SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME
19
REVIEW OF DIFFERENT ROUTING PROTOCOL FOR MANET
Ashwini Rajaram Jadhav
M.E. Computer Engineering Student of Padmbhushan Vasantdada Patil Institute of Technology,
Bavdhan, Pune-21, University of Pune
Mr. Navanath Dattatray Kale
Assistant Professor, Department of Computer Engineering, Padmbhushan Vasantdada Patil Institute
of Technology, Bavdhan, Pune-21, University of Pune
ABSTRACT
Wireless channel link quality is the difference a challenging problem was until recently data
communication Use this attribute in a similar exploration. Broadcast transmission can be regarded as
quite different, And usually independently on the receiver by different geographic Locations. In
addition, even the same stable receiver may over time, the combination of rigid link quality volatility
experience. Broadcasting of quality variation with the nature of the link Wireless channel wireless
research showed a direction networking, that is, cooperative communications. Research The
cooperative started to attract interest in the communication on but recently its importance on
community physical layer and realized on the upper layers of usability has also been Network
protocol stack the lack of a fixed infrastructure in ad hoc networks implies that any computation on
the network needs to be carried out in a decentralized manner thus, many of the important problems
in ad hoc networking can be formulated as problems in distributed computing, and there are certain
characteristics of ad hoc networks that make this study somewhat different than traditional work in
distributed computing. In this review paper we point out various routing methods.
Keywords: Mobile Ad Hoc Network, Routing Protocols, Channel Reuse, Delay Jitter.
I. INTRODUCTION
The proliferation of mobile computing and communication devices (e.g., cell phones, laptops,
handheld digital devices, personal digital assistants, or wearable computers) is driving a
revolutionary change in our information society. The nature of ubiquitous devices makes wireless
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 6, June (2014), pp. 19-27
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2014): 8.5328 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME
20
networks the easiest solution for their interconnection and, as a consequence, the wireless arena has
been experiencing exponential growth in the past decade. Mobile users can use their cellular phone
to check e-mail, browse internet; travelers with portable computers can surf the internet from
airports, railway stations, Starbucks and other public locations; tourists can use Global Positioning
System (GPS) terminals installed inside rental cars to locate driving maps and tourist attractions,
researchers can exchange files and other information by connecting portable computers via wireless
LANs while attending conferences; at home, users can synchronize data and transfer files between
portable devices and desktops. [1]
The lack of a fixed Infrastructure in ad hoc networks implies that any computation on the
network needs to be carried out in a decentralized manner. Thus, many of the important problems in
ad hoc networking can be formulated as problems in distributed computing. However, there are
certain characteristics of ad hoc networks that make this study somewhat different than traditional
work in distributed computing.[2] Multi-hop wireless networks typically use routing techniques
similar to those in wired networks These traditional routing protocols choose the best sequence of
nodes between the source and destination, and forward each packet through that sequence. In
contrast, cooperative diversity schemes proposed by the information theory community suggest that
traditional routing may not be the best approach. Cooperative diversity takes advantage of broadcast
transmission to send information through multiple relays concurrently. The destination can then
choose the best of many relayed signals, or combine information from multiple signals. These
schemes require radios capable of simultaneous, synchronized repeating of the signal, or additional
radio channels for each relay [3] Recent and increased interest of wireless mobile ad hoc networking
motivates detailed examination of routing schemes specifically targeted for the demanding
constraints that an unreliable, time varying and broadcast like wireless medium imposes.
Incorporation and exploitation of radio characteristics are fundamental keys to successful and near
optimal operation of routing schemes in a wireless environment. [4] Wireless mesh networks are
used increasingly for providing cheap Internet access everywhere. City-wide WiFi networks,
however, need to deal with poor link quality caused by urban structures and the many interferers
including local WLANs. For example, half of the operational links in Roofnet have a loss probability
higher than 30%. Opportunistic routing has recently emerged as a mechanism for obtaining high
throughput even when links are lossy, Opportunistic routing, however, introduces a difficult
challenge. Multiple nodes may hear a packet broadcast and unnecessarily forward the same packet.
[5] Network coding is a new research area that may have interesting applications in practical
networking systems. With network coding, intermediate nodes may send out packets that are linear
combinations of previously received information. Communication networks today share the same
fundamental principle of operation. Whether it is packets over the Internet, or signals in a phone
network, information is transported in the same way as cars share a highway or fluids share pipes.
That is, independent data streams may share network resources, but the information itself is separate.
Routing, data storage, error control, and generally all network functions are based on this
assumption. [6] Vehicular networks can be seen as an example of hybrid delay tolerant network
where a mixture of info stations and vehicles can be used to geographically route the information
messages to the right location. In this paper we present a forwarding protocol which exploits both the
opportunistic nature and the inherent characteristics of the vehicular network in terms of mobility
patterns and encounters, and the geographical information present in navigator systems of vehicles.
[7] Traditional MANET routing protocols are quite susceptible to link failure as well as vulnerable to
malicious node attack. In this paper, we propose a novel protocol called Position based Opportunistic
Routing (POR) which takes full advantage of the broadcast nature of wireless channel and
opportunistic forwarding. The data packets are transmitted as a way of multicast (which is actually
implemented by MAC interception) with multiple forwarders. [8] A new family of routing
algorithms for the distributed maintenance of routing information in large networks and internets is
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME
21
introduced. This family is called link vector algorithms (LVA), and is based on the selective
diffusion of link-state information based on the distributed computation of preferred paths, rather
than on the flooding of complete link-state information to all routers. According to LVA, each router
maintains a subset of the topology that corresponds to the links used by its neighbor routers in their
preferred paths to known destinations. [9] Wireless industry has seen exponential growth in last
couple of years. The advancement in growing availability of wireless networks and emergence of
handheld computer, PDAs and Cell phones is now playing very important role in our daily routines.
[10]
This review paper demonstrates the impetus behind mobile ad hoc networks, and presents a
representative collection of technology solutions used at the different layers of the network, in
particular presenting algorithms and protocols unique to the operation and dynamic configuration of
mobile ad hoc networks.
III. REVIEW DIFFERENT MODELING AD HOC NETWORK
In this article, we have some of the characteristic features of ad hoc networks review,
formulate problems and research work done in the field of survey we focused on two basic problem
domain: topology control, computing and network nodes maintain a connected between topology and
routing problems.
A 2-dimensional (or 3-dimensional) Euclidean space, where each dot represents a network
node as a collection of points in an ad hoc network can model; Each node is characterized by its
computational and communication power.
A node in a wireless communication coding and computational power node can perform two
major issues of encryption level. Characteristics of propagation communication networks the
characteristics of radio channels and the environment, and the battery power and power control
capabilities powered by individual nodes are we now elaborate on these issues
Modelling at higher layers
Radio propagation and interference models node locations and lack of transmission power,
the ability to make a meaningful range of ad-hoc networks, can be used to get the physical layer
parameters based on a model like although, designing and high layer protocol is cumbersome to use
for analyzing a simple model that abstracts physical layer details away G is a graph in the Euclidean
space as an ad hoc network (V-e) to represent the set of all nodes V is set set E is an edge node. If
you can directly transmit TV before you
To v; the path loss equation and a basic signal-to-noise ratio may be determined by the
formula we transition graph refer to-ji. intervention can be modeled to a limited extent by the
following assumption: you have a transmission with v only if no other node is able to lead the v ~ v
and send it along with the essentially models that packet Radio networks (PRNs) has been used to
study; pp ~ N model, as described above, Assumes that each node is an ad-hoc network is always the
same transmission transmits power. Modern mobile wireless units’ need their transmission power
transmission, subject to a maximum limit is the ability to adjust accordingly. Reduces interference
control such power, mobile units, and therefore conserves battery power channel bandwidth allows
for better use. If we mentioned in the last paragraph as transmission using Graph-ji Networks
represent There is a node w v that is transmitting at the same time, we have an adjacent node
successfully transmitting to, u too; It might be because can be found on the power transmission
against receiving power on against very small compared to you transmission, which you are
transmitting and w at that time due to the different levels.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME
22
Mobility
Mobility in ad hoc networks are two approaches to modeling a approach often used in
simulations, direction and speed of motion of a node is a node mobility vector model as each node
independently over a period of time after which its dynamics a new random vector is assigned,
Defines mobility vector picks. Models group movement, whereby a group of nodes can move in the
same general direction also recently studied a theoretical analysis, Mobility, as detailed models are
difficult to work with. Instead, the dynamics underlying transmission can be represented by the graph
changes. for example, we work in a primary transmission graph changes need to be made when
considering the amount of robustness of an ad-hoc network routing protocol by analysis; That is,
when an edge is removed or added to a node in the neighborhood changes.
Topology control
An ad hoc network is not an associated topology that lack a central infrastructure implies. in
fact, an appropriate topology which are applied more high level routing protocols to determine if an
ad-hoc network consisting of geographically dispersed nodes is an important task in this section we
topology control, An ad hoc network in a suitable topology, consider the problem of determining v to
denote the graph and let denote the collection of nodes V which is one of the edge node in node v in
there for you if you can directly reach if v. T topology control algorithm returned by topology t
denote the quality of connectivity., Energy efficiency, throughput and robustness for according to
several criteria including the dynamics can be evaluated in the remainder of this section, we
elaborate on these measures.
Connectivity and energy-efficiency
Perhaps, the most basic of a topology requires that it be connected. more precisely, we
require that any two nodes that are attached to the axe-ji. Also associated routing protocols for
network topology T forms, that there's potential energy-efficient path exists between a source
destination pair is desirable. a perception of energy efficiency power factor, which we now define
stress.., as discussed in section 2, and v. To determine energy path with the edges of the sum of the
energy used to be along a path used for delivering a packet and the distance between a polynomial
function is a transmission from you to v so consumed energy, two nodes u and v, EC (, V) (resp., et
al. (U, v)) and-ji (resp., T) v minimum energy paths between the energy we now denote the
maximum, over all T's energy to be set up and stretch factor v, e ~ (u, v)/ET (u, v), Quality power
stretch factor similar to a perception of hop hop-count ratio factor which stretch. Instead of energy
that way.
Throughput
Connectivity and energy efficiency, with high capacity or throughput, we would like a
topology; that is any other satisfying constraints in topology topology as, "more than traffic" should
be possible to route network features depending on whether studies are being done and traffic
patterns, is believed to be a different way to formalize the notion of a ad-hoc network throughput.
Robustness to mobility
An additional challenge in the design of distributed topology control algorithms is to ensure
some degree of robustness to the mobility of nodes. One measure of robustness of the topology is
given by the maximum number of nodes that need to change their topology information as a result of
a movement of a node. This number, which may be referred to as the adaptability of the topology
control algorithm, depends on the size of the transmission neighbourhood of the mobile node u, and
the relative location of the nodes. The topology control algorithms based on proximity graphs all
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME
23
have low adaptability, since a change in a node location will only require the nodes in its
neighbourhood (both old and new) to recomputed their edges in the topology.
IV. DIFFERENT ROUTING METHODS
Wireless Sensor Networks (WSNs) consist of small nodes with sensing, computation, and
wireless communications capabilities. Many routing, power management, and data dissemination
protocols have been specifically designed for WSNs where energy awareness is an essential design
issue. The focus, however, has been given to the routing protocols which might differ depending on
the application and network architecture. In this paper, we present a survey of the state-of-the-art
routing techniques in WSNs. We first outline the design challenges for routing protocols in WSNs
followed by a comprehensive survey of different routing techniques. Overall, the routing techniques
are classified into three categories based on the underlying network structure:
1. Flat
2. Hierarchical
3. Location-based routing.
Furthermore, these protocols can be classified into multipath-based, query-based, negotiation-
based, QoS-based, and coherent-based depending on the protocol operation.
Figure 1: Routing Protocols in WSN
Routing protocols
In the previous section, we considered the design of topologies that have certain desirable
properties in terms of connectivity, energy-efficiency, and throughput. We now consider the design
of routing schemes that harness these properties. We note that while the presentation in this article
follows the approach of separating the network design and routing scheme design components, the
two components are closely intertwined. The choice of the particular topology control algorithm may
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME
24
have a strong impact on the choice of the routing scheme. Since the topology is constantly changing,
the routing scheme has to be robust to changes in topology.
Flat routing protocols
For an ad hoc network, given a topology, represented by an undirected graph G = (V, E), a
routing scheme has to select paths between source destination pairs in much the same manner as in
wired networks. Two paradigms that underlie Internet routing protocols are Distance Vector (DV)
and Link State (LS) algorithms. Both DV and LS algorithms require continual exchange of global
routing information. This enables the individual nodes of the network to maintain a close
approximation of the current network map at every instant. For ad hoc networks, proactive routing
protocols follow the DV or LS paradigm and attempt to keep routing information for all the nodes up
to date, e.g., OLSR, DSDV. When the topology of an ad hoc network is under constant flux,
however, LS generates large number of link state changes, while DV algorithms frequently suffer
from out of date state. The size of the network and the mobility of the nodes are two hurdles in the
design of scalable routing protocols. For example, the DSDV protocol has O(1) stretch but requires
each node to store an O(n)-size distance vector; one consequence of the latter memory overhead is
that the adaptability of the network is high since all distance vectors may need to be updated when a
node moves.
In contrast to proactive algorithms, reactive routing protocols cache topological information
and update the cached information on-demand. Reactive protocols avoid the prohibitive cost of
routing information maintenance of proactive protocols, and tend to work well in practice. While the
idea of aggressive caching and occasional update results in good average performance, the worst-
case latency could be high.
Hierarchical routing protocols
The idea of one-level clustering can be easily generalized to multilevel hierarchical network
decomposition. Indeed, this is an old concept in networking dating back to the 70s. While many of
the hierarchical routing protocols were originally designed for fixed networks, they are applicable,
with suitable modification, for ad hoc networks. The main idea of hierarchical routing is to organize
the network as a hierarchy of nested clusters of nodes. Each node of the network is a level-0 cluster.
The level-i clusters are grouped together into a certain number of level-i + 1 clusters, for i > 0. In the
most basic clustering, one assumes that all level-i clusters are disjoint; many routing protocols use
overlapping clusters to provide fault-tolerance and make the protocol more adaptive to dynamic
network changes. A hierarchical control structure enforces a hierarchical addressing on the network
nodes, which can form the basis of a routing scheme. In a typical routing scheme, each cluster elects
certain leaders within the cluster, which obtain and represent network state information at multiple
levels of granularity. Routing can be performed by forwarding the given packet to a leveL/cluster
which contains the destination node, successively for decreasing value of i, until the packet reaches a
level-0 cluster containing the destination, which is the destination itself. Routing protocols differ in
the precise mechanism by which network state information is gathered and the particular paths used
in the routing process.
The hierarchical control structures on which different routing protocols are based differ in the
number m of levels of the hierarchy, the size and diameter of the clusters at different levels of the
hierarchy, and amount of overlap among the clusters. The different choices lead to a natural trade off
between memory overhead and the stretch factor. Reviews several practical hierarchical clustering
protocols proposed for ad hoc networks. Most of these protocols rely on heuristics and, as such, do
not provide provable worst-case guarantees.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME
25
Geographic routing protocols
A recent approach to designing simple protocols that keep overhead small is to exploit the
underlying geometry (and geography) of the ad hoc network locations, in the Greedy Perimeter
Stateless Routing (GPSR) protocol, each node only maintains information about their
"neighbourhood", which is the set of nodes that the node can directly reach. Using positioning
information, the source node greedily passes a given packet to a neighbour that is closest to the
destination; if greedy forwarding is impossible, and then the packet is forwarded along a perimeter of
the region to reach the destination. While GPSR guarantees connectivity, the best bound on the
stretch of the protocol is f~ (n). GPSR is however, adaptive to node mobility since the nodes
maintain neighbourhood information only. As such, GPSR does not take into account energy
efficiency. An even simpler approach than GPSR is to use the O-graph. The O-graph not only
defines a topology but also directly yields a simple routing protocol with O(1) stretch and O(1)
memory overhead; the memory overhead is constant since each node needs to store the coordinates
of the nearest node in each of a constant number of sectors. This approach is used in for routing in
the plane. The worst-case adaptability of the routing scheme is at least the maximum in-degree of a
O-graph, which may be large; consequently, the movement of a single node may require updates in a
large number of nearby nodes. One approach to alleviate this problem is to use the constant-degree
variants of the O-graph, as discussed in Section 3. Unfortunately, while the topology control
algorithms based on these variants guarantee the existence of energy-efficient paths, a constructive
mechanism for calculating these paths in a distributed manner is not known.
Adversarial model
A second framework for analyzing ad hoc network routing algorithms is the adversarial
model, first developed in and subsequently enhanced in several recent studies. In the context of ad
hoc networks, we can model mobility and traffic patterns using an adversary. Mobility can be
modelled by allowing the adversary to activate/deactivate network edges; arbitrary traffic patterns
Can be modelled by allowing the adversary to determine the rate of packet arrival and the source
destination pairs for each packet, we describe here the most general adversarial model considered
thus far. In this model, the adversary is allowed to inject packets at arbitrary nodes at arbitrary times
and can activate an arbitrary number of incoming or outgoing edges subject to a maximum degree
bound z~ for each node. The destination for the each packet is also selected by the adversary. There
is one more constraint, that the buffer size of each node is limited to a value B. If at any time, the
number of packets in a buffer exceeds B then the excess packets have to be dropped. The adversarial
control of the network topology is intended to model the dynamic nature of an ad hoc network in
which edges may appear and disappear over time. We assume that no packets are lost; furthermore
the model does not cover malicious faults in the sense that it is implicitly assumed that all of the
nodes faithfully execute a given routing protocol. The adversarial control of packet injection models
the dynamic and unpredictable nature of network traffic.
LEACH protocol
Heinzelman introduced a hierarchical clustering algorithm for sensor networks, called Low
Energy Adaptive Clustering Hierarchy (LEACH). LEACH is a cluster-based protocol, which
includes distributed cluster formation. LEACH randomly selects a few sensor nodes as cluster heads
(CHs) and rotates this role to evenly distribute the energy load among the sensors in the network. In
LEACH, the cluster head (CH) nodes compress data arriving from nodes that belong to the
respective cluster, and send an aggregated packet to the base station in order to reduce the amount of
information that must be transmitted to the base station. LEACH uses a TDMA/CDMA MAC to
reduce inter-cluster and intra-cluster collisions. However, data collection is centralized and is
performed periodically. Therefore, this protocol is most appropriate when there is a need for constant
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME
26
monitoring by the sensor network. A user may not need all the data immediately. Hence, periodic
data transmissions are unnecessary which may drain the limited energy of the sensor nodes. After a
given interval of time, a randomized rotation of the role of the CH is conducted so that uniform
energy dissipation in the sensor network is obtained. The authors found, based on their simulation
model that only 5% of the nodes need to act as cluster heads.
Table 1: Hierarchical routing Vs Flat routing
Hierarchical routing Flat routing
Reservation-based scheduling Contention-based scheduling
Collisions avoided Collision overhead present
Reduced duty cycle due to periodic
sleeping
Variable duty cycle by controlling sleep
time of nodes
Data aggregation by cluster head node on multihop path aggregates
incoming data from neighbors
Simple but non-optimal routing Routing can be made optimal but with an
added complexity.
Requires global and local synchronization Links formed on the fly without
synchronization
Overhead of cluster formation throughout
the network
Routes formed only in regions that have
data for transmission
Lower latency as multiple hops network
formed by Cluster heads always available
Latency in waking up intermediate nodes
and setting up the multipath
Energy dissipation is uniform Energy dissipation depends on traffic
patterns
Energy dissipation cannot be controlled Energy dissipation adapts to traffic pattern
Fair channel allocation Fairness not guaranteed
Location based routing protocol
In this kind of routing, sensor nodes are addressed by means of their locations. The distance
between neighboring nodes can be estimated on the basis of incoming signal strengths.
SPAN
Another position based algorithm called SPAN selects some nodes as coordinators based on
their positions. The coordinators form a network backbone that is used to forward messages. A node
should become a coordinator if two neighbors of a non-coordinator node cannot reach each other
directly or via one or two coordinators (3 hop reach ability). New and existing coordinators are not
necessarily neighbors in, which, in effect, makes the design less energy efficient because of the need
to maintain the positions of two or three hop neighbors in the complicated SPAN algorithm.
VI. CONCLUSION
This review paper we discuss several routing patterns and we said that there are many ad hoc
network routing protocols, fixed Protocol originally proposed variations-connection in the network
design. We hope that peer-to-peer computing, with the arrival of two will tolerate any strong
connection problem domain; Peer-to-peer network, many of the same concerns ad-hoc network share
with, for example, need to change quickly is continuous and intensive systems to optimize the
Organization of decentralized.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME
27
VII. REFERENCES
[1] I. Chlamtac, M. Conti, and J.-N. Liu, “Mobile Ad hoc Networking: Imperatives and Challenges,”
Ad Hoc Networks, vol. 1, no. 1, pp. 13– 64, July 2003.
[2] R. Rajaraman, “Topology Control and Routing in Ad hoc Networks: A Survey,” SIGACT News,
vol. 33, pp. 60–73, June 2002.
[3] S. Biswas and R. Morris, “ExOR: Opportunistic Multi-Hop Routing for Wireless Networks,” in
Proc. ACM Conference of the Special Interest Group on Data Communication (SIGCOMM),
Philadelphia, PA, USA, August 2005, pp. 133–144.
[4] P. Larsson, “Selection Diversity Forwarding in a Multihop Packet Radio Network With Fading
Channel and Capture,” ACM Mobile Computing and Communications Review, vol. 5, no. 4,
pp. 47–54, October 2001.
[5] S. Chachulski, M. Jennings, S. Katti, and D. Katabi, “Trading Structure for Randomness in
Wireless Opportunistic Routing,” in Proc. ACM Conference of the Special Interest Group on
Data Communication(SIGCOMM), Kyoto, Japan, August 2007, pp. 169–180.
[6] C. Fragouli, J.-Y. L. Boudec, and J. Widmer, “Network Coding: an Instant Primer,” SIGCOMM
Computer Communication Review, vol. 36,pp. 63–68, January 2006.
[7] I. Leontiadis and C. Mascolo, “GeOpps: Geographical Opportunistic Routing for Vehicular
Networks,” in Proc. IEEE International Symposium on a World of Wireless Mobile and
Multimedia Networks (WoWMoM), Helsinki, Finland, June 2007, pp. 1–6.
[8] S. Yang, F. Zhong, C. K. Yeo, B. S. Lee, and J. Boleng, “Position Based Opportunistic Routing
for Robust Data Delivery in MANETs,” in Proc. 2009 IEEE Conference on Global
Telecommunications (GLOBECOM), Honolulu, Hawaii, USA, December 2009, pp. 1325–1330.
[9] J. Behrens and J. J. Garcia-Luna-Aceves, “Distributed, Scalable Routing based on Link-State
Vectors,” in Proc. ACM SIGCOMM, 1994, pp. 136–147.
[10] S. Murthy and J. J. Garcia-Luna-Aceves, “An Efficient Routing Protocol for Wireless Networks,”
Mobile Networks and Applications, vol. 1, no. 2, pp. 183–197, October 1996.
[11] Aarti Bairagi and Shweta Yadav, “A New Parameter Proposed for Route Selection in Routing
Protocol for Manet”, International Journal of Information Technology and Management
Information Systems (IJITMIS), Volume 4, Issue 1, 2013, pp. 31 - 37, ISSN Print: 0976 – 6405,
ISSN Online: 0976 – 6413.
[12] Sunita Kushwaha, Bhavna Narain, Deepti Verma and Sanjay kumar, “Effect of Scenario
Environment on the Performance of Manets Routing Protocol: AODV”, International Journal of
Computer Engineering & Technology (IJCET), Volume 2, Issue 1, 2011, pp. 33 - 38, ISSN Print:
0976 – 6367, ISSN Online: 0976 – 6375.
[13] V.Ramesh and Dr.P.Subbaiah, “Energy Efficient Preemptive Dynamic Source Routing Protocol
for Manet”, International Journal of Computer Engineering & Technology (IJCET), Volume 3,
Issue 1, 2012, pp. 213 - 222, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[14] Taniya Jain and Neeti Kashyap, “Factors for Designing Routing Protocol in Manet”, International
Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 5, 2013,
pp. 189 - 193, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[15] Saloni Singla and Tripatjot Singh Panag, “Evaluating the Performance of Manet Routing
Protocols”, International Journal of Electronics and Communication Engineering & Technology
(IJECET), Volume 4, Issue 1, 2013, pp. 125 - 130, ISSN Print: 0976- 6464, ISSN Online:
0976 –6472.
[16] Thaker Minesh, S B Sharma and Yogesh Kosta, “A Survey: Variants of Energy Constrained
Reactive Routing Protocols of Mobile Ad Hoc Networks”, International Journal of Electronics
and Communication Engineering & Technology (IJECET), Volume 3, Issue 2, 2012,
pp. 248 - 257, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.
[17] M. Ahmed, S. Yousef and Sattar J Aboud, “Bidirectional Search Routing Protocol for Mobile Ad
Hoc Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume
4, Issue 1, 2013, pp. 229 - 243, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

Mais conteúdo relacionado

Mais procurados

Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...IJERA Editor
 
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput IJECEIAES
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
 
Ziyuan Cai Research Statement
Ziyuan Cai Research StatementZiyuan Cai Research Statement
Ziyuan Cai Research StatementZiyuan Cai
 
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...IJERA Editor
 
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...Pvrtechnologies Nellore
 
Comparative performance evaluation of routing algorithm and topology size for...
Comparative performance evaluation of routing algorithm and topology size for...Comparative performance evaluation of routing algorithm and topology size for...
Comparative performance evaluation of routing algorithm and topology size for...journalBEEI
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
 
Reduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in ManetsReduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in ManetsIJMER
 
A distributed three hop routing protocol to
A distributed three hop routing protocol toA distributed three hop routing protocol to
A distributed three hop routing protocol tojpstudcorner
 
Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...Pvrtechnologies Nellore
 
Routing Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in VanetRouting Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in VanetIOSR Journals
 
Multicast routing strategy for SDN-cluster based MANET
Multicast routing strategy for SDN-cluster based MANET Multicast routing strategy for SDN-cluster based MANET
Multicast routing strategy for SDN-cluster based MANET IJECEIAES
 
Broadband internet in trains
Broadband internet in trainsBroadband internet in trains
Broadband internet in trainsIAEME Publication
 
Routing protocol for hetrogeneous wireless mesh network
Routing protocol for hetrogeneous wireless mesh networkRouting protocol for hetrogeneous wireless mesh network
Routing protocol for hetrogeneous wireless mesh networkredpel dot com
 

Mais procurados (17)

Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
 
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
 
Ziyuan Cai Research Statement
Ziyuan Cai Research StatementZiyuan Cai Research Statement
Ziyuan Cai Research Statement
 
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
 
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...
 
Comparative performance evaluation of routing algorithm and topology size for...
Comparative performance evaluation of routing algorithm and topology size for...Comparative performance evaluation of routing algorithm and topology size for...
Comparative performance evaluation of routing algorithm and topology size for...
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
Reduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in ManetsReduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in Manets
 
A distributed three hop routing protocol to
A distributed three hop routing protocol toA distributed three hop routing protocol to
A distributed three hop routing protocol to
 
V2 v communications
V2 v communicationsV2 v communications
V2 v communications
 
Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...
 
Routing Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in VanetRouting Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in Vanet
 
Multicast routing strategy for SDN-cluster based MANET
Multicast routing strategy for SDN-cluster based MANET Multicast routing strategy for SDN-cluster based MANET
Multicast routing strategy for SDN-cluster based MANET
 
Broadband internet in trains
Broadband internet in trainsBroadband internet in trains
Broadband internet in trains
 
Routing protocol for hetrogeneous wireless mesh network
Routing protocol for hetrogeneous wireless mesh networkRouting protocol for hetrogeneous wireless mesh network
Routing protocol for hetrogeneous wireless mesh network
 

Destaque (20)

TATA PRIMANTI ORIGINAL BOOKINGS
TATA PRIMANTI ORIGINAL BOOKINGSTATA PRIMANTI ORIGINAL BOOKINGS
TATA PRIMANTI ORIGINAL BOOKINGS
 
Maneira de amar
Maneira de amarManeira de amar
Maneira de amar
 
NuestraorientacióNsindical
NuestraorientacióNsindicalNuestraorientacióNsindical
NuestraorientacióNsindical
 
Jan Corthouts
Jan CorthoutsJan Corthouts
Jan Corthouts
 
María Auxiliadora
María AuxiliadoraMaría Auxiliadora
María Auxiliadora
 
Comunicao digital
Comunicao digitalComunicao digital
Comunicao digital
 
Qué Es Internet
Qué Es InternetQué Es Internet
Qué Es Internet
 
防止隨身碟病毒保護方法
防止隨身碟病毒保護方法防止隨身碟病毒保護方法
防止隨身碟病毒保護方法
 
Ibm Soa编程模型
Ibm Soa编程模型Ibm Soa编程模型
Ibm Soa编程模型
 
Sorteos villa colindres 2013
Sorteos villa colindres 2013Sorteos villa colindres 2013
Sorteos villa colindres 2013
 
Goiânia 40.000m²
Goiânia 40.000m²Goiânia 40.000m²
Goiânia 40.000m²
 
Modelos de risco de credito em carteiras uma comparacao aplicada ao caso br...
Modelos de risco de credito em carteiras   uma comparacao aplicada ao caso br...Modelos de risco de credito em carteiras   uma comparacao aplicada ao caso br...
Modelos de risco de credito em carteiras uma comparacao aplicada ao caso br...
 
Maria moises de Camilo Castelo Branco
Maria moises de Camilo Castelo BrancoMaria moises de Camilo Castelo Branco
Maria moises de Camilo Castelo Branco
 
Big6
Big6Big6
Big6
 
Estrategia de innovación de software
Estrategia de innovación de softwareEstrategia de innovación de software
Estrategia de innovación de software
 
China facebook
China facebookChina facebook
China facebook
 
不要等太久
不要等太久不要等太久
不要等太久
 
Apresentação1
Apresentação1Apresentação1
Apresentação1
 
Maria beatriz impress
Maria beatriz impressMaria beatriz impress
Maria beatriz impress
 
Diedrico puntoplano
Diedrico puntoplanoDiedrico puntoplano
Diedrico puntoplano
 

Semelhante a 50120140506003

Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksjake henry
 
Performance and statistical analysis of ant colony route in mobile ad-hoc ne...
Performance and statistical analysis of ant colony route in  mobile ad-hoc ne...Performance and statistical analysis of ant colony route in  mobile ad-hoc ne...
Performance and statistical analysis of ant colony route in mobile ad-hoc ne...IJECEIAES
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
 
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...IJECEIAES
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Editor IJCATR
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...IJCNCJournal
 
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...IJCNCJournal
 

Semelhante a 50120140506003 (20)

Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
20120130405026
2012013040502620120130405026
20120130405026
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
Performance and statistical analysis of ant colony route in mobile ad-hoc ne...
Performance and statistical analysis of ant colony route in  mobile ad-hoc ne...Performance and statistical analysis of ant colony route in  mobile ad-hoc ne...
Performance and statistical analysis of ant colony route in mobile ad-hoc ne...
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
 
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANET
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...
 
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...
 

Mais de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mais de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

50120140506003

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME 19 REVIEW OF DIFFERENT ROUTING PROTOCOL FOR MANET Ashwini Rajaram Jadhav M.E. Computer Engineering Student of Padmbhushan Vasantdada Patil Institute of Technology, Bavdhan, Pune-21, University of Pune Mr. Navanath Dattatray Kale Assistant Professor, Department of Computer Engineering, Padmbhushan Vasantdada Patil Institute of Technology, Bavdhan, Pune-21, University of Pune ABSTRACT Wireless channel link quality is the difference a challenging problem was until recently data communication Use this attribute in a similar exploration. Broadcast transmission can be regarded as quite different, And usually independently on the receiver by different geographic Locations. In addition, even the same stable receiver may over time, the combination of rigid link quality volatility experience. Broadcasting of quality variation with the nature of the link Wireless channel wireless research showed a direction networking, that is, cooperative communications. Research The cooperative started to attract interest in the communication on but recently its importance on community physical layer and realized on the upper layers of usability has also been Network protocol stack the lack of a fixed infrastructure in ad hoc networks implies that any computation on the network needs to be carried out in a decentralized manner thus, many of the important problems in ad hoc networking can be formulated as problems in distributed computing, and there are certain characteristics of ad hoc networks that make this study somewhat different than traditional work in distributed computing. In this review paper we point out various routing methods. Keywords: Mobile Ad Hoc Network, Routing Protocols, Channel Reuse, Delay Jitter. I. INTRODUCTION The proliferation of mobile computing and communication devices (e.g., cell phones, laptops, handheld digital devices, personal digital assistants, or wearable computers) is driving a revolutionary change in our information society. The nature of ubiquitous devices makes wireless INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME 20 networks the easiest solution for their interconnection and, as a consequence, the wireless arena has been experiencing exponential growth in the past decade. Mobile users can use their cellular phone to check e-mail, browse internet; travelers with portable computers can surf the internet from airports, railway stations, Starbucks and other public locations; tourists can use Global Positioning System (GPS) terminals installed inside rental cars to locate driving maps and tourist attractions, researchers can exchange files and other information by connecting portable computers via wireless LANs while attending conferences; at home, users can synchronize data and transfer files between portable devices and desktops. [1] The lack of a fixed Infrastructure in ad hoc networks implies that any computation on the network needs to be carried out in a decentralized manner. Thus, many of the important problems in ad hoc networking can be formulated as problems in distributed computing. However, there are certain characteristics of ad hoc networks that make this study somewhat different than traditional work in distributed computing.[2] Multi-hop wireless networks typically use routing techniques similar to those in wired networks These traditional routing protocols choose the best sequence of nodes between the source and destination, and forward each packet through that sequence. In contrast, cooperative diversity schemes proposed by the information theory community suggest that traditional routing may not be the best approach. Cooperative diversity takes advantage of broadcast transmission to send information through multiple relays concurrently. The destination can then choose the best of many relayed signals, or combine information from multiple signals. These schemes require radios capable of simultaneous, synchronized repeating of the signal, or additional radio channels for each relay [3] Recent and increased interest of wireless mobile ad hoc networking motivates detailed examination of routing schemes specifically targeted for the demanding constraints that an unreliable, time varying and broadcast like wireless medium imposes. Incorporation and exploitation of radio characteristics are fundamental keys to successful and near optimal operation of routing schemes in a wireless environment. [4] Wireless mesh networks are used increasingly for providing cheap Internet access everywhere. City-wide WiFi networks, however, need to deal with poor link quality caused by urban structures and the many interferers including local WLANs. For example, half of the operational links in Roofnet have a loss probability higher than 30%. Opportunistic routing has recently emerged as a mechanism for obtaining high throughput even when links are lossy, Opportunistic routing, however, introduces a difficult challenge. Multiple nodes may hear a packet broadcast and unnecessarily forward the same packet. [5] Network coding is a new research area that may have interesting applications in practical networking systems. With network coding, intermediate nodes may send out packets that are linear combinations of previously received information. Communication networks today share the same fundamental principle of operation. Whether it is packets over the Internet, or signals in a phone network, information is transported in the same way as cars share a highway or fluids share pipes. That is, independent data streams may share network resources, but the information itself is separate. Routing, data storage, error control, and generally all network functions are based on this assumption. [6] Vehicular networks can be seen as an example of hybrid delay tolerant network where a mixture of info stations and vehicles can be used to geographically route the information messages to the right location. In this paper we present a forwarding protocol which exploits both the opportunistic nature and the inherent characteristics of the vehicular network in terms of mobility patterns and encounters, and the geographical information present in navigator systems of vehicles. [7] Traditional MANET routing protocols are quite susceptible to link failure as well as vulnerable to malicious node attack. In this paper, we propose a novel protocol called Position based Opportunistic Routing (POR) which takes full advantage of the broadcast nature of wireless channel and opportunistic forwarding. The data packets are transmitted as a way of multicast (which is actually implemented by MAC interception) with multiple forwarders. [8] A new family of routing algorithms for the distributed maintenance of routing information in large networks and internets is
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME 21 introduced. This family is called link vector algorithms (LVA), and is based on the selective diffusion of link-state information based on the distributed computation of preferred paths, rather than on the flooding of complete link-state information to all routers. According to LVA, each router maintains a subset of the topology that corresponds to the links used by its neighbor routers in their preferred paths to known destinations. [9] Wireless industry has seen exponential growth in last couple of years. The advancement in growing availability of wireless networks and emergence of handheld computer, PDAs and Cell phones is now playing very important role in our daily routines. [10] This review paper demonstrates the impetus behind mobile ad hoc networks, and presents a representative collection of technology solutions used at the different layers of the network, in particular presenting algorithms and protocols unique to the operation and dynamic configuration of mobile ad hoc networks. III. REVIEW DIFFERENT MODELING AD HOC NETWORK In this article, we have some of the characteristic features of ad hoc networks review, formulate problems and research work done in the field of survey we focused on two basic problem domain: topology control, computing and network nodes maintain a connected between topology and routing problems. A 2-dimensional (or 3-dimensional) Euclidean space, where each dot represents a network node as a collection of points in an ad hoc network can model; Each node is characterized by its computational and communication power. A node in a wireless communication coding and computational power node can perform two major issues of encryption level. Characteristics of propagation communication networks the characteristics of radio channels and the environment, and the battery power and power control capabilities powered by individual nodes are we now elaborate on these issues Modelling at higher layers Radio propagation and interference models node locations and lack of transmission power, the ability to make a meaningful range of ad-hoc networks, can be used to get the physical layer parameters based on a model like although, designing and high layer protocol is cumbersome to use for analyzing a simple model that abstracts physical layer details away G is a graph in the Euclidean space as an ad hoc network (V-e) to represent the set of all nodes V is set set E is an edge node. If you can directly transmit TV before you To v; the path loss equation and a basic signal-to-noise ratio may be determined by the formula we transition graph refer to-ji. intervention can be modeled to a limited extent by the following assumption: you have a transmission with v only if no other node is able to lead the v ~ v and send it along with the essentially models that packet Radio networks (PRNs) has been used to study; pp ~ N model, as described above, Assumes that each node is an ad-hoc network is always the same transmission transmits power. Modern mobile wireless units’ need their transmission power transmission, subject to a maximum limit is the ability to adjust accordingly. Reduces interference control such power, mobile units, and therefore conserves battery power channel bandwidth allows for better use. If we mentioned in the last paragraph as transmission using Graph-ji Networks represent There is a node w v that is transmitting at the same time, we have an adjacent node successfully transmitting to, u too; It might be because can be found on the power transmission against receiving power on against very small compared to you transmission, which you are transmitting and w at that time due to the different levels.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME 22 Mobility Mobility in ad hoc networks are two approaches to modeling a approach often used in simulations, direction and speed of motion of a node is a node mobility vector model as each node independently over a period of time after which its dynamics a new random vector is assigned, Defines mobility vector picks. Models group movement, whereby a group of nodes can move in the same general direction also recently studied a theoretical analysis, Mobility, as detailed models are difficult to work with. Instead, the dynamics underlying transmission can be represented by the graph changes. for example, we work in a primary transmission graph changes need to be made when considering the amount of robustness of an ad-hoc network routing protocol by analysis; That is, when an edge is removed or added to a node in the neighborhood changes. Topology control An ad hoc network is not an associated topology that lack a central infrastructure implies. in fact, an appropriate topology which are applied more high level routing protocols to determine if an ad-hoc network consisting of geographically dispersed nodes is an important task in this section we topology control, An ad hoc network in a suitable topology, consider the problem of determining v to denote the graph and let denote the collection of nodes V which is one of the edge node in node v in there for you if you can directly reach if v. T topology control algorithm returned by topology t denote the quality of connectivity., Energy efficiency, throughput and robustness for according to several criteria including the dynamics can be evaluated in the remainder of this section, we elaborate on these measures. Connectivity and energy-efficiency Perhaps, the most basic of a topology requires that it be connected. more precisely, we require that any two nodes that are attached to the axe-ji. Also associated routing protocols for network topology T forms, that there's potential energy-efficient path exists between a source destination pair is desirable. a perception of energy efficiency power factor, which we now define stress.., as discussed in section 2, and v. To determine energy path with the edges of the sum of the energy used to be along a path used for delivering a packet and the distance between a polynomial function is a transmission from you to v so consumed energy, two nodes u and v, EC (, V) (resp., et al. (U, v)) and-ji (resp., T) v minimum energy paths between the energy we now denote the maximum, over all T's energy to be set up and stretch factor v, e ~ (u, v)/ET (u, v), Quality power stretch factor similar to a perception of hop hop-count ratio factor which stretch. Instead of energy that way. Throughput Connectivity and energy efficiency, with high capacity or throughput, we would like a topology; that is any other satisfying constraints in topology topology as, "more than traffic" should be possible to route network features depending on whether studies are being done and traffic patterns, is believed to be a different way to formalize the notion of a ad-hoc network throughput. Robustness to mobility An additional challenge in the design of distributed topology control algorithms is to ensure some degree of robustness to the mobility of nodes. One measure of robustness of the topology is given by the maximum number of nodes that need to change their topology information as a result of a movement of a node. This number, which may be referred to as the adaptability of the topology control algorithm, depends on the size of the transmission neighbourhood of the mobile node u, and the relative location of the nodes. The topology control algorithms based on proximity graphs all
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME 23 have low adaptability, since a change in a node location will only require the nodes in its neighbourhood (both old and new) to recomputed their edges in the topology. IV. DIFFERENT ROUTING METHODS Wireless Sensor Networks (WSNs) consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing, power management, and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issue. The focus, however, has been given to the routing protocols which might differ depending on the application and network architecture. In this paper, we present a survey of the state-of-the-art routing techniques in WSNs. We first outline the design challenges for routing protocols in WSNs followed by a comprehensive survey of different routing techniques. Overall, the routing techniques are classified into three categories based on the underlying network structure: 1. Flat 2. Hierarchical 3. Location-based routing. Furthermore, these protocols can be classified into multipath-based, query-based, negotiation- based, QoS-based, and coherent-based depending on the protocol operation. Figure 1: Routing Protocols in WSN Routing protocols In the previous section, we considered the design of topologies that have certain desirable properties in terms of connectivity, energy-efficiency, and throughput. We now consider the design of routing schemes that harness these properties. We note that while the presentation in this article follows the approach of separating the network design and routing scheme design components, the two components are closely intertwined. The choice of the particular topology control algorithm may
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME 24 have a strong impact on the choice of the routing scheme. Since the topology is constantly changing, the routing scheme has to be robust to changes in topology. Flat routing protocols For an ad hoc network, given a topology, represented by an undirected graph G = (V, E), a routing scheme has to select paths between source destination pairs in much the same manner as in wired networks. Two paradigms that underlie Internet routing protocols are Distance Vector (DV) and Link State (LS) algorithms. Both DV and LS algorithms require continual exchange of global routing information. This enables the individual nodes of the network to maintain a close approximation of the current network map at every instant. For ad hoc networks, proactive routing protocols follow the DV or LS paradigm and attempt to keep routing information for all the nodes up to date, e.g., OLSR, DSDV. When the topology of an ad hoc network is under constant flux, however, LS generates large number of link state changes, while DV algorithms frequently suffer from out of date state. The size of the network and the mobility of the nodes are two hurdles in the design of scalable routing protocols. For example, the DSDV protocol has O(1) stretch but requires each node to store an O(n)-size distance vector; one consequence of the latter memory overhead is that the adaptability of the network is high since all distance vectors may need to be updated when a node moves. In contrast to proactive algorithms, reactive routing protocols cache topological information and update the cached information on-demand. Reactive protocols avoid the prohibitive cost of routing information maintenance of proactive protocols, and tend to work well in practice. While the idea of aggressive caching and occasional update results in good average performance, the worst- case latency could be high. Hierarchical routing protocols The idea of one-level clustering can be easily generalized to multilevel hierarchical network decomposition. Indeed, this is an old concept in networking dating back to the 70s. While many of the hierarchical routing protocols were originally designed for fixed networks, they are applicable, with suitable modification, for ad hoc networks. The main idea of hierarchical routing is to organize the network as a hierarchy of nested clusters of nodes. Each node of the network is a level-0 cluster. The level-i clusters are grouped together into a certain number of level-i + 1 clusters, for i > 0. In the most basic clustering, one assumes that all level-i clusters are disjoint; many routing protocols use overlapping clusters to provide fault-tolerance and make the protocol more adaptive to dynamic network changes. A hierarchical control structure enforces a hierarchical addressing on the network nodes, which can form the basis of a routing scheme. In a typical routing scheme, each cluster elects certain leaders within the cluster, which obtain and represent network state information at multiple levels of granularity. Routing can be performed by forwarding the given packet to a leveL/cluster which contains the destination node, successively for decreasing value of i, until the packet reaches a level-0 cluster containing the destination, which is the destination itself. Routing protocols differ in the precise mechanism by which network state information is gathered and the particular paths used in the routing process. The hierarchical control structures on which different routing protocols are based differ in the number m of levels of the hierarchy, the size and diameter of the clusters at different levels of the hierarchy, and amount of overlap among the clusters. The different choices lead to a natural trade off between memory overhead and the stretch factor. Reviews several practical hierarchical clustering protocols proposed for ad hoc networks. Most of these protocols rely on heuristics and, as such, do not provide provable worst-case guarantees.
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME 25 Geographic routing protocols A recent approach to designing simple protocols that keep overhead small is to exploit the underlying geometry (and geography) of the ad hoc network locations, in the Greedy Perimeter Stateless Routing (GPSR) protocol, each node only maintains information about their "neighbourhood", which is the set of nodes that the node can directly reach. Using positioning information, the source node greedily passes a given packet to a neighbour that is closest to the destination; if greedy forwarding is impossible, and then the packet is forwarded along a perimeter of the region to reach the destination. While GPSR guarantees connectivity, the best bound on the stretch of the protocol is f~ (n). GPSR is however, adaptive to node mobility since the nodes maintain neighbourhood information only. As such, GPSR does not take into account energy efficiency. An even simpler approach than GPSR is to use the O-graph. The O-graph not only defines a topology but also directly yields a simple routing protocol with O(1) stretch and O(1) memory overhead; the memory overhead is constant since each node needs to store the coordinates of the nearest node in each of a constant number of sectors. This approach is used in for routing in the plane. The worst-case adaptability of the routing scheme is at least the maximum in-degree of a O-graph, which may be large; consequently, the movement of a single node may require updates in a large number of nearby nodes. One approach to alleviate this problem is to use the constant-degree variants of the O-graph, as discussed in Section 3. Unfortunately, while the topology control algorithms based on these variants guarantee the existence of energy-efficient paths, a constructive mechanism for calculating these paths in a distributed manner is not known. Adversarial model A second framework for analyzing ad hoc network routing algorithms is the adversarial model, first developed in and subsequently enhanced in several recent studies. In the context of ad hoc networks, we can model mobility and traffic patterns using an adversary. Mobility can be modelled by allowing the adversary to activate/deactivate network edges; arbitrary traffic patterns Can be modelled by allowing the adversary to determine the rate of packet arrival and the source destination pairs for each packet, we describe here the most general adversarial model considered thus far. In this model, the adversary is allowed to inject packets at arbitrary nodes at arbitrary times and can activate an arbitrary number of incoming or outgoing edges subject to a maximum degree bound z~ for each node. The destination for the each packet is also selected by the adversary. There is one more constraint, that the buffer size of each node is limited to a value B. If at any time, the number of packets in a buffer exceeds B then the excess packets have to be dropped. The adversarial control of the network topology is intended to model the dynamic nature of an ad hoc network in which edges may appear and disappear over time. We assume that no packets are lost; furthermore the model does not cover malicious faults in the sense that it is implicitly assumed that all of the nodes faithfully execute a given routing protocol. The adversarial control of packet injection models the dynamic and unpredictable nature of network traffic. LEACH protocol Heinzelman introduced a hierarchical clustering algorithm for sensor networks, called Low Energy Adaptive Clustering Hierarchy (LEACH). LEACH is a cluster-based protocol, which includes distributed cluster formation. LEACH randomly selects a few sensor nodes as cluster heads (CHs) and rotates this role to evenly distribute the energy load among the sensors in the network. In LEACH, the cluster head (CH) nodes compress data arriving from nodes that belong to the respective cluster, and send an aggregated packet to the base station in order to reduce the amount of information that must be transmitted to the base station. LEACH uses a TDMA/CDMA MAC to reduce inter-cluster and intra-cluster collisions. However, data collection is centralized and is performed periodically. Therefore, this protocol is most appropriate when there is a need for constant
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME 26 monitoring by the sensor network. A user may not need all the data immediately. Hence, periodic data transmissions are unnecessary which may drain the limited energy of the sensor nodes. After a given interval of time, a randomized rotation of the role of the CH is conducted so that uniform energy dissipation in the sensor network is obtained. The authors found, based on their simulation model that only 5% of the nodes need to act as cluster heads. Table 1: Hierarchical routing Vs Flat routing Hierarchical routing Flat routing Reservation-based scheduling Contention-based scheduling Collisions avoided Collision overhead present Reduced duty cycle due to periodic sleeping Variable duty cycle by controlling sleep time of nodes Data aggregation by cluster head node on multihop path aggregates incoming data from neighbors Simple but non-optimal routing Routing can be made optimal but with an added complexity. Requires global and local synchronization Links formed on the fly without synchronization Overhead of cluster formation throughout the network Routes formed only in regions that have data for transmission Lower latency as multiple hops network formed by Cluster heads always available Latency in waking up intermediate nodes and setting up the multipath Energy dissipation is uniform Energy dissipation depends on traffic patterns Energy dissipation cannot be controlled Energy dissipation adapts to traffic pattern Fair channel allocation Fairness not guaranteed Location based routing protocol In this kind of routing, sensor nodes are addressed by means of their locations. The distance between neighboring nodes can be estimated on the basis of incoming signal strengths. SPAN Another position based algorithm called SPAN selects some nodes as coordinators based on their positions. The coordinators form a network backbone that is used to forward messages. A node should become a coordinator if two neighbors of a non-coordinator node cannot reach each other directly or via one or two coordinators (3 hop reach ability). New and existing coordinators are not necessarily neighbors in, which, in effect, makes the design less energy efficient because of the need to maintain the positions of two or three hop neighbors in the complicated SPAN algorithm. VI. CONCLUSION This review paper we discuss several routing patterns and we said that there are many ad hoc network routing protocols, fixed Protocol originally proposed variations-connection in the network design. We hope that peer-to-peer computing, with the arrival of two will tolerate any strong connection problem domain; Peer-to-peer network, many of the same concerns ad-hoc network share with, for example, need to change quickly is continuous and intensive systems to optimize the Organization of decentralized.
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 19-27 © IAEME 27 VII. REFERENCES [1] I. Chlamtac, M. Conti, and J.-N. Liu, “Mobile Ad hoc Networking: Imperatives and Challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13– 64, July 2003. [2] R. Rajaraman, “Topology Control and Routing in Ad hoc Networks: A Survey,” SIGACT News, vol. 33, pp. 60–73, June 2002. [3] S. Biswas and R. Morris, “ExOR: Opportunistic Multi-Hop Routing for Wireless Networks,” in Proc. ACM Conference of the Special Interest Group on Data Communication (SIGCOMM), Philadelphia, PA, USA, August 2005, pp. 133–144. [4] P. Larsson, “Selection Diversity Forwarding in a Multihop Packet Radio Network With Fading Channel and Capture,” ACM Mobile Computing and Communications Review, vol. 5, no. 4, pp. 47–54, October 2001. [5] S. Chachulski, M. Jennings, S. Katti, and D. Katabi, “Trading Structure for Randomness in Wireless Opportunistic Routing,” in Proc. ACM Conference of the Special Interest Group on Data Communication(SIGCOMM), Kyoto, Japan, August 2007, pp. 169–180. [6] C. Fragouli, J.-Y. L. Boudec, and J. Widmer, “Network Coding: an Instant Primer,” SIGCOMM Computer Communication Review, vol. 36,pp. 63–68, January 2006. [7] I. Leontiadis and C. Mascolo, “GeOpps: Geographical Opportunistic Routing for Vehicular Networks,” in Proc. IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM), Helsinki, Finland, June 2007, pp. 1–6. [8] S. Yang, F. Zhong, C. K. Yeo, B. S. Lee, and J. Boleng, “Position Based Opportunistic Routing for Robust Data Delivery in MANETs,” in Proc. 2009 IEEE Conference on Global Telecommunications (GLOBECOM), Honolulu, Hawaii, USA, December 2009, pp. 1325–1330. [9] J. Behrens and J. J. Garcia-Luna-Aceves, “Distributed, Scalable Routing based on Link-State Vectors,” in Proc. ACM SIGCOMM, 1994, pp. 136–147. [10] S. Murthy and J. J. Garcia-Luna-Aceves, “An Efficient Routing Protocol for Wireless Networks,” Mobile Networks and Applications, vol. 1, no. 2, pp. 183–197, October 1996. [11] Aarti Bairagi and Shweta Yadav, “A New Parameter Proposed for Route Selection in Routing Protocol for Manet”, International Journal of Information Technology and Management Information Systems (IJITMIS), Volume 4, Issue 1, 2013, pp. 31 - 37, ISSN Print: 0976 – 6405, ISSN Online: 0976 – 6413. [12] Sunita Kushwaha, Bhavna Narain, Deepti Verma and Sanjay kumar, “Effect of Scenario Environment on the Performance of Manets Routing Protocol: AODV”, International Journal of Computer Engineering & Technology (IJCET), Volume 2, Issue 1, 2011, pp. 33 - 38, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [13] V.Ramesh and Dr.P.Subbaiah, “Energy Efficient Preemptive Dynamic Source Routing Protocol for Manet”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 213 - 222, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [14] Taniya Jain and Neeti Kashyap, “Factors for Designing Routing Protocol in Manet”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 5, 2013, pp. 189 - 193, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [15] Saloni Singla and Tripatjot Singh Panag, “Evaluating the Performance of Manet Routing Protocols”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 4, Issue 1, 2013, pp. 125 - 130, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. [16] Thaker Minesh, S B Sharma and Yogesh Kosta, “A Survey: Variants of Energy Constrained Reactive Routing Protocols of Mobile Ad Hoc Networks”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 2, 2012, pp. 248 - 257, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. [17] M. Ahmed, S. Yousef and Sattar J Aboud, “Bidirectional Search Routing Protocol for Mobile Ad Hoc Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 229 - 243, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.