SlideShare a Scribd company logo
Z Khandsakarwala et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 3), May 2014, pp.72-78
www.ijera.com 72 | P a g e
A Meliorate Routing of Reactive Protocol with Clustering
Technique in MANET
Zainab Khandsakarwala, J. S. Dhobi
Govt. Engineering College, Modasa, Gujarat, India
Abstract
The field of Mobile Adhoc Network (MANET) has become very popular because of the deep research done in
that area in last few years. MANET has advantage of operating without fixed infrastructure and also it can
tolerate many changes in the network topology. The MANET uses different routing protocols for End to End
Packet delivery. This paper is subjected to the Reactive routing protocols on the basis of identical environment
conditions and evaluates their relative performance with respect to the performance metric Packet delivery ratio,
overhead & throughput. In this Reactive routing protocols can spectacularly reduce routing overhead because
they do not need to search for and maintain the routes on which there is no data traffic. This property is very
invoking in the limited resource. Achieve a good efficient network life and reliability need a variation on the
notion of multicasting. Geo-casting is useful for sending messages to nodes in a specified geographical region.
This region is called the geo-cast region. For geo-casting in mobile ad hoc networks. The proposed protocol
combines any casting with local flooding to implement geo-casting. Thus, Protocol requires two phases for geo-
casting. First, it performs any casting from a source to any node in the geo-cast region. Also this Protocol works
on large MANET, and to achieve high accuracy and optimize output. To perform geo-cast region we use a
proposed clustering technique in Large MANET.
Key Terms: MANET, TORA, AODV, DSR
I. Introduction
An Ad hoc Network consists of a set of
autonomous mobile nodes that communicates via
multi-hop wireless communication in an
infrastructure less environment. It is an autonomous
system in which mobile nodes connected by wireless
links are free to move randomly and often act as
routers at the same time. Ad hoc networks have
become increasingly relevant in recent years due to
their potential applications in military battlefield,
emergency disaster relief, vehicular communications
etc.
In ad hoc networks, nodes communicate
with each other by way of radio signals, which are
broadcast in nature. Broadcast is a unique case of
multicast, wherein all nodes in the network should
get the broadcast message. In ad hoc applications,
collaboration and communication among a group of
nodes are necessary. Instead of using multiple unicast
transmissions, it is advantageous to use multicast in
order to save network bandwidth and resources.
Multicasting is a communication process in which the
transmission of message is initiated by a single user
and the message is received by one or more end users
of the network. Multicasting in wired and wireless
networks has been advantageous and used as a vital
technology in many applications such as audio/ video
conferencing, corporate communications,
collaborative and groupware applications, stock
quotes, distribution of software, news etc. Under
multicast communications, a single stream of data
can be shared with multiple recipients and data is
only duplicated when required. Main purpose of
multicasting is to provide multiple packets to
multiple receivers using bandwidth and energy
efficiently.
Paper Outline:
The rest of the paper is organized as follows:
Section II presents the definition of MANET and
TORA protocol. Section III presents the TORA
Protocol and clustering technique. Section IV
provides challenges and proposed solution. In section
V shows simulation of TORA and modified TORA
performance metrics. Finally Section VI concludes
the paper.
II. Related Work:
A mobile ad hoc network is a collection of
wireless nodes that can dynamically be set up
anywhere and anytime without using any pre-existing
network infrastructure. It is an autonomous system in
which mobile hosts connected by wireless links are
free to move randomly and often act as routers at the
same time. The traffic types in ad hoc networks are
quite different from those in an infrastructure
wireless network, including:
1) Peer-to-Peer. Communication between two
nodes which are within one hop. Network traffic
(Bps) is usuallyconsistent.
RESEARCH ARTICLE OPEN ACCESS
Z Khandsakarwala et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 3), May 2014, pp.72-78
www.ijera.com 73 | P a g e
2) Remote-to-Remote. Communication between
two nodes beyond a single hop but which
maintain a stable route between them. This may
be the result of several nodes staying within
communication range of each other in a single
area or possibly moving as a group. The traffic is
similar to standard network traffic.
3) Dynamic Traffic. This occurs when nodes are
dynamic and moving around. Routes must be
reconstructed. This results in a poor connectivity
and network activity in short bursts. [2]
Mainly TORA is that the control messages
are localized to a very small set of nodes near the
occurrence of a topological change. To achieve this,
the nodes maintain routing information about
adjacent nodes. A logically separate version of the
protocol is run for each destination and the protocol
consists of three basic functions: creating routes,
maintaining routes, and erasing routes. Creating a
route from a source node to a destination node
requires establishing a sequence of directed links
from source to destination building a directed acyclic
graph (DAG) rooted at the destination [7].
III. TORA Protocol & Clustering
Technique
TORA Protocol: Temporally Ordered
Routing Algorithm-(TORA) [1][4] is a distributed
routing protocol for mobile, multihop wireless
networks. Its intended use is for the routing of IP
datagrams within an autonomous system. The basic,
underlying algorithm is neither a distance vector nor
a link state; it is one of a family of algorithms
referred to as "link-reversal" algorithms. The
protocol's reaction is structured as a temporally
ordered sequence of diffusing computations, each
computation consisting of a sequence of directed link
reversals. The protocol is highly adaptive, efficient,
and scalable, and is well suited for use in large,
dense, mobile networks. In these networks, the
protocol's reaction to link failures typically involves
only a localized "single pass" of the distributed
algorithm. This desirable behavior is achieved
through the use of a physical or logical clock to
establish the "temporal order" of topological change
events. The established temporal ordering is
subsequently used to structure (or order) the
algorithm's reaction to topological changes. TORA's
design is predicated on the notion that a routing
algorithm that is well suited for operation in this
environment should possess the following properties:
 Executes distributed.
 Provides loop-free routes.
 Provides multiple routes (i.e., to reduce the
frequency of reactions to topological changes,
and potentially to alleviate congestion).
 Establishes routes quickly (i.e., so they may be
used before the topology changes).
 Minimizes communication overhead by
localizing algorithmic reaction to topological
changes when possible (i.e., to conserve
available bandwidth and increase scalability).
Routing optimality (i.e., determination of the
shortest path) is of less importance. It is also not
necessary (or desirable) to maintain routes between
every source destination pair at all times. The
overhead expended to establish a route between a
given source destination pair will be wasted if the
source does not require the route prior to its
invalidation due to topological changes.
TORA is designed to minimize reaction to
topological changes. A key concept in its design is
that it decouples the generation of potentially far-
reaching control message propagation from the rate
of topological changes. Control messaging is
typically localized to a very small set of nodes near
the change without having to resort to a dynamic,
hierarchical routing solution with its attendant
complexity. TORA includes a secondary mechanism,
which allows far-reaching control message
propagation as a means of infrequent route
optimization and soft-state route verification. This
propagation occurs periodically at a very low rate and
is independent of the network topology dynamics.
TORA is distributed in that nodes need only
to maintain information about adjacent nodes (i.e.,
one-hop knowledge). It guarantees all routes are loop
free, and typically provides multiple routes for any
source-destination pair that requires a route. TORA is
"source initiated" and quickly creates a set of routes
to a given destination only when desired. Because
multiple routes are typically established and having a
single route is sufficient, many topological changes
require no reaction at all. Following topological
Changes that do require reaction, the protocol quickly
reestablishes valid routes. This ability to initiate and
react infrequently serves to minimize communication
overhead. Finally, in the event of a network partition,
the protocol detects the partition and erases all
invalid routes.
A logically separate version of TORA is run
for each destination to which routing is required. The
following discussion focuses on a single version
running for a given destination, j. TORA can be
separated into three basic functions: creating routes,
maintaining routes, and erasing routes. Creating a
route from a given node to the destination requires
establishment of a sequence of directed links leading
from the node to the destination. This function is only
initiated when a node with no directed links requires
a route to the destination. Thus, creating routes
essentially corresponds to assigning directions to
links in an undirected network or portion of the
network. The method used to accomplish this is an
adaptation of the query-reply process, which builds a
Directed Acyclic Graph (DAG) rooted at the
Z Khandsakarwala et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 3), May 2014, pp.72-78
www.ijera.com 74 | P a g e
destination (i.e., the destination is the only node with
no downstream links). Such a DAG will be referred
to as a "destination-oriented DAG." "Maintaining
route" refers to reacting to topological changes in the
network in a manner such that routes to the
destination are reestablished within a finite time-
meaning that its directed portions return to a
destination-oriented DAG within a finite time.
However, the Gafni-Bertsekas (GB) algorithms are
designed for operation in connected networks.
Due to instability exhibited by these
algorithms in portions of the network that become
partitioned from the destination, they are deemed
unacceptable for the current task. TORA incorporates
a new algorithm, in the same general class, that is
more efficient in reacting to topological changes and
capable of detecting a network partition. This leads to
the third function, erasing routes. Upon detection of a
network partition, all links (in the portion of the
network that has become partitioned from the
destination) must be marked as undirected to erase
invalid routes.
Route Mechanism
TORA accomplishes these three functions
through the use of three distinct control packets:
query (QRY), update (UPD), and clear (CLR). QRY
packets are used for creating routes; UPD packets are
used for both creating and maintaining routes, and
CLR packets are used for erasing routes.
Route Maintenance in TORA: Route maintenance
is required due to failure of the link between
nodes D and F. In the figure, a link that has been
reversed since the initial state is shown as a
dashed line.
TORA (Temporally Ordered Routing
Algorithm)[4] is one of a family of link reversal
algorithms [10] for routing in ad hoc networks. For
each possible destination in the ad hoc network,
TORA maintains a destination-oriented directed
acyclic graph (DAG). Figure illustrates how link
reversal is performed in TORA. An arrow connecting
a pair of nodes in this figure implies that the two
nodes can communicate with each other. That is, the
physical link between the two nodes is bidirectional.
However, the TORA algorithm imposes a logical
direction on the links, as illustrated in Figure (a) this
figure shows the destination-oriented DAG with node
G being the destination. Observe that, starting from
any node in the graph, the destination G can be
reached by simply following the directed links. Now
assume that the link between nodes D and F breaks
(perhaps because node F moves away from node D).
Then, in the destination-oriented DAG, node D does
not have any outgoing logical link. In response,
TORA reverses logical direction of the (D, B) and
(D, C) links, as shown in Figure, Now, node C does
not have any outgoing logical link. In response,
logical direction of link (B, C) is reversed, resulting
in the graph in Figure (c). Now since node B does not
have any outgoing logical link, the logical direction
of link (A, B) is reversed, resulting in the destination-
oriented DAG in Figure (d). In this state, each node
(other than the destination G) has an outgoing logical
link, and is able to reach the destination node G by
following the directed links.
Now, node C does not have any outgoing
logical link. In response, logical direction of link (B,
C) is reversed, resulting in the graph in Figure. Now
since node B does not have any outgoing logical link,
the logical direction of links (A, B) are reversed,
Problem Formulation, need & Significance of
proposed research work resulting in the destination-
oriented DAG in Figure. In this state, each node
(other than the destination G) has an outgoing logical
link, and is able to reach the destination node G by
following the directed links. The main characteristic
of TORA is the centralization of control messages in
a very small set of near local nodes in which
topological changes have been made. To achieve this
property, nodes maintain routing information for the
adjacent nodes for some interval. This protocol has
three duties: route formation, route renovation and
route cleaning. Route formation is performed with
QRY and UPD. A route formation algorithm starts by
determining a zero set for height of destination node
and empty set for height of other nodes.
Z Khandsakarwala et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 3), May 2014, pp.72-78
www.ijera.com 75 | P a g e
Fig. Broadcast QRY
The origin distributes a QRY packet in
which destination node identifier is located. In this
method, a non-circular graph is created from origin to
destination. Figure indicates a process of route
formation in TORA. As shown in Figure, node 5
receives the QRY packet from node 3 but it doesn’t
publish it because this packet has reached this node
through node 2 previously. In Figure, the origin, i. e.,
node 1 can receive the UPD packet from node 2 or
node 3 but it doesn't receive it from node 4 of which
the height is lower.[3]
Distribute UPD packet
Clustering in Ad hoc Network
Clustering [7] is the method which divides
the network into separate or overlapping zones.
Clustering selects a set of nodes from the whole
network such that from these nodes any of the nodes
of the network is reachable and it does not require
maintaining all the links between all the nodes in the
network. The selected subset of the nodes leads to all
the other nodes in the network. These leading nodes
are called Cluster head. The cluster heads are either
directly connected or connected via any other node.
These intermediate nodes are called Gateways.
Clustering is useful and provides following
advantages.
 There is a back bone created considering only
special nodes like cluster heads and gateways. So
it requires less no of connections to be
maintained.
 If cluster based routing is implemented then only
cluster heads have to maintain route information.
 Mobility of node affects only when the
movement of node is inter cluster.
Node Role
There are different node roles assigned to
each node while running the clustering algorithm and
according to the node role node may contribute in the
management of the network. [6]
Cluster formation and node role
 Cluster Head. They are the nodes selected by
different clustering techniques to lead the
network to create a back bone. This node serves
as the head to the subset of ordinary nodes.
 Gate Ways. These are some of the ordinary
nodes which are connected to more than one
cluster. Thus they connect two clusters and also
contribute in creation of the back bone of
network.
 Ordinary node. The nodes which are connected
directly or by k -hop to any of the cluster head in
the network are called ordinary nodes.
We have studying following technique for
clustering Lowest - ID Technique, Max Degree
Heuristic and K – CONID, Max - Min D Hop
clustering.[6]
IV. Challenges & Proposed Solution
Challenges:
The overhead of TORA consists of data
packets as well as control packets (QRY, UPD, and
CLR) used to create and maintain routes. Also, few
more overhead packets consider when creating a
cluster (geo-region) for routing in small area. The
overhead increases with increasing node mobility
(i.e., decreasing pause time) for all schemes.
However, note that the main reason for increasing
overhead in GeoTORA is the control packets, not the
data packets. With low mobility rate in GeoTORA,
routes for forwarding packets are likely to be fixed
and, therefore, the number of control packets to
maintain the routes is relatively small. As mobility
rate goes up, the cost for a route maintenance
process, i.e., number of QRY and UPD packets, also
becomes higher.
Z Khandsakarwala et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 3), May 2014, pp.72-78
www.ijera.com 76 | P a g e
Proposed Solution:
We suggest the following approaches to
reduce overhead of control packets. Firstly we
assume that nodes are stationary node, for that we
can modify setdest utility available in network
simulator.
Secondly, when the controls packets
communicate between source nodes to destination
node through intermediate nodes, there is a problem
of packets being dropped due to collisions since
packets are routed on same channel at same time.
This can be solved by adding timer functionality,
where in these packets are timely broadcast.
To further reduce the overhead of control packets,
small regions of topology and clustering scheme is
employed within these small regions. The intra-
region control packets overhead is further reduced by
employing routing between cluster head to cluster
head of different regions.
V. Simulation and Results
For the purpose of simulation for traditional
& proposed TORA Protocol improved accuracy in
performance, we have used Network Simulator 2
(NS2) [12]. The traffic is generated with CBR
sources and Node random motion is disabled. The
source-destination pairs are spread randomly over the
network.
We have created the rectangular field of
500x500m with 50 and 100 nodes are spreaded
randomly in the field. The simulation is done for 100
sec.
The Simulation parameters are shown in the
table.
Table: Simulation Parameter
Parameter value
Simulator NS-2
Protocols used TORA, Modified TORA
Simulation time 100 sec
Simulation area 250X250, 5000X5000
Node movement Random way point
Bandwidth 2Mbit
Traffic type CBR
Data payload Bytes/packet
Nodes 20, 50, 70, 90
Time 0, 10, 20, 50
The Simulation is done to evaluate the
performance index Packet Delivery Ratio. It is
mathematically calculated by the given formula:
Where P is the fraction of successfully
delivered packets, C is the total number of flow or
connections, f is the unique flow id serving as index,
Rf is the count of packets received from flow f and Nf
is the count of packets transmitted to f.
The results of the simulation shows in figure
that as we increase the number of nodes and time the
end to end delay for protocols increases. But the
effect of increasing the number of nodes can be seen
in TORA the most. Figure shows the graphs of the
End to end Delay with variable parameter time 0, 10,
20, 50 with number of nodes 20 and 50 respectively
for area of 250X250 meters.
When mobility increase it will decrease
throughput and same situation occurs when we are
using different number of nodes increase like 50, 70
and 90 respectively. Shown in figure.
When we have increase quantity of nodes
then control packets are increase and due to that
delay is too much higher than previous. Solution of
this situation is to send packet timely, so using this
we have reduced few of overhead of control packets
and in resultant we got improved throughput than
previous throughput which is shown in figure in
modified TORA Protocol.
Problem arises when we are increasing
nodes then end to end delay increases and throughput
decreases. In figure shows that when we are
increasing number of nodes at that situation control
packets are generates too much high and due to this
phenomenon delay increases drastically and
throughput decreases drastically. To solve this we
proposed another approach which is clustering
technique with TORA Protocol routing shows figure.
End to End Delay Vs Time
Z Khandsakarwala et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 3), May 2014, pp.72-78
www.ijera.com 77 | P a g e
Throughput Vs Time
End to End Delay Vs Nodes
Overhead Vs Nodes
Overhead Vs Nodes
Figure: Simulation and results
So, figure shows that when we used
modified TORA protocol which is modified by
geocasting and clustering scheme. We have
implemented optimize result of overhead in terms of
control packets which is helpful to reduce delay,
increase throughput and makes network more
scalable.
VI. Conclusion
The thesis includes, overview of wireless
network and problems of resource constrains like
overhead, limited available bandwidth etc. The work
mainly concentrates on simulation of existing TORA
protocol along with Geocasting and Clustering
technique. The performance of TORA Protocol is
compared with modified TORA Routing protocol.
The modified TORA routing protocol is improved in
terms of throughput, overhead and scalability of
network.
We have implemented routing protocol
simulation with different topologies. We have
simulated the same with large area and dense
networks. Also Geocasting technique has been
implemented. The cluster is created wherein a node
of the cluster is selected as a cluster head. After this
step, the data from the cluster nodes are transferred to
cluster head to reduce the number of overhead
packets. Finally clustering hierarchy is created to
overcome the overhead during routing process for all
nodes.
Reference
[1]. V. Park and S. Corson, Temporally Ordered
Routing Algorithm (TORA) Version 1,
Functional specification IETF Internet draft,
http://www.ietf.org/internet- drafts/draft-
ietf-manet-tora-spec-01.txt, 1998.
Z Khandsakarwala et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 3), May 2014, pp.72-78
www.ijera.com 78 | P a g e
[2]. J.C. Navas and T. Imielinski. Geocast -
geographic addressing and routing. In Proc.
of ACM/IEEE MOBICOM, Budapest,
Hungary, Sept. 1997.
[3]. Asad Amir Pirzada and Amitava Datta and
Chris McDonald. Trustworthy Routing with
the TORA Protocol. Communication
Networks and Services Research, 2004.
Proceedings. Second Annual Conference on
Digital Object Identifier. Pages 121-130,
2004.
[4]. Y.-B. Ko and N.H. Vaidya. Geocasting in
mobile ad hoc networks: Location-based
multicast algorithms. In Proc. of IEEE
WMCSA, New Orleans, LA, Feb. 1999.
[5]. V.D. Park and M.S. Corson. A highly
adaptive distributed routing algorithm for
mobile wireless networks. In Proc. of IEEE
INFOCOM, Kobe, Japan, Apr. 1997.
[6]. Suchismita Chinara, Santanu Kumar
Rath,"A Survey on One-Hop Clustering
Algorithms in Mobile Ad Hoc Networks",
Journal of Network and Systems
Management, Volume(17), Springer
Science+Business Media, pp. 183207, 2009.
[7]. S. Mehta, P. Sharma and K. Kotecha. A
Survey on Various Cluster Head Election
Algorithms for MANET. In Proc. of 2nd
International NUiCONE Nirma University,
Ahmedabad, India, Dec. 2012.
[8]. Ratish Agarwal, Dr. Mahesh Motwani,
"Survey of clustering algorithms for
MANET",International Journal on
Computer Science and Engineering, Vol. 1
Issue 2, 2009, pp. 98-104
[9]. A.D. Amis, R. Prakash, T.H.P Vuong, D.T.
Huynh, "Max-Min DCluster For mation in
Wireless Ad Hoc Networks", In proceedings
of IEEE Conference on Computer
Communications (INFOCOM) Vol. 1. pp.
32-41, 2000
[10]. G. Chen, F. Nocetti, J. Gonzalez, and I.
Stojmenovic, "Connectivity based k-hop
clustering in wireless networks," In
proceedings of the 35th Annual Hawaii
International Conference on System
Sciences. Vol. 7, pp. 188.3, 2002
[11]. Tomoyuki Ohta, Munehiko Fujimoto, Shinji
Inoue, Yoshiaki Kakuda, "Hi-TORA: A
Hierarchical Routing Protocol in Ad Hoc
Networks," hase, pp.143, 7th IEEE
International Symposium on High
Assurance Systems Engineering (HASE'02),
2002
[12]. J. Broch, D.A. Maltz, D.B. Johnson, Y.-C.
Hu, and J. Jetcheva. A performance
comparison of multi-hop wireless ad hoc
network routing protocols. In Proc. of
ACM/IEEE MOBICOM, Dallas, TX, Oct.
1998.
[13]. Y.-B. Ko and N.H. Vaidya. Location-aided
routing (LAR) in mobile ad hoc net- works.
In Proc. of ACM/IEEEMOBICOM, Dallas,
TX, Oct. 1998.
[14]. E. Gafni and D. Bertsekas. Distributed
algorithms for generating loop-free routes in
networks with frequently changing
topology. IEEE Trans. on Comm., C-
29(1):1118, 1981.
[15]. Young-Bae Ko and Nitin H. Vaidya.
Anycasting-based protocol for geocast
service in mobile ad hoc networks.Computer
Networks, Volume 41, Issue 6, Pages 743-
760,22 April 2003.
[16]. C.E. Perkins and E.M. Royer. Ad-hoc on-
demand distance vector routing. In Proc. of
IEEE WMCSA, Feb. 1999.
[17]. J.J. Garcia-Luna-Aceves and E.L. Madruga.
Multicast routing protocols for ad-hoc
networks. In Proc. of IEEE INFOCOM,
New York, Mar. 1999.
[18]. C. Ho, K. Obraczka, G. Tsudik, and K.
Viswanath. Flooding for reliable multicast in
multi-hop ad hoc networks. In Proc. of
DIAL-M, Seattle, WA, Aug. 1999.
[19]. K. Obraczka and G. Tsudik. Multicast
routing issues in ad hoc networks. In Proc.
of IEEE ICUPC, Oct. 1998.
[20]. Wendi Beth Heinzelman, Application-
Specific Protocol Architectures for Wireless
Networks, [PhdThesis], June, 2000.
[21]. "Network Simulator",[Online] available at:
https://www.isi.edu/nsnam/ns/

More Related Content

What's hot

J0935461
J0935461J0935461
J0935461
IOSR Journals
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
Editor IJARCET
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
idescitation
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocols
prjpublications
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
IOSR Journals
 
Analysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANETAnalysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANET
idescitation
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
IOSR Journals
 
Bx4201493498
Bx4201493498Bx4201493498
Bx4201493498
IJERA Editor
 
G1063841
G1063841G1063841
G1063841
IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
A study of the effect of different topology parameters on the routing overhea...
A study of the effect of different topology parameters on the routing overhea...A study of the effect of different topology parameters on the routing overhea...
A study of the effect of different topology parameters on the routing overhea...
International Journal of Engineering Inventions www.ijeijournal.com
 
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Editor IJMTER
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
IOSR Journals
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
IJMER
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANET
IOSR Journals
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
Editor IJCATR
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
ijcax
 

What's hot (17)

J0935461
J0935461J0935461
J0935461
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocols
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Analysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANETAnalysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANET
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
 
Bx4201493498
Bx4201493498Bx4201493498
Bx4201493498
 
G1063841
G1063841G1063841
G1063841
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A study of the effect of different topology parameters on the routing overhea...
A study of the effect of different topology parameters on the routing overhea...A study of the effect of different topology parameters on the routing overhea...
A study of the effect of different topology parameters on the routing overhea...
 
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANET
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 

Viewers also liked

La Producció a Espanya
La Producció a EspanyaLa Producció a Espanya
La Producció a Espanya
guest215492
 
Pp prev del bullying 2009 2010
Pp prev del bullying 2009 2010Pp prev del bullying 2009 2010
Pp prev del bullying 2009 2010
Waxu Ku
 
Montblanc
MontblancMontblanc
Montblanc
Jaing Lai
 
Entrega Martes
Entrega MartesEntrega Martes
Entrega Martes
mafca
 
Imagenestercer Control
Imagenestercer ControlImagenestercer Control
Imagenestercer Control
Rodolfo baksys
 
Materia 1 edad moderna
Materia 1 edad modernaMateria 1 edad moderna
Materia 1 edad moderna
Rodolfo baksys
 
Museodelouvre
MuseodelouvreMuseodelouvre
Museodelouvre
Maureen Macie
 
otro Manchego
otro Manchegootro Manchego
otro Manchego
maanciudad
 
會心一笑
會心一笑會心一笑
會心一笑Jaing Lai
 
優美攝影
優美攝影優美攝影
優美攝影Jaing Lai
 
Documentação complementar tia francisca
Documentação complementar tia franciscaDocumentação complementar tia francisca
Documentação complementar tia francisca
Leticia Maria de Campos
 
Momentos vocacPastoral Vocacional Franciscana (HFIC): Reflexión Momentos Vo...
Momentos vocacPastoral Vocacional Franciscana (HFIC):  Reflexión  Momentos Vo...Momentos vocacPastoral Vocacional Franciscana (HFIC):  Reflexión  Momentos Vo...
Momentos vocacPastoral Vocacional Franciscana (HFIC): Reflexión Momentos Vo...
HFIC
 
Outpost
OutpostOutpost
Outpost
vinibaggio
 
2015_06_17_Alcatel-Lucent Going Paperless_Enforcing global regulations while ...
2015_06_17_Alcatel-Lucent Going Paperless_Enforcing global regulations while ...2015_06_17_Alcatel-Lucent Going Paperless_Enforcing global regulations while ...
2015_06_17_Alcatel-Lucent Going Paperless_Enforcing global regulations while ...
Guillaume Hatt
 
Mistni speciality aj
Mistni speciality ajMistni speciality aj
Evaluación educativa
Evaluación educativaEvaluación educativa
Evaluación educativa
Edgar68
 
街頭藝人 夠逼真
街頭藝人 夠逼真街頭藝人 夠逼真
街頭藝人 夠逼真
Jaing Lai
 
Produccion12
Produccion12Produccion12
[Creategies] Os segredos para a expansão do seu escritório de advocacia.
[Creategies] Os segredos para a expansão do seu escritório de advocacia.[Creategies] Os segredos para a expansão do seu escritório de advocacia.
[Creategies] Os segredos para a expansão do seu escritório de advocacia.
creategies
 
Art auguste rodin (catherine)
Art auguste rodin  (catherine)Art auguste rodin  (catherine)
Art auguste rodin (catherine)
Catherine Dewilde
 

Viewers also liked (20)

La Producció a Espanya
La Producció a EspanyaLa Producció a Espanya
La Producció a Espanya
 
Pp prev del bullying 2009 2010
Pp prev del bullying 2009 2010Pp prev del bullying 2009 2010
Pp prev del bullying 2009 2010
 
Montblanc
MontblancMontblanc
Montblanc
 
Entrega Martes
Entrega MartesEntrega Martes
Entrega Martes
 
Imagenestercer Control
Imagenestercer ControlImagenestercer Control
Imagenestercer Control
 
Materia 1 edad moderna
Materia 1 edad modernaMateria 1 edad moderna
Materia 1 edad moderna
 
Museodelouvre
MuseodelouvreMuseodelouvre
Museodelouvre
 
otro Manchego
otro Manchegootro Manchego
otro Manchego
 
會心一笑
會心一笑會心一笑
會心一笑
 
優美攝影
優美攝影優美攝影
優美攝影
 
Documentação complementar tia francisca
Documentação complementar tia franciscaDocumentação complementar tia francisca
Documentação complementar tia francisca
 
Momentos vocacPastoral Vocacional Franciscana (HFIC): Reflexión Momentos Vo...
Momentos vocacPastoral Vocacional Franciscana (HFIC):  Reflexión  Momentos Vo...Momentos vocacPastoral Vocacional Franciscana (HFIC):  Reflexión  Momentos Vo...
Momentos vocacPastoral Vocacional Franciscana (HFIC): Reflexión Momentos Vo...
 
Outpost
OutpostOutpost
Outpost
 
2015_06_17_Alcatel-Lucent Going Paperless_Enforcing global regulations while ...
2015_06_17_Alcatel-Lucent Going Paperless_Enforcing global regulations while ...2015_06_17_Alcatel-Lucent Going Paperless_Enforcing global regulations while ...
2015_06_17_Alcatel-Lucent Going Paperless_Enforcing global regulations while ...
 
Mistni speciality aj
Mistni speciality ajMistni speciality aj
Mistni speciality aj
 
Evaluación educativa
Evaluación educativaEvaluación educativa
Evaluación educativa
 
街頭藝人 夠逼真
街頭藝人 夠逼真街頭藝人 夠逼真
街頭藝人 夠逼真
 
Produccion12
Produccion12Produccion12
Produccion12
 
[Creategies] Os segredos para a expansão do seu escritório de advocacia.
[Creategies] Os segredos para a expansão do seu escritório de advocacia.[Creategies] Os segredos para a expansão do seu escritório de advocacia.
[Creategies] Os segredos para a expansão do seu escritório de advocacia.
 
Art auguste rodin (catherine)
Art auguste rodin  (catherine)Art auguste rodin  (catherine)
Art auguste rodin (catherine)
 

Similar to L045037278

A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
pijans
 
A Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for ManetsA Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for Manets
pijans
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
ijsrd.com
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Editor IJMTER
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
Editor IJARCET
 
Mobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelMobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility Model
IOSR Journals
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
pijans
 
Aodv
AodvAodv
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
Narendra Singh Yadav
 
Manet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metricsManet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metrics
IJARIIT
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
ijasuc
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
jake henry
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET Journal
 
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
rahulmonikasharma
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
IJERA Editor
 
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
JohnWilson47710
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
ijwmn
 
Mane ts
Mane tsMane ts
Mane ts
Nunna Swathi
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
IAEME Publication
 
CHAPTER-1234
CHAPTER-1234CHAPTER-1234
CHAPTER-1234
Bilal Anjum
 

Similar to L045037278 (20)

A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
A Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for ManetsA Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for Manets
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Mobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelMobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility Model
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Aodv
AodvAodv
Aodv
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Manet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metricsManet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metrics
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
 
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
Mane ts
Mane tsMane ts
Mane ts
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
 
CHAPTER-1234
CHAPTER-1234CHAPTER-1234
CHAPTER-1234
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 

L045037278

  • 1. Z Khandsakarwala et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 3), May 2014, pp.72-78 www.ijera.com 72 | P a g e A Meliorate Routing of Reactive Protocol with Clustering Technique in MANET Zainab Khandsakarwala, J. S. Dhobi Govt. Engineering College, Modasa, Gujarat, India Abstract The field of Mobile Adhoc Network (MANET) has become very popular because of the deep research done in that area in last few years. MANET has advantage of operating without fixed infrastructure and also it can tolerate many changes in the network topology. The MANET uses different routing protocols for End to End Packet delivery. This paper is subjected to the Reactive routing protocols on the basis of identical environment conditions and evaluates their relative performance with respect to the performance metric Packet delivery ratio, overhead & throughput. In this Reactive routing protocols can spectacularly reduce routing overhead because they do not need to search for and maintain the routes on which there is no data traffic. This property is very invoking in the limited resource. Achieve a good efficient network life and reliability need a variation on the notion of multicasting. Geo-casting is useful for sending messages to nodes in a specified geographical region. This region is called the geo-cast region. For geo-casting in mobile ad hoc networks. The proposed protocol combines any casting with local flooding to implement geo-casting. Thus, Protocol requires two phases for geo- casting. First, it performs any casting from a source to any node in the geo-cast region. Also this Protocol works on large MANET, and to achieve high accuracy and optimize output. To perform geo-cast region we use a proposed clustering technique in Large MANET. Key Terms: MANET, TORA, AODV, DSR I. Introduction An Ad hoc Network consists of a set of autonomous mobile nodes that communicates via multi-hop wireless communication in an infrastructure less environment. It is an autonomous system in which mobile nodes connected by wireless links are free to move randomly and often act as routers at the same time. Ad hoc networks have become increasingly relevant in recent years due to their potential applications in military battlefield, emergency disaster relief, vehicular communications etc. In ad hoc networks, nodes communicate with each other by way of radio signals, which are broadcast in nature. Broadcast is a unique case of multicast, wherein all nodes in the network should get the broadcast message. In ad hoc applications, collaboration and communication among a group of nodes are necessary. Instead of using multiple unicast transmissions, it is advantageous to use multicast in order to save network bandwidth and resources. Multicasting is a communication process in which the transmission of message is initiated by a single user and the message is received by one or more end users of the network. Multicasting in wired and wireless networks has been advantageous and used as a vital technology in many applications such as audio/ video conferencing, corporate communications, collaborative and groupware applications, stock quotes, distribution of software, news etc. Under multicast communications, a single stream of data can be shared with multiple recipients and data is only duplicated when required. Main purpose of multicasting is to provide multiple packets to multiple receivers using bandwidth and energy efficiently. Paper Outline: The rest of the paper is organized as follows: Section II presents the definition of MANET and TORA protocol. Section III presents the TORA Protocol and clustering technique. Section IV provides challenges and proposed solution. In section V shows simulation of TORA and modified TORA performance metrics. Finally Section VI concludes the paper. II. Related Work: A mobile ad hoc network is a collection of wireless nodes that can dynamically be set up anywhere and anytime without using any pre-existing network infrastructure. It is an autonomous system in which mobile hosts connected by wireless links are free to move randomly and often act as routers at the same time. The traffic types in ad hoc networks are quite different from those in an infrastructure wireless network, including: 1) Peer-to-Peer. Communication between two nodes which are within one hop. Network traffic (Bps) is usuallyconsistent. RESEARCH ARTICLE OPEN ACCESS
  • 2. Z Khandsakarwala et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 3), May 2014, pp.72-78 www.ijera.com 73 | P a g e 2) Remote-to-Remote. Communication between two nodes beyond a single hop but which maintain a stable route between them. This may be the result of several nodes staying within communication range of each other in a single area or possibly moving as a group. The traffic is similar to standard network traffic. 3) Dynamic Traffic. This occurs when nodes are dynamic and moving around. Routes must be reconstructed. This results in a poor connectivity and network activity in short bursts. [2] Mainly TORA is that the control messages are localized to a very small set of nodes near the occurrence of a topological change. To achieve this, the nodes maintain routing information about adjacent nodes. A logically separate version of the protocol is run for each destination and the protocol consists of three basic functions: creating routes, maintaining routes, and erasing routes. Creating a route from a source node to a destination node requires establishing a sequence of directed links from source to destination building a directed acyclic graph (DAG) rooted at the destination [7]. III. TORA Protocol & Clustering Technique TORA Protocol: Temporally Ordered Routing Algorithm-(TORA) [1][4] is a distributed routing protocol for mobile, multihop wireless networks. Its intended use is for the routing of IP datagrams within an autonomous system. The basic, underlying algorithm is neither a distance vector nor a link state; it is one of a family of algorithms referred to as "link-reversal" algorithms. The protocol's reaction is structured as a temporally ordered sequence of diffusing computations, each computation consisting of a sequence of directed link reversals. The protocol is highly adaptive, efficient, and scalable, and is well suited for use in large, dense, mobile networks. In these networks, the protocol's reaction to link failures typically involves only a localized "single pass" of the distributed algorithm. This desirable behavior is achieved through the use of a physical or logical clock to establish the "temporal order" of topological change events. The established temporal ordering is subsequently used to structure (or order) the algorithm's reaction to topological changes. TORA's design is predicated on the notion that a routing algorithm that is well suited for operation in this environment should possess the following properties:  Executes distributed.  Provides loop-free routes.  Provides multiple routes (i.e., to reduce the frequency of reactions to topological changes, and potentially to alleviate congestion).  Establishes routes quickly (i.e., so they may be used before the topology changes).  Minimizes communication overhead by localizing algorithmic reaction to topological changes when possible (i.e., to conserve available bandwidth and increase scalability). Routing optimality (i.e., determination of the shortest path) is of less importance. It is also not necessary (or desirable) to maintain routes between every source destination pair at all times. The overhead expended to establish a route between a given source destination pair will be wasted if the source does not require the route prior to its invalidation due to topological changes. TORA is designed to minimize reaction to topological changes. A key concept in its design is that it decouples the generation of potentially far- reaching control message propagation from the rate of topological changes. Control messaging is typically localized to a very small set of nodes near the change without having to resort to a dynamic, hierarchical routing solution with its attendant complexity. TORA includes a secondary mechanism, which allows far-reaching control message propagation as a means of infrequent route optimization and soft-state route verification. This propagation occurs periodically at a very low rate and is independent of the network topology dynamics. TORA is distributed in that nodes need only to maintain information about adjacent nodes (i.e., one-hop knowledge). It guarantees all routes are loop free, and typically provides multiple routes for any source-destination pair that requires a route. TORA is "source initiated" and quickly creates a set of routes to a given destination only when desired. Because multiple routes are typically established and having a single route is sufficient, many topological changes require no reaction at all. Following topological Changes that do require reaction, the protocol quickly reestablishes valid routes. This ability to initiate and react infrequently serves to minimize communication overhead. Finally, in the event of a network partition, the protocol detects the partition and erases all invalid routes. A logically separate version of TORA is run for each destination to which routing is required. The following discussion focuses on a single version running for a given destination, j. TORA can be separated into three basic functions: creating routes, maintaining routes, and erasing routes. Creating a route from a given node to the destination requires establishment of a sequence of directed links leading from the node to the destination. This function is only initiated when a node with no directed links requires a route to the destination. Thus, creating routes essentially corresponds to assigning directions to links in an undirected network or portion of the network. The method used to accomplish this is an adaptation of the query-reply process, which builds a Directed Acyclic Graph (DAG) rooted at the
  • 3. Z Khandsakarwala et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 3), May 2014, pp.72-78 www.ijera.com 74 | P a g e destination (i.e., the destination is the only node with no downstream links). Such a DAG will be referred to as a "destination-oriented DAG." "Maintaining route" refers to reacting to topological changes in the network in a manner such that routes to the destination are reestablished within a finite time- meaning that its directed portions return to a destination-oriented DAG within a finite time. However, the Gafni-Bertsekas (GB) algorithms are designed for operation in connected networks. Due to instability exhibited by these algorithms in portions of the network that become partitioned from the destination, they are deemed unacceptable for the current task. TORA incorporates a new algorithm, in the same general class, that is more efficient in reacting to topological changes and capable of detecting a network partition. This leads to the third function, erasing routes. Upon detection of a network partition, all links (in the portion of the network that has become partitioned from the destination) must be marked as undirected to erase invalid routes. Route Mechanism TORA accomplishes these three functions through the use of three distinct control packets: query (QRY), update (UPD), and clear (CLR). QRY packets are used for creating routes; UPD packets are used for both creating and maintaining routes, and CLR packets are used for erasing routes. Route Maintenance in TORA: Route maintenance is required due to failure of the link between nodes D and F. In the figure, a link that has been reversed since the initial state is shown as a dashed line. TORA (Temporally Ordered Routing Algorithm)[4] is one of a family of link reversal algorithms [10] for routing in ad hoc networks. For each possible destination in the ad hoc network, TORA maintains a destination-oriented directed acyclic graph (DAG). Figure illustrates how link reversal is performed in TORA. An arrow connecting a pair of nodes in this figure implies that the two nodes can communicate with each other. That is, the physical link between the two nodes is bidirectional. However, the TORA algorithm imposes a logical direction on the links, as illustrated in Figure (a) this figure shows the destination-oriented DAG with node G being the destination. Observe that, starting from any node in the graph, the destination G can be reached by simply following the directed links. Now assume that the link between nodes D and F breaks (perhaps because node F moves away from node D). Then, in the destination-oriented DAG, node D does not have any outgoing logical link. In response, TORA reverses logical direction of the (D, B) and (D, C) links, as shown in Figure, Now, node C does not have any outgoing logical link. In response, logical direction of link (B, C) is reversed, resulting in the graph in Figure (c). Now since node B does not have any outgoing logical link, the logical direction of link (A, B) is reversed, resulting in the destination- oriented DAG in Figure (d). In this state, each node (other than the destination G) has an outgoing logical link, and is able to reach the destination node G by following the directed links. Now, node C does not have any outgoing logical link. In response, logical direction of link (B, C) is reversed, resulting in the graph in Figure. Now since node B does not have any outgoing logical link, the logical direction of links (A, B) are reversed, Problem Formulation, need & Significance of proposed research work resulting in the destination- oriented DAG in Figure. In this state, each node (other than the destination G) has an outgoing logical link, and is able to reach the destination node G by following the directed links. The main characteristic of TORA is the centralization of control messages in a very small set of near local nodes in which topological changes have been made. To achieve this property, nodes maintain routing information for the adjacent nodes for some interval. This protocol has three duties: route formation, route renovation and route cleaning. Route formation is performed with QRY and UPD. A route formation algorithm starts by determining a zero set for height of destination node and empty set for height of other nodes.
  • 4. Z Khandsakarwala et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 3), May 2014, pp.72-78 www.ijera.com 75 | P a g e Fig. Broadcast QRY The origin distributes a QRY packet in which destination node identifier is located. In this method, a non-circular graph is created from origin to destination. Figure indicates a process of route formation in TORA. As shown in Figure, node 5 receives the QRY packet from node 3 but it doesn’t publish it because this packet has reached this node through node 2 previously. In Figure, the origin, i. e., node 1 can receive the UPD packet from node 2 or node 3 but it doesn't receive it from node 4 of which the height is lower.[3] Distribute UPD packet Clustering in Ad hoc Network Clustering [7] is the method which divides the network into separate or overlapping zones. Clustering selects a set of nodes from the whole network such that from these nodes any of the nodes of the network is reachable and it does not require maintaining all the links between all the nodes in the network. The selected subset of the nodes leads to all the other nodes in the network. These leading nodes are called Cluster head. The cluster heads are either directly connected or connected via any other node. These intermediate nodes are called Gateways. Clustering is useful and provides following advantages.  There is a back bone created considering only special nodes like cluster heads and gateways. So it requires less no of connections to be maintained.  If cluster based routing is implemented then only cluster heads have to maintain route information.  Mobility of node affects only when the movement of node is inter cluster. Node Role There are different node roles assigned to each node while running the clustering algorithm and according to the node role node may contribute in the management of the network. [6] Cluster formation and node role  Cluster Head. They are the nodes selected by different clustering techniques to lead the network to create a back bone. This node serves as the head to the subset of ordinary nodes.  Gate Ways. These are some of the ordinary nodes which are connected to more than one cluster. Thus they connect two clusters and also contribute in creation of the back bone of network.  Ordinary node. The nodes which are connected directly or by k -hop to any of the cluster head in the network are called ordinary nodes. We have studying following technique for clustering Lowest - ID Technique, Max Degree Heuristic and K – CONID, Max - Min D Hop clustering.[6] IV. Challenges & Proposed Solution Challenges: The overhead of TORA consists of data packets as well as control packets (QRY, UPD, and CLR) used to create and maintain routes. Also, few more overhead packets consider when creating a cluster (geo-region) for routing in small area. The overhead increases with increasing node mobility (i.e., decreasing pause time) for all schemes. However, note that the main reason for increasing overhead in GeoTORA is the control packets, not the data packets. With low mobility rate in GeoTORA, routes for forwarding packets are likely to be fixed and, therefore, the number of control packets to maintain the routes is relatively small. As mobility rate goes up, the cost for a route maintenance process, i.e., number of QRY and UPD packets, also becomes higher.
  • 5. Z Khandsakarwala et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 3), May 2014, pp.72-78 www.ijera.com 76 | P a g e Proposed Solution: We suggest the following approaches to reduce overhead of control packets. Firstly we assume that nodes are stationary node, for that we can modify setdest utility available in network simulator. Secondly, when the controls packets communicate between source nodes to destination node through intermediate nodes, there is a problem of packets being dropped due to collisions since packets are routed on same channel at same time. This can be solved by adding timer functionality, where in these packets are timely broadcast. To further reduce the overhead of control packets, small regions of topology and clustering scheme is employed within these small regions. The intra- region control packets overhead is further reduced by employing routing between cluster head to cluster head of different regions. V. Simulation and Results For the purpose of simulation for traditional & proposed TORA Protocol improved accuracy in performance, we have used Network Simulator 2 (NS2) [12]. The traffic is generated with CBR sources and Node random motion is disabled. The source-destination pairs are spread randomly over the network. We have created the rectangular field of 500x500m with 50 and 100 nodes are spreaded randomly in the field. The simulation is done for 100 sec. The Simulation parameters are shown in the table. Table: Simulation Parameter Parameter value Simulator NS-2 Protocols used TORA, Modified TORA Simulation time 100 sec Simulation area 250X250, 5000X5000 Node movement Random way point Bandwidth 2Mbit Traffic type CBR Data payload Bytes/packet Nodes 20, 50, 70, 90 Time 0, 10, 20, 50 The Simulation is done to evaluate the performance index Packet Delivery Ratio. It is mathematically calculated by the given formula: Where P is the fraction of successfully delivered packets, C is the total number of flow or connections, f is the unique flow id serving as index, Rf is the count of packets received from flow f and Nf is the count of packets transmitted to f. The results of the simulation shows in figure that as we increase the number of nodes and time the end to end delay for protocols increases. But the effect of increasing the number of nodes can be seen in TORA the most. Figure shows the graphs of the End to end Delay with variable parameter time 0, 10, 20, 50 with number of nodes 20 and 50 respectively for area of 250X250 meters. When mobility increase it will decrease throughput and same situation occurs when we are using different number of nodes increase like 50, 70 and 90 respectively. Shown in figure. When we have increase quantity of nodes then control packets are increase and due to that delay is too much higher than previous. Solution of this situation is to send packet timely, so using this we have reduced few of overhead of control packets and in resultant we got improved throughput than previous throughput which is shown in figure in modified TORA Protocol. Problem arises when we are increasing nodes then end to end delay increases and throughput decreases. In figure shows that when we are increasing number of nodes at that situation control packets are generates too much high and due to this phenomenon delay increases drastically and throughput decreases drastically. To solve this we proposed another approach which is clustering technique with TORA Protocol routing shows figure. End to End Delay Vs Time
  • 6. Z Khandsakarwala et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 3), May 2014, pp.72-78 www.ijera.com 77 | P a g e Throughput Vs Time End to End Delay Vs Nodes Overhead Vs Nodes Overhead Vs Nodes Figure: Simulation and results So, figure shows that when we used modified TORA protocol which is modified by geocasting and clustering scheme. We have implemented optimize result of overhead in terms of control packets which is helpful to reduce delay, increase throughput and makes network more scalable. VI. Conclusion The thesis includes, overview of wireless network and problems of resource constrains like overhead, limited available bandwidth etc. The work mainly concentrates on simulation of existing TORA protocol along with Geocasting and Clustering technique. The performance of TORA Protocol is compared with modified TORA Routing protocol. The modified TORA routing protocol is improved in terms of throughput, overhead and scalability of network. We have implemented routing protocol simulation with different topologies. We have simulated the same with large area and dense networks. Also Geocasting technique has been implemented. The cluster is created wherein a node of the cluster is selected as a cluster head. After this step, the data from the cluster nodes are transferred to cluster head to reduce the number of overhead packets. Finally clustering hierarchy is created to overcome the overhead during routing process for all nodes. Reference [1]. V. Park and S. Corson, Temporally Ordered Routing Algorithm (TORA) Version 1, Functional specification IETF Internet draft, http://www.ietf.org/internet- drafts/draft- ietf-manet-tora-spec-01.txt, 1998.
  • 7. Z Khandsakarwala et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 3), May 2014, pp.72-78 www.ijera.com 78 | P a g e [2]. J.C. Navas and T. Imielinski. Geocast - geographic addressing and routing. In Proc. of ACM/IEEE MOBICOM, Budapest, Hungary, Sept. 1997. [3]. Asad Amir Pirzada and Amitava Datta and Chris McDonald. Trustworthy Routing with the TORA Protocol. Communication Networks and Services Research, 2004. Proceedings. Second Annual Conference on Digital Object Identifier. Pages 121-130, 2004. [4]. Y.-B. Ko and N.H. Vaidya. Geocasting in mobile ad hoc networks: Location-based multicast algorithms. In Proc. of IEEE WMCSA, New Orleans, LA, Feb. 1999. [5]. V.D. Park and M.S. Corson. A highly adaptive distributed routing algorithm for mobile wireless networks. In Proc. of IEEE INFOCOM, Kobe, Japan, Apr. 1997. [6]. Suchismita Chinara, Santanu Kumar Rath,"A Survey on One-Hop Clustering Algorithms in Mobile Ad Hoc Networks", Journal of Network and Systems Management, Volume(17), Springer Science+Business Media, pp. 183207, 2009. [7]. S. Mehta, P. Sharma and K. Kotecha. A Survey on Various Cluster Head Election Algorithms for MANET. In Proc. of 2nd International NUiCONE Nirma University, Ahmedabad, India, Dec. 2012. [8]. Ratish Agarwal, Dr. Mahesh Motwani, "Survey of clustering algorithms for MANET",International Journal on Computer Science and Engineering, Vol. 1 Issue 2, 2009, pp. 98-104 [9]. A.D. Amis, R. Prakash, T.H.P Vuong, D.T. Huynh, "Max-Min DCluster For mation in Wireless Ad Hoc Networks", In proceedings of IEEE Conference on Computer Communications (INFOCOM) Vol. 1. pp. 32-41, 2000 [10]. G. Chen, F. Nocetti, J. Gonzalez, and I. Stojmenovic, "Connectivity based k-hop clustering in wireless networks," In proceedings of the 35th Annual Hawaii International Conference on System Sciences. Vol. 7, pp. 188.3, 2002 [11]. Tomoyuki Ohta, Munehiko Fujimoto, Shinji Inoue, Yoshiaki Kakuda, "Hi-TORA: A Hierarchical Routing Protocol in Ad Hoc Networks," hase, pp.143, 7th IEEE International Symposium on High Assurance Systems Engineering (HASE'02), 2002 [12]. J. Broch, D.A. Maltz, D.B. Johnson, Y.-C. Hu, and J. Jetcheva. A performance comparison of multi-hop wireless ad hoc network routing protocols. In Proc. of ACM/IEEE MOBICOM, Dallas, TX, Oct. 1998. [13]. Y.-B. Ko and N.H. Vaidya. Location-aided routing (LAR) in mobile ad hoc net- works. In Proc. of ACM/IEEEMOBICOM, Dallas, TX, Oct. 1998. [14]. E. Gafni and D. Bertsekas. Distributed algorithms for generating loop-free routes in networks with frequently changing topology. IEEE Trans. on Comm., C- 29(1):1118, 1981. [15]. Young-Bae Ko and Nitin H. Vaidya. Anycasting-based protocol for geocast service in mobile ad hoc networks.Computer Networks, Volume 41, Issue 6, Pages 743- 760,22 April 2003. [16]. C.E. Perkins and E.M. Royer. Ad-hoc on- demand distance vector routing. In Proc. of IEEE WMCSA, Feb. 1999. [17]. J.J. Garcia-Luna-Aceves and E.L. Madruga. Multicast routing protocols for ad-hoc networks. In Proc. of IEEE INFOCOM, New York, Mar. 1999. [18]. C. Ho, K. Obraczka, G. Tsudik, and K. Viswanath. Flooding for reliable multicast in multi-hop ad hoc networks. In Proc. of DIAL-M, Seattle, WA, Aug. 1999. [19]. K. Obraczka and G. Tsudik. Multicast routing issues in ad hoc networks. In Proc. of IEEE ICUPC, Oct. 1998. [20]. Wendi Beth Heinzelman, Application- Specific Protocol Architectures for Wireless Networks, [PhdThesis], June, 2000. [21]. "Network Simulator",[Online] available at: https://www.isi.edu/nsnam/ns/