SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Engineering Science Invention
ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726
www.ijesi.org Volume 2 Issue 9 ǁ September. 2013 ǁ PP.17-19
www.ijesi.org 17 | Page
Virtual Force Geometric Routing Protocol In Non Planar Graphs
Brahma reddy Iska1
, Shirin Bhanu Koduri2
1
Department of computer science M.Tech scholar, Sri Vasavi Engineering College Tadepalligudem,
Andhra Pradesh, India
2
Department of I.T, Sri Vasavi Engineering College Tadepalligudem, Andhra Pradesh, India
ABSTRACT: Routing is the foremost issue in mobile ad hoc networks (MANETs). An ad hoc routing protocol
is a convention or standard that controls how nodes decide which way to route packets between computing
devices in a mobile ad hoc network. Here first, we construct a virtual small-world network by adding virtual
long links to the network to reduce the number of local minima. Second, we use the virtual force method to
recover from local minima without relying on face routing. Combining these two methods, we propose a purely
greedy routing protocol.
KEYWORDS: mobile ad hoc networks (MANETs), small-world model, virtual force.
I. INTRODUCTION
A mobile ad hoc network (MANET) is comprised solely of wireless stations. The communication
between two nodes may require a traversal of multiple hops due to a limited range. Existing routing algorithms
can be broadly classified into topology-based and position-based routing protocols. Topology-based routing
determines a route based on complete network topology as state information.
In order to recover from a local minimum most existing protocols switch to a less efficient mode
known as face routing. Face routing runs on a planar graph (a graph without crossing edges), in which the
messages is routed around the perimeter of the face (an area surrounded by the edge in the planar graph) which
intersects the line between the source and the destination.
In this project, we are going to remove the local minimum problem (face routing) by using two new
methods.
1. Construct a virtual small-world network
Specifically, each node in the network constructs some remote contacts connected by virtual long links
(VLLs). Each VLL consists of multiple consecutive physical links. By using these VLLs is to reduce the number
of local minima for each destination and increase the success rate of the greedy routing.
2. Virtual force (VF)-based greedy routing
It can recover from local minima without resorting to face routing. In this method, a message is
forwarded along the increasing gradient of the composition of the VFs. Each VF has a source. The destination is
the only source of an attractive (positive) VF. Whenever the greedy method fails in a local minimum under the
composition of the VFs, a new source of a repulsive (negative) VF is added to the loacal minimum to expel the
message from it. Thus, the local minimum is removed, and greedy routing is recovered. This method is an
iteration of greedy forwarding and local minimum removal.
II. CONCEPT
A MANET is a peer-to-peer network that allows direct communication between any two nodes, when
adequate radio propagation conditions exist between these two nodes and subject to transmission power
limitations of the nodes. If there is no direct link between the source and the destination nodes, multi-hop
routing is used. In multi-hop routing, a packet is forwarded from one node to another, until it reaches the
destination. Appropriate routing protocols are necessary to discover routes between the source and the
destination, or even to determine the presence or absence of a path to the destination node. Because of lack of
central elements, distributed protocols and algorithms have to be used.
The data is passing in MANETs by using in distributed routing protocols which are having the both
features.
 Proactive
Route is maintained in tables at each node resulting in quick routing.
 Reactive
Virtual Force Geometric Routing Protocol
www.ijesi.org 18 | Page
Route is found when we want to send a packet to its destination.
In MANETs the geographic routing nodes could get their location information either by global
positioning system (GPS) or localization algorithm. In geographic routing, a node makes routing decisions
according to its neighboring nodes location information. Since contemporaneous source to destination node
connection may not exist in disruption (Delay) Tolerant Network (DTN), location inaccuracy and network
disruptions have to be properly dealt with if geographic routing is applied on the network. And different DTN
networks have different network characteristics, such as different node densities and node communication
ranges a uniform routing approach is not the best choice in dealing with different situations.
III. PROPOSED WORK
1. Network Formation
A VLL can be considered as a virtual path between an arbitrary pair of nodes in the network, rather than as a
path for a specific pair of source and destination as in traditional routing such as DSR and AODV. Considering
scalability, the length of each VLL is under the power-law distribution. In our algorithm, each node periodically
sends out VLL discovery messages which go away and then come back to report a VLL. The first problem here
is the determination of maximum hop and direction of a message
2. Greedy Routing
Extending the traditional greedy protocol to our small world greedy routing, which uses VLLs and VF, is
straightforward. First, we define a general set of links of a node to be the set of links of the node containing both
the physical links to its neighbors and its VLLs. Thereafter, we use links to refer to the links in this general set
of links without causing confusion. We define the force of a VLL as the maximum force of the nodes in the
VLL.
3. SWING+ protocol
It is inherited from the family of greedy algorithms that may go to a local minimum and fail. The best part of
SWING+ is the iterative method that allows the message to continue to travel to the other parts of the network
after greedy failures in local minima. In order to recover from local minima, a list of VR is maintained in each
message which contains the positions of the encountered local minima that will exert repulsive (negative) VFs
to the message.
Algorithm for SWING+ Protocol
1: while the current node vi is not vd do
2: while the current node vi is a local minimum under
The force comp. do
3: Add vi to list VR.
4: end while
5: List the links which contain the physical links to all
Neighbors and all VLLs.
6: Calculate the virtual force (VF) on these links.
7: Send the message to the next node along the link
With the largest VF.
8: end while
IV. PROPOSED SYSTEM ARCHITECTURE
Source can check they neighbor nodes and send data by using VF geometric routing.
Fig. 1 Message sending process
Virtual Force Geometric Routing Protocol
www.ijesi.org 19 | Page
V. EXPERIMENTAL RESULT
Java swings concept is used to implement the proposed method.
User can create a node by clicking the batch file in bin folder.
He creates number of nodes as he whish.
The output is displayed in two types.
Type 1:
User can gives distance of the nodes and then discover neighbor nodes.
If the source distance is less than the destination distance then reverse routing is implemented.
So here the communication between destination and source is implemented.
Type 2:
User can gives distance of the node and then discover neighbor nodes
If the source distance is greater than the destination distance then normal routing is implemented.
So here communication between source and destination is implemented.
By using this proposed system user can implement the routing process effectively and can be done in non planar
graphs.
VI. CONCLUSION
The proposed system provides the more security and effectively.It takes the local minimum problem
from two new angles: constructing a virtual small-world network and using a VF-based greedy protocol to
recover from local minima. It combined these two methods and proposes the purely greedy routing protocol
SWING+, which is the first geometric routing protocol applicable in 3D networks.
VII. ACKNOWLEDGMENT
This paper is a part of our M.Tech Project. We are grateful to our project guide for valuable
suggestions, comments and contribution.
REFERENCES
[1]. L. Blazevic, L. Buttyan, S. Capkun, S. Giordano, J.-P. Hubaux, and J._Y Le Boudec, “Self-Organization in mobile Ad Hoc
networks: The Approach of Terminodes,” IEEE Comm. Magazine,pp. 166-175, june 2001.
[2]. P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia, “Routing with Guaranteed Delivery in Ad Hoc Wireless Networks,” Proc.
Third ACM Int’L Workshop Discrete Alogorithms and Methods for Mobile Computing and Comm. (DIALM), 1999.
[3]. S. Datta, I. Stojmenovic, and J. Wu, “Intemal Node and Shortcut Based Routing with Guaranreed Delivery in Wireless
Networks,”Cluster Computing, special issue on mobile ad hoc networks, vol.7, no. 2 , pp. 169-178, Apr. 2002.
[4]. R. Kleinderg, “Geographic Routing Using Hyperbolic Space,” Proc. IEEE INFOCOM, 2007.
[5]. HerbertSchildt, “The Complete ReferenceJAVA2” 7th
Edition Tata McGrawHills, 2001
[6]. Java Swing, 2nd
Edition, By Brain Cole, Robert Eckstein, James Elliott, Marc Loy, David Wood

More Related Content

What's hot

Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...JPINFOTECH JAYAPRAKASH
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetijcsa
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Yayah Zakaria
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Yayah Zakaria
 
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networksFlbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networksijcsit
 
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...ijwmn
 
JPD1428 Multicast Capacity in MANET with Infrastructure Support
JPD1428  Multicast Capacity in MANET with Infrastructure SupportJPD1428  Multicast Capacity in MANET with Infrastructure Support
JPD1428 Multicast Capacity in MANET with Infrastructure Supportchennaijp
 
QoS Oriented Coding For Mobility Constraint in Wireless Networks
QoS Oriented Coding For Mobility Constraint in Wireless NetworksQoS Oriented Coding For Mobility Constraint in Wireless Networks
QoS Oriented Coding For Mobility Constraint in Wireless Networksiosrjce
 

What's hot (16)

Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
E04402030037
E04402030037E04402030037
E04402030037
 
F04503057062
F04503057062F04503057062
F04503057062
 
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
 
P15
P15P15
P15
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 
Fa25939942
Fa25939942Fa25939942
Fa25939942
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
 
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networksFlbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networks
 
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
 
JPD1428 Multicast Capacity in MANET with Infrastructure Support
JPD1428  Multicast Capacity in MANET with Infrastructure SupportJPD1428  Multicast Capacity in MANET with Infrastructure Support
JPD1428 Multicast Capacity in MANET with Infrastructure Support
 
QoS Oriented Coding For Mobility Constraint in Wireless Networks
QoS Oriented Coding For Mobility Constraint in Wireless NetworksQoS Oriented Coding For Mobility Constraint in Wireless Networks
QoS Oriented Coding For Mobility Constraint in Wireless Networks
 

Similar to Virtual Force Geometric Routing Protocol for Non-Planar Graphs

Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic NetworksAuwal Amshi
 
An Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETAn Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETIOSRJECE
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantificationcsandit
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancingijdpsjournal
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...IJECEIAES
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmIOSR Journals
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...IOSR Journals
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSSHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSijasuc
 
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSSHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSijasuc
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
A Framework for Routing Misbehavior Recognition in MANETS
A Framework for Routing Misbehavior Recognition in MANETSA Framework for Routing Misbehavior Recognition in MANETS
A Framework for Routing Misbehavior Recognition in MANETSEECJOURNAL
 
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksIJTET Journal
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 

Similar to Virtual Force Geometric Routing Protocol for Non-Planar Graphs (20)

Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
 
An Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETAn Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANET
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
D1802032026
D1802032026D1802032026
D1802032026
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancing
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV Algorithm
 
C0431320
C0431320C0431320
C0431320
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSSHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
 
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSSHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
A Framework for Routing Misbehavior Recognition in MANETS
A Framework for Routing Misbehavior Recognition in MANETSA Framework for Routing Misbehavior Recognition in MANETS
A Framework for Routing Misbehavior Recognition in MANETS
 
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Secure routing Adhoc Networks
Secure routing Adhoc NetworksSecure routing Adhoc Networks
Secure routing Adhoc Networks
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Virtual Force Geometric Routing Protocol for Non-Planar Graphs

  • 1. International Journal of Engineering Science Invention ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org Volume 2 Issue 9 ǁ September. 2013 ǁ PP.17-19 www.ijesi.org 17 | Page Virtual Force Geometric Routing Protocol In Non Planar Graphs Brahma reddy Iska1 , Shirin Bhanu Koduri2 1 Department of computer science M.Tech scholar, Sri Vasavi Engineering College Tadepalligudem, Andhra Pradesh, India 2 Department of I.T, Sri Vasavi Engineering College Tadepalligudem, Andhra Pradesh, India ABSTRACT: Routing is the foremost issue in mobile ad hoc networks (MANETs). An ad hoc routing protocol is a convention or standard that controls how nodes decide which way to route packets between computing devices in a mobile ad hoc network. Here first, we construct a virtual small-world network by adding virtual long links to the network to reduce the number of local minima. Second, we use the virtual force method to recover from local minima without relying on face routing. Combining these two methods, we propose a purely greedy routing protocol. KEYWORDS: mobile ad hoc networks (MANETs), small-world model, virtual force. I. INTRODUCTION A mobile ad hoc network (MANET) is comprised solely of wireless stations. The communication between two nodes may require a traversal of multiple hops due to a limited range. Existing routing algorithms can be broadly classified into topology-based and position-based routing protocols. Topology-based routing determines a route based on complete network topology as state information. In order to recover from a local minimum most existing protocols switch to a less efficient mode known as face routing. Face routing runs on a planar graph (a graph without crossing edges), in which the messages is routed around the perimeter of the face (an area surrounded by the edge in the planar graph) which intersects the line between the source and the destination. In this project, we are going to remove the local minimum problem (face routing) by using two new methods. 1. Construct a virtual small-world network Specifically, each node in the network constructs some remote contacts connected by virtual long links (VLLs). Each VLL consists of multiple consecutive physical links. By using these VLLs is to reduce the number of local minima for each destination and increase the success rate of the greedy routing. 2. Virtual force (VF)-based greedy routing It can recover from local minima without resorting to face routing. In this method, a message is forwarded along the increasing gradient of the composition of the VFs. Each VF has a source. The destination is the only source of an attractive (positive) VF. Whenever the greedy method fails in a local minimum under the composition of the VFs, a new source of a repulsive (negative) VF is added to the loacal minimum to expel the message from it. Thus, the local minimum is removed, and greedy routing is recovered. This method is an iteration of greedy forwarding and local minimum removal. II. CONCEPT A MANET is a peer-to-peer network that allows direct communication between any two nodes, when adequate radio propagation conditions exist between these two nodes and subject to transmission power limitations of the nodes. If there is no direct link between the source and the destination nodes, multi-hop routing is used. In multi-hop routing, a packet is forwarded from one node to another, until it reaches the destination. Appropriate routing protocols are necessary to discover routes between the source and the destination, or even to determine the presence or absence of a path to the destination node. Because of lack of central elements, distributed protocols and algorithms have to be used. The data is passing in MANETs by using in distributed routing protocols which are having the both features.  Proactive Route is maintained in tables at each node resulting in quick routing.  Reactive
  • 2. Virtual Force Geometric Routing Protocol www.ijesi.org 18 | Page Route is found when we want to send a packet to its destination. In MANETs the geographic routing nodes could get their location information either by global positioning system (GPS) or localization algorithm. In geographic routing, a node makes routing decisions according to its neighboring nodes location information. Since contemporaneous source to destination node connection may not exist in disruption (Delay) Tolerant Network (DTN), location inaccuracy and network disruptions have to be properly dealt with if geographic routing is applied on the network. And different DTN networks have different network characteristics, such as different node densities and node communication ranges a uniform routing approach is not the best choice in dealing with different situations. III. PROPOSED WORK 1. Network Formation A VLL can be considered as a virtual path between an arbitrary pair of nodes in the network, rather than as a path for a specific pair of source and destination as in traditional routing such as DSR and AODV. Considering scalability, the length of each VLL is under the power-law distribution. In our algorithm, each node periodically sends out VLL discovery messages which go away and then come back to report a VLL. The first problem here is the determination of maximum hop and direction of a message 2. Greedy Routing Extending the traditional greedy protocol to our small world greedy routing, which uses VLLs and VF, is straightforward. First, we define a general set of links of a node to be the set of links of the node containing both the physical links to its neighbors and its VLLs. Thereafter, we use links to refer to the links in this general set of links without causing confusion. We define the force of a VLL as the maximum force of the nodes in the VLL. 3. SWING+ protocol It is inherited from the family of greedy algorithms that may go to a local minimum and fail. The best part of SWING+ is the iterative method that allows the message to continue to travel to the other parts of the network after greedy failures in local minima. In order to recover from local minima, a list of VR is maintained in each message which contains the positions of the encountered local minima that will exert repulsive (negative) VFs to the message. Algorithm for SWING+ Protocol 1: while the current node vi is not vd do 2: while the current node vi is a local minimum under The force comp. do 3: Add vi to list VR. 4: end while 5: List the links which contain the physical links to all Neighbors and all VLLs. 6: Calculate the virtual force (VF) on these links. 7: Send the message to the next node along the link With the largest VF. 8: end while IV. PROPOSED SYSTEM ARCHITECTURE Source can check they neighbor nodes and send data by using VF geometric routing. Fig. 1 Message sending process
  • 3. Virtual Force Geometric Routing Protocol www.ijesi.org 19 | Page V. EXPERIMENTAL RESULT Java swings concept is used to implement the proposed method. User can create a node by clicking the batch file in bin folder. He creates number of nodes as he whish. The output is displayed in two types. Type 1: User can gives distance of the nodes and then discover neighbor nodes. If the source distance is less than the destination distance then reverse routing is implemented. So here the communication between destination and source is implemented. Type 2: User can gives distance of the node and then discover neighbor nodes If the source distance is greater than the destination distance then normal routing is implemented. So here communication between source and destination is implemented. By using this proposed system user can implement the routing process effectively and can be done in non planar graphs. VI. CONCLUSION The proposed system provides the more security and effectively.It takes the local minimum problem from two new angles: constructing a virtual small-world network and using a VF-based greedy protocol to recover from local minima. It combined these two methods and proposes the purely greedy routing protocol SWING+, which is the first geometric routing protocol applicable in 3D networks. VII. ACKNOWLEDGMENT This paper is a part of our M.Tech Project. We are grateful to our project guide for valuable suggestions, comments and contribution. REFERENCES [1]. L. Blazevic, L. Buttyan, S. Capkun, S. Giordano, J.-P. Hubaux, and J._Y Le Boudec, “Self-Organization in mobile Ad Hoc networks: The Approach of Terminodes,” IEEE Comm. Magazine,pp. 166-175, june 2001. [2]. P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia, “Routing with Guaranteed Delivery in Ad Hoc Wireless Networks,” Proc. Third ACM Int’L Workshop Discrete Alogorithms and Methods for Mobile Computing and Comm. (DIALM), 1999. [3]. S. Datta, I. Stojmenovic, and J. Wu, “Intemal Node and Shortcut Based Routing with Guaranreed Delivery in Wireless Networks,”Cluster Computing, special issue on mobile ad hoc networks, vol.7, no. 2 , pp. 169-178, Apr. 2002. [4]. R. Kleinderg, “Geographic Routing Using Hyperbolic Space,” Proc. IEEE INFOCOM, 2007. [5]. HerbertSchildt, “The Complete ReferenceJAVA2” 7th Edition Tata McGrawHills, 2001 [6]. Java Swing, 2nd Edition, By Brain Cole, Robert Eckstein, James Elliott, Marc Loy, David Wood