SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 14, Issue 1 (Sep. - Oct. 2013), PP 77-83
www.iosrjournals.org
www.iosrjournals.org 77 | Page
Channel Fading Detection in Manets with Hand off Strategy
G.Vani Prasanna,G.Lakshmi Narayana
Annamacharya Institute of Technology and Sciences, Tirupati
Abstract: In wireless mobile ad hoc networks (MANETs), packet transmission is impaired by radio link
fluctuations. This paper proposes a novel channel adaptive routing protocol which extends the Ad hoc On-
Demand Multipath Distance Vector (AOMDV) routingprotocol to accommodate channel fading. Specifically,
the proposed Channel-Aware AOMDV (CA-AOMDV) uses the channel averagenonfading duration as a routing
metric to select stable links for path discovery, and applies a preemptive handoff strategy to maintainreliable
connections by exploiting channel state information. Using the same information, paths can be reused when they
become available again, rather than being discarded. We provide new theoretical results for the downtime and
lifetime of a live-die-live multiplepath system, as well as detailed theoretical expressions for common network
performance measures, providing useful insights into thedifferences in performance between CA-AOMDV and
AOMDV. Simulation and theoretical results show that CA-AOMDV has greatly improved network performance
over AOMDV
Keywords: Mobile ad hoc networks, routing protocols, channel adaptive routing
I. Introduction
Wireless mobile ad hoc networks (MANETs) are self configuring, dynamic networks in which nodes
are free to move. A major performance constraint comes from path loss and multipath fading .Many MANET
routing protocols exploit multi hop paths to route packets. The probability of successful packet transmission on
a path is dependent on the reliability of the wireless channel on each hop. Rapid node movements also affect
link stability ,introducing a large Doppler spread, resulting in rapid channel variations .Routing protocols can
make use of prediction of channel state information (CSI) based on a priori knowledge of channel
characteristics, to monitor instantaneous link conditions. With knowledge of channel behavior, the best links can
be chosen to build a new path, or switch from a failing connection to one with more favorable channel
conditions. adaptive routing.Inthispaper,weintroduceanenhanced, channel-awareversion of the AOMDV routing
protocol. The key aspect ofthis enhancement, which is not addressedinother work, isthat we use
specific,timely,channelqualityinformationallowing us to work with the ebb-and-flow ofpathavailability.This
approach allows reuse of pathswitchbecomeunavailable for a time, rather than simply regarding them asuseless,
upon failure,anddiscardingthem.Weutilizethechannelaveragenonfading duration (ANFD) as a measure oflink
stability,combined with the traditional hop-countmeasure for path selection. The protocol then uses the
sameinformation topredictsignalfading and incorporates pathhandover to avoid unnecessaryoverhead from a
new pathdiscovery process. Theaveragefadingduration (AFD) isutilized to determine when to bring a path back
into play,allowing for the varying nature of path usability instead
ofdiscardingatinitialfailure.Thisprotocolprovidesadualattackfor avoiding unnecessary out
discoveries,predictingpathfailure leading to handoff and then bringing paths backintoplaywhen they are again
available, rather than simplydiscarding them at the first sign of a fade.
II. Existing System
In the existing system packet transmission is impaired by radio link fluctuations. Here the paths can
not be used when it is available it should be discarded when the time is expired and a new route discover
process must be undertaken. Path stability is completely ignored. Thus, selected paths tend to have a small
number of longhops meaning that nodes are already close to the maximum possible communication distance
.Here it provides unnecessary route discoveries and it does not predict the path failure. Maximum number of
disconnections, high transmission latency and packet drop
1.AD-HOC ON DEMAND DISTENCE VECTOR(AODV)
1.1Advantages
AODV is a reactive protocol: the routes are created only when they are needed. It uses traditional
routing tables, one entry per destination, and sequence numbers to determine whether routing information is up-
to-date and to prevent routing loops .An important feature of AODV is the maintenance of time-based states in
each node: a routing entry not recently used is expired. In case of a route is broken the neighbors can be notified.
Route discovery is based on query and reply cycles, androute information is stored in all intermediate nodes
Channel Fading Detection In Manets With Hand Off Strategy
www.iosrjournals.org 78 | Page
alongthe route in theformofroutetableentries.Thefollowingcontrol packets are used: routing request message
(RREQ) is broadcasted by a node requiring aroutetoanothernode, routing reply message (RREP) is unicasted
back to the source of RREQ, and route error message (RERR) is sent to notify other nodes of the loss of the
link.
1.2 Drabacks of aodv
It is possible that a valid route is expired. Determining of a reasonable expiry time isdifficult,because
thenodes are mobile, and sources’ sending rates maydifferwidely and can change dynamically from nodetonode.
Moreover, cangatheronlyaverylimitedamountofroutinginformation, route learning is limited only to the
sourceofanyroutingpackets being forwarded. This causes AODV to rely on a route discovery flood
moreoften,whichmaycarrysignificant network overhead. uncontrolled flooding generates many
redundanttransmissionswhichmaycausesocalledbroadcaststormproblem.
2. Adhoc Ondemand Multipath Distence Vector Routing(Aomdv) :
2.1Advantages
Ad-hoc On-demand Multipath DistanceVectorRouting(AOMDV) protocol
isanextensiontotheAODVprotocolforcomputingmultipleloopfreeandlinkdisjointpaths.Theroutingentriesforeachd
estination contain a list of the next-hops along with the corresponding hop counts. All the next hops have the
samesequencenumber. This helps in keeping track of a route. For each destination, a node maintains the
advertised hop count, which is defined as the maximum hop count for all thepaths,whichisusedforsending
routeadvertisementsofthedestination.
2.2 Disadvantages of aomdv
AOMDV istheuseofalargenumberofcontrolpacketsforcalculating and maintaining multiple routesbetweena Source
anddestination nodes.AdhocOnDemandMultipathDistance Vector(AOMDV)routingprotocolwillaccommodatechannelfading
CHANNEL FADING
Figure-1 Multipath fading channel
MANET – MOBILE AD-HOC NETWORKS
Figure-2 Ad hoc wireless networks are self-creating, self-organizing, and self-administrating networks
Channel Fading Detection In Manets With Hand Off Strategy
www.iosrjournals.org 79 | Page
mobile Ad-hoc Networks (MANETs) we mean wireless hop networks formed by a set of mobile nodes without
relying on a pre existing infrastructure. Each node in a MANET acts as a router, forwarding data packets to
other nodes. Since the topology of MANET is time-varying, unstable radio links among nodes may easily
happen due to difficult to predicting the coverage pattern and mobility models, etc. Many of the routing
protocols rely on the multi-hop routing paths for packet transmission. Node movements also affect the link
stability. Routing protocols can make use of prediction of channel state information based on the prior
knowledge of the channels. Several channel adaptive schemes have been developed for MANETs to maintain
the stability. In channel adaptive schemes can be implemented in medium access control (MAC) protocols.
III.Ad-Hoc Networks
Figure-3 peer-to-peer communication
An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required
intervention of any centralized access point or existing infrastructure. In this paper Ad-hoc On Demand Distance
Vector Routing (AODV), a novel algorithm for the operation of such ad-hoc networks is presented. Each
Mobile Host operates as a specialized router, and routes are obtained as needed (i.e., on-demand) with little or
no reliance on periodic advertisements. This new routing algorithm is quite suitable for a dynamic self starting
network, as required by users wishing to utilize ad-hoc networks. AODV provides loop-free routes even while
repairing broken links. Because the protocol does not require global periodic routing advertisements, the
demand on the overall bandwidth available to the mobile nodes is substantially less than in those protocols
IV.Proposed System (Ca-Aomdv)
Here paths can be reused when they become available again, rather than being discarded.Using
prediction and handoff to preempt fading on a link on the active path, disconnections can be minimized,
reducing transmission latency and packet drop rate.This protocol provides a dual attack for avoiding
unnecessary route discoveries, predicting path failure leading to handoff.All nodes maintain a table of past
signal strengths, recording for each received packet, previous hop, signal power, and arrival time.A key factor
deciding the performance of a routing protocol in mobile ad hoc networks is the manner in which it adapts to
route changes caused by mobility.
Exploiting the intuition that a lessdynamic route losts longer, a new metric, the Route Fragility
Coefficient(RFC), to compare routes is proposed. RFC estimates the rate at which a given route expandsor
contracts. Expansion refers to adjacent nodes moving apart, while contraction refers to their moving closer. RFC
combines the individual link contraction or expansion behavior to present a unified picture of the route
dynamics. It is shown that lower the value of RFC, more static (less fragile) the route. Then this metric is used
as a basis for route selection so that route discovery yields routes that last longer and hence increase throughput
while reducing control overhead. A simple distributed mechanism to compute RFC is provided,
V. Comparison Of Routing Table Entry
Channel Fading Detection In Manets With Hand Off Strategy
www.iosrjournals.org 80 | Page
V I.Route Maintenance In Ca-Aomdv
In mobile environments, it is necessary to find efficientways of addressingpathfailure.Usingprediction
andhandoff to preempt fading on a link on the active path,disconnections can be minimized, reducing
transmissionlatency and packet drop rate Route maintenance in CA-AOMDV takes advantage of ahandoff
strategy using signal strength predictionto counter channel fading. When thepredicted link signal strength level
falls below a networkspecificthreshold, the algorithm swaps to a good-qualitylink. The fading thesignal is
chosenso as to providerobustness to prediction errors. The presence of multipleusers experiencing independent
channel fading means thatMANETs cantake advantage ofchannel diversity, unlikedata rate adaptation
mechanisms such as SampleRate All nodes maintain a table of past signal strengths,recording for each received
packet, Ideally, there will be M packetswhere M is the required number of past samples from.However, this will
depend on the packet receipt timescompared with the specified discrete time interval, _t. Ifpackets are received
at time intervals greater than _tsample signal strengths for the missed time intervals can beapproximated by the
signal strength of the packet closest intime to the one missed. If packets are received at intervals ofshorter
duration than _t, some maybeskipped.Anexample of handoff in CA-AOMDV is shown in Fig. 4.The handoff
process is implemented via
a handoff request (HREQ) packet.
Figure.4Handoff inCA-AOMDV
VII.Theoretical Analysis
A framework is now presented to analyze the performances of AOMDV and CA-AOMDV.The
probability density functions (PDFs) of the lifetimes of a single path and multiple paths are derived and the
performances in terms of routing control overhead and network throughput are analyzed.
VIII .Ca-Aomdv/Aomdv Performence Anlysis
We now determineexpressions for routing control overheadand packet delivery ratio. If Φd
is the
average delay for aRoute discovery and E{Z} is the average path system lifetime, then (E{Z} Φd) represents the
averageTime between two successive route discoveries per ns-ndpair. Let Ω be the number of route discoveries
per second,
In CA-AOMDV and AOMDV, when ns needs a path to nd, itbroadcasts a RREQ. nd, or any intermediate node
which hasa fresh enough path to nd, feeds a RREP back to ns to establish the path. We can approximate as:
where tqis the one-hop propagation time of a RREQ,andtp is the one-hop propagation time of a RREP. WithC
connections in the network, each lasting an average ofT seconds, the average number of route discovery
processes overtime T is equal to:
Channel Fading Detection In Manets With Hand Off Strategy
www.iosrjournals.org 81 | Page
IX. System Design
Figure-5 system design
The channel fading is detected before fading occurs. This is done by sensing the channel. A node along the path
fails, causing other nodes to fail or the rear collisions along the path. Wireless access describes about thebasic
communication takes place in a wireless network. The diagram explains the communication in a wireless
network. Network Selection will monitor the total network and report to base station. System monitor is
controlled by the base station to monitor the mobile host. Path maintenance maintains the path between
communicating mobile hosts Mobile host will communicate some other mobile host within the local area or
wide area. While the mobile host transmitting the data, the network monitor will monitor the total network, link
state will monitor the state of
the link between the two mobile hosts which are communicating and it is controlled by base station directly.
X.-Modules Of The Ca-Aomdv
AOMDV protocol for MANETs contains three design modules, they are Wireless Access, Fading
Detection, Network Selection
WIRELESS ACCESS
Wireless access module describes how the basic communication takes place in a wireless network. The
fig.6 explains the communication in a wireless network.
Figure-6 wireless access
In this diagram the correspondent host controls the home network. Home agent communicates with Mobile host.
If the home agent wants to communicate with a mobile host within the local area means, it will communicate
through local multicast group i.e base station in local area. If home agent wants to communicate with a mobile
host within the wide area means, it will communicate through wide area base station. Mobile host can
communicate directly with home agent
FADING-DETECTION
Channel Fading Detection In Manets With Hand Off Strategy
www.iosrjournals.org 82 | Page
Figure-7 In the above diagram, the base station will control the local area. Mobile host will communicate some
other mobile host within the local area or wide area. While the mobile host transmitting the data, the network
monitor will monitor the total network,
NETWORK SELECTION
Figure- 8In this diagram, the base station controls the total network. Network monitor will monitor the total
network
XI. Simulation Results
XII.Conclusion
A channel-based routing metric is proposed which utilizes the average nonfading duration, combined with hop-
count, to select stable links. A channel-adaptive routing protocol, CA-AOMDV, extendingAOMDV, based on
this proposed routing metric, is introduced.During path maintenance,predicted signal strength and channel
average fading duration are combined with handoff to combat channel fading and improve channel utilization
Channel Fading Detection In Manets With Hand Off Strategy
www.iosrjournals.org 83 | Page
References
BOOKS:
[1] W.C. Jakes, Microwave Mobile Communications, second ed. Wiley Interscience, 2001.
[2] G.L. Stuber, Principles of Mobile Communication, second ed. KluwerAcademic, 2001.
[3] S. Jain and S.R. Das, “Exploiting Path Diversity in the Link Layerin Wireless Ad Hoc Networks,” Proc. Sixth IEEE Int’l Symp.
Worldof Wireless Mobile and Multimedia Networks (WoWMoM), pp. 22-30,June 2005.
JOURNAL PAPERS:
[4] P. Pham, S. Perreau, and A. Jayasuriya, “New Cross-Layer DesignApproach to Ad Hoc Networks under Rayleigh Fading,” IEEEJ.
Selected Areas in Comm., vol. 23, no. 1, pp. 28-39, Jan. 2005.
[5] C. Toh, “Associativity-Based Routing for Ad-Hoc Mobile Networks,”Wireless Personal Comm., vol. 4, pp. 103-139, Nov. 1997.
[6] H. Zhang and Y.N. Dong, “Mobility Prediction Model Based LinkStability Metric for Wireless Ad Hoc Networks,” Proc. Int’l
Conf.Wireless Comm., Networking and Mobile Computing (WiCOM), pp. 1-4, Sept. 2006.
[7] O. Tickoo, S. Raghunath, and S. Kalyanaraman, “Route Fragility:A Novel Metric for Route Selection in Mobile Ad Hoc
Networks,”Proc. IEEE Int’l Conf. Networks (ICON), pp. 537-542, Sept. 2003.
[8] S. Biswas and R. Morris, “ExOR: Opportunistic Multi-HopRoutingforWirelessNetworks,”ACMSIGCOMMComputerComm. Rev.,
vol. 35, no. 4, pp. 133-144, Aug. 2005.
[9] R. Dube, C. Rais, K.Y. Wang, and S.K. Tripathi, “Signal Stability-Based Adaptive Routing (SSA) for Ad Hoc Networks,”
IEEEPersonal Comm., vol. 4, no. 1, pp. 36-45, Feb. 1997
[10] M. Park, J. Andrews, and S. Nettles, “Wireless Channel-AwareAd Hoc Cross-Layer Protocol with Multiroute Path Selection

Más contenido relacionado

La actualidad más candente

Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANETEditor IJCATR
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetIAEME Publication
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
 
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...IOSR Journals
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...IRJET Journal
 
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVA Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVEditor IJMTER
 
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...ijujournal
 
Performance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networksPerformance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networksijujournal
 
Performance Evaluation of Routing Protocols for MAC Layer Models
Performance Evaluation of Routing Protocols for MAC Layer ModelsPerformance Evaluation of Routing Protocols for MAC Layer Models
Performance Evaluation of Routing Protocols for MAC Layer ModelsIOSR Journals
 
Execution Evaluation of Routing Protocols for Cognitive Radio Network
	Execution Evaluation of Routing Protocols for Cognitive Radio Network	Execution Evaluation of Routing Protocols for Cognitive Radio Network
Execution Evaluation of Routing Protocols for Cognitive Radio NetworkIJSRED
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...IRJET Journal
 
Eng. moaath alshaikh, dr. eng. akram almorie, performance evaluation of multi...
Eng. moaath alshaikh, dr. eng. akram almorie, performance evaluation of multi...Eng. moaath alshaikh, dr. eng. akram almorie, performance evaluation of multi...
Eng. moaath alshaikh, dr. eng. akram almorie, performance evaluation of multi...Moaath alshaikh
 

La actualidad más candente (17)

Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANET
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
 
G0943745
G0943745G0943745
G0943745
 
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVA Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
 
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
 
Performance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networksPerformance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networks
 
Performance Evaluation of Routing Protocols for MAC Layer Models
Performance Evaluation of Routing Protocols for MAC Layer ModelsPerformance Evaluation of Routing Protocols for MAC Layer Models
Performance Evaluation of Routing Protocols for MAC Layer Models
 
Execution Evaluation of Routing Protocols for Cognitive Radio Network
	Execution Evaluation of Routing Protocols for Cognitive Radio Network	Execution Evaluation of Routing Protocols for Cognitive Radio Network
Execution Evaluation of Routing Protocols for Cognitive Radio Network
 
Jj3416911698
Jj3416911698Jj3416911698
Jj3416911698
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
J0935461
J0935461J0935461
J0935461
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...
 
Eng. moaath alshaikh, dr. eng. akram almorie, performance evaluation of multi...
Eng. moaath alshaikh, dr. eng. akram almorie, performance evaluation of multi...Eng. moaath alshaikh, dr. eng. akram almorie, performance evaluation of multi...
Eng. moaath alshaikh, dr. eng. akram almorie, performance evaluation of multi...
 

Destacado

Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...IOSR Journals
 
A Modified Novel Approach to Control of Thyristor Controlled Series Capacitor...
A Modified Novel Approach to Control of Thyristor Controlled Series Capacitor...A Modified Novel Approach to Control of Thyristor Controlled Series Capacitor...
A Modified Novel Approach to Control of Thyristor Controlled Series Capacitor...IOSR Journals
 
Secured E-Learning Content on USB/HDD Device
Secured E-Learning Content on USB/HDD DeviceSecured E-Learning Content on USB/HDD Device
Secured E-Learning Content on USB/HDD DeviceIOSR Journals
 
Báo cáo thực tập phạm thị huyền trang new
Báo cáo thực tập phạm thị huyền trang newBáo cáo thực tập phạm thị huyền trang new
Báo cáo thực tập phạm thị huyền trang newTrang Xebit
 
A framework for an Operating System-based Mobile Agent Interoperability
A framework for an Operating System-based Mobile Agent InteroperabilityA framework for an Operating System-based Mobile Agent Interoperability
A framework for an Operating System-based Mobile Agent InteroperabilityIOSR Journals
 
An Explanatory Analysis of the Economic and Social Impact of Corruption in Zi...
An Explanatory Analysis of the Economic and Social Impact of Corruption in Zi...An Explanatory Analysis of the Economic and Social Impact of Corruption in Zi...
An Explanatory Analysis of the Economic and Social Impact of Corruption in Zi...IOSR Journals
 
De-virtualizing virtual Function Calls using various Type Analysis Technique...
De-virtualizing virtual Function Calls using various Type  Analysis Technique...De-virtualizing virtual Function Calls using various Type  Analysis Technique...
De-virtualizing virtual Function Calls using various Type Analysis Technique...IOSR Journals
 
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...IOSR Journals
 
Compromising windows 8 with metasploit’s exploit
Compromising windows 8 with metasploit’s exploitCompromising windows 8 with metasploit’s exploit
Compromising windows 8 with metasploit’s exploitIOSR Journals
 
Assessment of Serum Gonadotrophins and Prolactin Hormone Levels in In Vitro F...
Assessment of Serum Gonadotrophins and Prolactin Hormone Levels in In Vitro F...Assessment of Serum Gonadotrophins and Prolactin Hormone Levels in In Vitro F...
Assessment of Serum Gonadotrophins and Prolactin Hormone Levels in In Vitro F...IOSR Journals
 
Enhancing the NS-2 Traffic Generator for the MANETs
Enhancing the NS-2 Traffic Generator for the MANETsEnhancing the NS-2 Traffic Generator for the MANETs
Enhancing the NS-2 Traffic Generator for the MANETsIOSR Journals
 
Google frowns on reciprocal linking
Google frowns on reciprocal linkingGoogle frowns on reciprocal linking
Google frowns on reciprocal linkingbelieve52
 
Diapos staditik
Diapos staditikDiapos staditik
Diapos staditikllopezy
 

Destacado (20)

Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
 
A Modified Novel Approach to Control of Thyristor Controlled Series Capacitor...
A Modified Novel Approach to Control of Thyristor Controlled Series Capacitor...A Modified Novel Approach to Control of Thyristor Controlled Series Capacitor...
A Modified Novel Approach to Control of Thyristor Controlled Series Capacitor...
 
Secured E-Learning Content on USB/HDD Device
Secured E-Learning Content on USB/HDD DeviceSecured E-Learning Content on USB/HDD Device
Secured E-Learning Content on USB/HDD Device
 
E0952731
E0952731E0952731
E0952731
 
H0545156
H0545156H0545156
H0545156
 
D0511924
D0511924D0511924
D0511924
 
Báo cáo thực tập phạm thị huyền trang new
Báo cáo thực tập phạm thị huyền trang newBáo cáo thực tập phạm thị huyền trang new
Báo cáo thực tập phạm thị huyền trang new
 
H0425066
H0425066H0425066
H0425066
 
C0561419
C0561419C0561419
C0561419
 
C0621115
C0621115C0621115
C0621115
 
A framework for an Operating System-based Mobile Agent Interoperability
A framework for an Operating System-based Mobile Agent InteroperabilityA framework for an Operating System-based Mobile Agent Interoperability
A framework for an Operating System-based Mobile Agent Interoperability
 
An Explanatory Analysis of the Economic and Social Impact of Corruption in Zi...
An Explanatory Analysis of the Economic and Social Impact of Corruption in Zi...An Explanatory Analysis of the Economic and Social Impact of Corruption in Zi...
An Explanatory Analysis of the Economic and Social Impact of Corruption in Zi...
 
De-virtualizing virtual Function Calls using various Type Analysis Technique...
De-virtualizing virtual Function Calls using various Type  Analysis Technique...De-virtualizing virtual Function Calls using various Type  Analysis Technique...
De-virtualizing virtual Function Calls using various Type Analysis Technique...
 
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
 
Compromising windows 8 with metasploit’s exploit
Compromising windows 8 with metasploit’s exploitCompromising windows 8 with metasploit’s exploit
Compromising windows 8 with metasploit’s exploit
 
Assessment of Serum Gonadotrophins and Prolactin Hormone Levels in In Vitro F...
Assessment of Serum Gonadotrophins and Prolactin Hormone Levels in In Vitro F...Assessment of Serum Gonadotrophins and Prolactin Hormone Levels in In Vitro F...
Assessment of Serum Gonadotrophins and Prolactin Hormone Levels in In Vitro F...
 
Enhancing the NS-2 Traffic Generator for the MANETs
Enhancing the NS-2 Traffic Generator for the MANETsEnhancing the NS-2 Traffic Generator for the MANETs
Enhancing the NS-2 Traffic Generator for the MANETs
 
B0451217
B0451217B0451217
B0451217
 
Google frowns on reciprocal linking
Google frowns on reciprocal linkingGoogle frowns on reciprocal linking
Google frowns on reciprocal linking
 
Diapos staditik
Diapos staditikDiapos staditik
Diapos staditik
 

Similar a Channel Fading Detection in MANETs with Handoff

A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...CSEIJJournal
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
Rsaodv a route stability based ad hoc on demand distance vector routing prot...
Rsaodv  a route stability based ad hoc on demand distance vector routing prot...Rsaodv  a route stability based ad hoc on demand distance vector routing prot...
Rsaodv a route stability based ad hoc on demand distance vector routing prot...ijwmn
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...ijwmn
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...ijwmn
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...IOSR Journals
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networksijceronline
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...IOSR Journals
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksIJCNCJournal
 

Similar a Channel Fading Detection in MANETs with Handoff (20)

I017616468
I017616468I017616468
I017616468
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...
 
En33838844
En33838844En33838844
En33838844
 
En33838844
En33838844En33838844
En33838844
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
Rsaodv a route stability based ad hoc on demand distance vector routing prot...
Rsaodv  a route stability based ad hoc on demand distance vector routing prot...Rsaodv  a route stability based ad hoc on demand distance vector routing prot...
Rsaodv a route stability based ad hoc on demand distance vector routing prot...
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
 

Más de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Último

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 

Último (20)

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 

Channel Fading Detection in MANETs with Handoff

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 14, Issue 1 (Sep. - Oct. 2013), PP 77-83 www.iosrjournals.org www.iosrjournals.org 77 | Page Channel Fading Detection in Manets with Hand off Strategy G.Vani Prasanna,G.Lakshmi Narayana Annamacharya Institute of Technology and Sciences, Tirupati Abstract: In wireless mobile ad hoc networks (MANETs), packet transmission is impaired by radio link fluctuations. This paper proposes a novel channel adaptive routing protocol which extends the Ad hoc On- Demand Multipath Distance Vector (AOMDV) routingprotocol to accommodate channel fading. Specifically, the proposed Channel-Aware AOMDV (CA-AOMDV) uses the channel averagenonfading duration as a routing metric to select stable links for path discovery, and applies a preemptive handoff strategy to maintainreliable connections by exploiting channel state information. Using the same information, paths can be reused when they become available again, rather than being discarded. We provide new theoretical results for the downtime and lifetime of a live-die-live multiplepath system, as well as detailed theoretical expressions for common network performance measures, providing useful insights into thedifferences in performance between CA-AOMDV and AOMDV. Simulation and theoretical results show that CA-AOMDV has greatly improved network performance over AOMDV Keywords: Mobile ad hoc networks, routing protocols, channel adaptive routing I. Introduction Wireless mobile ad hoc networks (MANETs) are self configuring, dynamic networks in which nodes are free to move. A major performance constraint comes from path loss and multipath fading .Many MANET routing protocols exploit multi hop paths to route packets. The probability of successful packet transmission on a path is dependent on the reliability of the wireless channel on each hop. Rapid node movements also affect link stability ,introducing a large Doppler spread, resulting in rapid channel variations .Routing protocols can make use of prediction of channel state information (CSI) based on a priori knowledge of channel characteristics, to monitor instantaneous link conditions. With knowledge of channel behavior, the best links can be chosen to build a new path, or switch from a failing connection to one with more favorable channel conditions. adaptive routing.Inthispaper,weintroduceanenhanced, channel-awareversion of the AOMDV routing protocol. The key aspect ofthis enhancement, which is not addressedinother work, isthat we use specific,timely,channelqualityinformationallowing us to work with the ebb-and-flow ofpathavailability.This approach allows reuse of pathswitchbecomeunavailable for a time, rather than simply regarding them asuseless, upon failure,anddiscardingthem.Weutilizethechannelaveragenonfading duration (ANFD) as a measure oflink stability,combined with the traditional hop-countmeasure for path selection. The protocol then uses the sameinformation topredictsignalfading and incorporates pathhandover to avoid unnecessaryoverhead from a new pathdiscovery process. Theaveragefadingduration (AFD) isutilized to determine when to bring a path back into play,allowing for the varying nature of path usability instead ofdiscardingatinitialfailure.Thisprotocolprovidesadualattackfor avoiding unnecessary out discoveries,predictingpathfailure leading to handoff and then bringing paths backintoplaywhen they are again available, rather than simplydiscarding them at the first sign of a fade. II. Existing System In the existing system packet transmission is impaired by radio link fluctuations. Here the paths can not be used when it is available it should be discarded when the time is expired and a new route discover process must be undertaken. Path stability is completely ignored. Thus, selected paths tend to have a small number of longhops meaning that nodes are already close to the maximum possible communication distance .Here it provides unnecessary route discoveries and it does not predict the path failure. Maximum number of disconnections, high transmission latency and packet drop 1.AD-HOC ON DEMAND DISTENCE VECTOR(AODV) 1.1Advantages AODV is a reactive protocol: the routes are created only when they are needed. It uses traditional routing tables, one entry per destination, and sequence numbers to determine whether routing information is up- to-date and to prevent routing loops .An important feature of AODV is the maintenance of time-based states in each node: a routing entry not recently used is expired. In case of a route is broken the neighbors can be notified. Route discovery is based on query and reply cycles, androute information is stored in all intermediate nodes
  • 2. Channel Fading Detection In Manets With Hand Off Strategy www.iosrjournals.org 78 | Page alongthe route in theformofroutetableentries.Thefollowingcontrol packets are used: routing request message (RREQ) is broadcasted by a node requiring aroutetoanothernode, routing reply message (RREP) is unicasted back to the source of RREQ, and route error message (RERR) is sent to notify other nodes of the loss of the link. 1.2 Drabacks of aodv It is possible that a valid route is expired. Determining of a reasonable expiry time isdifficult,because thenodes are mobile, and sources’ sending rates maydifferwidely and can change dynamically from nodetonode. Moreover, cangatheronlyaverylimitedamountofroutinginformation, route learning is limited only to the sourceofanyroutingpackets being forwarded. This causes AODV to rely on a route discovery flood moreoften,whichmaycarrysignificant network overhead. uncontrolled flooding generates many redundanttransmissionswhichmaycausesocalledbroadcaststormproblem. 2. Adhoc Ondemand Multipath Distence Vector Routing(Aomdv) : 2.1Advantages Ad-hoc On-demand Multipath DistanceVectorRouting(AOMDV) protocol isanextensiontotheAODVprotocolforcomputingmultipleloopfreeandlinkdisjointpaths.Theroutingentriesforeachd estination contain a list of the next-hops along with the corresponding hop counts. All the next hops have the samesequencenumber. This helps in keeping track of a route. For each destination, a node maintains the advertised hop count, which is defined as the maximum hop count for all thepaths,whichisusedforsending routeadvertisementsofthedestination. 2.2 Disadvantages of aomdv AOMDV istheuseofalargenumberofcontrolpacketsforcalculating and maintaining multiple routesbetweena Source anddestination nodes.AdhocOnDemandMultipathDistance Vector(AOMDV)routingprotocolwillaccommodatechannelfading CHANNEL FADING Figure-1 Multipath fading channel MANET – MOBILE AD-HOC NETWORKS Figure-2 Ad hoc wireless networks are self-creating, self-organizing, and self-administrating networks
  • 3. Channel Fading Detection In Manets With Hand Off Strategy www.iosrjournals.org 79 | Page mobile Ad-hoc Networks (MANETs) we mean wireless hop networks formed by a set of mobile nodes without relying on a pre existing infrastructure. Each node in a MANET acts as a router, forwarding data packets to other nodes. Since the topology of MANET is time-varying, unstable radio links among nodes may easily happen due to difficult to predicting the coverage pattern and mobility models, etc. Many of the routing protocols rely on the multi-hop routing paths for packet transmission. Node movements also affect the link stability. Routing protocols can make use of prediction of channel state information based on the prior knowledge of the channels. Several channel adaptive schemes have been developed for MANETs to maintain the stability. In channel adaptive schemes can be implemented in medium access control (MAC) protocols. III.Ad-Hoc Networks Figure-3 peer-to-peer communication An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. In this paper Ad-hoc On Demand Distance Vector Routing (AODV), a novel algorithm for the operation of such ad-hoc networks is presented. Each Mobile Host operates as a specialized router, and routes are obtained as needed (i.e., on-demand) with little or no reliance on periodic advertisements. This new routing algorithm is quite suitable for a dynamic self starting network, as required by users wishing to utilize ad-hoc networks. AODV provides loop-free routes even while repairing broken links. Because the protocol does not require global periodic routing advertisements, the demand on the overall bandwidth available to the mobile nodes is substantially less than in those protocols IV.Proposed System (Ca-Aomdv) Here paths can be reused when they become available again, rather than being discarded.Using prediction and handoff to preempt fading on a link on the active path, disconnections can be minimized, reducing transmission latency and packet drop rate.This protocol provides a dual attack for avoiding unnecessary route discoveries, predicting path failure leading to handoff.All nodes maintain a table of past signal strengths, recording for each received packet, previous hop, signal power, and arrival time.A key factor deciding the performance of a routing protocol in mobile ad hoc networks is the manner in which it adapts to route changes caused by mobility. Exploiting the intuition that a lessdynamic route losts longer, a new metric, the Route Fragility Coefficient(RFC), to compare routes is proposed. RFC estimates the rate at which a given route expandsor contracts. Expansion refers to adjacent nodes moving apart, while contraction refers to their moving closer. RFC combines the individual link contraction or expansion behavior to present a unified picture of the route dynamics. It is shown that lower the value of RFC, more static (less fragile) the route. Then this metric is used as a basis for route selection so that route discovery yields routes that last longer and hence increase throughput while reducing control overhead. A simple distributed mechanism to compute RFC is provided, V. Comparison Of Routing Table Entry
  • 4. Channel Fading Detection In Manets With Hand Off Strategy www.iosrjournals.org 80 | Page V I.Route Maintenance In Ca-Aomdv In mobile environments, it is necessary to find efficientways of addressingpathfailure.Usingprediction andhandoff to preempt fading on a link on the active path,disconnections can be minimized, reducing transmissionlatency and packet drop rate Route maintenance in CA-AOMDV takes advantage of ahandoff strategy using signal strength predictionto counter channel fading. When thepredicted link signal strength level falls below a networkspecificthreshold, the algorithm swaps to a good-qualitylink. The fading thesignal is chosenso as to providerobustness to prediction errors. The presence of multipleusers experiencing independent channel fading means thatMANETs cantake advantage ofchannel diversity, unlikedata rate adaptation mechanisms such as SampleRate All nodes maintain a table of past signal strengths,recording for each received packet, Ideally, there will be M packetswhere M is the required number of past samples from.However, this will depend on the packet receipt timescompared with the specified discrete time interval, _t. Ifpackets are received at time intervals greater than _tsample signal strengths for the missed time intervals can beapproximated by the signal strength of the packet closest intime to the one missed. If packets are received at intervals ofshorter duration than _t, some maybeskipped.Anexample of handoff in CA-AOMDV is shown in Fig. 4.The handoff process is implemented via a handoff request (HREQ) packet. Figure.4Handoff inCA-AOMDV VII.Theoretical Analysis A framework is now presented to analyze the performances of AOMDV and CA-AOMDV.The probability density functions (PDFs) of the lifetimes of a single path and multiple paths are derived and the performances in terms of routing control overhead and network throughput are analyzed. VIII .Ca-Aomdv/Aomdv Performence Anlysis We now determineexpressions for routing control overheadand packet delivery ratio. If Φd is the average delay for aRoute discovery and E{Z} is the average path system lifetime, then (E{Z} Φd) represents the averageTime between two successive route discoveries per ns-ndpair. Let Ω be the number of route discoveries per second, In CA-AOMDV and AOMDV, when ns needs a path to nd, itbroadcasts a RREQ. nd, or any intermediate node which hasa fresh enough path to nd, feeds a RREP back to ns to establish the path. We can approximate as: where tqis the one-hop propagation time of a RREQ,andtp is the one-hop propagation time of a RREP. WithC connections in the network, each lasting an average ofT seconds, the average number of route discovery processes overtime T is equal to:
  • 5. Channel Fading Detection In Manets With Hand Off Strategy www.iosrjournals.org 81 | Page IX. System Design Figure-5 system design The channel fading is detected before fading occurs. This is done by sensing the channel. A node along the path fails, causing other nodes to fail or the rear collisions along the path. Wireless access describes about thebasic communication takes place in a wireless network. The diagram explains the communication in a wireless network. Network Selection will monitor the total network and report to base station. System monitor is controlled by the base station to monitor the mobile host. Path maintenance maintains the path between communicating mobile hosts Mobile host will communicate some other mobile host within the local area or wide area. While the mobile host transmitting the data, the network monitor will monitor the total network, link state will monitor the state of the link between the two mobile hosts which are communicating and it is controlled by base station directly. X.-Modules Of The Ca-Aomdv AOMDV protocol for MANETs contains three design modules, they are Wireless Access, Fading Detection, Network Selection WIRELESS ACCESS Wireless access module describes how the basic communication takes place in a wireless network. The fig.6 explains the communication in a wireless network. Figure-6 wireless access In this diagram the correspondent host controls the home network. Home agent communicates with Mobile host. If the home agent wants to communicate with a mobile host within the local area means, it will communicate through local multicast group i.e base station in local area. If home agent wants to communicate with a mobile host within the wide area means, it will communicate through wide area base station. Mobile host can communicate directly with home agent FADING-DETECTION
  • 6. Channel Fading Detection In Manets With Hand Off Strategy www.iosrjournals.org 82 | Page Figure-7 In the above diagram, the base station will control the local area. Mobile host will communicate some other mobile host within the local area or wide area. While the mobile host transmitting the data, the network monitor will monitor the total network, NETWORK SELECTION Figure- 8In this diagram, the base station controls the total network. Network monitor will monitor the total network XI. Simulation Results XII.Conclusion A channel-based routing metric is proposed which utilizes the average nonfading duration, combined with hop- count, to select stable links. A channel-adaptive routing protocol, CA-AOMDV, extendingAOMDV, based on this proposed routing metric, is introduced.During path maintenance,predicted signal strength and channel average fading duration are combined with handoff to combat channel fading and improve channel utilization
  • 7. Channel Fading Detection In Manets With Hand Off Strategy www.iosrjournals.org 83 | Page References BOOKS: [1] W.C. Jakes, Microwave Mobile Communications, second ed. Wiley Interscience, 2001. [2] G.L. Stuber, Principles of Mobile Communication, second ed. KluwerAcademic, 2001. [3] S. Jain and S.R. Das, “Exploiting Path Diversity in the Link Layerin Wireless Ad Hoc Networks,” Proc. Sixth IEEE Int’l Symp. Worldof Wireless Mobile and Multimedia Networks (WoWMoM), pp. 22-30,June 2005. JOURNAL PAPERS: [4] P. Pham, S. Perreau, and A. Jayasuriya, “New Cross-Layer DesignApproach to Ad Hoc Networks under Rayleigh Fading,” IEEEJ. Selected Areas in Comm., vol. 23, no. 1, pp. 28-39, Jan. 2005. [5] C. Toh, “Associativity-Based Routing for Ad-Hoc Mobile Networks,”Wireless Personal Comm., vol. 4, pp. 103-139, Nov. 1997. [6] H. Zhang and Y.N. Dong, “Mobility Prediction Model Based LinkStability Metric for Wireless Ad Hoc Networks,” Proc. Int’l Conf.Wireless Comm., Networking and Mobile Computing (WiCOM), pp. 1-4, Sept. 2006. [7] O. Tickoo, S. Raghunath, and S. Kalyanaraman, “Route Fragility:A Novel Metric for Route Selection in Mobile Ad Hoc Networks,”Proc. IEEE Int’l Conf. Networks (ICON), pp. 537-542, Sept. 2003. [8] S. Biswas and R. Morris, “ExOR: Opportunistic Multi-HopRoutingforWirelessNetworks,”ACMSIGCOMMComputerComm. Rev., vol. 35, no. 4, pp. 133-144, Aug. 2005. [9] R. Dube, C. Rais, K.Y. Wang, and S.K. Tripathi, “Signal Stability-Based Adaptive Routing (SSA) for Ad Hoc Networks,” IEEEPersonal Comm., vol. 4, no. 1, pp. 36-45, Feb. 1997 [10] M. Park, J. Andrews, and S. Nettles, “Wireless Channel-AwareAd Hoc Cross-Layer Protocol with Multiroute Path Selection