SlideShare a Scribd company logo
Archana S. Chitte et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.97-99
www.ijera.com 97 | P a g e
Reducing Collision In Multipacket Transfer And Receiver Using
Token Passing Techniques In Wireless Ad Hoc Network
P. P. Rewagad*, Archana S. Chitte*
*GUIDE (Department of Computer Science and Enginnering, North Maharashtra University, Jalgaon)
** ME SCHOLAR (Department of Computer Science and Enginnering, North Maharashtra University, Jalgaon)
Abstract
Transmitting and Receiving the multiple packet on a single channel through a route node is very critical task.
There may be a collision between more than one routes. One route node can send and receive the data to the two
routes. It may generate a collision and may be the data exchange between more than one routes. That’s why, we
used here a token passing technique and time interval for successful transmission. The theoretical analysis show
the total scenario and reduce the collision between routes.
Keywords— Token passing, Time slots, transfer/receive packets , MANET
I. Introduction
A day by day the uses of internet increases
whether it is wired or wireless. The goal of internet
uses is to less effort for physical connection and
faster communication. That’s why, user chooses
wireless communication than wired. Now a days,
wireless ad hoc network is very popular because of its
structures. The wireless ad hoc network does not
required any pre-infrastructures.[14] That’s why it is
mostly used in tactical field, battle field where secret
message communication is more important without
pre-establishing infrastructure for internet.
In mobile ad hoc neteork, all the nodes are
wireless, they can communicate with each other using
self confuring route nodes. [14]That’s why, it is very
preference able. The node i.e. source node want to
communicate with other node i.e. destination node.
The source node has to discover the the route nodes.
There are many protocols available like DSR, DSDV,
AODV etc.[14] when source node want to
communicate with destination node he has to know
the information about neighbor node. Also, source
node has to count the hops that means the source
node can select minimum hop count for
communication[9].
There are many nodes available in routes.
After selecting the route nodes using any route
finding protocols, one node may be a route node of
more than one route.[5] There may be a collision
between neighbor discovery and communication
between more than one source-destination nodes. The
following fig. shows the collision between neighbour
available for routes.
Fig.1 Multipacket Transfer/Receive at the same node
The above fig. shows the problem for
multipacket transfer/ receiver. There are two source
nodes nd two destination node. They has to
communicate with each other. Node7 is a route node
of two routes. When both routes nodes want to to
communicate taking account of node7 at that time,
there is a collision may occur which route first give
the response and keep the routes information to
securely send the message to particular routes. To
avoid this collision, we used a token passing[2][6].
II. NETWORK MODEL AND
AUUMPTIONS
MANET is a self configuring network. In
which aource node decides route nodes itself. The
source node broead cast the route request to the nodes
which are in a radio range with its MAC address.[14]
The route node which are free, they accept the request
, add its MAC address and forward the route request
RESEARCH ARTICLE OPEN ACCESS
Archana S. Chitte et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.97-99
www.ijera.com 98 | P a g e
to its neighbor still they don’t have find out the
destination node. At the destination node, the MAC
address will check , if the MAC address is correct
sending by source node, it means it is reached to
destination node. Then the destination node sends the
acknowledgement to source node through route
nodes. This is the simplest way for communication.
If there may problem occur like collision
which is describes in Fib1. To solve this problem, we
give the solution. Theoretically we prove the collision
problem will solve.
Here we introduce the network model and
several Assumptions, under which we will present the
token passing technic and and corresponding
analysis.[2]
 Each node has a unique MAC address
 All nodes are in a same or different radio range.
 Nodes use bidirectional antennas
 Nodes can transmit and receive on the same
channel simultaneously.
A. Using Token
When one node is a route node of two
routes, there may may be collision occur. That’s why,
we used here token.
Fig.2 Token Slot
Here, we used 1bit for token. This token is
generated by source ode with unique number. This
number is decided by source node . when the source
node will broadcast the route request message. Then
source node sends the token also with that message.
The route node also having a 1bit stored that unique
token number for temporary upto the communication
will not be finished. This token bit is used for
temporary. After completing communication. The
node may delete that token number. Now if the
source node want to become an another route of node,
the same procedure will follow. The route node can
divide that bit slots into sub slots and stored the
another sources unique token number. Here we are
giving suggestion only for two routes. If we increase
the routes for communication, these may be more
memory space is required and there is a costly. That’s
why, a single bit can divide into subslots only two
subslots.
Algorithm: Token passing
1: Source node add unique number as a token.
2: Source node broadcast the route request with
token and monitor channel.
3: if it has already two route request, the request
will discard.
4: if route node is free accept the request.
5: Add the sequence number and ID to route
request message.
6: Forward the route request message.
8: If destination node is found, the destination node
sends the acknowledgement to source node.
B. Time Interval
After circulation of token, the route node
having a unique token of every separate routes source
and destination node. The route node has two token
now there is confusion between which route node has
to give the response. Then every node has to add a
slot i.e. time interval slot[15] .
Fig. 3 Time Sub Slot
To avoid the collision between two routes.
The node has assign a time slot. For first time slot,
the route node give the response to the first node.
After completion of time interval to route node gives
the response to other route. It means, it can reduce the
collision.
Discussion Here, we discussed some issues
related to token passing and time interval and their
corresponding analysis results.
1)Multiple nodes may be route node of more than one
routes
Here, we discuss the situation when n
number of nodes within the route having a multiple
routes to communication.[10] At this situation, there
may be more time required for transmission.
To solve this problem, we decide the only
two token slots assign to nodes. Means they can only
route nodes of two route. Also proving a time
interval. If within timeslot the source node doesn’t
get the reply from destination node, the source node
again repeat the steps from route request.
III. RELATED WORK
There are many researchers has focused on
securely transmission in a MANET without occurring
a collision between them and the node can transmit
and receive the message from a single channel[9][10].
Vasudevan sl at[1] later pointed out that the
expected time slots needed to finish the neighbor
discovery process by using birthday protocols in[3] is
neHn, where Hn is the nth
harmonie number. The
authors also proposed protocols for more realistic
situations, where the size of a clique is unknown to
nodes a feedback mechanism is introduced into the
system and the clocks of nodes are not identical.
Navneet malpani[2] discuss the token
circulation in MANET. In which the authors decide a
Archana S. Chitte et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.97-99
www.ijera.com 99 | P a g e
token and circulate to the route node for successful
communication with every node.
With the development of MPR[6] Zeng et
al[4] extended the result of [3] to the MPR situation
where no collision occurs if and only if there are no
more than k(K≥2) nodes simultaneously time needed
to discover all nodes.
IV. CONCLUSION
In this paper, we proposed a token passing
techniques by adding a time slot into every nodes
before going to start communication. First we add a
bit slot for dtoring a unique token ID created by
source node. Further more, we add time slot.
According to time slot, the route node can transmit
and receive the message at a single channel.
This aadition of time slot, it may reduce the
collision in Neighbour Discovery and secured
communication without collision.
References
[1] M. J. McGlynn and S. A. Borbash,
―Birthday protocols for low energy
deployment and flexible neighbor discovery
in ad hoc wireless networks,‖ in Proc. ACM
MobiHoc, 2001, pp. 137–145.
[2] Navneet Malpani, Yu Chen, Nitin H.
Vaidya, Senior Member,‖Distributed Token
Circulation in Mobile Ad Hoc Networks‖, in
IEEE transaction,s on Mobile Computing,
2005
[3] S. Vasudevan, D. Towsley, D. Goeckel, and
R. Khalili, ―Neighbor discovery in wireless
networks and the coupon collector’s
problem,‖ in Proc. ACM MobiCom, 2009,
pp. 181–192.
[4] W. Zeng, X. Chen, A. Russell, S.
Vasudevan, B. Wang, and W. Wei,
―Neighbor discovery in wireless networks
with multipacket reception,‖ in Proc. ACM
MobiHoc, 2011, p. 3.
[5] R. Motwani and P. Raghavan, Randomized
Algorithms. Cambridge, U.K.: Cambridge
Univ. Press, 1995.
[6] J. Jeon and A. Ephremides, ―Neighbor
discovery in a wireless sensor network:
Multipacket reception capability and
physical-layer signal processing,‖ in Proc.
48th Annu. Allerton Conf. Commun.,
Control, Comput., 2010, pp. 310–317.
[7] J. I. Choi, M. Jain, K. Srinivasan, P. Levis,
and S. Katti, ―Achieving single channel, full
duplex wireless communication,‖ in Proc.
ACM MobiCom, 2010, pp. 1–12.
[8] M. Jain, J. I. Choi, T. M. Kim, D. Bharadia,
S. Seth, K. Srinivasan, P. Levis, S. Katti, and
P. Sinha, ―Practical, real-time, full duplex
wireless,‖ in Proc. ACM MobiCom, 2011,
pp. 301–312.
[9] Z. Zhang and B. Li, ―Neighbor discovery in
mobile ad hoc self configuring networks
with directional antennas:Algorithms and
comparisons,‖ IEEE Trans. Wireless
Commun., vol. 7, no. 5, pp. 1540–1549, May
2008.
[10] L. You, X. Zhu, and G. Chen, ―Neighbor
discovery in peer-to-peer wireless networks
with multi-channel MPR capability,‖ in
Proc. IEEE ICC, 2012, pp. 4975–4979.
[11] Y. Wang, G. Pan, and Z. Huang, ―Direct
multi-hop time synchronization with
constructive interference,‖ in Proc. IPSN,
2012, pp. 115–116.
[12] L. Venturino, X. Wang, M. Lops, ‖Multiuser
detection for cooperative networks and
performance analysis ‖, IEEE Transaction
on Signal Processing, Vol. 54, Issue 9, pp.
3315–3329, September 2006.
[13] S. Vasudevan, J. Kurose, D. Towsley, ‖On
neighbor discovery in wireless networks
with directional antennas‖, INFOCOM 2005,
Vol. 4, pp. 2502–2512, March 2005. S.
Verd´u, Multiuser Detection, Cambridge
University Press, 1998.
[14] Magnus Frodish, Rer Johnson and Peter
Larson,‖Wireless Ad Hoc Networking-The
art of Networking without a network, in
Ericsson Review No.4, 2000.
[15] Guobao Sun, Fan Wu, Xiaofeng Gao, Wei
Wang,‖Time-Efficient Protocols for
Neighbour Discovery in Wireless Ad Hoc
Networks‖,IEEE Transaction on Vehicular
Technology, Vol.62,No.6,July 2013.

More Related Content

What's hot

Z02417321735
Z02417321735Z02417321735
Z02417321735
IJMER
 
F0313539
F0313539F0313539
F0313539
iosrjournals
 
New strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocolNew strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocol
ijwmn
 
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
ijmnct
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
ijwmn
 
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In ManetAn Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
idescitation
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedDebesh Sadhukhan
 
ISM29jun06.doc
ISM29jun06.docISM29jun06.doc
ISM29jun06.docVideoguy
 
sarasism2006.doc
sarasism2006.docsarasism2006.doc
sarasism2006.docVideoguy
 
560 229-237
560 229-237560 229-237
560 229-237
idescitation
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
IJCSIS Research Publications
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
TELKOMNIKA JOURNAL
 
06775257
0677525706775257
06775257
Harish Madurai
 
Ijcatr04041022
Ijcatr04041022Ijcatr04041022
Ijcatr04041022
Editor IJCATR
 

What's hot (20)

Z02417321735
Z02417321735Z02417321735
Z02417321735
 
F0313539
F0313539F0313539
F0313539
 
New strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocolNew strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocol
 
Distributed Hash Table
Distributed Hash TableDistributed Hash Table
Distributed Hash Table
 
Ac24204209
Ac24204209Ac24204209
Ac24204209
 
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
As03402620266
As03402620266As03402620266
As03402620266
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
 
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In ManetAn Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
 
ISM29jun06.doc
ISM29jun06.docISM29jun06.doc
ISM29jun06.doc
 
sarasism2006.doc
sarasism2006.docsarasism2006.doc
sarasism2006.doc
 
Gu2412131219
Gu2412131219Gu2412131219
Gu2412131219
 
560 229-237
560 229-237560 229-237
560 229-237
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
 
06775257
0677525706775257
06775257
 
Ijcatr04041022
Ijcatr04041022Ijcatr04041022
Ijcatr04041022
 

Viewers also liked

S04405107111
S04405107111S04405107111
S04405107111
IJERA Editor
 
Bi4201403406
Bi4201403406Bi4201403406
Bi4201403406
IJERA Editor
 
I43065157
I43065157I43065157
I43065157
IJERA Editor
 
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksA Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
IJERA Editor
 
Data Management
Data ManagementData Management
Data Management
Emmett Poindexter
 
I42055158
I42055158I42055158
I42055158
IJERA Editor
 
Bv4201481484
Bv4201481484Bv4201481484
Bv4201481484
IJERA Editor
 
Cambio Radical
Cambio  RadicalCambio  Radical
Cambio Radical
jorgelpg
 
Ak04605259264
Ak04605259264Ak04605259264
Ak04605259264
IJERA Editor
 
Thinksheet 3 - Word Choice
Thinksheet 3 - Word ChoiceThinksheet 3 - Word Choice
Thinksheet 3 - Word Choicethechenster
 
O4101101103
O4101101103O4101101103
O4101101103
IJERA Editor
 
Iv Etapa Responsabilidad Social....
Iv Etapa Responsabilidad  Social....Iv Etapa Responsabilidad  Social....
Iv Etapa Responsabilidad Social....guestd05e4df
 
Lb35189919904
Lb35189919904Lb35189919904
Lb35189919904
IJERA Editor
 
Oi2423352339
Oi2423352339Oi2423352339
Oi2423352339
IJERA Editor
 
Connecting Users And Developers
Connecting Users And DevelopersConnecting Users And Developers
Connecting Users And Developers
Kenji Hiranabe
 
Ji3516041608
Ji3516041608Ji3516041608
Ji3516041608
IJERA Editor
 
Example of WEB 2.0 Environment
Example of WEB 2.0 EnvironmentExample of WEB 2.0 Environment
Example of WEB 2.0 Environmentlilith
 

Viewers also liked (20)

S04405107111
S04405107111S04405107111
S04405107111
 
Bi4201403406
Bi4201403406Bi4201403406
Bi4201403406
 
I43065157
I43065157I43065157
I43065157
 
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksA Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
 
Data Management
Data ManagementData Management
Data Management
 
I42055158
I42055158I42055158
I42055158
 
ufm1104
ufm1104ufm1104
ufm1104
 
What we do...
What we do...What we do...
What we do...
 
Bv4201481484
Bv4201481484Bv4201481484
Bv4201481484
 
Cambio Radical
Cambio  RadicalCambio  Radical
Cambio Radical
 
Ak04605259264
Ak04605259264Ak04605259264
Ak04605259264
 
Thinksheet 3 - Word Choice
Thinksheet 3 - Word ChoiceThinksheet 3 - Word Choice
Thinksheet 3 - Word Choice
 
Finance Outline
Finance OutlineFinance Outline
Finance Outline
 
O4101101103
O4101101103O4101101103
O4101101103
 
Iv Etapa Responsabilidad Social....
Iv Etapa Responsabilidad  Social....Iv Etapa Responsabilidad  Social....
Iv Etapa Responsabilidad Social....
 
Lb35189919904
Lb35189919904Lb35189919904
Lb35189919904
 
Oi2423352339
Oi2423352339Oi2423352339
Oi2423352339
 
Connecting Users And Developers
Connecting Users And DevelopersConnecting Users And Developers
Connecting Users And Developers
 
Ji3516041608
Ji3516041608Ji3516041608
Ji3516041608
 
Example of WEB 2.0 Environment
Example of WEB 2.0 EnvironmentExample of WEB 2.0 Environment
Example of WEB 2.0 Environment
 

Similar to R44089799

Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621
IJRAT
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
Editor IJCATR
 
D0441722
D0441722D0441722
D0441722
IJERA Editor
 
G343741
G343741G343741
G343741
IJERA Editor
 
G343741
G343741G343741
G343741
IJERA Editor
 
As33259263
As33259263As33259263
As33259263
IJERA Editor
 
As33259263
As33259263As33259263
As33259263
IJERA Editor
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
IJERA Editor
 
F41023946
F41023946F41023946
F41023946
IJERA Editor
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Eswar Publications
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
researchinventy
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
IJERA Editor
 
Cyclic Sensing MAC Protocol for Multicast Routing in Mobile
Cyclic Sensing MAC Protocol for Multicast Routing in MobileCyclic Sensing MAC Protocol for Multicast Routing in Mobile
Cyclic Sensing MAC Protocol for Multicast Routing in Mobile
ssrgjournals
 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
IJERA Editor
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
IJMER
 
An Investigation of DAF Protocol in Wireless Communication
An Investigation of DAF Protocol in Wireless CommunicationAn Investigation of DAF Protocol in Wireless Communication
An Investigation of DAF Protocol in Wireless Communication
IRJET Journal
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
Auwal Amshi
 
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
IJECEIAES
 

Similar to R44089799 (20)

Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
D0441722
D0441722D0441722
D0441722
 
G343741
G343741G343741
G343741
 
G343741
G343741G343741
G343741
 
As33259263
As33259263As33259263
As33259263
 
As33259263
As33259263As33259263
As33259263
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
F41023946
F41023946F41023946
F41023946
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
 
B03406010
B03406010B03406010
B03406010
 
Cyclic Sensing MAC Protocol for Multicast Routing in Mobile
Cyclic Sensing MAC Protocol for Multicast Routing in MobileCyclic Sensing MAC Protocol for Multicast Routing in Mobile
Cyclic Sensing MAC Protocol for Multicast Routing in Mobile
 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
 
An Investigation of DAF Protocol in Wireless Communication
An Investigation of DAF Protocol in Wireless CommunicationAn Investigation of DAF Protocol in Wireless Communication
An Investigation of DAF Protocol in Wireless Communication
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
 
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

R44089799

  • 1. Archana S. Chitte et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.97-99 www.ijera.com 97 | P a g e Reducing Collision In Multipacket Transfer And Receiver Using Token Passing Techniques In Wireless Ad Hoc Network P. P. Rewagad*, Archana S. Chitte* *GUIDE (Department of Computer Science and Enginnering, North Maharashtra University, Jalgaon) ** ME SCHOLAR (Department of Computer Science and Enginnering, North Maharashtra University, Jalgaon) Abstract Transmitting and Receiving the multiple packet on a single channel through a route node is very critical task. There may be a collision between more than one routes. One route node can send and receive the data to the two routes. It may generate a collision and may be the data exchange between more than one routes. That’s why, we used here a token passing technique and time interval for successful transmission. The theoretical analysis show the total scenario and reduce the collision between routes. Keywords— Token passing, Time slots, transfer/receive packets , MANET I. Introduction A day by day the uses of internet increases whether it is wired or wireless. The goal of internet uses is to less effort for physical connection and faster communication. That’s why, user chooses wireless communication than wired. Now a days, wireless ad hoc network is very popular because of its structures. The wireless ad hoc network does not required any pre-infrastructures.[14] That’s why it is mostly used in tactical field, battle field where secret message communication is more important without pre-establishing infrastructure for internet. In mobile ad hoc neteork, all the nodes are wireless, they can communicate with each other using self confuring route nodes. [14]That’s why, it is very preference able. The node i.e. source node want to communicate with other node i.e. destination node. The source node has to discover the the route nodes. There are many protocols available like DSR, DSDV, AODV etc.[14] when source node want to communicate with destination node he has to know the information about neighbor node. Also, source node has to count the hops that means the source node can select minimum hop count for communication[9]. There are many nodes available in routes. After selecting the route nodes using any route finding protocols, one node may be a route node of more than one route.[5] There may be a collision between neighbor discovery and communication between more than one source-destination nodes. The following fig. shows the collision between neighbour available for routes. Fig.1 Multipacket Transfer/Receive at the same node The above fig. shows the problem for multipacket transfer/ receiver. There are two source nodes nd two destination node. They has to communicate with each other. Node7 is a route node of two routes. When both routes nodes want to to communicate taking account of node7 at that time, there is a collision may occur which route first give the response and keep the routes information to securely send the message to particular routes. To avoid this collision, we used a token passing[2][6]. II. NETWORK MODEL AND AUUMPTIONS MANET is a self configuring network. In which aource node decides route nodes itself. The source node broead cast the route request to the nodes which are in a radio range with its MAC address.[14] The route node which are free, they accept the request , add its MAC address and forward the route request RESEARCH ARTICLE OPEN ACCESS
  • 2. Archana S. Chitte et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.97-99 www.ijera.com 98 | P a g e to its neighbor still they don’t have find out the destination node. At the destination node, the MAC address will check , if the MAC address is correct sending by source node, it means it is reached to destination node. Then the destination node sends the acknowledgement to source node through route nodes. This is the simplest way for communication. If there may problem occur like collision which is describes in Fib1. To solve this problem, we give the solution. Theoretically we prove the collision problem will solve. Here we introduce the network model and several Assumptions, under which we will present the token passing technic and and corresponding analysis.[2]  Each node has a unique MAC address  All nodes are in a same or different radio range.  Nodes use bidirectional antennas  Nodes can transmit and receive on the same channel simultaneously. A. Using Token When one node is a route node of two routes, there may may be collision occur. That’s why, we used here token. Fig.2 Token Slot Here, we used 1bit for token. This token is generated by source ode with unique number. This number is decided by source node . when the source node will broadcast the route request message. Then source node sends the token also with that message. The route node also having a 1bit stored that unique token number for temporary upto the communication will not be finished. This token bit is used for temporary. After completing communication. The node may delete that token number. Now if the source node want to become an another route of node, the same procedure will follow. The route node can divide that bit slots into sub slots and stored the another sources unique token number. Here we are giving suggestion only for two routes. If we increase the routes for communication, these may be more memory space is required and there is a costly. That’s why, a single bit can divide into subslots only two subslots. Algorithm: Token passing 1: Source node add unique number as a token. 2: Source node broadcast the route request with token and monitor channel. 3: if it has already two route request, the request will discard. 4: if route node is free accept the request. 5: Add the sequence number and ID to route request message. 6: Forward the route request message. 8: If destination node is found, the destination node sends the acknowledgement to source node. B. Time Interval After circulation of token, the route node having a unique token of every separate routes source and destination node. The route node has two token now there is confusion between which route node has to give the response. Then every node has to add a slot i.e. time interval slot[15] . Fig. 3 Time Sub Slot To avoid the collision between two routes. The node has assign a time slot. For first time slot, the route node give the response to the first node. After completion of time interval to route node gives the response to other route. It means, it can reduce the collision. Discussion Here, we discussed some issues related to token passing and time interval and their corresponding analysis results. 1)Multiple nodes may be route node of more than one routes Here, we discuss the situation when n number of nodes within the route having a multiple routes to communication.[10] At this situation, there may be more time required for transmission. To solve this problem, we decide the only two token slots assign to nodes. Means they can only route nodes of two route. Also proving a time interval. If within timeslot the source node doesn’t get the reply from destination node, the source node again repeat the steps from route request. III. RELATED WORK There are many researchers has focused on securely transmission in a MANET without occurring a collision between them and the node can transmit and receive the message from a single channel[9][10]. Vasudevan sl at[1] later pointed out that the expected time slots needed to finish the neighbor discovery process by using birthday protocols in[3] is neHn, where Hn is the nth harmonie number. The authors also proposed protocols for more realistic situations, where the size of a clique is unknown to nodes a feedback mechanism is introduced into the system and the clocks of nodes are not identical. Navneet malpani[2] discuss the token circulation in MANET. In which the authors decide a
  • 3. Archana S. Chitte et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.97-99 www.ijera.com 99 | P a g e token and circulate to the route node for successful communication with every node. With the development of MPR[6] Zeng et al[4] extended the result of [3] to the MPR situation where no collision occurs if and only if there are no more than k(K≥2) nodes simultaneously time needed to discover all nodes. IV. CONCLUSION In this paper, we proposed a token passing techniques by adding a time slot into every nodes before going to start communication. First we add a bit slot for dtoring a unique token ID created by source node. Further more, we add time slot. According to time slot, the route node can transmit and receive the message at a single channel. This aadition of time slot, it may reduce the collision in Neighbour Discovery and secured communication without collision. References [1] M. J. McGlynn and S. A. Borbash, ―Birthday protocols for low energy deployment and flexible neighbor discovery in ad hoc wireless networks,‖ in Proc. ACM MobiHoc, 2001, pp. 137–145. [2] Navneet Malpani, Yu Chen, Nitin H. Vaidya, Senior Member,‖Distributed Token Circulation in Mobile Ad Hoc Networks‖, in IEEE transaction,s on Mobile Computing, 2005 [3] S. Vasudevan, D. Towsley, D. Goeckel, and R. Khalili, ―Neighbor discovery in wireless networks and the coupon collector’s problem,‖ in Proc. ACM MobiCom, 2009, pp. 181–192. [4] W. Zeng, X. Chen, A. Russell, S. Vasudevan, B. Wang, and W. Wei, ―Neighbor discovery in wireless networks with multipacket reception,‖ in Proc. ACM MobiHoc, 2011, p. 3. [5] R. Motwani and P. Raghavan, Randomized Algorithms. Cambridge, U.K.: Cambridge Univ. Press, 1995. [6] J. Jeon and A. Ephremides, ―Neighbor discovery in a wireless sensor network: Multipacket reception capability and physical-layer signal processing,‖ in Proc. 48th Annu. Allerton Conf. Commun., Control, Comput., 2010, pp. 310–317. [7] J. I. Choi, M. Jain, K. Srinivasan, P. Levis, and S. Katti, ―Achieving single channel, full duplex wireless communication,‖ in Proc. ACM MobiCom, 2010, pp. 1–12. [8] M. Jain, J. I. Choi, T. M. Kim, D. Bharadia, S. Seth, K. Srinivasan, P. Levis, S. Katti, and P. Sinha, ―Practical, real-time, full duplex wireless,‖ in Proc. ACM MobiCom, 2011, pp. 301–312. [9] Z. Zhang and B. Li, ―Neighbor discovery in mobile ad hoc self configuring networks with directional antennas:Algorithms and comparisons,‖ IEEE Trans. Wireless Commun., vol. 7, no. 5, pp. 1540–1549, May 2008. [10] L. You, X. Zhu, and G. Chen, ―Neighbor discovery in peer-to-peer wireless networks with multi-channel MPR capability,‖ in Proc. IEEE ICC, 2012, pp. 4975–4979. [11] Y. Wang, G. Pan, and Z. Huang, ―Direct multi-hop time synchronization with constructive interference,‖ in Proc. IPSN, 2012, pp. 115–116. [12] L. Venturino, X. Wang, M. Lops, ‖Multiuser detection for cooperative networks and performance analysis ‖, IEEE Transaction on Signal Processing, Vol. 54, Issue 9, pp. 3315–3329, September 2006. [13] S. Vasudevan, J. Kurose, D. Towsley, ‖On neighbor discovery in wireless networks with directional antennas‖, INFOCOM 2005, Vol. 4, pp. 2502–2512, March 2005. S. Verd´u, Multiuser Detection, Cambridge University Press, 1998. [14] Magnus Frodish, Rer Johnson and Peter Larson,‖Wireless Ad Hoc Networking-The art of Networking without a network, in Ericsson Review No.4, 2000. [15] Guobao Sun, Fan Wu, Xiaofeng Gao, Wei Wang,‖Time-Efficient Protocols for Neighbour Discovery in Wireless Ad Hoc Networks‖,IEEE Transaction on Vehicular Technology, Vol.62,No.6,July 2013.