LAR utilizes location information to improve routing efficiency by reducing control overhead. It uses GPS to obtain geographical information. There are two zones in LAR - the ExpectedZone where the destination is expected to be based on past location/mobility, and the RequestZone where routing packets can propagate. A RequestZone is created around the source and ExpectedZone, and routing requests are only forwarded to neighbors in this zone. Replies include current location, time, and sometimes speed. Intermediate nodes only forward if their distance to the destination is less than the source's distance. LAR reduces overhead but requires GPS, limiting its applicability.
Medium Access Control :-
1.Distributed Operation
2.Synchronization
3.Hidden Terminals
4.Exposed terminals
5.Throughput
6.Access delay
7.Fairness
8.Real-time Traffic support
9.Resource reservation
10.Ability to measure resource availability
11.Capability for power control
Adaptive rate control
Use of directional antennas
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
Ā
Overview of the Fisheye State Routing (FSR) for cellular networks, IDC 2012
By Yoav Francis and Nir Solomon
(Part of a performance comparison of various routing algorithms in cellular networks)
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
Ā
Wireless Sensor Networks (WSNs) are composed self-organized wireless ad hoc networks which comprise of a large number of resource constrained sensor nodes. The major areas of research in WSN is going on hardware, and operating system of WSN, deployment, architecture, localization, synchronization, programming models, data aggregation and dissemination, database querying, architecture, middleware, quality of service and security. This paper study highlights ongoing research activities and issues that affect the design and performance of Wireless Sensor Network.
Distributed Operation
Synchronization
Hidden Terminals
Exposed terminals
Throughput
Access delay
Fairness
Real-time Traffic support
Resource reservation
Ability to measure resource availability
Capability for power control
Adaptive rate control
Use of directional antennas
Medium Access Control :-
1.Distributed Operation
2.Synchronization
3.Hidden Terminals
4.Exposed terminals
5.Throughput
6.Access delay
7.Fairness
8.Real-time Traffic support
9.Resource reservation
10.Ability to measure resource availability
11.Capability for power control
Adaptive rate control
Use of directional antennas
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
Ā
Overview of the Fisheye State Routing (FSR) for cellular networks, IDC 2012
By Yoav Francis and Nir Solomon
(Part of a performance comparison of various routing algorithms in cellular networks)
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
Ā
Wireless Sensor Networks (WSNs) are composed self-organized wireless ad hoc networks which comprise of a large number of resource constrained sensor nodes. The major areas of research in WSN is going on hardware, and operating system of WSN, deployment, architecture, localization, synchronization, programming models, data aggregation and dissemination, database querying, architecture, middleware, quality of service and security. This paper study highlights ongoing research activities and issues that affect the design and performance of Wireless Sensor Network.
Distributed Operation
Synchronization
Hidden Terminals
Exposed terminals
Throughput
Access delay
Fairness
Real-time Traffic support
Resource reservation
Ability to measure resource availability
Capability for power control
Adaptive rate control
Use of directional antennas
This paper is a comprehensive survey of the various operating systems available for the Internet of Things environment. At first the paper introduces the various aspects of the operating systems designed for the IoT environment where resource constraint poses a huge problem for the operation of the general OS designed for the various computing devices. The latter part of the paper describes the various OS available for the resource constraint IoT environment along with the various platforms each OS supports, the software development kits
available for the development of applications in the respective OSāes along with the various protocols implemented in these OSāes for the purpose of communication and networking.
Improved Power Aware Location Based RoutingIOSR Journals
Ā
Abstract : With rapid growth in wireless Ad Hoc networks, Quality of service factor has drawn a great attention of researchers. Whereas network topology of wireless networks constantly changes, resources like bandwidth and energy are also limited. As power is very important factor for the proper working of Ad Hoc networks, need of the time is to research about efficient utilization of power. In the paper, we improve LAR (Location-Aided Routing), one of the most famous location based routing methods, which uses GPS technique to get information about the location of mobile node. Our new protocol considers both areas of routing and power. At first, propose a more efficient routing method which finds more stable paths .Secondly, a power aware method is proposed to have a prior knowledge about the remaining battery backups of all the intermediate nodes so that the nodes with battery backups equal to or greater than the minimum threshold power are the part of path between source and destination. This work presents an efficient approach for providing QOS in power aware scenario. Keywords: Ad hoc networks, Average power, Expected Zone, Requested Zone, Threshold power
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Eswar Publications
Ā
Ad hoc networks are collections of mobile nodes communicating with each other using wireless media without any fixed infrastructure. During both route discovery and traversal of route-reply packets from destination to source,
broadcast of packets is required which incurs huge message cost. The present article deals with the message cost
reduction during transmission of route-reply from destination to source. Also the redundancy that is visible within the 2-hop neighborhood of a node is minimized during broadcasting of route-reply. This improves the average lifetime of network nodes by decreasing the possibility of network partition. The scheme of 2NI can be used with any reactive routing protocol in MANETs.
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsNarendra Singh Yadav
Ā
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self-administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networksā the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction normalized routing load, average end to end delay by varying speed of nodes, traffic sources and mobility.
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
Ā
In this paper, we proposed a replacement hybrid multipath routing protocol for
MANET known as Hybrid Multipath Progressive Routing Protocol for MANET (HMPRP),
during this work we improve the performance of accepted MANET routing protocols,
namely, the Ad-hoc On-demand Distance Vector routing protocol and use of their most
popular properties to formulate a replacement Hybrid routing protocol using the received
signal strength. The proposed routing protocol optimizes the information measure usage of
MANETs by reducing the routing overload and overhead. This proposed routing protocol
additionally extends the battery lifetime of the mobile devices by reducing the specified
variety of operations for (i) Route determination (ii) for packet forwarding. Simulation
results are used to draw conclusions regarding the proposed routing algorithm and
compared it with the AODV, OLSR, and ZRP protocol. Experiments carried out based on
this proposed algorithm, shows that better performance are achieved with regard to AODV,
OLSR, and ZRP routing algorithm in terms of packet delivery ratio, throughput, energy
consumed and end-to-end packet delay.
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
Ā
MANET is a cooperative wireless network in which mobile nodes are responsible for routing and
forwarding packets from and to other nodes. Noncooperation is a challenge that definitely degrades the
performance of MANET. A misbehaving or selfish node may make use of other nodes in the network, but
decline to share its own resources with them. These selfish nodes may severely affect the performance of
routing protocols in MANET.
In this paper, we compare the performance of four routing protocols under security attack of node
misbehavior in MANET. We investigate AODV and DSR reactive routing protocols and OLSR and GRP
proactive routing protocols using Riverbed Modeler simulator. The performance comparison is carried out
using two types of misbehaving nodes. The metrics used are End-to-End delay, Packet Delivery Ratio, Data
dropped and the Load. The experimental results show that AODV routing protocol performs better than the
other routing protocols with higher packet delivery ratio. Further, OLSR routing protocol outperforms the
other routing protocols with minimum End-to-End delay.
This slide tells about the Digital Portfolio and footprint creation in the internet through social media. Its a must for college students to showcase their skills and accomplishments.
This slide shows the question paper setting for Computer science and engineering. How to set a question using Higher Order Thinking Skills. This slide will be an eye opener for those who need to set an higher order thinking question
When you add a new module or modify a existing source code, then ns2 needs to be recompiled. How to recompile and where to do the modifications are mentioned in this slide
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
Ā
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
Ā
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Make a Field invisible in Odoo 17Celine George
Ā
It is possible to hide or invisible some fields in odoo. Commonly using āinvisibleā attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Roman Empire A Historical Colossus.pdfkaushalkr1407
Ā
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesarās dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empireās birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empireās society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
Ā
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Model Attribute Check Company Auto PropertyCeline George
Ā
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
2. LAR
ā Utilises the location information for improving the
efļ¬ciency of routing by reducing control overhead!
ā It uses GPS for obtaining the Geographical information
3. Zones in LAR
ā Two zones in LAR namely ExpectedZone and RequestZone!
ā ExpectedZone is the zone where the destination is expected to be
present based on the past location and its mobility. if such an
information is not available, then the entire network is said to be the
ExpectedZone!
ā RequestZone - It is the zone in which the path ļ¬nding control packets
are permitted to be propagated. !
ā If the sender nodes or the intermediate relay nodes are not present in this
zone, then additional area will be selected for propagation.!
ā But usually, the nodes outside the RequestZone discards the control
packets.
4. LAR1
ā A RequestZone is framed that includes the Source node
and the ExpectedZone (rectangle region). When the
source node is inside the ExpectedZone, the size reduces
to be the ExpectedZone.!
ā RREQ packet is forwarded every neighbor node and the
packet will be discarded if the node is outside the
RequestZone!
ā RREP can be with current location, current time and in
some cases speed of the node also.
5.
6. LAR2
ā This is based on the distance from the source to
Destination node in the RREQ packet. !
ā When an intermediate node receives this packet, it
computes the distance to Destination and if it less, then
it forwards the packet, else the packet is dropped.
7.
8. Pros and Cons of LAR
ā Pros!
ā Reduces the control overhead!
ā Bandwidth utilisation!
ā Cons !
ā Since this is based on GPS, may not be suitable if no
such facility available
9. Power Aware Routing Metrics
ā Minimal Energy Consumption per packet!
ā Energy consumed by a packet is the sum of energies required at every
intermediate hops!
ā Maximum Network Connectivity!
ā Minimum variance in node power levels!
ā distribution of load among all nodes to that all the nodes' power
consumption distribute uniformly!
ā Minimum Cost per packet!
ā Function of state of node's battery!
ā Cost of a node is calculated based on the battery discharge
10. Ref: Siva Ram Murthy, B S Manoj, Adhoc Wireless
Networks, Architectures and Protocols