Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field free for the
nodes to move. The most important aspect of this kind of network turns into a great disadvantage when it
comes to commercial applications, take as an example: the automotive networks that allow communication
between a groups of vehicles. The ad hoc on-demand distance vector (AODV) routing protocol, designed
for mobile ad hoc networks, has two main functions. First, it enables route establishment between a source
and a destination node by initiating a route discovery process. Second, it maintains the active routes, which
means finding alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and accurately.
In this paper, we focused in the first point to enhance the local decision of each node in the network by the
quantification of the mobility of their neighbours. Quantification is made around RSSI algorithm a well
known distance estimation method.
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field
free for the nodes to move. The most important aspect of this kind of network turns into a great
disadvantage when it comes to commercial applications, take as an example: the automotive
networks that allow communication between a groups of vehicles. The ad hoc on-demand
distance vector (AODV) routing protocol, designed for mobile ad hoc networks, has two main
functions. First, it enables route establishment between a source and a destination node by
initiating a route discovery process. Second, it maintains the active routes, which means finding
alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and
accurately. In this paper, we focused in the first point to enhance the local decision of each node
in the network by the quantification of the mobility of their neighbours. Quantification is made
around RSSI algorithm a well known distance estimation method.
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
The growth in wireless communication technologies has resulted in a considerable amount of
attention given to mobile adhoc networks. All mobile hosts in an adhoc network are embedded with
packet forwarding capabilities. It is decentralized and is independent of infrastructure. Since mobile
hosts in an adhoc network usually move freely, the topology of the network changes dynamically and
disconnection occurs frequently. These characteristics require the routing protocols to find an
alternative path towards the destination for data transfer. The existing on-demand routing protocols
does the alternative path establishment only after the disconnection of links in the existing path. The
data sent by the source during alternate path establishment period will be lost leading to incomplete
data transfer. The network traffic will therefore increase considerably. This problem can be overcome
by establishing an alternative path when the existing path is more likely to be broken, by sending a
warning message to the source indicating the likelihood of disconnection. In this paper an attempt has
been made to analyze a protocol that improves the network connectivity by preempting the alternative
path before the existing link gets failed by monitoring the signal strength and ‘age of the path’.
Performance Evalution of MANET Routing Protocols using Reference Point Group ...ijasuc
An ad hoc network is often defined as an “infrastructureless” network, meaning a network without the
usual routing infrastructure like fixed routers and routing backbones. Typically, the ad hoc nodes are
mobile and the underlying communication medium is wireless. Each ad hoc node may be capable of acting
as a router.it’s charactrizied by multihop wireless connection and frequently changing networks.we
compare the performance of on-demand routing protocols for mobile ad-hoc networks are distributed
cache updating for the dynamic source routing protocol(DSR) and ad hoc on-demand distance vector
routing (AODV).the simulation model of the medium access control(MAC) layer is evaluting the
performance of MANET protocols.DSR and AODV protocols share similar behavours.we evalute the
both on demand protocols DSR and AODV based on packet delivery ratio , packet delivery latency,mobility
variation with total number of errors, packet and normalized routing overhead,end-to-end delay by varying
in node density.the performance and characterictics are explained by the graph models.
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as a router, forwarding information packets for other mobile nodes. There are many routing protocols that possess different performance levels in different scenarios. The main task is to evaluate the existing routing
protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV, OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational conditions for each MANETs protocol. We study these five MANETs routing protocols by different simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay, Normalized Routing Load and Average Throughput.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field
free for the nodes to move. The most important aspect of this kind of network turns into a great
disadvantage when it comes to commercial applications, take as an example: the automotive
networks that allow communication between a groups of vehicles. The ad hoc on-demand
distance vector (AODV) routing protocol, designed for mobile ad hoc networks, has two main
functions. First, it enables route establishment between a source and a destination node by
initiating a route discovery process. Second, it maintains the active routes, which means finding
alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and
accurately. In this paper, we focused in the first point to enhance the local decision of each node
in the network by the quantification of the mobility of their neighbours. Quantification is made
around RSSI algorithm a well known distance estimation method.
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
The growth in wireless communication technologies has resulted in a considerable amount of
attention given to mobile adhoc networks. All mobile hosts in an adhoc network are embedded with
packet forwarding capabilities. It is decentralized and is independent of infrastructure. Since mobile
hosts in an adhoc network usually move freely, the topology of the network changes dynamically and
disconnection occurs frequently. These characteristics require the routing protocols to find an
alternative path towards the destination for data transfer. The existing on-demand routing protocols
does the alternative path establishment only after the disconnection of links in the existing path. The
data sent by the source during alternate path establishment period will be lost leading to incomplete
data transfer. The network traffic will therefore increase considerably. This problem can be overcome
by establishing an alternative path when the existing path is more likely to be broken, by sending a
warning message to the source indicating the likelihood of disconnection. In this paper an attempt has
been made to analyze a protocol that improves the network connectivity by preempting the alternative
path before the existing link gets failed by monitoring the signal strength and ‘age of the path’.
Performance Evalution of MANET Routing Protocols using Reference Point Group ...ijasuc
An ad hoc network is often defined as an “infrastructureless” network, meaning a network without the
usual routing infrastructure like fixed routers and routing backbones. Typically, the ad hoc nodes are
mobile and the underlying communication medium is wireless. Each ad hoc node may be capable of acting
as a router.it’s charactrizied by multihop wireless connection and frequently changing networks.we
compare the performance of on-demand routing protocols for mobile ad-hoc networks are distributed
cache updating for the dynamic source routing protocol(DSR) and ad hoc on-demand distance vector
routing (AODV).the simulation model of the medium access control(MAC) layer is evaluting the
performance of MANET protocols.DSR and AODV protocols share similar behavours.we evalute the
both on demand protocols DSR and AODV based on packet delivery ratio , packet delivery latency,mobility
variation with total number of errors, packet and normalized routing overhead,end-to-end delay by varying
in node density.the performance and characterictics are explained by the graph models.
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as a router, forwarding information packets for other mobile nodes. There are many routing protocols that possess different performance levels in different scenarios. The main task is to evaluate the existing routing
protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV, OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational conditions for each MANETs protocol. We study these five MANETs routing protocols by different simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay, Normalized Routing Load and Average Throughput.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
Ad hoc network is a network without centralized administration in which different users can communicate and exchange information. In such a structure, all the nodes participate in order to achieve the network and ensure the travel of the information. Hence, multihopping techniques are used to achieve this task. The communication reliability within an ad hoc network and how the different nodes act are managed by routing protocols. Nowadays, different types of protocols exist. Nevertheless, the source routing ones, based on information known at the source of the communication, seem to attract more studies. Source routing protocols had shown interesting results in realistic scenarios in areas such as military battlefields or airport stations.
This Paper deals with DSR Protocol and is focused on the multipath aspect of this routing protocol. Since, it is necessary to understand that multipath techniques enhance reliability and can ensure security. We have simulated a new multipath algorithm. The solution had been evaluated with the network Simulator 2. Since we want to know how our protocol reacts in different mobility cases, the random waypoint model which allows us to present relevant results, due to the fact this situation is taken into account.
Simulation results show that the multipath protocol behaves better than DSR, the main actual reactive protocol. The Proposed protocol MSR performs well in high mobility by using much less overhead than DSR. Additionally, it is interesting to see that DSR without any modifications manage poorly in high mobility situation.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
A Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions and do not adapt well with high mobility conditions. Therefore, considering mobility is a demanding task that should be performed efficiently and accurately. Here, we proposed novel mobility-aware routing protocol based on the well known Ad-hoc On Demand Distance Vector (AODV) routing protocol called: MA-AODV (Mobility Aware Ad-hoc On Demand Distance Vector) in an attempt to improve the handling of high mobility factor in ad-hoc networks. MA-AODV protocols perform periodic quantification of nodes mobility for the sake of establishing more stable paths between source/destination pairs, hence, avoiding the frequent link breakages associated with using unstable paths that contain high mobile nodes.
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
MANET is a cooperative wireless network in which mobile nodes are responsible for routing and
forwarding packets from and to other nodes. Noncooperation is a challenge that definitely degrades the
performance of MANET. A misbehaving or selfish node may make use of other nodes in the network, but
decline to share its own resources with them. These selfish nodes may severely affect the performance of
routing protocols in MANET.
In this paper, we compare the performance of four routing protocols under security attack of node
misbehavior in MANET. We investigate AODV and DSR reactive routing protocols and OLSR and GRP
proactive routing protocols using Riverbed Modeler simulator. The performance comparison is carried out
using two types of misbehaving nodes. The metrics used are End-to-End delay, Packet Delivery Ratio, Data
dropped and the Load. The experimental results show that AODV routing protocol performs better than the
other routing protocols with higher packet delivery ratio. Further, OLSR routing protocol outperforms the
other routing protocols with minimum End-to-End delay.
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
This paper evaluates the energy consumption of well-known routing protocols, along with other metrics
such as throughput, packet delivery ratio (PDR), and delay in different scenarios. We consider two other
metrics in order to capture the efficiency of the energy consumption: e-throughput which is the ratio
between the consumed energy and the throughput; and the e-PDR which is the ratio between the
consumed energy and the PDR. We compare four routing protocols: AODV, OLSR, and HWMP in
Reactive and Proactive modes. The number of nodes is varying between 25 and 81 nodes, with different
mobility models. Simulations are conducted using NS3 and the parameters of a real network interface
card. From the results, AODV presents the lowest energy consumption and a better e-Throughput. OLSR
provides a better e-PDR in mobile scenarios. With a smaller e-PDR and e-Throughput, the proactive
mode of HWMP is more energy efficient than the reactive mode.
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
An Ad hoc network is a collection of wireless mobile hosts forming a temporary network without the
aid of any centralized administration or standard support services. MANET can be defined using unstable
network infrastructure, self-organizing network topology and independent node mobility. This becomes
obtainable due to their routing techniques; in other terms, routing is a backbone for MANET. However, due to
network load routing performance of MANET is degraded thus, some optimization on network routing strategy
is required.
In this paper, we introduce a new technique by using the concept of Genetic algorithm (GA) with
AODV Protocol to make routing decision in computer network.
The goal of this paper is to find the optimal path between the source and destination nodes and increased the
QoS and Throughput. We implemented and compare this a new technique with the traditional AODV, and we
shows that the new technique is better performance than the traditional AODV.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...ijwmn
The paper describes how to improve channel estimation in Single Carrier Frequency Division Multiple
Access (SC-FDMA) system, using a Hybrid Artificial Neural Networks (HANN). The 3rd Generation
Partnership Project (3GPP) standards for uplink Long Term Evolution Advanced (LTE-A) uses pilot based
channel estimation technique. This kind of channel estimation method suffers from a considerable loss
ofbitrate due to pilot insertion; all data frame sent contains reference signal. The HANN converts data
aided channel estimator to semi blind channel estimator. To increase convergence speed, HANN uses some
channel propagation Fuzzy Rules to initialize Neural Network parameters before learning instead of a
random initialization, so its learning phase ismore rapidly compared to classic ANN.HANN allows more
bandwidth efficient and less complexity. Simulation results show that HANN has better computational
efficiency than the Minimum Mean Square Error (MMSE) estimator and has faster convergence than
classic Neural Networks estimators.
Steganography is a technology used since years for the communication of messages secretly. These secret messages are put inside honest carriers. Carriers can be digital images, audio files, video files and so on. The limitation in sending concealed longer messages has been overcoming by the inclusion of video files as carriers. Popular internet services such as Skype, BitTorrent, Google Suggest, and
WLANs are targets of information hiding techniques. Nowadays, plotters are not only using the carriers but also the protocols for communication that regulate the path of the carrier through the Internet. This technique is named Network Steganography.
Interference management in lte downlink networksijwmn
Two major challenges for evolving LTE (Long Term Evolution) networks are to achieve enhanced system capacity and cell coverage compared with WCDMA (Wideband Code Division Multiple Access) system. Effective utilization of radio resources as well as dense spectrum reuse are at the core to attain these targets. However, dense frequency reuse may increase inter-cell interference, which in turn severely limits the capacity of users in the system. Inter-cell interference can restrict overall system performance in terms of throughput and spectral efficiency, especially for the users located at the cell edge area. Hence, careful management of inter-cell interferences becomes crucial to improve LTE system performance. In this paper, interference mitigation schemes for LTE downlink networks are investigated.
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKSijwmn
Device-to-Device (D2D) communication is a new technology that offer many advantages for the LTEadvanced
network such us wireless peer-to-peer services and higher spectral efficiency. It is also
considered as one of promising techniques for the 5G wireless communications system and used in so
many different fields such as network traffic offloading, public safety, social services and applications such
as gaming and military applications . The goal of this paper is to present advances on the current 3GPP
LTE-advanced system related to Device-to-Device (D2D). In this paper, we provide an overview of the
D2D types based on the communication spectrum of D2D transmission, namely Inband D2D
communication and Outband D2D communication. Then we present the advantages and disadvantages of
each D2D mode. Moreover, architecture and protocol enhancements for D2D communications under
LTE-A network are described.
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
Ad hoc network is a network without centralized administration in which different users can communicate and exchange information. In such a structure, all the nodes participate in order to achieve the network and ensure the travel of the information. Hence, multihopping techniques are used to achieve this task. The communication reliability within an ad hoc network and how the different nodes act are managed by routing protocols. Nowadays, different types of protocols exist. Nevertheless, the source routing ones, based on information known at the source of the communication, seem to attract more studies. Source routing protocols had shown interesting results in realistic scenarios in areas such as military battlefields or airport stations.
This Paper deals with DSR Protocol and is focused on the multipath aspect of this routing protocol. Since, it is necessary to understand that multipath techniques enhance reliability and can ensure security. We have simulated a new multipath algorithm. The solution had been evaluated with the network Simulator 2. Since we want to know how our protocol reacts in different mobility cases, the random waypoint model which allows us to present relevant results, due to the fact this situation is taken into account.
Simulation results show that the multipath protocol behaves better than DSR, the main actual reactive protocol. The Proposed protocol MSR performs well in high mobility by using much less overhead than DSR. Additionally, it is interesting to see that DSR without any modifications manage poorly in high mobility situation.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
A Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions and do not adapt well with high mobility conditions. Therefore, considering mobility is a demanding task that should be performed efficiently and accurately. Here, we proposed novel mobility-aware routing protocol based on the well known Ad-hoc On Demand Distance Vector (AODV) routing protocol called: MA-AODV (Mobility Aware Ad-hoc On Demand Distance Vector) in an attempt to improve the handling of high mobility factor in ad-hoc networks. MA-AODV protocols perform periodic quantification of nodes mobility for the sake of establishing more stable paths between source/destination pairs, hence, avoiding the frequent link breakages associated with using unstable paths that contain high mobile nodes.
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
MANET is a cooperative wireless network in which mobile nodes are responsible for routing and
forwarding packets from and to other nodes. Noncooperation is a challenge that definitely degrades the
performance of MANET. A misbehaving or selfish node may make use of other nodes in the network, but
decline to share its own resources with them. These selfish nodes may severely affect the performance of
routing protocols in MANET.
In this paper, we compare the performance of four routing protocols under security attack of node
misbehavior in MANET. We investigate AODV and DSR reactive routing protocols and OLSR and GRP
proactive routing protocols using Riverbed Modeler simulator. The performance comparison is carried out
using two types of misbehaving nodes. The metrics used are End-to-End delay, Packet Delivery Ratio, Data
dropped and the Load. The experimental results show that AODV routing protocol performs better than the
other routing protocols with higher packet delivery ratio. Further, OLSR routing protocol outperforms the
other routing protocols with minimum End-to-End delay.
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
This paper evaluates the energy consumption of well-known routing protocols, along with other metrics
such as throughput, packet delivery ratio (PDR), and delay in different scenarios. We consider two other
metrics in order to capture the efficiency of the energy consumption: e-throughput which is the ratio
between the consumed energy and the throughput; and the e-PDR which is the ratio between the
consumed energy and the PDR. We compare four routing protocols: AODV, OLSR, and HWMP in
Reactive and Proactive modes. The number of nodes is varying between 25 and 81 nodes, with different
mobility models. Simulations are conducted using NS3 and the parameters of a real network interface
card. From the results, AODV presents the lowest energy consumption and a better e-Throughput. OLSR
provides a better e-PDR in mobile scenarios. With a smaller e-PDR and e-Throughput, the proactive
mode of HWMP is more energy efficient than the reactive mode.
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
An Ad hoc network is a collection of wireless mobile hosts forming a temporary network without the
aid of any centralized administration or standard support services. MANET can be defined using unstable
network infrastructure, self-organizing network topology and independent node mobility. This becomes
obtainable due to their routing techniques; in other terms, routing is a backbone for MANET. However, due to
network load routing performance of MANET is degraded thus, some optimization on network routing strategy
is required.
In this paper, we introduce a new technique by using the concept of Genetic algorithm (GA) with
AODV Protocol to make routing decision in computer network.
The goal of this paper is to find the optimal path between the source and destination nodes and increased the
QoS and Throughput. We implemented and compare this a new technique with the traditional AODV, and we
shows that the new technique is better performance than the traditional AODV.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...ijwmn
The paper describes how to improve channel estimation in Single Carrier Frequency Division Multiple
Access (SC-FDMA) system, using a Hybrid Artificial Neural Networks (HANN). The 3rd Generation
Partnership Project (3GPP) standards for uplink Long Term Evolution Advanced (LTE-A) uses pilot based
channel estimation technique. This kind of channel estimation method suffers from a considerable loss
ofbitrate due to pilot insertion; all data frame sent contains reference signal. The HANN converts data
aided channel estimator to semi blind channel estimator. To increase convergence speed, HANN uses some
channel propagation Fuzzy Rules to initialize Neural Network parameters before learning instead of a
random initialization, so its learning phase ismore rapidly compared to classic ANN.HANN allows more
bandwidth efficient and less complexity. Simulation results show that HANN has better computational
efficiency than the Minimum Mean Square Error (MMSE) estimator and has faster convergence than
classic Neural Networks estimators.
Steganography is a technology used since years for the communication of messages secretly. These secret messages are put inside honest carriers. Carriers can be digital images, audio files, video files and so on. The limitation in sending concealed longer messages has been overcoming by the inclusion of video files as carriers. Popular internet services such as Skype, BitTorrent, Google Suggest, and
WLANs are targets of information hiding techniques. Nowadays, plotters are not only using the carriers but also the protocols for communication that regulate the path of the carrier through the Internet. This technique is named Network Steganography.
Interference management in lte downlink networksijwmn
Two major challenges for evolving LTE (Long Term Evolution) networks are to achieve enhanced system capacity and cell coverage compared with WCDMA (Wideband Code Division Multiple Access) system. Effective utilization of radio resources as well as dense spectrum reuse are at the core to attain these targets. However, dense frequency reuse may increase inter-cell interference, which in turn severely limits the capacity of users in the system. Inter-cell interference can restrict overall system performance in terms of throughput and spectral efficiency, especially for the users located at the cell edge area. Hence, careful management of inter-cell interferences becomes crucial to improve LTE system performance. In this paper, interference mitigation schemes for LTE downlink networks are investigated.
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKSijwmn
Device-to-Device (D2D) communication is a new technology that offer many advantages for the LTEadvanced
network such us wireless peer-to-peer services and higher spectral efficiency. It is also
considered as one of promising techniques for the 5G wireless communications system and used in so
many different fields such as network traffic offloading, public safety, social services and applications such
as gaming and military applications . The goal of this paper is to present advances on the current 3GPP
LTE-advanced system related to Device-to-Device (D2D). In this paper, we provide an overview of the
D2D types based on the communication spectrum of D2D transmission, namely Inband D2D
communication and Outband D2D communication. Then we present the advantages and disadvantages of
each D2D mode. Moreover, architecture and protocol enhancements for D2D communications under
LTE-A network are described.
ENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOLijwmn
In Wireless Sensor Network, a large number of sensor nodes are deployed and they mainly consume energy
in transmitting data over long distances. Sensor nodes are battery powered and their energy is restricted.
Since the location of the sink is remote, considerable energy would be consumed if each node directly
transmits data to the base station. Aggregating data at the intermediate nodes and transmitting using multihops
aids in reducing energy consumption to a great extent. This paper proposes a hybrid protocol
“Energy efficient Grid and Tree based routing protocol” (EGT) in which the sensing area is divided into
grids. The nodes in the grid relay data to the cell leader which aggregates the data and transmits to the
sink using the constructed hop tree. Simulation results show that EGT performs better than LEACH.
L shaped slot loaded semicircular patch antenna for wideband operation ijwmn
In this paper, a dual frequency resonance antenna is analysed by introducing L-shaped slot in a semi
circular patch, different parametric studies have allows and the results in terms of return loss and
radiation pattern are given. The results show that dual wide bands are achieved and a better impedance
matching for the upper and lower resonance are obtained. Also, it is observed that various antenna
parameters are obtained as a function of frequency for different value of slot length and width; it is easy to
adjust the upper and the lower band by varying these different antenna parameters. The coaxial feed is
used to excite the patch antenna. Theoretical results using Matlab are compared with the simulated results
obtained from Ansoft HFSS software and shown to be in good agreement.
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORKijwmn
In this paper, we propose a novel energy efficient environment monitoring scheme for wireless sensor
networks, based on data mining formulation. The proposed adapting routing scheme for sensors for
achieving energy efficiency from temperature wireless sensor network data set. The experimental
validation of the proposed approach using publicly available Intel Berkeley lab Wireless Sensor Network
dataset shows that it is possible to achieve energy efficient environment monitoring for wireless sensor
networks, with a trade-off between accuracy and life time extension factor of sensors, using the proposed
approach.
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...ijwmn
We propose in this paper a connectivity-aware routing algorithm and a set of related theorems. This algorithm allows nodes in Mobile Adhoc and Sensor Networks (MASNets) to provide the highest connectivity life time to a specific destination since the issuance of data becomes a necessity for MASNets. In the proposed Solution, nodes in MASNets are able to specify the disjointness degree of the available paths allowing the discovery of the optimal set of backup routes and consequently enhance the survivability of the connectivity. These nodes perform an on-demand discovery and a generation of a set of routes, by specifying a disjointness threshold, representing the maximal number of nodes shared between any two paths in the set of k established paths. The proposed multipath routing algorithm, is adaptive, secure, and uses labels to carry the disjointness-threshold between nodes during the route discovery. A set of security mechanisms, based on the Watchdog and the digital signature concepts, is used to protect the route discovery process.
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
The proportional fair (PF) scheduling algorithm com
promises between cell throughput and fairness. Many
research findings have been published by various re
searchers about PF algorithm based on mathematical
model and simulations. In this paper we have taken
the practical route to analyse the algorithm based
on
three types of subscription. In this benchmarking s
tudy, the user subscriptions are differentiated as
Gold,
Silver and Bronze schemes and they are provisioned
with certain throughputs. Apart from subscriptions
plans, the channel condition also plays a major rol
e in determining the throughput. So in order to ens
ure
fairness among different subscriptions even in the
bad channel conditions and to deliver the provision
ed
throughputs certain priorities are attached with th
e subscriptions. As per the subscription plans Gold
subscribers are assigned with 50% of the speed offe
red by the network as maximum based on CAT3 speed
(100 Mbps in DL and 50 Mbps in UL), Silver is assig
ned with 25% of the max speed and Bronze is
assigned with 12% of the max speed. The priorities
assigned to subscribers determines the fairness in
the
unfavourable channel conditions - Bronze (high), Si
lver and Gold (medium). In this paper, an
benchmarking tests have been performed with all of
three types of subscribers for nearly two hours in
the
live single cell network without any heterogeneous
cells influencing it. Furthermore, the results are
compared with the simulation results.
A fuzzy congestion controller to detect and balance congestion in wsnijwmn
A Wireless Sensor Network (WSN) is collection of wireless sensors with limited memory, processing and energy supply. Based on application, sensors distribute in a wide geographically area in order to collect information and transmit the collected data packets toward a base station also called Sink. Due to the relatively high node density and source-to-sink communication pattern, congestion is a critical issue in WSN. Congestion not only causes packet loss, but also leads to excessive energy consumption as well as delay. To address this problem, in this paper we propose a new fuzzy logic based mechanism to detect and control congestion in each grid in WSN. In the proposed approach, sink select one node in each grid as Monitor Node. In addition, sink defines congestion candidate grids. Each Monitor Node in congestion candidate grids continually monitors the network and fetches the fuzzy controller inputs in order to determine level of congestion in each grid. Based on the congestion level, packets forward through the grid or relay nodes. Simulation results show that our approach has higher packet delivery ratio and lower packet loss than existing approaches.
In ad hoc networks, routing plays a pertinent role. Deploying the appropriate routing protocol is very important in order to achieve best routing performance and reliability. Equally important is the mobility model that is used in the routing protocol. Various mobility models are available and each can have different impact on the performance of the routing protocol. In this paper, we focus on this issue by examining how the routing protocol, Optimized Link State Routing protocol, behaves as the mobility model is varied. For this, three random mobility models, viz., random waypoint, random walk and random direction are considered. The performance metrics used for assessment of Optimized Link State Routing protocol are throughput, end-to-end delay and packet delivery ratio.
Unmanned aerial vehicles (UAVs) have become very popular recently for both civil uses and potential commercial uses, such as law enforcement, crop survey, grocery delivery, and photographing, although they were mainly used for military purposes before. Researchers need the help of simulations when they design and test new protocols for UAV networks because simulations can be done for a network of a size
that a test bed can hardly approach. In the simulation of an UAV network it is important to choose a radio propagation model for the links in the network. We study the shadowing radio propagation model in this paper and compare it with the free space model, both of which are available in the ns2 network simulation package. We also show how the choice of the parameters of the shadowing model would impact on the
network performance of a UAV network.
BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EME...ijwmn
Mobile Ad hoc Networks are open, shared, dynamic and self-organized networks. These distinct nature
lead to efficient use in emergency and recue scenarios where the sharing of information is necessary. In
order to share information within the network, a proper routing protocol is required to establish routes
between nodes. This article discusses which of the routing protocols such as reactive or proactive has
better performance in such scenario. In order to implement the test bed, we choose a real area in
Uttarakhand state, India where the disaster occurred recently hence so many civilizations had vanished
due to lack of communication and failure in recovery. Our aim is to choose an optimum routing protocol
that is correct and used for efficient route establishment between nodes so that message could be delivered
on time without loss and it will be implemented and used in future based on the model that we propose.
Energy balanced on demand clustering algorithm based on leach-cijwmn
As the use of Wireless Sensor Networks (WSNs) has grown enormously, the need for energy-efficient management has also risen. With advances in ubiquitous computing environment, WSNs have been broadly studied and many energy-efficient routing protocols had been proposed. LEACH (Low Energy Adaptive Clustering Hierarchy) is a popular cluster-based protocol, which provides distributed adaptive clustering and periodic cluster head (CH) selection rotation. As extension to LEACH, LEACH-C (LEACH Centralized) was proposed, in which the energy is utilized to select CH. However, both can’t guarantee cluster head distribution, in addition to considerable periodic clustering overhead. Furthermore, network topology change is a critical characteristic that has influence on communication path and load distribution among nodes. To resolve such problems, Energy-Balance on Demand Clustering Algorithm Based on LEACH-C is proposed. The algorithm adopts centralized cluster formation and distributed CH selection methods. Minimum energy clustering is used to divide the network into clusters, while energy and total communication distance are considered as secondary criteria to select optimal CH. From simulation results the proposed algorithm outperforms LEACH-C in life time, stability period and performance efficiency.
System level simulation for two tier macro femto cellular networksijwmn
LTE is an emerging wireless communication technology to provide high- speed data service for the mobile
phones and data terminals. To improve indoor coverage and capacity Femtocells are included in 3GPP
since Release 8. There is no common simulation platform is available for performance justification of LTEFemtocells.
LTE-Sim is an object-oriented open source simulator which incorporates a complete protocol
stack can be used for simulating two-tier macro-femto scenarios. To the best of our knowledge no paper
provides the guideline to perform system level simulation of Femtocell networks. Here, in this paper
Femtocells performance is evaluated in multi-Macrocells and multi-Femtocells environment with
interference from Microcells and Macrocell users along with the scripting.
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS ijwmn
The paper proposes a new method for the analysis and evaluation of the Quality of Service (QoS) in a
mobile Internet access scenario. In particular, the paper proposes a throughput evaluation method based
on PathChirp algorithm. The end-to-end bandwidth was estimated by means of the Self Loading of Periodic
Streams (SloPS) technique. The obtained measurements were then analyzed by estimating the degree of
correlation with other parameters that characterize the data transmission such as power, round trip time,
etc. Finally, in order to have greater spatial resolution performance guaranteed by an Internet service
provider, a 3D reconstruction method based on using drones is proposed and some preliminary results are
discussed.
Effective Road Model for Congestion Control in VANETSijwmn
Congestion on the roads is a key problem to deal with, which wastes valuable time.. Due to high mobility
rate and relative speed link failure occur very often. VANET is used to tackle the problem of congestion,
and make decisions well in advance to avoid traffic congestion. In this paper we proposed a solution to
detect and control the traffic congestion by using of both (V2V) and (V2I), as a result the drivers become
aware of the location of congestion as well as way to avoid getting stuck in congestion. The congestion is
detected by analyzing the data obtained by vehicular communication and road side units to avoid the
traffic. Our proposition system is competent of detecting and controlling traffic congestion in real-time.
V2V and V2I communication network is used to receive and send the messages. We simulate the result by
using Congestion Detection and Control Algorithm (CDCA), and show that this is one effective way to
control congestion. The Proposed methodology ensures reliable and timely delivery of messages to know
about congestion and avoid it.
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any
pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as
a router, forwarding information packets for other mobile nodes. There are many routing protocols that
possess different performance levels in different scenarios. The main task is to evaluate the existing routing
protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV,
OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational
conditions for each MANETs protocol. We study these five MANETs routing protocols by different
simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This
performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay,
Normalized Routing Load and Average Throughput.
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as a router, forwarding information packets for other mobile nodes. There are many routing protocols that
possess different performance levels in different scenarios. The main task is to evaluate the existing routing protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV, OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational conditions for each MANETs protocol. We study these five MANETs routing protocols by different
simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay, Normalized Routing Load and Average Throughput.
Multipath Fault Tolerant Routing Protocol in MANET pijans
Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically
exchange data among themselves without the reliance on a fixed base station or a wired backbone network
and it the makes the routing a crucial issue to the design of the MANET. Multiple path routing protocols
are shown to be performance-effective alternatives over single-path routing for ad hoc networks and it
represents a promising routing method for wireless mobile ad hoc networks. Multi-path routing achieves
load balancing and is more resilient to route failures..In this paper we propose an energy efficient
multipath fault tolerant routing protocol to improve the reliability of data routing in Mobile ad hoc
networks. The proposed RFTA is a multi objective routing protocol that meets diverse application
requirements by considering the changing conditions of the network. The efficiency of the proposed
protocol has been evaluated on different scenarios and there has been a noticeable improvement in the
packet delivery ratio and also in the reduction of end-to-end delay comparing to SMR,SMS and MDSR.
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
MANET is a temporary connection of mobile nodes via wireless links having no centralized base station.
We developed a protocol with an enhanced route discovery mechanism that avoids the pre-transmission
delay. When a source node wants to communicate with another node, it broadcast RREQ. EAODV give
priority to the source node of real time transmission. When RREQ packet send to neighbor node, for real
time transmission it accept route request on priority basis and the drop ratio of packets decreased, then
throughput increases by receiving more packets at destination and delivery ratio also increased through
these QOS improved.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
ADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKSijasuc
Enhancing route request broadcasting efficiency in protocols constitutes a substantial part of research in
Mobile Adhoc NETwork (MANET) routing. We suggest a novel approach to constrain route request
broadcast based on mobility of nodes. This technique is best suited for networks where the movement of
the nodes is with different random velocities in different random directions. This protocol adapts itself
automatically to two mobility conditions i.e. moderate and high speed. Intuition behind this technique is
that the nodes moving with higher mobility rates will have better recent routes compared to slow moving
nodes which may not be aware of the drastic changes happening in the network .In this approach we
select the neighbourhood nodes for broadcasting route requests based on their mobility rate and recent
involvement in routing so that blind flooding of the route request in the network can be avoided.
Our contributions include: (i) Two new enhancement technique to reduce route request broadcast for
reactive ad hoc routing protocols; (ii) Implementation of Enhanced Ad-hoc On-demand Distance Vector
routing 1 (EAODV1) for moderate speed of node movement;(iii) Implementation of Enhanced Ad-hoc Ondemand Distance Vector routing 2 (EAODV2) for high speed of node movement; (iv) Implementation of
Adaptive AODV (AAODV) which automatically switches over between EAODV1 and EAODV2 based on
the mobility of the nodes. (v) An extensive simulation study of EAODV1, EAODV2 and AAODV using
Glomosim showing significant improvement in overhead, packet delivery ratio and the end-to-end delay
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
A Performance Comparison of Routing Protocols for Ad Hoc NetworksIJERA Editor
Mobile Ad hoc Network (MANET) is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic infrastructure. Routing is a significant issue and challenge in ad hoc networks. Many routing protocols have been proposed like OLSR, AODV so far to improve the routing performance and reliability. In this paper, we describe the Optimized Link State Routing Protocol (OLSR) and the Ad hoc On-Demand Distance Vector (AODV). We evaluate their performance through exhaustive simulations using the Network Simulator 2 (ns2) by varying conditions (node mobility, network density).
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...inventionjournals
In this paper we propose a new modified adhoc routing algorithm for adhoc network that locally repairs a link failure and also conflicts the noise and link modification simultaneously. Due to topology changes caused by nodes’ mobility in adhoc network, the link routes get disconnected frequently. Our proposed scheme does a local repair of link failure and also takes care of malicious nodes with the help of a reliability measure while performing route discovery using link-prediction routing algorithm(LPRA). These two performance metrics are integrated by Route link-prediction algorithm. This algorithm is carried out as follows, Select the least dynamic route link with the longest lifetime for persistent data forwarding. Node Lifetime and link lifetime prediction methods. The receiver can measure the signal strength when it receives the packets from sender in same power level and then it calculates the distance between two nodes by applying the radio propagation model in LPRA using adhoc network. Simulation results show that our proposed schemeperforms better in comparison to a popular existing technique
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...IJCNCJournal
A Vehicular Ad Hoc Network (VANET) is a network formed purely among vehicles without presence of any
communication infrastructure as base stations and/or access point. Frequent topological changes due to
high mobility is one of the main issues in VANETs. In this paper we evaluate Ad-hoc On-Demand Distance
Vector (AODV) and Optimized Link State Routing (OLSR) routing protocols using 802.11a and 802.11p in
a realistic urban scenario. For this comparison, we chose five performance metrics: Path Availability, Endto-
End Delay, Number of Created Paths, Path Length and Path Duration. Simulation results show, that for
most of the metrics evaluated, OLSR outperforms AODV when 802.11p and that 802.11p is more efficient
in urban VANETs.
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly, thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable and consistent connectivity between the mobile nodes. They conclude logically based on the interaction between mobile nodes in MANET routing and encourage them to choose the optimum path between source and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as the optimized variant of link state routing in which packets are sent throughout the network using the multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol under condition of changing mobility speed and network density. The study's performance indicators are average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2 (NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise redundant data transmission during the normal message broadcast. The MPRs enhance the link state protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired broadcasts can be reduced and limited. Further research will focus on different scenario and environment using different mobility model.
Similar to Local distance's neighbouring quantification (20)
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Local distance's neighbouring quantification
1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 6, December 2014
DOI : 10.5121/ijwmn.2014.6604 45
LOCAL DISTANCE’S NEIGHBOURING
QUANTIFICATION
Meryem Saadoune1
, Abdelmajid Hajami² and Hakim Allali³
Department of Mathematics and Computer Sciences, Hassan 1st
University, Settat,
Morocco
ABSTRACT
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field free for the
nodes to move. The most important aspect of this kind of network turns into a great disadvantage when it
comes to commercial applications, take as an example: the automotive networks that allow communication
between a groups of vehicles. The ad hoc on-demand distance vector (AODV) routing protocol, designed
for mobile ad hoc networks, has two main functions. First, it enables route establishment between a source
and a destination node by initiating a route discovery process. Second, it maintains the active routes, which
means finding alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and accurately.
In this paper, we focused in the first point to enhance the local decision of each node in the network by the
quantification of the mobility of their neighbours. Quantification is made around RSSI algorithm a well
known distance estimation method.
KEYWORDS
Ad hoc, Mobility, RSSI, AODV, Localization, Distance, GPS-free.
1.INTRODUCTION
Mobile ad hoc network (MANET) is an appealing technology that has attracted lots of research
efforts. Ad hoc networks are temporary networks with a dynamic topology which doesn’t have
any established infrastructure or centralized administration or standard support devices regularly
available as conventional networks [1]. Mobile Ad Hoc Networks (MANETs) are a set of
wireless mobile nodes that cooperatively form a network without infrastructure, those nodes can
be computers or devices such as laptops, PDAs, mobile phones, pocket PC with wireless
connectivity. The idea of forming a network without any existing infrastructure originates
already from DARPA (Defense Advanced Research Projects Agency) packet radio network's
days [2][3]. In general, an Ad hoc network is a network in which every node is potentially a
router and every node is potentially mobile. The presence of wireless communication and
mobility make an Ad hoc network unlike a traditional wired network and requires that the routing
protocols used in an Ad hoc network be based on new and different principles. Routing protocols
for traditional wired networks are designed to support tremendous numbers of nodes, but they
assume that the relative position of the nodes will generally remain unchanged. In ad hoc, since
the nodes are mobile, the network topology may change rapidly and unpredictably and the
connectivity among the terminals may vary with time. However, since there is no fixed
infrastructure in this network, each mobile node operates not only as a node but also as a router
forwarding packets from one node to other mobile nodes in the network that are outside the range
of the sender. Routing, as an act of transporting information from a source to a destination
through intermediate nodes, is a fundamental issue for networks. [4]
2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 6, December 2014
46
The problem that arises in the context of ad hoc networks is an adaptation of the method of
transport used with the large number of existing units in an environment characterized by modest
computing capabilities and backup and fast topology changes.
According to the way of the creation and maintenance of roads in the routing of data, routing
protocols can be separated into three categories, proactive, reactive and hybrid protocols. The
pro-active protocols establish routes in advance based on the periodic exchange of the routing
tables, while the reactive protocols seek routes to the request. A third approach, which combines
the strengths of proactive and reactive schemes, is also presented. This is called a hybrid protocol.
Ad-hoc On-Demand Distance Vector routing protocol (AODV) [5] is a reactive routing protocol,
who was standardized by the working group MANET [6] with IETF (Internet Engineering Task
force), by the (RFC 3561).
The protocol's algorithm creates routes between nodes only when the routes are requested by
the source nodes, giving the network the flexibility to allow nodes to enter and leave the network
at will. Routes remain active only as long as data packets are traveling along the paths from the
source to the destination .When the source stops sending packets, the path will time out and close.
In this paper we propose a solution that enables each node in the network to determine the
location of its neighbors in order to create a more stable and less mobile road. For that purpose,
we locally quantify the neighbor’s distances of a node as the metric of mobility using AODV
protocol.
The remainder of this paper is organized as follows. Section 2, describes briefly the AODV
protocol. In Section 3, a summary of related work is presented. we present in Section 4 how to
quantify, evaluate, estimate mobility in ad hoc network. Section 5 shows the algorithm used the
quantification of the distance in AODV protocol. Section 6 presents some simulations and results.
Finally Section 7 concludes this paper.
2. AD HOC ON-DEMAND DISTANCE VECTOR
AODV is an on-demand protocol which is capable of providing unicast, multicast [7], broadcast
communication and Quality of Service aspects (QoS) [8], [9]. It combines mechanisms of
discovery and maintenance roads of DSR (RFC 4728) [10] involving the sequence number (for
maintains the consistency of routing information) and the periodic updates of DSDV [11].
At the discovery of routes, AODV maintains on each node transit information on the route
discovery, the AODV routing tables contain:
- The destination address
- The next node
- The distance in number of nodes to traverse
- The sequence number of destination
- The expiry date of the entry of the table time.
When a node receives a packet route discovery (RREQ), it also notes in its routing table
information from the source node and the node that just sent him the package, so it will be able to
retransmit the response packet (RREP). This means that the links are necessarily symmetrical.
The destination sequence number field of a route discovery request is null if the source has never
been linked to the destination, else it uses the last known sequence number. It also indicates in
this query its own sequence number. When an application sends a route discovery, the source
3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 6, December 2014
47
waits for a moment before rebroadcast its search query (RREQ) road, after a number of trials, it
defines that the source is unreachable.
Maintained roads is done by periodically sends short message application called "HELLO" , if
three consecutive messages are not received from a neighbor, the link in question is deemed to
have failed . When a link between two nodes of a routing path becomes faulty, the nodes
broadcast packets to indicate that the link is no longer valid. Once the source is prevented, it can
restart a process of route discovery.
AODV maintains its routing tables according to their use, a neighbor is considered active as long
as the node delivers packets for a given destination, beyond a certain time without transmission
destination, the neighbor is considered inactive. An entered routing table is considered active if at
least one of the active neighbors using the path between source and destination through active
routing table entries is called the active path. If a link failure is detected, all entries of the routing
tables participating in the active path are removed.
3. RELATED WORK
In [12], a geometric mobility metric has been proposed to quantify the relative motion of nodes.
The mobility measure between any pair of nodes is defined as their absolute relative speed taken
as an average over time. This metric has certain deficiencies: First, it assumes a GPS like scheme
for calculation of relative speeds while in a MANET, we cannot assume the existence of GPS, so
we have to resort to other techniques for measuring relative mobility. Secondly, it is an
“aggregate” mobility metric and does not characterize the local movement of the neighboring
nodes to another particular node.
The Reference Point Group Mobility Model (RPGM) proposed in [13] was useful for predictive
group mobility management. In RPGM, each group has a logical “center” and the center’s motion
defines the entire group’s motion behavior including location, velocity, acceleration etc.
In [14], They proposed a measure of the network mobility which is relative and depending on
neighboring and link state changes. Each node estimates its relative mobility, based on changes of
the links in its neighboring. This measure of mobility has no unit, it is independent of any existing
mobility models and it is calculated at regular time intervals.
The degree mobility used in [15] was calculated from the change of its neighboring to each node
in time. The node mobility degree, represents at a given time for each node in the ad hoc
network, the change variations undergone in its neighboring compared to the previous time
. Thus, nodes that join or/and leave the neighboring of a given node will have surely
an influence on the evaluation of its mobility.
However, the last two measures are not representative’s values of a change node’s motion with
respect to another node.
We can see that none of the metrics described above are suitable for characterizing the relative
mobility of nodes in a particular node's neighborhood in a MANET. Hence, we feel that there is a
need to develop such a metric which can be used by any routing protocol.
4. LOCAL QUANTIFICATION OF NEIGHBOURING MOBILITY
In this section, we define how we estimate nodes mobility in ad hoc network. Mobility is
quantified locally and independently of localization of a given node. We represent this local
quantification node mobility, by calculating of the distance between a node and its neighbors.
4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 6, December 2014
48
The quantification of the distance can be done using 3 methods:
Calculate the exact distance: this is done by two ways:
1st way: The distance calculation using the GPS: This operation is done by using a terminal
capable of being localized through a positioning system by satellites: GPS. The principle of
localization by the GPS system is based on the use of satellite coordinates and the estimation of
distances between the receiver satellites. Distances are obtained from the estimation of the TOA
(Time Of Arrival) of the signals transmitted by the satellites [16]
2nd way: Distance calculation function in a simulation environment: Like NS2, OPNET, tor
other simulator.
Calculate the distance using the RSSI (Received Signal Strength Indication): in case that the
absolute positioning is not accessible, dedicated equipment not available or not possible, in
theory, to determine the distance between a transmitter and a receiver we can use the RSSI. RSSI
is a generic radio receiver technology metric, which is usually invisible to the user of the device
containing the receiver, but is directly known to users of wireless networking of IEEE
802.11 protocol family.
The distance using RSSI can be calculated using the FRIIS transmission formula:
۾ܚ ൌ
۾ܜ ۵ܜ ۵ܚ ૃ²
ሺૈሻ ۺ ²܌
P୰: Receiving power.
P୲: Transmitting Power.
G୲: Gain of a transmitting antenna = ability to radiate in a particular direction in space.
G୰: Gain of a receiving antenna = ability to couple the energy radiated from a direction in
space.
: is the wavelength.
: is system loss factor which has nothing to do with the transmission
: is the distance between the antennas.
Then, to calculate the distance between two nodes that are equipped by transmitting antennas, the
formula is:
܌ ൌ ඨ
ࡼ࢚ ࡳ࢚ ࡳ࢘ ࣅ²
ሺૈሻ ࡼ ۺ࢘
Calculate distance using GPS-free [17]: In case that the GPS is not accessible, we can use a
GPS-free to localize the neighbor of each node. This method uses a mobile reference to calculate
the coordinates of all the nodes in the network. However we can conclude the distance between
any nodes. In this part, we use the distance reception power to determinate the distance between
the reference and the others nodes.
5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 6, December 2014
49
To implement this method in AODV protocol, we have to choose the reference:
Choice of the reference
a and b are two nodes that want to communicate in a MANET network.
We put i the center of the coordination system.
Let N: The set of nodes in the network.
Pi: The set of one hop neighbor of the node i.
dij: the distance between nodes i and j.
Di: All distances dij
We choose i / i є Pa , i ≠ b and I ≠ a
We choose p and q / p,q є Pa , dpq ≠ 0,
pîq ≠ 180° , pîq ≠ 0°
Node i defines its system of local coordination.
We set the x-axis as the line (ip).
We set the y-axis as the line (iq).
Thus the system is defined:
The node i is the center of the system.
ix = 0 , iy = 0
p is the node situated on the axis of abscissas
px = dip , py = 0
The node q is located on the ordinate axis
qx = diq cos α , py = diq sinα
with α = pîq
Using the theorem of Al-Kashi:
α is calculated using this formula:
6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 6, December 2014
50
Figure 1 : The reference system
Once the reference is selected, the calculation of the coordinates of the nodes that belong to Pi is
easy.
For b, the coordinates are:
Then the final system is as follow:
Figure 2: The system of localization local
Changing the Benchmark:
We propose in this part to replace the reference by another composed by the a’s neighbors having
the smallest distances.
However, we choose i, p, q / I,p,q є Pa , i ≠ b , i ≠ a ,
pîq ≠ 180°, pîq ≠ 0°
7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 6, December 2014
51
And ∀ k ∈ Pi and k ≠ a,b,i,p,q
dak > dai , dak>dap and dak>daq.
After the quantification of the distance between all nodes, we can describe the behavior of the
node in the network by calculate the average of all the distances Avg(dij).
If the average is very high we say that the network nodes are very agitated else the network is
supposedly more stable.
5. ALGORITHM OF QUANTIFICATION DISTANCE IN THE AODV ROUTING
PROTOCOL
In this part, we propose to use one of those methods in the first function of a AODV protocol
(rout establishment between a source and a destination).
A node x wants to communicate with a node y.
x diffuse RREQ.
Each node receiving RREQ, calculates the distance between itself and the neighbor who sent him
RREQ (in this part we use the exact distance or the distance using the Pr) and broadcasts its table
[neighbors-distance] to its neighbors.
To use the third method for the quantification of the distance, the algorithm has to change.
A node x wants to communicate with a node y.
x diffuse RREQ.
Each node receiving RREQ, calculates the distance between itself and the neighbor who sent him
RREQ (in this part we use the exact distance or the distance using the Pr), broadcasts its table
[neighbors-distance] to its neighbors and choose the reference who has the smallest distance and
recalculate the newest distances using the third method.
N.B.: the node who receive the RREQ is the node a in the previous part.
6. SIMULATIONS AND RESULTS
In the following simulations, we applied our proposition to the AODV protocol .For this, we have
been used the simulator NS-2 [18], with its implementation of AODV protocol of the version NS-
2.35 and Ying-3D [19] to represent some results in 3D.
6.1. Environment
The network size considered for our simulations is (1000m×1000m) . The nodes have the same
configuration, in particular TCP protocol for the transport layer and Telnet for the application
layer. Time for each simulation is of 60s. For each simulation the mobility of the nodes is
represented by the choice of an uniform speed between v୫୧୬= 0 and v୫ୟ୶ = 100 m/s. The nodes
are moved after a random choice of the new destination without leaving the
network (1000m×1000m).
8. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 6, December 2014
52
6.2. Discussions of results
The results present the local quantification of neighbor’s distances during the simulation.
After the application of our proposition on a AODV protocol we obtain:
Table 1: Quantification's results
RREQ’s source RREQ’s destination Time Distance Distance/Pr
7 0 0,00128055 165,397 317,654
8 0 0,00128093 277,895 897,138
3 0 0,001281 299,47 1041,43
17 0 0,00128117 351,078 1430,93
15 0 0,00128119 356,321 1474,36
19 0 0,00128119 358,238 1490,13
11 8 0,00301544 152,84 271,179
9 8 0,00301572 238,948 662,809
1 8 0,00301579 258,118 773,428
7 8 0,00301585 276,525 887,669
0 8 0,00301585 277,731 896,079
15 8 0,00301586 280,446 913,022
10 8 0,00301598 315,33 1154,29
3 8 0,00301599 318,399 1176,86
5 8 0,00301617 371,712 1603,97
19 8 0,0030162 380,623 1681,8
1 15 0,00584584 308,585 1105,44
13 15 0,00584587 316,332 1161,63
5 10 0,00903948 103,368 124,039
4 10 0,00903976 187,032 406,083
9 10 0,00903978 194,023 437,009
11 10 0,00903982 206,903 496,956
1 10 0,00903988 224,54 585,286
18 10 0,00903999 256,821 765,673
16 10 0,00904017 309,608 1112,77
12 10 0,00904037 371,486 1602,02
13 10 0,0090404 378,926 1666,83
19 3 0,0112602 66,4831 66,4831
17 3 0,0112604 136,741 217,059
0 3 0,011261 299,018 1038,29
In the following figures, we observe the change of the distance between the node 1 and theirs
neighbours in the first 3s of the simulation.
9. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 6, December 2014
53
Figure 3: Quantification of the Distance between node 1 and its neighbors during the first 3s of the
simulation
Figure 4: Quantification of the Distance between node 1 and its neighbors during the first 3s of the
simulation “Another observation angle”
Figure 5: The distance between node 1 and its neighbor node 8 during the first 3s of the simulation
10. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 6, December 2014
54
Figure 6: The distance and the distance using RSSI between node 1 and its neighbor node 8 during
the first 3s of the simulation
7. CONCLUSION:
In this paper, we tried to calculate a local distance between a node and its neighbors in a AODV
routing protocol for the ad hoc networks. This metric of mobility that can be used to choose a
stable rout to transmit data thus ameliorate the Quality of Service in this kind of networks.
To allow this proposition more really feasible, we present the three methods to calculate the
distance between two nodes. First, we use the exact distance with a GPS or using RSSI. In case
that the absolute positioning is not accessible, we propose our improved GPS-free implementing
in AODV protocol.
REFERENCES
[1] “Mobile Ad hoc Networking(MANET): Routing Protocol Performance Issues and Evaluation
Considerations ”Request for Comments 2501, IETF, January, 1999
[2] J. Jubin and J. D. Tornow, "The DARPA Packet Radio Network Protocols," Proceedings of the IEEE,
Vol. 75, No. 1, pp. 21-32, Jan. 1987.
[3] B. M. Leiner, D. L. Neilson, F. A. Tobagui "Issues in Packet Radio Network esign," Proceedings of
the IEEE, Vol. 75, No. 1, pp. 6-20, Jan. 1987.
[4] S. Baraković, S. Kasapović, and J. Baraković, “Comparison of MANET Routing Protocols in
Different Traffic and Mobility Models”, Telfor Journal, Vol. 2, No. 1, 2010.
[5] C. Perkins, B.-R. E. and D. S.“Ad hoc On-demand Distance Vector routing” Request For Comments
(Proposed Standard) 3561, Internet Engineering Task Force, July, 2003.
[6] http://datatracker.ietf.org/wg/manet/charter/
[7] C. Cordeiro, H. Gossain and D. Agrawal “Multicast over Wireless Mobile Ad Hoc Networks: Present
and Future Directions” vol. 17, no. 1, pp. 52-59, January/February, 2003
[8] Sung-Ju Lee, Elizabeth M. Royer and Charles E. Perkins “Scalability Study of the Ad Hoc On-
Demand Distance Vector Routing Protocol” In ACM/Wiley International Journal of Network
Management, vol. 13, no. 2, pp. 97-114, March, 2003
[9] Ian Chakeres Elizabeth and M. Belding-Royer “AODV Implementation Design and Performance
Evaluation” to appear in a special issue on Wireless Ad Hoc Networkirng’ of the InternationalJournal
of Wireless and Mobile Computing (IJWMC), 2005
[10] David B. Johnson, David A. Maltz and Josh Broch “DSR: The Dynamic Source Routing Protocol for
Multi-Hop Wireless Ad Hoc Networks” Proceedings of INMC, 2004 - cseweb.ucsd.edu
[11] Guoyou He. “Destination-sequenced distance vector (DSDV) protocol.” Technical report, Helsinki
University of Technology, Finland. 2 Dec 2003
11. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 6, December 2014
55
[12] P. Johansson, T. Larsson, N. Hedman, B. Mielczarek, and M. Degermark, “Scenario-based
performance Analysis of Routing Protocols for Mobile Ad Hoc Networks,” F’roc. ACM Mobicom
1999, Seattle WA, August 1999
[13] X. Hong, M. Gerla, G. Pei, and C.-C. Chiang, “A Group Mobility Model for Ad Hoc Wireless
Networks,” Proc. ACM/IEEE MSWiM ’99, Seattle WA, August 1999
[14] N. Enneya, K. Oudidi and M. Elkoutbi “Network Mobility in Ad hoc Networks”, Computer and
Communication Engineering, 2008. ICCCE 2008. International Conference on, 13-15 May 2008,
Kuala Lumpur, Malaysia.
[15] N. Enneya, M. El Koutbi and A. Berqia“Enhancing AODV Performance based on Statistical Mobility
Quantification”, Information and Communication Technologies, 2006. ICTTA '06, 2nd (Volume:2 ),
Pages 2455 – 2460.
[16] A. Norhisyam Idris, A. Mohd Suldi & J. Rizal Abdul Hamid, “Effect of Radio Frequency Interference
(RFI) on the Global Positioning System (GPS) Signals”, 2013 IEEE 9th International Colloquium on
Signal Processing and its Applications, 8 - 10 Mac. 2013, Kuala Lumpur, Malaysia.
[17] S. Capkun, M. Hamdi and J.P. Hubaux, “GPS-free positioning in mobile Ad-Hoc networks,” Hawaii
International Conference On System Sciences, HICSS-34 January 3-6, 2001 Outrigger Wailea Resort
[18] “The network simulator - ns-2”January, 2006
[19] http://revue.sesamath.net/spip.php?article362
Authors
Meryem SAADOUNE Received the master degree in Computer Engineering in 2010 from
Faculty of Sciences -HASSAN 2 University- Casablanca, Morocco. Currently, a PhD
Student in Computer Science. Ongoing research interest :
• QoS in Mobile Ad hoc Networks (MANETs) / Wireless Sensor Network (WSN)
• Next Generation Networks
Abdelmajid HAJAMI PhD in informatics and telecommunications, Mohamed V-Souissi
University Rabat- Morocco. 2011 Ex Trainer in Regional Centre in teaching and Training
Assistant professor at the Faculty of Science and Technology of Settat in Morocco. Member
of LAVETE Lab at Faculty of Science and Technology of Settat Research interests:
• Security and QoS in wireless networks
• Radio Access Networks
• Next Generation Networks
• ILE : Informatics Learning Environments
Hakim ALLALI Was born in Morocco on 1966. He received the Ph.D degree from Claude
Bernard Lyon I University (France) in 1993 and the “Docteur d’Etat” degree from Hassan II-
Mohamedia University, Casablanca (Morocco) in 1997. He is currently Professor at Faculty of
Sciences and Technologies of Hassan 1st University of Settat (Morocco) and director of LAVETE
Laboratory. He is executive manager and founder of IT Learning Campus. His research interests include
technology enhanced learning, modeling, image processing, computer networking and GIS.