SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
DOI : 10.5121/ijwmn.2014.6208 89
AN APPROACH TO DSR ROUTING QOS BY
FUZZY-GENETIC ALGORITHMS
Sara Aliabadi¹ and Mehdi Agha Saram²
¹ Department of Computer Science, Islamic Azad University Science and Research
Branch Yazd, Yazd, Iran
² Department of Computer Science, Islamic Azad University Science and Research
Branch Yazd, Yazd, Iran
ABSTRACT
Although, all prior works improved routing on MANETs, there is no strong advancement on QoS. One of
the newest challenges to improve quality of routing in MANETs is combining the Genetic and Fuzzy
algorithms into routing protocols. The improvements on routing QoS are approached by using Genetic and
Fuzzy algorithms in this project. In cause of storing route information during route discovery, the DSR
routing protocol is chosen by this project. First of all, the suggested protocol in this project added Current
Time into DSR header. So, next intermediate node can obtain its previous link’s cost by this attachment and
adds the Link Cost to route discovery packet. Then, when the route discovery packet received to destination
node, it will expect for other packets till end of packet TTL. Next, the destination node will use collected
packets in Genetic Algorithm to find the two optimum routes. Finally, the destination node sends these
routes to source node. Next improvement is using Fuzzy Triangle Numbers to change route update. In this
case, the suggested protocol uses route error packets’ count and also Triangle Numbers to change route
update period time.
KEYWORDS
MANET, DSR, Genetic, Fuzzy, QoS
1. INTRODUCTION
Routing inMANET as a mobile self-configuring infrastructure-less wireless network is more
complicated than other usual networks. A node in MANET can be both terminal node and router.
Indeed, a node as a terminal node sends and receives packets while that node as a router will find
and save a path, andalso conducts packets to a destination. In the other hand, topology in this kind
of network is not stable because of nodes’ mobility. Thus, router based routing mechanisms
which try to save network topology do not work properly in MANET.
Dynamic Source Routing (DSR) as a standard routing protocol in MANET has a simple and
efficient routing algorithm. DSR finds a path by sending a Route Request packet and save the hop
IPs during route request flooding. There is no doubt that DSR does not consider on QoS and the
first found path will be used as packets route.
Quality of Service in routing needs to ensure that chosen path has less traffic, less packet loss,
optimum length, and the most possible bandwidth together. Approaching to routing QoS is
impossible without consideration of nature and dynamic topology in MANET. This project has
tried to use Genetic and Fuzzy algorithms in DSR to approach to QoS in MANET routing. The
first part of this article will explain the used genetic algorithm. Section two will introduce our
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
90
changes on DSR and how our protocol works. Section three is the explanation of route updating
by Fuzzy. And finally, we simulate our routing protocol by NS2 and compare it with standard
DSR.
2. GENETIC ALGORTHM
Researchers have used Gas in the SP routing solution, ATM bandwidth allocation solution,
multicast routing solution, Capacity and Flow Assignment (CFA) solution, and the dynamic
routing solution. It is clear that all these solutions can be formulated as some sort of syntactic
optimization solution.
The graph G=(N,A) can specifies the underlying topology of any multi-hop network, where N is a
set of nodes and A is a set of their links. Also, we can have a cost for each link (i, j) and call it as
Cij. In this case, we have a source node which we named it as node “S” and a destination node
with name “D”. The name Iij is denoted for each link (i, j) and can be defined as follows:
‫ܫ‬௜,௝ ൌ ൞
1 ‫݂ܫ‬ ‫݄݁ݐ‬ ݈݅݊݇ ݂‫݉݋ݎ‬ ݊‫݁݀݋‬ ݅ ‫݋ݐ‬ ݊‫݁݀݋‬ ݆
݁‫ݏݐݏ݅ݔ‬ ݅݊ ‫݄݁ݐ‬ ‫݃݊݅ݐݑ݋ݎ‬ ‫݄ݐܽ݌‬
0 ‫݁ݏ݅ݓݎ݄݁ݐ݋‬
It is clear that diametrical elements of Iij must be ‘0’. By using the above definition, we can
formulate the SP routing solutions to syntactic optimization solution to minimize the objective
function as follows:
Minimize: ∑ ∑ ‫ܥ‬௜௝‫ܫ‬௜௝
஽
௝ୀௌ
௃ஷ௜
஽
௜ୀௌ
Subject to: ∑ ‫ܫ‬௜௝ െ ∑ ‫ܫ‬௝௜
஽
௝ୀௌ
௝ஷ௜
ൌ ൝
1 ݂݅ ݅ ൌ ܵ
െ1 ݂݅ ݅ ൌ ‫ܦ‬
0 ‫݁ݏ݅ݓݎ݄݁ݐ݋‬
஽
௝ୀௌ
௝ஷ௜
And ∑ ൜
൑ 1 ݂݅ ݅ ് ‫ܦ‬
ൌ 0 ݂݅ ݅ ൌ ‫ܦ‬
஽
௝ୀௌ
௝ஷ௜
2.1 COST
Cost for each link is formulated by RTS/CTS (Request To Send/ Clear To Send). In this way, we
estimates the cost for each link (i, j) by using packet delay during a fixed packet sending.
‫ܥ‬௜௝ ൌ ‫ܧ‬ሺ௕ሺೞ,ೝሻ
ೝ೟ೞ
ሻ ൌ ෍ ෍ ෍ ሺminሺܶ௦ െ ݆, ܶ௥ െ ݇ሻ ‫כ‬ ܲሺ௜,௝,௞ሻ
୫୧୬ ሺ்ೝ,௜ିଵሻ
௞ୀ଴
୫୧୬ ሺ்ೞ,௜ିଵሻ
௝ୀ଴
୫୧୬ሺ்೘,ሺ்ೞା்ೝశభሻሻ
௜ୀ଴
In the above formula, the number of sent packet is mentioned by Tm. Ts and Tr are the activate
time of node S or sender and node R or receiver. Also, we can calculate P by below formula:
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
2.2 FITNESS
The fitness function shows the evaluation of each chromosome based on its links’ cost. Indeed,
the fitness function must accurately measure the quality of chromosomes in the
fitness function can be formulated as follow:
2.3 CROSSOVER
Crossover checks the current solutions in order to find better ones. Physically, the role of
exchanging one part of two chosen chromosomes to
such a manner that the GA produces new chromosomes from previous generation by exchanging
part of them, one part of route connects the source node to an intermediate node, and the other
part connects the intermediate node to the destination node. Following algorithm shows the
crossover process in this genetic algorithm:
/* , : Input Chromosomes ,
/* : Length of Chromosome
For (all i, j) { /* Find the potential crossing sites */
If ( [i] == [j] ) { /* if a node is commonly included in both chromosomes */
sites*/
}
= choose_rand( ); /* randomly choose a cro
= [1: ] // [ +1 :
= [1: ] // [ +1 :
Figure1. Overall procedure of the crossover. (a)
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
The fitness function shows the evaluation of each chromosome based on its links’ cost. Indeed,
the fitness function must accurately measure the quality of chromosomes in the population. The
fitness function can be formulated as follow:
Crossover checks the current solutions in order to find better ones. Physically, the role of
exchanging one part of two chosen chromosomes to make better routes plays by crossover. In
such a manner that the GA produces new chromosomes from previous generation by exchanging
part of them, one part of route connects the source node to an intermediate node, and the other
te node to the destination node. Following algorithm shows the
crossover process in this genetic algorithm:
, : Output Chromosomes */
, : Length of Chromosome */
i, j) { /* Find the potential crossing sites */
[j] ) { /* if a node is commonly included in both chromosomes */
[k]= (i, j); } /*Construct a set of potential crossing
); /* randomly choose a crossing site */
+1 : ] ; /* 1st
exchange */
+1 : ] ; /* 2nd
exchange */
Overall procedure of the crossover. (a) Pseudo code of the crossover. (b) Example of the crossover
procedure.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
91
The fitness function shows the evaluation of each chromosome based on its links’ cost. Indeed,
population. The
Crossover checks the current solutions in order to find better ones. Physically, the role of
make better routes plays by crossover. In
such a manner that the GA produces new chromosomes from previous generation by exchanging
part of them, one part of route connects the source node to an intermediate node, and the other
te node to the destination node. Following algorithm shows the
[j] ) { /* if a node is commonly included in both chromosomes */
[k]= (i, j); } /*Construct a set of potential crossing
of the crossover. (b) Example of the crossover
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
2.4 MUTATION
Mutation is a process to change genes of the candidate chromosomes to improve the fitness in
new generation and keeping away from local optima.
partial-route from mutation node to the destination node in the GA.
/* C: Input Chromosome, : Output Chromosome, T: Topological Information Database */
= Choose_rand (C); /* Randomly choose a node as a mutation point */
Delete (T, C, ); /* Delete the nodes of upper partial
= C [1: ]; /* Put the upper partial
While (1) {
[ + 1] = Choose_rand_delete (T,
delete the node from T */
If ( [ + 1] == destination) {
Break; }
++; /* increment the
Figure 2. Overall procedure of the mutation. (a) Pseudo code of the mutation. (b) Example of the mutation
3. GA-DSR ROUTING
GA-DSR is a DSR optimized routing protocol for Mobile Ad hoc Networks which uses Genetic
and Fuzzy algorithms to improve Quality of Service. This optimized protocol sends and Route
Request packet to find destination, same as standard DSR, when the source n
route to the destination node. The difference is that this optimized protocol saves each link’s cost
beside the IP addresses.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
Mutation is a process to change genes of the candidate chromosomes to improve the fitness in
new generation and keeping away from local optima. Physically, it generates an
route from mutation node to the destination node in the GA.
: Output Chromosome, T: Topological Information Database */
= Choose_rand (C); /* Randomly choose a node as a mutation point */
); /* Delete the nodes of upper partial-route from T */
]; /* Put the upper partial-route to the mutation chromosome */
+ 1] = Choose_rand_delete (T, [ ]); /* Randomly choose a node from T and
om T */
+ 1] == destination) {
Break; }
*/ }
Overall procedure of the mutation. (a) Pseudo code of the mutation. (b) Example of the mutation
procedure.
DSR is a DSR optimized routing protocol for Mobile Ad hoc Networks which uses Genetic
and Fuzzy algorithms to improve Quality of Service. This optimized protocol sends and Route
Request packet to find destination, same as standard DSR, when the source node does not know
route to the destination node. The difference is that this optimized protocol saves each link’s cost
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
92
Mutation is a process to change genes of the candidate chromosomes to improve the fitness in
Physically, it generates an alternative
: Output Chromosome, T: Topological Information Database */
]); /* Randomly choose a node from T and
Overall procedure of the mutation. (a) Pseudo code of the mutation. (b) Example of the mutation
DSR is a DSR optimized routing protocol for Mobile Ad hoc Networks which uses Genetic
and Fuzzy algorithms to improve Quality of Service. This optimized protocol sends and Route
ode does not know
route to the destination node. The difference is that this optimized protocol saves each link’s cost
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
When the destination node receives a RREQ packet, it saves received RREQ in its cach
end of Route Request TTL. During this time, the destination node will save all other RREQs from
same source node with same Route Request ID.
Table 1. Route Request Packet Details
Option Type
Current Time
When the Route Request TTL has been finished, t
Genetic Algorithm and finds the two best routes from source node to destination node.
the destination node creates a Route Reply packet, adds these two routes in it and sends the RREP
packet for the source node.
Table 2. Route Reply Packet Details
Option Type
First Route Count
The following flowchart shows the route discovery in GA
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
Figure 3. GA DSR Schema
When the destination node receives a RREQ packet, it saves received RREQ in its cach
end of Route Request TTL. During this time, the destination node will save all other RREQs from
same source node with same Route Request ID.
Table 1. Route Request Packet Details
IdentificationOpt Data Len
Target Address
TTL
Address [1]
Cost [1]
Address [2]
Cost [2]
…
Address [n]
Request TTL has been finished, the destination node adds all received RREQs in
Genetic Algorithm and finds the two best routes from source node to destination node.
the destination node creates a Route Reply packet, adds these two routes in it and sends the RREP
Table 2. Route Reply Packet Details
[L]Opt Data LenOption Type
Second Route CountCount
Address [1]
Address [2]
….
Address [n]
The following flowchart shows the route discovery in GA-DSR:
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
93
When the destination node receives a RREQ packet, it saves received RREQ in its cache until the
end of Route Request TTL. During this time, the destination node will save all other RREQs from
he destination node adds all received RREQs in
Genetic Algorithm and finds the two best routes from source node to destination node. Finally,
the destination node creates a Route Reply packet, adds these two routes in it and sends the RREP
Reserved
Second Route Count
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
Source node
If ( Route to destination Exist)
Send (data packet);
Else {
Make (Route Request);
Flood (Route Request);
}
Receive (Next_Node)
{
If (it’s destination)
{
Count (Cost);
If (TTL is not finished)
Else {
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
Figure 4. GA DSR Flowchart
Count (Cost);
If (TTL is not finished)
Wait();
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
94
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
95
Genetic_Algorithm(Route Request[]);
Make(Route Reply);
putInRouteReply(Two Best Routes);
Send(Route Reply);
}
}
Else {
If (Packet is repeated)
Drop(Packet);
Else {
Count (Cost);
AddToRouteRequest (Address);
Change(Current Time);
Flood(Route Request);
} }
4. ROUTE UPDATING
Route updating can help the protocol to reduce packet loss and improve QoS. Indeed, MANETs
have a mobile nature; so topology changes in them frequently. This mobile nature effects on the
routes and make them unusable after a while. So, all MANET routing protocols need a route
updating algorithm.
In this protocol, we use Triangular Fuzzy Numbers to make the route updating time dependent. In
this case, we forecast a time for route updating and make this time error dependent based on
Triangular Numbers. If the route error came from a direct node in a route, other nodes will update
that route immediately. Otherwise, nodes which received route error will increase their route error
counter and operate triangular equation. The result of Triangular equation should multiply to
forecast time and subtract from it.
‫݅ݎݐ‬ሺ௫;௠,௔,௕ሻ ൌ
‫ە‬
ۖ
‫۔‬
ۖ
‫ۓ‬
0 ‫ݔ‬ ൑ ܽ
‫ݔ‬ െ ܽ
݉ െ ܽ
‫ݔ‬ ‫א‬ ሺܽ, ݉ሿ, ܽ ് ݉
ܾ െ ‫ݔ‬
ܾ െ ݉
‫ݔ‬ ‫א‬ ሺ݉, ܾሿ, ݉ ് ܾ
1 ‫ݔ‬ ൒ ܾ
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
96
5. SIMULATION RESULTS
We simulated the GA-DSR protocol by NS2 for 5, 10, 15, 20, 25, 30, 35, and 40 nodes. Whereas
every simulation results may have some exceptions, we simulated the GA-DSR in some times and
made our decision based on their average.
5.1 ROUTE REQUESTDELAY
Whereas the GA-DSR destination nodes wait till end of Route Request TTL, there is no doubt
that the result of route request delay will be more than standard DSR. By the way, the simulation
shows that this difference decrease by nodes population increment.
Figure 5. Route Request Delay
5.2 END TO END DELAY
End to End Delay is the most important result to prove the success of each routing protocol. The
results of simulation show that the GA-DSR works more proper than standard DSR. We can see
that the End to End Delay in GA-DSR is less than Standard DSR. Also, GA-DSR has more
success during node population increment.
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
5 10 15 20 25 30 35 40
Time(Sec(
Number OF Nodes
ROUTE REQUEST DELAY (SEC/NUMBER OF
NODES)
DSR
GA DSR
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
5.3 PACKET DELIVERY RATE
Packet Delivery Rate is our final comparison between GA
doubt that the results of simulation show that the packet delivery rate increased in GA
compare on Standard ones.
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
5 10
Time(Sec)
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
Figure 6. End to End Delay
PACKET DELIVERY RATE
Packet Delivery Rate is our final comparison between GA-DSR and Standard DSR. There is no
doubt that the results of simulation show that the packet delivery rate increased in GA
Figure 7. Packet Delivery Rate
15 20 25 30 35
Number Of Nodes
End to End Delay
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
97
DSR and Standard DSR. There is no
doubt that the results of simulation show that the packet delivery rate increased in GA-DSR
DSR
GA DSR
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
98
6. CONCLUSION
This project tried to improve Standard DSR by using Genetic and Fuzzy algorithms. We proposed
a GA-DSR protocol which adds link cost to route request and uses genetic algorithm in
destination node to find the two best route for communication. The destination node will add
these two routes in route reply and sends it for the source node.
The route updating in proposed GA-DSR protocol works by Fuzzy Triangular Numbers. It uses a
route error counter and changes the route updating time based on the Triangular equation result.
Finally, we simulated our proposed routing protocol and made a comparison on standard DSR in
Route Request Delay, End to End Delay, and Packet Delivery Rate. The results showed us that
GA-DSR improved End to End Delay and Packet Delivery rate in comparison on Standard DSR.
REFRENCES
[1] Abdullah, J., (2010), Multiobjectives GA-Based QOS Routing Protocol for Mobile Ad Hoc
Network, International Journal of Grid and Distributed Computing, 3(4), 57-68.
[2] Aghdasi, H. S., Torabi, N., Rahmanzadeh, A., Aminiazar, M., and Abbaspour, M., (2012),
Usefulness of multicast routing protocols for vehicular Ad-hoc networks, Sixth International
Symposium Telecommunications (IST), 459-463.
[3] Ahn, Ch. W., and Ramakrishna, R. S., (2002), A Genetic Algorithm for Shortest Path Routing
Problem and the Sizing of Populations, IEEE TRANSACTIONS ON
EVOLUTIONARYCOMPUTATION, 6(6), 132-138.
[4] Ahn, Ch., W., and Ramakrishna, R., S., (2002), A Genetic Algorithm for Shortest Path Routing
Problem and the Sizing of Populations, IEEE TRANSACTIONS ON EVOLUTIONARY
COMPUTATION, 6(6), 566-579.
[5] Al-Ghazal, M., El-Sayed, A., and Kelash, H., (2007), Routing Optimlzation using Genetic
Algorlthm in Ad Hoc Networks, IEEE International Symposium on Signal Processing and
Information Technology, 497-503.
[6] Alzate, M., A., Salamanca, M., P., Pena, N., M., and Labrador, M., A., (2007), End-to-End Mean
Bandwidth Estimation as a Function of Packet Length in Mobile Ad Hoc Networks, IEEE, 415-
420.
[7] Anand, V., Sairam, N., and Thiagajan, M., (2012), A Review of Routing in Ad Hoc Networks,
Research Journal of Applied Sciences, Engineering and Technology, 4(8), 981-986.
[8] Artimy, M., M., Robertson, W., and Philips, W., j., (2006), Assignment of Dynamic Transmission
Range Based on Estimation of Vehicle Density, Engineering Mathematics and Internetworking,
40-48.
[9] Barati, J., (2011), Evaluation of intelligent algorithms in Routing Mobile Ad hoc Networks,
Mashhad Payam Nour University.
[10] Barolli, A., Takizawa, M., Xhafa, F., and Barolli, L., (2010), Application of Genetic Algorithms
for QoS Routing in Mobile Ad-Hoc Networks: A Survey, International Conference on Broadband,
Wireless Computing, Communication and Applications, 250-259.
[11] Barolli, L., Koyama, A., and Shiratori, N., (2003), A QoS Routing Method for Ad-Hoc Networks
Based on Genetic Algorithm, International Workshop on Database and Expert Systems
Applications, 14, 1-5.
[12] Chiang, Ch,. Gerla, M., and Zhang, L., (1998), Forwarding Group Multicast Protocol (FGMP) for
Multihop, Mobile Wireless Networks, CLUSTER COMPUTING, 1-16.
[13] Deb, K., Dhebar, Y., D., and Pavan, N., V., R., (1998), Non-Uniform Mapping in Binary-Coded
Genetic Algorithms, Kanpur Genetic Algorithms Laboratory (KanGAL).
[14] Denardin, G., W., Barriquello, C. H., Campos, A., and Prado, R. N., (2011), A Geographic
Routing Hybrid Approach for Void Resolution in Wireless Sensor Networks, Journal of Systems
and Software, 10(84), 1577-1590.
[15] Du, K., and Yang, Y., (2010), A QoS routing for Maximum Bandwidth in Ad Hoc Networks,
International Conference on Future Networks, 343-345.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
99
[16] Duncan, N., and Eddie, B. T., (2012), An Energy-Efficient Dynamic Source Routing Protocol for
Mobile Ad-Hoc Networks, International Journal of Computing and ICT Research, 2(6), 23-32.
[17] Fuhrmann, Th., Pengfei, D., Kutzner, K., and Cramer, C., (2006), Pushing Chord into the
Underlay: Scalable Routing for Hybrid MANETs (PDF). System Architecture Group, Technical
University of Karlsruhe (TH).
[18] Gani, A., Han, Q., Anuar, N. B., and Zakaria, O., (2009), Enhancing DSR Protocol Performance in
Mobile Ad-Hoc Networks Using ACK Reply, WSEAS Transactions on Communications, 2(8),
227-236.
[19] Goyal, M., Soperi, M., Bacceli, E., Chaudhury, G., Shahik, A., Hosseini, H., and Trivedi, K.,
(2012), Improving Convergence Speed and Scalability in OSPF: A Survey, IEEE
COMMUNICATIONS SURVEYS & TUTORIALS, 14(2), 443-463.
[20] Grover, D., and Singh, G., (2012), Implementation: DSR & AODV, International Journal of
Computer Application, 2(5), 66-79.
[21] Guizani, B., Ayeb, B., Koukam, A., (2012), A New Cluster-Based Link State Routing for Mobile
Ad Hoc Networks, IEEE, The 2nd International Conference on Communications and Information
Technology (ICCIT): Communication Networks and Systems, Hammamet, 2 , 196-201.
[22] Gujral, R., Rana, S., and Chaudhari, A., (2012), Study and Comparison of Mesh and Tree Based
Multicast Routing Protocols for MANETs, International Journal of Latest Trends in Engineering
and Technology (IJLTET), 1(2), 58-65.
[23] Gulati, M., K., and Kumar, K., (2013), A Review of QoS Routing Protocols in MANETs,
International Conference on Computer Communication and Informatics, 1-6.
[24] Hao, L., (2009), The QoS Routing Protocol in the Ad Hoc Networks, International Conference on
Networking and Digital Society, 101-103.
[25] Hosseini Seno, S. A., Budiarto, R., and Wan, T. Ch., (2011), A Secure Mobile Ad hoc Network
Based on Distributed Certificate Authority, Arabian Journal for Science and Engineering, 2(36),
245-257.
[26] Hwang, R., H., Do, W., Y., and Yang, Sh., Ch., (2000), Multicast Routing Based on Genetic
Algorithms, JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 16, 885-902.
[27] Johnson, D., B., Maltz, D., A., and Broch, J., (2001), DSR: The Dynamic Source Routing Protocol
for Multi-Hop Wireless Ad Hoc Networks, Monarch, 1-25.
[28] Johnson, D., Hu, Y., and Maltz, D., (2007), The Dynamic Source Routing Protocol (DSR) for
Mobile Ad Hoc Networks for IPv4 (RFC 4728), IETF, 1-107.
[29] Karibasappa, A., S., G., and Muralidhara, K., N., (2011), Neuro Fuzzy Based Routing Protocol for
Mobile Ad-Hoc Networks, International Conference on Industrial and Information Systems, 6,
216-221.
[30] Katoch, Sh., and Aggarwal, R., (2013), Enhancement in DSR Protocol for Load Balancing and
Congestion Control, Global Journal of Computer Science and Technology Network, Web and
Security, 7(13),
[31] Kaur, N., and Singh, M., (2012), Effects of Caching on the Performance of DSR Protocol, IOSR
Journal of Engineering (IOSRJEN), 2(9), 7-11.
[32] Kojic, N., S., Ivancic, M., B., Z., Reljin, I., S., and Reljin, B., D., (2010), New Algorithm for
Packet Routing in Mobile Ad-hoc Networks, JOURNAL OF AUTOMATIC CONTROL,
UNIVERSITY OF BELGRADE, 20, 9-16.
[33] kosko, B., (1993), Fuzzy Thinking, Hyperion, New York.
[34] Kumar, M. and Mishra, R. (2012), An Overview of MANET: History, Challenges and
Applications, Indian Journal of Computer Science and Engineering (IJCSE), 3, 121-125.
[35] Kunz, Th., and Alhalimi, R., (2010), Energy-efficient proactive routing in MANET: Energy
metrics accuracy, Ad Hoc Networks, 7(8), 755-766.
[36] LAtiff, L., A., and Fisal, N., (2003), Routing Protocols in Wireless- Mobile Ad Hoc Network - A
Review, IEEE, 600-604.
[37] Liu, H., Li, J., Zhang, Y., Q., and Pan, Y., (2005), An Adaptive Genetic Fuzzy Multi-path Routing
Protocol for Wireless Ad-Hoc Networks, International Conference on Software Engineering,
Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS
International Workshop on Self-Assembling Wireless Networks, 6, 1-8.
[38] Lou, Y., Zhang, W., and Hu, Y., (2010), A New Cluster Based Routing Protocol for VANET,
Second International Conference on Networks Security, Wireless Communications and Trusted
Computing, 48, 176-180.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
100
[39] Michalewicz, Z., (2001), Genetic Algorithms, Numerical Optimization, and Constraints, Polish
Academia of Science, 1-8.
[40] Mohammed, A., A., and Nagib, G., (2012), Optimal Routing In Ad-Hoc Network Using Genetic
Algorithm, Int. J. Advanced Networking and Applications, 3(5), 1323-1328.
[41] Nallusamy, R., Duaiswamy, K., Muthukumar, D., and Sathiakumar, C., (2010), Energy efficient
dynamic shortest path routing in Wireless Ad hoc Sensor Networks using Genetic Algorithm,
ICWCSC.
[42] Perkins, Ch., E., and Royer, E., M., (1997), Ad-hoc On-demand Distance Vector Routing, IEEE,
1-11.
[43] Perkins, Ch., E., and Royer, E., M., (2003), Ad hoc On-Demand Distance Vector (AODV)
Routing (RFC 3561), IETF, 1-37.
[44] Ragunath, V., (2004), Implementation of DSR Protocol in NS2 simulator, University of Bonn,
Informatik Department IV, 1-5.
[45] Ramesh, V., Subbaiah, P., and Supriya, K., (2010), Modified DSR (Preemptive) to Reduce Link
Breakage and Routing Overhead for MANET Using Proactive Route Maintenance (PRM), Global
Journal of Computer Science and Technology, 5(9), 124-129.
[46] Rifa-Pous, H., and Herrera-Joancomarti, J., (2011), Computational and Energy Costs of
Cryptographic Algorithms on Handheld Devices, Future Internet, 3, 31-48.
[47] Roshankar, R., Bhatia, R., Shrivatava, V., and Sharma, D., K., (2012), Performance Analysis of
Various Routing Protocols (Proactive and Reactive) for Random Mobility Models of Adhoc
Networks, Recent Advances in Information Technology, 1, 1-5.
[48] Royer, E., M., (1999), A Review of Current Routing Protocols for Ad Hoc Mobile Wireless
Networks, IEEE Personal Communications, 99 , 46-55.
[49] Saeed, N., H., Abbod, M., F., and Al-Raweshidy, H., S., (2012), MANET Routing Protocols T
axonomy, International Conference on Future Communication Networks, 123-128.
[50] Saleh, R., O., M., Saman, M., Y., M., and Rahman, M., N., A., (2012), Fresh Shortest Route
Algorithm for DSR Protocol in Mobile Ad-Hoc Networks, International Annual Symposium on
Sustainability Science and Management, 11, 1068-1073.
[51] Sarr, Ch., Chaudet, C., Chelius, G., and Lassous, I., G., (2005), A node-based available bandwidth
evaluation in IEEE 802.11 ad hoc networks, International Journal of Parallel, Emergent and
Distributed Systems, 1-21.
[52] Sihai, Zh., Layuan, L., and Yong, L. (2011), A QoS-based Routing Algorithm in Ad Hoc Network,
International Symposium on Distributed Computing and Applications to Business, Engineering
and Science, 10, 23-26.
[53] Tan, K., Zhang, Q., and Zhu, W., (2003), Shortest Path Routing in Partially Connected Ad Hoc
Networks, GLOBECOM, 1038-1042.
[54] Tong, F., Tang, W., Peng, L., Xie, R., Yang, W., and Kim, Y., (2010), A Node-Grade Based
AODV Routing Protocol for Wireless Sensor Network, 2010 Second International Conference on
Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2, 180-183.
[55] Wismanath, K., Obraczka, K., and Tsudik, G., (2005), Exploring Mesh- and Tree Based Multicast
Routing Protocols for MANETs, 1-45.
[56] Wu, H., and Jia, X., (2007), QoS Multicast Routing by Using Multiple Paths/Trees in Wireless Ad
hoc networks, FFCSA, 559-612.
[57] Xiaochuan, X., Gang, W., Keping, W., Gang, W., and Shilou, J., (2009), Link reliability based
hybrid routing for tactical mobile ad hoc network, Journal of Systems Engineering and
Electronics, 2(19),259-267.
[58] Yeh, Ch., T., (2009), Approximations by interval, triangular and trapezoidal fuzzy numbers, IFSA-
EUSFLAT, 143-148.
[59] Zafar, H., Hassan, L., Khattak, A., Mufti, Z., and Jan, S., (2012), Implementation of the Dynamic
Source Routing Protocol in Network Simulator 2 – An Overview, SINDH UNIVERSITY
RESEARCH JOURNAL (SCIENCE SERIES), 44(3), 491-496.

Más contenido relacionado

La actualidad más candente

13 9 sep17 22aug 8454 9914-1-ed edit septian
13 9 sep17 22aug 8454 9914-1-ed edit septian13 9 sep17 22aug 8454 9914-1-ed edit septian
13 9 sep17 22aug 8454 9914-1-ed edit septianIAESIJEECS
 
Maximizing Throughput using Adaptive Routing Based on Reinforcement Learning
Maximizing Throughput using Adaptive Routing Based on Reinforcement LearningMaximizing Throughput using Adaptive Routing Based on Reinforcement Learning
Maximizing Throughput using Adaptive Routing Based on Reinforcement LearningEswar Publications
 
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...ijmnct
 
Performance Analysis for Parallel MRA in Heterogeneous Wireless Networks
Performance Analysis for Parallel MRA in Heterogeneous Wireless NetworksPerformance Analysis for Parallel MRA in Heterogeneous Wireless Networks
Performance Analysis for Parallel MRA in Heterogeneous Wireless NetworksEditor IJCATR
 
A cross layer delay-aware node disjoint multipath routing algorithm for mobil...
A cross layer delay-aware node disjoint multipath routing algorithm for mobil...A cross layer delay-aware node disjoint multipath routing algorithm for mobil...
A cross layer delay-aware node disjoint multipath routing algorithm for mobil...ijwmn
 
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1...
Performance Evaluation of Finite Queue Switching  Under Two-Dimensional M/G/1...Performance Evaluation of Finite Queue Switching  Under Two-Dimensional M/G/1...
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1...Syeful Islam
 
O dsr optimized dsr routing
O dsr optimized dsr routingO dsr optimized dsr routing
O dsr optimized dsr routingijwmn
 
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksFuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksA. Sufian
 
Authentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingAuthentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingIJERA Editor
 
Bandwidth aware on demand multipath routing in manets
Bandwidth aware on demand multipath routing in manetsBandwidth aware on demand multipath routing in manets
Bandwidth aware on demand multipath routing in manetsijwmn
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Editor IJARCET
 
DYNAMIC QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MAN...
DYNAMIC QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MAN...DYNAMIC QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MAN...
DYNAMIC QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MAN...csandit
 
Web object size satisfying mean waiting
Web object size satisfying mean waitingWeb object size satisfying mean waiting
Web object size satisfying mean waitingIJCNCJournal
 
Routing in All-Optical Networks Using Recursive State Space Technique
Routing in All-Optical Networks Using Recursive State Space TechniqueRouting in All-Optical Networks Using Recursive State Space Technique
Routing in All-Optical Networks Using Recursive State Space Techniquesipij
 
A cross layer delay-aware multipath routing algorithm for mobile adhoc networks
A cross layer delay-aware multipath routing algorithm for mobile adhoc networksA cross layer delay-aware multipath routing algorithm for mobile adhoc networks
A cross layer delay-aware multipath routing algorithm for mobile adhoc networkscsandit
 

La actualidad más candente (18)

13 9 sep17 22aug 8454 9914-1-ed edit septian
13 9 sep17 22aug 8454 9914-1-ed edit septian13 9 sep17 22aug 8454 9914-1-ed edit septian
13 9 sep17 22aug 8454 9914-1-ed edit septian
 
Maximizing Throughput using Adaptive Routing Based on Reinforcement Learning
Maximizing Throughput using Adaptive Routing Based on Reinforcement LearningMaximizing Throughput using Adaptive Routing Based on Reinforcement Learning
Maximizing Throughput using Adaptive Routing Based on Reinforcement Learning
 
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
 
D04622933
D04622933D04622933
D04622933
 
Performance Analysis for Parallel MRA in Heterogeneous Wireless Networks
Performance Analysis for Parallel MRA in Heterogeneous Wireless NetworksPerformance Analysis for Parallel MRA in Heterogeneous Wireless Networks
Performance Analysis for Parallel MRA in Heterogeneous Wireless Networks
 
Ijcnc050215
Ijcnc050215Ijcnc050215
Ijcnc050215
 
A cross layer delay-aware node disjoint multipath routing algorithm for mobil...
A cross layer delay-aware node disjoint multipath routing algorithm for mobil...A cross layer delay-aware node disjoint multipath routing algorithm for mobil...
A cross layer delay-aware node disjoint multipath routing algorithm for mobil...
 
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1...
Performance Evaluation of Finite Queue Switching  Under Two-Dimensional M/G/1...Performance Evaluation of Finite Queue Switching  Under Two-Dimensional M/G/1...
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1...
 
O dsr optimized dsr routing
O dsr optimized dsr routingO dsr optimized dsr routing
O dsr optimized dsr routing
 
Channel quality
Channel qualityChannel quality
Channel quality
 
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksFuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
 
Authentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingAuthentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless Routing
 
Bandwidth aware on demand multipath routing in manets
Bandwidth aware on demand multipath routing in manetsBandwidth aware on demand multipath routing in manets
Bandwidth aware on demand multipath routing in manets
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356
 
DYNAMIC QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MAN...
DYNAMIC QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MAN...DYNAMIC QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MAN...
DYNAMIC QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MAN...
 
Web object size satisfying mean waiting
Web object size satisfying mean waitingWeb object size satisfying mean waiting
Web object size satisfying mean waiting
 
Routing in All-Optical Networks Using Recursive State Space Technique
Routing in All-Optical Networks Using Recursive State Space TechniqueRouting in All-Optical Networks Using Recursive State Space Technique
Routing in All-Optical Networks Using Recursive State Space Technique
 
A cross layer delay-aware multipath routing algorithm for mobile adhoc networks
A cross layer delay-aware multipath routing algorithm for mobile adhoc networksA cross layer delay-aware multipath routing algorithm for mobile adhoc networks
A cross layer delay-aware multipath routing algorithm for mobile adhoc networks
 

Destacado

Mobility models for delay tolerant network a survey
Mobility models for delay tolerant network a surveyMobility models for delay tolerant network a survey
Mobility models for delay tolerant network a surveyijwmn
 
Performance analysis of voip traffic over integrating wireless lan and wan us...
Performance analysis of voip traffic over integrating wireless lan and wan us...Performance analysis of voip traffic over integrating wireless lan and wan us...
Performance analysis of voip traffic over integrating wireless lan and wan us...ijwmn
 
Impact of random mobility models on olsr
Impact of random mobility models on olsrImpact of random mobility models on olsr
Impact of random mobility models on olsrijwmn
 
Achievement for wireless
Achievement for wirelessAchievement for wireless
Achievement for wirelessijwmn
 
Comparative analysis of congestion
Comparative analysis of congestionComparative analysis of congestion
Comparative analysis of congestionijwmn
 
Impact of client antenna’s rotation angle and height of 5g wi fi access point...
Impact of client antenna’s rotation angle and height of 5g wi fi access point...Impact of client antenna’s rotation angle and height of 5g wi fi access point...
Impact of client antenna’s rotation angle and height of 5g wi fi access point...ijwmn
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkijwmn
 
A Novel Uncoded SER/BER Estimation Method
A Novel Uncoded SER/BER Estimation Method A Novel Uncoded SER/BER Estimation Method
A Novel Uncoded SER/BER Estimation Method ijwmn
 
New strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocolNew strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocolijwmn
 
Path constrained data gathering scheme for wireless sensor networks with mobi...
Path constrained data gathering scheme for wireless sensor networks with mobi...Path constrained data gathering scheme for wireless sensor networks with mobi...
Path constrained data gathering scheme for wireless sensor networks with mobi...ijwmn
 
A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...ijwmn
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
 
Stochastic analysis of random ad hoc networks with maximum entropy deployments
Stochastic analysis of random ad hoc networks with maximum entropy deploymentsStochastic analysis of random ad hoc networks with maximum entropy deployments
Stochastic analysis of random ad hoc networks with maximum entropy deploymentsijwmn
 
Data mining of ns 2 trace file
Data mining of ns 2 trace fileData mining of ns 2 trace file
Data mining of ns 2 trace fileijwmn
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
Group based algorithm to manage access
Group based algorithm to manage accessGroup based algorithm to manage access
Group based algorithm to manage accessijwmn
 
Virtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environmentVirtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environmentijwmn
 

Destacado (17)

Mobility models for delay tolerant network a survey
Mobility models for delay tolerant network a surveyMobility models for delay tolerant network a survey
Mobility models for delay tolerant network a survey
 
Performance analysis of voip traffic over integrating wireless lan and wan us...
Performance analysis of voip traffic over integrating wireless lan and wan us...Performance analysis of voip traffic over integrating wireless lan and wan us...
Performance analysis of voip traffic over integrating wireless lan and wan us...
 
Impact of random mobility models on olsr
Impact of random mobility models on olsrImpact of random mobility models on olsr
Impact of random mobility models on olsr
 
Achievement for wireless
Achievement for wirelessAchievement for wireless
Achievement for wireless
 
Comparative analysis of congestion
Comparative analysis of congestionComparative analysis of congestion
Comparative analysis of congestion
 
Impact of client antenna’s rotation angle and height of 5g wi fi access point...
Impact of client antenna’s rotation angle and height of 5g wi fi access point...Impact of client antenna’s rotation angle and height of 5g wi fi access point...
Impact of client antenna’s rotation angle and height of 5g wi fi access point...
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
A Novel Uncoded SER/BER Estimation Method
A Novel Uncoded SER/BER Estimation Method A Novel Uncoded SER/BER Estimation Method
A Novel Uncoded SER/BER Estimation Method
 
New strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocolNew strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocol
 
Path constrained data gathering scheme for wireless sensor networks with mobi...
Path constrained data gathering scheme for wireless sensor networks with mobi...Path constrained data gathering scheme for wireless sensor networks with mobi...
Path constrained data gathering scheme for wireless sensor networks with mobi...
 
A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...
 
Stochastic analysis of random ad hoc networks with maximum entropy deployments
Stochastic analysis of random ad hoc networks with maximum entropy deploymentsStochastic analysis of random ad hoc networks with maximum entropy deployments
Stochastic analysis of random ad hoc networks with maximum entropy deployments
 
Data mining of ns 2 trace file
Data mining of ns 2 trace fileData mining of ns 2 trace file
Data mining of ns 2 trace file
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
Group based algorithm to manage access
Group based algorithm to manage accessGroup based algorithm to manage access
Group based algorithm to manage access
 
Virtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environmentVirtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environment
 

Similar a An approach to dsr routing qos by fuzzy genetic algorithms

Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...csandit
 
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...cscpconf
 
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...IRJET Journal
 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153IJRAT
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...IJERA Editor
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...IJERA Editor
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAIJITE
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsIJCNCJournal
 
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...ijngnjournal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSSNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSijwmn
 

Similar a An approach to dsr routing qos by fuzzy genetic algorithms (20)

Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
 
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
 
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless Networks
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
 
Be31390392
Be31390392Be31390392
Be31390392
 
218
218218
218
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocols
 
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSSNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

An approach to dsr routing qos by fuzzy genetic algorithms

  • 1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 DOI : 10.5121/ijwmn.2014.6208 89 AN APPROACH TO DSR ROUTING QOS BY FUZZY-GENETIC ALGORITHMS Sara Aliabadi¹ and Mehdi Agha Saram² ¹ Department of Computer Science, Islamic Azad University Science and Research Branch Yazd, Yazd, Iran ² Department of Computer Science, Islamic Azad University Science and Research Branch Yazd, Yazd, Iran ABSTRACT Although, all prior works improved routing on MANETs, there is no strong advancement on QoS. One of the newest challenges to improve quality of routing in MANETs is combining the Genetic and Fuzzy algorithms into routing protocols. The improvements on routing QoS are approached by using Genetic and Fuzzy algorithms in this project. In cause of storing route information during route discovery, the DSR routing protocol is chosen by this project. First of all, the suggested protocol in this project added Current Time into DSR header. So, next intermediate node can obtain its previous link’s cost by this attachment and adds the Link Cost to route discovery packet. Then, when the route discovery packet received to destination node, it will expect for other packets till end of packet TTL. Next, the destination node will use collected packets in Genetic Algorithm to find the two optimum routes. Finally, the destination node sends these routes to source node. Next improvement is using Fuzzy Triangle Numbers to change route update. In this case, the suggested protocol uses route error packets’ count and also Triangle Numbers to change route update period time. KEYWORDS MANET, DSR, Genetic, Fuzzy, QoS 1. INTRODUCTION Routing inMANET as a mobile self-configuring infrastructure-less wireless network is more complicated than other usual networks. A node in MANET can be both terminal node and router. Indeed, a node as a terminal node sends and receives packets while that node as a router will find and save a path, andalso conducts packets to a destination. In the other hand, topology in this kind of network is not stable because of nodes’ mobility. Thus, router based routing mechanisms which try to save network topology do not work properly in MANET. Dynamic Source Routing (DSR) as a standard routing protocol in MANET has a simple and efficient routing algorithm. DSR finds a path by sending a Route Request packet and save the hop IPs during route request flooding. There is no doubt that DSR does not consider on QoS and the first found path will be used as packets route. Quality of Service in routing needs to ensure that chosen path has less traffic, less packet loss, optimum length, and the most possible bandwidth together. Approaching to routing QoS is impossible without consideration of nature and dynamic topology in MANET. This project has tried to use Genetic and Fuzzy algorithms in DSR to approach to QoS in MANET routing. The first part of this article will explain the used genetic algorithm. Section two will introduce our
  • 2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 90 changes on DSR and how our protocol works. Section three is the explanation of route updating by Fuzzy. And finally, we simulate our routing protocol by NS2 and compare it with standard DSR. 2. GENETIC ALGORTHM Researchers have used Gas in the SP routing solution, ATM bandwidth allocation solution, multicast routing solution, Capacity and Flow Assignment (CFA) solution, and the dynamic routing solution. It is clear that all these solutions can be formulated as some sort of syntactic optimization solution. The graph G=(N,A) can specifies the underlying topology of any multi-hop network, where N is a set of nodes and A is a set of their links. Also, we can have a cost for each link (i, j) and call it as Cij. In this case, we have a source node which we named it as node “S” and a destination node with name “D”. The name Iij is denoted for each link (i, j) and can be defined as follows: ‫ܫ‬௜,௝ ൌ ൞ 1 ‫݂ܫ‬ ‫݄݁ݐ‬ ݈݅݊݇ ݂‫݉݋ݎ‬ ݊‫݁݀݋‬ ݅ ‫݋ݐ‬ ݊‫݁݀݋‬ ݆ ݁‫ݏݐݏ݅ݔ‬ ݅݊ ‫݄݁ݐ‬ ‫݃݊݅ݐݑ݋ݎ‬ ‫݄ݐܽ݌‬ 0 ‫݁ݏ݅ݓݎ݄݁ݐ݋‬ It is clear that diametrical elements of Iij must be ‘0’. By using the above definition, we can formulate the SP routing solutions to syntactic optimization solution to minimize the objective function as follows: Minimize: ∑ ∑ ‫ܥ‬௜௝‫ܫ‬௜௝ ஽ ௝ୀௌ ௃ஷ௜ ஽ ௜ୀௌ Subject to: ∑ ‫ܫ‬௜௝ െ ∑ ‫ܫ‬௝௜ ஽ ௝ୀௌ ௝ஷ௜ ൌ ൝ 1 ݂݅ ݅ ൌ ܵ െ1 ݂݅ ݅ ൌ ‫ܦ‬ 0 ‫݁ݏ݅ݓݎ݄݁ݐ݋‬ ஽ ௝ୀௌ ௝ஷ௜ And ∑ ൜ ൑ 1 ݂݅ ݅ ് ‫ܦ‬ ൌ 0 ݂݅ ݅ ൌ ‫ܦ‬ ஽ ௝ୀௌ ௝ஷ௜ 2.1 COST Cost for each link is formulated by RTS/CTS (Request To Send/ Clear To Send). In this way, we estimates the cost for each link (i, j) by using packet delay during a fixed packet sending. ‫ܥ‬௜௝ ൌ ‫ܧ‬ሺ௕ሺೞ,ೝሻ ೝ೟ೞ ሻ ൌ ෍ ෍ ෍ ሺminሺܶ௦ െ ݆, ܶ௥ െ ݇ሻ ‫כ‬ ܲሺ௜,௝,௞ሻ ୫୧୬ ሺ்ೝ,௜ିଵሻ ௞ୀ଴ ୫୧୬ ሺ்ೞ,௜ିଵሻ ௝ୀ଴ ୫୧୬ሺ்೘,ሺ்ೞା்ೝశభሻሻ ௜ୀ଴ In the above formula, the number of sent packet is mentioned by Tm. Ts and Tr are the activate time of node S or sender and node R or receiver. Also, we can calculate P by below formula:
  • 3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 2.2 FITNESS The fitness function shows the evaluation of each chromosome based on its links’ cost. Indeed, the fitness function must accurately measure the quality of chromosomes in the fitness function can be formulated as follow: 2.3 CROSSOVER Crossover checks the current solutions in order to find better ones. Physically, the role of exchanging one part of two chosen chromosomes to such a manner that the GA produces new chromosomes from previous generation by exchanging part of them, one part of route connects the source node to an intermediate node, and the other part connects the intermediate node to the destination node. Following algorithm shows the crossover process in this genetic algorithm: /* , : Input Chromosomes , /* : Length of Chromosome For (all i, j) { /* Find the potential crossing sites */ If ( [i] == [j] ) { /* if a node is commonly included in both chromosomes */ sites*/ } = choose_rand( ); /* randomly choose a cro = [1: ] // [ +1 : = [1: ] // [ +1 : Figure1. Overall procedure of the crossover. (a) International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 The fitness function shows the evaluation of each chromosome based on its links’ cost. Indeed, the fitness function must accurately measure the quality of chromosomes in the population. The fitness function can be formulated as follow: Crossover checks the current solutions in order to find better ones. Physically, the role of exchanging one part of two chosen chromosomes to make better routes plays by crossover. In such a manner that the GA produces new chromosomes from previous generation by exchanging part of them, one part of route connects the source node to an intermediate node, and the other te node to the destination node. Following algorithm shows the crossover process in this genetic algorithm: , : Output Chromosomes */ , : Length of Chromosome */ i, j) { /* Find the potential crossing sites */ [j] ) { /* if a node is commonly included in both chromosomes */ [k]= (i, j); } /*Construct a set of potential crossing ); /* randomly choose a crossing site */ +1 : ] ; /* 1st exchange */ +1 : ] ; /* 2nd exchange */ Overall procedure of the crossover. (a) Pseudo code of the crossover. (b) Example of the crossover procedure. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 91 The fitness function shows the evaluation of each chromosome based on its links’ cost. Indeed, population. The Crossover checks the current solutions in order to find better ones. Physically, the role of make better routes plays by crossover. In such a manner that the GA produces new chromosomes from previous generation by exchanging part of them, one part of route connects the source node to an intermediate node, and the other te node to the destination node. Following algorithm shows the [j] ) { /* if a node is commonly included in both chromosomes */ [k]= (i, j); } /*Construct a set of potential crossing of the crossover. (b) Example of the crossover
  • 4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 2.4 MUTATION Mutation is a process to change genes of the candidate chromosomes to improve the fitness in new generation and keeping away from local optima. partial-route from mutation node to the destination node in the GA. /* C: Input Chromosome, : Output Chromosome, T: Topological Information Database */ = Choose_rand (C); /* Randomly choose a node as a mutation point */ Delete (T, C, ); /* Delete the nodes of upper partial = C [1: ]; /* Put the upper partial While (1) { [ + 1] = Choose_rand_delete (T, delete the node from T */ If ( [ + 1] == destination) { Break; } ++; /* increment the Figure 2. Overall procedure of the mutation. (a) Pseudo code of the mutation. (b) Example of the mutation 3. GA-DSR ROUTING GA-DSR is a DSR optimized routing protocol for Mobile Ad hoc Networks which uses Genetic and Fuzzy algorithms to improve Quality of Service. This optimized protocol sends and Route Request packet to find destination, same as standard DSR, when the source n route to the destination node. The difference is that this optimized protocol saves each link’s cost beside the IP addresses. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 Mutation is a process to change genes of the candidate chromosomes to improve the fitness in new generation and keeping away from local optima. Physically, it generates an route from mutation node to the destination node in the GA. : Output Chromosome, T: Topological Information Database */ = Choose_rand (C); /* Randomly choose a node as a mutation point */ ); /* Delete the nodes of upper partial-route from T */ ]; /* Put the upper partial-route to the mutation chromosome */ + 1] = Choose_rand_delete (T, [ ]); /* Randomly choose a node from T and om T */ + 1] == destination) { Break; } */ } Overall procedure of the mutation. (a) Pseudo code of the mutation. (b) Example of the mutation procedure. DSR is a DSR optimized routing protocol for Mobile Ad hoc Networks which uses Genetic and Fuzzy algorithms to improve Quality of Service. This optimized protocol sends and Route Request packet to find destination, same as standard DSR, when the source node does not know route to the destination node. The difference is that this optimized protocol saves each link’s cost International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 92 Mutation is a process to change genes of the candidate chromosomes to improve the fitness in Physically, it generates an alternative : Output Chromosome, T: Topological Information Database */ ]); /* Randomly choose a node from T and Overall procedure of the mutation. (a) Pseudo code of the mutation. (b) Example of the mutation DSR is a DSR optimized routing protocol for Mobile Ad hoc Networks which uses Genetic and Fuzzy algorithms to improve Quality of Service. This optimized protocol sends and Route ode does not know route to the destination node. The difference is that this optimized protocol saves each link’s cost
  • 5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 When the destination node receives a RREQ packet, it saves received RREQ in its cach end of Route Request TTL. During this time, the destination node will save all other RREQs from same source node with same Route Request ID. Table 1. Route Request Packet Details Option Type Current Time When the Route Request TTL has been finished, t Genetic Algorithm and finds the two best routes from source node to destination node. the destination node creates a Route Reply packet, adds these two routes in it and sends the RREP packet for the source node. Table 2. Route Reply Packet Details Option Type First Route Count The following flowchart shows the route discovery in GA International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 Figure 3. GA DSR Schema When the destination node receives a RREQ packet, it saves received RREQ in its cach end of Route Request TTL. During this time, the destination node will save all other RREQs from same source node with same Route Request ID. Table 1. Route Request Packet Details IdentificationOpt Data Len Target Address TTL Address [1] Cost [1] Address [2] Cost [2] … Address [n] Request TTL has been finished, the destination node adds all received RREQs in Genetic Algorithm and finds the two best routes from source node to destination node. the destination node creates a Route Reply packet, adds these two routes in it and sends the RREP Table 2. Route Reply Packet Details [L]Opt Data LenOption Type Second Route CountCount Address [1] Address [2] …. Address [n] The following flowchart shows the route discovery in GA-DSR: International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 93 When the destination node receives a RREQ packet, it saves received RREQ in its cache until the end of Route Request TTL. During this time, the destination node will save all other RREQs from he destination node adds all received RREQs in Genetic Algorithm and finds the two best routes from source node to destination node. Finally, the destination node creates a Route Reply packet, adds these two routes in it and sends the RREP Reserved Second Route Count
  • 6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 Source node If ( Route to destination Exist) Send (data packet); Else { Make (Route Request); Flood (Route Request); } Receive (Next_Node) { If (it’s destination) { Count (Cost); If (TTL is not finished) Else { International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 Figure 4. GA DSR Flowchart Count (Cost); If (TTL is not finished) Wait(); International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 94
  • 7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 95 Genetic_Algorithm(Route Request[]); Make(Route Reply); putInRouteReply(Two Best Routes); Send(Route Reply); } } Else { If (Packet is repeated) Drop(Packet); Else { Count (Cost); AddToRouteRequest (Address); Change(Current Time); Flood(Route Request); } } 4. ROUTE UPDATING Route updating can help the protocol to reduce packet loss and improve QoS. Indeed, MANETs have a mobile nature; so topology changes in them frequently. This mobile nature effects on the routes and make them unusable after a while. So, all MANET routing protocols need a route updating algorithm. In this protocol, we use Triangular Fuzzy Numbers to make the route updating time dependent. In this case, we forecast a time for route updating and make this time error dependent based on Triangular Numbers. If the route error came from a direct node in a route, other nodes will update that route immediately. Otherwise, nodes which received route error will increase their route error counter and operate triangular equation. The result of Triangular equation should multiply to forecast time and subtract from it. ‫݅ݎݐ‬ሺ௫;௠,௔,௕ሻ ൌ ‫ە‬ ۖ ‫۔‬ ۖ ‫ۓ‬ 0 ‫ݔ‬ ൑ ܽ ‫ݔ‬ െ ܽ ݉ െ ܽ ‫ݔ‬ ‫א‬ ሺܽ, ݉ሿ, ܽ ് ݉ ܾ െ ‫ݔ‬ ܾ െ ݉ ‫ݔ‬ ‫א‬ ሺ݉, ܾሿ, ݉ ് ܾ 1 ‫ݔ‬ ൒ ܾ
  • 8. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 96 5. SIMULATION RESULTS We simulated the GA-DSR protocol by NS2 for 5, 10, 15, 20, 25, 30, 35, and 40 nodes. Whereas every simulation results may have some exceptions, we simulated the GA-DSR in some times and made our decision based on their average. 5.1 ROUTE REQUESTDELAY Whereas the GA-DSR destination nodes wait till end of Route Request TTL, there is no doubt that the result of route request delay will be more than standard DSR. By the way, the simulation shows that this difference decrease by nodes population increment. Figure 5. Route Request Delay 5.2 END TO END DELAY End to End Delay is the most important result to prove the success of each routing protocol. The results of simulation show that the GA-DSR works more proper than standard DSR. We can see that the End to End Delay in GA-DSR is less than Standard DSR. Also, GA-DSR has more success during node population increment. 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 5 10 15 20 25 30 35 40 Time(Sec( Number OF Nodes ROUTE REQUEST DELAY (SEC/NUMBER OF NODES) DSR GA DSR
  • 9. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 5.3 PACKET DELIVERY RATE Packet Delivery Rate is our final comparison between GA doubt that the results of simulation show that the packet delivery rate increased in GA compare on Standard ones. 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 5 10 Time(Sec) International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 Figure 6. End to End Delay PACKET DELIVERY RATE Packet Delivery Rate is our final comparison between GA-DSR and Standard DSR. There is no doubt that the results of simulation show that the packet delivery rate increased in GA Figure 7. Packet Delivery Rate 15 20 25 30 35 Number Of Nodes End to End Delay International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 97 DSR and Standard DSR. There is no doubt that the results of simulation show that the packet delivery rate increased in GA-DSR DSR GA DSR
  • 10. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 98 6. CONCLUSION This project tried to improve Standard DSR by using Genetic and Fuzzy algorithms. We proposed a GA-DSR protocol which adds link cost to route request and uses genetic algorithm in destination node to find the two best route for communication. The destination node will add these two routes in route reply and sends it for the source node. The route updating in proposed GA-DSR protocol works by Fuzzy Triangular Numbers. It uses a route error counter and changes the route updating time based on the Triangular equation result. Finally, we simulated our proposed routing protocol and made a comparison on standard DSR in Route Request Delay, End to End Delay, and Packet Delivery Rate. The results showed us that GA-DSR improved End to End Delay and Packet Delivery rate in comparison on Standard DSR. REFRENCES [1] Abdullah, J., (2010), Multiobjectives GA-Based QOS Routing Protocol for Mobile Ad Hoc Network, International Journal of Grid and Distributed Computing, 3(4), 57-68. [2] Aghdasi, H. S., Torabi, N., Rahmanzadeh, A., Aminiazar, M., and Abbaspour, M., (2012), Usefulness of multicast routing protocols for vehicular Ad-hoc networks, Sixth International Symposium Telecommunications (IST), 459-463. [3] Ahn, Ch. W., and Ramakrishna, R. S., (2002), A Genetic Algorithm for Shortest Path Routing Problem and the Sizing of Populations, IEEE TRANSACTIONS ON EVOLUTIONARYCOMPUTATION, 6(6), 132-138. [4] Ahn, Ch., W., and Ramakrishna, R., S., (2002), A Genetic Algorithm for Shortest Path Routing Problem and the Sizing of Populations, IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 6(6), 566-579. [5] Al-Ghazal, M., El-Sayed, A., and Kelash, H., (2007), Routing Optimlzation using Genetic Algorlthm in Ad Hoc Networks, IEEE International Symposium on Signal Processing and Information Technology, 497-503. [6] Alzate, M., A., Salamanca, M., P., Pena, N., M., and Labrador, M., A., (2007), End-to-End Mean Bandwidth Estimation as a Function of Packet Length in Mobile Ad Hoc Networks, IEEE, 415- 420. [7] Anand, V., Sairam, N., and Thiagajan, M., (2012), A Review of Routing in Ad Hoc Networks, Research Journal of Applied Sciences, Engineering and Technology, 4(8), 981-986. [8] Artimy, M., M., Robertson, W., and Philips, W., j., (2006), Assignment of Dynamic Transmission Range Based on Estimation of Vehicle Density, Engineering Mathematics and Internetworking, 40-48. [9] Barati, J., (2011), Evaluation of intelligent algorithms in Routing Mobile Ad hoc Networks, Mashhad Payam Nour University. [10] Barolli, A., Takizawa, M., Xhafa, F., and Barolli, L., (2010), Application of Genetic Algorithms for QoS Routing in Mobile Ad-Hoc Networks: A Survey, International Conference on Broadband, Wireless Computing, Communication and Applications, 250-259. [11] Barolli, L., Koyama, A., and Shiratori, N., (2003), A QoS Routing Method for Ad-Hoc Networks Based on Genetic Algorithm, International Workshop on Database and Expert Systems Applications, 14, 1-5. [12] Chiang, Ch,. Gerla, M., and Zhang, L., (1998), Forwarding Group Multicast Protocol (FGMP) for Multihop, Mobile Wireless Networks, CLUSTER COMPUTING, 1-16. [13] Deb, K., Dhebar, Y., D., and Pavan, N., V., R., (1998), Non-Uniform Mapping in Binary-Coded Genetic Algorithms, Kanpur Genetic Algorithms Laboratory (KanGAL). [14] Denardin, G., W., Barriquello, C. H., Campos, A., and Prado, R. N., (2011), A Geographic Routing Hybrid Approach for Void Resolution in Wireless Sensor Networks, Journal of Systems and Software, 10(84), 1577-1590. [15] Du, K., and Yang, Y., (2010), A QoS routing for Maximum Bandwidth in Ad Hoc Networks, International Conference on Future Networks, 343-345.
  • 11. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 99 [16] Duncan, N., and Eddie, B. T., (2012), An Energy-Efficient Dynamic Source Routing Protocol for Mobile Ad-Hoc Networks, International Journal of Computing and ICT Research, 2(6), 23-32. [17] Fuhrmann, Th., Pengfei, D., Kutzner, K., and Cramer, C., (2006), Pushing Chord into the Underlay: Scalable Routing for Hybrid MANETs (PDF). System Architecture Group, Technical University of Karlsruhe (TH). [18] Gani, A., Han, Q., Anuar, N. B., and Zakaria, O., (2009), Enhancing DSR Protocol Performance in Mobile Ad-Hoc Networks Using ACK Reply, WSEAS Transactions on Communications, 2(8), 227-236. [19] Goyal, M., Soperi, M., Bacceli, E., Chaudhury, G., Shahik, A., Hosseini, H., and Trivedi, K., (2012), Improving Convergence Speed and Scalability in OSPF: A Survey, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, 14(2), 443-463. [20] Grover, D., and Singh, G., (2012), Implementation: DSR & AODV, International Journal of Computer Application, 2(5), 66-79. [21] Guizani, B., Ayeb, B., Koukam, A., (2012), A New Cluster-Based Link State Routing for Mobile Ad Hoc Networks, IEEE, The 2nd International Conference on Communications and Information Technology (ICCIT): Communication Networks and Systems, Hammamet, 2 , 196-201. [22] Gujral, R., Rana, S., and Chaudhari, A., (2012), Study and Comparison of Mesh and Tree Based Multicast Routing Protocols for MANETs, International Journal of Latest Trends in Engineering and Technology (IJLTET), 1(2), 58-65. [23] Gulati, M., K., and Kumar, K., (2013), A Review of QoS Routing Protocols in MANETs, International Conference on Computer Communication and Informatics, 1-6. [24] Hao, L., (2009), The QoS Routing Protocol in the Ad Hoc Networks, International Conference on Networking and Digital Society, 101-103. [25] Hosseini Seno, S. A., Budiarto, R., and Wan, T. Ch., (2011), A Secure Mobile Ad hoc Network Based on Distributed Certificate Authority, Arabian Journal for Science and Engineering, 2(36), 245-257. [26] Hwang, R., H., Do, W., Y., and Yang, Sh., Ch., (2000), Multicast Routing Based on Genetic Algorithms, JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 16, 885-902. [27] Johnson, D., B., Maltz, D., A., and Broch, J., (2001), DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, Monarch, 1-25. [28] Johnson, D., Hu, Y., and Maltz, D., (2007), The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 (RFC 4728), IETF, 1-107. [29] Karibasappa, A., S., G., and Muralidhara, K., N., (2011), Neuro Fuzzy Based Routing Protocol for Mobile Ad-Hoc Networks, International Conference on Industrial and Information Systems, 6, 216-221. [30] Katoch, Sh., and Aggarwal, R., (2013), Enhancement in DSR Protocol for Load Balancing and Congestion Control, Global Journal of Computer Science and Technology Network, Web and Security, 7(13), [31] Kaur, N., and Singh, M., (2012), Effects of Caching on the Performance of DSR Protocol, IOSR Journal of Engineering (IOSRJEN), 2(9), 7-11. [32] Kojic, N., S., Ivancic, M., B., Z., Reljin, I., S., and Reljin, B., D., (2010), New Algorithm for Packet Routing in Mobile Ad-hoc Networks, JOURNAL OF AUTOMATIC CONTROL, UNIVERSITY OF BELGRADE, 20, 9-16. [33] kosko, B., (1993), Fuzzy Thinking, Hyperion, New York. [34] Kumar, M. and Mishra, R. (2012), An Overview of MANET: History, Challenges and Applications, Indian Journal of Computer Science and Engineering (IJCSE), 3, 121-125. [35] Kunz, Th., and Alhalimi, R., (2010), Energy-efficient proactive routing in MANET: Energy metrics accuracy, Ad Hoc Networks, 7(8), 755-766. [36] LAtiff, L., A., and Fisal, N., (2003), Routing Protocols in Wireless- Mobile Ad Hoc Network - A Review, IEEE, 600-604. [37] Liu, H., Li, J., Zhang, Y., Q., and Pan, Y., (2005), An Adaptive Genetic Fuzzy Multi-path Routing Protocol for Wireless Ad-Hoc Networks, International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks, 6, 1-8. [38] Lou, Y., Zhang, W., and Hu, Y., (2010), A New Cluster Based Routing Protocol for VANET, Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 48, 176-180.
  • 12. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 100 [39] Michalewicz, Z., (2001), Genetic Algorithms, Numerical Optimization, and Constraints, Polish Academia of Science, 1-8. [40] Mohammed, A., A., and Nagib, G., (2012), Optimal Routing In Ad-Hoc Network Using Genetic Algorithm, Int. J. Advanced Networking and Applications, 3(5), 1323-1328. [41] Nallusamy, R., Duaiswamy, K., Muthukumar, D., and Sathiakumar, C., (2010), Energy efficient dynamic shortest path routing in Wireless Ad hoc Sensor Networks using Genetic Algorithm, ICWCSC. [42] Perkins, Ch., E., and Royer, E., M., (1997), Ad-hoc On-demand Distance Vector Routing, IEEE, 1-11. [43] Perkins, Ch., E., and Royer, E., M., (2003), Ad hoc On-Demand Distance Vector (AODV) Routing (RFC 3561), IETF, 1-37. [44] Ragunath, V., (2004), Implementation of DSR Protocol in NS2 simulator, University of Bonn, Informatik Department IV, 1-5. [45] Ramesh, V., Subbaiah, P., and Supriya, K., (2010), Modified DSR (Preemptive) to Reduce Link Breakage and Routing Overhead for MANET Using Proactive Route Maintenance (PRM), Global Journal of Computer Science and Technology, 5(9), 124-129. [46] Rifa-Pous, H., and Herrera-Joancomarti, J., (2011), Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices, Future Internet, 3, 31-48. [47] Roshankar, R., Bhatia, R., Shrivatava, V., and Sharma, D., K., (2012), Performance Analysis of Various Routing Protocols (Proactive and Reactive) for Random Mobility Models of Adhoc Networks, Recent Advances in Information Technology, 1, 1-5. [48] Royer, E., M., (1999), A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks, IEEE Personal Communications, 99 , 46-55. [49] Saeed, N., H., Abbod, M., F., and Al-Raweshidy, H., S., (2012), MANET Routing Protocols T axonomy, International Conference on Future Communication Networks, 123-128. [50] Saleh, R., O., M., Saman, M., Y., M., and Rahman, M., N., A., (2012), Fresh Shortest Route Algorithm for DSR Protocol in Mobile Ad-Hoc Networks, International Annual Symposium on Sustainability Science and Management, 11, 1068-1073. [51] Sarr, Ch., Chaudet, C., Chelius, G., and Lassous, I., G., (2005), A node-based available bandwidth evaluation in IEEE 802.11 ad hoc networks, International Journal of Parallel, Emergent and Distributed Systems, 1-21. [52] Sihai, Zh., Layuan, L., and Yong, L. (2011), A QoS-based Routing Algorithm in Ad Hoc Network, International Symposium on Distributed Computing and Applications to Business, Engineering and Science, 10, 23-26. [53] Tan, K., Zhang, Q., and Zhu, W., (2003), Shortest Path Routing in Partially Connected Ad Hoc Networks, GLOBECOM, 1038-1042. [54] Tong, F., Tang, W., Peng, L., Xie, R., Yang, W., and Kim, Y., (2010), A Node-Grade Based AODV Routing Protocol for Wireless Sensor Network, 2010 Second International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2, 180-183. [55] Wismanath, K., Obraczka, K., and Tsudik, G., (2005), Exploring Mesh- and Tree Based Multicast Routing Protocols for MANETs, 1-45. [56] Wu, H., and Jia, X., (2007), QoS Multicast Routing by Using Multiple Paths/Trees in Wireless Ad hoc networks, FFCSA, 559-612. [57] Xiaochuan, X., Gang, W., Keping, W., Gang, W., and Shilou, J., (2009), Link reliability based hybrid routing for tactical mobile ad hoc network, Journal of Systems Engineering and Electronics, 2(19),259-267. [58] Yeh, Ch., T., (2009), Approximations by interval, triangular and trapezoidal fuzzy numbers, IFSA- EUSFLAT, 143-148. [59] Zafar, H., Hassan, L., Khattak, A., Mufti, Z., and Jan, S., (2012), Implementation of the Dynamic Source Routing Protocol in Network Simulator 2 – An Overview, SINDH UNIVERSITY RESEARCH JOURNAL (SCIENCE SERIES), 44(3), 491-496.