SlideShare a Scribd company logo
1 of 4
Download to read offline
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3242-3245 (2017) ISSN: 0975-0290
3242
Packet Transfer Rate & Robust Throughput for
Mobile Adhoc Network
Madhusudan G
Department of Computer Science, JSS University, Mysuru-06
Email: madhusudan@sjce.ac.in
Kumar TNR
Department of Computer Science, MSR University, Bangaluru
Email: tnrkumar@msrit.edu
----------------------------------------------------------------------ABSTRACT-----------------------------------------------------------
An ad-hoc wireless network is highly different considering dynamic stochastic process of its underlying links, leads
to link breaks during data transaction. Hence, to provide free flow data transaction, many routing algorithms have
the property of link recovery and maintenance procedures to minimize the loss of data during transmission.
However these routing method do not guarantee reliable data transmission in some special application conditions
with wide requirements on Packet delivery ratio and link quality of the network. Routing is a critical issue in
MANET and hence the focus of this paper is the performance analysis of different routing protocols used in the
wireless network. We evaluate the ability of a mobile ad hoc wireless network to distribute flows across robust
routes by introducing the robust throughput measure as a performance metric. The utility gained by the delivery
of flow messages is based on the level of interruption experienced by the underlying transaction. We describe the
mathematical calculation of a network’s robust throughput measure, as well as its robust throughput capacity. We
introduce the robust flow admission and routing algorithm (RFAR) to provide for the timely and robust transport
of flow transactions across mobile ad hoc wireless systems.
Keywords – MANET, AODV, DSR, RFAR, TORA.
---------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: May 02, 2017 Date of Acceptance: May 17, 2017
---------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
When two nodes are at the accessible distance then
packet transmission between the source and destination
node occurs. The transmission power in an ad-hoc can
change rapidly and unpredictably. The central challenge
in the design of ad-hoc network is in maintaining routes
and links between these mobile nodes. Mobile ad-hoc
networks (MANETs) are characterized by time-varying
links and network topology. There are transmission
impediments like fading, path loss, blockage and
interference that add to the inclined behavior of wireless
channels. In such situation, the network must
accommodate the changes, providing end-end packet
delivery while at the same time incurring low control
overhead. This paper proposes an improvement over the
existing routing algorithm for MANETs with the primary
goal of maximize network connectivity while limiting
operating cost by finding those routes which can stay
intact for a period of time, failures as well as by
fluctuations in the communication transport quality
experienced across the network’s communications links.
When an active route is broken, an on-demand routing
mechanism acts to discover an alternate route considering
the same souce and destination. At that time, forwarding
entries are configured in the routing tables of the routers
located across the new route. In turn, under a proactive
routing scheme, routing entries are refreshed periodically
at all (active or inactive) routers. At such a refresh instant,
link failures may be discovered, and the routing entries are
updated. The alternate routing of packets occurring under
a corresponding proactive routing base datagram-oriented
(connectionless) packet switching operation, the re-
configuration of the route executed by connection-oriented
packet switching networks (including connection-oriented
and on-demand ad hoc wireless routing schemes, such as
AODV or DSR, and IP-MPLS label switching methods)
may induce unacceptably long excess delays. Latencies
may be adversely perceived at the impacted layer, and for
many applications cause significant degradations in the
quality of the provided transport service. Induced by such
perceivable re-routing delays, the reception of data packets
embedded in flows (or within bursts of such flows) that
use routes that are prematurely terminated or altered may
be of reduced value to their intended receivers. An
application may generate a program (or file, or burst of
messages) that must be delivered, as a whole, across the
network in a critically timely manner. Kaixin Xu et al. [6]
have proposed a Scalable QoS architecture suitable for
large scale mobile ad-hoc networks. Xiaoqin Chen et al.
[1] have proposed congestion-aware routing protocol for
mobile ad-hoc networks which uses a metric incorporating
data-rate, MAC overhead, and buffer delay to combat
congestion. Ming Yu et al. [2] have proposed a link
availability-based QoS-aware (LABQ) routing protocol for
mobile ad-hoc networks based on mobility prediction and
link quality measurement, in addition to energy
consumption estimate. The packets which are equipped to
be transmitted are buffered by the Network Interface
Queues (IFQ) implemented by AODV [3], TORA [4], and
DSR [5] and the network protocol stack receives these
packets.
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3242-3245 (2017) ISSN: 0975-0290
3243
ROBUST THROUGHPUT: We evaluated the ability of
a mobile ad hoc wireless network to distribute flows
across robust routes by introducing the robust throughput
measure as a performance metric. It describes the rate at
which robust data is received by intended destinations.
we investigate robust routing in MANETs. Throughput is
defined as; the ratio of the total data reaches a receiver
from the sender. The time it takes by the receiver to
receive the last message is called as throughput.
Throughput is expressed as bytes or bits per sec (byte/sec
or bit/sec). Some factors affect the throughput as; if there
are many topology changes in the network unreliable
communication between nodes, limited bandwidth
available and limited energy. A high throughput is
absolute choice in every network. By “robust” we mean
that although a particular routing configuration (in our
case, a set of multi-path routes) may not be optimal for a
single specific configuration (e.g.,specific network
topology and link characteristics), it will perform well
over a larger set of likely network configurations: i.e.,it is
robust to changes without requiring global recomputation
of the network. For example, only transactions that are
completed without being prematurely interrupted may
convey data to their intended users that are of acceptable
utility and are thus accounted (as ‘robust’). In the
following, we illustrate the mathematical calculation of a
network’s robust throughput measure, as well as its robust
throughput capacity. Different algorithms have been
developed to improve the link quality. A large amount of
work has been done to improve the quality of service in
Manets, as well as extending existing protocols with QoS
features. Most of the performance analysis work is based
on simulation studies with several design parameters in
commercial settings. Through simulation, we compare the
reliability of braided routing and various other MANET
routing protocols, including AODV, and quantify the
relative amounts of control overhead incurred by braided
routing and AODV. Routing means to choose a path.
Routing in MANET means to choose a right and suitable
path from source to destination. Routing has two basic
types, which are as under as follows;
Static routing: It is done by the administrator manually to
forward the data packets in the network and it is
permanent. None of the administrator can change this
setting. These static routers are configured by the
administrator, which means there is no need to make
routing tables by the router itself. The Destination-
Sequenced Distance-Vector (DSDV) protocol [17] is a
proactive routing algorithm and is an enhanced version of
the distributed Bellman-Ford algorithm Jangeun Jun and
Mihail L. Sichitiu [7] have exposed a significant fairness
problem existent practically in all wireless multi hop
networks. Examples include Destination-Sequenced
Distance-Vector (DSDV) Routing [11], Wireless Routing
Protocol (WRP) [12], Global State Routing (GSR) [13],
and Fisheye State Routing (FSR) [14] On the contrary, in
on-demand routing protocols, routes are discovered
between source and destination pair only when data is
to be sent. This provides reduced overhead but high
path finding latency as whenever the route is to be found
between source and destination, route discovery procedure
is initiated. And reSchumacher et al. [7] have approached
the problem of load balancing for wireless multihop
networks by distributed optimization. Examples include
Ad hoc On-demand Distance Vector Routing (AODV) [8],
Dynamic Source Routing (DSR) [9], and C luster Based
Routing protocol (CBRP)[10].
Hybrid routing protocols combine the merits of both
proactive and reactive routing protocols and overcome
their short comings. Normally, hybrid routing protocols
for mobile ad hoc networks exploit hierarchical network
architectures. Proper proactive routing approach and
reactive routing approach are exploited in different
hierarchical levels, respectively. Examples of hybrid
routing protocols for mobile ad hoc networks are the Zone
Routing Protocol (ZRP) [15], Zone-based Hierarchical
Link State routing (ZHLS) [16].
Dynamic Routing: is automatically done by the choice
of router. It can route the traffic on any route depend on
the routing table. Dynamic routing allows the routers to
know about the networks and the interesting thing to add
information in their routing tables. There are several kinds
of routing protocols for wireless ad hoc networks. The
first kind of protocol is simply called Reactive MANET
Protocol(RMP). In these kinds of protocols,
communication is only possible when the source node
requests to communicate with the other node. Reactive
MANET Protocols are mostly suited for nodes with high
mobility or nodes that transmit data rarely. These reactive
routing protocols include the protocol AODV. The routing
information about all the nodes is build and maintained
by the proactive protocols. The proactive routing protocols
are independent of whether or not the route is needed.
Control messages are transmitted with periodically
intervals. Even if there is no data flow still control
messages are transmitted. Because of these control
messages proactive routing protocols are not bandwidth
efficient. These proactive routing protocols include DSDV
etc.
II. AODV(Ad-hoc On-demand Distance Vector):
AODV is an on-demand routing protocol. The Ad Hoc
On-demand Distance Vector Routing (AODV) protocol is
a reactive unicast routing protocol for mobile ad hoc
networks [5] in which a route is established only when
required by a source node for transmitting data packets.
The AODV algorithm gives an easy way to get change in
the link situation. For example if a link fails notifications
are sent only to the affected nodes in the network .This
notification cancels all the routes through this affected
node. It builds unicast routes from source to destination
and that’s why the network usage is least. Since the routes
are build on demand so the network traffic is minimum.
AODV does not allow keeping extra routing which is not
in use. If two nodes wish to establish a connection in an
ad hoc network then AODV is responsible to enable them
to build a multi hop route. AODV uses Destination
Sequence Numbers (DSN) to avoid counting to infinity
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3242-3245 (2017) ISSN: 0975-0290
3244
that is why it is loop free. When a node send request to a
destination, it sends its DSNs together with all routing
information. It also selects the most favorable route based
on the sequence number. There are three messages
i.e.,Route Request (RREQs), Route Replies (RREPs), and
Route Errors (RERRs). By using UDP protocol.
III AODV Protocol with implementation steps:
1] Begin If intermediate node k receives RREQ from
node I.
2] Determine the RREQ Discard limit (or D Lim) of
RREQ receives in all sessions on each node from their
neighbors node.
3] AVG_VAL = AVG [S1, S2, S3, S4, S5]
4] RATE_LIMIT =max no of RREQ [Si] - AVG_VAL
5] RREQ Discard limit (DLim) =
(AVG_VAL+RATE_LIMIT)+1
6] If received RREQ >RREQ Discard limit Drop the
RREQ packet Set the node a UNKNOWN NODE.
7] If received RREQ <RREQ Discard limit Process the
packet Set as KNOWN NODE
Figure.1 Mobile Node Creations: with source S and
Destination D is specified
After creating the nam file and trace file, we set up
topography object. set node_ ($i) [$ns node] is used to
create the nodes- Node Creation is shown in Figure1.
Packet Transmission: Every node transmits a packet only
up to a limited transmission range. This provides multi-
hop functionality.
Data transfer rate is a measurement of the amount of data
sent between two points on a network in a given time
period. It is a highly important concept in modern business
networking, with high data transfer rates allowing
networks to be used for complex tasks, such as on line
streaming. Understanding data transfer rate could help you
improve the performance of your business's own network.
It is shown in Figure 2.
Figure 2 Packet Transmission between nodes
Mobility of Nodes: Number of nodes is fixed in the
program. Nodes are configured with specific parameters of
a mobile wireless node. Initial location of the nodes is
fixed. Specific X, Y coordinates are assigned to every
node. Nodes are given mobility with fixed speed and
specific destination location which is generated randomly.
Nodes’ mobility will change time to time. Here we set the
initial size for the every node by using initial_node_pos.
AODV routing protocol is used here. $val(stop)
specifies the end time of the simulation.
Figure 3. Mobility of Nodes from source S to
Destination D
Throughput: Throughput: is a measure of how many
units of information a system can process in a given
amount of time. It is applied broadly to systems ranging
from various aspects of computer and network systems to
organizations. Related measures of system productivity
include the speed with which some specific workload can
be completed, and response time, the amount of time
between a single interactive user request and receipt of the
response.
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3242-3245 (2017) ISSN: 0975-0290
3245
The cumulative throughput plot is much smoother and
fairness plot does not show any improvement when pacing
is on. Throughput is the number of successfully received
packets in a unit time and it is represented in bps.
Throughput is calculated using awk script which
processes the trace.
Throughput=No of packets received from application
layer with No of packets generated in application file and
that produces the result.
Figure 4. Throughput of a graph
IV CONCLUSION:
We proposed robust throughput and packet transfer
capacity measures to characterize the ability of a mobile
ad hoc wireless network to provide highly survivable
transport of flows. Such a service is critically required
for supporting applications that often required flow
transactions to be carried out to completion without
interruption to yield maximum benefit. We note that a
network system that is designed to yield a high throughput
rate does not necessarily provide its users with a high
measure of robust service and consequently may be
characterized by low robust throughput performance.
V REFERENCES
[1] Xiaoqin Chen, Haley M. Jones, A .D .S. Jayalath,
"Congestion-Aware Routing Protocol for Mobile Ad
Hoc Networks", in proceedings of 6th IEEE Conference
on Vehicular Technology,30 September-3October,
Baltimore, 2007, pp: 21- 25.
[2] Ming Yu , Aniket Malvankar , Wei Su , Simon Y. Foo
, "A link availability-based QoS-aware routing protocol
for mobile ad hoc sensor networks",Journal on Computer
Communications, vol. 30, no. 18, December 2007, pp:
3823- 3831.
[3] Charles E. Perkins and Elizabeth M. Royer, "Ad-hoc
On-Demand Distance Vector Routing", in proceedings of
2nd workshop on Mobile Computing Systems and
Applications, 25-26 Feb., New Orleans, LA USA, 1999,
pp: 90- 100.
[4] Vincent D. Park and M. Scott Corson, "A Highly
Adaptive Distributed Routing Algorithm for Mobile
Wireless Networks", in Proc. Of IEEE INFOCOM'97,
vol. 3, 7-12 April, Kobe, Japan, 1997, pp: 1405-1413.
[5] David B. Johnson and David A. Maltz, "Dynamic
Source Routing in AdHoc Wireless Networks", in
proceedings of International Series in Engineering and
Computer Science, vol. 353,1996, pp: 153- 181.
[6] Kaixin Xu, Ken Tang, Rajive Bagrodia, Mario Gerla
and Michael Bereschinsky, "Adaptive Bandwidth
Management and QoS Provisioning in Large Scale Ad
Hoc Networks", in proceedings of IEEE Conference
on Military Communications, vol. 2, 13-16, 2003,pp:
1018- 1023.
[7] Jangeun Jun and Mihail L. Sichitiu, "Fairness and QoS
in Multihop Wireless Networks", in proceedings of 58th
IEEE Conference on Vehicular Technology, vol. 5, 6-
9 October 2003, pp: 2936- 2940.
[8] C. E. Perkins, B. Royer and S.R. Das, "Ad hoc On
Demand Distance Vector (AODV)
Routing,”http://www.ietf.org/internet-draft s/draf t-ietf-
manet-aodv-13.txt, IETF Internet draft, Feb2003.
[9] D. Johnson, D.A. Maltz and J. Broch, "The Dynamic
Source Routing Protocol for Mobile adhoc
Networks,”http://www.ietf.org/internetdra fts/draft-ietf-
manet-dsr-10.txt, IETF Internet draft, 19 July2004.
[10] M. Jiang, J. Li, Y.C. Tay, "Cluster Based Routing
Protocol," August 1999 IETF
Draft.http://www.ietf.org/internet-drafts/draft-ie tf-
manet-cbrp-pec-01.txt.
[11]. C. E. Perkins and P. Bhagwat, “ Highly Dynamic
Destination- Sequenced Distance-Vector Routing
(DSDV) for Mobile Computers,” in Proceedings of
ACM SIGCOMM, pp. 234-244, 1994.
[12] S. Murthy and J.JGarcia-Luna-Aceves, “An efficient
routing protocol for wireless networks,” ACM Mobile
Networks and Applications Journal, pp.183-197, 1996.
[13] T..Chen and M. Gerla, “Global state routing: A new
routing scheme for ad hoc wireless networks,” in
Proceedings of IEEE ICC’98, Vol. 1, pp.171-175,7-11
June 1998.
[14] A. Iwata, C.-C. Chiang, G. Pei, M. Gerla, and T.-W.
Chen, "Scalable Routing Strategies for Ad Hoc
Wireless Networks," IEEE Journal on Selected Areas
in communications, Special Issue on Ad-Hoc Networks,
pp.1369-79, Aug 1999.
[15]Z.J.Haas, “The Zone Routing Protocol (ZRP) for ad
hoc networks,” Internet Draft, Nov. 1997.
[16] M. Joa-Ng and I-Tai Lu, “ A peer-to-peer zone-
based two- level link state routing for mobile ad hoc
net-works,” IEEE on Selected Areas in Communications,
Vol.17,No.8,pp. 1415-1425,1999.
[17] C.E. Perkins and P. Bhagwat, “Highly, Dynamic
Destination-Sequenced Distance-Vector Routing (DSDV)
for Mobile Computers.” in Procedings of ACM
SIGCOMM. pp.234-244,1994
[18] C.E. Perkins, B. Royer and S.R. Das, “Ad hoc on
Demand Distance Vector (AODV)
Routing,”http://www.ietf.org/internet-drafts/draft-ietf-
manet-aodv-13.txt, IETF Internet draft, Feb 2003.

More Related Content

What's hot

A survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsA survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsIAEME Publication
 
Rough set based QoS enabled multipath source routing in MANET
Rough set based QoS enabled multipath source routing  in MANET Rough set based QoS enabled multipath source routing  in MANET
Rough set based QoS enabled multipath source routing in MANET IJECEIAES
 
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc NetworksLink Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc NetworksIOSR Journals
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...ijwmn
 
Efficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh NetworksEfficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh Networksijceronline
 
IRJET- Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
IRJET-  	  Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANETIRJET-  	  Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
IRJET- Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANETIRJET Journal
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networksijwmn
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
 
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKSENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKSIJCNCJournal
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
 
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkAn Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
 
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...csandit
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
 

What's hot (16)

A survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsA survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane ts
 
Rough set based QoS enabled multipath source routing in MANET
Rough set based QoS enabled multipath source routing  in MANET Rough set based QoS enabled multipath source routing  in MANET
Rough set based QoS enabled multipath source routing in MANET
 
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc NetworksLink Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
 
Efficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh NetworksEfficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh Networks
 
IRJET- Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
IRJET-  	  Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANETIRJET-  	  Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
IRJET- Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKSENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkAn Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
 
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 

Similar to Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network

Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...ijwmn
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET Journal
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
 
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSSNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSijwmn
 
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSSNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSijwmn
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
 
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET Journal
 
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET Journal
 
Multipath qos aware routing protocol
Multipath qos aware routing protocolMultipath qos aware routing protocol
Multipath qos aware routing protocolIJCNCJournal
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsIJCNCJournal
 
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANETIntegrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANETijsrd.com
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesijcsit
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIJCNCJournal
 

Similar to Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network (20)

Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
A02100108
A02100108A02100108
A02100108
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing Protocol
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSSNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
 
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSSNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
 
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
 
R045059297
R045059297R045059297
R045059297
 
Kz3618761878
Kz3618761878Kz3618761878
Kz3618761878
 
Eb35725731
Eb35725731Eb35725731
Eb35725731
 
Multipath qos aware routing protocol
Multipath qos aware routing protocolMultipath qos aware routing protocol
Multipath qos aware routing protocol
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocols
 
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANETIntegrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network

  • 1. Int. J. Advanced Networking and Applications Volume: 08 Issue: 06 Pages: 3242-3245 (2017) ISSN: 0975-0290 3242 Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network Madhusudan G Department of Computer Science, JSS University, Mysuru-06 Email: madhusudan@sjce.ac.in Kumar TNR Department of Computer Science, MSR University, Bangaluru Email: tnrkumar@msrit.edu ----------------------------------------------------------------------ABSTRACT----------------------------------------------------------- An ad-hoc wireless network is highly different considering dynamic stochastic process of its underlying links, leads to link breaks during data transaction. Hence, to provide free flow data transaction, many routing algorithms have the property of link recovery and maintenance procedures to minimize the loss of data during transmission. However these routing method do not guarantee reliable data transmission in some special application conditions with wide requirements on Packet delivery ratio and link quality of the network. Routing is a critical issue in MANET and hence the focus of this paper is the performance analysis of different routing protocols used in the wireless network. We evaluate the ability of a mobile ad hoc wireless network to distribute flows across robust routes by introducing the robust throughput measure as a performance metric. The utility gained by the delivery of flow messages is based on the level of interruption experienced by the underlying transaction. We describe the mathematical calculation of a network’s robust throughput measure, as well as its robust throughput capacity. We introduce the robust flow admission and routing algorithm (RFAR) to provide for the timely and robust transport of flow transactions across mobile ad hoc wireless systems. Keywords – MANET, AODV, DSR, RFAR, TORA. --------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: May 02, 2017 Date of Acceptance: May 17, 2017 --------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION When two nodes are at the accessible distance then packet transmission between the source and destination node occurs. The transmission power in an ad-hoc can change rapidly and unpredictably. The central challenge in the design of ad-hoc network is in maintaining routes and links between these mobile nodes. Mobile ad-hoc networks (MANETs) are characterized by time-varying links and network topology. There are transmission impediments like fading, path loss, blockage and interference that add to the inclined behavior of wireless channels. In such situation, the network must accommodate the changes, providing end-end packet delivery while at the same time incurring low control overhead. This paper proposes an improvement over the existing routing algorithm for MANETs with the primary goal of maximize network connectivity while limiting operating cost by finding those routes which can stay intact for a period of time, failures as well as by fluctuations in the communication transport quality experienced across the network’s communications links. When an active route is broken, an on-demand routing mechanism acts to discover an alternate route considering the same souce and destination. At that time, forwarding entries are configured in the routing tables of the routers located across the new route. In turn, under a proactive routing scheme, routing entries are refreshed periodically at all (active or inactive) routers. At such a refresh instant, link failures may be discovered, and the routing entries are updated. The alternate routing of packets occurring under a corresponding proactive routing base datagram-oriented (connectionless) packet switching operation, the re- configuration of the route executed by connection-oriented packet switching networks (including connection-oriented and on-demand ad hoc wireless routing schemes, such as AODV or DSR, and IP-MPLS label switching methods) may induce unacceptably long excess delays. Latencies may be adversely perceived at the impacted layer, and for many applications cause significant degradations in the quality of the provided transport service. Induced by such perceivable re-routing delays, the reception of data packets embedded in flows (or within bursts of such flows) that use routes that are prematurely terminated or altered may be of reduced value to their intended receivers. An application may generate a program (or file, or burst of messages) that must be delivered, as a whole, across the network in a critically timely manner. Kaixin Xu et al. [6] have proposed a Scalable QoS architecture suitable for large scale mobile ad-hoc networks. Xiaoqin Chen et al. [1] have proposed congestion-aware routing protocol for mobile ad-hoc networks which uses a metric incorporating data-rate, MAC overhead, and buffer delay to combat congestion. Ming Yu et al. [2] have proposed a link availability-based QoS-aware (LABQ) routing protocol for mobile ad-hoc networks based on mobility prediction and link quality measurement, in addition to energy consumption estimate. The packets which are equipped to be transmitted are buffered by the Network Interface Queues (IFQ) implemented by AODV [3], TORA [4], and DSR [5] and the network protocol stack receives these packets.
  • 2. Int. J. Advanced Networking and Applications Volume: 08 Issue: 06 Pages: 3242-3245 (2017) ISSN: 0975-0290 3243 ROBUST THROUGHPUT: We evaluated the ability of a mobile ad hoc wireless network to distribute flows across robust routes by introducing the robust throughput measure as a performance metric. It describes the rate at which robust data is received by intended destinations. we investigate robust routing in MANETs. Throughput is defined as; the ratio of the total data reaches a receiver from the sender. The time it takes by the receiver to receive the last message is called as throughput. Throughput is expressed as bytes or bits per sec (byte/sec or bit/sec). Some factors affect the throughput as; if there are many topology changes in the network unreliable communication between nodes, limited bandwidth available and limited energy. A high throughput is absolute choice in every network. By “robust” we mean that although a particular routing configuration (in our case, a set of multi-path routes) may not be optimal for a single specific configuration (e.g.,specific network topology and link characteristics), it will perform well over a larger set of likely network configurations: i.e.,it is robust to changes without requiring global recomputation of the network. For example, only transactions that are completed without being prematurely interrupted may convey data to their intended users that are of acceptable utility and are thus accounted (as ‘robust’). In the following, we illustrate the mathematical calculation of a network’s robust throughput measure, as well as its robust throughput capacity. Different algorithms have been developed to improve the link quality. A large amount of work has been done to improve the quality of service in Manets, as well as extending existing protocols with QoS features. Most of the performance analysis work is based on simulation studies with several design parameters in commercial settings. Through simulation, we compare the reliability of braided routing and various other MANET routing protocols, including AODV, and quantify the relative amounts of control overhead incurred by braided routing and AODV. Routing means to choose a path. Routing in MANET means to choose a right and suitable path from source to destination. Routing has two basic types, which are as under as follows; Static routing: It is done by the administrator manually to forward the data packets in the network and it is permanent. None of the administrator can change this setting. These static routers are configured by the administrator, which means there is no need to make routing tables by the router itself. The Destination- Sequenced Distance-Vector (DSDV) protocol [17] is a proactive routing algorithm and is an enhanced version of the distributed Bellman-Ford algorithm Jangeun Jun and Mihail L. Sichitiu [7] have exposed a significant fairness problem existent practically in all wireless multi hop networks. Examples include Destination-Sequenced Distance-Vector (DSDV) Routing [11], Wireless Routing Protocol (WRP) [12], Global State Routing (GSR) [13], and Fisheye State Routing (FSR) [14] On the contrary, in on-demand routing protocols, routes are discovered between source and destination pair only when data is to be sent. This provides reduced overhead but high path finding latency as whenever the route is to be found between source and destination, route discovery procedure is initiated. And reSchumacher et al. [7] have approached the problem of load balancing for wireless multihop networks by distributed optimization. Examples include Ad hoc On-demand Distance Vector Routing (AODV) [8], Dynamic Source Routing (DSR) [9], and C luster Based Routing protocol (CBRP)[10]. Hybrid routing protocols combine the merits of both proactive and reactive routing protocols and overcome their short comings. Normally, hybrid routing protocols for mobile ad hoc networks exploit hierarchical network architectures. Proper proactive routing approach and reactive routing approach are exploited in different hierarchical levels, respectively. Examples of hybrid routing protocols for mobile ad hoc networks are the Zone Routing Protocol (ZRP) [15], Zone-based Hierarchical Link State routing (ZHLS) [16]. Dynamic Routing: is automatically done by the choice of router. It can route the traffic on any route depend on the routing table. Dynamic routing allows the routers to know about the networks and the interesting thing to add information in their routing tables. There are several kinds of routing protocols for wireless ad hoc networks. The first kind of protocol is simply called Reactive MANET Protocol(RMP). In these kinds of protocols, communication is only possible when the source node requests to communicate with the other node. Reactive MANET Protocols are mostly suited for nodes with high mobility or nodes that transmit data rarely. These reactive routing protocols include the protocol AODV. The routing information about all the nodes is build and maintained by the proactive protocols. The proactive routing protocols are independent of whether or not the route is needed. Control messages are transmitted with periodically intervals. Even if there is no data flow still control messages are transmitted. Because of these control messages proactive routing protocols are not bandwidth efficient. These proactive routing protocols include DSDV etc. II. AODV(Ad-hoc On-demand Distance Vector): AODV is an on-demand routing protocol. The Ad Hoc On-demand Distance Vector Routing (AODV) protocol is a reactive unicast routing protocol for mobile ad hoc networks [5] in which a route is established only when required by a source node for transmitting data packets. The AODV algorithm gives an easy way to get change in the link situation. For example if a link fails notifications are sent only to the affected nodes in the network .This notification cancels all the routes through this affected node. It builds unicast routes from source to destination and that’s why the network usage is least. Since the routes are build on demand so the network traffic is minimum. AODV does not allow keeping extra routing which is not in use. If two nodes wish to establish a connection in an ad hoc network then AODV is responsible to enable them to build a multi hop route. AODV uses Destination Sequence Numbers (DSN) to avoid counting to infinity
  • 3. Int. J. Advanced Networking and Applications Volume: 08 Issue: 06 Pages: 3242-3245 (2017) ISSN: 0975-0290 3244 that is why it is loop free. When a node send request to a destination, it sends its DSNs together with all routing information. It also selects the most favorable route based on the sequence number. There are three messages i.e.,Route Request (RREQs), Route Replies (RREPs), and Route Errors (RERRs). By using UDP protocol. III AODV Protocol with implementation steps: 1] Begin If intermediate node k receives RREQ from node I. 2] Determine the RREQ Discard limit (or D Lim) of RREQ receives in all sessions on each node from their neighbors node. 3] AVG_VAL = AVG [S1, S2, S3, S4, S5] 4] RATE_LIMIT =max no of RREQ [Si] - AVG_VAL 5] RREQ Discard limit (DLim) = (AVG_VAL+RATE_LIMIT)+1 6] If received RREQ >RREQ Discard limit Drop the RREQ packet Set the node a UNKNOWN NODE. 7] If received RREQ <RREQ Discard limit Process the packet Set as KNOWN NODE Figure.1 Mobile Node Creations: with source S and Destination D is specified After creating the nam file and trace file, we set up topography object. set node_ ($i) [$ns node] is used to create the nodes- Node Creation is shown in Figure1. Packet Transmission: Every node transmits a packet only up to a limited transmission range. This provides multi- hop functionality. Data transfer rate is a measurement of the amount of data sent between two points on a network in a given time period. It is a highly important concept in modern business networking, with high data transfer rates allowing networks to be used for complex tasks, such as on line streaming. Understanding data transfer rate could help you improve the performance of your business's own network. It is shown in Figure 2. Figure 2 Packet Transmission between nodes Mobility of Nodes: Number of nodes is fixed in the program. Nodes are configured with specific parameters of a mobile wireless node. Initial location of the nodes is fixed. Specific X, Y coordinates are assigned to every node. Nodes are given mobility with fixed speed and specific destination location which is generated randomly. Nodes’ mobility will change time to time. Here we set the initial size for the every node by using initial_node_pos. AODV routing protocol is used here. $val(stop) specifies the end time of the simulation. Figure 3. Mobility of Nodes from source S to Destination D Throughput: Throughput: is a measure of how many units of information a system can process in a given amount of time. It is applied broadly to systems ranging from various aspects of computer and network systems to organizations. Related measures of system productivity include the speed with which some specific workload can be completed, and response time, the amount of time between a single interactive user request and receipt of the response.
  • 4. Int. J. Advanced Networking and Applications Volume: 08 Issue: 06 Pages: 3242-3245 (2017) ISSN: 0975-0290 3245 The cumulative throughput plot is much smoother and fairness plot does not show any improvement when pacing is on. Throughput is the number of successfully received packets in a unit time and it is represented in bps. Throughput is calculated using awk script which processes the trace. Throughput=No of packets received from application layer with No of packets generated in application file and that produces the result. Figure 4. Throughput of a graph IV CONCLUSION: We proposed robust throughput and packet transfer capacity measures to characterize the ability of a mobile ad hoc wireless network to provide highly survivable transport of flows. Such a service is critically required for supporting applications that often required flow transactions to be carried out to completion without interruption to yield maximum benefit. We note that a network system that is designed to yield a high throughput rate does not necessarily provide its users with a high measure of robust service and consequently may be characterized by low robust throughput performance. V REFERENCES [1] Xiaoqin Chen, Haley M. Jones, A .D .S. Jayalath, "Congestion-Aware Routing Protocol for Mobile Ad Hoc Networks", in proceedings of 6th IEEE Conference on Vehicular Technology,30 September-3October, Baltimore, 2007, pp: 21- 25. [2] Ming Yu , Aniket Malvankar , Wei Su , Simon Y. Foo , "A link availability-based QoS-aware routing protocol for mobile ad hoc sensor networks",Journal on Computer Communications, vol. 30, no. 18, December 2007, pp: 3823- 3831. [3] Charles E. Perkins and Elizabeth M. Royer, "Ad-hoc On-Demand Distance Vector Routing", in proceedings of 2nd workshop on Mobile Computing Systems and Applications, 25-26 Feb., New Orleans, LA USA, 1999, pp: 90- 100. [4] Vincent D. Park and M. Scott Corson, "A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks", in Proc. Of IEEE INFOCOM'97, vol. 3, 7-12 April, Kobe, Japan, 1997, pp: 1405-1413. [5] David B. Johnson and David A. Maltz, "Dynamic Source Routing in AdHoc Wireless Networks", in proceedings of International Series in Engineering and Computer Science, vol. 353,1996, pp: 153- 181. [6] Kaixin Xu, Ken Tang, Rajive Bagrodia, Mario Gerla and Michael Bereschinsky, "Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks", in proceedings of IEEE Conference on Military Communications, vol. 2, 13-16, 2003,pp: 1018- 1023. [7] Jangeun Jun and Mihail L. Sichitiu, "Fairness and QoS in Multihop Wireless Networks", in proceedings of 58th IEEE Conference on Vehicular Technology, vol. 5, 6- 9 October 2003, pp: 2936- 2940. [8] C. E. Perkins, B. Royer and S.R. Das, "Ad hoc On Demand Distance Vector (AODV) Routing,”http://www.ietf.org/internet-draft s/draf t-ietf- manet-aodv-13.txt, IETF Internet draft, Feb2003. [9] D. Johnson, D.A. Maltz and J. Broch, "The Dynamic Source Routing Protocol for Mobile adhoc Networks,”http://www.ietf.org/internetdra fts/draft-ietf- manet-dsr-10.txt, IETF Internet draft, 19 July2004. [10] M. Jiang, J. Li, Y.C. Tay, "Cluster Based Routing Protocol," August 1999 IETF Draft.http://www.ietf.org/internet-drafts/draft-ie tf- manet-cbrp-pec-01.txt. [11]. C. E. Perkins and P. Bhagwat, “ Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” in Proceedings of ACM SIGCOMM, pp. 234-244, 1994. [12] S. Murthy and J.JGarcia-Luna-Aceves, “An efficient routing protocol for wireless networks,” ACM Mobile Networks and Applications Journal, pp.183-197, 1996. [13] T..Chen and M. Gerla, “Global state routing: A new routing scheme for ad hoc wireless networks,” in Proceedings of IEEE ICC’98, Vol. 1, pp.171-175,7-11 June 1998. [14] A. Iwata, C.-C. Chiang, G. Pei, M. Gerla, and T.-W. Chen, "Scalable Routing Strategies for Ad Hoc Wireless Networks," IEEE Journal on Selected Areas in communications, Special Issue on Ad-Hoc Networks, pp.1369-79, Aug 1999. [15]Z.J.Haas, “The Zone Routing Protocol (ZRP) for ad hoc networks,” Internet Draft, Nov. 1997. [16] M. Joa-Ng and I-Tai Lu, “ A peer-to-peer zone- based two- level link state routing for mobile ad hoc net-works,” IEEE on Selected Areas in Communications, Vol.17,No.8,pp. 1415-1425,1999. [17] C.E. Perkins and P. Bhagwat, “Highly, Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers.” in Procedings of ACM SIGCOMM. pp.234-244,1994 [18] C.E. Perkins, B. Royer and S.R. Das, “Ad hoc on Demand Distance Vector (AODV) Routing,”http://www.ietf.org/internet-drafts/draft-ietf- manet-aodv-13.txt, IETF Internet draft, Feb 2003.