With the increase in traffic, internet service providers are trying their best to provide maximum utilization of resources available. The current traffic load has to be taken into account for computation of paths in routing protocols. Network applications; require the shortest paths to be used for communication purposes. Addressing the selection of path, from a known source to destination is the basic aim of this paper. This paper proposes a method of calculating the shortest path for a network using a combination of Open shortest path first and Genetic Algorithm (OSGA). Genetic Algorithm is used in this paper for optimization of routing. It helps in enhancing the performance of the routers.
A Comparative Performance Analysis of Route Redistribution among Three Differ...IJCNCJournal
This document presents a comparative performance analysis of route redistribution among three routing protocols (EIGRP, IGRP, and IS-IS in the first scenario, OSPF, IGRP, and IS-IS in the second, and OSPF, IGRP, and EIGRP in the third) using OPNET simulation. The simulation results showed that the EIGRP_IGRP_ISIS scenario performed better in terms of network convergence time, throughput, video packet delay variation, and FTP download response time, while the OSPF_IGRP_ISIS scenario had less voice packet delay variation, video conferencing and voice packet end-to-end delays, and queuing delay compared to the other
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
IRJET- Optimum Routing Algorithm for MANETIRJET Journal
This document summarizes a research paper that proposes an efficient routing algorithm for mobile ad hoc networks (MANETs). The paper introduces MANETs and discusses two common routing protocols: Ad hoc On-Demand Distance Vector (AODV) and Destination-Sequenced Distance-Vector (DSDV). It then proposes an enhancement to AODV that differentiates between relaying and silent nodes to reduce congestion during route discovery. Simulations show the proposed AODV algorithm performs better than the standard AODV and DSR protocols in terms of packet delivery ratio, end-to-end delay, and throughput.
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Jitender Grover
This document summarizes a research paper that analyzes the impact of variable transmission range and scalability with respect to mobility and zone size on the Zone Routing Protocol (ZRP) for mobile ad hoc networks. The paper simulates ZRP performance under different transmission ranges, zone radii, node speeds and network sizes. Results show that packet delivery ratio increases with transmission range for 25 nodes but decreases for 50 nodes. Packet delivery also decreases with higher node mobility and is highest when the zone radius is maximum.
Performance Evaluation of Routing Protocols in University Networkijtsrd
In an enterprise network, multiple dynamic routing protocols are used for forwarding packets with the best routes. Therefore, performance of the network is based on routing protocols and the route redistribution is an important issue in an enterprise network that has been configured by multiple different routing protocols in its routers. So, aim of the system is to analyze the performance and comparison of different Interior Gateway routing protocols. Routing is depended on many parameters critical such as network convergence time, Ethernet delay, throughput, end to end delay, jitter, packet delivery, security and bandwidth, etc. In this paper, the analysis of characteristics and the performance of the different routing protocols as Routing Information Protocol RIP , Open Shortest Path First OSPF and Enhanced Interior Gateway Routing Protocol EIGRP are evaluated in a university network. The performance evaluation are based on end to end packet delay, network convergence time, packet delay variation and administrative distance, etc. The analysis focuses on the performance of the routing protocols with its routing table in a simulator. The Simulation software can be used to evaluate and compare the performance of the routing protocols. The simulator return the routing table for each node or router in the university network which would contain the best path to reach the remote destination on the metric chosen based on the routing protocol implemented. The simulation software give results used to evaluate the performance of routing protocols, the performance of different routing protocols will be compared, and to analyze the convergence time and administrative distance of routing protocols. Kyaw Zay Oo "Performance Evaluation of Routing Protocols in University Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26582.pdfPaper URL: https://www.ijtsrd.com/engineering/information-technology/26582/performance-evaluation-of-routing-protocols-in-university-network/kyaw-zay-oo
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...IJMER
The document summarizes a study that used OPNET simulation to analyze the performance of four dynamic routing protocols (RIP, OSPF, EIGRP, IGRP) for different applications. The simulation tested the protocols over a network with six subnets connected by DS3 links. Results showed that EIGRP had the lowest delay and performed best for FTP and email applications. However, for real-time applications like VoIP and video conferencing, OSPF and RIP provided better results due to lower latency requirements. The document concludes that the choice of routing protocol depends on the specific applications running over the network.
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
This document discusses using the Address Resolution Protocol (ARP) routing protocol for multi-hop transmissions in IEEE 802.11 ad hoc networks. It proposes using ARP messages between nodes to establish routes for sending data when the source and destination nodes are out of radio range of each other. Intermediate nodes receiving ARP requests or replies would act as routers, forwarding the data to the destination. The method aims to reduce overhead compared to other ad hoc routing protocols like AODV. Simulation results showed the ARP routing protocol performed comparably to AODV in terms of throughput, packet loss and round trip time for different distances and environments.
A Comparative Performance Analysis of Route Redistribution among Three Differ...IJCNCJournal
This document presents a comparative performance analysis of route redistribution among three routing protocols (EIGRP, IGRP, and IS-IS in the first scenario, OSPF, IGRP, and IS-IS in the second, and OSPF, IGRP, and EIGRP in the third) using OPNET simulation. The simulation results showed that the EIGRP_IGRP_ISIS scenario performed better in terms of network convergence time, throughput, video packet delay variation, and FTP download response time, while the OSPF_IGRP_ISIS scenario had less voice packet delay variation, video conferencing and voice packet end-to-end delays, and queuing delay compared to the other
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
IRJET- Optimum Routing Algorithm for MANETIRJET Journal
This document summarizes a research paper that proposes an efficient routing algorithm for mobile ad hoc networks (MANETs). The paper introduces MANETs and discusses two common routing protocols: Ad hoc On-Demand Distance Vector (AODV) and Destination-Sequenced Distance-Vector (DSDV). It then proposes an enhancement to AODV that differentiates between relaying and silent nodes to reduce congestion during route discovery. Simulations show the proposed AODV algorithm performs better than the standard AODV and DSR protocols in terms of packet delivery ratio, end-to-end delay, and throughput.
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Jitender Grover
This document summarizes a research paper that analyzes the impact of variable transmission range and scalability with respect to mobility and zone size on the Zone Routing Protocol (ZRP) for mobile ad hoc networks. The paper simulates ZRP performance under different transmission ranges, zone radii, node speeds and network sizes. Results show that packet delivery ratio increases with transmission range for 25 nodes but decreases for 50 nodes. Packet delivery also decreases with higher node mobility and is highest when the zone radius is maximum.
Performance Evaluation of Routing Protocols in University Networkijtsrd
In an enterprise network, multiple dynamic routing protocols are used for forwarding packets with the best routes. Therefore, performance of the network is based on routing protocols and the route redistribution is an important issue in an enterprise network that has been configured by multiple different routing protocols in its routers. So, aim of the system is to analyze the performance and comparison of different Interior Gateway routing protocols. Routing is depended on many parameters critical such as network convergence time, Ethernet delay, throughput, end to end delay, jitter, packet delivery, security and bandwidth, etc. In this paper, the analysis of characteristics and the performance of the different routing protocols as Routing Information Protocol RIP , Open Shortest Path First OSPF and Enhanced Interior Gateway Routing Protocol EIGRP are evaluated in a university network. The performance evaluation are based on end to end packet delay, network convergence time, packet delay variation and administrative distance, etc. The analysis focuses on the performance of the routing protocols with its routing table in a simulator. The Simulation software can be used to evaluate and compare the performance of the routing protocols. The simulator return the routing table for each node or router in the university network which would contain the best path to reach the remote destination on the metric chosen based on the routing protocol implemented. The simulation software give results used to evaluate the performance of routing protocols, the performance of different routing protocols will be compared, and to analyze the convergence time and administrative distance of routing protocols. Kyaw Zay Oo "Performance Evaluation of Routing Protocols in University Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26582.pdfPaper URL: https://www.ijtsrd.com/engineering/information-technology/26582/performance-evaluation-of-routing-protocols-in-university-network/kyaw-zay-oo
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...IJMER
The document summarizes a study that used OPNET simulation to analyze the performance of four dynamic routing protocols (RIP, OSPF, EIGRP, IGRP) for different applications. The simulation tested the protocols over a network with six subnets connected by DS3 links. Results showed that EIGRP had the lowest delay and performed best for FTP and email applications. However, for real-time applications like VoIP and video conferencing, OSPF and RIP provided better results due to lower latency requirements. The document concludes that the choice of routing protocol depends on the specific applications running over the network.
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
This document discusses using the Address Resolution Protocol (ARP) routing protocol for multi-hop transmissions in IEEE 802.11 ad hoc networks. It proposes using ARP messages between nodes to establish routes for sending data when the source and destination nodes are out of radio range of each other. Intermediate nodes receiving ARP requests or replies would act as routers, forwarding the data to the destination. The method aims to reduce overhead compared to other ad hoc routing protocols like AODV. Simulation results showed the ARP routing protocol performed comparably to AODV in terms of throughput, packet loss and round trip time for different distances and environments.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
In ad hoc routing protocols the source node
may need an intermediate nodes to transmit the packets into
the destination if the destination is not within transmission
range of the source. This paper studies the impact of signal
strength of nodes over ad hoc routing protocols and explains
an important effect of signal strength on ad hoc routing
protocols in four different directions including the routes and
the nodes. As a result the study give an important
improvement in ad hoc routing protocols when using signal
strength compared to other ad hoc routing protocols without
considering signal strength.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes a study that evaluates the performance of four routing protocols - FSR, STAR-LORA, DYMO, and DSR - in a mobile ad hoc network (MANET) simulation using QualNet. Two scenarios were tested: one with constant bit rate (CBR) client traffic and one with CBR server traffic. Performance metrics like throughput, average end-to-end delay, and average jitter were measured for 2, 4, 6, 8, and 12 nodes. The results showed that reactive protocols DYMO and DSR generally had lower delay but higher jitter than proactive protocols FSR and STAR-LORA. This study aims to help identify the most efficient routing
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
This document analyzes the performance of energy efficient cross-layer load balancing in tactical multi-gateway wireless sensor networks. It compares the performance of AODV routing under four different modes: Normal, Optimal, Compressed, and Optimal Compressed. The Optimal Compressed mode uses both load balancing and data compression (Run Length Encoding) and performs best with the lowest delay, highest energy fairness, lowest packet loss rate, and lowest routing overhead according to simulations run in NS2. The proposed approach of using both load balancing and compression outperforms using either technique alone or without them, improving important network metrics like lifetime.
Analyzing performance of zrp by varying node density and transmission rangeAlexander Decker
This document summarizes a simulation study analyzing the performance of the Zone Routing Protocol (ZRP) in mobile ad hoc networks by varying different parameters. The study uses the Network Simulator 2 (NS-2) tool to simulate ZRP under varying node density, transmission range, pause time, sending rate, and node mobility. Key performance metrics like throughput, end-to-end delay, and normalized routing load are measured. The results show that throughput generally increases with higher node density, transmission range, and pause time, while delay and routing load also tend to increase with those factors. Throughput decreases with higher node mobility, while delay decreases and routing load increases.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
Analysis of FSR, LANMAR and DYMO under MANETidescitation
A movable ad hoc system (MANET) is a self-configuring communications set of
connections of mobile procedure associated by wireless. Each mechanism in a MANET is
free to move independently in some way, and will therefore modify its relations to other
devices frequently [2]. The primary purpose of any ad-hoc network routing protocol is to
meet the challenges of the dynamically changing topology and establish an efficient route
connecting every two nodes. In this paper three protocols FSR, LANMAR and DYMO are
compared by using random waypoint mobility in few nodes with varying packet sizes in
CBR traffic. The parameters or metrics are used to assess the performance of protocols with
and without Black Hole attack, that are data Packet Delivery ratio and Average Jitter with
varying data traffic CBR (Constant Bit Ratio) using Qual Net 5.0.2 simulator.
A novel approach of hybrid multipath routing protocol for manets using receiv...eSAT Publishing House
This document summarizes a research paper that proposes a new hybrid multipath routing protocol called HMPRP for mobile ad hoc networks. HMPRP aims to improve performance metrics like packet delivery ratio, end-to-end delay, energy consumption and throughput. It applies concepts from AODV like route discovery and incorporates received signal strength and node-disjoint multipath routing. Simulation results show HMPRP outperforms AODV, OLSR and ZRP protocols across various node speeds for 150 node networks.
This document summarizes a study on analyzing link weight performance in intra-domain networks. It discusses measuring network topology and traffic, modeling path selection based on IGP configuration, and controlling the network by reconfiguring IGP link weights. The goal is to optimize routing within existing protocols like OSPF to improve traffic flow based on measured conditions. Link weights are adjusted to balance loads and steer traffic onto preferable paths between routers within an autonomous system or domain.
This document presents a comparative study of a proposed fuzzy logic mobility based AODV (FLM-AODV) routing protocol and the traditional AODV protocol in mobile ad hoc networks (MANETs). The FLM-AODV protocol considers node mobility as an additional parameter in the route selection process using a fuzzy logic system, in addition to hop count. Simulation results show that FLM-AODV has improved performance over AODV in terms of higher packet delivery ratio, lower average end-to-end delay, and lower normalized routing load. This is because FLM-AODV selects more stable paths with fewer broken links.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
This document proposes a new fuzzy logic-based routing protocol for mobile ad-hoc networks (MANETs) that considers path stability, residual energy of nodes, and bandwidth for optimal path selection at the source node. It also proposes adjusting the transmission rate at the source node based on end-to-end delay and packet loss ratio measured at the destination node. This cross-layer approach uses two fuzzy logic systems - one for path selection based on stability and bandwidth, and another for transmission rate adjustment based on delay and packet loss. The goal is to select stable paths and prevent congestion for more efficient data transmission in MANETs.
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
This document summarizes a research paper that proposes a new hybrid multipath routing protocol for mobile ad hoc networks called Hybrid Multipath Progressive Routing Protocol (HMPRP). It improves upon existing routing protocols like AODV and OLSR by utilizing multiple paths based on received signal strength to increase packet delivery and reduce overhead. Simulation results showed the proposed protocol achieved better performance than AODV, OLSR and ZRP in terms of packet delivery ratio, throughput, energy consumption and delay.
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...IJERA Editor
The increasing demand of computer networks is growing rapidly day by day. The growing need to distribute applications across multiple networks with high capacity and high-performance intermediate switching nodes and networks. This research primarily focuses on route redistribution and route summarization of different intra-domain routing protocols such as EIGRP and OSPF. Routing Protocols that use facilitate to exchange routing information between routers. Reasons such as multiple departments managed by multiple network Administrators, company mergers. In any case, having a multiple routing protocol and different autonomous system in networks then without route redistribution we cannot advertise route from source to destination. Of course Network complexity will increase with the size of routing table of routers then route summarization is necessity, to reduce traffic and complexity of network.
This document summarizes an article that proposes improvements to the Ad hoc On-Demand Distance Vector (AODV) routing protocol for use in Vehicular Ad hoc Networks (VANETs). It first provides background on VANETs and discusses different types of routing protocols used in VANETs, including topology-based, position-based, and hybrid protocols. It then focuses on improvements made to the reactive AODV routing protocol, including adding link layer security checks and a method to reduce packet delay called AODV_BD. The goal of these improvements is to create more stable routes and reduce packet delay for safety communications between vehicles.
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
This document compares the performance of three routing protocols - DSDV, AODV, and DSR - for mobile ad hoc networks by simulating networks of varying sizes using the Qualnet simulator. The main findings are that AODV performed most efficiently for network sizes of 30, 40, and 50 nodes, and that performance decreased for all three protocols as the number of nodes increased. For a network of 50 nodes, the three protocols exhibited different performance levels at different node counts.
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)IJCNCJournal
Ad hoc networks are a collection of mobile nodes communicating via wireless channels without any fixed
infrastructure. Because of their ease and low cost of building, ad hoc networks have a lot of attractive
applications in different fields. The topology of ad hoc networks changes dynamically, and each node in the
network can act as a host or router. With the increase in the number of wireless devices and large amount
of traffic to be exchanged, the demand for scalable routing protocols has increased. This paper presents a
scalable routing protocol, based on AODV protocol, called the Extended Clustering Ad Hoc Routing
Protocol (ECRP). This is a hybrid protocol, which combines reactive and proactive approaches in routing.
The protocol uses the Global Positioning System to determine the position of certain nodes in the network.
The evaluation methodology and simulation results obtained show that the protocol is efficient and scales
well in large networks
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETsCSCJournals
In ad hoc networks, the nodes are dynamically and arbitrary located in a manner that the interconnections between nodes are changing frequently. Thus, designing an effective routing protocol is a critical issue. In this paper, we propose a fuzzy based routing method that selects the most stable route (FSRS) considering the number of intermediate nodes, packet queue occupancy, and internodes distances. Also it takes the produced cost of the selected route as an input to another fuzzy controller predicts its lifetime (FRLP), the evaluation of the proposed method is performed using OMNet++4.0 simulator in terms of packet delivery ratio, average end-to-end delay and normalized routing load.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
Battlefield theater applications require supporting large number of nodes. It can facilitate many multi-hop
paths between each source and destination pairs. For scalability, it is critical that for supporting network
centric applications with large set of nodes require hierarchical approach to designing networks. In this
research we consider using Mobile Ad Hoc Network (MANET) with multiple clusters. Each cluster
supports a few nodes with a cluster head. The intra-cluster connectivity amongst the nodes within the
cluster is supported by multi-hop connectivity to ensure handling mobility in such a way that no service
disruption can occur. The inter-cluster connectivity is also achieved by multi-hop connectivity. However,
for inter-cluster communications, only cluster heads are connected. The selection of intra-cluster
communications and inter-cluster communications allow scalability of the network to support multiservices
applications end-to-end with a desired Quality of Service (QoS). This paper proposes graph
theoretic approach to establish efficient connection between a source and a destination within each cluster
in intra-cluster network and between clusters in inter-cluster network. Graph theoretic approach
traditionally was applied networks where nodes are static or fixed. In this paper, we have applied the
graph theoretic routing to MANET where nodes are mobile. One of the important challenges in MANET is
to support an efficient routing algorithm for multi-hop communications across many nodes which are
dynamic in nature. However, dynamic behavior of the nodes requires greater understanding of the node
degree and mobility at each instance of time in order to maintain end-to-end QoS for multi-service
provisioning. This paper demonstrates graph theoretic approach produces an optimum multi-hop
connectivity path based on cumulative minimum degree that minimizes the contention and scheduling
delay end-to-end. It is applied to both intra-cluster communications as well as inter-cluster
communications. The performance shows that having a multi-hop connectivity for intra-cluster
communications is more power efficient compared to broadcast of information with maximum power
coverage. Each cluster performs similarly and the algorithm is also used for inter-cluster communications.
Our simulation results show that the proposed graph theoretic routing approach will reduce the overall
delay and improves the physical layer data frame transmission.
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...ijfcstjournal
In this paper, we have proposed a fuzzy based decision making component for high volume traffic MPLS
networks, by implementing Traffic Engineering, Quality of Service and Multipath routing. The approach
explicitly proves to be successful in solving the issues and challenges pertaining to stability, scalability in
high volume and dynamic traffic. Furthermore, it will work to handle congestion by higher link utilization
and provides efficient rerouting of traffic along with fault tolerance in the network. In this research work,
fuzzy calculations are done for fixing the attributes of the MPLS label(s), which is put on particular packet
representing the Forwarding Equivalence Class. Fuzzy controller consists of two sub fuzzy systems- Label
Switched Path setup System (LsS) and Traffic Splitting System (TSS). The computation of dynamic status of
Load and Delay is utilized by LsS to arrange the paths in preference order. The attained Link Capacity and
Utilization Rate are employing by TSS for maintaining congestion free path. The impact of this is to
facilitate, we have better decision making for splitting the traffic for different promising paths. This was
apparent from the series of traffic scenarios. Observations are obtained using this realization.
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...ijfcstjournal
In this paper, we have proposed a fuzzy based decision making component for high volume traffic MPLS
networks, by implementing Traffic Engineering, Quality of Service and Multipath routing. The approach
explicitly proves to be successful in solving the issues and challenges pertaining to stability, scalability in
high volume and dynamic traffic. Furthermore, it will work to handle congestion by higher link utilization
and provides efficient rerouting of traffic along with fault tolerance in the network. In this research work,
fuzzy calculations are done for fixing the attributes of the MPLS label(s), which is put on particular packet
representing the Forwarding Equivalence Class. Fuzzy controller consists of two sub fuzzy systems- Label
Switched Path setup System (LsS) and Traffic Splitting System (TSS). The computation of dynamic status of
Load and Delay is utilized by LsS to arrange the paths in preference order. The attained Link Capacity and
Utilization Rate are employing by TSS for maintaining congestion free path. The impact of this is to
facilitate, we have better decision making for splitting the traffic for different promising paths. This was
apparent from the series of traffic scenarios. Observations are obtained using this realization.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
In ad hoc routing protocols the source node
may need an intermediate nodes to transmit the packets into
the destination if the destination is not within transmission
range of the source. This paper studies the impact of signal
strength of nodes over ad hoc routing protocols and explains
an important effect of signal strength on ad hoc routing
protocols in four different directions including the routes and
the nodes. As a result the study give an important
improvement in ad hoc routing protocols when using signal
strength compared to other ad hoc routing protocols without
considering signal strength.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes a study that evaluates the performance of four routing protocols - FSR, STAR-LORA, DYMO, and DSR - in a mobile ad hoc network (MANET) simulation using QualNet. Two scenarios were tested: one with constant bit rate (CBR) client traffic and one with CBR server traffic. Performance metrics like throughput, average end-to-end delay, and average jitter were measured for 2, 4, 6, 8, and 12 nodes. The results showed that reactive protocols DYMO and DSR generally had lower delay but higher jitter than proactive protocols FSR and STAR-LORA. This study aims to help identify the most efficient routing
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
This document analyzes the performance of energy efficient cross-layer load balancing in tactical multi-gateway wireless sensor networks. It compares the performance of AODV routing under four different modes: Normal, Optimal, Compressed, and Optimal Compressed. The Optimal Compressed mode uses both load balancing and data compression (Run Length Encoding) and performs best with the lowest delay, highest energy fairness, lowest packet loss rate, and lowest routing overhead according to simulations run in NS2. The proposed approach of using both load balancing and compression outperforms using either technique alone or without them, improving important network metrics like lifetime.
Analyzing performance of zrp by varying node density and transmission rangeAlexander Decker
This document summarizes a simulation study analyzing the performance of the Zone Routing Protocol (ZRP) in mobile ad hoc networks by varying different parameters. The study uses the Network Simulator 2 (NS-2) tool to simulate ZRP under varying node density, transmission range, pause time, sending rate, and node mobility. Key performance metrics like throughput, end-to-end delay, and normalized routing load are measured. The results show that throughput generally increases with higher node density, transmission range, and pause time, while delay and routing load also tend to increase with those factors. Throughput decreases with higher node mobility, while delay decreases and routing load increases.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
Analysis of FSR, LANMAR and DYMO under MANETidescitation
A movable ad hoc system (MANET) is a self-configuring communications set of
connections of mobile procedure associated by wireless. Each mechanism in a MANET is
free to move independently in some way, and will therefore modify its relations to other
devices frequently [2]. The primary purpose of any ad-hoc network routing protocol is to
meet the challenges of the dynamically changing topology and establish an efficient route
connecting every two nodes. In this paper three protocols FSR, LANMAR and DYMO are
compared by using random waypoint mobility in few nodes with varying packet sizes in
CBR traffic. The parameters or metrics are used to assess the performance of protocols with
and without Black Hole attack, that are data Packet Delivery ratio and Average Jitter with
varying data traffic CBR (Constant Bit Ratio) using Qual Net 5.0.2 simulator.
A novel approach of hybrid multipath routing protocol for manets using receiv...eSAT Publishing House
This document summarizes a research paper that proposes a new hybrid multipath routing protocol called HMPRP for mobile ad hoc networks. HMPRP aims to improve performance metrics like packet delivery ratio, end-to-end delay, energy consumption and throughput. It applies concepts from AODV like route discovery and incorporates received signal strength and node-disjoint multipath routing. Simulation results show HMPRP outperforms AODV, OLSR and ZRP protocols across various node speeds for 150 node networks.
This document summarizes a study on analyzing link weight performance in intra-domain networks. It discusses measuring network topology and traffic, modeling path selection based on IGP configuration, and controlling the network by reconfiguring IGP link weights. The goal is to optimize routing within existing protocols like OSPF to improve traffic flow based on measured conditions. Link weights are adjusted to balance loads and steer traffic onto preferable paths between routers within an autonomous system or domain.
This document presents a comparative study of a proposed fuzzy logic mobility based AODV (FLM-AODV) routing protocol and the traditional AODV protocol in mobile ad hoc networks (MANETs). The FLM-AODV protocol considers node mobility as an additional parameter in the route selection process using a fuzzy logic system, in addition to hop count. Simulation results show that FLM-AODV has improved performance over AODV in terms of higher packet delivery ratio, lower average end-to-end delay, and lower normalized routing load. This is because FLM-AODV selects more stable paths with fewer broken links.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
This document proposes a new fuzzy logic-based routing protocol for mobile ad-hoc networks (MANETs) that considers path stability, residual energy of nodes, and bandwidth for optimal path selection at the source node. It also proposes adjusting the transmission rate at the source node based on end-to-end delay and packet loss ratio measured at the destination node. This cross-layer approach uses two fuzzy logic systems - one for path selection based on stability and bandwidth, and another for transmission rate adjustment based on delay and packet loss. The goal is to select stable paths and prevent congestion for more efficient data transmission in MANETs.
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
This document summarizes a research paper that proposes a new hybrid multipath routing protocol for mobile ad hoc networks called Hybrid Multipath Progressive Routing Protocol (HMPRP). It improves upon existing routing protocols like AODV and OLSR by utilizing multiple paths based on received signal strength to increase packet delivery and reduce overhead. Simulation results showed the proposed protocol achieved better performance than AODV, OLSR and ZRP in terms of packet delivery ratio, throughput, energy consumption and delay.
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...IJERA Editor
The increasing demand of computer networks is growing rapidly day by day. The growing need to distribute applications across multiple networks with high capacity and high-performance intermediate switching nodes and networks. This research primarily focuses on route redistribution and route summarization of different intra-domain routing protocols such as EIGRP and OSPF. Routing Protocols that use facilitate to exchange routing information between routers. Reasons such as multiple departments managed by multiple network Administrators, company mergers. In any case, having a multiple routing protocol and different autonomous system in networks then without route redistribution we cannot advertise route from source to destination. Of course Network complexity will increase with the size of routing table of routers then route summarization is necessity, to reduce traffic and complexity of network.
This document summarizes an article that proposes improvements to the Ad hoc On-Demand Distance Vector (AODV) routing protocol for use in Vehicular Ad hoc Networks (VANETs). It first provides background on VANETs and discusses different types of routing protocols used in VANETs, including topology-based, position-based, and hybrid protocols. It then focuses on improvements made to the reactive AODV routing protocol, including adding link layer security checks and a method to reduce packet delay called AODV_BD. The goal of these improvements is to create more stable routes and reduce packet delay for safety communications between vehicles.
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
This document compares the performance of three routing protocols - DSDV, AODV, and DSR - for mobile ad hoc networks by simulating networks of varying sizes using the Qualnet simulator. The main findings are that AODV performed most efficiently for network sizes of 30, 40, and 50 nodes, and that performance decreased for all three protocols as the number of nodes increased. For a network of 50 nodes, the three protocols exhibited different performance levels at different node counts.
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)IJCNCJournal
Ad hoc networks are a collection of mobile nodes communicating via wireless channels without any fixed
infrastructure. Because of their ease and low cost of building, ad hoc networks have a lot of attractive
applications in different fields. The topology of ad hoc networks changes dynamically, and each node in the
network can act as a host or router. With the increase in the number of wireless devices and large amount
of traffic to be exchanged, the demand for scalable routing protocols has increased. This paper presents a
scalable routing protocol, based on AODV protocol, called the Extended Clustering Ad Hoc Routing
Protocol (ECRP). This is a hybrid protocol, which combines reactive and proactive approaches in routing.
The protocol uses the Global Positioning System to determine the position of certain nodes in the network.
The evaluation methodology and simulation results obtained show that the protocol is efficient and scales
well in large networks
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETsCSCJournals
In ad hoc networks, the nodes are dynamically and arbitrary located in a manner that the interconnections between nodes are changing frequently. Thus, designing an effective routing protocol is a critical issue. In this paper, we propose a fuzzy based routing method that selects the most stable route (FSRS) considering the number of intermediate nodes, packet queue occupancy, and internodes distances. Also it takes the produced cost of the selected route as an input to another fuzzy controller predicts its lifetime (FRLP), the evaluation of the proposed method is performed using OMNet++4.0 simulator in terms of packet delivery ratio, average end-to-end delay and normalized routing load.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
Battlefield theater applications require supporting large number of nodes. It can facilitate many multi-hop
paths between each source and destination pairs. For scalability, it is critical that for supporting network
centric applications with large set of nodes require hierarchical approach to designing networks. In this
research we consider using Mobile Ad Hoc Network (MANET) with multiple clusters. Each cluster
supports a few nodes with a cluster head. The intra-cluster connectivity amongst the nodes within the
cluster is supported by multi-hop connectivity to ensure handling mobility in such a way that no service
disruption can occur. The inter-cluster connectivity is also achieved by multi-hop connectivity. However,
for inter-cluster communications, only cluster heads are connected. The selection of intra-cluster
communications and inter-cluster communications allow scalability of the network to support multiservices
applications end-to-end with a desired Quality of Service (QoS). This paper proposes graph
theoretic approach to establish efficient connection between a source and a destination within each cluster
in intra-cluster network and between clusters in inter-cluster network. Graph theoretic approach
traditionally was applied networks where nodes are static or fixed. In this paper, we have applied the
graph theoretic routing to MANET where nodes are mobile. One of the important challenges in MANET is
to support an efficient routing algorithm for multi-hop communications across many nodes which are
dynamic in nature. However, dynamic behavior of the nodes requires greater understanding of the node
degree and mobility at each instance of time in order to maintain end-to-end QoS for multi-service
provisioning. This paper demonstrates graph theoretic approach produces an optimum multi-hop
connectivity path based on cumulative minimum degree that minimizes the contention and scheduling
delay end-to-end. It is applied to both intra-cluster communications as well as inter-cluster
communications. The performance shows that having a multi-hop connectivity for intra-cluster
communications is more power efficient compared to broadcast of information with maximum power
coverage. Each cluster performs similarly and the algorithm is also used for inter-cluster communications.
Our simulation results show that the proposed graph theoretic routing approach will reduce the overall
delay and improves the physical layer data frame transmission.
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...ijfcstjournal
In this paper, we have proposed a fuzzy based decision making component for high volume traffic MPLS
networks, by implementing Traffic Engineering, Quality of Service and Multipath routing. The approach
explicitly proves to be successful in solving the issues and challenges pertaining to stability, scalability in
high volume and dynamic traffic. Furthermore, it will work to handle congestion by higher link utilization
and provides efficient rerouting of traffic along with fault tolerance in the network. In this research work,
fuzzy calculations are done for fixing the attributes of the MPLS label(s), which is put on particular packet
representing the Forwarding Equivalence Class. Fuzzy controller consists of two sub fuzzy systems- Label
Switched Path setup System (LsS) and Traffic Splitting System (TSS). The computation of dynamic status of
Load and Delay is utilized by LsS to arrange the paths in preference order. The attained Link Capacity and
Utilization Rate are employing by TSS for maintaining congestion free path. The impact of this is to
facilitate, we have better decision making for splitting the traffic for different promising paths. This was
apparent from the series of traffic scenarios. Observations are obtained using this realization.
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...ijfcstjournal
In this paper, we have proposed a fuzzy based decision making component for high volume traffic MPLS
networks, by implementing Traffic Engineering, Quality of Service and Multipath routing. The approach
explicitly proves to be successful in solving the issues and challenges pertaining to stability, scalability in
high volume and dynamic traffic. Furthermore, it will work to handle congestion by higher link utilization
and provides efficient rerouting of traffic along with fault tolerance in the network. In this research work,
fuzzy calculations are done for fixing the attributes of the MPLS label(s), which is put on particular packet
representing the Forwarding Equivalence Class. Fuzzy controller consists of two sub fuzzy systems- Label
Switched Path setup System (LsS) and Traffic Splitting System (TSS). The computation of dynamic status of
Load and Delay is utilized by LsS to arrange the paths in preference order. The attained Link Capacity and
Utilization Rate are employing by TSS for maintaining congestion free path. The impact of this is to
facilitate, we have better decision making for splitting the traffic for different promising paths. This was
apparent from the series of traffic scenarios. Observations are obtained using this realization.
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...ijfcstjournal
In this paper, we have proposed a fuzzy based decision making component for high volume traffic MPLS
networks, by implementing Traffic Engineering, Quality of Service and Multipath routing. The approach
explicitly proves to be successful in solving the issues and challenges pertaining to stability, scalability in
high volume and dynamic traffic. Furthermore, it will work to handle congestion by higher link utilization
and provides efficient rerouting of traffic along with fault tolerance in the network. In this research work,
fuzzy calculations are done for fixing the attributes of the MPLS label(s), which is put on particular packet
representing the Forwarding Equivalence Class. Fuzzy controller consists of two sub fuzzy systems- Label
Switched Path setup System (LsS) and Traffic Splitting System (TSS). The computation of dynamic status of
Load and Delay is utilized by LsS to arrange the paths in preference order. The attained Link Capacity and
Utilization Rate are employing by TSS for maintaining congestion free path. The impact of this is to
facilitate, we have better decision making for splitting the traffic for different promising paths. This was
apparent from the series of traffic scenarios. Observations are obtained using this realization.
The Hybrid AODV routing protocol for path establishment in MANETIRJET Journal
This document proposes a hybrid routing protocol for path establishment in mobile ad hoc networks (MANETs) that combines the Ad Hoc On-Demand Distance Vector (AODV) routing protocol with bio-inspired optimization techniques. The performance of AODV is improved by applying ant colony optimization and bee colony optimization techniques to establish paths from source to destination nodes. The proposed approach then applies cuckoo search algorithm to further optimize path establishment. Simulation results show that the hybrid protocol has lower delay, lower packet loss, and higher throughput compared to basic AODV and an improved version of AODV.
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc NetworkIJAAS Team
Congestion problem and packet delivery related issues in the vehicular ad hoc network environment is a widely researched problem in recent years. Many network designers utilize various algorithms for the design of ad hoc networks and compare their results with the existing approaches. The design of efficient network protocol is a major challenge in vehicular ad hoc network which utilizes the value of GPS and other parameters associated with the vehicles. In this paper GPSR protocol is improved and compared with the existing GPSR protocol and AODV protocol on the basis of various performance parameters like throughput of the network, delay and packet delivery ratio. The results also validate the performance of the proposed approach.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
As the network size increases the probability of congestion occurrence at nodes increases. This is
because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result
congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses.
In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce
end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector
routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing
(IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy
adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing
performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput
and packet delivery fraction
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
1. The document proposes a hybrid routing protocol that combines DSDV and IAODV to reduce packet loss due to congestion in MANETs.
2. Under the proposed scheme, DSDV is used initially for path selection. If congestion occurs, nodes switch to using IAODV to find an alternate path to avoid congested areas.
3. Simulation results show that the hybrid protocol improves end-to-end delay, packet delivery fraction, and throughput compared to using only DSDV or IAODV. The hybrid approach balances the advantages of proactive and reactive routing to better handle congestion in mobile ad hoc networks.
Improvement in the mobility of mobile ipv6 based mobile networks using revers...ijmnct
Mobile IPv6 based Mobile Networks are becoming increasingly important with the widespread
popularity of wireless internet connectivity. For large networks, an extension, namely, the Hierarchical
Mobile IPv6 is used, which suffers from overloading of the Home Agent as every packet sent has to pass
through it and this produces a significant loss in performance. In this paper, a method to improve the
mobility using the fast handover of Mobile IPv6 (FMIPv6) and the Reverse Routing Header Protocol is
proposed. Simulation results at different packet intervals show that, the proposed scheme is able to
reduce the average delay and achieve an optimum level of throughput.
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...IRJET Journal
This document discusses optimizing the performance of the Optimized Link State Routing (OLSR) protocol for vehicular ad hoc networks (VANETs) through parameter tuning. It first provides background on VANETs and discusses routing challenges. It then proposes using metaheuristic algorithms like genetic algorithm, particle swarm optimization and simulated annealing to automatically tune OLSR parameters and evaluate the optimized protocol's performance in simulations. The results show the tuned OLSR protocol outperforms the standard OLSR protocol with increased throughput and packet delivery ratio, and reduced delay.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
This document describes a student project to implement the OSPF routing protocol on routers using the Packet Tracer simulator. It includes an introduction to routing and OSPF, as well as chapters covering the OSPF process, router types, network architecture, results, advantages/disadvantages, and references. The project was completed by three students for their Bachelor of Technology degree and submitted to their department for acceptance.
Routing protocols in Ad-hoc Networks- A Simulation StudyIOSR Journals
This document summarizes a study that simulated and compared several routing protocols for ad hoc networks using the Network Simulator 2 (NS-2). It began by describing ad hoc networks and reviewing related work comparing routing protocols. It then provided an overview of desirable routing protocol properties and described several prominent protocols in detail: DSDV, AODV, DSR, ZRP, TORA, IMEP, and CBRP. The document outlined the NS-2 simulator and the mobility extension used. It concluded by detailing the simulation methodology and modifications made to the AODV and DSR implementations in NS-2 to perform the comparative analysis.
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...theijes
In modern network communications, Routing protocols are getting an important function for the user data path that are responsible for controlling the routers to communicate together and forward packets by routers over the best trip path from a base node to a destination one. Dynamic routing protocols represented by RIP, OSPF and EIGRP are explained here for addressing various networks with different traffic environments. In this paper, the performance of these protocols are estimating with many factors like convergence activity and duration, average throughput, network end-to-end delay, Point-to-Point Utilization over the simulation based on OPNET academic version. From Simulation results, EIGRP have a fastest time convergence compared with other topologies of networks are confirmed and the OSPF has the highest Point-to-Point Utilization in the network followed by EIGRP then RIP. So, there is an attempt for finding out which protocols are suitable for the networks and from analyses to understand the role of the routing protocols in different network scenarios
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIJCNCJournal
This document proposes an improved quality of service protocol for real-time traffic in mobile ad hoc networks. It presents a modified version of the AODV routing protocol that provides two key improvements: 1) A balanced best-effort traffic aware route discovery mechanism that selects paths with lower ratios of best-effort packets to minimize their impact on real-time traffic. 2) A packet forwarding procedure that gives transmission priority to real-time packets by transmitting them immediately from the queue while best-effort packets have to wait, improving throughput for real-time applications. Simulation results show the proposed protocol performs better than basic AODV in terms of throughput and delay for real-time traffic.
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
This document discusses routing protocols for mobile ad hoc networks. It analyzes the performance of several routing protocols including OLSR, DSR, AODV, ZRP and LAR using Qualnet simulator 6.1. The protocols are classified as proactive, reactive or hybrid. Proactive protocols maintain up-to-date routing tables while reactive protocols discover routes on demand. The paper evaluates and compares the protocols based on metrics like average jitter, end-to-end delay, and throughput under different numbers of stationary and mobile nodes.
Similar to Routing in Networks using Genetic Algorithm (20)
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
The document proposes using a particle swarm optimization (PSO) algorithm to optimize the hyperparameters of a convolutional neural network (CNN) for image classification. The PSO algorithm is used to find optimal values for CNN hyperparameters like the number and size of convolutional filters. In experiments on the MNIST handwritten digit dataset, the optimized CNN achieved a testing error rate of 0.87%, which is competitive with state-of-the-art models. The proposed approach finds optimized CNN architectures automatically without requiring manual design or encoding strategies during training.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
This document describes the implementation of a double-layer structure on an octagon microstrip yagi antenna (OMYA) to improve its performance at 5.8 GHz. The double-layer consists of two double positive (DPS) substrates placed above the OMYA. Simulation and experimental results show that the double-layer configuration increases the gain of the OMYA by 2.5 dB compared to without the double-layer. The measured bandwidth of the OMYA with double-layer is 14.6%, indicating the double-layer can increase both the gain and bandwidth of the OMYA.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
The document provides an overview of the key performance indicators (KPIs) for 6G wireless networks compared to 5G networks. Some of the major KPIs discussed for 6G include: achieving data rates of up to 1 Tbps and individual user data rates up to 100 Gbps; reducing latency below 10 milliseconds; supporting up to 10 million connected devices per square kilometer; improving spectral efficiency by up to 100 times through technologies like terahertz communications and smart surfaces; and achieving an energy efficiency of 1 pico-joule per bit transmitted through techniques like wireless power transmission and energy harvesting. The document outlines how 6G aims to integrate terrestrial, aerial and maritime communications into a single network to provide ubiquitous connectivity with higher
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
2. Operations Strategy in a Global Environment.ppt
Routing in Networks using Genetic Algorithm
1. Bulletin of Electrical Engineering and Informatics
ISSN: 2302-9285
Vol. 6, No. 1, March 2017, pp. 88~98, DOI: 10.11591/eei.v6i1.574 88
Received November 6, 2016; Revised January 6, 2017; Accepted January 20, 2017
Routing in Networks using Genetic Algorithm
Meenakshi Moza*, Suresh Kumar
CSE Department, F.E.T., Manav Rachna International University, India
*Corresponding author, email: meenakshi.fet@mriu.edu.in
Abstract
With the increase in traffic, internet service providers are trying their best to provide maximum
utilization of resources available. The current traffic load has to be taken into account for computation of
paths in routing protocols. Network applications; require the shortest paths to be used for communication
purposes. Addressing the selection of path, from a known source to destination is the basic aim of this
paper. This paper proposes a method of calculating the shortest path for a network using a combination of
Open shortest path first and Genetic Algorithm (OSGA). Genetic Algorithm is used in this paper for
optimization of routing. It helps in enhancing the performance of the routers.
Keywords: genetic algorithm, open shortest path first, quality of service, chromosome, mutation, routing
1. Introduction
Computer Network is a collection of autonomous computers interconnected for the
purpose of communication and resource sharing [1]. The interconnection can be done using the
public telephone network, dedicated leased lines or any other medium. The transmission media
used for interconnection may be wired or wireless. The demands of users of computer networks
are changing very fast. They want information anytime, anywhere. The networks are not only
used for merely transferring data, but also for other applications like audio and video
conversation, video streaming, etc. These applications have special requirements in terms of
reliability, bandwidth, jitter, delay etc. The network should possess these qualities for satisfying
the demands of the users.
Routing is a selection of the best path for packets to traverse in a network [2-4].
Selection of the path means to apply a routing metric like hop count, delay, bandwidth, for the
evaluation of a path, which is best for a packet to travel. Routing algorithms facilitate in the
determination of the path [5]. They help in initialization and maintenance of routing tables, which
contain routing information. When a packet is received by a router, the destination address is
checked and it is the duty of routing algorithm for association of this destination address with the
next hop. Routing tables are built, using a lot of routing algorithms which help to find the path
from source to destination. Open Shortest Path First (OSPF) is one such link state routing
algorithm, which helps us to find the shortest path between each source & destination [6-9].
OSPF can run on most routers and makes use of shortest path first (SPF) algorithm developed
by Dijkstra. The basic steps carried out in OSPF are as follows:
a. Step 1: The routers are synchronized by exchanging the hello packets.
b. Step 2: The topology of the network is shared by exchanging link state packets.
c. Step 3: Each router then creates a shortest path tree from the topology information received
in the step 2.
The limitation in case of OSPF is overloading, in the shortest path. The arrival of the
packets at the desired destination with the delay or queuing on the way or router processing can
result in service quality being affected. All these limitations can be taken care of, by optimization
of the IP network [10-12]. It can therefore be safely said that the basis of planning and
managing networks is routing optimization which is achieved by applying GA to the network. In
this paper, it is proposed to extend OSPF by applying GA on OSPF resulting in the Open
shortest genetic algorithm (OSGA). Here, a potential solution to the problem are encoded in a
2. Bulletin of EEI ISSN: 2302-9285
Routing in Networks using Genetic Algorithm (Meenakshi Moza)
89
way that the computer can process. The easiest way is to encode solutions as binary
sequences of 0’s and 1’s which has been adopted in this paper [13-16].
This paper is organized into five sections. Section 1 provides the introduction to routing.
Section 2 discusses the literature review. Section 3 talks about network analysis using GA.
Section 4 deals with the performance evaluation in terms of methodology adopted and how NS3
is used for analyzing the behavior of the network under consideration. Also it talks about the
variations of certain parameters for the routing protocols under consideration. In other words,
this section comprises the complete result analysis. Section 5 discusses the conclusions drawn
and the future scope.
2. Literature Review
M. Goyal et al. (2006) state that a tradeoff is required between load processing, traffic
control and speed, after re convergence, due to the change in topology. Because of the nature
and size of networks being served by OSPF has changed, therefore there is a requirement for
reevaluation of OSPF. In order to modify OSPF, we cannot increase load on routers because
overloading of Central Processing Unit (CPU) results in routing instability of networks. In this
paper, an environment which is broadcast and Local Area Network (LAN) in nature is taken and
it is seen that many Designated Router (DR) elections are required by a router before settling on
the DR, Backup Designated router (BDR) identification. The reason for this is given as, that
routers before being able to establish communication which is bidirectional in nature, are out of
the wait state. Also more than one router can initially elect itself as BDR, so many DR elections
take place and then the routers later give it up. In addition to this, a forty second wait time
results in settling process of the DR / BDR to get delayed. Certain modifications are put forward
in this paper to remove the above limitations. The first change is to restart wait timer as soon as
a hello message (one way) is obtained. The next change is for wait timer to have a value so that
the router can have bidirectional communication with that neighbor, who had sent a hello
message which had restarted the wait timer. Also for a router which is not in a wait state, it
should be possible to avoid DR elections, if it establishes bidirectional communication, when
some of its neighbors are not bidirectional. This is possible by introducing a new wait 2 state.
The last modification required is that on being elected a DR / BDR, a router should send a hello
message immediately so that everybody knows about it.
M. Goyal et al. (2011) states the steps required to improve the scalability and
convergence in OSPF. They further discuss that, recovering from a network failure in original
OSPF, would take tens of seconds, but in real time, applications like Voice Over Internet
Protocol, used now, the breakdown of a network for such a length of time is not possible. The
paper has carried out an extensive survey and found out that, in case of topology change, fast
convergence is the talk of the day and the below mentioned steps need to be carried out to fulfill
the same. The first step is detection of failure at a faster rate. The next step is establishing
adjacencies, lesser in number, but faster in speed. The third step is optimization in generating
link state advertisements and the last step is optimization in calculating routing tables. The
paper also stated that, the changes that are to be incorporated in the operation of OSPF, should
not result in compromising the correctness of the protocol in any improbable scenario also.
M. Shand et al. (2013) in this paper, describe a technique which can be used in
combination with link state protocols for prevention of transient loops. The technique consists of,
formation of correct sequence, of the updates of forwarding information base (FIB) on routers.
They further state in the paper that whenever a router shutdown occurs, any router R1 should
not update its forwarding information base till all the other routers which are sending traffic
through R1 and the router that has been shut down, have updation of their FIB’s. Also, they
describe, that when a router is put to service, any router R2 has to update its FIB, before all
those routers which will use R2 to reach the affected router. They further analyzed and listed the
steps required to apply updation of the FIB. The first step is deduction of change in topology
followed by the decision as to whether updates of ordered FIB apply. The next step is to
compute the order that is computation of rank by a router which helps in the determination of the
time at which FIB update can be performed. The last step is to accelerate the ordered
convergence. This is comprised of usage of completion messages to increase the speed of
convergence. This is done by means of a router which informs all the routers about completion
of changes of FIB. So the routers can go for updation of their FIB with less of delay. A wait list of
3. ISSN: 2089-3191
Bulletin of EEI Vol. 6, No. 1, March 2017 : 78 – 88
90
neighbors from whom completion messages are to be received is chalked out. The router
removes the neighbor from the waitlist as soon as its completion message is received. As soon
as a router has an empty waiting list, it can update its FIB. It is also mentioned in this paper that
the technique for prevention of transient loops can be used when single and also multiple
topology changes occur.
Y. Fadil (2010) states that evaluation of each path is done on the basis of cost (shortest
path) to find the routes in most of routing algorithms. In case of overloading or congestion taking
place in the shortest path, optimization based on other parameters needs to be carried out to
get better solutions. Genetic Algorithm (GA) is an optimization algorithm and Fadil puts forward
a genetic algorithm. The basic solution lies here in providing alternative paths instead of
overloaded paths so that there is better utilization of network resources and thereby improved
QOS. The chromosomes of varying length and their genes are used for encoding purposes.
Crossover and mutation provide a searching facility giving an improvement in solution quality
and increased speed of convergence.
H. Ahmed (2010) describes a genetic algorithm for finding k shortest paths from a single
source to multiple destination nodes. He presents the algorithm in terms of the connection
matrix of the network analyzed and makes use of link bandwidth for determination of k shortest
paths. He applies the algorithm to two networks comprising of 8 nodes and 20 nodes
respectively, and calculates the k shortest paths for each destination node in both cases. He
further states that in order to find k shortest paths with bandwidth constraint, all the paths from
source to destination have to satisfy the condition that the bandwidth of the requisite path has to
be greater than or equal to user defined bandwidth. By plotting a graph between k shortest
paths and mutation probability, Ahmed proves that number of K shortest paths decrease with a
decrease in mutation probability.
3. Network Analysis Using GA (RESEARCH METHOD)
The below mentioned steps are carried out in optimization of network using GA.
Step 1: The network represented by nodes is formulated by means of a graph and assignment
of cost, to a link that connects two nodes, is done randomly. The source and the destination
nodes are chosen to generate all the paths between desired nodes. Whenever cost = ∞, it
indicates there is no link connecting the two nodes. Figure 1 represents the network analyzed
and Table 1 gives the detailed network link cost.
Figure 1. The network to be analyzed
Table 1. Network Link Cost
1 2 3 4 5 6
1 ∞ 2 5 7 ∞ ∞
2 2 ∞ ∞ 3 ∞ ∞
3 5 ∞ ∞ 3 4 ∞
4 7 3 3 ∞ ∞ 2
5 ∞ ∞ 4 ∞ ∞ 2
6 ∞ ∞ ∞ 2 2 ∞
4. Bulletin of EEI ISSN: 2302-9285
Routing in Networks using Genetic Algorithm (Meenakshi Moza)
91
Figure 2. Most Optimized Route
Step 2: Coding of individuals is composed of m strings. Each ei represents the distance
between nodes where i = 1, 2, 3…m. Let e12 = 2, e24 = 3, e34 = 3, e13 = 5, e14 = 7, e46 = 2, e56 =
2, e35 = 4.
Step 3: Minimum distance from source to destination with continuity comprises the fitness
function.
Step 4: Selection of initial population is the next step. This is randomly generated based on the
distance between nodes. As mentioned earlier coding of individuals is composed of m strings
where m = 3, 4, 5…. Here the value of m is assumed to be 3. Distance is coded in 4 bit strings
and the total string length = 4*3 = 12 bits. Take an example of 4 candidates or individuals as
initial population.
a) e24(3) e13(5) e34(3)
b) e12(2) e35(4) e14(7)
c) e13(5) e46(2) e35(4)
d) e56(2) e34(3) e12(2)
Sum of edges for a) = 11
Sum of edges for b) = 13
Sum of edges for c) = 11
Sum of edges for d) = 7
Step 5: Apply two point crossover after third and eighth bit, on the initial population.
Before crossover, randomly generated individuals /candidates are as follows:
8421 8421 8421 Sum of edges:
a) 0011 0101 0011 11
b) 0010 0100 0111 13
c) 0101 0010 0100 11
d) 0010 0011 0010 7
After, applying two point crossover, the individuals obtained are as follows:
8421 8421 8421 Sum of edges
a) 0010 0100 0011 9
b) 0011 0101 0111 15
c) 0100 0011 0100 11
d) 00110010 0010 7
Step 6: Mutation is implemented by replacing first four bits with source and the last four bits with
destination node values. For the network under consideration, node 1 is the source node and
node 6 is the destination node. Lowest weight associated with both is 2. Therefore, replacing
both by 0010. Hence the new set of individuals obtained are as follows
5. ISSN: 2089-3191
Bulletin of EEI Vol. 6, No. 1, March 2017 : 78 – 88
92
8421 8421 8421 Sum of edges
a) 0010 0100 0010 8
b) 0010 0101 0010 9
c) 0010 0011 0010 7
d) 0010 0010 0010 6
Step 7: As already specified earlier, the fitness function = min _ ei with continuity. After mutation
the minimum path length from source to destination, that is, from node 1 to node 6 is case d
above which is written as follows:
0010 0010 0010
This can be decoded as the path node 12 to node 46 to node 56. But this is not a
continuous path. After many iterations we get the minimum path length with continuity as
follows:
0010 0011 0010
which, can be decoded as the path node 12 to node 24 to node 46. This is the most optimal path
as shown in figure 2.
4. Performance Evaluation
We have applied genetic algorithm to overcome the problems of OSPF. The genetic
algorithm is integrated with OSPF resulting in OSGA. The process flow of OSGA is shown in
Figure 3. The performance analysis of OSPF and OSGA is carried out using NS3, a software
tool. NS3 is an event driven simulator used for simulating wired and wireless networks. It is
used to analyze the behavior of networks. The topology used to study the performance of OSPF
and OSGA is shown in Figure 4. We have taken 25 nodes, spread uniformly in the rectangular
area.
6. Bulletin of EEI ISSN: 2302-9285
Routing in Networks using Genetic Algorithm (Meenakshi Moza)
93
Figure 3. Flow chart of OSGA
Figure 4. Topology of 25 nodes considered for optimization of route
7. ISSN: 2089-3191
Bulletin of EEI Vol. 6, No. 1, March 2017 : 78 – 88
94
The focus of the simulation is to study the effect of varying the packet sizes, on
throughput, packet delivery ratio, packet loss and delay summarized as QOS parameters, for
the routing protocols, namely OSPF and OSGA as shown in Tables 2 and 3 for the topology of 6
nodes, Tables 4 and 5 for the topology of 17 nodes and Tables 6 and 7 for the topology of 25
nodes. From the experimental results, it is observed that, as the packet size increases, the
number of packets sent and received decreases in the two configurations.
Table 2. QOS Parameter values for OSPF (6 nodes)
PKT.
SIZE
THROUGHPUT
(Kbps)
PKTS.
SENT
PKTS.
RECD.
PDR %
PKT.
LOSS
TOTAL
DELAY (ms)
JITTER
(ms)
200 22915.6 14687 14666 99.8570164 21 7.19521 2.3984
400 22915.6 7343 7333 99.8638159 10 7.20049 2.40016
600 22912.5 4895 4888 99.8569969 7 7.2048 2.4016
800 22912.5 3671 3666 99.8637973 5 7.21008 2.40336
1000 22914.1 2937 2933 99.8638066 4 7.21487 2.40496
Table 3. QOS Parameter values for OSGA (6 nodes)
PKT.
SIZE
THROUGHPUT
(Kbps)
PKTS.
SENT
PKTS.
RECD.
PDR %
PKT
LOSS
TOTAL
DELAY (ms)
JITTER
(ms)
200 24389.1 15624 15609 99.9039939 15 4.8009 1.6003
400 24389.7 7812 7804 99.8975934 8 4.80539 1.6018
600 24389.1 5208 5203 99.9039939 5 4.81049 1.6035
800 24387.5 3906 3902 99.8975934 4 4.81498 1.60499
1000 24382.8 3124 3121 99.9039693 3 4.82008 1.60669
Table 4. QOS Parameter values for OSPF (17 nodes)
PKT.
SIZE
THROUGHPUT
(Kbps)
PKTS.
SENT
PKTS.
RECD.
PDR %
PACKET
LOSS
TOTAL
DELAY (ms)
JITTER
(ms)
200 28883 16234 16215 99.8829617 19 5.93856 1.97952
400 27107.8 8117 8107 99.8768018 10 5.94298 1.98099
600 26518.3 5411 5405 99.8891148 6 5.94851 1.98284
800 26217.8 4058 4053 99.8767866 5 5.95257 1.98419
1000 26045.3 3246 3243 99.9075786 3 5.9592 1.9864
Table 5. QOS Parameter values for OSGA (17 nodes)
PKT.
SIZE
THROUGHPUT
(Kbps)
PKTS.
SENT
PKTS.
RECD.
PDR %
PACKET
LOSS
TOTAL
DELAY (ms)
JITTER
(ms)
200 29474.3 17468 16547 94.72750 1921 31.922 10.6407
400 29170.9 8734 8724 99.885504 10 5.40412 1.80137
600 28534.8 5822 5816 99.8969426 6 5.40954 1.80318
800 28216.7 4367 4362 99.8855049 5 5.41371 1.80457
1000 28021 3493 3489 99.8854853 4 5.4185 1.80617
Table 6. QOS Parameter values for OSPF (25 nodes)
PKT.
SIZE
THROUGHPUT
(Kbps)
PKTS.
SENT
PKTS.
RECD.
PDR %
PACKET
LOSS
TOTAL
DELAY (ms)
JITTER
(ms)
200 29463.7 17906 16541 92.3768569 1365 33.2943 11.0981
400 29893.1 8953 8940 99.8547973 13 7.19984 2.39995
600 29241.2 5968 5960 99.8659517 8 7.20544 2.40181
800 28915.3 4476 4470 99.8659517 6 7.21024 2.40341
1000 28719.8 3581 3576 99.8603742 5 7.21463 2.40488
Table 7. QOS Parameter values for OSGA (25 nodes)
PKT
SIZE
THROUGHPUT
(Kbps)
PKT
SENT
PKTS.
RECD.
PDR %
PACKET
LOSS
TOTAL
DELAY (ms)
JITTER
(ms)
200 29474.3 19343 16547 85.545158 2796 29.7951 9.93169
400 32304 9671 9661 99.896598 10 5.40472 1.80157
600 31596.2 6447 6440 99.891422 7 5.40924 1.80308
800 31244.1 4835 4830 99.896587 5 5.41431 1.80477
1000 31032.8 3868 3864 99.896587 4 5.41911 1.80637
8. Bulletin of EEI ISSN: 2302-9285
Routing in Networks using Genetic Algorithm (Meenakshi Moza)
95
Further, throughput is higher in OSGA as compared to OSPF as shown in figures 5, 6, 7
for 6, 17, and 25 nodes respectively. Packet loss in OSGA is less than OSPF as shown in
figures 8, 9, 10 for 6, 17 and 25 nodes respectively. As the packet loss is less in OSGA
technique, it is therefore OSGA which can be used in future.
Figure 5. Packet size vs Throughput (6 nodes)
Figure 6. Packet size vs Throughput (17
nodes)
Figure 7. Packet size vs Throughput (25
nodes)
Figure 8. Packet size vs Packet loss (6 nodes)
Figure 9. Packet size vs Packet loss (17
nodes)
Figure 10. Packet size vs Packet loss (25
nodes)
Delay and jitter values are smaller in OSGA as compared to OSPF. The reason for this
is, a high reconvergence time in case of OSPF. The delay and jitter values for both the protocols
are shown in figures 11, 12, 13, and figures 14, 15, 16 for 6, 17, 25 nodes respectively. All the
above results confirm the fact that OSGA gives a better optimal path for sending packets of data
into a network.
9. ISSN: 2089-3191
Bulletin of EEI Vol. 6, No. 1, March 2017 : 78 – 88
96
Figure 11. Packet size vs Delay (6 nodes) Figure 12. Packet size vs Delay (17 nodes)
Figure 13. Packet size vs Delay (25 nodes) Figure 14. Packet size vs Jitter (6 nodes)
Figure 15. Packet size vs Jitter (17 nodes) Figure 16. Packet size vs Jitter (25 nodes)
The packet delivery ratio is higher in OSGA as compared to OSPF for all packet sizes in
6 node topology as shown in Figure 17. As we go for 17 and 25 node topology, the packet
delivery ratio, for packet size of 200 bytes is smaller, in OSGA as compared to OSPF. The
reason for this is very high packet loss in this particular case. For all other packet sizes, in 17
and 25 node topology, the packet delivery ratio is same for the two protocols OSPF and OSGA
as shown in figures 18 and 19.
Figure 17. Packet size vs Packet delivery ratio
(6 nodes)
Figure 18. Packet size vs Packet delivery ratio
(17 nodes)
10. Bulletin of EEI ISSN: 2302-9285
Routing in Networks using Genetic Algorithm (Meenakshi Moza)
97
Figure 19. Packet size vs Packet delivery ratio (25 nodes)
After studying all the parameters it can be said that OSGA seems to be a better
technique, for finding the most optimal path for sending packets of data into a network.
5. Conclusion and Future Scope
This paper proposes the usage of GA in combination with OSPF (OSGA) for finding a
optimal path between source and destination. Length of chromosomes (paths) is dependent on
a number of existing nodes in the network [17-19]. The simulation is carried out in NS3
environment. This method can be used in the future for high speed networks. The results tell us
that by setting the GA parameters properly (Size of population, Number of generations), the
algorithm gives a better result than OSPF.
References
[1] Lee YO. Improving Efficiency and Effectiveness of Multipath Routing in Computer Networks (Doctoral
dissertation, Texas A&M University). 2012.
[2] Chandel GS, Gupta R, Kushwaha A. Implementation of Shortest Path in Packet Switching Network
Using Genetic Algo. International Journal of Advanced Research in Computer Science and Software
Engineering.
[3] Leung R, Liu J, Poon E, Chan AL, Li B. MP-DSR: A QoS-aware multi-path Dynamic Source Routing
Protocol for the Wireless Ad-hoc Networks. In Local Computer Networks, 2001. Proceedings. LCN.
26th Annual IEEE Conference. 2001: 132-141.
[4] Sharma S, Bhardwaj SK. Experimental Analysis of OLSR and DSDV Protocols on NS-2.35 in Mobile
Ad-Hoc Networks. International Journal of Computer Network and Information Security. Jul 1 2015;
7(8): 21.
[5] Al-Ghazal M, El-Sayed A, Kelash H. Routing Optimization using Genetic Algorithm in Ad hoc
Networks. In 2007 IEEE International Symposium on Signal Processing and Information Technology
Dec 15 2007: 497-503.
[6] Ren W, Kang C, Li Y, Gong L. Chaotic Immune Genetic Hybrid Algorithms and Its Application.
Indonesian Journal of Electrical Engineering and Computer Science. Feb 1 2013; 11(2): 975-84.
[7] Goyal M, Soperi M, Baccelli E, Choudhury G, Shaikh A, Hosseini H, Trivedi K. Improving
Convergence Speed and Scalability in OSPF: A survey. IEEE Communications Surveys & Tutorials.
Apr 2 2012; 14(2): 443-63.
[8] Goyal M, Xie W, Hosseini SH, Vairavan K, Rohm D. Improving OSPF dynamics on a broadcast LAN.
Simulation. Feb 1 2006; 82(2): 107-29.
[9] Shand M, Bryant S, Previdi S, Filsfils C, Francois P, Bonaventure O. Framework for Loop-free
Convergence using the Ordered Forwarding Information Base (ofib) approach. 2013.
[10] Obeidat A, Ebed M. Improving the Performance of Networks using Genetic Algorithm. Proc. of the
International Conf. on Advances in Computer and Information Technology, ACIT, 2012.
[11] Sooda K, Nair TR. A Comparative Analysis for Determining the Optimal Path using PSO and GA.
arXiv preprint arXiv 1407.5327. Jul 20 2014.
[12] Kavitha R, Anusuya V. Genetic algorithm for Finding Shortest Test Path in Networks. International
Journal of Fuzzy Mathematical Archive. 2013; (2): 43–48.
[13] Fadil YA. Routing using Genetic Algorithm for large Networks. Diyala Journal of Engineering
Sciences. Dec 2010; 3(02). 53-70.
[14] Krishna G, Pandey NK, Bajpai S. Optimal Path Routing in Variable Data Network using Genetic
Algorithm. International Journal of Engineering Science and Humanities. 2012.
[15] Kumar R, Kumar M. Exploring Genetic algorithm for Shortest Path Optimization in Data Networks.
Global Journal of Computer Science and Technology. Oct 25 2010; 10(11).
11. ISSN: 2089-3191
Bulletin of EEI Vol. 6, No. 1, March 2017 : 78 – 88
98
[16] Hassan M, Younes A, Hassan MR, Abdo H. Solving the File Allocation Problem in the Distributed
Networks by UsingGenetic Algorithms. International Journal of Information and Network Security. Jan
1 2013; 2(1):109.
[17] Baboo SS, Narasimhan B. Genetic Algorithm Based Congestion Aware Routing Protocol (GA-CARP)
for Mobile Ad Hoc Networks. Procedia Technology. Dec 31 2012; 4: 177-81.
[18] Hamed AY. A Genetic Algorithm for finding the K Shortest Paths in a Network. Egyptian Informatics
Journal. Dec 31 2010; 11(2): 75-9.
[19] Moza M, Kumar S. Improving the Performance of Routing Protocol using Genetic Algorithm.
International Journal of Computer Network & Information Security. Jul 1 2016; 8(7).
BIOGRAPHIES OF AUTHORS
Meenakshi Moza born in Srinagar on 25th Jan 1965, did her B.E from R.E.C. Srinagar
(Kashmir) in Electronics and Communication. She completed her Mtech from Y.M.C.A
Faridabad. She is pursuing her Phd in the field of computer networks. She has 14 years
of experience in teaching and 8 years of experience in industry namely Onida, Avery
India. Total number of research publications are 14.
Dr. Suresh Kumar is a professor in M.R.I.U. His qualifications are as mentioned. Ph.D.
(Computer Science & Engg.), UGC NET(Computer Science & Engg), M.Tech.(
Computer Science & Engg.), B.Tech. (Computer Science & Engg.) He has 14 years of
teaching experience and his areas of interest include Networking, Operating systems,
Database management system. Total number of research publications are 31.