SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1638
The Hybrid AODV routing protocol for path establishment in MANET
Sonia1, Joy karan Singh2
1M.tech Student, Dept. of CSE,CT Institute of Technology & Research , Jalandhar,India
2Assistant Professor , Dept. of ECE,CT Institute of Technology & Research , Jalandhar,India
-----------------------------------------------------***----------------------------------------------------------
Abstract-The mobile adhoc networks is the type of
network which is self configuring and de-centralized in
nature. The mobile nodes can join or leave the network
when they want due to which routing issues may raised in
the network. The routing protocols are used to establish
efficient and secure path from source to destination. It is
been analyzed that AODV protocol is efficient protocol
among all other protocols for the path establishment. In this
work, the performance of AODV protocol is improved using
bio-inspired techniques for the path establishment in the
network. The performance of proposed algorithm is test in
network simulator version 2 and it gave good performance
as compared to other protocols in terms of various
parameters.
Key words: MANET, Reactive, AODV, DSR, DSDV, Bio-
Inspired Techniques
1. INTRODUCTION
The network in which the nodes communicate with each
other using the radio waves is known as Mobile Ad hoc
network (MANET). The range of radio waves is a very
important factor as the nodes which come under this range
are able to communicate amongst each other. Intermediate
nodes are required for the purpose of routing packets in
the case of nodes which are out of range. For the purpose
of communication, a wireless interface is required with
respect to each node [1]. There is no fixed infrastructure as
access points or base stations needed in these types of
networks. MANETs are distributed and do not require any
fixed infrastructure. For the purpose of transmission of
relay messages, independent communication is held in
case of nodes within the transmission range and the nodes
outside this range are dependent on other nodes. This
results in creating a multi-hop scenario which helps in
transmitting the packets from source to destination with
the help of certain intermediate hosts. Amongst the
various challenges observed in MANETs, the symmetric
and asymmetric links are a major concern. There are
various mobility patterns followed by nodes. There are
nodes which are highly mobile whereas other nodes which
are stationary. The prediction of the movement of these
nodes is difficult. The attacks and unreliability are the
arising issues which are caused due to the dynamic nature
of MANETs [2]. The most important part of MANETs is
routing which makes a node not only complete the tasks
related to it but also help in accomplishing tasks which are
related to other nodes. As the MANETs are prone to
attacks there is a major requirement for establishing a
secure as well as trustworthy end-to-end path for them.
The routing protocols used in the network are classified
into tree broader categories. The Proactive also known as
the table-driven routing protocols are one of the
categories. Here, the maintenance of routing tables which
are used to store routing information is needed [3].
Updates are to be propagated according to the changes
made in the network topology. This helps in maintaining a
consistent network view. Another category is the reactive
routing which is also known as the on-demand routing
protocol which does not need to maintain the routing
information or activity when there is no communication in
the network. In an on-demand manner, the routes are
searched within the network when there is need to
provide communication from one node to another. A
connection is established which helps in transmitting as
well as receiving the packets amongst each other. The
route request packets are flooded in the network in order
to discover a route. The combination of reactive and
proactive routing protocols, are known as the hybrid
protocols. The routing protocol which divides the network
into various zones is known as the Zone Routing Protocol
(ZRP). This protocol provides a hierarchical architecture
through which every node needs to maintain additional
topological information which also needs extra memory
[4].
AODV routing protocol:
The Ad Hoc On-Demand Routing Protocol (AODV) is a
reactive routing protocol which is used in the ad hoc
mobile networks. Using this type of protocol, the routes
are created within a network only when there is a need to
provide communication. Traditional routing tables are
used for providing one entry per destination and sequence
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1639
numbers which help in determining whether the routing
information is up to-date and also for avoiding the routing
loops within the network [5]. The maintenance of time-
based states for each node is an important property of this
protocol which involves declaring the routing entry which
was not frequently used as expired. Notifications are sent
to the neighboring nodes which are present when the
route is broken. Query and reply cycles are the basis for
providing route discovery. The intermediate nodes present
along the route help in storing the routing information.
THIs is stored in the form of route table entries. There are
various control packets which are utilized. When a node
needs to establish a route to another node, the routing
request message (RREQ) is sent. As a reply the routing
reply message (RREP) is unicasted back to the source from
where RREQ comes. When there is loss of link, the route
error message (RERR) is sent which notifies all the other
nodes regarding it. For the purpose of detecting and
monitoring the links to the neighbors, the HELLO message
is used [6].
2. LITERATURE REVIEW
Seon Yeong Han, et.al (2013) proposed in this paper [7],
that the purpose of route establishment and maintenance
there is a need of local link connectivity information in the
MANETs. For providing this local link connectivity
information, the periodic Hello messaging is used in a
popular manner. When the mobile devices are not being
used, the sending of nor required Hello messages can
result in draining the batteries of nodes within the
network. To avoid this, an adaptive Hello messaging
method is proposed in this paper. There is no reduction in
the detection of broken links within the network when this
scheme is used. According to the simulation results, there
is a reduction in energy consumption as well as network
overhead within the network with the use of this newly
proposed scheme. There is no explicit difference in the
throughput of the network.
Cong Liu, et.al (2009) proposed in this paper [8], an
important issue in MANETs is the routing. The geometric
routing is made to be just as a theoretically feasible
method by providing planar graph to the underlying
network in the case of face routing. To avoid this, the local
minimum problem is handled in this paper by proposing
two methods. For the purpose of reducing the number of
local minima, first, a virtual small-world network is
created which involves long virtual links. Secondly,
without depending on the face routing, the virtual face
method is used to recover local minima. By combining
these, a purely greedy routing protocol is proposed which
is also known as the small-world iterative navigation
greedy (SWING+) routing protocol. According to the
simulation results this proposed scheme improves the
performance of network as compared to other protocols.
Ming Yu, et.al (2009) proposed in this paper [9], a novel
algorithm which uses both message as well as route
redundancy to detect the internal attacks caused during
the route discovery. Also, an optimal routing algorithm is
proposed here along with the routing metric, which
combines the trustworthiness as well as performance
properties of the node. On the basis of its observations of
the behaviors of neighboring nodes, the trustworthiness of
a node is built. The proposed algorithms are integrated
into any of the already existing routing protocols such as
AODV or DSR. According to the simulation results,
advantages are seen in the proposed attack detection and
routing algorithm over already known protocols.
Haiying Shen, et.al (2013) proposed in this paper [10],
that in order to have high anonymity protection at less cost
an Anonymous Location-based Efficient Routing (ALERT)
protocol is used. Here, the network filed is partitioned into
zones with the help of ALERT. The nodes are selected
randomly as the intermediate relay nodes by the network.
This helps in forming a non-traceable anonymous route
within the network. For the purpose of strengthening the
anonymity protection of source and destination the
information regarding the sender or receiver are hidden.
For providing intersection as well as timing attacks,
various strategies are proposed within this scheme. It is
seen through the experimental results that the ALERT
provides better route anonymity, protection and also has
less cost than other protocols.
Thomas Watteyne, et.al (2011) proposed in this paper
[11], that there are various routing protocols which are to
be surveyed here. A chronological taxonomy is to be
followed within the provided protocol taxonomy for
surveying the protocols here which is different from other
surveys. For every different protocol category, a didactic
presentation which describes there concept is provided
along with the discussions which include the
enhancements and variants according to their concept.
Also the latest state-of-the-art protocols are provided
along with their descriptions. Various solutions are
provided as per the problems identified in the networks
with respect to their designing parameters which are also
helpful in designing IETF ROLL protocols which are
evolving recently.
Hui Xu, et.al (2010) proposed in this paper [12], that for
the purpose of evaluating the performance of proactive
and reactive routing protocols in MANETs, a new
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1640
mathematical framework is provided. A parametric view of
protocol performance is provided here which provides a
closer view of the protocol operations. The effects of
protocol logic as well as the network parameters are also
provided here. For the routing protocols of both of the
categories, the important behavior and scalability limits
are gathered as per the network size. Under different
network configurations and mobility conditions, the
guidance on the performance for both of the categories is
also defined here.
3. OPTIMIZATION TECHNIQUES
Optimization techniques are those which give the best fit
solution. It is used to solve complex computational
solutions [5]. It finds out the best result from the given
feasible solutions. There are several techniques which are
based upon the natural phenomena. These techniques are
as following:
1. Bee Colony Optimization
2. Ant Colony Optimization
3.Cuckoo Search Algorithm
3.1 Bee Colony Optimization: Bee Colony Optimization
is nature inspired technique. It is based upon the swarm
intelligence technique. It is meta-heuristic technique which
is concern with memory based searching. Bee colony
optimization technique is used to find the best path from
the number of the solutions. It is bottom-up approach used
to solve complex combinatorial problems. It is
decentralized and self organizing technique. There are two
types of bee which are present in the bee hive. These are in
hundred and thousand in numbers which work together. It
is a global optimizer which ahs effective searching process
[12].
3.2 Ant Colony Optimization: Ant Colony Optimization
is a probalistic and meta-heuristic technique. It is also
natural insipid technique which is meta-heuristic in nature
and used to solve complex combinatorial problems. It uses
the previous results to find out the present best paths. It is
dynamic in nature. It gives the idea for team coordination,
their behaviour and functionality. It is also based upon
swarm intelligence. Ant starts from nest to reach to
destination and follow different paths. Each ant secretes
pheromone trails to attract other ants following that path.
The path which has the highest pheromone trails are the
best paths compared to others. So the path is depending
upon the trails. It is also upgradeable technique according
to the secrete pheromone trails.
When they ant’s returns back to the home they follow the
same as the path of starting not the shortest path [12].
3.3 Cuckoo Search Algorithm: Cuckoo search is one of
the optimization algorithms which is used in various fields
of image processing, networking, artificial intelligence
This search carries concept from various cuckoo spices.
Earlier this algorithm is used for complex computational
problems. Later on this research is applied with PSO and
Genetic algorithm and finds out that it achieves better
results than PSO and Genetic algorithms. Basically cuckoo
search is deal with multimodal problems naturally and
efficiently. CS algorithm revolves around the behaviour of
obligatory brood parasitism of some species of cuckoo as
well as the Levy Flights of some birds and fruit flies which
follow the random walk of heavy tailed probability
distribution step size.
4. PROPOSED METHODOLOGY
In this work, comparative analysis will be done between
the proactive and reactive type of routing protocols. In this
work, improvement will be proposed in AODV routing
protocol using bio-inspired techniques. The bio-inspired
techniques are Ant colony and bee colony. In this work, ant
colony and bee colony are combined together and used
with AODV routing protocol to establish path to
destination. In the proposed technique lest suppose path
will be established from source to destination using AODV
protocol. The hybrid ant and bee colony algorithm are
applied for path establishment and after that the cuckoo
search algorithm is applied for path establishment. The
source node selects nodes which are common in the paths
and select nodes which are node common on the basis of
distance from the source node. The node which has
minimum distance will be selected as the hop node from
source to destination.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1641
Fig 1: Research Methodology
5. RESULTS AND DISCUSSION
The proposed technique is implemented in network
simulator by considering parameters which are described
in table 1
Parameters Values
No of nodes 24
Antenna type Omi-directional
Routing protocol AODV
Link layer LL
Propagation Model Two-ray model
Queue Priority queue
Table 1: Parameter values
Fig 2: Delay comparison
As shown in the figure 2, the delay of the proposed, basic
AODV and Improved AODV is done.It is been analyzed that
delay of the proposed technique is least as compared to
other techniques.
START
Deploy the mobile adhoc network with the finite
number of mobile nodes
Define source and destination node in the
network for the communication
Establish path from source to destination using
AODV protocol
Efficient
path
established
Apply ant & bee colony
technique for the path
establishment from source to
destination
Apply cuckoo search technique
for the path establishment from
source to destination
Select the most common nodes
from the AODV, Bee colony and
cuckoo search for the path
establishment
Transmit data from the selected path
between source and destination
STOP
NO
YES
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1642
Fig 3: Packet loss Comparison
As shown in figure 3, the packet loss comparison of the
proposed, existing and improved AODV is done and it is
been analyzed that packet loss is least in the proposed
technique as compared to other techniques .
Fig 4: Throughput Comparison
As illustrated in figure 4, the comparison is done of the
proposed, existing and basic AODV protocol in terms of
throughput. Due to efficient path establishment in
proposed AODV its throughput is maximum as compared
to other techniques
CONCLUSION
In this work, it been concluded that AODV protocol is the
reactive type of protocol which gave maximum
performance in terms of various parameters. In this work,
the bio-inspired technique is been applied to increase
performance of AODV routing protocol. The simulation
results show that the network delay is decrease &
throughput is increase to 10 percent and packet loss is
reduced to 15 percent in the network.
ACKNOWLEDGMENTS
I express my sincere and deep gratitude to my guide
Mr. Joy Karan Singh, Assistant Professor, Computer
Science & Engineering Department, CT Group of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1643
Institutions, for the invaluable guidance, support and
encouragement. He provided me all resource and
guidance throughout work. I am heartfelt thankful to
Mr. Anurag Sharma, Head of Electrical & Computer
Engineering Department, CT Group of Institutions, for
providing us adequate environment, facility for
carrying out work.
REFERENCES
[1] K. Sanzgiri, D. LaFlamme, B. Dahill, B. N. Levine, C.
Shields, and E. M. Belding-Royer, “Authenticated routing
for ad hoc networks,” 2005, IEEE J. Sel. Areas Commun.,
vol. 23, no. 3, pp. 598–610
[2] W. Liu, W. Lou, and Y. Fang, “An efficient quality of
service routing algorithm for delay-sensitive applications,”
2005, Comput Net, vol. 47, no. 1, pp. 87–104
[3] K. K. Leung and L.-C Wang, “Integrated link adaptation
and power control to improve error and throughput
performance in broadband wireless packet networks,”
2002, IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 619–
629
[4] P. Papadimitratos and Z. Haas, “Secure routing for
mobile ad hoc networks,” 2002, SCS Commun Netw Distrib
Syst Model.Simul Conf, Jan. pp. 27–31
[5] A. Perrig, R. Canetti, D. Song, and J. D. Tygar, “Efficient
and secure source authentication for multicast,” 2001,
NDSS, San Diego, CA, pp. 90–100
[6] Y.-C. Hu, A. Perrig, and D. B. Johnson, “Rushing attacks
and defense in wireless ad hoc network routing protocols,”
2003, ACM WiSe, Sep. pp. 30–40
[7] Seon Yeong Han, and Dongman Lee,” An Adaptive Hello
Messaging Scheme for Neighbor Discovery in On-Demand
MANET Routing Protocols”, 2013, IEEE
COMMUNICATIONS LETTERS, Vol. 17, No. 5
[8] Cong Liu and Jie Wu,” Virtual-Force-Based Geometric
Routing Protocol in MANETs”, 2009, IEEE TRANSACTIONS
ON PARALLEL AND DISTRIBUTED SYSTEMS, Vol. 20, No. 4
[9] Ming Yu, Mengchu Zhou, and Wei Su,” A Secure Routing
Protocol Against Byzantine Attacks for MANETs in
Adversarial Environments”, 2009, IEEE TRANSACTIONS
ON VEHICULAR TECHNOLOGY, Vol. 58, No. 1
[10] Haiying Shen, and Lianyu Zhao,” ALERT: An
Anonymous Location-Based Efficient Routing Protocol in
MANETs”, 2013, IEEE TRANSACTIONS ON MOBILE
COMPUTING, Vol. 12, No. 6
[11] Thomas Watteyne, Antonella Molinaro, Maria Grazia
Richichi, Mischa Dohler,” From MANET To IETF ROLL
Standardization: A Paradigm Shift in WSN Routing
Protocols”, 2011, IEEE COMMUNICATIONS SURVEYS &
TUTORIALS, Vol. 13, No. 4
[12] Hui Xu, Xianren Wu, Hamid R. Sadjadpour, and J. J.
Garcia-Luna-Aceves,” A Unified Analysis of Routing
Protocols in MANETs”, 2010, IEEE TRANSACTIONS ON
COMMUNICATIONS, Vol. 58, No. 3.

More Related Content

What's hot

ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
 
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Eswar Publications
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeIJMER
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantificationcsandit
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKpijans
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
An Ordinary & Innovative Packet Routing Schemes in VANET
An Ordinary & Innovative Packet Routing Schemes in VANETAn Ordinary & Innovative Packet Routing Schemes in VANET
An Ordinary & Innovative Packet Routing Schemes in VANETIRJET Journal
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Editor IJCATR
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...IOSR Journals
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
 

What's hot (20)

ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
 
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
50120130405022
5012013040502250120130405022
50120130405022
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
 
Routing basic
Routing basicRouting basic
Routing basic
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
An Ordinary & Innovative Packet Routing Schemes in VANET
An Ordinary & Innovative Packet Routing Schemes in VANETAn Ordinary & Innovative Packet Routing Schemes in VANET
An Ordinary & Innovative Packet Routing Schemes in VANET
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
 
J018216275
J018216275J018216275
J018216275
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...
 
O26087092
O26087092O26087092
O26087092
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 

Similar to The Hybrid AODV routing protocol for path establishment in MANET

A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
 
Review and Analysis of Reactive Routing Protocols: AODV, DSR, TORA and DYMO i...
Review and Analysis of Reactive Routing Protocols: AODV, DSR, TORA and DYMO i...Review and Analysis of Reactive Routing Protocols: AODV, DSR, TORA and DYMO i...
Review and Analysis of Reactive Routing Protocols: AODV, DSR, TORA and DYMO i...IRJET Journal
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET Journal
 
Manet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metricsManet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metricsIJARIIT
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKpijans
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingeSAT Publishing House
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...eSAT Journals
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...IRJET Journal
 
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfLaurie Smith
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANETIRJET Journal
 
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewAttacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewIRJET Journal
 

Similar to The Hybrid AODV routing protocol for path establishment in MANET (20)

A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
 
Review and Analysis of Reactive Routing Protocols: AODV, DSR, TORA and DYMO i...
Review and Analysis of Reactive Routing Protocols: AODV, DSR, TORA and DYMO i...Review and Analysis of Reactive Routing Protocols: AODV, DSR, TORA and DYMO i...
Review and Analysis of Reactive Routing Protocols: AODV, DSR, TORA and DYMO i...
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
 
Ds35676681
Ds35676681Ds35676681
Ds35676681
 
Manet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metricsManet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metrics
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
 
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdf
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANET
 
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewAttacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A Review
 
2 sima singh-6-13
2 sima singh-6-132 sima singh-6-13
2 sima singh-6-13
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 

Recently uploaded (20)

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 

The Hybrid AODV routing protocol for path establishment in MANET

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1638 The Hybrid AODV routing protocol for path establishment in MANET Sonia1, Joy karan Singh2 1M.tech Student, Dept. of CSE,CT Institute of Technology & Research , Jalandhar,India 2Assistant Professor , Dept. of ECE,CT Institute of Technology & Research , Jalandhar,India -----------------------------------------------------***---------------------------------------------------------- Abstract-The mobile adhoc networks is the type of network which is self configuring and de-centralized in nature. The mobile nodes can join or leave the network when they want due to which routing issues may raised in the network. The routing protocols are used to establish efficient and secure path from source to destination. It is been analyzed that AODV protocol is efficient protocol among all other protocols for the path establishment. In this work, the performance of AODV protocol is improved using bio-inspired techniques for the path establishment in the network. The performance of proposed algorithm is test in network simulator version 2 and it gave good performance as compared to other protocols in terms of various parameters. Key words: MANET, Reactive, AODV, DSR, DSDV, Bio- Inspired Techniques 1. INTRODUCTION The network in which the nodes communicate with each other using the radio waves is known as Mobile Ad hoc network (MANET). The range of radio waves is a very important factor as the nodes which come under this range are able to communicate amongst each other. Intermediate nodes are required for the purpose of routing packets in the case of nodes which are out of range. For the purpose of communication, a wireless interface is required with respect to each node [1]. There is no fixed infrastructure as access points or base stations needed in these types of networks. MANETs are distributed and do not require any fixed infrastructure. For the purpose of transmission of relay messages, independent communication is held in case of nodes within the transmission range and the nodes outside this range are dependent on other nodes. This results in creating a multi-hop scenario which helps in transmitting the packets from source to destination with the help of certain intermediate hosts. Amongst the various challenges observed in MANETs, the symmetric and asymmetric links are a major concern. There are various mobility patterns followed by nodes. There are nodes which are highly mobile whereas other nodes which are stationary. The prediction of the movement of these nodes is difficult. The attacks and unreliability are the arising issues which are caused due to the dynamic nature of MANETs [2]. The most important part of MANETs is routing which makes a node not only complete the tasks related to it but also help in accomplishing tasks which are related to other nodes. As the MANETs are prone to attacks there is a major requirement for establishing a secure as well as trustworthy end-to-end path for them. The routing protocols used in the network are classified into tree broader categories. The Proactive also known as the table-driven routing protocols are one of the categories. Here, the maintenance of routing tables which are used to store routing information is needed [3]. Updates are to be propagated according to the changes made in the network topology. This helps in maintaining a consistent network view. Another category is the reactive routing which is also known as the on-demand routing protocol which does not need to maintain the routing information or activity when there is no communication in the network. In an on-demand manner, the routes are searched within the network when there is need to provide communication from one node to another. A connection is established which helps in transmitting as well as receiving the packets amongst each other. The route request packets are flooded in the network in order to discover a route. The combination of reactive and proactive routing protocols, are known as the hybrid protocols. The routing protocol which divides the network into various zones is known as the Zone Routing Protocol (ZRP). This protocol provides a hierarchical architecture through which every node needs to maintain additional topological information which also needs extra memory [4]. AODV routing protocol: The Ad Hoc On-Demand Routing Protocol (AODV) is a reactive routing protocol which is used in the ad hoc mobile networks. Using this type of protocol, the routes are created within a network only when there is a need to provide communication. Traditional routing tables are used for providing one entry per destination and sequence
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1639 numbers which help in determining whether the routing information is up to-date and also for avoiding the routing loops within the network [5]. The maintenance of time- based states for each node is an important property of this protocol which involves declaring the routing entry which was not frequently used as expired. Notifications are sent to the neighboring nodes which are present when the route is broken. Query and reply cycles are the basis for providing route discovery. The intermediate nodes present along the route help in storing the routing information. THIs is stored in the form of route table entries. There are various control packets which are utilized. When a node needs to establish a route to another node, the routing request message (RREQ) is sent. As a reply the routing reply message (RREP) is unicasted back to the source from where RREQ comes. When there is loss of link, the route error message (RERR) is sent which notifies all the other nodes regarding it. For the purpose of detecting and monitoring the links to the neighbors, the HELLO message is used [6]. 2. LITERATURE REVIEW Seon Yeong Han, et.al (2013) proposed in this paper [7], that the purpose of route establishment and maintenance there is a need of local link connectivity information in the MANETs. For providing this local link connectivity information, the periodic Hello messaging is used in a popular manner. When the mobile devices are not being used, the sending of nor required Hello messages can result in draining the batteries of nodes within the network. To avoid this, an adaptive Hello messaging method is proposed in this paper. There is no reduction in the detection of broken links within the network when this scheme is used. According to the simulation results, there is a reduction in energy consumption as well as network overhead within the network with the use of this newly proposed scheme. There is no explicit difference in the throughput of the network. Cong Liu, et.al (2009) proposed in this paper [8], an important issue in MANETs is the routing. The geometric routing is made to be just as a theoretically feasible method by providing planar graph to the underlying network in the case of face routing. To avoid this, the local minimum problem is handled in this paper by proposing two methods. For the purpose of reducing the number of local minima, first, a virtual small-world network is created which involves long virtual links. Secondly, without depending on the face routing, the virtual face method is used to recover local minima. By combining these, a purely greedy routing protocol is proposed which is also known as the small-world iterative navigation greedy (SWING+) routing protocol. According to the simulation results this proposed scheme improves the performance of network as compared to other protocols. Ming Yu, et.al (2009) proposed in this paper [9], a novel algorithm which uses both message as well as route redundancy to detect the internal attacks caused during the route discovery. Also, an optimal routing algorithm is proposed here along with the routing metric, which combines the trustworthiness as well as performance properties of the node. On the basis of its observations of the behaviors of neighboring nodes, the trustworthiness of a node is built. The proposed algorithms are integrated into any of the already existing routing protocols such as AODV or DSR. According to the simulation results, advantages are seen in the proposed attack detection and routing algorithm over already known protocols. Haiying Shen, et.al (2013) proposed in this paper [10], that in order to have high anonymity protection at less cost an Anonymous Location-based Efficient Routing (ALERT) protocol is used. Here, the network filed is partitioned into zones with the help of ALERT. The nodes are selected randomly as the intermediate relay nodes by the network. This helps in forming a non-traceable anonymous route within the network. For the purpose of strengthening the anonymity protection of source and destination the information regarding the sender or receiver are hidden. For providing intersection as well as timing attacks, various strategies are proposed within this scheme. It is seen through the experimental results that the ALERT provides better route anonymity, protection and also has less cost than other protocols. Thomas Watteyne, et.al (2011) proposed in this paper [11], that there are various routing protocols which are to be surveyed here. A chronological taxonomy is to be followed within the provided protocol taxonomy for surveying the protocols here which is different from other surveys. For every different protocol category, a didactic presentation which describes there concept is provided along with the discussions which include the enhancements and variants according to their concept. Also the latest state-of-the-art protocols are provided along with their descriptions. Various solutions are provided as per the problems identified in the networks with respect to their designing parameters which are also helpful in designing IETF ROLL protocols which are evolving recently. Hui Xu, et.al (2010) proposed in this paper [12], that for the purpose of evaluating the performance of proactive and reactive routing protocols in MANETs, a new
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1640 mathematical framework is provided. A parametric view of protocol performance is provided here which provides a closer view of the protocol operations. The effects of protocol logic as well as the network parameters are also provided here. For the routing protocols of both of the categories, the important behavior and scalability limits are gathered as per the network size. Under different network configurations and mobility conditions, the guidance on the performance for both of the categories is also defined here. 3. OPTIMIZATION TECHNIQUES Optimization techniques are those which give the best fit solution. It is used to solve complex computational solutions [5]. It finds out the best result from the given feasible solutions. There are several techniques which are based upon the natural phenomena. These techniques are as following: 1. Bee Colony Optimization 2. Ant Colony Optimization 3.Cuckoo Search Algorithm 3.1 Bee Colony Optimization: Bee Colony Optimization is nature inspired technique. It is based upon the swarm intelligence technique. It is meta-heuristic technique which is concern with memory based searching. Bee colony optimization technique is used to find the best path from the number of the solutions. It is bottom-up approach used to solve complex combinatorial problems. It is decentralized and self organizing technique. There are two types of bee which are present in the bee hive. These are in hundred and thousand in numbers which work together. It is a global optimizer which ahs effective searching process [12]. 3.2 Ant Colony Optimization: Ant Colony Optimization is a probalistic and meta-heuristic technique. It is also natural insipid technique which is meta-heuristic in nature and used to solve complex combinatorial problems. It uses the previous results to find out the present best paths. It is dynamic in nature. It gives the idea for team coordination, their behaviour and functionality. It is also based upon swarm intelligence. Ant starts from nest to reach to destination and follow different paths. Each ant secretes pheromone trails to attract other ants following that path. The path which has the highest pheromone trails are the best paths compared to others. So the path is depending upon the trails. It is also upgradeable technique according to the secrete pheromone trails. When they ant’s returns back to the home they follow the same as the path of starting not the shortest path [12]. 3.3 Cuckoo Search Algorithm: Cuckoo search is one of the optimization algorithms which is used in various fields of image processing, networking, artificial intelligence This search carries concept from various cuckoo spices. Earlier this algorithm is used for complex computational problems. Later on this research is applied with PSO and Genetic algorithm and finds out that it achieves better results than PSO and Genetic algorithms. Basically cuckoo search is deal with multimodal problems naturally and efficiently. CS algorithm revolves around the behaviour of obligatory brood parasitism of some species of cuckoo as well as the Levy Flights of some birds and fruit flies which follow the random walk of heavy tailed probability distribution step size. 4. PROPOSED METHODOLOGY In this work, comparative analysis will be done between the proactive and reactive type of routing protocols. In this work, improvement will be proposed in AODV routing protocol using bio-inspired techniques. The bio-inspired techniques are Ant colony and bee colony. In this work, ant colony and bee colony are combined together and used with AODV routing protocol to establish path to destination. In the proposed technique lest suppose path will be established from source to destination using AODV protocol. The hybrid ant and bee colony algorithm are applied for path establishment and after that the cuckoo search algorithm is applied for path establishment. The source node selects nodes which are common in the paths and select nodes which are node common on the basis of distance from the source node. The node which has minimum distance will be selected as the hop node from source to destination.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1641 Fig 1: Research Methodology 5. RESULTS AND DISCUSSION The proposed technique is implemented in network simulator by considering parameters which are described in table 1 Parameters Values No of nodes 24 Antenna type Omi-directional Routing protocol AODV Link layer LL Propagation Model Two-ray model Queue Priority queue Table 1: Parameter values Fig 2: Delay comparison As shown in the figure 2, the delay of the proposed, basic AODV and Improved AODV is done.It is been analyzed that delay of the proposed technique is least as compared to other techniques. START Deploy the mobile adhoc network with the finite number of mobile nodes Define source and destination node in the network for the communication Establish path from source to destination using AODV protocol Efficient path established Apply ant & bee colony technique for the path establishment from source to destination Apply cuckoo search technique for the path establishment from source to destination Select the most common nodes from the AODV, Bee colony and cuckoo search for the path establishment Transmit data from the selected path between source and destination STOP NO YES
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1642 Fig 3: Packet loss Comparison As shown in figure 3, the packet loss comparison of the proposed, existing and improved AODV is done and it is been analyzed that packet loss is least in the proposed technique as compared to other techniques . Fig 4: Throughput Comparison As illustrated in figure 4, the comparison is done of the proposed, existing and basic AODV protocol in terms of throughput. Due to efficient path establishment in proposed AODV its throughput is maximum as compared to other techniques CONCLUSION In this work, it been concluded that AODV protocol is the reactive type of protocol which gave maximum performance in terms of various parameters. In this work, the bio-inspired technique is been applied to increase performance of AODV routing protocol. The simulation results show that the network delay is decrease & throughput is increase to 10 percent and packet loss is reduced to 15 percent in the network. ACKNOWLEDGMENTS I express my sincere and deep gratitude to my guide Mr. Joy Karan Singh, Assistant Professor, Computer Science & Engineering Department, CT Group of
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1643 Institutions, for the invaluable guidance, support and encouragement. He provided me all resource and guidance throughout work. I am heartfelt thankful to Mr. Anurag Sharma, Head of Electrical & Computer Engineering Department, CT Group of Institutions, for providing us adequate environment, facility for carrying out work. REFERENCES [1] K. Sanzgiri, D. LaFlamme, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, “Authenticated routing for ad hoc networks,” 2005, IEEE J. Sel. Areas Commun., vol. 23, no. 3, pp. 598–610 [2] W. Liu, W. Lou, and Y. Fang, “An efficient quality of service routing algorithm for delay-sensitive applications,” 2005, Comput Net, vol. 47, no. 1, pp. 87–104 [3] K. K. Leung and L.-C Wang, “Integrated link adaptation and power control to improve error and throughput performance in broadband wireless packet networks,” 2002, IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 619– 629 [4] P. Papadimitratos and Z. Haas, “Secure routing for mobile ad hoc networks,” 2002, SCS Commun Netw Distrib Syst Model.Simul Conf, Jan. pp. 27–31 [5] A. Perrig, R. Canetti, D. Song, and J. D. Tygar, “Efficient and secure source authentication for multicast,” 2001, NDSS, San Diego, CA, pp. 90–100 [6] Y.-C. Hu, A. Perrig, and D. B. Johnson, “Rushing attacks and defense in wireless ad hoc network routing protocols,” 2003, ACM WiSe, Sep. pp. 30–40 [7] Seon Yeong Han, and Dongman Lee,” An Adaptive Hello Messaging Scheme for Neighbor Discovery in On-Demand MANET Routing Protocols”, 2013, IEEE COMMUNICATIONS LETTERS, Vol. 17, No. 5 [8] Cong Liu and Jie Wu,” Virtual-Force-Based Geometric Routing Protocol in MANETs”, 2009, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Vol. 20, No. 4 [9] Ming Yu, Mengchu Zhou, and Wei Su,” A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments”, 2009, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, Vol. 58, No. 1 [10] Haiying Shen, and Lianyu Zhao,” ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs”, 2013, IEEE TRANSACTIONS ON MOBILE COMPUTING, Vol. 12, No. 6 [11] Thomas Watteyne, Antonella Molinaro, Maria Grazia Richichi, Mischa Dohler,” From MANET To IETF ROLL Standardization: A Paradigm Shift in WSN Routing Protocols”, 2011, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, Vol. 13, No. 4 [12] Hui Xu, Xianren Wu, Hamid R. Sadjadpour, and J. J. Garcia-Luna-Aceves,” A Unified Analysis of Routing Protocols in MANETs”, 2010, IEEE TRANSACTIONS ON COMMUNICATIONS, Vol. 58, No. 3.