SlideShare a Scribd company logo
1 of 10
Download to read offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 5, Ver. II (Sep - Oct .2015), PP 40-49
www.iosrjournals.org
DOI: 10.9790/2834-10524049 www.iosrjournals.org 40 | Page
Integration of Internet with Mobile Ad-Hoc Network: By
Extended AODV
Mrs. Nidhi Jain
(Asst. Professor of ECE Department)
Abstract: Mobile Ad-hoc Networks are autonomously self-organized networks without infrastructure support.
To provide communication within the network a routing protocol is used to discover routes between nodes. The
main aim of the routing protocol is to have an efficient route establishment between a pair of nodes, so that
messages can be delivered in a timely manner. Routing in the MANETs is a challenging task which has led to
development of many different routing protocols for MANETs. The recent years have witnessed a tremendous
growth in the number of mobile internet users and the need for mobility support is indispensable for seamless
internet connectivity. Mobile IP is a mobility support protocol that supports roaming across multiple Access
Points without having to re-establish the end to end connection. After investigate the several challenges that
Mobile IP faces it would turn out to be the protocol for supporting mobility in the future is known as Extended
AODV or enhanced AODV or AODV+. This paper has been made to implement, the integration of internet with
mobile ad-hoc network, using routing protocol extended AODV for two performance matrices Packet Delivery
Ratio and End to End Delay. Simulation tool is Network Simulator-2. To provide the connectivity between wired
and wireless network, we made the scenario in this way that it provide large Packet Delivery Ratio and less
average End to End delay.
I. Introduction
MANET (Mobile Ad-Hoc Network) is Infrastructure less, Dynamic in nature wireless network in
which all the devices are independent to move from one place to another. These networks are extremely flexible,
self configurable, and do not require the deployment of any infrastructure for communication among mobile
devices. MANET is a multi-hop wireless network which forms a temporary infrastructure less network and
communicates with each other and support decentralized administration. In MANET each node (Device) can
move independently thus each node acts as a Router and Forward packets. Because of High mobility of nodes,
network topology changes frequently. That’s why Routing in Ad-Hoc network becomes a more Challenging
task. Therefore routing in MANET becomes recent research area. Every node has its own transmission range
and every node acts as a router used for data transmission of all nodes with data of itself. The principle behind
ad hoc networking is multi-hop relaying
1.1 Cellular and Ad Hoc Wireless Networks
Fig 1.1 shows the major Difference between ad hoc and cellular networks. In this figure one side is
cellular network in which the mobile nodes communicate to each other via. base station. On the other side is ad
hoc wireless network in which the mobile nodes can communicate to each other only by multi hop relying not
by the base station. Because of their self creating, self-organizing and self administering capabilities, ad hoc
networks can be rapidly deployed with minimum user intervention. There is no need for detailed planning of
base station installation or wiring. Also, ad hoc networks do not need to operate in a stand-alone fashion, but can
be attached to the Internet, thereby integrating many different devices and making their services available to
other users
Fig 1.1 Cellular and Ad hoc Network
Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV
DOI: 10.9790/2834-10524049 www.iosrjournals.org 41 | Page
1.2Applications of Ad Hoc Wireless Networks
The major applications of Ad Hoc wireless networks include
1.2.1Military Applications
Ad hoc wireless networks can be very useful in establishing communication among a group of soldiers
for tactical operations. Setting up a fixed infrastructure for communication among a group of soldiers in enemy
territories or in inhospitable terrains may not be possible. In such environments, ad hoc wireless networks
provide the required communication mechanism quickly. Another application in this area can be the
coordination of military objects moving at high speeds such as fleets of airplanes or warships.
1.2.2 Emergency Applications
Ad Hoc wireless networks are very useful in emergency operations such as search and rescue, crowd
control, and commando operations. The major factors that favor ad hoc wireless networks for such tasks are self
configuration of the system with minimal overhead, independent of fixed or centralized infrastructure, the nature
of the terrain of such applications, the freedom and flexibility of mobility, and the unavailability of conventional
infrastructure based communication facilities are destroyed due to a war or due to natural climates such as
earthquakes, immediate deployment of ad-hoc wireless networks would be a good solution for coordinating
rescue activities.
1.2.3Wireless Sensor Network Applications
Wireless Sensor Networks are a special category of ad hoc networks that are used to provide a wireless
communication infrastructure among the sensors deployed in a specific application domain. A sensor network is
a collection of a large number of sensor nodes that are deployed in a particular region.
1.3 Issues in Ad hoc Wireless Networks
The major issues and challenges that are need to be considered when an ad hoc wireless system is to be
designed. The major issues that affect the design, deployment, and performance of an ad hoc wireless system are
as follows.
1.3.1 Media Access Scheme
The major issues to be considered in designing a MAC protocol for ad hoc wireless networks are as
follows:
Distributed operation: The Ad Hoc wireless networks need to operate in environments where no centralized
coordination is possible.
Synchronization: The MAC protocol design should take into account the requirement of time
synchronization. Synchronization is required in TDMA-based systems.
Hidden terminals: Hidden terminals are nodes hidden from a sender of a data transmission session, but are
reachable to the receiver of the session. The hidden terminal can cause collisions at the receiver node. The
presence of hidden terminals can significantly reduce the throughput of a MAC protocol used in Ad Hoc
network
Exposed terminals: Exposed Terminals, the nodes that are in the transmission range of the sender of an
outgoing session, are prevented from making a transmission. In order to improve the efficiency of the MAC
protocol, the exposed nodes should be allowed to transmit in a controlled fashion without causing collision to
the on-going data transfer.
1.3.2 Routing
The major challenges that a routing protocol faces are as follows.
Mobility: The mobility of nodes results in frequent path breaks, packet collisions, transient’s loops, stale routing
information, and difficulty in resource reservation. A good routing protocol should be able to efficiently solve
all the issues.
Bandwidth constraint: Channel is shared by all nodes in the broadcast region, the bandwidth available
per wireless link depends on the number of nodes and the traffic they handle.
1.3.3 Security
The major security threats that exist in ad hoc wireless network are as follows.
Denial of Service: The attacks effected by making the network resource unavailable for service to other
nodes either by consuming the bandwidth or by overloading the system is known as denial of service.
Resource consumption: The scarce availability of resources in ad hoc wireless network makes it an
easy target for internal attacks, particularly aiming at consuming resources available in the network.
Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV
DOI: 10.9790/2834-10524049 www.iosrjournals.org 42 | Page
II. Routing Protocols
2.1 Overview of routing protocols
Compared to wired networks, mobile networks have unique characteristics. In mobile networks, node
mobility may cause frequent network topology changes, which are rare in wired networks. Because of the
importance of routing protocols in dynamic multi hop networks, a lot of mobile ad hoc network routing
protocols have been pro-posed in the last few years. The broadcast nature of the wireless medium introduces the
hidden terminal and exposed terminal problems. Additionally, mobile nodes have restricted power, computing,
and bandwidth resources and require effective routing schemes. As promising network types in future mobile
applications, mobile ad hoc networks are attracting more and more researchers.
2.2 Classification of Routing Protocols
The existing routing protocols in MANETs can be classified into three categories.
Table Driven or Proactive
Source on Demand
Hybrid.
2.2.1 Table Driven or Proactive Routing Protocol
Using a proactive routing protocol, nodes in a mobile ad hoc network continuously evaluate routes to
all reachable nodes and attempt to maintain consistent, up-to-date routing information. Therefore, a source node
can get a routing path immediately if it needs one. In proactive routing protocols, all nodes need to maintain a
consistent view of the network topology. When a network topology change occurs, respective updates must be
propagated throughout the network to notify the change. Most proactive routing protocols proposed for mobile
ad hoc networks have inherited properties from algorithms used in wired networks. In this category DSDV
routing protocol is used.
DSDV (Destination Sequenced Distance Vector Routing Protocol)
DSDV is Destination Based Routing protocol and it is Proactive (Table Driven). The characteristics of
DSDV are as follows. Each node maintains routing information for all known destinations and Routing
information must be updated periodically. It makes immediate route advertisement on significant changes in
routing.
2.2.2 Source on Demand
Source on demand routing protocol is also known as reactive routing protocols for mobile ad hoc
networks. In a reactive routing protocol, routing paths are searched only when needed. A route discovery
operation invokes a route determination procedure. The discovery procedure terminates when either a route has
been found or no route is available after examination for all route permutations. In a mobile ad hoc network,
active routes may be disconnected due to node mobility. Therefore, route maintenance is an important operation
of reactive routing protocols. Compared to the proactive routing protocols for mobile ad hoc networks, less
control overhead is a distinct advantage of the reactive routing protocols. Thus, reactive routing protocols have
better scalability than proactive routing protocols in mobile ad hoc networks. Ad Hoc On-Demand Distance
Vector (AODV) Routing Protocol and the Dynamic Source Routing (DSR) Protocol are examples of reactive
routing protocols for mobile ad hoc networks.
AODV (Ad Hoc On-Demand Distance Vector)
Reactive protocols discover routes only as needed. When a node wishes to communicate with another
node, it checks with its existing information for a valid route to the destination. If one exists, the node uses that
route for communication with the destination node. If not, the source node initiates a route request procedure, to
which either the destination node or one of the intermediate nodes sends a reply back to the source node with a
valid route.
Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV
DOI: 10.9790/2834-10524049 www.iosrjournals.org 43 | Page
AODV Route Requests ( RREQs)
Fig. 2.1 AODV route request
Each neighboring node will pass this RREQ message to other its neighboring node until the destination
will find.
Route Reply (RREPs)
Fig. 2.2 AODV route reply
If a node has some data to send, it will broadcast a route request message to its neighbors. Intermediate
nodes received the RREQ message and store the address of the source node in the routing table so that
if duplicate RREQ is received in future may be discarded. If any node has a current route to the destination lies
send a response to the source in the form of RREP message. The node may be the destination node.During the
reverse movement of RREP, nodes in this path will store the forward route entries for setting up of forward
route to the destination.
III. Extended Aodv
The interworking between mobile ad hoc networks and the Internet is described in this section.
3.1 Motivation
Although an autonomous, stand-alone mobile ad hoc network is useful in many cases, a mobile ad hoc
network connected to the Internet is much more desirable. So far, most of the research concerning mobile ad hoc
networking has been done on protocols for autonomous mobile ad hoc networks. To achieve this network
interconnection, gateways that understand the protocols of both the mobile ad hoc network stack and the TCP/IP
suite are needed. All communication between a mobile ad hoc network and the Internet must pass through the
gateways. The Internet draft “Global Connectivity for IPv6 Mobile Ad Hoc Networks” describes how to provide
Internet connectivity to mobile ad hoc networks. In particular, it explains how a mobile node and a gateway
should operate. Further, it proposes and illustrates how to apply a method for discovering gateways. In the case
for reactive routing protocols, the idea is to extend the route discovery messaging, so that it can be used for
discovering not only mobile nodes but also gateways
3.2 The Extended Route Request
The extended RREQ message contains exactly the same fields with the same functions as the ordinary
RREQ message, except for a flag. This flag is called Internet-Global Address Resolution Flag and is referred to
as the I-flag. Hence, the RREQ message extended with the I-flag is referred to as the RREQ_I message
throughout this text.
Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV
DOI: 10.9790/2834-10524049 www.iosrjournals.org 44 | Page
Frame Format of Extended RREQ_I
TABLE 3.1 Frame Format of Extended RREQ_I
Flag I(Internet Global Address Resolution Flag)
RREQ ID
Destination IP address
Destination sequence no.
Originator IP Address
Originator sequence no.
3.2 The Extended Route Reply
The extended RREP message contains exactly the same fields with the same functions as the ordinary
RREP message, except for a flag. This flag is the same flag that has extended the RREQ message to the
RREQ_I message, namely the Internet-Global Ad-dress Resolution Flag (or the I-flag). Hence, the RREP
message extended with the I-flag is referred to as the RREP_I message throughout this text.
Frame Format of Extended RREP_I
TABLE 3.1 Frame Format of Extended RREP_I
Flag I(Internet Global Address Resolution Flag)
Destination IP address
Destination sequence no.
Originator IP Address
Life Time
IV. Network Simulator-2
Network Simulator (NS) is an object-oriented, discrete event simulator for networking research. NS
provides substantial support for simulation of TCP , routing and multicast protocols over wired and wireless
networks. The simulator is a result of an on-going effort of research and development. Even though there is a
considerable confidence in NS, it is not a polished and finished product yet and bugs are being discovered and
corrected continuously .NS is written in C++, with an OTcl interpreter as a command and configuration
interface. The C++ part, which is fast to run but slower to change, is used for detailed protocol implementation.
The OTcl part, on the other hand, which runs much slower but can be changed very quickly, is used for
simulation configuration. One of the advantages of this split-language programming approach is that it allows
for fast generation of large scenarios. To simply use the simulator, it is sufficient to know OTcl.
Basic Architecture of NS
NS2 consists of two key languages: C++ and Object oriented Tool Command Language (OTcl). While
the C++ defines the internal mechanism (i.e. a backend) of the simulation objects, the OTcl sets up simulation
by assembling and configuring the objects as well as scheduling discrete events.
Fig. 3.1NS-2 structure
Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV
DOI: 10.9790/2834-10524049 www.iosrjournals.org 45 | Page
V. Simulation
5.1 Internet access for wired-cum-wireless Network using ADOV+
To provide connectivity between these two environments we have a concept of extended AODV.
Extended AODV is a solution to provide connectivity for mobile nodes if any node move from one type of
network to another network.
Simulation Setup: This section describes the simulation scenario, Simulation model to provide the
connectivity between MANET and wired network with the help of Mobile IP concept.
Simulation Scenario: The simulation is done under NS 2. The basic configuration is that in a
1000mt*1000mt Square area with variable no. of mobile nodes. The traffic Sources are CBR (Constant Bit
Rate), 512 byte as data packets. The maximum speed of mobile nodes is 20mt/sec and simulation time is
250Sec. To use CBR is for a fair comparison purpose, since bit rate vary will make the data packets traffic load
unpredictable, which situation we do not want it happen. Transmission range is 250mt. and routing protocol is
Extended AODV.
In this simulation we have Two Domain
1. Wired domain( fixed network)
2. Wireless Domain( MANET )
In wireless domain Node 1 is Gateway node(G)
Scenario 1 Data travel from MH (mobile host node 2) to Wired node (W) via Gateway
Scenario 2 Data travel from MH to W via node 3 e.g. (1 hop)
Fig. 5.2 data travel from wireless to wired node via 1 hop
Scenario 3 Data travel from MH to W via Gateway, MH, node no. 3 and 4 (hop 2)
Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV
DOI: 10.9790/2834-10524049 www.iosrjournals.org 46 | Page
Fig. 5.3 data travel from wireless to wired node via 2 hop
Scenario 4. Data travel from MH to W via Gateway, MH, node no. 3,4,5(hop 3)
Fig. 5.4 data travel from wireless to wired node via 3 hop
Scenario 5 Data travel from MH to W via Gateway when MH moves from one network to another network.
Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV
DOI: 10.9790/2834-10524049 www.iosrjournals.org 47 | Page
Fig. 5.5 data travel from wireless to wired node via Gateway 1 and Gateway 2
5.2 Simulation Parameters
TABLE 5.1Simulation Parameters
Parameters Value
Simulator NS-2
Routing Protocol Extended AODV
MAC Layer 802.11 IEEE
Simulation Time 60 Secs
Simulation Area 1000m x1000m
Transmission Range 250m
Traffic Type CBR
Data Payload 512bytes/packets
Speed of Node 20m/s
5.3 Performance Evaluation Metrics
Packet Delivery Ratio-The ratio of the data packets delivered to the destinations to those
generated by the CBR sources. It is the fraction of packets sent by the application that are received by the
receivers.
End-to-End Delay – End-to-End delay indicates how long it took for a packet to travel from the source
to the application layer of the destination i.e. the total time taken by each packet to reach the destination.
5.4 Simulation Results:
Table 5.2 No. of Hopes, PDR and E2E delay
No. of Hopes PDR(%) Average End to End Delay
0 50% 0.00759633
1 49.623 0.0244597
2 48.990 0.0244603
3 49.897 0.0244723
4 49.7976 0.0270019
5 49.5253 0.0291146
This simulation result shows that if we increase the no. of hopes then PDR decrease and E2E delay
increase. In this project we are trying to reduce the E2E delay and slowly reduce PDR. That means is nearly
constant and E2E delay also has low variation.
Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV
DOI: 10.9790/2834-10524049 www.iosrjournals.org 48 | Page
Fig. 5.6 Packet Delivery Ratio Vs No. of Hopes
Fig 5.6 shows that if we increase the no. of hopes then PDR will vary either increase or decrease
depend on the position defined of the mobile nodes.
Fig. 5.7 End to End Delay Vs No. of Hopes
Fig 5.7 shows that if No. of Hopes increases then End to End Delay also increases.
VI. Conclusion
A fixed infrastructure network and MANET can be combined to make them work together in order to
set up a multi hop path between MANET nodes and fixed infrastructure base stations, and allow MANET to
obtain internet connectivity.If we increase the no. of hopes then the PDR decreases with respect to multi hop
communication but if we arrange the mobile nodes in proper distance then we can maintain the PDR. If we
increase the no of hopes end-to-end delay increases due to multi hop takes time.
References
[1]. Khaleel Ur Rahman Khan, Rafi U Zaman, A Venugopal Reddy. “A Hierarchical Approach of Integrating Mobile Ad Hoc Network
and the Internet” 2008 IEEE.
[2]. Fekri M. Abduljalil and Shrikant K. Bodhe “A survey of integrating IP mobility protocols and mobile adhoc network” IEEE
Communications Surveys & Tutorials, 2007. www.comsoc.org/pubs/surveys
[3]. Jonsson Fredrik Alriksson, Tonny Larsson, Johansson, Gerald Q. magurie Jr. “MIPMANET : mobile IP for Mobile ad hoc network”
IEEE 2000
[4]. Harpreet Kaur Sandhu Roopali Garg, “Evaluation of routing protocols in the integrated MANET internet scenario” International
Journal Of Advances In Computing And Information Technology. April 2012
[5]. Pravin Ghosekar, Girish Katkar, Dr. Pradip Ghorpade ”Mobile Ad Hoc Networking: Imperatives and Challenges” IJCA Special
Issue on “Mobile Ad-hoc Networks” MANETs, 2010
[6]. G. Jose Moses, Prof.P.Suresh Varma, N.Supriya, D. Sunil Kumar “A Simulation Based Study of AODV, DSR, DSDV Routing
Protocols in MANET Using NS-2” March 2012 International Journal of Advanced Research in Computer Science and Software
Engineering.
Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV
DOI: 10.9790/2834-10524049 www.iosrjournals.org 49 | Page
[7]. Josh Broch David A. Maltz David B. Johnson “Supporting Hierarchy and Heterogeneous Interfaces in Multi-Hop Wireless Ad H
Networks” Proceedings of the Workshop on Mobile Computing, June 1999. IEEE.
[8]. Charles Perkins “Mobile IP” originally published in IEEE May 1997.
Tutorials
[9]. The ns Manual (formerly ns Notes and Documentation) The VINT Project.
[10]. Marc Greis tutorials for Network Simulator 2.
[11]. NS for Begnieers. Eitan Altman.

More Related Content

What's hot

Text compression
Text compressionText compression
Text compressionkrishnagd22
 
To mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANETTo mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANETIJERA Editor
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architectureSwapnali Pawar
 
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
A Secure QOS Distributed Routing Protocol for Hybrid Wireless NetworksA Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networksiosrjce
 
MobiMESH: Introduction to Wireless MESH Networks
MobiMESH: Introduction to Wireless MESH NetworksMobiMESH: Introduction to Wireless MESH Networks
MobiMESH: Introduction to Wireless MESH Networksacapone
 
Mobile Adhoc Network (MANET) Routing Protocols Analytical Study
Mobile Adhoc Network (MANET) Routing Protocols Analytical StudyMobile Adhoc Network (MANET) Routing Protocols Analytical Study
Mobile Adhoc Network (MANET) Routing Protocols Analytical StudyIOSR Journals
 
Vikash file full_final
Vikash file full_finalVikash file full_final
Vikash file full_finalRahul Ranjan
 
Scalable ofdma3 802.16e
Scalable ofdma3 802.16eScalable ofdma3 802.16e
Scalable ofdma3 802.16eSimona Halunga
 
SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Archi...
SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Archi...SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Archi...
SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Archi...CSCJournals
 
Mobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETMobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETtelecomsutra
 

What's hot (16)

Text compression
Text compressionText compression
Text compression
 
Unit 6
Unit 6Unit 6
Unit 6
 
To mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANETTo mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANET
 
AD-HOC NETWORK
AD-HOC NETWORKAD-HOC NETWORK
AD-HOC NETWORK
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architecture
 
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
A Secure QOS Distributed Routing Protocol for Hybrid Wireless NetworksA Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
 
Unit8 tgb
Unit8 tgbUnit8 tgb
Unit8 tgb
 
MobiMESH: Introduction to Wireless MESH Networks
MobiMESH: Introduction to Wireless MESH NetworksMobiMESH: Introduction to Wireless MESH Networks
MobiMESH: Introduction to Wireless MESH Networks
 
Mobile Adhoc Network (MANET) Routing Protocols Analytical Study
Mobile Adhoc Network (MANET) Routing Protocols Analytical StudyMobile Adhoc Network (MANET) Routing Protocols Analytical Study
Mobile Adhoc Network (MANET) Routing Protocols Analytical Study
 
MANET
MANETMANET
MANET
 
Vikash file full_final
Vikash file full_finalVikash file full_final
Vikash file full_final
 
Scalable ofdma3 802.16e
Scalable ofdma3 802.16eScalable ofdma3 802.16e
Scalable ofdma3 802.16e
 
SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Archi...
SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Archi...SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Archi...
SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Archi...
 
Manet
ManetManet
Manet
 
Mobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETMobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNET
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
 

Viewers also liked

Modelling of Permanent Deformation on Flexible Pavement Using Accelerated Pav...
Modelling of Permanent Deformation on Flexible Pavement Using Accelerated Pav...Modelling of Permanent Deformation on Flexible Pavement Using Accelerated Pav...
Modelling of Permanent Deformation on Flexible Pavement Using Accelerated Pav...IOSR Journals
 
CAD based modeling of flywheel motor with multiple operator
CAD based modeling of flywheel motor with multiple operatorCAD based modeling of flywheel motor with multiple operator
CAD based modeling of flywheel motor with multiple operatorIOSR Journals
 
Thermal conductivity Characterization of Bamboo fiber reinforced in Epoxy Resin
Thermal conductivity Characterization of Bamboo fiber reinforced in Epoxy ResinThermal conductivity Characterization of Bamboo fiber reinforced in Epoxy Resin
Thermal conductivity Characterization of Bamboo fiber reinforced in Epoxy ResinIOSR Journals
 
Design of MEMS capacitive accelerometer with different perforated proof- mass...
Design of MEMS capacitive accelerometer with different perforated proof- mass...Design of MEMS capacitive accelerometer with different perforated proof- mass...
Design of MEMS capacitive accelerometer with different perforated proof- mass...IOSR Journals
 

Viewers also liked (20)

G010525868
G010525868G010525868
G010525868
 
Modelling of Permanent Deformation on Flexible Pavement Using Accelerated Pav...
Modelling of Permanent Deformation on Flexible Pavement Using Accelerated Pav...Modelling of Permanent Deformation on Flexible Pavement Using Accelerated Pav...
Modelling of Permanent Deformation on Flexible Pavement Using Accelerated Pav...
 
M010518197
M010518197M010518197
M010518197
 
I010125361
I010125361I010125361
I010125361
 
E010213039
E010213039E010213039
E010213039
 
J010116069
J010116069J010116069
J010116069
 
CAD based modeling of flywheel motor with multiple operator
CAD based modeling of flywheel motor with multiple operatorCAD based modeling of flywheel motor with multiple operator
CAD based modeling of flywheel motor with multiple operator
 
Thermal conductivity Characterization of Bamboo fiber reinforced in Epoxy Resin
Thermal conductivity Characterization of Bamboo fiber reinforced in Epoxy ResinThermal conductivity Characterization of Bamboo fiber reinforced in Epoxy Resin
Thermal conductivity Characterization of Bamboo fiber reinforced in Epoxy Resin
 
H1302034856
H1302034856H1302034856
H1302034856
 
Design of MEMS capacitive accelerometer with different perforated proof- mass...
Design of MEMS capacitive accelerometer with different perforated proof- mass...Design of MEMS capacitive accelerometer with different perforated proof- mass...
Design of MEMS capacitive accelerometer with different perforated proof- mass...
 
K017135461
K017135461K017135461
K017135461
 
J010234960
J010234960J010234960
J010234960
 
B1102021418
B1102021418B1102021418
B1102021418
 
O0124399103
O0124399103O0124399103
O0124399103
 
J012518692
J012518692J012518692
J012518692
 
I012636670
I012636670I012636670
I012636670
 
E0622730
E0622730E0622730
E0622730
 
A1802040111
A1802040111A1802040111
A1802040111
 
C012121521
C012121521C012121521
C012121521
 
H1302023840
H1302023840H1302023840
H1302023840
 

Similar to H010524049

Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a reviewijitjournal
 
Project report a dhoc wireless network
Project report a dhoc wireless networkProject report a dhoc wireless network
Project report a dhoc wireless networkShiza Kokab
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkSanjeev Kumar Jaiswal
 
AODV information
AODV informationAODV information
AODV informationanilds02
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsidescitation
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Natasha Barnett
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETIJAEMSJORNAL
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
 

Similar to H010524049 (20)

Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
 
Project report a dhoc wireless network
Project report a dhoc wireless networkProject report a dhoc wireless network
Project report a dhoc wireless network
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
 
AODV information
AODV informationAODV information
AODV information
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANET
 
A0110104
A0110104A0110104
A0110104
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
 
eaodv
eaodveaodv
eaodv
 
[IJET-V1I6P19] Authors : Kirti
[IJET-V1I6P19] Authors : Kirti[IJET-V1I6P19] Authors : Kirti
[IJET-V1I6P19] Authors : Kirti
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

H010524049

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 5, Ver. II (Sep - Oct .2015), PP 40-49 www.iosrjournals.org DOI: 10.9790/2834-10524049 www.iosrjournals.org 40 | Page Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV Mrs. Nidhi Jain (Asst. Professor of ECE Department) Abstract: Mobile Ad-hoc Networks are autonomously self-organized networks without infrastructure support. To provide communication within the network a routing protocol is used to discover routes between nodes. The main aim of the routing protocol is to have an efficient route establishment between a pair of nodes, so that messages can be delivered in a timely manner. Routing in the MANETs is a challenging task which has led to development of many different routing protocols for MANETs. The recent years have witnessed a tremendous growth in the number of mobile internet users and the need for mobility support is indispensable for seamless internet connectivity. Mobile IP is a mobility support protocol that supports roaming across multiple Access Points without having to re-establish the end to end connection. After investigate the several challenges that Mobile IP faces it would turn out to be the protocol for supporting mobility in the future is known as Extended AODV or enhanced AODV or AODV+. This paper has been made to implement, the integration of internet with mobile ad-hoc network, using routing protocol extended AODV for two performance matrices Packet Delivery Ratio and End to End Delay. Simulation tool is Network Simulator-2. To provide the connectivity between wired and wireless network, we made the scenario in this way that it provide large Packet Delivery Ratio and less average End to End delay. I. Introduction MANET (Mobile Ad-Hoc Network) is Infrastructure less, Dynamic in nature wireless network in which all the devices are independent to move from one place to another. These networks are extremely flexible, self configurable, and do not require the deployment of any infrastructure for communication among mobile devices. MANET is a multi-hop wireless network which forms a temporary infrastructure less network and communicates with each other and support decentralized administration. In MANET each node (Device) can move independently thus each node acts as a Router and Forward packets. Because of High mobility of nodes, network topology changes frequently. That’s why Routing in Ad-Hoc network becomes a more Challenging task. Therefore routing in MANET becomes recent research area. Every node has its own transmission range and every node acts as a router used for data transmission of all nodes with data of itself. The principle behind ad hoc networking is multi-hop relaying 1.1 Cellular and Ad Hoc Wireless Networks Fig 1.1 shows the major Difference between ad hoc and cellular networks. In this figure one side is cellular network in which the mobile nodes communicate to each other via. base station. On the other side is ad hoc wireless network in which the mobile nodes can communicate to each other only by multi hop relying not by the base station. Because of their self creating, self-organizing and self administering capabilities, ad hoc networks can be rapidly deployed with minimum user intervention. There is no need for detailed planning of base station installation or wiring. Also, ad hoc networks do not need to operate in a stand-alone fashion, but can be attached to the Internet, thereby integrating many different devices and making their services available to other users Fig 1.1 Cellular and Ad hoc Network
  • 2. Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV DOI: 10.9790/2834-10524049 www.iosrjournals.org 41 | Page 1.2Applications of Ad Hoc Wireless Networks The major applications of Ad Hoc wireless networks include 1.2.1Military Applications Ad hoc wireless networks can be very useful in establishing communication among a group of soldiers for tactical operations. Setting up a fixed infrastructure for communication among a group of soldiers in enemy territories or in inhospitable terrains may not be possible. In such environments, ad hoc wireless networks provide the required communication mechanism quickly. Another application in this area can be the coordination of military objects moving at high speeds such as fleets of airplanes or warships. 1.2.2 Emergency Applications Ad Hoc wireless networks are very useful in emergency operations such as search and rescue, crowd control, and commando operations. The major factors that favor ad hoc wireless networks for such tasks are self configuration of the system with minimal overhead, independent of fixed or centralized infrastructure, the nature of the terrain of such applications, the freedom and flexibility of mobility, and the unavailability of conventional infrastructure based communication facilities are destroyed due to a war or due to natural climates such as earthquakes, immediate deployment of ad-hoc wireless networks would be a good solution for coordinating rescue activities. 1.2.3Wireless Sensor Network Applications Wireless Sensor Networks are a special category of ad hoc networks that are used to provide a wireless communication infrastructure among the sensors deployed in a specific application domain. A sensor network is a collection of a large number of sensor nodes that are deployed in a particular region. 1.3 Issues in Ad hoc Wireless Networks The major issues and challenges that are need to be considered when an ad hoc wireless system is to be designed. The major issues that affect the design, deployment, and performance of an ad hoc wireless system are as follows. 1.3.1 Media Access Scheme The major issues to be considered in designing a MAC protocol for ad hoc wireless networks are as follows: Distributed operation: The Ad Hoc wireless networks need to operate in environments where no centralized coordination is possible. Synchronization: The MAC protocol design should take into account the requirement of time synchronization. Synchronization is required in TDMA-based systems. Hidden terminals: Hidden terminals are nodes hidden from a sender of a data transmission session, but are reachable to the receiver of the session. The hidden terminal can cause collisions at the receiver node. The presence of hidden terminals can significantly reduce the throughput of a MAC protocol used in Ad Hoc network Exposed terminals: Exposed Terminals, the nodes that are in the transmission range of the sender of an outgoing session, are prevented from making a transmission. In order to improve the efficiency of the MAC protocol, the exposed nodes should be allowed to transmit in a controlled fashion without causing collision to the on-going data transfer. 1.3.2 Routing The major challenges that a routing protocol faces are as follows. Mobility: The mobility of nodes results in frequent path breaks, packet collisions, transient’s loops, stale routing information, and difficulty in resource reservation. A good routing protocol should be able to efficiently solve all the issues. Bandwidth constraint: Channel is shared by all nodes in the broadcast region, the bandwidth available per wireless link depends on the number of nodes and the traffic they handle. 1.3.3 Security The major security threats that exist in ad hoc wireless network are as follows. Denial of Service: The attacks effected by making the network resource unavailable for service to other nodes either by consuming the bandwidth or by overloading the system is known as denial of service. Resource consumption: The scarce availability of resources in ad hoc wireless network makes it an easy target for internal attacks, particularly aiming at consuming resources available in the network.
  • 3. Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV DOI: 10.9790/2834-10524049 www.iosrjournals.org 42 | Page II. Routing Protocols 2.1 Overview of routing protocols Compared to wired networks, mobile networks have unique characteristics. In mobile networks, node mobility may cause frequent network topology changes, which are rare in wired networks. Because of the importance of routing protocols in dynamic multi hop networks, a lot of mobile ad hoc network routing protocols have been pro-posed in the last few years. The broadcast nature of the wireless medium introduces the hidden terminal and exposed terminal problems. Additionally, mobile nodes have restricted power, computing, and bandwidth resources and require effective routing schemes. As promising network types in future mobile applications, mobile ad hoc networks are attracting more and more researchers. 2.2 Classification of Routing Protocols The existing routing protocols in MANETs can be classified into three categories. Table Driven or Proactive Source on Demand Hybrid. 2.2.1 Table Driven or Proactive Routing Protocol Using a proactive routing protocol, nodes in a mobile ad hoc network continuously evaluate routes to all reachable nodes and attempt to maintain consistent, up-to-date routing information. Therefore, a source node can get a routing path immediately if it needs one. In proactive routing protocols, all nodes need to maintain a consistent view of the network topology. When a network topology change occurs, respective updates must be propagated throughout the network to notify the change. Most proactive routing protocols proposed for mobile ad hoc networks have inherited properties from algorithms used in wired networks. In this category DSDV routing protocol is used. DSDV (Destination Sequenced Distance Vector Routing Protocol) DSDV is Destination Based Routing protocol and it is Proactive (Table Driven). The characteristics of DSDV are as follows. Each node maintains routing information for all known destinations and Routing information must be updated periodically. It makes immediate route advertisement on significant changes in routing. 2.2.2 Source on Demand Source on demand routing protocol is also known as reactive routing protocols for mobile ad hoc networks. In a reactive routing protocol, routing paths are searched only when needed. A route discovery operation invokes a route determination procedure. The discovery procedure terminates when either a route has been found or no route is available after examination for all route permutations. In a mobile ad hoc network, active routes may be disconnected due to node mobility. Therefore, route maintenance is an important operation of reactive routing protocols. Compared to the proactive routing protocols for mobile ad hoc networks, less control overhead is a distinct advantage of the reactive routing protocols. Thus, reactive routing protocols have better scalability than proactive routing protocols in mobile ad hoc networks. Ad Hoc On-Demand Distance Vector (AODV) Routing Protocol and the Dynamic Source Routing (DSR) Protocol are examples of reactive routing protocols for mobile ad hoc networks. AODV (Ad Hoc On-Demand Distance Vector) Reactive protocols discover routes only as needed. When a node wishes to communicate with another node, it checks with its existing information for a valid route to the destination. If one exists, the node uses that route for communication with the destination node. If not, the source node initiates a route request procedure, to which either the destination node or one of the intermediate nodes sends a reply back to the source node with a valid route.
  • 4. Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV DOI: 10.9790/2834-10524049 www.iosrjournals.org 43 | Page AODV Route Requests ( RREQs) Fig. 2.1 AODV route request Each neighboring node will pass this RREQ message to other its neighboring node until the destination will find. Route Reply (RREPs) Fig. 2.2 AODV route reply If a node has some data to send, it will broadcast a route request message to its neighbors. Intermediate nodes received the RREQ message and store the address of the source node in the routing table so that if duplicate RREQ is received in future may be discarded. If any node has a current route to the destination lies send a response to the source in the form of RREP message. The node may be the destination node.During the reverse movement of RREP, nodes in this path will store the forward route entries for setting up of forward route to the destination. III. Extended Aodv The interworking between mobile ad hoc networks and the Internet is described in this section. 3.1 Motivation Although an autonomous, stand-alone mobile ad hoc network is useful in many cases, a mobile ad hoc network connected to the Internet is much more desirable. So far, most of the research concerning mobile ad hoc networking has been done on protocols for autonomous mobile ad hoc networks. To achieve this network interconnection, gateways that understand the protocols of both the mobile ad hoc network stack and the TCP/IP suite are needed. All communication between a mobile ad hoc network and the Internet must pass through the gateways. The Internet draft “Global Connectivity for IPv6 Mobile Ad Hoc Networks” describes how to provide Internet connectivity to mobile ad hoc networks. In particular, it explains how a mobile node and a gateway should operate. Further, it proposes and illustrates how to apply a method for discovering gateways. In the case for reactive routing protocols, the idea is to extend the route discovery messaging, so that it can be used for discovering not only mobile nodes but also gateways 3.2 The Extended Route Request The extended RREQ message contains exactly the same fields with the same functions as the ordinary RREQ message, except for a flag. This flag is called Internet-Global Address Resolution Flag and is referred to as the I-flag. Hence, the RREQ message extended with the I-flag is referred to as the RREQ_I message throughout this text.
  • 5. Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV DOI: 10.9790/2834-10524049 www.iosrjournals.org 44 | Page Frame Format of Extended RREQ_I TABLE 3.1 Frame Format of Extended RREQ_I Flag I(Internet Global Address Resolution Flag) RREQ ID Destination IP address Destination sequence no. Originator IP Address Originator sequence no. 3.2 The Extended Route Reply The extended RREP message contains exactly the same fields with the same functions as the ordinary RREP message, except for a flag. This flag is the same flag that has extended the RREQ message to the RREQ_I message, namely the Internet-Global Ad-dress Resolution Flag (or the I-flag). Hence, the RREP message extended with the I-flag is referred to as the RREP_I message throughout this text. Frame Format of Extended RREP_I TABLE 3.1 Frame Format of Extended RREP_I Flag I(Internet Global Address Resolution Flag) Destination IP address Destination sequence no. Originator IP Address Life Time IV. Network Simulator-2 Network Simulator (NS) is an object-oriented, discrete event simulator for networking research. NS provides substantial support for simulation of TCP , routing and multicast protocols over wired and wireless networks. The simulator is a result of an on-going effort of research and development. Even though there is a considerable confidence in NS, it is not a polished and finished product yet and bugs are being discovered and corrected continuously .NS is written in C++, with an OTcl interpreter as a command and configuration interface. The C++ part, which is fast to run but slower to change, is used for detailed protocol implementation. The OTcl part, on the other hand, which runs much slower but can be changed very quickly, is used for simulation configuration. One of the advantages of this split-language programming approach is that it allows for fast generation of large scenarios. To simply use the simulator, it is sufficient to know OTcl. Basic Architecture of NS NS2 consists of two key languages: C++ and Object oriented Tool Command Language (OTcl). While the C++ defines the internal mechanism (i.e. a backend) of the simulation objects, the OTcl sets up simulation by assembling and configuring the objects as well as scheduling discrete events. Fig. 3.1NS-2 structure
  • 6. Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV DOI: 10.9790/2834-10524049 www.iosrjournals.org 45 | Page V. Simulation 5.1 Internet access for wired-cum-wireless Network using ADOV+ To provide connectivity between these two environments we have a concept of extended AODV. Extended AODV is a solution to provide connectivity for mobile nodes if any node move from one type of network to another network. Simulation Setup: This section describes the simulation scenario, Simulation model to provide the connectivity between MANET and wired network with the help of Mobile IP concept. Simulation Scenario: The simulation is done under NS 2. The basic configuration is that in a 1000mt*1000mt Square area with variable no. of mobile nodes. The traffic Sources are CBR (Constant Bit Rate), 512 byte as data packets. The maximum speed of mobile nodes is 20mt/sec and simulation time is 250Sec. To use CBR is for a fair comparison purpose, since bit rate vary will make the data packets traffic load unpredictable, which situation we do not want it happen. Transmission range is 250mt. and routing protocol is Extended AODV. In this simulation we have Two Domain 1. Wired domain( fixed network) 2. Wireless Domain( MANET ) In wireless domain Node 1 is Gateway node(G) Scenario 1 Data travel from MH (mobile host node 2) to Wired node (W) via Gateway Scenario 2 Data travel from MH to W via node 3 e.g. (1 hop) Fig. 5.2 data travel from wireless to wired node via 1 hop Scenario 3 Data travel from MH to W via Gateway, MH, node no. 3 and 4 (hop 2)
  • 7. Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV DOI: 10.9790/2834-10524049 www.iosrjournals.org 46 | Page Fig. 5.3 data travel from wireless to wired node via 2 hop Scenario 4. Data travel from MH to W via Gateway, MH, node no. 3,4,5(hop 3) Fig. 5.4 data travel from wireless to wired node via 3 hop Scenario 5 Data travel from MH to W via Gateway when MH moves from one network to another network.
  • 8. Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV DOI: 10.9790/2834-10524049 www.iosrjournals.org 47 | Page Fig. 5.5 data travel from wireless to wired node via Gateway 1 and Gateway 2 5.2 Simulation Parameters TABLE 5.1Simulation Parameters Parameters Value Simulator NS-2 Routing Protocol Extended AODV MAC Layer 802.11 IEEE Simulation Time 60 Secs Simulation Area 1000m x1000m Transmission Range 250m Traffic Type CBR Data Payload 512bytes/packets Speed of Node 20m/s 5.3 Performance Evaluation Metrics Packet Delivery Ratio-The ratio of the data packets delivered to the destinations to those generated by the CBR sources. It is the fraction of packets sent by the application that are received by the receivers. End-to-End Delay – End-to-End delay indicates how long it took for a packet to travel from the source to the application layer of the destination i.e. the total time taken by each packet to reach the destination. 5.4 Simulation Results: Table 5.2 No. of Hopes, PDR and E2E delay No. of Hopes PDR(%) Average End to End Delay 0 50% 0.00759633 1 49.623 0.0244597 2 48.990 0.0244603 3 49.897 0.0244723 4 49.7976 0.0270019 5 49.5253 0.0291146 This simulation result shows that if we increase the no. of hopes then PDR decrease and E2E delay increase. In this project we are trying to reduce the E2E delay and slowly reduce PDR. That means is nearly constant and E2E delay also has low variation.
  • 9. Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV DOI: 10.9790/2834-10524049 www.iosrjournals.org 48 | Page Fig. 5.6 Packet Delivery Ratio Vs No. of Hopes Fig 5.6 shows that if we increase the no. of hopes then PDR will vary either increase or decrease depend on the position defined of the mobile nodes. Fig. 5.7 End to End Delay Vs No. of Hopes Fig 5.7 shows that if No. of Hopes increases then End to End Delay also increases. VI. Conclusion A fixed infrastructure network and MANET can be combined to make them work together in order to set up a multi hop path between MANET nodes and fixed infrastructure base stations, and allow MANET to obtain internet connectivity.If we increase the no. of hopes then the PDR decreases with respect to multi hop communication but if we arrange the mobile nodes in proper distance then we can maintain the PDR. If we increase the no of hopes end-to-end delay increases due to multi hop takes time. References [1]. Khaleel Ur Rahman Khan, Rafi U Zaman, A Venugopal Reddy. “A Hierarchical Approach of Integrating Mobile Ad Hoc Network and the Internet” 2008 IEEE. [2]. Fekri M. Abduljalil and Shrikant K. Bodhe “A survey of integrating IP mobility protocols and mobile adhoc network” IEEE Communications Surveys & Tutorials, 2007. www.comsoc.org/pubs/surveys [3]. Jonsson Fredrik Alriksson, Tonny Larsson, Johansson, Gerald Q. magurie Jr. “MIPMANET : mobile IP for Mobile ad hoc network” IEEE 2000 [4]. Harpreet Kaur Sandhu Roopali Garg, “Evaluation of routing protocols in the integrated MANET internet scenario” International Journal Of Advances In Computing And Information Technology. April 2012 [5]. Pravin Ghosekar, Girish Katkar, Dr. Pradip Ghorpade ”Mobile Ad Hoc Networking: Imperatives and Challenges” IJCA Special Issue on “Mobile Ad-hoc Networks” MANETs, 2010 [6]. G. Jose Moses, Prof.P.Suresh Varma, N.Supriya, D. Sunil Kumar “A Simulation Based Study of AODV, DSR, DSDV Routing Protocols in MANET Using NS-2” March 2012 International Journal of Advanced Research in Computer Science and Software Engineering.
  • 10. Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV DOI: 10.9790/2834-10524049 www.iosrjournals.org 49 | Page [7]. Josh Broch David A. Maltz David B. Johnson “Supporting Hierarchy and Heterogeneous Interfaces in Multi-Hop Wireless Ad H Networks” Proceedings of the Workshop on Mobile Computing, June 1999. IEEE. [8]. Charles Perkins “Mobile IP” originally published in IEEE May 1997. Tutorials [9]. The ns Manual (formerly ns Notes and Documentation) The VINT Project. [10]. Marc Greis tutorials for Network Simulator 2. [11]. NS for Begnieers. Eitan Altman.