are out of radio range of each other. Intermediate nodes receiving ARP requests or replies would act as routers, forwarding the data to the destination. The method aims to reduce overhead compared to other ad hoc routing protocols like AODV. Simulation results showed the ARP routing protocol performed comparably to AODV in terms of throughput, packet loss and round trip time for different distances and environments.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
The growth in wireless communication technologies has resulted in a considerable amount of
attention given to mobile adhoc networks. All mobile hosts in an adhoc network are embedded with
packet forwarding capabilities. It is decentralized and is independent of infrastructure. Since mobile
hosts in an adhoc network usually move freely, the topology of the network changes dynamically and
disconnection occurs frequently. These characteristics require the routing protocols to find an
alternative path towards the destination for data transfer. The existing on-demand routing protocols
does the alternative path establishment only after the disconnection of links in the existing path. The
data sent by the source during alternate path establishment period will be lost leading to incomplete
data transfer. The network traffic will therefore increase considerably. This problem can be overcome
by establishing an alternative path when the existing path is more likely to be broken, by sending a
warning message to the source indicating the likelihood of disconnection. In this paper an attempt has
been made to analyze a protocol that improves the network connectivity by preempting the alternative
path before the existing link gets failed by monitoring the signal strength and ‘age of the path’.
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...eSAT Journals
Abstract
Wireless Technology has an enormous use these days and is still becoming popular from times immemorial. It is at its peak when we
talk about research. This is because of the latest technological demands now days arising from Laptops, Wireless devices such as
Wireless local area networks (WLANs) etc. Because of its fast growing popularity day by day, it has led wireless technology data rates
higher and it has made its price cheaper, which is why wireless Technology is growing so fast. In this paper we have presented some
most commonly used routing protocols in MANET and compared the performance of AODV, OLSR, GRP and DSR routing protocol
by using OPNET simulator 14.5. The performance is evaluated under different parameters like Delay, Load, and Media access delay,
Network Load, Retransmission and Throughput for Database load.
Keywords— MANET, Peak Value, Protocol, Drop value
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This document compares the performance of the AODV and DSR routing protocols under various network conditions through simulation. It finds that AODV performs better than DSR in terms of packet delivery ratio, with fewer packets lost over time. While DSR initially loses more packets, it is able to reduce packet loss over the course of the longer 20-second simulation compared to AODV.
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
This document analyzes the effect of node density on different routing protocols under FTP and HTTP applications. It simulates scenarios with varying node densities (20-130 nodes) using routing protocols AODV, DSR, GRP and OLSR. Key quality of service (QoS) metrics - throughput, delay, network load and packet delivery ratio - are evaluated and compared. The results show that OLSR generally performs best in terms of throughput and delay for both FTP and HTTP applications. GRP performs best for network load, while AODV has the highest packet delivery ratio for FTP. In conclusion, OLSR is the best overall routing protocol for supporting FTP and HTTP applications in mobile ad-hoc networks according to
This document analyzes the performance of different routing protocols (AODV, DSR, DSDV) under various mobility models (random waypoint, random direction, random walk) and node speeds in mobile ad hoc networks. It finds that reactive protocols like AODV and DSR generally have higher packet delivery ratios than proactive DSDV, but end-to-end delays vary depending on the mobility model and node speed. The document proposes an algorithm to select the best routing protocol based on whether data delivery or time is the higher priority, and whether nodes are stationary or mobile. DSDV is preferred when data delivery is most important, while DSR performs better for time-critical applications.
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...pijans
Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self
reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an important
issue. We are using routing protocol to save energy so as to extend network lifetime. We have extended
original Optimized Linked State Routing (OLSR) protocol by using two algorithms and named it as
Enhancement in OLSR using Residual Energy approach (EOLSR-RE) and Enhancement in OLSR using
Energy Consumption approach (EOLSR-EC). To analyze relative performance of modified protocol
EOLSR-RE and EOLSR-EC over OLSR, we performed various trials using Qualnet simulator. The
performance of these routing protocols is analyzed in terms of energy consumption, control overheads, end
to end delay, packet delivery ratio. The modified OLSR protocol improves energy efficiency of network by
reducing 20 % energy consumption and 50% control overheads.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
The document provides an overview of routing protocols for mobile ad hoc networks (MANETs). It discusses that MANETs are self-configuring networks without centralized control where nodes can act as routers to forward packets. The document classifies routing protocols as proactive (table-driven), reactive (on-demand), or hybrid. It describes examples of proactive routing protocols like DSDV, OLSR, and WRP that maintain up-to-date routing tables and share updates periodically or when changes occur. The document also discusses reactive protocols establish routes on demand and hybrid protocols that combine aspects of proactive and reactive approaches.
The document summarizes an Efficient Position-Based Opportunistic Routing (EPOR) protocol proposed for mobile ad hoc networks. EPOR takes advantage of geographic routing and the broadcast nature of wireless transmissions. When a packet is transmitted, overhearing nodes can act as forwarding candidates. The best forwarder is chosen, but if it fails to forward in time, a suboptimal candidate will forward instead to avoid transmission interruptions. Simulation results show EPOR achieves higher packet delivery ratios and lower end-to-end delays than GPSR and AOMDV routing protocols, even under high node mobility.
This document analyzes and compares the scalability of three mobile ad hoc network (MANET) routing protocols - AODV, TORA, and OLSR - by simulating them using varying numbers of nodes. The key findings are:
1) In terms of end-to-end delay, OLSR consistently performs better than AODV and TORA as the number of nodes increases from 25 to 75.
2) For throughput, OLSR outperforms AODV and TORA across all network sizes tested.
3) The study concludes that OLSR demonstrates better scalability than AODV and TORA based on its performance with increasing numbers of nodes in terms of
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
This document summarizes and compares two extended versions of the AODV routing protocol for mobile ad hoc networks (MANETs): Reverse AODV (RAODV) and Multicast AODV (MAODV). RAODV aims to improve routing performance by allowing multiple route reply messages, while MAODV allows nodes to send multicast data packets through a multicast group tree. The document outlines the key features and operations of each protocol, including route discovery processes. It then evaluates and compares the performance of RAODV and MAODV using metrics like end-to-end delay and overhead while varying the number of nodes.
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
This document summarizes a study that compares the performance of two routing protocols, AODV and MCF, in a layered wireless sensor network (WSN) using the network simulator NS-2. It first provides background on AODV, describing how it establishes and maintains routes. It then describes the MCF protocol, which formulates lightpath routing as an integer linear program to minimize the impact of fiber failures. The document outlines how both protocols were implemented in NS-2 and compares their performance based on metrics like throughput, packet loss, and end-to-end delay. The simulation results show that MCF generally has better throughput and reliability than AODV in the scenario of a 80-node WSN.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)IJCNCJournal
Ad hoc networks are a collection of mobile nodes communicating via wireless channels without any fixed
infrastructure. Because of their ease and low cost of building, ad hoc networks have a lot of attractive
applications in different fields. The topology of ad hoc networks changes dynamically, and each node in the
network can act as a host or router. With the increase in the number of wireless devices and large amount
of traffic to be exchanged, the demand for scalable routing protocols has increased. This paper presents a
scalable routing protocol, based on AODV protocol, called the Extended Clustering Ad Hoc Routing
Protocol (ECRP). This is a hybrid protocol, which combines reactive and proactive approaches in routing.
The protocol uses the Global Positioning System to determine the position of certain nodes in the network.
The evaluation methodology and simulation results obtained show that the protocol is efficient and scales
well in large networks
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
This document discusses using the Address Resolution Protocol (ARP) routing protocol for multi-hop transmissions in IEEE 802.11 ad hoc networks. It proposes using ARP messages between nodes to establish routes for sending data when the source and destination nodes are out of radio range of each other. Intermediate nodes receiving ARP requests or replies would act as routers, forwarding the data to the destination. The method aims to reduce overhead compared to other ad hoc routing protocols like AODV. Simulation results showed the ARP routing protocol performed comparably to AODV in terms of throughput, packet loss and round trip time for different distances and environments.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
The growth in wireless communication technologies has resulted in a considerable amount of
attention given to mobile adhoc networks. All mobile hosts in an adhoc network are embedded with
packet forwarding capabilities. It is decentralized and is independent of infrastructure. Since mobile
hosts in an adhoc network usually move freely, the topology of the network changes dynamically and
disconnection occurs frequently. These characteristics require the routing protocols to find an
alternative path towards the destination for data transfer. The existing on-demand routing protocols
does the alternative path establishment only after the disconnection of links in the existing path. The
data sent by the source during alternate path establishment period will be lost leading to incomplete
data transfer. The network traffic will therefore increase considerably. This problem can be overcome
by establishing an alternative path when the existing path is more likely to be broken, by sending a
warning message to the source indicating the likelihood of disconnection. In this paper an attempt has
been made to analyze a protocol that improves the network connectivity by preempting the alternative
path before the existing link gets failed by monitoring the signal strength and ‘age of the path’.
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...eSAT Journals
Abstract
Wireless Technology has an enormous use these days and is still becoming popular from times immemorial. It is at its peak when we
talk about research. This is because of the latest technological demands now days arising from Laptops, Wireless devices such as
Wireless local area networks (WLANs) etc. Because of its fast growing popularity day by day, it has led wireless technology data rates
higher and it has made its price cheaper, which is why wireless Technology is growing so fast. In this paper we have presented some
most commonly used routing protocols in MANET and compared the performance of AODV, OLSR, GRP and DSR routing protocol
by using OPNET simulator 14.5. The performance is evaluated under different parameters like Delay, Load, and Media access delay,
Network Load, Retransmission and Throughput for Database load.
Keywords— MANET, Peak Value, Protocol, Drop value
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This document compares the performance of the AODV and DSR routing protocols under various network conditions through simulation. It finds that AODV performs better than DSR in terms of packet delivery ratio, with fewer packets lost over time. While DSR initially loses more packets, it is able to reduce packet loss over the course of the longer 20-second simulation compared to AODV.
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
This document analyzes the effect of node density on different routing protocols under FTP and HTTP applications. It simulates scenarios with varying node densities (20-130 nodes) using routing protocols AODV, DSR, GRP and OLSR. Key quality of service (QoS) metrics - throughput, delay, network load and packet delivery ratio - are evaluated and compared. The results show that OLSR generally performs best in terms of throughput and delay for both FTP and HTTP applications. GRP performs best for network load, while AODV has the highest packet delivery ratio for FTP. In conclusion, OLSR is the best overall routing protocol for supporting FTP and HTTP applications in mobile ad-hoc networks according to
This document analyzes the performance of different routing protocols (AODV, DSR, DSDV) under various mobility models (random waypoint, random direction, random walk) and node speeds in mobile ad hoc networks. It finds that reactive protocols like AODV and DSR generally have higher packet delivery ratios than proactive DSDV, but end-to-end delays vary depending on the mobility model and node speed. The document proposes an algorithm to select the best routing protocol based on whether data delivery or time is the higher priority, and whether nodes are stationary or mobile. DSDV is preferred when data delivery is most important, while DSR performs better for time-critical applications.
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...pijans
Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self
reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an important
issue. We are using routing protocol to save energy so as to extend network lifetime. We have extended
original Optimized Linked State Routing (OLSR) protocol by using two algorithms and named it as
Enhancement in OLSR using Residual Energy approach (EOLSR-RE) and Enhancement in OLSR using
Energy Consumption approach (EOLSR-EC). To analyze relative performance of modified protocol
EOLSR-RE and EOLSR-EC over OLSR, we performed various trials using Qualnet simulator. The
performance of these routing protocols is analyzed in terms of energy consumption, control overheads, end
to end delay, packet delivery ratio. The modified OLSR protocol improves energy efficiency of network by
reducing 20 % energy consumption and 50% control overheads.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
The document provides an overview of routing protocols for mobile ad hoc networks (MANETs). It discusses that MANETs are self-configuring networks without centralized control where nodes can act as routers to forward packets. The document classifies routing protocols as proactive (table-driven), reactive (on-demand), or hybrid. It describes examples of proactive routing protocols like DSDV, OLSR, and WRP that maintain up-to-date routing tables and share updates periodically or when changes occur. The document also discusses reactive protocols establish routes on demand and hybrid protocols that combine aspects of proactive and reactive approaches.
The document provides an overview of routing protocols for mobile ad hoc networks (MANETs). It discusses the characteristics of MANETs and challenges in routing. It classifies routing protocols into three categories: proactive, reactive, and hybrid. Proactive protocols continuously maintain up-to-date routing information through periodic updates. Reactive protocols find routes on demand via route discovery. Hybrid protocols incorporate aspects of both proactive and reactive routing. Examples of protocols from each category are described and compared, including DSDV, AODV, DSR, ZRP, and CEDAR. The document concludes routing in MANET is an active area of research with the goal of protocols responding rapidly to topological changes.
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
This document summarizes and surveys several enhanced routing protocols that have been developed for mobile ad hoc networks (MANETs). It begins by providing background on routing challenges in MANETs and classifications of routing protocols. It then describes several traditional and widely used routing protocols, including DSDV, OLSR, TORA, DSR, and AODV. The document focuses on summarizing several new routing protocols that have been proposed to improve upon existing protocols. It discusses protocols such as BAWB-DSR, CCSR, RAMP, AODV-SBA, CBRP-R, and CBTRP - noting techniques, advantages, and disadvantages of each. The overall purpose is to review
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
This document analyzes and compares different routing protocols for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics, such as dynamic topology and limited resources. It then classifies routing protocols as either proactive (table-driven) or reactive (on-demand) and describes several examples of each type. Proactive protocols maintain up-to-date routing tables through periodic updates but incur more overhead. Reactive protocols discover routes on demand but add latency. The document provides details on popular protocols like DSDV, AODV, DSR and TORA, explaining their route discovery, maintenance and metrics.
International Journal of Engineering Research and DevelopmentIJERD Editor
This document analyzes and compares different routing protocols for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics. It then classifies routing protocols into proactive (table-driven) and reactive (on-demand) categories. For each category, several representative protocols are described in detail, including DSDV, WRP, CGSR, DSR, AODV, ABR, SSA, and TORA. Their routing mechanisms and approaches to route discovery and maintenance are outlined. The document aims to provide an overview of major MANET routing protocols to help determine the most suitable ones for different network conditions.
Performance Comparison and Analysis of Mobile Ad Hoc Routing ProtocolsCSEIJJournal
A mobile ad hoc network (MANET) is a wireless network that uses multi-hop peer-to-peer routing instead
of static network infrastructure to provide network connectivity. MANETs have applications in rapidly
deployed and dynamic military and civilian systems. The network topology in a MANET usually changes
with time. Therefore, there are new challenges for routing protocols in MANETs since traditional routing
protocols may not be suitable for MANETs. Researchers are designing new MANET routing protocols
and comparing and improving existing MANET routing protocols before any routing protocols are
standardized using simulations. However, the simulation results from different research groups are not
consistent with each other. This is because of a lack of consistency in MANET routing protocol models
and application environments, including networking and user traffic profiles. Therefore, the simulation
scenarios are not equitable for all protocols and conclusions cannot be generalized. Furthermore, it is
difficult for one to choose a proper routing protocol for a given MANET application. According to the
aforementioned issues, this paper focuses on MANET routing protocols. Specifically, my contribution
includes the characterization of different routing protocols and compare and analyze the performance of
different routing protocols.
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
This document proposes a new theoretical approach to location based power aware routing in mobile ad hoc networks (MANETs). It aims to extend the network lifetime by improving power utilization during routing. The approach uses nodes' location information, remaining battery power, and bandwidth status to assign link stability and select routes with lower "uptime values" and minimum bandwidth over time. This is hypothesized to better utilize nodes' power sources and bandwidth. The document outlines calculating a root up time factor for each node based on its power backup and required power, and only using nodes with maximum backup. It concludes future work will design and validate a new protocol based on this approach.
Performance evaluation of two models in the reactive routing protocol in manetsnooriasukmaningtyas
Due to the need for the multicast connection required by multimedia applications such as video conferencing and natural disaster management, it was necessary to use a set of portable and connected wireless peripheral devices without the need for infrastructure and without a central router, by use wireless network as "a mobile ad hoc network (MANET)". Despite the difficulties facing this technology in the process of effective guidance and the expansion of the use of such networks, in this type of network because of its applications in the fields of civil and military systems that do not need an infrastructure for the network to provide communication, the researchers specialized in this field have improved the current routing protocols and design new protocols that are appropriate to the challenges that Routing protocols face due to continuous change In network topology over time. In this paper we improved the current routing protocols and design new protocols that are appropriate to the challenges that routing protocols face due to continuous change In network topology over time. The NS2 simulation environment was used for the purpose of a comprehensive evaluation of the performance of the TORA and AODV routing protocols By using properties of packet delivery fraction and end-to-end delay was calculated.
Analyzing performance of zrp by varying node density and transmission rangeAlexander Decker
This document summarizes a simulation study analyzing the performance of the Zone Routing Protocol (ZRP) in mobile ad hoc networks by varying different parameters. The study uses the Network Simulator 2 (NS-2) tool to simulate ZRP under varying node density, transmission range, pause time, sending rate, and node mobility. Key performance metrics like throughput, end-to-end delay, and normalized routing load are measured. The results show that throughput generally increases with higher node density, transmission range, and pause time, while delay and routing load also tend to increase with those factors. Throughput decreases with higher node mobility, while delay decreases and routing load increases.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANETcscpconf
A Mobile Ad-Hoc Network (MANET) is a temporary, infrastructure-less and distributed network
having mobile nodes. MANET has limited resources like bandwidth and energy. Due to limited
battery power nodes die out early and affect the network lifetime. To make network energy
efficient, we have modified position based Location Aided Routing (LAR1) for energy
conservation in MANET. The proposed protocol is known as Variable Range Energy aware
Location Aided Routing (ELAR1-VAR). The proposed scheme controls the transmission power
of a node according to the distance between the nodes. It also includes energy information on
route request packet and selects the energy efficient path to route data packets. The comparative
analysis of proposed scheme and LAR1 is done by using the QualNet simulator. ELAR1-VAR
protocol improves the network lifetime by reducing energy consumption by 20% for dense and
mobile network while maintaining the packet delivery ratio above 90%.
This document summarizes a research paper that analyzes the performance of the Dynamic Source Routing (DSR) protocol for mobile ad hoc networks (MANETs) in terms of energy consumption. It proposes an Energy Secure DSR (ESDSR) protocol that modifies DSR to optimize energy consumption by not including nodes with low energy in route selection. Simulations using the NS-3 network simulator show that ESDSR has better performance than DSR in terms of energy consumption, delay, throughput, and packet delivery ratio.
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
In the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks.
This document summarizes a research paper that surveyed detection and prevention mechanisms for flooding attacks in mobile ad hoc networks (MANETs). It began with an abstract that described how MANETs are increasingly being used but also face security threats like flooding attacks. It then provided definitions and characteristics of MANETs and described two common routing protocols: AODV and OLSR. The paper discussed flooding attacks and different detection and prevention schemes that have been proposed. It concluded with a survey of these mechanisms to detect and mitigate flooding attacks in MANETs.
Similar to ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION (20)
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience. Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
Universities offer software engineering capstone course to simulate a real world-working environment in which students can work in a team for a fixed period to deliver a quality product. The objective of the paper is to report on our experience in moving from Waterfall process to Agile process in conducting the software engineering capstone project. We present the capstone course designs for both Waterfall driven and Agile driven methodologies that highlight the structure, deliverables and assessment plans.To evaluate the improvement, we conducted a survey for two different sections taught by two different instructors to evaluate students’ experience in moving from traditional Waterfall model to Agile like process. Twentyeight students filled the survey. The survey consisted of eight multiple-choice questions and an open-ended question to collect feedback from students. The survey results show that students were able to attain hands one experience, which simulate a real world-working environment. The results also show that the Agile approach helped students to have overall better design and avoid mistakes they have made in the initial design completed in of the first phase of the capstone project. In addition, they were able to decide on their team capabilities, training needs and thus learn the required technologies earlier which is reflected on the final product quality
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
This document discusses using social media technologies to promote student engagement in a software project management course. It describes the course and objectives of enhancing communication. It discusses using Facebook for 4 years, then switching to WhatsApp based on student feedback, and finally introducing Slack to enable personalized team communication. Surveys found students engaged and satisfied with all three tools, though less familiar with Slack. The conclusion is that social media promotes engagement but familiarity with the tool also impacts satisfaction.
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and
different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
Human beings generate different speech waveforms while speaking the same word at different times. Also, different human beings have different accents and generate significantly varying speech waveforms for the same word. There is a need to measure the distances between various words which facilitate preparation of pronunciation dictionaries. A new algorithm called Dynamic Phone Warping (DPW) is presented in this paper. It uses dynamic programming technique for global alignment and shortest distance measurements. The DPW algorithm can be used to enhance the pronunciation dictionaries of the well-known languages like English or to build pronunciation dictionaries to the less known sparse languages. The precision measurement experiments show 88.9% accuracy.
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately, the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
The document proposes a blockchain-based digital currency and streaming platform called GoMAA to address issues of piracy in the online music streaming industry. Key points:
- GoMAA would use a digital token on the iMediaStreams blockchain to enable secure dissemination and tracking of streamed content. Content owners could control access and track consumption of released content.
- Original media files would be converted to a Secure Portable Streaming (SPS) format, embedding watermarks and smart contract data to indicate ownership and enable validation on the blockchain.
- A browser plugin would provide wallets for fans to collect GoMAA tokens as rewards for consuming content, incentivizing participation and addressing royalty discrepancies by recording
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
This document discusses the importance of verb suffix mapping in discourse translation from English to Telugu. It explains that after anaphora resolution, the verbs must be changed to agree with the gender, number, and person features of the subject or anaphoric pronoun. Verbs in Telugu inflect based on these features, while verbs in English only inflect based on number and person. Several examples are provided that demonstrate how the Telugu verb changes based on whether the subject or pronoun is masculine, feminine, neuter, singular or plural. Proper verb suffix mapping is essential for generating natural and coherent translations while preserving the context and meaning of the original discourse.
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
In this paper, based on the definition of conformable fractional derivative, the functional
variable method (FVM) is proposed to seek the exact traveling wave solutions of two higherdimensional
space-time fractional KdV-type equations in mathematical physics, namely the
(3+1)-dimensional space–time fractional Zakharov-Kuznetsov (ZK) equation and the (2+1)-
dimensional space–time fractional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony
(GZK-BBM) equation. Some new solutions are procured and depicted. These solutions, which
contain kink-shaped, singular kink, bell-shaped soliton, singular soliton and periodic wave
solutions, have many potential applications in mathematical physics and engineering. The
simplicity and reliability of the proposed method is verified.
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
The document discusses automated penetration testing and provides an overview. It compares manual and automated penetration testing, noting that automated testing allows for faster, more standardized and repeatable tests but has limitations in developing new exploits. It also reviews some current automated penetration testing methodologies and tools, including those using HTTP/TCP/IP attacks, linking common scanning tools, a Python-based tool targeting databases, and one using POMDPs for multi-step penetration test planning under uncertainty. The document concludes that automated testing is more efficient than manual for known vulnerabilities but cannot replace manual testing for discovering new exploits.
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
Since the mid of 1990s, functional connectivity study using fMRI (fcMRI) has drawn increasing
attention of neuroscientists and computer scientists, since it opens a new window to explore
functional network of human brain with relatively high resolution. BOLD technique provides
almost accurate state of brain. Past researches prove that neuro diseases damage the brain
network interaction, protein- protein interaction and gene-gene interaction. A number of
neurological research paper also analyse the relationship among damaged part. By
computational method especially machine learning technique we can show such classifications.
In this paper we used OASIS fMRI dataset affected with Alzheimer’s disease and normal
patient’s dataset. After proper processing the fMRI data we use the processed data to form
classifier models using SVM (Support Vector Machine), KNN (K- nearest neighbour) & Naïve
Bayes. We also compare the accuracy of our proposed method with existing methods. In future,
we will other combinations of methods for better accuracy.
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
The document proposes a new validation method for fuzzy association rules based on three steps: (1) applying the EFAR-PN algorithm to extract a generic base of non-redundant fuzzy association rules using fuzzy formal concept analysis, (2) categorizing the extracted rules into groups, and (3) evaluating the relevance of the rules using structural equation modeling, specifically partial least squares. The method aims to address issues with existing fuzzy association rule extraction algorithms such as large numbers of extracted rules, redundancy, and difficulties with manual validation.
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
In many applications of data mining, class imbalance is noticed when examples in one class are
overrepresented. Traditional classifiers result in poor accuracy of the minority class due to the
class imbalance. Further, the presence of within class imbalance where classes are composed of
multiple sub-concepts with different number of examples also affect the performance of
classifier. In this paper, we propose an oversampling technique that handles between class and
within class imbalance simultaneously and also takes into consideration the generalization
ability in data space. The proposed method is based on two steps- performing Model Based
Clustering with respect to classes to identify the sub-concepts; and then computing the
separating hyperplane based on equal posterior probability between the classes. The proposed
method is tested on 10 publicly available data sets and the result shows that the proposed
method is statistically superior to other existing oversampling methods.
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
Data collection is an essential, but manpower intensive procedure in ecological research. An
algorithm was developed by the author which incorporated two important computer vision
techniques to automate data cataloging for butterfly measurements. Optical Character
Recognition is used for character recognition and Contour Detection is used for imageprocessing.
Proper pre-processing is first done on the images to improve accuracy. Although
there are limitations to Tesseract’s detection of certain fonts, overall, it can successfully identify
words of basic fonts. Contour detection is an advanced technique that can be utilized to
measure an image. Shapes and mathematical calculations are crucial in determining the precise
location of the points on which to draw the body and forewing lines of the butterfly. Overall,
92% accuracy were achieved by the program for the set of butterflies measured.
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
Smart cities utilize Internet of Things (IoT) devices and sensors to enhance the quality of the city
services including energy, transportation, health, and much more. They generate massive
volumes of structured and unstructured data on a daily basis. Also, social networks, such as
Twitter, Facebook, and Google+, are becoming a new source of real-time information in smart
cities. Social network users are acting as social sensors. These datasets so large and complex
are difficult to manage with conventional data management tools and methods. To become
valuable, this massive amount of data, known as 'big data,' needs to be processed and
comprehended to hold the promise of supporting a broad range of urban and smart cities
functions, including among others transportation, water, and energy consumption, pollution
surveillance, and smart city governance. In this work, we investigate how social media analytics
help to analyze smart city data collected from various social media sources, such as Twitter and
Facebook, to detect various events taking place in a smart city and identify the importance of
events and concerns of citizens regarding some events. A case scenario analyses the opinions of
users concerning the traffic in three largest cities in the UAE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
The anonymity of social networks makes it attractive for hate speech to mask their criminal
activities online posing a challenge to the world and in particular Ethiopia. With this everincreasing
volume of social media data, hate speech identification becomes a challenge in
aggravating conflict between citizens of nations. The high rate of production, has become
difficult to collect, store and analyze such big data using traditional detection methods. This
paper proposed the application of apache spark in hate speech detection to reduce the
challenges. Authors developed an apache spark based model to classify Amharic Facebook
posts and comments into hate and not hate. Authors employed Random forest and Naïve Bayes
for learning and Word2Vec and TF-IDF for feature selection. Tested by 10-fold crossvalidation,
the model based on word2vec embedding performed best with 79.83%accuracy. The
proposed method achieve a promising result with unique feature of spark for big data.
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
This article presents Part of Speech tagging for Nepali text using General Regression Neural
Network (GRNN). The corpus is divided into two parts viz. training and testing. The network is
trained and validated on both training and testing data. It is observed that 96.13% words are
correctly being tagged on training set whereas 74.38% words are tagged correctly on testing
data set using GRNN. The result is compared with the traditional Viterbi algorithm based on
Hidden Markov Model. Viterbi algorithm yields 97.2% and 40% classification accuracies on
training and testing data sets respectively. GRNN based POS Tagger is more consistent than the
traditional Viterbi decoding technique.
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
How to Manage Reception Report in Odoo 17Celine George
A business may deal with both sales and purchases occasionally. They buy things from vendors and then sell them to their customers. Such dealings can be confusing at times. Because multiple clients may inquire about the same product at the same time, after purchasing those products, customers must be assigned to them. Odoo has a tool called Reception Report that can be used to complete this assignment. By enabling this, a reception report comes automatically after confirming a receipt, from which we can assign products to orders.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
2. 306 Computer Science & Information Technology (CS & IT)
is need for them to save battery power in such a way that communication can be possible for
longer time. To improve network lifetime there are different methodologies used at different
layers of OSI model. Network layer is used for routing of packets from source to destination.
There are number of routing protocols defined in MANET, for example DSDV, AODV, DSR,
OLSR, ZRP etc. The main objective is to design routing protocol in such a way that it works
effectively in energy constrained applications. The main focus is on OLSR routing protocol
modification in network layer.
The paper is organized as follows. Section II explains different types of routing protocols. Section
III discusses the basics of OLSR protocol and study of related energy aware techniques. Section
IV discusses the proposed modification in OLSR. Section V represents the simulation details and
QoS parameters. Section VI discusses results obtained by Qualnet simulator. Finally section VII
concludes the paper with future work in section VIII.
2. CLASSIFICATION OF ROUTING PROTOCOL
In MANET, each node between source and destination acts as routers. The routing of data packets
from source to destination are controlled by different routing protocols. Different routing
protocols are classified as shown in Figure;
Figure 1.Classification of Routing Protocols
2.1. Proactive routing protocols
In proactive routing, each node has one or more tables that contain the latest information of the
routes to any node in the network. Each node maintain routing tables and respond to the changes
in the network topology by propagating updates throughout the network in order to maintain a
consistent view of the network. Many proactive routing protocols have been proposed, for e.g.
Destination Sequence Distance Vector (DSDV), Optimized Linked State Routing (OLSR) and so
on.
2.2. Reactive protocols
Unlike proactive routing protocols, the reactive routing protocols create routes once a node wants
to transmit data to a destination. The source node initiates route discovery process by flooding
route query within the network. When the destination is reached, route reply request will be sent
3. Computer Science & Information Technology (CS & IT) 307
back to the source. Once the route has been found, it is maintained until either destination
becomes inaccessible or the route is no longer desired then route discovery process will be
invoked again. Several reactive protocols have been proposed such as Dynamic Source Routing
protocol (DSR), Ad hoc On-demand Distance Vector (AODV), Temporary Ordered Routing
Algorithm (TORA), and so on.
2.3. Hybrid routing protocols
In such network, hybrid routing protocols, i.e. combining proactive and reactive routing
protocols, are used in order to take advantages on these two routing protocols where proactive
maintains route in a cluster and reactive maintains route between clusters. Several hybrids routing
protocols have been proposed such as Zone Routing Protocol (ZRP), Zone-based Hierarchical
Link State (ZHLS) and so on, but the most popular protocol is ZRP.
3. OLSR OVERVIEW AND RELATED WORK
OLSR [3] is proactive in nature, having routes immediately available in each node for all
destinations in the network. OLSR is an optimization of pure link state routing protocol like Open
Shortest Path First (OSPF) [4]. This optimization is related to concept of multipoint relay (MPR).
A multipoint relay reduces the size of control messages. The use of MPRs also minimizes
flooding of control traffic. Multipoint relays forward control messages, providing advantage of
reduction in number of retransmissions of broadcast control messages. OLSR contains two types
of control messages: neighborhood and topology messages, known as Hello messages and
Topology Control (TC) messages. OLSR provides two main functionalities: Neighbor Discovery
and Topology Dissemination. With the help of these two functionalities, each node computes
routes to all known destinations.
Figure 2.Selection of MPR and Broadcasting TC packets
3.1. Selection of Multipoint Relay (MPR) using HELLO messages
Each node periodically broadcasts Hello messages, containing list of neighbors known to node
and link status. The link status can be either symmetric or asymmetric, multipoint relay, or lost
link. The Hello messages are received by all one-hop neighbors and not forwarded. Hello
messages discover one-hop neighbors as well as its two-hop neighbors. Hello messages are
broadcast at regular interval (Hello_interval). The neighborhood and two hop neighborhood
information has holding time (Neighbor_hold_time), after which it is not valid. With the help of
this information node selects its own set of MPRs among one-hop neighbors. Multipoint relays
computed whenever there is change in one-hop neighborhood and two-hop neighborhood. MPR is
one-hop neighbors with symmetric link, such that all two-hop neighbors has symmetric link with
4. 308 Computer Science & Information Technology (CS & IT)
multipoint relays. Figure 2 shows selection of MPR node using HELLO packets. Node is selected
as MPR node when it has willingness high i.e. W_HIGH or default i.e. W_DEFAULT otherwise
rejected.
3.2. Significance of TC messages
Each node of the network maintains topological information about the network obtained with help
of TC messages. Each node selected as MPR, broadcasts TC message at regular interval
(TC_interval). The TC message originated from node which declares MPR selectors of that node.
If change occurs in MPR selector set, then TC message can be sent earlier than pre-specified
interval. The TC messages are sent to all nodes in the network by taking advantage of MPR nodes
to avoid number of retransmissions. Thus, a node is reachable directly or via its MPRs. The
topological information collected in each node has holding time (Top_hold_time), after which
information is not valid. Figure 2 shows broadcasting of TC message with the help of MPR
nodes.
3.3. Route Calculation
The neighbor information and the topology information are refreshed periodically, and they
enable each node to compute the routes to all known destinations. These routes are computed
with Dijkstra’s shortest path algorithm [5]. Hence, they are optimal with respect to the number of
hops. Moreover, for any route, any intermediate node on this route is a MPR of the next node.
The routing table is computed whenever there is a change in neighborhood or topology
information.
3.4. HELLO and TC packet format
Reserved Htime Willingness
Link Code Reserved Link Message size
Neighbor Interface Address
Neighbor Interface Address
Figure 3.OLSR HELLO Packet Format Figure 4.OLSR TC Packet Format
Figure 3 shows HELLO packet format for OLSR. The Reserved portion in HELLO packets is
used for further modification. Htime specifies time before transmission of next HELLO packet.
Willingness entry specifies node willingness to forward traffic. Link Code gives the information
about link between sender node and neighbor node. It represents status of neighbor node.
Neighbor interface address denotes address of interface of neighbor node. Link Message size
gives total length of link messege.
Figure 4 represents TC packet format for OLSR. Advertised Neighbor Sequence Number (ANSN)
which increments sequence number whenever there is change in neighbor set. Reserved field is
used for further modification in TC packets. Advertised Neighbor Main Address field contains
main address of neighbor node.
3.5. Survey of Energy Efficient Routing Schemes
There are various ways to save energy from physical layer to application layer. In network layer
energy saving can be possible by selecting energy efficient path for sending data from source to
destination. The surveys of different energy saving techniques are discussed as below;
ANSN Reserved
Advertised Neighbor Main Address
Advertised Neighbor Main Address
..............
5. Computer Science & Information Technology (CS & IT) 309
I. Stojmenovic and X. Lin [6] proposed localized power aware routing algorithms which are
devised on the assumption that each network node has accurate information about the location of
its neighbors and the destination node. Nodes exchange location information via control
messages.
Three algorithms are proposed in [6]:
• Power-efficient routing: Each node decides to forward packets that are intended for a
certain destination to a neighbor based on the minimum transmission power between this
sending node and its neighbors.
• Cost-efficient routing: The node chooses the neighbor to send to, if the destination is not
within reach, based on a cost function that can consist, for example, the sum of the cost of
sending node to this neighbor plus the estimated cost of the route from the neighbor up to
the destination. This latter part of the cost is assumed to be proportional to the number of
hops in between.
• Power-cost efficient routing algorithms: Uses a combination of the two above metrics, in
the form of either the product or the sum of these metrics.
C.K.Toh [7] explains MTPR (Minimum Total Transmission Power Routing) mechanism, where
route having minimum transmission power is selected. The information of total energy
consumption is provided along route using HELLO and TC packets in OLSR. Based on this
information route is selected for sending data to destination.
CMMBCR (Conditional Max Min Battery Capacity Routing) [18] mechanism considers both the
total transmission energy consumption of routes and the remaining power of nodes. When all
nodes in some possible routes have sufficient remaining battery capacity, i.e. above a threshold,
route with minimum total transmission power among the routes is chosen. Since less total power
is required to forward packets for each connection, the load for most of the nodes must be
reduced, and their by lifetime will be extended. But, if all routes have nodes with low battery
capacity i.e. below the defined threshold, a route including nodes with lowest battery capacity
must be avoided to extend the lifetime of these nodes.
Energy efficient technique for selection of MPR nodes is proposed by Saoucene Mahfoudh and
Pascale Minet [8] where node considers residual energy for selection of MPR. The node having
minimum residual energy is not selected as MPR. There are three policies are considered for
selection of MPR.
• E: considers only residual energy of node itself.
• M1E: considers weighted residual energy of node itself and 1-hop neighbors.
• M2E: M2E considers weighted residual energy of node, 1-hop and 2-hop neighbors.
Minimum Drain Rate (MDR) mechanism is proposed for selection of path having maximum
lifetime value in [9]. MDR mechanism calculates cost function which takes into account the
drain rate index and residual battery power. Maximum lifetime value of a given path is
determined by minimum cost value over the path. From the set routes, the route having highest
maximum lifetime is selected for transmission.
The J. H. Chang and L. Tassiulas [10] proposed two algorithms with the aim of extending the
network lifetime via optimizing the routing from an energy consumption perspective.
1. Flow augmentation (FA) algorithm: is based on creating a link cost function. This
function considers the following parameters: energy cost for unit flow over the link, the
initial energy and the remaining energy at the transmitting node. A good candidate for the
6. 310 Computer Science & Information Technology (CS & IT)
selected path should consume less energy and should avoid nodes with low remaining
energy.
2. Flow redirection (FR) algorithm: If we have multiple sources and destinations, then under
the optimal flow (i.e. minimum lifetime over all nodes is maximized) the minimum
lifetime of every path from the source to the destination is the same. The minimum
lifetime of this set of paths can be increased by redirecting an arbitrarily small amount of
flow to the paths whose lifetime is longer than these paths such that the minimum lifetime
of the latter path after the redirection is still longer than the system lifetime before the
redirection.
4. PROPOSED IDEA
In this section, the modification steps for OLSR protocol are discussed. The modified protocol is
named as EOLSR. The OLSR protocol is modified in two processes i.e. while selecting MPR
nodes and while calculating route for forwarding data.
4.1. MPR Selection
The existing OLSR consumes more energy in energy constrained applications which results in
less network lifetime. To improve network lifetime as well as energy efficiency OLSR is
modified by using two approaches as below;
1. By setting threshold for Residual Energy
2. By setting threshold for Energy Consumption
For MPR selection we have decided a threshold value, which is one third of initial energy for
both residual energy and energy consumption approach.
• If the residual energy of node is less than threshold value then node having LOW-MPR-
WILL while residual energy of node is greater than threshold value than node having
HIGH-MPR-WILL.
• If the energy consumed by node is less than threshold value then node having HIGH-
MPR-WILL while residual energy of node is greater than threshold value than node
having LOW-MPR-WILL.
4.2. New HELLO and TC packet format
Residual Energy Htime Willingness
Link
Code
Reserved Link message size
Neighbour Interface Address
Neighbour Interface Address
Energy
Consumption
Htime Willingness
LinkCode Reserved Link message size
Neighbour Interface Address
Neighbour Interface Address
Figure 5.EOLSR-RE HELLO Packet Format Figure 6.EOLSR-EC HELLO Packet Format
ANSN Residual Energy
Advertised Neighbour Main Address
Advertised Neighbour Main Address
..............
ANSN Energy Consumption
Advertised Neighbour Main Address
Advertised Neighbour Main Address
..............
Figure 7.EOLSR-RE TC Packet Format Figure 8.EOLSR-EC TC Packet Forma
7. Computer Science & Information Technology (CS & IT) 311
HELLO packets are used for selection of MPR nodes. For selection of MPR each node having,
• Highest residual energy
• Lowest energy consumption
There is need to update residual energy of each node at regular interval. For this purpose the
value of residual energy and energy consumed by node is included in HELLO packet as shown
in Figure 5 and Figure 6 respectively. The reserved part in OLSR HELLO packet format as
shown in Figure 3 is assigned to residual energy in EOLSR-RE and energy consumption in
EOLSR-EC. Each node sends HELLO packet with entry for current residual energy and
depending on threshold value set it selects MPR node.
The reserved part in TC packet as shown in Figure 4 is modified with entry for residual energy
and energy consumption of node as shown in Figure 7 and Figure 8 respectively. The TC
packets are forwarded to entire network with the help of MPR nodes. The TC packets are used
to disseminate topology information over entire network. The modified TC packet format
distributes residual energy of each node and energy consumed by each node over entire
network. After knowing topology information for each node in network the route calculation is
performed.
4.3. Flow Chart for Residual Energy and Energy Consumption Approach
Figure 9.Flow Chart for residual Energy and Energy Consumption Approach
8. 312 Computer Science & Information Technology (CS & IT)
5. SIMULATOR DETAILS AND QOS PARAMETERS
QualNet Simulator [11] is a set of tools for modelling large wired and wireless networks.
QualNet (formerly GloMoSim) is a commercial program for wired and wireless network
simulations by Scalable Network Technologies.
It consists of three layers:
• The simulation kernel (a discrete event scheduler) as basic layer.
• The model libraries as second layer.
• The top layer is defined by the QualNet Developer GUI.
It has different tools such as the Scenario Designer, Animator, or Analyzer. QualNet provides
comprehensive graphical environment allows one to create and visualize network scenarios, and
to analyze the simulation results in one single GUI. The simulation run is visualized in the tool
‘Animator’. During the simulation run, several outputs can be activated or deactivated in
Animator such as broadcast messages, successfully received packets (packet flow), dropped
packets. Output of the simulation runs are different output files containing different information.
The primary output file (.stat) contains statistical information. Depending on the simulation and
configuration, other files can be created.
5.1. Simulation Models
A simulation model consists of Energy Model, Battery Model, Traffic Model and Mobility
Model. The specifications for these models used in our experimentation are discussed as below;
5.1.1. Energy Model
The User-defined energy model [12] is a configurable model that allows the user to specify the
energy consumption parameters of the radio in different power modes. The total power required
for transmission, reception, idle (node is listening the medium) and sleep (node is not capable to
detect signals so communication is not possible) modes is given in Table.
Table 1. Power requirement for different modes
Power requirement for different modes (Supply
voltage 3V)
Power Values
Transmission Power 0.84 Watts
Reception Power 0.612 Watts
Idle Power 0.534 Watts
Sleep Power 0.042 Watts
5.1.2. Battery Model: Linear Model
Nodes in the mobile ad-hoc network are battery operated. Hence, battery models are useful tools
for such types of system design approach; because they enable analysis of the discharge
behaviour of the battery under different design choices for example power management
policies. We used Linear Battery Model for the experimentation.
5.1.3. Traffic Model
Constant Bit Rate (CBR) sources represent voice sources and ftp sources are the ones used for
file transfer applications. We focus on Constant Bit Rate (CBR).The packet size is limited to
512 bytes. The source-destination pairs are chosen randomly over the network. The source-
destination numbers are fixed (called connection number).
9. Computer Science & Information Technology (CS & IT) 313
5.1.4. Mobility Model
We used random way point mobility model where nodes in network moves randomly in any
direction with given speed.
5.2. Quality of Service (QoS) Parameters
5.2.1. Average End to End Delay
It is the average source-to-destination data packet delay including propagation and queuing
delay [13]. For a highly interactive application such as IP phone, end-to-end delays smaller than
150 ms are not perceived by human listeners. Lesser end-to-end delay implies better
performance.
5.2.2. Packet Delivery Fraction (PDF)
Ratio of number of packets successfully received by destination nodes to number of packets
sent by source nodes.PDF describes information about packet loss rate [14]. Higher value of
PDR for network indicates the better reliability of protocol.
5.2.3. Energy Consumed
Total energy consumed required to transmit all data packets to destination node. To achieve
better energy efficiency, energy consumed should be as low as possible [15]. The less energy
consumption by nodes extends the network lifetime i.e. nodes in the network can communicate
for longer period.
5.2.4. Control Overheads
The total number of routing packets transmitted for each delivered data packet [16]. Lesser
control overheads indicate that saving of energy in the network. Larger overheads utilise large
bandwidth which cause congestion in the network. Hence, control overheads should be less.
6. SIMULATION RESULTS AND PERFORMANCE ANALYSIS
6.1. Impact of Variation of Node Density and Node Speed
To analyze performance of EOLSR-RE and EOLSR-EC over OLSR, the numbers of nodes as
well as node speed are varied and compared with the help of QoS parameter discussed in section
5. Numbers of nodes are varied from 20 to 100 for fixed area to analyse performance of sparse
and dense network. Speed is varied to study the impact mobility of node on network. Number of
connections for simulations should be half as that of nodes present.
Table 2.Simulation Table
Parameters Variation of
Number of Nodes
Variation of Node
speed
Variation of
Number of
Connections
Area 870x870 870x870 870x870
Nodes 20,40,60,80,100 50 50
Node Speed 3m/s 1,3,5,8.10 m/s 3 m/s
Simulation Time 500 s 500 s 500 s
10. 314 Computer Science & Information Technology (CS & IT)
Traffic Type CBR CBR CBR
Traffic Sources 9,18,27,36,45 20 16,18,20,22,24
Packet Rate 2 packets/sec 2 packets/sec 2 packets/sec
Initial Power 30 mAHr 30 mAHr 30 mAHr
Routing Protocol EOLSR,OLSR EOLSR,OLSR EOLSR,OLSR
6.1.1. Average end to end delay
Figure 10: Impact of Variation of Number of Nodes and Node Speed on Average end to end delay
Figure10 depicts end to end delay for EOLSR-RE, OLSR and EOLSR-EC protocols for number
of nodes from 20 to 100 and node speed 1 to 10 m/s. It is clear that EOLSR-RE has shortest
delay than EOLR-EC and OLSR. On an average EOLSR-EC shows better performance than
OLSR after 80 nodes and for all speed. For sparse network delay is almost same for all three
protocols while for dense network EOLSR-RE shows shortest delay.
Table 3.Impact of variation of Number of Connections on Average end to end delay
We have varied number of connection from 16 (i.e. around 32 nodes). This is because the OLSR
has better performance in dense network [17].
As shown in Table 3, the average end to end delay increases with increase in number of
connections. On an average, there is 15% less delay in EOLSR-RE and 10% less delay in
EOLSR-EC. It is seen that for high traffic network delay has higher value in all three protocols.
No. of
Connection
Average end to end delay
EOLSR-
RE
OLSR
EOLSR-
EC
% Change in
EOLSR-RE
% Change in
EOLSR-EC
16 20.6159 22.2534 21.5053 -7.358 -3.361733
18 23.4997 26.8511 24.3007 -12.48 -9.498307
20 26.8916 32.0454 28.5996 -16.08 -10.75287
22 33.0379 38.0543 35.3379 -13.18 -7.138221
24 37.895 41.6945 40.7432 -9.11 -2.281596
11. Computer Science & Information Technology (CS & IT) 315
Note: In presented Tables, +ve sign shows higher value of EOLSR parameter as compared to
OLSR while –ve sign shows lesser value.
6.1.2. Packet Delivery Fraction (PDF)
Figure 11: Impact of Variation of Number of Nodes and Node Speed on Packet Delivery Fraction
The impact of variation of nodes and node speed on packet delivery is as shown in Figure 11.It
is seen that packet delivery is almost same over the entire node range and it shows decreasing
trend. For lower speed EOLSR-RE has better packet delivery than OLSR and EOLSR-EC while
for higher speed packet delivery is almost same for all three protocols. It is observed that PDF
falls with increasing node speed.
Table 4.Impact of variation of Number of Connections on Packet Delivery Fraction (PDF)
As shown in Table 4, packet delivery is above 90% in case of all three protocols which indicates
there is slight change in packet delivery with increase in number of connections.
No. of
Connection
Packet Delivery Fraction (PDF)
EOLSR-
RE
OLSR EOLSR-EC
% Change in
EOLSR-RE
% Change in
EOLSR-EC
16 89.375 91.2624 89.553 - 2.07 -1.873061
18 90.3888 91.1444 90.5323 -0.83 -0.671572
20 88.86 91.08 90.221 -2.43 -0.943127
22 87.909 91.5272 88.502 -3.95 -3.305247
24 85.675 89.125 87.993 -3.87 -1.270126
12. 316 Computer Science & Information Technology (CS & IT)
6.1.3. Energy Consumption
Figure 12: Impact of Variation of Number of Nodes and Node Speed on Energy Consumption
Figure 12 shows effect of node variation and speed variation on energy consumption. In case of
EOLSR-RE, energy consumption has lesser value than OLSR and EOLSR-EC which is almost
20% less than OLSR and 10% less than EOLSR-EC. It is seen that for three protocols there is
increasing trend of energy consumption for both cases number of nodes and node speed
variation.
Table 5.Impact of variation of number of connections on Energy Consumption
The energy consumption reduces by 20% in EOLSR-RE and 15% in EOLSR-EC as shown in
Table 5. It is seen that energy consumption increases with increase in number of connections.
No. of
Connection
Energy Consumption
EOLSR-
RE
OLSR EOLSR-EC
% Change in
EOLSR-RE
% Change in
EOLSR-EC
16 10.3874 10.5285 10.4421 -1.34 -0.82063
18 9.98939 12.5364 10.2235 -20.27 -18.44948
20 10.7527 13.9693 11.9932 -22.99 -14.14602
22 13.5147 15.7888 14.3235 -14.38 -9.280629
24 15.6768 17.9791 16.5433 -12.79 -7.985939
13. Computer Science & Information Technology (CS & IT) 317
6.1.4. Control Overheads
Figure 13: Impact of Variation of Number of Nodes and Node Speed on Control Overheads
The control overheads for EOLSR-RE are 50% less than OLSR and 25% less than EOLSR-EC
as shown in Figure 13. The control overheads are increases with increase in number of nodes
while remains constant for increase in node speed.
Table 6.Impact of variation of number of connections on Control Overheads
There is almost 50% reduction in control overheads in EOLSR-RE and 35% reduction in
EOLSR-EC as shown in Table 6. Control overheads remains constant with increase in number
of connections which indicates there is less impact of number of connections on control
overheads.
7. CONCLUSION
In this paper, we compared EOLSR-RE and EOLSR-EC over OLSR with the help of
performance metrics such as packet delivery fraction, average end to end delay, total energy
consumption, control overheads. Simulations have performed for different network conditions
to compare performance of EOLSR-RE and EOLSR-EC over OLSR.
Experimental results demonstrate that the proposed EOLSR-RE protocol results in a 20 percent
and EOLSR-EC protocol results in 10 percent of energy saving and this saving is obtained
starting from the transmission of the first packet. Subsequent packets transmitted using the
No. of
Connection
Control Overheads
EOLSR-
RE
OLSR
EOLSR-
EC
% Change in
EOLSR-RE
% Change
in EOLSR-
EC
16 7305.6 15520.38 10000.21 -52.92 -35.56723
18 7364.44 15978.4 10124.42 -53.91 -36.63683
20 7228.82 15922.2 10342.23 -54.59 -35.04522
22 7307.78 16006.14 10355.32 -54.34 -35.30408
24 7352 16345.9 10234.21 -55.02 -37.38974
14. 318 Computer Science & Information Technology (CS & IT)
EOLSR-RE and EOLSR-EC protocol will result in further energy savings. From this discussion,
we can say that EOLSR-RE is best protocol in terms of energy efficiency.
From experimental results, we can say that packet delivery is inversely proportional to node
density, node speed. Average end to end delay is less sensitive to node speed while highly
sensitive to node density. The average energy consumption increases with node density, node
speed. Control overheads are directly proportional to node density while it remains constant for
variation of node speed. From this discussion we can conclude that EOLSR-RE is best for
moderately dense (in area 870x870) network having low speed (1 m/s to 5 m/s), low packet rate
(2 packets/second) and high traffic i.e. large number of connections.
From results it is observed that we have successfully modified OLSR with 15% less end to end
delay, 50% less control overheads and 20% less energy consumption. EOLSR-RE is suitable
choice in military applications, disaster recovery areas and remote areas such as forests where
energy saving is important need.
8. FUTURE WORK
The work can be extended to test EOLSR-RE and EOLSR-EC for higher packet rate and
different network area by keeping other network parameters constant. Finally, the best scenario
can be suggested where all network QoS parameters gives best results.
REFERENCES
[1] Imrich Chlamtac, Marco Conti, Jennifer J.-N. Liu, (2003) “Mobile ad hoc networking: imperatives
and challenges”, Ad-hoc Networks, Elsevier, pp. 13-64.
[2] Md. Anisur Rahman, Md. Shohidul Islam, Alex Talevski, (2009) “Performance Measurement of
Various Routing Protocols in Ad-hoc Network”, Proceedings of the International MultiConference
of Engineers and Computer Scientists, Hong Kong, Vol I.
[3] C. Adjih, A. Laouiti, P. Minet, P. Muhlethaler, A. Qayyum, L. Viennot, (2010) “The Optimised
Routing Protocol for Mobile Ad-hoc Networks: protocol specification”, INRIA-00471712, version
1 - 8.
[4] Aman Shaikh, Mukul Goyal, Albert Greenberg, Raju Rajan, and K.K. Ramakrishnan, (2002)“An
OSPF Topology Server:Design and Evaluation”, IEEE Journal on Selected Areas in
communications, vol. 20, no. 4, pp.746-755.
[5] Thomas Kunz, (2008) “Energy-Efficient Variations of OLSR”, IEEE Transactions, pp. 517-522.
[6] I. Stojmenovic and X. Lin, (2001) “Power-aware localized routing in wireless networks”, IEEE
Transactions on Parallel and Distributed Systems, Vol. 12(11), pp.1122-1133.
[7] C.-K. Toh, (2001) “Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in
Wireless Ad Hoc Networks”, IEEE communication magazine, pp. 138-147.
[8] Saoucene Mahfoudh, Pascale Minet, (2008) “An energy efficient routing based on OLSR in wireless
ad hoc and sensor networks” , 22nd International Conference on Advanced Information Networking
and Applications Workshops, IEEE computer Society, pp. 1253-1259.
[9] D.Kim, J.J.Garcia-Luna-Aceves, K.Obraczka, J.Cano and P.Manzoni, (2001) “Power-Aware
Routing Based on The Energy Drain Rate for Mobile Ad-Hoc Networks”, Proceedings of the IEEE
International Conference on Computer Communication and Networks.
[10] J.-H Chang and L. Tassiulas, (2000) “Energy Conserving Routing in Wireless Ad-hoc Networks”, in
Proceedings of INFOCOM, Tel Aviv, Israel, pp. 22-31.
[11] Md. Arafatur Rahman, Farhat Anwar, Jannatul Naeem, Md. Sharif Minhazul Abedin, (2010) “A
Simulation Based Performance Comparison of Routing Protocol on Mobile Ad-hoc Network”,
International Conference on Computer and Communication Engineering, Kuala Lumpur, Malaysia.
15. Computer Science & Information Technology (CS & IT) 319
[12] QualNet details :http://www.scalablenetworks.com.
[13] David Oliver Jorg, (2003) “Performance Comparison Of MANET Routing Protocols In Different
Network Sizes”, Computer Science Project, Institute of Computer Science and Applied Mathematics
Computer Networks and Distributed Systems (RVS), University of Berne, Switzerland.
[14] Humaira Nishat, Sake Pothalaiah, Dr. D.Srinivasa Rao, (2011) “Performance Evaluation of Routing
Protocols in MANETS” International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No.
2, pp. 67-75.
[15] Alemneh Adane, (2010) “Active Communication Energy Efficient Routing Protocol Of Mobile Ad
Hoc Network (MANETS)” A thesis submitted to the school of Graduate studies of Addis Ababa
University in partial fulfillment of the requirements for the degree of Masters of Science in
Electrical and Computer Engineering.
[16] Wenjing Yang, Xinyu Yang, Guozheng Liu, and Chiyong Dong, (2011) “A Bandwidth Aware
Multi-path Routing Protocol in Mobile Ad Hoc Networks”, Journal of Computational Information
Systems, pp. 685-696.
[17] Zhan Huawei, Zhou Yun, (2008) “Comparison and Analysis AODV and OLSR Routing
Protocols in Ad Hoc Network”, IEEE Transactions, pp. 1-4.
[18] Marco Fotino, Salvatore Marano (2008), “EE-OLSR:Energy Efficient OLSR Routing Protocol for
Mobile Adhoc Networks”, IEEE transactions, pp.1-7.
Authors
1. Mayur Tokekar received the B.E. degree in 2008 from Dr.Babasaheb Ambedkar Mararhwada
University. He is currently a M.Tech student at College of Engineering, Pune. He is pursuing his M.Tech
in the field of Digital Systems. His areas of interests are wireless communication, embedded systems and
image processing.
2. Radhika D. Joshi received the BE degree in 1993 from Pune University and ME Degree from Pune
University in 2002. She is currently a PhD student at the University of Pune. She is pursuing research in
the field of Wireless Mobile Ad hoc networks energy management issues. At present she is serving as
Assistant Professor at Electronics and Telecommunication Engineering department of College of
Engineering Pune, which is an autonomous institute of Government of Maharashtra. Her areas of interests
are wireless communication, signal processing and electronic devices and circuits. She has received
grants for two research proposals from two funding agencies recently. She has published several papers in
journals and international conferences.