Abstract Generally, the Base station (BS) is fixed in the mobile communication system however in Mobile Ad hoc network, Base Station (BS)s is not used, thus it is named as infrastructure less network which can manage its network independently. The Routing protocol plays an important role and a lot of research has been done in this area. This paper presents a protocol for routing mobile ad hoc network (MANET) that uses dynamic source routing. This protocol adapts quickly to the change in the routing path as the host is changing its location frequently. DSR allows the network to be fully self-organising and self-configuring without the need for any existing network. The protocol is composed of the two mechanisms of route discovery and route maintenance work together to search for the shortest path and also to maintain source route to arbitrary destination in the Mobile ad hoc network, we used optimize routing protocol in Mobile ad hoc network (MANET).This optimization is done on DSR (Dynamic Source Routing) protocol using ANT algorithm. The performance of DSR is analyzed using Qualnet 5.2 with respect to QOS (Quality of Service) of throughput, end to end delay, Routing overhead, Average hop count. All the parameter are analyzed in three different scenario of velocity, pause time and traffic connection. All the result are compared with the result of standard DSR routing protocol. The comparison shows that the DSR-ant has better performance than standard DSR. By using Ant algorithm, the DSR optimization can be improved with a smaller delay and the number of hop to transfer information between nodes. Keywords: MANET, DSR, ANT Algorithm
Minimum distance based routing protocol for lifetime improvement in wireless ...eSAT Journals
Abstract Balanced utilization of energy of wireless sensor nodes is a challenge while designing wireless sensor network (WSN). This energy of sensor node is a limited resource and measure for the lifespan of WSN. Communication process consumes most of the energy of sensor node hence; energy of sensor node becomes a major design issue for WSN. Clustering is preferred while designing routing protocols for WSN for its many to one traffic pattern. In our minimum distance based routing protocol for lifetime improvement in WSN (MDBRP) clusters are formed once in a lifetime and their heads are selected rotationally based on minimum communication distance between nodes and their next hop. MDBRP considers minimum energy consumption which aims to increase the overall lifespan of WSN. Keywords— clustering, dynamic clustering, routing protocol, static clustering, wireless sensor network.
Survey on dynamic source routing, attacks and counter measures in wireless se...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Use of location aided algorithm using wi fi in indoor ad-hoc systemseSAT Journals
Abstract Mobile Ad-Hoc networks are designed to establish a network anytime and anywhere. Unlike other networks, ad-hoc does not require a fixed infrastructure. There are various routing techniques which are related to ad-hoc networking like Destination Sequenced Distance Vector Protocol (DSDV), Dynamic Source Routing Protocol (DSR) and Ad-Hoc On Demand Distance Vector Protocol (AODV). One such routing protocol named Location Aided Routing uses GPS (Global Positioning System) to get the co-ordinates of the nodes which would assist in routing. There is a definite set of drawbacks where GPS is used to get the location for the nodes in the ad-hoc network which is implemented indoor. In this paper, we propose an alternative of using Wi-Fi Positioning System to get the location of the co-ordinates which may prove to be a better solution than GPS indoor. Index Terms: Ad-Hoc Networks, DSDV, DSR, AODV, LAR, GPS, Wi-Fi Positioning System
Optimised Proactive Link State Routing For DOS Attack PreventionEditor IJCATR
A Mobile Ad hoc Network is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate, whereas others need the aid of intermediate nodes to route their packets. Each node has a wireless interface to communicate with each other. These networks are fully distributed, and can work at any place without the help of any fixed infrastructure as access points or base stations. Routing protocols are divided into two broad classes – Reactive and Proactive. In Reactive or on demand routing protocols the routes are created only when they are needed. The application of this protocol can be seen in the Dynamic Source Routing Protocol (DSR) and the Ad-hoc On-demand Distance Vector Routing Protocol (AODV). Wherein Proactive or Table-driven routing protocols the nodes keep updating their routing tables by periodical messages. OPSR proposes a proactive mechanism in source routing.
This document discusses an autonomous network reconfiguration system (ARS) for multi-radio wireless mesh networks. ARS allows a network to self-recover from local link failures in order to maintain performance. It uses a reconfiguration planning algorithm to determine the minimum necessary changes needed for recovery. When a link failure is detected, ARS triggers the formation of a local group and designates a leader to coordinate reconfiguration. The leader requests a reconfiguration plan from a gateway, which is then implemented by group members to resolve the failure. ARS aims to reconfigure autonomously and locally in response to failures while limiting effects on healthy parts of the network.
This document discusses security issues in ad-hoc networks. It begins by outlining some key problems in ad-hoc network routing including lack of infrastructure, dynamic topology changes, wireless communication vulnerabilities, and implicit trust between nodes. It then analyzes specific attacks like modifying routing protocol messages. Several solutions are proposed, including concealing network topology using security agents or zone routing, and using watchdog and pathrater mechanisms to identify and isolate misbehaving nodes to improve throughput. The watchdog detects nodes that fail to forward packets by listening to transmissions, while pathrater avoids routing through misbehaving nodes to choose more reliable paths.
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
There are many routing approaches have been borrowed from mobile ad hoc network to achieve routing solutions in wireless mesh network. WMN was developed for reliable data communication and load balancing. AODV provides loop-free routes even while repairing broken links. This paper have been proposed an improved hierarchical AODV routing protocol
(IH-AODV), which exhibits better scalability and performance in the network. This IH-AODV protocol has been proposed for improvement in the scaling potential of AODV. MAODV allows
each node in the network to send out multicast data packets, used for multicast traffic. The wireless mesh network architecture provides reduction in installation cost, large scale
deployment, reliability and self management. It is mainly focused on implementing military or specialized civilian applications. Two protocols MAODV and IH-AODV were simulated using NS2 package. Simulation results will demonstrate that, IH-AODV scales well for large network
and other metrics are also better than or comparable to MAODV in hybrid WMNs.
Minimum distance based routing protocol for lifetime improvement in wireless ...eSAT Journals
Abstract Balanced utilization of energy of wireless sensor nodes is a challenge while designing wireless sensor network (WSN). This energy of sensor node is a limited resource and measure for the lifespan of WSN. Communication process consumes most of the energy of sensor node hence; energy of sensor node becomes a major design issue for WSN. Clustering is preferred while designing routing protocols for WSN for its many to one traffic pattern. In our minimum distance based routing protocol for lifetime improvement in WSN (MDBRP) clusters are formed once in a lifetime and their heads are selected rotationally based on minimum communication distance between nodes and their next hop. MDBRP considers minimum energy consumption which aims to increase the overall lifespan of WSN. Keywords— clustering, dynamic clustering, routing protocol, static clustering, wireless sensor network.
Survey on dynamic source routing, attacks and counter measures in wireless se...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Use of location aided algorithm using wi fi in indoor ad-hoc systemseSAT Journals
Abstract Mobile Ad-Hoc networks are designed to establish a network anytime and anywhere. Unlike other networks, ad-hoc does not require a fixed infrastructure. There are various routing techniques which are related to ad-hoc networking like Destination Sequenced Distance Vector Protocol (DSDV), Dynamic Source Routing Protocol (DSR) and Ad-Hoc On Demand Distance Vector Protocol (AODV). One such routing protocol named Location Aided Routing uses GPS (Global Positioning System) to get the co-ordinates of the nodes which would assist in routing. There is a definite set of drawbacks where GPS is used to get the location for the nodes in the ad-hoc network which is implemented indoor. In this paper, we propose an alternative of using Wi-Fi Positioning System to get the location of the co-ordinates which may prove to be a better solution than GPS indoor. Index Terms: Ad-Hoc Networks, DSDV, DSR, AODV, LAR, GPS, Wi-Fi Positioning System
Optimised Proactive Link State Routing For DOS Attack PreventionEditor IJCATR
A Mobile Ad hoc Network is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate, whereas others need the aid of intermediate nodes to route their packets. Each node has a wireless interface to communicate with each other. These networks are fully distributed, and can work at any place without the help of any fixed infrastructure as access points or base stations. Routing protocols are divided into two broad classes – Reactive and Proactive. In Reactive or on demand routing protocols the routes are created only when they are needed. The application of this protocol can be seen in the Dynamic Source Routing Protocol (DSR) and the Ad-hoc On-demand Distance Vector Routing Protocol (AODV). Wherein Proactive or Table-driven routing protocols the nodes keep updating their routing tables by periodical messages. OPSR proposes a proactive mechanism in source routing.
This document discusses an autonomous network reconfiguration system (ARS) for multi-radio wireless mesh networks. ARS allows a network to self-recover from local link failures in order to maintain performance. It uses a reconfiguration planning algorithm to determine the minimum necessary changes needed for recovery. When a link failure is detected, ARS triggers the formation of a local group and designates a leader to coordinate reconfiguration. The leader requests a reconfiguration plan from a gateway, which is then implemented by group members to resolve the failure. ARS aims to reconfigure autonomously and locally in response to failures while limiting effects on healthy parts of the network.
This document discusses security issues in ad-hoc networks. It begins by outlining some key problems in ad-hoc network routing including lack of infrastructure, dynamic topology changes, wireless communication vulnerabilities, and implicit trust between nodes. It then analyzes specific attacks like modifying routing protocol messages. Several solutions are proposed, including concealing network topology using security agents or zone routing, and using watchdog and pathrater mechanisms to identify and isolate misbehaving nodes to improve throughput. The watchdog detects nodes that fail to forward packets by listening to transmissions, while pathrater avoids routing through misbehaving nodes to choose more reliable paths.
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
There are many routing approaches have been borrowed from mobile ad hoc network to achieve routing solutions in wireless mesh network. WMN was developed for reliable data communication and load balancing. AODV provides loop-free routes even while repairing broken links. This paper have been proposed an improved hierarchical AODV routing protocol
(IH-AODV), which exhibits better scalability and performance in the network. This IH-AODV protocol has been proposed for improvement in the scaling potential of AODV. MAODV allows
each node in the network to send out multicast data packets, used for multicast traffic. The wireless mesh network architecture provides reduction in installation cost, large scale
deployment, reliability and self management. It is mainly focused on implementing military or specialized civilian applications. Two protocols MAODV and IH-AODV were simulated using NS2 package. Simulation results will demonstrate that, IH-AODV scales well for large network
and other metrics are also better than or comparable to MAODV in hybrid WMNs.
1.a distributed three hop routing protocol to increase theyasinalimohammed
The document presents a Distributed Three-hop Routing (DTR) protocol for hybrid wireless networks that incorporates features of both mobile ad-hoc and infrastructure wireless networks. DTR aims to improve throughput capacity and scalability by dividing a data stream into segments and transmitting them in a distributed manner across multiple base stations using both ad-hoc and cellular interfaces. It limits routing paths to three hops to reduce overhead. Theoretical analysis and simulation results show that DTR outperforms other routing protocols in terms of throughput, scalability, and mobility resilience with only minimal overhead.
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
The idea of an ad hoc network is a new pattern that allows mobile hosts (nodes) to converse without relying
on a predefined communications to keep the network connected. Most nodes are implicit to be mobile and
communication is implicit to be wireless. Ad-hoc networks are collaborative in the sense that each node is
assumed to relay packets for other nodes that will in return relay their packets. Thus all nodes in an ad-hoc
network form part of the network’s routing infrastructure. The mobility of nodes in an ad-hoc network
denotes that both the public and the topology of the network are extremely active. It is very difficult to
design a once-for-all target detection system. Instead, an incremental enrichment strategy may be more
feasible. A safe and sound protocol should at least include mechanisms against known assault types. In
addition, it should provide a system to easily add new security features in the future. Due to the
significance of MANET routing protocols, we focus on the recognition of attacks targeted at MANET
routing protocols.
Intrusion detection techniques for cooperation of node in MANET have been chosen as the security
parameter. This includes Watchdog and Path rater approach. It also nearby Reputation Based Schemes in
which Reputation concerning every node is measured and will be move to every node in network.
Reputation is defined as Someone’s donation to network operation. CONFIDANT [23], CORE [25],
OCEAN [24] schemes are analyzed and will be here also compared based on various parameters.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
This document compares the performance of three routing protocols - DSDV, AODV, and DSR - for mobile ad hoc networks by simulating networks of varying sizes using the Qualnet simulator. The main findings are that AODV performed most efficiently for network sizes of 30, 40, and 50 nodes, and that performance decreased for all three protocols as the number of nodes increased. For a network of 50 nodes, the three protocols exhibited different performance levels at different node counts.
Location updation for energy efficient geographic routing in maneteSAT Journals
Abstract Routing in mobile ad-hoc networks with a large number of nodes or with high mobility is a very difficult task and energy conservation is very important for mobile devices. In geographic routing each node require information about neighbors to forward data packets. Earlier periodic updations are used for location updation but it consumes much amount of node energy and bandwidth utilized for unnecessary updation where there is no changes in the location information. In this paper adaptive position update used with less energy consumption and utilize the bandwidth for location updation only when there is a change in the network. The GPSR protocol used for packet forwarding in both greedy forwarding and perimeter forwarding. This adaptive updation utilize only less amount of node energy than other beaconing scheme. Index Terms:Routing protocols, Beacon updation scheme, Wireless communication, Greedy forwarding, Adaptive position updation.
Effect of multipath routing in autonomous mobile mesh networkseSAT Journals
Abstract
Autonomous mobile mesh networks are a combination of mobile ad hoc networks and mesh networks. Mobile ad hoc networks are temporarily formed for a specific purpose, without any fixed infrastructure. Mesh networks are fully connected networks with the support of fixed infrastructure. Autonomous mobile mesh networks (AMMNET in short) [1], is the framework designed for supporting mesh networks, which are mobile still expects connectivity as opposed to ad hoc networks. This paper proposes a multipath routing technology for AMMNETs which provides better packet delivery ratio in AMMNETs. The simulations are done in ns2. The results prove that, multipath routing technology works well with AMMNET framework.
Keywords: AMMNET, routing, multipath, ns2.
This document analyzes the performance of the Zone Routing Protocol (ZRP) in mobile ad hoc networks using the OPNET simulator. It provides an overview of ZRP, including that it is a hybrid routing protocol that uses a proactive approach within routing zones and a reactive approach between zones. The document describes simulating ZRP with 20, 40, and 60 nodes and measuring its throughput, load, data dropped, and delay. The results showed that as node count increased, ZRP's throughput, load, and data dropped increased, while delay also rose with more nodes. ZRP thus performed best with fewer nodes and worse with more nodes in the simulated mobile ad hoc networks.
Geographical routing protocols for mobile ad hoc networks a survey on their ...eSAT Journals
Abstract Mobile Ad Hoc network is an autonomous system of mobile nodes connected by wireless links forming a temporary network without the aid of any centralized administration or infrastructure. Each node operates not only as an end system but also as a router to forward packets. The nodes are free to move themselves into a network. These networks have no fixed topology due to the high degree of node mobility. To accommodate the changing topology, special routing protocols are needed. The goal of the routing protocol is to have an efficient route establishment between a pair of nodes, so that messages can be delivered in a timely manner. Mobile Ad Hoc routing protocols are divided into Flat routing, Hierarchical routing, Geographical routing, Power aware routing and Multicast routing. It is difficult to determine which protocols may perform well under a number of different network scenarios. This paper provides an overview of geographical routing protocols proposed in the literature and performance comparison of geographical routing protocols. Index Terms: Mobile Ad Hoc Network, Geographical Routing protocols.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...cscpconf
Ad hoc network is a collection of wireless mobile nodes that dynamically form a temporary
network without the use of any existing network infrastructure or centralized administration. A
cognitive radio is a radio that can change its transmitter parameters based on interaction with
the environment in which it operates. The basic idea of cognitive radio networks is that the
unlicensed devices (cognitive radio users or secondary users) need to vacate the spectrum band
once the licensed device (primary user) is detected. Cognitive capability and reconfigurability
are the key characteristics of cognitive radio. Routing is an important issue in Mobile
Cognitive Radio Ad Hoc Networks (MCRAHNs). In this paper, a survey of routing protocols for
mobile cognitive radio ad networks is discussed.
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
Ad hoc network is a network without centralized administration in which different users can communicate and exchange information. In such a structure, all the nodes participate in order to achieve the network and ensure the travel of the information. Hence, multihopping techniques are used to achieve this task. The communication reliability within an ad hoc network and how the different nodes act are managed by routing protocols. Nowadays, different types of protocols exist. Nevertheless, the source routing ones, based on information known at the source of the communication, seem to attract more studies. Source routing protocols had shown interesting results in realistic scenarios in areas such as military battlefields or airport stations.
This Paper deals with DSR Protocol and is focused on the multipath aspect of this routing protocol. Since, it is necessary to understand that multipath techniques enhance reliability and can ensure security. We have simulated a new multipath algorithm. The solution had been evaluated with the network Simulator 2. Since we want to know how our protocol reacts in different mobility cases, the random waypoint model which allows us to present relevant results, due to the fact this situation is taken into account.
Simulation results show that the multipath protocol behaves better than DSR, the main actual reactive protocol. The Proposed protocol MSR performs well in high mobility by using much less overhead than DSR. Additionally, it is interesting to see that DSR without any modifications manage poorly in high mobility situation.
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...ijwmn
Wireless Sensor networks are a challenging task due to the lack of resources in the network as well as the frequent changes in network topology. Various routing protocols are designed basically to establish correct and efficient paths between source and destination. In the recent years, several routing protocols
have been proposed in literature and many of them studied through extensive simulation at different network characteristics. In this paper, we compare the performance of three most common routing protocols of wireless sensor networks i.e. AODV, DSDV and ZRP. These protocols have been simulated
using NS2 Package. This study investigates the routing protocols corresponding to packet delivery ratio, packet loss ratio, average throughput, dropped packets and end-to-end delay. Hence, evaluation and comparison between routing protocols is required because performance of any routing protocol can be changed with various parameters such as speed of nodes, pause times and number of nodes.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document analyzes and compares different routing protocols for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics, such as dynamic topology and limited resources. It then classifies routing protocols as either proactive (table-driven) or reactive (on-demand) and describes several examples of each type. Proactive protocols maintain up-to-date routing tables through periodic updates but incur more overhead. Reactive protocols discover routes on demand but add latency. The document provides details on popular protocols like DSDV, AODV, DSR and TORA, explaining their route discovery, maintenance and metrics.
Spiro is a leading research and development organization in South India that provides training to individuals in various technologies and domains. It has been operating for over a decade. Spiro creates an environment with experts to help students improve their learning and become well-versed in their desired fields. It offers training in areas like wireless networks, cognitive radio networks, security and various IEEE transactions with the aim of meeting industry requirements. Spiro's training is focused on providing industry-based knowledge to students at different levels to help brighten their careers.
Mobile computing devices can be categorized as display-only devices, info pad models with limited processing, laptop computers, and personal digital assistants (PDAs). Mobile stations in a mobile network comprise the user equipment and software needed for communication. A GSM network consists of mobile stations, the base station subsystem including base transceiver stations (BTS) and base station controllers (BSC), and the network switching subsystem including mobile switching centers (MSCs) and databases. Mobile stations contain a mobile equipment component and a subscriber identity module (SIM) card. Ad hoc networks allow wireless nodes to connect and communicate without a preexisting infrastructure by forming a temporary network.
Review on design of advanced opportunistics routing in manetyatin1988
This document discusses mobile ad hoc networks and opportunistic routing. It provides background on MANETs, including their definition as temporary networks formed without infrastructure between wireless mobile nodes. It also covers applications of MANETs and challenges like mobility and link quality. The document introduces opportunistic routing as a forwarding technique for unpredictable MANET topologies. It reviews related work analyzing opportunistic routing and discusses using fuzzy logic to improve routing stability and availability in MANETs. The proposed work is to implement a fuzzy routing mechanism on the AODV protocol to optimize link availability and evaluate performance metrics like throughput and delay.
This document provides an overview of Mobile Ad Hoc Networks (MANETs) and routing protocols used in MANETs. It describes key characteristics of MANETs including that they are formed without pre-existing infrastructure and routes between nodes may contain multiple hops. It also discusses challenges in MANET routing like limited wireless range and mobility-induced route changes. The document then summarizes the Dynamic Source Routing (DSR) protocol, including how it uses route requests and route replies to discover routes, maintains routes in packet headers, and utilizes route caching for faster routing.
This document provides an overview of mobile ad hoc networks (MANETs). It defines MANETs as self-configuring wireless networks without a fixed infrastructure. The document discusses the key features of MANETs, including that they are autonomous, operate without a central coordinator, have a dynamic network topology, and use multi-hop routing. It also outlines some of the security challenges in MANETs, such as routing attacks, and lists some potential applications like military operations, disaster relief, and vehicle-to-vehicle networks.
1.a distributed three hop routing protocol to increase theyasinalimohammed
The document presents a Distributed Three-hop Routing (DTR) protocol for hybrid wireless networks that incorporates features of both mobile ad-hoc and infrastructure wireless networks. DTR aims to improve throughput capacity and scalability by dividing a data stream into segments and transmitting them in a distributed manner across multiple base stations using both ad-hoc and cellular interfaces. It limits routing paths to three hops to reduce overhead. Theoretical analysis and simulation results show that DTR outperforms other routing protocols in terms of throughput, scalability, and mobility resilience with only minimal overhead.
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
The idea of an ad hoc network is a new pattern that allows mobile hosts (nodes) to converse without relying
on a predefined communications to keep the network connected. Most nodes are implicit to be mobile and
communication is implicit to be wireless. Ad-hoc networks are collaborative in the sense that each node is
assumed to relay packets for other nodes that will in return relay their packets. Thus all nodes in an ad-hoc
network form part of the network’s routing infrastructure. The mobility of nodes in an ad-hoc network
denotes that both the public and the topology of the network are extremely active. It is very difficult to
design a once-for-all target detection system. Instead, an incremental enrichment strategy may be more
feasible. A safe and sound protocol should at least include mechanisms against known assault types. In
addition, it should provide a system to easily add new security features in the future. Due to the
significance of MANET routing protocols, we focus on the recognition of attacks targeted at MANET
routing protocols.
Intrusion detection techniques for cooperation of node in MANET have been chosen as the security
parameter. This includes Watchdog and Path rater approach. It also nearby Reputation Based Schemes in
which Reputation concerning every node is measured and will be move to every node in network.
Reputation is defined as Someone’s donation to network operation. CONFIDANT [23], CORE [25],
OCEAN [24] schemes are analyzed and will be here also compared based on various parameters.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
This document compares the performance of three routing protocols - DSDV, AODV, and DSR - for mobile ad hoc networks by simulating networks of varying sizes using the Qualnet simulator. The main findings are that AODV performed most efficiently for network sizes of 30, 40, and 50 nodes, and that performance decreased for all three protocols as the number of nodes increased. For a network of 50 nodes, the three protocols exhibited different performance levels at different node counts.
Location updation for energy efficient geographic routing in maneteSAT Journals
Abstract Routing in mobile ad-hoc networks with a large number of nodes or with high mobility is a very difficult task and energy conservation is very important for mobile devices. In geographic routing each node require information about neighbors to forward data packets. Earlier periodic updations are used for location updation but it consumes much amount of node energy and bandwidth utilized for unnecessary updation where there is no changes in the location information. In this paper adaptive position update used with less energy consumption and utilize the bandwidth for location updation only when there is a change in the network. The GPSR protocol used for packet forwarding in both greedy forwarding and perimeter forwarding. This adaptive updation utilize only less amount of node energy than other beaconing scheme. Index Terms:Routing protocols, Beacon updation scheme, Wireless communication, Greedy forwarding, Adaptive position updation.
Effect of multipath routing in autonomous mobile mesh networkseSAT Journals
Abstract
Autonomous mobile mesh networks are a combination of mobile ad hoc networks and mesh networks. Mobile ad hoc networks are temporarily formed for a specific purpose, without any fixed infrastructure. Mesh networks are fully connected networks with the support of fixed infrastructure. Autonomous mobile mesh networks (AMMNET in short) [1], is the framework designed for supporting mesh networks, which are mobile still expects connectivity as opposed to ad hoc networks. This paper proposes a multipath routing technology for AMMNETs which provides better packet delivery ratio in AMMNETs. The simulations are done in ns2. The results prove that, multipath routing technology works well with AMMNET framework.
Keywords: AMMNET, routing, multipath, ns2.
This document analyzes the performance of the Zone Routing Protocol (ZRP) in mobile ad hoc networks using the OPNET simulator. It provides an overview of ZRP, including that it is a hybrid routing protocol that uses a proactive approach within routing zones and a reactive approach between zones. The document describes simulating ZRP with 20, 40, and 60 nodes and measuring its throughput, load, data dropped, and delay. The results showed that as node count increased, ZRP's throughput, load, and data dropped increased, while delay also rose with more nodes. ZRP thus performed best with fewer nodes and worse with more nodes in the simulated mobile ad hoc networks.
Geographical routing protocols for mobile ad hoc networks a survey on their ...eSAT Journals
Abstract Mobile Ad Hoc network is an autonomous system of mobile nodes connected by wireless links forming a temporary network without the aid of any centralized administration or infrastructure. Each node operates not only as an end system but also as a router to forward packets. The nodes are free to move themselves into a network. These networks have no fixed topology due to the high degree of node mobility. To accommodate the changing topology, special routing protocols are needed. The goal of the routing protocol is to have an efficient route establishment between a pair of nodes, so that messages can be delivered in a timely manner. Mobile Ad Hoc routing protocols are divided into Flat routing, Hierarchical routing, Geographical routing, Power aware routing and Multicast routing. It is difficult to determine which protocols may perform well under a number of different network scenarios. This paper provides an overview of geographical routing protocols proposed in the literature and performance comparison of geographical routing protocols. Index Terms: Mobile Ad Hoc Network, Geographical Routing protocols.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...cscpconf
Ad hoc network is a collection of wireless mobile nodes that dynamically form a temporary
network without the use of any existing network infrastructure or centralized administration. A
cognitive radio is a radio that can change its transmitter parameters based on interaction with
the environment in which it operates. The basic idea of cognitive radio networks is that the
unlicensed devices (cognitive radio users or secondary users) need to vacate the spectrum band
once the licensed device (primary user) is detected. Cognitive capability and reconfigurability
are the key characteristics of cognitive radio. Routing is an important issue in Mobile
Cognitive Radio Ad Hoc Networks (MCRAHNs). In this paper, a survey of routing protocols for
mobile cognitive radio ad networks is discussed.
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
Ad hoc network is a network without centralized administration in which different users can communicate and exchange information. In such a structure, all the nodes participate in order to achieve the network and ensure the travel of the information. Hence, multihopping techniques are used to achieve this task. The communication reliability within an ad hoc network and how the different nodes act are managed by routing protocols. Nowadays, different types of protocols exist. Nevertheless, the source routing ones, based on information known at the source of the communication, seem to attract more studies. Source routing protocols had shown interesting results in realistic scenarios in areas such as military battlefields or airport stations.
This Paper deals with DSR Protocol and is focused on the multipath aspect of this routing protocol. Since, it is necessary to understand that multipath techniques enhance reliability and can ensure security. We have simulated a new multipath algorithm. The solution had been evaluated with the network Simulator 2. Since we want to know how our protocol reacts in different mobility cases, the random waypoint model which allows us to present relevant results, due to the fact this situation is taken into account.
Simulation results show that the multipath protocol behaves better than DSR, the main actual reactive protocol. The Proposed protocol MSR performs well in high mobility by using much less overhead than DSR. Additionally, it is interesting to see that DSR without any modifications manage poorly in high mobility situation.
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...ijwmn
Wireless Sensor networks are a challenging task due to the lack of resources in the network as well as the frequent changes in network topology. Various routing protocols are designed basically to establish correct and efficient paths between source and destination. In the recent years, several routing protocols
have been proposed in literature and many of them studied through extensive simulation at different network characteristics. In this paper, we compare the performance of three most common routing protocols of wireless sensor networks i.e. AODV, DSDV and ZRP. These protocols have been simulated
using NS2 Package. This study investigates the routing protocols corresponding to packet delivery ratio, packet loss ratio, average throughput, dropped packets and end-to-end delay. Hence, evaluation and comparison between routing protocols is required because performance of any routing protocol can be changed with various parameters such as speed of nodes, pause times and number of nodes.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document analyzes and compares different routing protocols for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics, such as dynamic topology and limited resources. It then classifies routing protocols as either proactive (table-driven) or reactive (on-demand) and describes several examples of each type. Proactive protocols maintain up-to-date routing tables through periodic updates but incur more overhead. Reactive protocols discover routes on demand but add latency. The document provides details on popular protocols like DSDV, AODV, DSR and TORA, explaining their route discovery, maintenance and metrics.
Spiro is a leading research and development organization in South India that provides training to individuals in various technologies and domains. It has been operating for over a decade. Spiro creates an environment with experts to help students improve their learning and become well-versed in their desired fields. It offers training in areas like wireless networks, cognitive radio networks, security and various IEEE transactions with the aim of meeting industry requirements. Spiro's training is focused on providing industry-based knowledge to students at different levels to help brighten their careers.
Mobile computing devices can be categorized as display-only devices, info pad models with limited processing, laptop computers, and personal digital assistants (PDAs). Mobile stations in a mobile network comprise the user equipment and software needed for communication. A GSM network consists of mobile stations, the base station subsystem including base transceiver stations (BTS) and base station controllers (BSC), and the network switching subsystem including mobile switching centers (MSCs) and databases. Mobile stations contain a mobile equipment component and a subscriber identity module (SIM) card. Ad hoc networks allow wireless nodes to connect and communicate without a preexisting infrastructure by forming a temporary network.
Review on design of advanced opportunistics routing in manetyatin1988
This document discusses mobile ad hoc networks and opportunistic routing. It provides background on MANETs, including their definition as temporary networks formed without infrastructure between wireless mobile nodes. It also covers applications of MANETs and challenges like mobility and link quality. The document introduces opportunistic routing as a forwarding technique for unpredictable MANET topologies. It reviews related work analyzing opportunistic routing and discusses using fuzzy logic to improve routing stability and availability in MANETs. The proposed work is to implement a fuzzy routing mechanism on the AODV protocol to optimize link availability and evaluate performance metrics like throughput and delay.
This document provides an overview of Mobile Ad Hoc Networks (MANETs) and routing protocols used in MANETs. It describes key characteristics of MANETs including that they are formed without pre-existing infrastructure and routes between nodes may contain multiple hops. It also discusses challenges in MANET routing like limited wireless range and mobility-induced route changes. The document then summarizes the Dynamic Source Routing (DSR) protocol, including how it uses route requests and route replies to discover routes, maintains routes in packet headers, and utilizes route caching for faster routing.
This document provides an overview of mobile ad hoc networks (MANETs). It defines MANETs as self-configuring wireless networks without a fixed infrastructure. The document discusses the key features of MANETs, including that they are autonomous, operate without a central coordinator, have a dynamic network topology, and use multi-hop routing. It also outlines some of the security challenges in MANETs, such as routing attacks, and lists some potential applications like military operations, disaster relief, and vehicle-to-vehicle networks.
The document discusses different types of wireless networks including Mobile Ad Hoc Networks (MANETs), Wireless Sensor Networks (WSNs), and Vehicular Ad Hoc Networks (VANETs). It provides an overview of the key characteristics of each network type, such as their topology, communication paradigms, and constraints. MANETs allow nodes to connect and communicate in a decentralized manner without infrastructure support. WSNs consist of dense deployments of low-cost sensor nodes that collect and transmit data. VANETs are similar to MANETs but involve vehicle-to-vehicle communication and have more predictable mobility patterns.
This document provides an overview of mobile ad hoc networks (MANETs) and several routing protocols used in MANETs. It defines MANETs and their characteristics. It then describes several representative routing protocols, including reactive (AODV, DSR), proactive (DSDV, TBRPF) protocols. It compares these protocols through simulations on metrics like packet delivery ratio, end-to-end delay, routing overhead under different traffic loads and node mobility. It finds that no single protocol performs best under all conditions and that fundamental open questions around scalability, energy efficiency and security remain.
Mobile ad-hoc networks (MANETs) allow devices to connect without a centralized infrastructure by forming a multi-hop wireless network. MANETs are useful in situations where infrastructure is unavailable, expensive to set up, or where rapid deployment is needed. Routing in MANETs is challenging due to the dynamic topology, asymmetric wireless links, and interference. Common routing protocols for MANETs include DSDV, DSR, AODV, and protocols that use clustering or geographic position information to improve routing performance.
Manet - The Art of Networking without a NetworkTarun Varshney
Mobile ad hoc network (MANET), or simply ad hoc network, comprises nodes that freely and dynamically self-organize into arbitrary and temporary network topology without any infrastructure support.
Mobile ad-hoc networks (MANETs) allow for content distribution, information dissemination, and file sharing between Bluetooth and WiFi devices in an enterprise network. MANETs form multicast tree topologies to disseminate data packets between nodes, with clusters of nodes creating a multicast tree structure. Mesh networks provide robust data services for mobile networks through dynamic autonomous topology segments as an inexpensive alternative to infrastructure-based cellular networks. Protocols like PUMA create mesh networks connecting MANET nodes with multiple paths between senders and receivers to improve packet delivery in mobile environments. MANETs also enable applications like remote imaging, messaging, and file transfers between devices like cameras and smartphones.
mobile ad-hoc network (MANET) and its applicationsAman Gupta
For free download Subscribe to https://www.youtube.com/channel/UCTfiZ8qwZ_8_vTjxeCB037w and Follow https://www.instagram.com/fitrit_2405/ then please contact +91-9045839849 over WhatsApp.
A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires. Ad hoc is Latin and means "for this purpose
This document discusses mobility management in mobile ad-hoc networks (MANETs). It begins by introducing MANETs and explaining that they are temporary networks formed spontaneously via wireless communication between mobile nodes without centralized administration. It then discusses the need for mobility management, including location management and handoff management routing protocols. It also discusses different types of node mobility and mobility models for predicting node movement patterns over time in MANETs. The document categorizes mobility models as trace-based (using real movement data) or synthetic-based (simulating realistic movement), and lists examples of models within each category like the random waypoint and reference point group mobility models.
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1Sushant Kushwaha
DSR deploys source routing, reacting dynamically to changes by maintaining only active routing addresses from source to destination. AODV is also a reactive protocol that maintains only active routes, with each node keeping a next-hop routing table. Route entries expire after a time limit. AODV adopts destination sequence numbers to ensure loop-free and up-to-date routes.
1. Vehicular ad hoc networks (VANETs) use vehicle-to-vehicle and vehicle-to-infrastructure communication to share safety information, improving road safety.
2. VANETs allow vehicles to form a temporary network without any preexisting infrastructure, distributing real-time information to avoid accidents.
3. Current research focuses on applications for traffic scenarios, as well as addressing challenges relating to network topology, routing mechanisms, security, and minimizing power consumption.
1. Wireless ad-hoc networks are collections of mobile nodes that dynamically form a temporary network without any fixed infrastructure. Nodes are able to communicate directly when within range, but rely on other nodes to forward packets when out of range.
2. Two routing protocols for ad-hoc networks are described: Destination-Sequenced Distance Vector (DSDV) which is a table-driven protocol that uses routing tables and sequence numbers to distribute routing information, and Cluster-Head Gateway Switch Routing (CGSR) which groups nodes into clusters with a head node to route packets between clusters.
3. Routing in ad-hoc networks is challenging due to the lack of infrastructure and changing network topology. The protocols described aim
This document discusses mobile ad-hoc networks (MANETs). It defines MANETs as wireless infrastructureless networks where each node is willing to forward data for other nodes. The document outlines the history of MANETs including early packet radio networks. It describes key features like multi-hop routing and the ability for nodes to join or leave the network dynamically. Examples applications discussed include military, disaster recovery, and sensor networks. Finally, the document notes limitations of MANETs such as bandwidth constraints, energy limitations, and security issues.
The document summarizes routing security in ad hoc wireless networks. It discusses the characteristics of ad hoc wireless networks and routing protocols used, including proactive, reactive, and hybrid protocols. It then covers various security attacks on routing protocols like passive attacks, active attacks, impersonation attacks, and attacks using modification or fabrication. Finally, it discusses some security mechanisms and routing protocols that aim to provide security, such as SEAD, Ariadne, SAR, and SRP.
An ad hoc network is a type of wireless network that does not require a central router or base station. Nodes communicate directly with each other or through intermediate nodes in a multi-hop fashion without any fixed infrastructure. Routing and resource management are distributed. Common types include wireless mesh networks, wireless sensor networks, and hybrid wireless networks. Ad hoc networks face challenges related to medium access, routing, security, and resource constraints due to the lack of centralized control.
This document discusses wireless communications and ad hoc networks. It begins with an introduction to wireless communications, including the generations of wireless technologies and electromagnetic spectrum used. It then covers wireless computer networks, focusing on wireless local area networks (WLANs) and transmission techniques like infrared and spread spectrum. The document explains the IEEE 802.11 standard architecture, including components like access points, basic service sets, and extended service sets. It discusses security issues and considerations for wireless networks. Finally, it defines ad hoc networks as decentralized peer-to-peer networks without a central access point, set up temporarily to meet immediate needs.
Lecture 1 mobile and adhoc network- introductionChandra Meena
This document provides an overview of a course on mobile and ad hoc networks. It lists two textbooks that will be used and states that the goal is to cover fundamental design issues and solutions for network architecture and protocols. It also lists some related websites and outlines the objectives of chapters that will introduce wireless communication technologies, network standards, and multiple access techniques for ad hoc networks.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...eSAT Journals
Abstract A mobile ad hoc networks (MANET) is characterized by multihop wireless connectivity consisting of independent nodes which move dynamically by changing its network connectivity without the uses of any pre-existent infrastructure. MANET offers[1, 2] such flexibility which helps the network to form anywhere, at any time, as long as two or more nodes are connected and communicate with each other either directly when they are in radio range or via intermediate mobile nodes. Routing is a significant issue and challenge in ad hoc networks and many routing protocols have been proposed like OLSR, AODV, DSDV,DSR, ZRP, and TORA, LAR so far to improve the routing performance and reliability. This research paper describes the characteristics of ad hoc routing protocols OLSR, AODV and ZRP based on the performance metrics like packet delivery ratio, end–to–end delay, throughput and jitter by increasing number of nodes in the network. This comparative study proves that OLSR, ZRP performs well in dense networks in terms of low mobility and low traffic but in high mobility and high traffic environment ZRP performs well than OLSR and AODV. Keywords: MANET, AODV, OLSR, ZRP, routing
A comprehensive review on performance of aodv protocol for wormhole attackeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
Abstract Mobile ad hoc network (MANET) is a dynamic network without fixed infrastructure due to their wireless nature and can be deployed as multi-hop packet networks. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. A Reactive (on-demand) routing strategy is a popular routing category for wireless adhoc routing. The primary objective of this paper is to do comparative study of the performance of routing protocols Destination-Sequenced Distance-Vector (DSDV), Dynamic Source Routing (DSR) and Ad-hoc on demand Distance Vector (AODV) for wireless ad hoc networks in a simulated environment against varying network parameters. The evaluations are done by means of simulations using NS-2 network simulator. The study was done on the basis of performance metrics: throughput, packet delivery function, end-to-end delay, routing overhead and packet lost. Simulation results show that despite in most simulations reactive routing protocols DSR and AODV performed significantly better than proactive routing protocol DSDV for the CBR based traffic. Keywords- component; Mobile Adhoc Network, Routing protocol, DSR, AODV, DSDV
Collective approach for manets to support packet loss and delay sensitive app...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Discovering adaptive wireless sensor network using β synchronizereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Discovering adaptive wireless sensor network using eSAT Journals
Abstract When we consider the standard Bellman-Ford algorithm, it uses static values of link cost function and distance function. These static values are stored in sink node so that the sink node requires memory to keep data safe. Therefore the space, message and time complexity of a network and node increases. To overcome this we discover Fast Time Dependent Shortest Path algorithm with message and used in network with β synchronizer. The FTSP algorithm uses dynamic values of link cost function and distance function and to store these values we are using vector compression method so that there is no need to store the data into the sink node. Because of this the message, time and space complexity of node will be decreases. Keywords- Duty cycle, Time dependent, β synchronizer
Wireless Sensor Network (WSN) is partially distributed autonomous sensors to monitor physical or environmental conditions such as temperature, pressure etc. and to cooperatively pass their data through the network to the central location. The technique referred to as multi-hop wireless communications is used by the WSN’s to communicate. Due to the limited processing power and the finite power accessible to each sensor nodes, the application of regular routing techniques is not recommended. Hence recent advances in wireless sensor networks have made the routing protocols more efficient. This paper surveys and compares the advanced routing protocols. The three main categories discussed here are flat based, hierarchical based and location based. The paper concludes with open research issues.
Analysis of zone routing protocol in maneteSAT Journals
Abstract MANET is combination of wireless mobile nodes that communicate with each other without any kind of centralized control or any device or established infrastructure. Therefore MANET routing is a critical task to perform in dynamic network. Without any fixed infrastructure, wireless mobile nodes dynamically establish the network. Routing Protocols helps to communicate a mobile node with the other nodes in the network by sending or receiving the packets. This research paper provides the overview of ZRP by presenting its functionality. The performance of ZRP (Zone Routing Protocol) is analyzed on the basis of parameters Throughput, Load, Data Dropped and Delay using simulator OPNET 14.0. Index Terms: MANET, Routing Protocols, ZRP
A comprehensive review on performance of aodv and dsdv protocol using manhatt...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A comprehensive review on performance of aodv and dsdv protocol using manhatt...eSAT Journals
This document compares the performance of two mobile ad hoc network (MANET) routing protocols: Destination Sequenced Distance Vector (DSDV) and Ad Hoc On-Demand Distance Vector (AODV). DSDV is a proactive, table-driven protocol that maintains complete routing tables and periodically transmits updates when network topology changes. AODV is a reactive, on-demand protocol that discovers routes only when needed through a route discovery process. The document analyzes the protocols' throughput, delay, overhead, and delivery ratio using Manhattan Grid mobility modeling through simulation.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Performance evaluation of various types of nodes in manet with dsr routing pr...eSAT Journals
Abstract Day by day, wireless communication popularity growing fast, it has led wireless communication data rates higher and made its prices cheaper, that’s why wireless communication is growing so fast. The latest technological demands now a day’s arising from laptops, wireless devices such as wireless local area networks (LANs) etc. In this paper we compared different types of node in MANET like static nodes, dynamic nodes and dynamic nodes with trajectory by using Dynamic routing protocol (DSR) and compared the performance of these nodes by using OPNET simulator 14.5. The performance is evaluated under different parameters like Data Dropped (Retry Threshold Exceeded), Load, Media access delay and Network Load by using FTP load. Keywords: MANET, Peak Value, Protocol, Trajectory.
This document evaluates the performance of different node types in a mobile ad hoc network (MANET) using the dynamic source routing (DSR) protocol. It simulates static nodes, dynamic nodes that move randomly, and dynamic nodes following trajectory paths. The OPNET simulator is used to compare performance based on data dropped, load, media access delay, and network load under an FTP traffic load. The results found that dynamic nodes generally had better performance than static nodes across the metrics, while dynamic nodes following trajectories performed best, experiencing lower data dropped, load, delays and network load.
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
This document analyzes the performance of energy efficient cross-layer load balancing in tactical multi-gateway wireless sensor networks. It compares the performance of AODV routing under four different modes: Normal, Optimal, Compressed, and Optimal Compressed. The Optimal Compressed mode uses both load balancing and data compression (Run Length Encoding) and performs best with the lowest delay, highest energy fairness, lowest packet loss rate, and lowest routing overhead according to simulations run in NS2. The proposed approach of using both load balancing and compression outperforms using either technique alone or without them, improving important network metrics like lifetime.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...eSAT Journals
Abstract
Wireless Technology has an enormous use these days and is still becoming popular from times immemorial. It is at its peak when we
talk about research. This is because of the latest technological demands now days arising from Laptops, Wireless devices such as
Wireless local area networks (WLANs) etc. Because of its fast growing popularity day by day, it has led wireless technology data rates
higher and it has made its price cheaper, which is why wireless Technology is growing so fast. In this paper we have presented some
most commonly used routing protocols in MANET and compared the performance of AODV, OLSR, GRP and DSR routing protocol
by using OPNET simulator 14.5. The performance is evaluated under different parameters like Delay, Load, and Media access delay,
Network Load, Retransmission and Throughput for Database load.
Keywords— MANET, Peak Value, Protocol, Drop value
Features of wsn and various routing techniques for wsn a surveyeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Features of wsn and various routing techniques for wsn a surveyeSAT Journals
Abstract A Wireless Sensor Network is the collection of large number of sensor nodes, which are technically or economically feasible and measure the ambient condition in the environment surrounding them. The difference between usual wireless networks and WSNs is that sensors are sensitive to energy consumption. Most of the attention is given to routing protocols, for energy awareness, since they might differ depending on the application and network architecture. Routing techniques for WSN are classified into three categories based on network structure: Flat, hierarchical and location-based routing. Furthermore, these protocols can be classified into multi-path based, query based, negotiation-based, QoS-based, and coherent–based, depending on the protocol operation. In this paper the survey of routing techniques in WSNs is shown. It is also outlined the design challenges and performance metrics for routing protocols in WSNs. Finally We also highlight the advantages and performance issues of different routing techniques by it’s comparative analysis. Future-directions for routing in sensor network is also described. Index Terms: Wireless sensor network, Routing techniques, Routing challenges and future directions.
Similar to Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet) (20)
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
This document summarizes a study on stabilizing expansive black cotton soil with the natural inorganic stabilizer RBI-81. Laboratory tests were conducted to evaluate the effect of RBI-81 on the soil's engineering properties. The tests showed that with 2% RBI-81 and 28 days of curing, the unconfined compressive strength increased by around 250% and the CBR value improved by approximately 400% compared to the untreated soil. Overall, the study found that RBI-81 effectively improved the strength properties of the black cotton soil and its suitability as a soil stabilizer was supported.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
This document summarizes a study on the influence of compaction energy on soil stabilized with a chemical stabilizer. Laboratory tests were conducted on locally available loamy soil treated with a patented polymer liquid stabilizer and compacted at four different energy levels. The study found that increasing the compaction effort increased the density of both untreated and treated soil, but the rate of increase was lower for stabilized soil. Treating the soil with the stabilizer improved its unconfined compressive strength and resilient modulus, and reduced accumulated plastic strain, with these properties further improved by higher compaction efforts. The stabilized soil exhibited strength and performance benefits compared to the untreated soil.
Geographical information system (gis) for water resources managementeSAT Journals
This document describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) to meet the information needs of various government departments related to water management in a state. The HIS consists of a hydrological database coupled with tools for collecting and analyzing spatial and non-spatial water resources data. It also incorporates a hydrological model to indirectly assess water balance components over space and time. A web-based GIS portal was created to allow users to access and visualize the hydrological data, as well as outputs from the SWAT hydrological model. The framework is intended to facilitate integrated water resources planning and management across different administrative levels.
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
This document summarizes an experimental study that tested circular concrete-filled steel tube columns with varying parameters. 45 specimens were tested with different fiber percentages (0-2%), tube diameter-to-wall-thickness ratios (D/t from 15-25), and length-to-diameter (L/d) ratios (from 2.97-7.04). The results found that columns filled with fiber-reinforced concrete exhibited higher stiffness, equal ductility, and enhanced energy absorption compared to those filled with plain concrete. The load carrying capacity increased with fiber content up to 1.5% but not at 2.0%. The analytical predictions of failure load closely matched the experimental values.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
This document evaluates the operational efficiency of an urban road network in Tiruchirappalli, India using travel time reliability measures. Traffic volume and travel times were collected using video data from 8-10 AM on various roads. Average travel times, 95th percentile travel times, and buffer time indexes were calculated to assess reliability. Non-motorized vehicles were found to most impact reliability on one road. A relationship between buffer time index and traffic volume was developed. Finally, a travel time model was created and validated based on length, speed, and volume.
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
This document summarizes a study that used remote sensing and GIS techniques to estimate morphometric parameters and runoff for the Yagachi catchment area in India over a 10-year period. Morphometric analysis was conducted to understand the hydrological response at the micro-watershed level. Daily runoff was estimated using the SCS curve number model. The results showed a positive correlation between rainfall and runoff. Land use/land cover changes between 2001-2010 were found to impact estimated runoff amounts. Remote sensing approaches provided an effective means to model runoff for this large, ungauged area.
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Impartiality as per ISO /IEC 17025:2017 StandardMuhammadJazib15
This document provides basic guidelines for imparitallity requirement of ISO 17025. It defines in detial how it is met and wiudhwdih jdhsjdhwudjwkdbjwkdddddddddddkkkkkkkkkkkkkkkkkkkkkkkwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwioiiiiiiiiiiiii uwwwwwwwwwwwwwwwwhe wiqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq gbbbbbbbbbbbbb owdjjjjjjjjjjjjjjjjjjjj widhi owqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq uwdhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhwqiiiiiiiiiiiiiiiiiiiiiiiiiiiiw0pooooojjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj whhhhhhhhhhh wheeeeeeee wihieiiiiii wihe
e qqqqqqqqqqeuwiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiqw dddddddddd cccccccccccccccv s w c r
cdf cb bicbsad ishd d qwkbdwiur e wetwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww w
dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffw
uuuuhhhhhhhhhhhhhhhhhhhhhhhhe qiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii iqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc ccccccccccccccccccccccccccccccccccc bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbu uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuum
m
m mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm m i
g i dijsd sjdnsjd ndjajsdnnsa adjdnawddddddddddddd uw
This presentation is about Food Delivery Systems and how they are developed using the Software Development Life Cycle (SDLC) and other methods. It explains the steps involved in creating a food delivery app, from planning and designing to testing and launching. The slide also covers different tools and technologies used to make these systems work efficiently.
We have designed & manufacture the Lubi Valves LBF series type of Butterfly Valves for General Utility Water applications as well as for HVAC applications.
Levelised Cost of Hydrogen (LCOH) Calculator ManualMassimo Talia
The aim of this manual is to explain the
methodology behind the Levelized Cost of
Hydrogen (LCOH) calculator. Moreover, this
manual also demonstrates how the calculator
can be used for estimating the expenses associated with hydrogen production in Europe
using low-temperature electrolysis considering different sources of electricity
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...DharmaBanothu
The Network on Chip (NoC) has emerged as an effective
solution for intercommunication infrastructure within System on
Chip (SoC) designs, overcoming the limitations of traditional
methods that face significant bottlenecks. However, the complexity
of NoC design presents numerous challenges related to
performance metrics such as scalability, latency, power
consumption, and signal integrity. This project addresses the
issues within the router's memory unit and proposes an enhanced
memory structure. To achieve efficient data transfer, FIFO buffers
are implemented in distributed RAM and virtual channels for
FPGA-based NoC. The project introduces advanced FIFO-based
memory units within the NoC router, assessing their performance
in a Bi-directional NoC (Bi-NoC) configuration. The primary
objective is to reduce the router's workload while enhancing the
FIFO internal structure. To further improve data transfer speed,
a Bi-NoC with a self-configurable intercommunication channel is
suggested. Simulation and synthesis results demonstrate
guaranteed throughput, predictable latency, and equitable
network access, showing significant improvement over previous
designs
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 339
IMPLEMENTATION OF DYNAMIC SOURCE ROUTING (DSR) IN
MOBILE AD HOC NETWORK (MANET)
Thiyam Romila Devi1
, Rameswari Biswal2
, Vikram Kumar3
, Abhishek Jena4
1, 2, 3, 4
M.Tech, School of Electronics, KIIT University, Odisha, India
romilath@gmail.com, rameswaribiswal@gmail.com, vikram_2006be@yahoo.co.in, bapuni207@gmail.com
Abstract
Generally, the Base station (BS) is fixed in the mobile communication system however in Mobile Ad hoc network, Base Station (BS)s
is not used, thus it is named as infrastructure less network which can manage its network independently. The Routing protocol plays
an important role and a lot of research has been done in this area. This paper presents a protocol for routing mobile ad hoc network
(MANET) that uses dynamic source routing. This protocol adapts quickly to the change in the routing path as the host is changing its
location frequently. DSR allows the network to be fully self-organising and self-configuring without the need for any existing network.
The protocol is composed of the two mechanisms of route discovery and route maintenance work together to search for the shortest
path and also to maintain source route to arbitrary destination in the Mobile ad hoc network, we used optimize routing protocol in
Mobile ad hoc network (MANET).This optimization is done on DSR (Dynamic Source Routing) protocol using ANT algorithm. The
performance of DSR is analyzed using Qualnet 5.2 with respect to QOS (Quality of Service) of throughput, end to end delay, Routing
overhead, Average hop count. All the parameter are analyzed in three different scenario of velocity, pause time and traffic connection.
All the result are compared with the result of standard DSR routing protocol. The comparison shows that the DSR-ant has better
performance than standard DSR. By using Ant algorithm, the DSR optimization can be improved with a smaller delay and the number
of hop to transfer information between nodes.
Keywords: MANET, DSR, ANT Algorithm
----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
1.1 MANET Overview
Mobile ad hoc network (MANET) is a autonomous and
dynamic network consist of wireless mobile hosts or nodes.
For example, communication between remote notes is based
on multiple hop. These nodes are dynamically and arbitrarily
located in such a manner that the interconnections between
nodes are capable of changing on a continual basis. Thus
MANETs are self configuring as there is no central
management system with configuration responsibilities. All
the mobile nodes can communicate each other directly if they
are in others wireless links radio range. In order to enable data
transfer they either communicate through single hop or multi
hop with the help of intermediate nodes. MANETs allow
ubiquitous service access anywhere, anytime without any
fixed infrastructure, thus named as an infrastructure-less
network that can be widely used in military, battlefields,
management services, classrooms, various multimedia
applications and conference halls. The Fig-1. shows the
MANET
Fig-1: Infrastructure less Network
1.2 DSR Protocol and Optimization
The DSR (Dynamic source routing) protocol is a simple and
efficient routing protocol for wireless mesh network which is
designed for the use in multi- hop wireless ad hoc network of
mobile nodes. DSR allows the network to be completely self-
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 340
organizing and self-configuring, without the need of any
predefined infrastructure. This protocol is composed of the
two main mechanisms of a) Route discovery and b) Route
maintenance. These two work together to allow nodes to
discover and maintain routes to arbitrarily destination in the ad
hoc network [1].
1.2.1 Route Discovery
Route Discovery is used to discover a route from source to
particular destination using two stages; Route request (RREQ)
and Route Reply(RREP). This method also includes some
optimization measures; during route request process, and
intermediate node can be authorized to issue a complete route
reply if it contains a valid route to the destination in its route
cache memory. Whenever a source wants to communicate
with destination and if it does not have a route in its Route
Cache, it broadcasts a RREQ message to find a particular
route. Each neighbour receives the RREQ and appends its
own address to the address list in the RREQ (if it has not
already processed the same request earlier) and re-broadcasts
the packet. This process will continue until either the
maximum hop counter is incremented (or RREQ is rejected)
or the destination is reached. The destination receives the
RREQ, appends its address and generates a route reply packet
(RREP) back towards the source using the reverse of the
accumulated route in latter case. When the source finally
receives RREP, it will store the route in its Route Cache [2].
Fig-2: DSR Route Discovery
During the process of discovery, there's a problem that should
be noticed. In the Figure1 above, node D may receive the
router requests both from node C and node E at the same time,
this will lead to the message collision, and the correct requests
cannot be accepted. Therefore, the broadcast in Ad hoc
network isn't reliable. This kind of problem can be avoided by
random delay transmission, authentication and so on.
However, random delay transmission cannot guarantee to
choose the best suitable router item, while the authentication
has to send more router control messages, thus results in more
resource wasted and load aggravation. There comes up a new
algorithm to solve this problem, i.e. ANT Algorithm
1.2.2 Route Maintenance
Route Maintenance is used to manage (cache, expire, switch
among) previously discovered routes. Once some nodes find
the neighbouring link that data is to be sent by is disconnected,
they immediately send a route error message RERR to source
node. When the source node receives the error packet, it
deletes all the routes that use the invalid link from the buffer,
and starts a new route discovery process if necessary. The
nodes that forward the error packet along the way delete all
the route in the broken link from their own routing table. The
route discovery procedure of DSR protocol often discovers
many routes from source node to destination node. And route
with minimal hop is more possible chosen for data
transmission than others, the nodes frequently chosen are more
likely to consume more energy, which results in short usage of
battery.
1.3 Architecture of Mobile communication system
based on DSR
DSR is used to replace the former routing protocol in BS. In
the same time the backbone network of mobile
communication system becomes an entire IP network. Every
BS has assigned a unique IP address and the data transmitted
between the BSs results into the IP formation of the same data.
The Fig- 2. Shows BS of Mobile communication network after
the improvement.
The basic elements of BS are-
a) Wireless link control layer- This layer defines reliable data
transmission between MS and BS in circuit mode and it can be
expanded like as link layer.
b) Wireless resource management layer- It both builds and
removes the wireless link between MS and BS for the MS
where it moves in network when the link state transmission is
being maintained.
c) Mobility management layer- It realizes some functions of
MS such as user's register and authorization in the service area
of different BSs.
d) Communication management layer- It realizes the functions
of management to wireless users such as routing management
and routing management.
e) Switching- It realizes the IP's disposal of data. It can be
discovered and maintained the route between BSs of source
MS and destination MS according to DSR protocol.
f) Wireless channels (Uu) interface- It defines the wireless
interface between BS and Ms.
g). Wireless channels (lu) interface- It defines the wireless
interface between BSs.
The Fig-3 shows the data flow from one BS to another BS
with two wireless hops in mobile communication with the
entire mobility of data and also shows how the inclusion of
more intermediate BSs would behave. The MS originates a
typical data packet and is arriving at the BS A through Uu
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 341
interface. At BS A the packet must transverse the entire
protocol stacks, from the Uu interface down to the lu interface.
At the intermediate BS, the packet must brought up to DSR
sub layer and will be examined and is sent out again. Hence ,
packets do not go beyond the DSR sub layer in the route. All
the packets are originated from and is terminated at the sub
layer of DSR. The relaying of control packets is same as that
of the data packets.
Fig-3: BS of Mobile Communication Network
2. ANT ALGORITHM
ANT algorithm is an algorithm that is similar as the behavior
of ant colonies, known as ant system. Ant can find the
shortest route between the nest and the food source by
footprints or pheromones on the path that has been
traversed. Ants are practically blind but they still manage to
find their way to and from food. These observations inspired a
new type of algorithm called ant algorithms (or ant
systems)[3][4][5][6]. In order to determine the shortest route,
Ant algorithm is being used and the steps of determining are
as follows:-
a). Initialization parameters value algorithm. The intensity of
inter-node ant trail and changes (τij), many of nodes (n)
includes the coordinates (x, y) or the distance between
nodes (dij), Origin node and destination node, constant
cycle of ants (Q), constant intensity controller ant trail (α),
the value of α ≥ 0, constant control visibility (β), the
value of β ≥ 0, visibility between nodes = 1/dij (ηij), the
number of ants (m), evaporation constant trail of ants (ρ),
ρ values must be > 0 and <1 to prevent infinite
pheromone trail, and the maximum number of cycles
(NCmax) is fixed during the algorithm run, while costs
(τij) will be updated at each cycle algorithm from the
first cycle (NC = 1) to reach the maximum number of
cycles (NC = NCmax) or until there is convergence. After
we initialization parameters, further we Initialize the first
node each ant. First performed initialization (τij), then (m)
ants are placed on certain first node randomly. This ant
called forward ant packet, it will trace the route to the
destination node. When it was discovered the destination
node, the ants would go back through the same route. In
this condition the ant called backward ant.
b). Charging the first node in the tabu list. Tabu list is a table
containing the visibility of information between nodes.The
results of the first node initialization every ant in first step
should be filled as the first element of the table list. The
result of this step is to fill its first element table list each ant
with a particular node index, which means that every
tabuk (1) can contain node index between 1and n as the
initialization in step (a).
c). Composition of each ant route to all node. Ant colonies
that have been distributed to some or each node will start to
travel from each first node as the origin node and one
other node as the destination node. Then from the second
node, respectively, ant colonies will continue the trip by
choosing one of the nodes that are not on tabuk as the next
destination node. Journey ant colony continues until all the
nodes one by one visited or have occupied tabuk.If s expressed
sequence index visit, expressed as tabuk origin node (s) and
other node is expressed as {Ntabuk}, then the destination
node is used to determine the probability of the node
equations to visit [3][4][5][6]:
= (1)
for j , for other j with I
as the index of the origin node and J as index destination
node.
d). Calculation of route length of every ant. Calculation of
closed route length (length closed tour) or Lk any ants
performed after one cycle completed by all ants. This
calculation is done based each tabuk with the following
equation with dij is the distance between node i to node j
[3][4][5][6] :
(2)
(3)
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 342
to search the shortest route. After every ant Lk is
calculated, will get a minimum length of each cycle routes
closed or Lmin NC and minimum values on the whole length
of the route is closed or Lmin. Calculation of changes in
the value of the intensity of inter-node ant footprints. Ant
colonies will leave footprints on the path between the nodes in
its path. The existence of evaporation and the difference in
the number of ants making the possibility of a change in the
value of the intensity of inter-node ant footprints. The
equation this changes is [3][4][5][6] :
(4)
Changes in intensity values between nodes and
footprints every ant is calculated based on the equation:
, for (i,j) origin node and destination node
in tabuk (5)
= 0, for other (i,j)
e). The calculation of the value of the intensity of internodes
ant footprints for the next cycle. Ant footprints intensity
values between nodes on all paths between nodes is likely
to change due to evaporation and the difference in the
number of ants that passed. For the next cycle, the ant will
pass the track intensity prices have changed. Ant footprints
intensity values between nodes for the next cycle is
calculated by the equation [3][4][5][6]:
= P* (6)
further Reset the value of the intensity changes between
nodes ant footprints. For the next cycle of price changes
ant trail intensity between the nodes need to be rearranged
in order to have a value equal to zero.
f). Emptying of tabu list, and repeat step b if necessary.
Tabu list needs to be emptied to be filled again with the
new order of nodes in the next cycle, if the maximum
number of cycles has not been achieved or has not
convergence. Algorithm is repeated from step b with prices
intensity parameter ant footprints among nodes that have
been updated.
3. SIMULATION
3.1. Simulation Parameter
In this paper we simulate the transmission of packet data in
mobile Ad Hoc network using DSR protocol that has been
optimized using Ant algorithm ( DSR-Ant). For simulation we
have used Qualnet 5.2 Software. In our simulation we have
taken simulation area 500X500 meters, radio propagation
model Rayleigh and Rician and simulation time 100ms. The
performance will be measured in terms of Qos parameters of
delay and throughput. For analyzing routing scenario, we have
considered routing overhead and hop count. Above mentioned
parameters plays very important roles in analyzing the
network. Delay and throughput parameter gives performance
at receiver side and routing overhead and hop count parameter
used to analyze routing performance based on algorithm used.
3.2. Scenario Analysis
We have analyzed three scenarios to evaluate DSR
performance in velocity of node movement. This is to evaluate
the routing protocol performance in velocity variation and
environment.
In first scenario, we have fixed nodes and increasing
the velocity of node and data is being transmitted
between the nodes. In this we used 9 values between
2m/s to 18m/s.
In second scenario, we implement various pause time
to evaluate routing protocol performance in dynamic
network. We have used pause time values between
10s to 100s.
In third scenario, we have implemented constant
velocity with increasing traffic connection between
the node. We have used ten different traffic
connection and the number of node between 2 to 20.
When there is more traffic then queuing is higher and
produces congestion in network.
4. RESULT AND ANALYSIS
4.1. For velocity scenario
The result shows higher throughput and smaller end -to-end
delay as shown in Fig-4.1(a) and Fig-4.1(b)[7]. DSR-ant
searches the best path needs more routing overhead in a
manner such that protocol find shortest path with smaller hop
change in velocity will effect the shape and configuration of
network data transmission path. In this scenario, we have
analyzed that DSR-ant performance is better than standard
DSR in throughput, smaller end-to-end delay and number of
hop to send the message but DSR-ant has larger routing
overhead.
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 343
Fig-4.1: (a) Throughput
Fig-4.1: (b) End-to-end delay
4.2. Result and Analysis Pause Time Scenario
The Fig-4.2(a) and Fig-4.2(b)[7] shows the pause time
scenario of end-to-end delay and Throughput. We have
analyzed that DSR-ant has smaller end-to-end delay because
this algorithm can search most efficient path with higher
throughput than standard DSR.
Fig-4.2: (a) End-to-end delay
Fig-4.2: (b) Throughput
4.3. Result and Analysis Traffic Connection Scenario
The traffic connection scenario is shown in Fig-4.3 (a), (b), (c)
and (d)[7]. When we are increasing traffic connection in the
network between the user or node will create congestion,
larger number of packets will wait in queue in the system and
lesser bandwidth. The routing protocol that has been
optimized with Ant algorithm can improved the performance
with smaller end-to-end delay and lesser number of hop. DSR-
ant have higher throughput in comparison to standard DSR but
due to complex calculation in DSR-ant to find the shortest
path, we have higher value of routing overhead.
Fig-4.3: (a) End-to-end delay
Fig-4.3: (b) Throughput
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 344
Fig-4.3: (c) Routing overhead
Fig-4.3: (d) Average hop count
CONCLUSIONS
Ant algorithm is a very good tool to be implemented in
optimization of mobile ad hoc network. we have implemented
it using Qualnet 5.2 in reference to three different scenario and
compared our result with a standard DSR. Our result shows
that DSR-ant can improve the performance of MANET in
respect to end-to-end delay, throughput and number of hop to
transfer the message from sender to receiver. We can reduce
time needed to search for the shortest path using the Ant
algorithm. This will makes our mobile Ad hoc network faster
REFERENCES
[1]. Istikmal, Meylanie Olivya, "Performance Analysis of
Routing Protocol on Data Forwarding Effectiveness in
Mobile Ad hoc Network", Proceedings of The 5th
International Conference on Telematics System, Services
and Applications. Institute Technology of Bandung,
November 19-21, 2009.
[2]. Zhaohua Long, Zheng He."Optimization and
Implementation of DSR Route Protocol based on Ad hoc
network".
[3]. Gianni Di Caro and Marco Dorigo. “AntNet: Distributed
Stigmergetic Control for Communications Networks”. Journal
of Artificial Intelligence Research, 9:317–365, 1998.
[4]. Gianni Di Caro."Ant Colony Optimization and Its
Application to Adaptive Routing in Telecommunication
Network"
[5]. Vincensius LR, Indrarini Dyah I, Istikmal . "Performance
Analysis DSDV and ZRP based Ant algorithm at Mobile Ad
hoc network". Telecommunications Journal of Research and
Development, december 2010 volume 15-number 2,pp-109
[6]. Leksono, Agus.“Ant Colony Optimization (ACO)
Algorithm to Completed Travelling Salesman Problem (TSP).
Faculty of Mathematics and natural Sciences, University of
Dipengoro,2009.
[7]. Istikmal."Analysis And Evaluation Optimization Dynamic
Source Routing ( DSR ) Protocol in Mobile Adhoc Network
Based on Ant Algorithm". International Conference of
information and communication technology (ICoICT),2013.
BIOGRAPHIES
Thiyam Romila Devi:- Has received B.E
in Electronics and communication
Engineering from KNSIT, Bangalore
under Visvesvaraya Technological
University (VTU),Belgaum, India. She is
presently pursuing M. Tech from KIIT-
University, Bhubaneswar, Odisha, India with specialization in
Communication System Engineering (ETC).
Rameswari Biswal: Has received B.Tech in
Electronics and Communication Engineering
from BCET, Balasore under Biju Patnayak
University of Technology (BPUT), India.
She is presently pursuing M. Tech from
KIIT-University, Bhubaneswar, Odisha, with
specialization in Communication System Engineering (ETC).
Vikram Kumar:- Has received B.E. in
Electronics and communication
Engineering from LNCT, Bhopal under
Rajiv Gandhi Proudyogiki vishwavidyalaya
(RGTU), India. He is presently pursuing
M. Tech from KIIT-University, Bhubaneswar, Odisha, with
specialization in Communication System Engineering (ETC).
7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 345
Abhishek Jena:- Has received B. Tech in
Electronics and communication
Engineering from SRM College of
Engineering ,Chennai under SRM
University, India. He is presently
pursuing M. Tech from KIIT-University,
Bhubaneswar, Odisha, with specialization
in Communication System Engineering (ETC)