SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 1, Ver. III (Jan - Feb. 2015), PP 05-08
www.iosrjournals.org
DOI: 10.9790/2834-10130508 www.iosrjournals.org 5 | Page
Cooperative Data Forwarding In AODV Routing Protocol
Sarath Menon1
Mr. Jose Anand 2
KCG College of Technology, Karapakkam, Chennai - 600097.
Abstract: A Wireless sensor Network uses thousands of miniature devices that communicate among each other
and sense data from the environment. The success of the communication in a WSN inherently lies in the routing
protocol used by the architecture. This work enables reliable communication for Reactive Routing Protocol
such as, Ad hoc On-demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) in Wireless
Sensor Networks. These protocols are on-demand routing protocols and has the capability to only detect Link
Failures. This hampers the packet delivery ratio and increases the end-to-end delay. AODV Protocol when
faced with a link failure condition has the source node reinitiate the route discovery phase by broadcasting
Route Request Messages to its neighbours without considering the affected link. The system calls for a Reliable
Reactive Routing Enhancement (R3E) as an extension over the AODV protocol. Here the nodes maintain a list
of forwarding candidates and their priorities with the help of routing table enabling forwarding of data towards
destination as per node priority and thereby removing the need for re-initiation of route discovery phase. Thus
R3E successfully augments the aforementioned AODV protocol, thereby improving the packet delivery ratio and
also achieving a significant reduction in end-to-end delay in the Wireless Sensor Network.
Keywords: Wireless Sensor Networks, Ad-Hoc On Demand distance Vector, Dynamic Source Routing, Link
Failure.
I. Introduction
Wireless Sensor Networks
Wireless Sensor Networks (WSN) can be defined as a computer network consisting of thousands of
miniature devices capable of computation, communication and sensing data from its environment. They
represent the next big step in creating the smart environment. The success of the smart environment depends on
the sensory data and hence the WSN’s. They provide a bridge between the physical and virtual worlds. The
challenges in the hierarchy of detecting the relevant quantities, monitoring and collecting the data, assessing and
evaluating the information, formulating meaningful user displays and performing decision-making and alarm
functions are enormous.
II. Components In Wireless Sensor Networks
The Fig 1.1 shows the various components in the WSN. Typically WSNs contain hundreds or
thousands of sensor nodes, and these sensors have the ability to communicate either among each other or
directly to an external base station (BS). A greater number of sensors allows for sensing over larger
geographical regions with greater accuracy. Basically each sensor node comprises sensing, processing,
transmission, mobilizer, position finding system, and power units (some of these components are optional, like
the mobilizer). Sensor nodes are usually scattered in a sensor field, which is an area where the sensor nodes are
deployed. Sensor nodes coordinate among themselves to produce high-quality information about the physical
environment. Each sensor node bases its decisions on its mission, the information it currently has, and its
knowledge of its computing, communication and energy resources. Each of these scattered sensor nodes has the
capability to collect and route data either to other sensors or back to an external BS(s). A BS may be a fixed or a
mobile node capable of connecting the sensor network to an existing communications infrastructure or to the
Internet where a user can have access to the reported data.
Fig 1.1 Components in WSN
Cooperative Data Forwarding In AODV Routing Protocol
DOI: 10.9790/2834-10130508 www.iosrjournals.org 6 | Page
III. Routing In Wsn
Routing in WSNs is very challenging due to the inherent characteristics that distinguish these networks
from other wireless networks like mobile ad hoc networks or cellular networks. First, due to the relatively large
number of sensor nodes, it is not possible to build a global addressing scheme for the deployment of a large
number of sensor nodes as the overhead of ID maintenance is high. Thus traditional IP-based protocols may not
be applied to WSNs. Furthermore sensor nodes that are deployed in an ad hoc manner need to be self-organizing
as the ad hoc deployment of these nodes requires the system to form connections and cope with the resultant
nodal distribution, especially as the operation of sensor networks is unattended. In WSNs sometimes getting the
data is more important than knowing the IDs of which nodes sent the data. Second in contrast to typical
communication networks almost all applications of sensor networks require the flow of sensed data from
multiple sources to a particular BS. This however does not prevent the flow of data to be in other forms (e.g.,
multicast or peer to peer). Third sensor nodes are tightly constrained in terms of energy, processing and storage
capacities. Thus they require careful resource management. Fourth in most application scenarios nodes in WSNs
are generally stationary after deployment except for maybe a few mobile nodes. Nodes in other traditional
wireless networks are free to move which results in unpredictable and frequent topological changes. However in
some applications some sensor nodes may be allowed to move and change their location (although with very
low mobility). Fifth sensor networks are application-specific. Sixth position awareness of sensor nodes is
important since data collection is normally based on the location. Finally data collected by many sensors in
WSNs is typically based on common phenomena, so there is a high probability that this data has some
redundancy. Such redundancy needs to be exploited by the routing protocols to improve energy and bandwidth
utilization. Usually WSNs are data centric networks in the sense that data is requested based on certain
attributes.
IV. Existing System
Ad Hoc On Demand Distance Vector Routing is the most prominently used reactive routing protocol in
wireless sensor networks. This protocol has the ability to detect only the link failure condition in the network.
Link failure conditions are detected by the absence of HELLO messages between the neighbour nodes in the
network. Thus in case of link failure condition in the network the source node again reinitiates the route
discovery phase by flooding the network with Route request packet. This hampers the throughput and the packet
delivery ratio (PDR), while the end to end delay is also on the ascendancy.
V. Proposed System
The system calls for augmenting the existing AODV routing protocol with a concept of Reliable
Routing Reactive Routing (R3E). This concept is used as an extension to the AODV routing protocol which
enables the network to bypass the link failure condition. Thereby during a link failure condition the source node
greedily progresses the data towards the destination using the guide path. Thus there is no need for the source
node to re- initiate the route discovery phase in case of link failure. This increases the throughput, packet
delivery ratio (PDR) while reducing the end to end delay in the network.
Reliable Reactive Routing Enhancement (R3E)
The project proposes an idea of R3E which is used as an extension over the AODV protocol. This
enhances the AODV routing protocol to provide reliable and energy efficient packet delivery against the
condition of Link Failure which may occur in a wireless sensor network.
Fig 1.2 shows the functional architecture overview of R3E. It is a middle-ware design across the MAC
and the network layer. The R3E enhancement layer module consists of three main modules. They are Reliable
Route discovery module, potential forwarder selection and prioritization module and forwarding selection
module. The reliable route discovery module finds and maintains the route information for each node. The other
two modules are responsible for the runtime forwarding phase. Forwarding decision module will check whether
the node receiving a packet is one of the intended receivers if it is true then the node will cache the incoming
packet. The potential forwarder selection and prioritization module attaches the ordered forwarder list in the
data packet header for the next hop. Lately the outgoing packet will be submitted to the MAC layer and
forwarded towards the destination.
Cooperative Data Forwarding In AODV Routing Protocol
DOI: 10.9790/2834-10130508 www.iosrjournals.org 7 | Page
Fig 1.2 Functional Architecture overview of R3E
AODV-R3E Implementation
Fig 1.3 AODV-R3E Implementation
Fig 1.3 shows the steps followed to implement the R3E protocol over the AODV Routing Protocol.
Creation of c/c++ files in the folder is the primary step in this process. Modifying the files in NS2 is done so that
the system can recognize the R3E protocol in the simulation. Registration of packet header is done in c++ so
that the simulator will recognize the above idea. Modification of the existing AODV protocol is done.
Modification is done with the existing header files and there is a need to add some extra header files as well
which will take care of the node priority TTL expiration cases and routing table updation. Connection of
interfacing queue and routing agent to each other is essential. Last step is to add new compile options to the
―Make- file‖ and rebuild the NS2 software.
AODV-R3E
R3E is implemented with the AODV routing protocol to achieve AODV-R3E. It acts along with the
AODV routing protocol and enhances its resilience to the condition of link failure. Source Node wishes to send
data to the destination node. It first checks its routing table to find the neighbouring nodes and broadcasts RREQ
packets to them. The intermediate node then broadcasts the RREQ packet to downstream nodes. This is done till
the packet reaches the destination node or the node that is one hop path away from the destination. This node
sends Route Reply packet to the source node through the intermediate nodes. A Source node will get many
Route Request packets. It will accept one of them and will reject all others. The data forwarding will happen
along the way that was traversed by the Route Reply packet. In case a link failure occurs in the network which is
indicated by profound drop in packets or the absence of beacon signals in the network. In the above case the
source node refers to its routing table and will forward the packet to the next preferable neighbour nodes and in
this way the packet from the source to destination will reach without using the broken link and without
undergoing the process of Route discovery again. This can happen as long as the data forwarding is between the
same source- destination pair. In case some other node wants to send the data towards a destination node it
should be done only after Route discovery phase.
VI. Results And Analysis
The reliable Reactive Routing Enhancement (R3E) is implemented over the AODV routing protocol. Simulation
is carried out in NS-2.29 for two cases namely
1) Link failure condition in AODV Routing Protocol.
2) Link failure condition in AODV-R3E Routing Protocol.
It is seen that in case of the link failure condition in the network AODV-R3E greedily progresses the data
towards the destination as opposed to the AODV Routing Protocol. AODV- R3E does not have the source node
Cooperative Data Forwarding In AODV Routing Protocol
DOI: 10.9790/2834-10130508 www.iosrjournals.org 8 | Page
reinitiate the route discovery phase in the above scenario. While for AODV Routing Protocol Route discovery
phase is an essentiality in case of link failure condition in the network.
Comparison
Simulation was done for the above scenarios. The Graph was plotted for 3 parameters throughput,
packet delivery ratio and end to end delay taken in y-axis vs increasing node density taken on x axis. The
comparison is given in the form of a table given below.
Parameters AODV AODV-R3E
Throughput 0.9Mbps 5.5 Mbps
End to end delay (Min) 20 ms 12 ms
Packet delivery ratio 90% 100%
VII. Conclusion
The Proposed R3E protocol served as an efficient Protocol acting as an extension to the AODV
Routing protocol as figuratively indicated by the Table. It increased the resilience of the network against the
condition of link failure. It reduced the end to end delay and did appreciably well in increasing the Throughput
and the Packet delivery Ratio as compared with the aforementioned Ad hoc On Demand Routing Protocol.
Future Work
The future work will focus on introducing the Concept of Intrusion detection System (IDS) by
implementing the idea of Enhanced Adaptive ACKnowledgement(EAACK).This system will focus on ideas to
protect the network from malicious attack of the nodes in the network itself. Thus it will make the network
robust against any intruder that may be encountered by the network.
References
[1]. Vehbi Cagri, Gungor, Özgür B. Akan and Ian F. Akyildiz, (April 2008), ―A Real-Time and Reliable Transport (RT)2
Protocol for
Wireless Sensor and Actor Networks‖, IEEE Trans. Networking,Vol.16,No.2, pp. 359-370.
[2]. X. Huang, H. Zhai, and Y. Fang, (Dec 2008), ―Robust cooperative routing protocol in mobile wireless sensor networks‖, IEEE
Trans. Wireless Commun., Vol. 7, No. 12, pp. 5278–5285.
[3]. Xufei Mao, Shaojie Tang, Xiahua Xu, Xiang-Yang Li and Huadong Ma, (Nov 2011), ―Energy Efficient Opportunistic Routing in
Wireless Sensor Networks‖, IEEE Trans. Parallel and Distrib. Syst., Vol. 22, No. 11, pp 1934-1942.
[4]. Jianwei Niu, Long Cheng, Yu Gu, Lei Shu and Sajal K. Das, (Feb 2014), ―R3E: Reliable Reactive Routing Enhancement for
Wireless Sensor Networks‖, IEEE Trans. Industrial informatics, Vol.10, No.1, pp. 784-794.
[5]. Eric Rozner, Jayesh Seshadri, Yogita Ashok Mehta and Lili Qiu, (Dec 2009) ―Soar: Simple opportunistic adaptive routing protocol
for wireless mesh networks‖, IEEE Trans. Mobile Comput., Vol. 8, No. 12 pp. 1622–1635.
[6]. Elhadi M. Shakshuki, , Nan Kang and Tarek R. Sheltami, (March 2013), ―EAACK—A Secure Intrusion-Detection System for
MANETs‖, IEEE Trans Industrial Electronics, VOL. 60, NO. 3, pp 1089-1098.

Mais conteúdo relacionado

Mais procurados

The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
IAEME Publication
 
The detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksThe detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networks
iaemedu
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
mehulpatira
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
Darpan Dekivadiya
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
eSAT Journals
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
shashankcsnits
 

Mais procurados (18)

Mw2522122216
Mw2522122216Mw2522122216
Mw2522122216
 
E0942531
E0942531E0942531
E0942531
 
Wireless sensor network
Wireless sensor network  Wireless sensor network
Wireless sensor network
 
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
 
The detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksThe detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networks
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
Qualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSNQualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSN
 
Mane ts
Mane tsMane ts
Mane ts
 
011001010 a
011001010 a011001010 a
011001010 a
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Cw25585588
Cw25585588Cw25585588
Cw25585588
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 

Destaque

Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration schemeDesigning of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
IOSR Journals
 

Destaque (20)

K1802027780
K1802027780K1802027780
K1802027780
 
N1103048593
N1103048593N1103048593
N1103048593
 
B012110813
B012110813B012110813
B012110813
 
H011137281
H011137281H011137281
H011137281
 
A017230107
A017230107A017230107
A017230107
 
H1101046875
H1101046875H1101046875
H1101046875
 
D012131728
D012131728D012131728
D012131728
 
D010622334
D010622334D010622334
D010622334
 
H012535263
H012535263H012535263
H012535263
 
B012430711
B012430711B012430711
B012430711
 
O01821100103
O01821100103O01821100103
O01821100103
 
Prevalence of anemia and socio-demographic factors associated with anemia amo...
Prevalence of anemia and socio-demographic factors associated with anemia amo...Prevalence of anemia and socio-demographic factors associated with anemia amo...
Prevalence of anemia and socio-demographic factors associated with anemia amo...
 
D017351725
D017351725D017351725
D017351725
 
C010211624
C010211624C010211624
C010211624
 
M017427985
M017427985M017427985
M017427985
 
F017533540
F017533540F017533540
F017533540
 
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration schemeDesigning of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
 
Bryophyllum Pinnatum: A Potential Attenuator of Cadmium-Induced Oxidative Str...
Bryophyllum Pinnatum: A Potential Attenuator of Cadmium-Induced Oxidative Str...Bryophyllum Pinnatum: A Potential Attenuator of Cadmium-Induced Oxidative Str...
Bryophyllum Pinnatum: A Potential Attenuator of Cadmium-Induced Oxidative Str...
 
On Embedding and NP-Complete Problems of Equitable Labelings
On Embedding and NP-Complete Problems of Equitable LabelingsOn Embedding and NP-Complete Problems of Equitable Labelings
On Embedding and NP-Complete Problems of Equitable Labelings
 
On Local Integrable Solutions of Abstract Volterra Integral Equations
On Local Integrable Solutions of Abstract Volterra Integral EquationsOn Local Integrable Solutions of Abstract Volterra Integral Equations
On Local Integrable Solutions of Abstract Volterra Integral Equations
 

Semelhante a Cooperative Data Forwarding In AODV Routing Protocol

Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
Amy Moore
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
IJCSEA Journal
 

Semelhante a Cooperative Data Forwarding In AODV Routing Protocol (20)

Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
 
C017371624
C017371624C017371624
C017371624
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
 
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
 
2 sima singh-6-13
2 sima singh-6-132 sima singh-6-13
2 sima singh-6-13
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
 

Mais de IOSR Journals

Mais de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Último

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Último (20)

chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 

Cooperative Data Forwarding In AODV Routing Protocol

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 1, Ver. III (Jan - Feb. 2015), PP 05-08 www.iosrjournals.org DOI: 10.9790/2834-10130508 www.iosrjournals.org 5 | Page Cooperative Data Forwarding In AODV Routing Protocol Sarath Menon1 Mr. Jose Anand 2 KCG College of Technology, Karapakkam, Chennai - 600097. Abstract: A Wireless sensor Network uses thousands of miniature devices that communicate among each other and sense data from the environment. The success of the communication in a WSN inherently lies in the routing protocol used by the architecture. This work enables reliable communication for Reactive Routing Protocol such as, Ad hoc On-demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) in Wireless Sensor Networks. These protocols are on-demand routing protocols and has the capability to only detect Link Failures. This hampers the packet delivery ratio and increases the end-to-end delay. AODV Protocol when faced with a link failure condition has the source node reinitiate the route discovery phase by broadcasting Route Request Messages to its neighbours without considering the affected link. The system calls for a Reliable Reactive Routing Enhancement (R3E) as an extension over the AODV protocol. Here the nodes maintain a list of forwarding candidates and their priorities with the help of routing table enabling forwarding of data towards destination as per node priority and thereby removing the need for re-initiation of route discovery phase. Thus R3E successfully augments the aforementioned AODV protocol, thereby improving the packet delivery ratio and also achieving a significant reduction in end-to-end delay in the Wireless Sensor Network. Keywords: Wireless Sensor Networks, Ad-Hoc On Demand distance Vector, Dynamic Source Routing, Link Failure. I. Introduction Wireless Sensor Networks Wireless Sensor Networks (WSN) can be defined as a computer network consisting of thousands of miniature devices capable of computation, communication and sensing data from its environment. They represent the next big step in creating the smart environment. The success of the smart environment depends on the sensory data and hence the WSN’s. They provide a bridge between the physical and virtual worlds. The challenges in the hierarchy of detecting the relevant quantities, monitoring and collecting the data, assessing and evaluating the information, formulating meaningful user displays and performing decision-making and alarm functions are enormous. II. Components In Wireless Sensor Networks The Fig 1.1 shows the various components in the WSN. Typically WSNs contain hundreds or thousands of sensor nodes, and these sensors have the ability to communicate either among each other or directly to an external base station (BS). A greater number of sensors allows for sensing over larger geographical regions with greater accuracy. Basically each sensor node comprises sensing, processing, transmission, mobilizer, position finding system, and power units (some of these components are optional, like the mobilizer). Sensor nodes are usually scattered in a sensor field, which is an area where the sensor nodes are deployed. Sensor nodes coordinate among themselves to produce high-quality information about the physical environment. Each sensor node bases its decisions on its mission, the information it currently has, and its knowledge of its computing, communication and energy resources. Each of these scattered sensor nodes has the capability to collect and route data either to other sensors or back to an external BS(s). A BS may be a fixed or a mobile node capable of connecting the sensor network to an existing communications infrastructure or to the Internet where a user can have access to the reported data. Fig 1.1 Components in WSN
  • 2. Cooperative Data Forwarding In AODV Routing Protocol DOI: 10.9790/2834-10130508 www.iosrjournals.org 6 | Page III. Routing In Wsn Routing in WSNs is very challenging due to the inherent characteristics that distinguish these networks from other wireless networks like mobile ad hoc networks or cellular networks. First, due to the relatively large number of sensor nodes, it is not possible to build a global addressing scheme for the deployment of a large number of sensor nodes as the overhead of ID maintenance is high. Thus traditional IP-based protocols may not be applied to WSNs. Furthermore sensor nodes that are deployed in an ad hoc manner need to be self-organizing as the ad hoc deployment of these nodes requires the system to form connections and cope with the resultant nodal distribution, especially as the operation of sensor networks is unattended. In WSNs sometimes getting the data is more important than knowing the IDs of which nodes sent the data. Second in contrast to typical communication networks almost all applications of sensor networks require the flow of sensed data from multiple sources to a particular BS. This however does not prevent the flow of data to be in other forms (e.g., multicast or peer to peer). Third sensor nodes are tightly constrained in terms of energy, processing and storage capacities. Thus they require careful resource management. Fourth in most application scenarios nodes in WSNs are generally stationary after deployment except for maybe a few mobile nodes. Nodes in other traditional wireless networks are free to move which results in unpredictable and frequent topological changes. However in some applications some sensor nodes may be allowed to move and change their location (although with very low mobility). Fifth sensor networks are application-specific. Sixth position awareness of sensor nodes is important since data collection is normally based on the location. Finally data collected by many sensors in WSNs is typically based on common phenomena, so there is a high probability that this data has some redundancy. Such redundancy needs to be exploited by the routing protocols to improve energy and bandwidth utilization. Usually WSNs are data centric networks in the sense that data is requested based on certain attributes. IV. Existing System Ad Hoc On Demand Distance Vector Routing is the most prominently used reactive routing protocol in wireless sensor networks. This protocol has the ability to detect only the link failure condition in the network. Link failure conditions are detected by the absence of HELLO messages between the neighbour nodes in the network. Thus in case of link failure condition in the network the source node again reinitiates the route discovery phase by flooding the network with Route request packet. This hampers the throughput and the packet delivery ratio (PDR), while the end to end delay is also on the ascendancy. V. Proposed System The system calls for augmenting the existing AODV routing protocol with a concept of Reliable Routing Reactive Routing (R3E). This concept is used as an extension to the AODV routing protocol which enables the network to bypass the link failure condition. Thereby during a link failure condition the source node greedily progresses the data towards the destination using the guide path. Thus there is no need for the source node to re- initiate the route discovery phase in case of link failure. This increases the throughput, packet delivery ratio (PDR) while reducing the end to end delay in the network. Reliable Reactive Routing Enhancement (R3E) The project proposes an idea of R3E which is used as an extension over the AODV protocol. This enhances the AODV routing protocol to provide reliable and energy efficient packet delivery against the condition of Link Failure which may occur in a wireless sensor network. Fig 1.2 shows the functional architecture overview of R3E. It is a middle-ware design across the MAC and the network layer. The R3E enhancement layer module consists of three main modules. They are Reliable Route discovery module, potential forwarder selection and prioritization module and forwarding selection module. The reliable route discovery module finds and maintains the route information for each node. The other two modules are responsible for the runtime forwarding phase. Forwarding decision module will check whether the node receiving a packet is one of the intended receivers if it is true then the node will cache the incoming packet. The potential forwarder selection and prioritization module attaches the ordered forwarder list in the data packet header for the next hop. Lately the outgoing packet will be submitted to the MAC layer and forwarded towards the destination.
  • 3. Cooperative Data Forwarding In AODV Routing Protocol DOI: 10.9790/2834-10130508 www.iosrjournals.org 7 | Page Fig 1.2 Functional Architecture overview of R3E AODV-R3E Implementation Fig 1.3 AODV-R3E Implementation Fig 1.3 shows the steps followed to implement the R3E protocol over the AODV Routing Protocol. Creation of c/c++ files in the folder is the primary step in this process. Modifying the files in NS2 is done so that the system can recognize the R3E protocol in the simulation. Registration of packet header is done in c++ so that the simulator will recognize the above idea. Modification of the existing AODV protocol is done. Modification is done with the existing header files and there is a need to add some extra header files as well which will take care of the node priority TTL expiration cases and routing table updation. Connection of interfacing queue and routing agent to each other is essential. Last step is to add new compile options to the ―Make- file‖ and rebuild the NS2 software. AODV-R3E R3E is implemented with the AODV routing protocol to achieve AODV-R3E. It acts along with the AODV routing protocol and enhances its resilience to the condition of link failure. Source Node wishes to send data to the destination node. It first checks its routing table to find the neighbouring nodes and broadcasts RREQ packets to them. The intermediate node then broadcasts the RREQ packet to downstream nodes. This is done till the packet reaches the destination node or the node that is one hop path away from the destination. This node sends Route Reply packet to the source node through the intermediate nodes. A Source node will get many Route Request packets. It will accept one of them and will reject all others. The data forwarding will happen along the way that was traversed by the Route Reply packet. In case a link failure occurs in the network which is indicated by profound drop in packets or the absence of beacon signals in the network. In the above case the source node refers to its routing table and will forward the packet to the next preferable neighbour nodes and in this way the packet from the source to destination will reach without using the broken link and without undergoing the process of Route discovery again. This can happen as long as the data forwarding is between the same source- destination pair. In case some other node wants to send the data towards a destination node it should be done only after Route discovery phase. VI. Results And Analysis The reliable Reactive Routing Enhancement (R3E) is implemented over the AODV routing protocol. Simulation is carried out in NS-2.29 for two cases namely 1) Link failure condition in AODV Routing Protocol. 2) Link failure condition in AODV-R3E Routing Protocol. It is seen that in case of the link failure condition in the network AODV-R3E greedily progresses the data towards the destination as opposed to the AODV Routing Protocol. AODV- R3E does not have the source node
  • 4. Cooperative Data Forwarding In AODV Routing Protocol DOI: 10.9790/2834-10130508 www.iosrjournals.org 8 | Page reinitiate the route discovery phase in the above scenario. While for AODV Routing Protocol Route discovery phase is an essentiality in case of link failure condition in the network. Comparison Simulation was done for the above scenarios. The Graph was plotted for 3 parameters throughput, packet delivery ratio and end to end delay taken in y-axis vs increasing node density taken on x axis. The comparison is given in the form of a table given below. Parameters AODV AODV-R3E Throughput 0.9Mbps 5.5 Mbps End to end delay (Min) 20 ms 12 ms Packet delivery ratio 90% 100% VII. Conclusion The Proposed R3E protocol served as an efficient Protocol acting as an extension to the AODV Routing protocol as figuratively indicated by the Table. It increased the resilience of the network against the condition of link failure. It reduced the end to end delay and did appreciably well in increasing the Throughput and the Packet delivery Ratio as compared with the aforementioned Ad hoc On Demand Routing Protocol. Future Work The future work will focus on introducing the Concept of Intrusion detection System (IDS) by implementing the idea of Enhanced Adaptive ACKnowledgement(EAACK).This system will focus on ideas to protect the network from malicious attack of the nodes in the network itself. Thus it will make the network robust against any intruder that may be encountered by the network. References [1]. Vehbi Cagri, Gungor, Özgür B. Akan and Ian F. Akyildiz, (April 2008), ―A Real-Time and Reliable Transport (RT)2 Protocol for Wireless Sensor and Actor Networks‖, IEEE Trans. Networking,Vol.16,No.2, pp. 359-370. [2]. X. Huang, H. Zhai, and Y. Fang, (Dec 2008), ―Robust cooperative routing protocol in mobile wireless sensor networks‖, IEEE Trans. Wireless Commun., Vol. 7, No. 12, pp. 5278–5285. [3]. Xufei Mao, Shaojie Tang, Xiahua Xu, Xiang-Yang Li and Huadong Ma, (Nov 2011), ―Energy Efficient Opportunistic Routing in Wireless Sensor Networks‖, IEEE Trans. Parallel and Distrib. Syst., Vol. 22, No. 11, pp 1934-1942. [4]. Jianwei Niu, Long Cheng, Yu Gu, Lei Shu and Sajal K. Das, (Feb 2014), ―R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Networks‖, IEEE Trans. Industrial informatics, Vol.10, No.1, pp. 784-794. [5]. Eric Rozner, Jayesh Seshadri, Yogita Ashok Mehta and Lili Qiu, (Dec 2009) ―Soar: Simple opportunistic adaptive routing protocol for wireless mesh networks‖, IEEE Trans. Mobile Comput., Vol. 8, No. 12 pp. 1622–1635. [6]. Elhadi M. Shakshuki, , Nan Kang and Tarek R. Sheltami, (March 2013), ―EAACK—A Secure Intrusion-Detection System for MANETs‖, IEEE Trans Industrial Electronics, VOL. 60, NO. 3, pp 1089-1098.