SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
International Journal of Wireless and Mobile Networking (IJWAMN)Vol. 2, No. 1(May 2014) 11
www.arpublication.org
Route Stability in Mobile Ad-Hoc Networks
Pooja M R 1
, Arpitha T S 2
, Apoorva S A 3
, Gurudath K S 4
1.
Associate Professor, Dept of CS&E, Vidyavardhaka College of Engineering, Mysore, Karnataka, India
2.
Span Infotech, India
3.
Accord Software Systems, India
4.
Synowledge PV Services India Ltd
Abstract:
A Mobile Ad Hoc Network (MANET) is a wireless network consisting of mobile nodes,
which can communicate with each other without any infrastructure support. In these
networks, nodes typically cooperate with each other, by forwarding packets for nodes
which are not in the communication range of the source node. A fundamental issue
arising in mobile ad-hoc networks (MANETs) is the selection of the optimal path between
any two nodes. A method that has been advocated to improve routing efficiency is to
select the most stable path so as to reduce the latency and the overhead due to route
reconstruction. In this work we study the stability of a routing path, which is subject to
link failures caused by node mobility, and we consider as metrics of interest the duration
and the availability of a path. Moreover, using the results on path duration and
availability, we show how to determine the optimal path in terms of route stability, under
the Random Direction mobility models.
Keywords- MANETs, node mobility, mobility model, path availability, optimal path.
1. INTRODUCTION
Mobile Ad hoc Network (MANET) is different from traditional wireless networks in many
ways. One of the basic differences is that a MANET is a multi-hop wireless network, i.e., a
routing path is composed of a number of intermediate mobile nodes and wireless links connecting
them which can communicate with each other without any infrastructure support. In these
networks, nodes typically cooperate with each other, by forwarding packets for nodes which are
not in the communication range of the source node. Since nodes can move at any time, wireless
links are prone to be broken. Any link breakage along an established routing path will lead to a
path failure. A shortest path may fail sooner than another path connecting a given source and
destination pair. Frequent routing discovery is costly and inefficient.
Mobile ad hoc network (MANET) consists of mobile platform which communicate with each
other through wireless links, without infrastructure base stations. Each node not only is a host but
also a router that maintains routes to and forwards data packets for other nodes in the network
that may not be within direct wireless transmission range. Topology of a mobile ad hoc network
will often change rapidly; this behavior needs some management and solving problem of this type
of networks. If source and destination nodes are not within the transmission range of each other,
intermediate nodes are needed to serve as intermediate routers for the communication between
the two nodes [1]. Moreover, mobile platforms moves autonomously and communicate via
dynamically changing network. Thus, frequent change of network topology is a main challenge
for many important topics, such as routing protocol robustness, and performance degradation [2,
3].
12
www.arpublication.org
Originally, the MANET was proposed for military applications in the battlefield. However,
future MANETs could be deployed in various environments. City-wide MANETs (Bai et al.,
2003) have attracted research attentions recently because of its potential applications. Different
from movements in the battlefield, movements in a city are highly restricted by roadways, i.e., the
following movement rules must be obeyed: a vehicle or person can only move along roads, turn
or stay at intersections. In addition, the driving speed of a vehicle on a specific road segment
cannot exceed its prescribed speed limit. A similar mobility pattern is described in the Manhattan
mobility model (Bai et al., 2003). Therefore, it is possible for us to make a relatively accurate
prediction for mobility of mobile nodes, which will provide a good insight for finding reliable
routing paths.
Traffic relaying in MANETs, however, is a difficult task. Node mobility, signal interference
and power outages make the network topology frequently change. As a consequence, the links
along a route may fail, and an alternate path must be found. To avoid the degradation of the
system performance, several solutions for route creation and maintenance have been proposed in
the literature, taking into account various metrics of interest. A method that has been advocated to
improve routing efficiency is to select the most stable path [4], [5], [6], [7] so as to avoid packet
losses and limit the latency and overhead due to route reconstruction. Specifically, an algorithm
should be able to select a route based on some knowledge of the nodes motion and on a
probability model of the future availability of the route. Furthermore, if an estimate of the route
duration is available, route disruption can be avoided by creating an alternative path before the
current one breaks [7].
2. ASSUMPTIONS AND DEFINITIONS
While studying path duration and availability in MANETs, we make the following assumptions.
(i) The network comprises of nodes having a common transmission range, R, and has the same
mobility pattern.
(ii) Nodes move independently of each other.
(iii)The received signal only depends on its distance from the transmitter.
(iv)Communication links are bidirectional.
Let us consider two generic nodes, A and B, and let X (A) and X (B) be their positions,
respectively, at time t. We define the distance between the two nodes at time t as d A, B (t) = ||X
(A)-X (B) ||. According to assumption (3), a communication link between A and B exists if the
two nodes are within the radio range of each other. Then, considering assumption (1), we say that
a link between A and B exists at time t if d A, B (t) <R, and this link is bidirectional.
A. SSA Routing Protocol
Signal Stability based Adaptive (SSA) is a routing protocol, which finds route based on signal
strength, and location stability. In SSA, a mobile node measures the signal strength received
from other nodes, and this information is used to estimate the link stability between them. The
location stability mechanism is considered only as a supplement to signal-strength
measurements.
B. Link Stability
Link stability refers to the ability of a link to survive for certain duration. The higher the link
stability, the longer is the link duration. The stability of a link depends on how long two nodes,
which form that link, remain as neighbors. Two nodes are neighbors when they remain within
each other’s communication range, or the signal strength is above certain threshold. Mobility
causes link breakage and leads causes link breakage and leads to route recovery.
International Journal of Wireless and Mobile Networking (IJWAMN)Vol. 2, No. 1(May 2014) 13
www.arpublication.org
C. Path Duration and Path Availability
We define the path duration as the time interval from when the route is established until one of
the links along the route becomes unavailable, while we say that a path is available at a given
time instant t when all links along the path are active at time t.
D. Mobility Patterns
Node mobility is one of the most important characteristics of MANET. There have been
various mobility models or patterns proposed for MANETs. These patterns try to capture most
of the common mobility patterns, but few patterns capture realistic movements of nodes in
MANETs. Here we focus on bidimensional random mobility [8], and we consider nodes
moving according to the Random Direction (RD) mobility model, which was first introduced in
[9], [10]. According to such model, each node alternates periods of movement (move phase) to
periods during which it pauses (pause phase); at the beginning of each move phase, a node
independently selects its new direction and speed of movement [9]. Speed and direction are
kept constant for the whole duration of the node move phase.
3. SYSTEM DESIGN
3.1 Product Description
A fundamental issue arising in mobile ad hoc networks (MANETs) is the selection of the optimal
path between any two nodes. A method that has been advocated to improve routing efficiency is
to select the most stable path so as to reduce the latency and the overhead due to route
reconstruction. In this work, we study both the availability and the duration probability of a
routing path that is subject to link failures caused by node mobility. In particular, we focus on the
case where the network nodes move according to the Random Direction model, and we derive
both exact and approximate (but simple) expressions of these probabilities. Through our results,
we study the problem of selecting an optimal route in terms of path availability. Finally, we
propose an approach to improve the efficiency of reactive Routing protocols.
3.2 Module Description
There are mainly three modules, they are:
1. Module for Routing
By this Module the server determines the nodes in Range and determines the nodes within
range among which communication has to be started applying proper Routing Algorithms.
2. Module for finding the path
The implicit neighbor detection techniques used by routing protocols is based on periodic
broadcast of hello messages by a node, allowing neighbors to detect it. Two nodes that are at
two hop distance can be made to believe that they are neighbors, by simply replaying their
messages by the middle node. This is how the path is found out between nodes. The search
mechanism goes this way:
• UP-CLOCKWISE
• UP-ANTICLOCKWISE
• DOWN-CLOCKWISE
• DOWN-ANTICLOCKWISE
3. Module for Network Establishment
By this Module the Network among which transmission has to take place is determined. The
number of Nodes and the Network range is detected.
14
www.arpublication.org
3.3 Performance Requirements
Increased admin security: The PC should be highly secured and accessible only by the
administrator to avoid the misuse of the application.
Portability: The GUIs of this application is user-friendly so it is very easy for the user to
understand and respond to the same.
Reliability: This system has high probability to deliver us the required queries and the
functionalities available in the application.
Response time: The time taken by the system to complete a task given by the user is found to be
very less.
Scalability: The system can be extended to integrate the modifications done in the present
application to improve the quality of the product. This is meant for the future works that is to be
done on the application.
3.4 Requirement Analysis
Requirement analysis in system engineering and software engineering encompasses those tasks
that go into determining the needs or conditions to meet for a new or altered product, taking
account of the possibly conflicting requirements of the various stake holders, such as
beneficiaries or users.
3.4.1 Functional Requirements
These are statements of services the system should provide, how the system should react to
particular inputs and how the system should behave in particular situations.
• Simulation should run and it should simulate the network.
• Topology should have mobile nodes with pre defined frequency.
• Nodes should keep entering and leaving the network.
• Nodes should have all the information about itself.
• Get the network path and number of hops of the transmission.
• Get the Path availability and probability of the overall network.
3.4.2 Non Functional requirements
Non-Functional requirements presents a systematic and pragmatic approach to ‘building quality
into’ software systems. System must exhibit software quality attributes, such as accuracy,
performance, security, and modifiability. Since NFRs might not be absolutely achieved, they may
simply be satisfied sufficiently. To reflect this, NFRs are represented ‘soft goals’ whose
interdependencies, such as tradeoffs and synergy, are captured in graphs.
4. ARCHITECTURE OF PROPOSED METHOD
4.1 Existing System
A mobile ad hoc network, sometimes called a mobile mesh network, is a self-configuring network
of mobile devices connected by wireless links. Each device in a MANET is free to move
independently in any direction, and will therefore changes its links to other devices frequently.
Each must forward traffic unrelated to its own use, and therefore be a route. The primary
challenge in building a MANET is equipping each device to continuously maintain the
information required to properly route traffic. MANETs are a kind of wireless ad hoc networks
that usually has a routable networking environment on top of a link layer ad hoc network. They
are also a type of mesh network, but many mesh networks are not mobile or not wireless.
4.2 Proposed System
We focus on the stability of a routing path, which is subject to link failures caused by
node mobility.
International Journal of Wireless and Mobile Networking (IJWAMN)Vol. 2, No. 1(May 2014) 15
www.arpublication.org
We define the path duration as the time interval from when the route is established until
one of the links along the route becomes unavailable
While we say that a path is available at a given time instant t when all links along the
path are active at time t.
Then, our objective is to derive the probability of path duration till time t and the
probability of path availability at time t.
4.3 Design Consideration
The software is framed in such a way that it provides the flexibility for analyzing for various
sender and recipient maintaining account in same or different bank. A Joint bank account is
owned together (jointly) by two or more people. A joint account agreement is typically needed to
open such an account. This agreement will detail whether transactions require the signatures of all
parties or whether one party can take actions on his/her own. The way to restrict each holder’s
authority over the account is to request collective signing arrangements. To support this feature
we have come up with a scheme in which an e-cheque signed by all the Joint Account Holders,
when submitted for clearance, can be verified that it is signed by all the Joint Account Holders by
the clearing bank using a single verification equation. We propose to use the concept of Forward-
secure Multi-signatures for signing e-cheques used with Joint Accounts.
4.3.1 Development Methods
The development method used in this software design is the modular or functional development
method. In this, the system is broken down into different modules, with a certain amount of
dependency among them. The input-output data that flows from one-module to another will show
the dependency.
4.3.2 Process Flow Chart
A flowchart is a common type of chart that represents an algorithm or process, showing the steps
as boxes of various kinds, and their order by connecting these with arrows. Flowcharts are used in
analyzing, designing, documenting or managing a process or program in various fields.
16
www.arpublication.org
5. RESULTS AND OBSERVATIONS
Fig 5.1 is the primary page which allows user to Run, stop and reset the simulation.
International Journal of Wireless and Mobile Networking (IJWAMN)Vol. 2, No. 1(May 2014) 17
www.arpublication.org
Fig 5.1 Simulation Run
Fig 5.2 shows the options in the simulations. By selecting Topology button, user can view the
network, by selecting Throughput button, user can calculate the network throughput and number
of collisions, by clicking on Statistics button, user can calculate the overall statistics of the
network, by clicking on Traffic button, user can know the network traffic and by selecting Exit
button, user comes out of the simulation.
Fig 5.2 Simulation Run with Options
In fig 5.3 blue circles represent the nodes and brown line indicates the nodes moving according to
Random Direction Mobility Model.
18
www.arpublication.org
Fig 5.3 Network Topology
Fig 5.4 Throughput and Collision calculator
Fig 5.4 shows the calculator which is used to calculate the throughput based on number of
covered nodes in the network and number of collisions which is based on the formula number of
collisions in each node/ broadcastpeers (No of active nodes at that point of time) in the network.
Fig 5.5 General Status Update of the Network
Fig 5.5 provides the status of the mobile ad hoc network like number of Broadcastpeers (active
nodes in the network at that point of time), broadcast peers count will be equal to number of
nodes in the network, leaves (a node which can’t be destination to itself), channelnoise nodes
International Journal of Wireless and Mobile Networking (IJWAMN)Vol. 2, No. 1(May 2014) 19
www.arpublication.org
(nodes from which the optimal path can’t be established), Uptime (time during which the node is
active), average number of connections( number of immediate neighbors) capacity (source
capacity of each node) and used capacity (capacity/broadcastpeers) at that point of time.
Fig 5.6 Traffic Update
Fig 5.6 provides the traffic update like number of bytes up (avg bytes up / broadcastpeers where
bytes up is the number of bytes sent), bytes down (avg bytes down / broadcastpeers where bytes
down is the number of bytes received), bytes dropped (avg Bytes Dropped / broadcastpeers) ,
bytes collided (avg Bytes Collided / brodcastpeers), packet queue (avg Packet Queue
/brodcastpeers) of the mobile ad hoc network at that point of time.
6. CONCLUSION
We studied the duration and availability probabilities of routing paths in MANETs—a
fundamental issue to provide reliable routes and short route disruption times. We focused on the
Random Direction mobility model and derived both exact and approximate (but simple)
expressions for the probability of path duration and availability. We used these results to
determine the optimal path in terms of route stability; in particular, we showed some properties of
the optimal path.. Finally, based on our findings, we proposed an approach to find and select
routes, which accounts for the expected data transfer time over the path and allows to reduce the
overhead of reactive routing protocols.
REFERENCES
[1] C. E. Perkins and E. M. Royer, “Ad hoc on-demand distance vector routing.” In Proc. WMCSA. New
Orleans. LA. Feb. 1999. Pp. 90-100.
[2] Zhi Li and Yu-Kwong Kwok, “A New Multipath Routing Approach to Enhancing TCP Security in Ad
Hoc Wireless Networks” in Proc. ICPPW 2005.
[3] Y. Kim. J. Jung.S. Lee and C. Kim, “A Belt-Zone Method for Decreasing Control Messages in Ad Hoc
Networks,” ICSA 2006, LNCS 3982, pp 64-72. 2006.
[4] C. K. Toh, “Associativity-Based Routing for Ad-Hoc Mobile Networks,” Wireless Personal
Communications Journal, Vol 4, No. 2, pp. 103-139, Mar. 1997.
20
www.arpublication.org
[5] K. Dube, C. D. Rais, K. Y. Wang, S. K Tripathi, “Signal Stability based Adaptive Routing(SSA) for
Ad-Hoc Mobile Networks,” IEEE Personnal Communication,pp. 36-45, Feb. 1997.
[6] S. Agarwal, A. Ahuja, J. P. Singh, and R Shorey, “Route Lifetime Assesment Basesd Routing(RABR)
Protocol for Mobile Ad-Hoc Networks,” ICC 2000, New Orleans, USA, pp. 1697-1701, June 2000.
[7] W. Su, S. J. Lee, M. Gerla, “Mobility Prediction and Routing in Ad Hoc Wireless Networks,”
International Journal of Networks Management, Vol. 11. No. 1, pp. 3-30, Jan-Feb. 2001.
[8] T. Camp, J. Boleng, and V. Davies, “A Survey of Mobility Models for Ad Hoc Network Research,”
Wireless Comm. & Mobile Computing (WCMC ’02), special issue on mobile ad hoc networking: research,
trends, and applications, vol. 2, no. 5, pp. 483-502, 2002.
[9] P. Nain, D. Towsley, B. Liu, and Z. Liu, “Properties of Random Direction Model,” Proc. IEEE
INFOCOM, Mar. 2005.
[10] E.M. Royer, P.M. Melliar, and L.E. Moser-Smith, “An Analysis of the Optimum Node Density for Ad
hoc Mobile Networks,” Proc. IEEE Int’l Conf. Comm. (ICC ’01), June 2001.

Más contenido relacionado

La actualidad más candente

Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...ijmnct
 
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSSURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSgraphhoc
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)inventionjournals
 
Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)IISRT
 
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...IJERA Editor
 
Stability routing in fso manets
Stability routing in fso manetsStability routing in fso manets
Stability routing in fso manetseSAT Journals
 
Improve MANET network performance using ESPS approach
Improve MANET network performance using ESPS approachImprove MANET network performance using ESPS approach
Improve MANET network performance using ESPS approachSurbhi Sharma
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...ijwmn
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Routing mee
Routing meeRouting mee
Routing meesara_3
 
An improved node initiated message ferrying approach for data dissemina
An improved node initiated message ferrying approach for data disseminaAn improved node initiated message ferrying approach for data dissemina
An improved node initiated message ferrying approach for data disseminaIAEME Publication
 

La actualidad más candente (19)

Position based Opportunistic routing in MANET
Position based Opportunistic routing in MANETPosition based Opportunistic routing in MANET
Position based Opportunistic routing in MANET
 
Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...
 
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing AlgorithmOpportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
 
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSSURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
 
D0431013019
D0431013019D0431013019
D0431013019
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)
 
Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)
 
50120140501004
5012014050100450120140501004
50120140501004
 
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
 
Stability routing in fso manets
Stability routing in fso manetsStability routing in fso manets
Stability routing in fso manets
 
Improve MANET network performance using ESPS approach
Improve MANET network performance using ESPS approachImprove MANET network performance using ESPS approach
Improve MANET network performance using ESPS approach
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
B04660610
B04660610B04660610
B04660610
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Routing mee
Routing meeRouting mee
Routing mee
 
An improved node initiated message ferrying approach for data dissemina
An improved node initiated message ferrying approach for data disseminaAn improved node initiated message ferrying approach for data dissemina
An improved node initiated message ferrying approach for data dissemina
 
Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
 

Destacado

About Risks - WinValencia
About Risks - WinValenciaAbout Risks - WinValencia
About Risks - WinValenciawinvalencia
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...IISTech2015
 
The Ins and Outs of Accident Investigation
The Ins and Outs of Accident InvestigationThe Ins and Outs of Accident Investigation
The Ins and Outs of Accident InvestigationKPADealerWebinars
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...ieeeprojectschennai
 
Online Loan Application & Its Verification System
Online Loan Application & Its Verification SystemOnline Loan Application & Its Verification System
Online Loan Application & Its Verification SystemSoban Ahmad
 
Stability studies of drugs
Stability studies of drugsStability studies of drugs
Stability studies of drugsPromila Sharan
 

Destacado (6)

About Risks - WinValencia
About Risks - WinValenciaAbout Risks - WinValencia
About Risks - WinValencia
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...
 
The Ins and Outs of Accident Investigation
The Ins and Outs of Accident InvestigationThe Ins and Outs of Accident Investigation
The Ins and Outs of Accident Investigation
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...
 
Online Loan Application & Its Verification System
Online Loan Application & Its Verification SystemOnline Loan Application & Its Verification System
Online Loan Application & Its Verification System
 
Stability studies of drugs
Stability studies of drugsStability studies of drugs
Stability studies of drugs
 

Similar a Route Stability in Mobile Ad-Hoc Networks

Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
Local distance's neighbouring quantification
Local distance's neighbouring quantificationLocal distance's neighbouring quantification
Local distance's neighbouring quantificationijwmn
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET  Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET pijans
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...inventionjournals
 
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...IJCNCJournal
 
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSSHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSijasuc
 
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSSHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSijasuc
 
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSSHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSijasuc
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantificationcsandit
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
 
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444IJRAT
 
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc NetworksLink Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc NetworksIOSR Journals
 
Mobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelMobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelIOSR Journals
 

Similar a Route Stability in Mobile Ad-Hoc Networks (20)

Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
Local distance's neighbouring quantification
Local distance's neighbouring quantificationLocal distance's neighbouring quantification
Local distance's neighbouring quantification
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET  Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
 
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
 
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSSHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
 
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSSHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
 
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSSHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
 
D0441722
D0441722D0441722
D0441722
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
 
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 
Jp3417421749
Jp3417421749Jp3417421749
Jp3417421749
 
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc NetworksLink Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
 
Mobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelMobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility Model
 

Más de arpublication

International Journal of Digital Signal and Image Processing (IJDSIP)
International Journal of Digital Signal and Image Processing (IJDSIP)International Journal of Digital Signal and Image Processing (IJDSIP)
International Journal of Digital Signal and Image Processing (IJDSIP)arpublication
 
International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...arpublication
 
International Journal of Computer Networking and Communication (IJCNAC)
International Journal of Computer Networking and Communication (IJCNAC)International Journal of Computer Networking and Communication (IJCNAC)
International Journal of Computer Networking and Communication (IJCNAC)arpublication
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)arpublication
 
International Journal of Advanced Research in Electrical and Electronics Engi...
International Journal of Advanced Research in Electrical and Electronics Engi...International Journal of Advanced Research in Electrical and Electronics Engi...
International Journal of Advanced Research in Electrical and Electronics Engi...arpublication
 
International Journal of Advanced Mechanical Engineering & Applications (IJAMEA)
International Journal of Advanced Mechanical Engineering & Applications (IJAMEA)International Journal of Advanced Mechanical Engineering & Applications (IJAMEA)
International Journal of Advanced Mechanical Engineering & Applications (IJAMEA)arpublication
 
International Journal of Artificial Intelligence & Machine Learning (IJAIML)
International Journal of Artificial Intelligence & Machine Learning (IJAIML)International Journal of Artificial Intelligence & Machine Learning (IJAIML)
International Journal of Artificial Intelligence & Machine Learning (IJAIML)arpublication
 
International Journal of Digital Signal and Image Processing (IJDSIP)
International Journal of Digital Signal and Image Processing (IJDSIP)International Journal of Digital Signal and Image Processing (IJDSIP)
International Journal of Digital Signal and Image Processing (IJDSIP)arpublication
 
International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...arpublication
 
International Journal of Computer Networking and Communication (IJCNAC)
International Journal of Computer Networking and Communication (IJCNAC)International Journal of Computer Networking and Communication (IJCNAC)
International Journal of Computer Networking and Communication (IJCNAC)arpublication
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)arpublication
 
International Journal of Digital Signal and Image Processing (IJDSIP)
International Journal of Digital Signal and Image Processing (IJDSIP)International Journal of Digital Signal and Image Processing (IJDSIP)
International Journal of Digital Signal and Image Processing (IJDSIP)arpublication
 
International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...arpublication
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)arpublication
 
International Journal of Computer Networking and Communication (IJCNAC)
International Journal of Computer Networking and Communication (IJCNAC)International Journal of Computer Networking and Communication (IJCNAC)
International Journal of Computer Networking and Communication (IJCNAC)arpublication
 
International Journal of Advanced Research in Electrical and Electronics Engi...
International Journal of Advanced Research in Electrical and Electronics Engi...International Journal of Advanced Research in Electrical and Electronics Engi...
International Journal of Advanced Research in Electrical and Electronics Engi...arpublication
 
International Journal of Advanced Mechanical Engineering & Applications (IJAMEA)
International Journal of Advanced Mechanical Engineering & Applications (IJAMEA)International Journal of Advanced Mechanical Engineering & Applications (IJAMEA)
International Journal of Advanced Mechanical Engineering & Applications (IJAMEA)arpublication
 
International Journal of Artificial Intelligence & Machine Learning (IJAIML)
International Journal of Artificial Intelligence & Machine Learning (IJAIML)International Journal of Artificial Intelligence & Machine Learning (IJAIML)
International Journal of Artificial Intelligence & Machine Learning (IJAIML)arpublication
 
International Journal of Digital Signal and Image Processing (IJDSIP)
International Journal of Digital Signal and Image Processing (IJDSIP)International Journal of Digital Signal and Image Processing (IJDSIP)
International Journal of Digital Signal and Image Processing (IJDSIP)arpublication
 
International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...arpublication
 

Más de arpublication (20)

International Journal of Digital Signal and Image Processing (IJDSIP)
International Journal of Digital Signal and Image Processing (IJDSIP)International Journal of Digital Signal and Image Processing (IJDSIP)
International Journal of Digital Signal and Image Processing (IJDSIP)
 
International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...
 
International Journal of Computer Networking and Communication (IJCNAC)
International Journal of Computer Networking and Communication (IJCNAC)International Journal of Computer Networking and Communication (IJCNAC)
International Journal of Computer Networking and Communication (IJCNAC)
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)
 
International Journal of Advanced Research in Electrical and Electronics Engi...
International Journal of Advanced Research in Electrical and Electronics Engi...International Journal of Advanced Research in Electrical and Electronics Engi...
International Journal of Advanced Research in Electrical and Electronics Engi...
 
International Journal of Advanced Mechanical Engineering & Applications (IJAMEA)
International Journal of Advanced Mechanical Engineering & Applications (IJAMEA)International Journal of Advanced Mechanical Engineering & Applications (IJAMEA)
International Journal of Advanced Mechanical Engineering & Applications (IJAMEA)
 
International Journal of Artificial Intelligence & Machine Learning (IJAIML)
International Journal of Artificial Intelligence & Machine Learning (IJAIML)International Journal of Artificial Intelligence & Machine Learning (IJAIML)
International Journal of Artificial Intelligence & Machine Learning (IJAIML)
 
International Journal of Digital Signal and Image Processing (IJDSIP)
International Journal of Digital Signal and Image Processing (IJDSIP)International Journal of Digital Signal and Image Processing (IJDSIP)
International Journal of Digital Signal and Image Processing (IJDSIP)
 
International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...
 
International Journal of Computer Networking and Communication (IJCNAC)
International Journal of Computer Networking and Communication (IJCNAC)International Journal of Computer Networking and Communication (IJCNAC)
International Journal of Computer Networking and Communication (IJCNAC)
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)
 
International Journal of Digital Signal and Image Processing (IJDSIP)
International Journal of Digital Signal and Image Processing (IJDSIP)International Journal of Digital Signal and Image Processing (IJDSIP)
International Journal of Digital Signal and Image Processing (IJDSIP)
 
International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)
 
International Journal of Computer Networking and Communication (IJCNAC)
International Journal of Computer Networking and Communication (IJCNAC)International Journal of Computer Networking and Communication (IJCNAC)
International Journal of Computer Networking and Communication (IJCNAC)
 
International Journal of Advanced Research in Electrical and Electronics Engi...
International Journal of Advanced Research in Electrical and Electronics Engi...International Journal of Advanced Research in Electrical and Electronics Engi...
International Journal of Advanced Research in Electrical and Electronics Engi...
 
International Journal of Advanced Mechanical Engineering & Applications (IJAMEA)
International Journal of Advanced Mechanical Engineering & Applications (IJAMEA)International Journal of Advanced Mechanical Engineering & Applications (IJAMEA)
International Journal of Advanced Mechanical Engineering & Applications (IJAMEA)
 
International Journal of Artificial Intelligence & Machine Learning (IJAIML)
International Journal of Artificial Intelligence & Machine Learning (IJAIML)International Journal of Artificial Intelligence & Machine Learning (IJAIML)
International Journal of Artificial Intelligence & Machine Learning (IJAIML)
 
International Journal of Digital Signal and Image Processing (IJDSIP)
International Journal of Digital Signal and Image Processing (IJDSIP)International Journal of Digital Signal and Image Processing (IJDSIP)
International Journal of Digital Signal and Image Processing (IJDSIP)
 
International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...International Journal of Computer Science Applications & Information Technolo...
International Journal of Computer Science Applications & Information Technolo...
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Route Stability in Mobile Ad-Hoc Networks

  • 1. International Journal of Wireless and Mobile Networking (IJWAMN)Vol. 2, No. 1(May 2014) 11 www.arpublication.org Route Stability in Mobile Ad-Hoc Networks Pooja M R 1 , Arpitha T S 2 , Apoorva S A 3 , Gurudath K S 4 1. Associate Professor, Dept of CS&E, Vidyavardhaka College of Engineering, Mysore, Karnataka, India 2. Span Infotech, India 3. Accord Software Systems, India 4. Synowledge PV Services India Ltd Abstract: A Mobile Ad Hoc Network (MANET) is a wireless network consisting of mobile nodes, which can communicate with each other without any infrastructure support. In these networks, nodes typically cooperate with each other, by forwarding packets for nodes which are not in the communication range of the source node. A fundamental issue arising in mobile ad-hoc networks (MANETs) is the selection of the optimal path between any two nodes. A method that has been advocated to improve routing efficiency is to select the most stable path so as to reduce the latency and the overhead due to route reconstruction. In this work we study the stability of a routing path, which is subject to link failures caused by node mobility, and we consider as metrics of interest the duration and the availability of a path. Moreover, using the results on path duration and availability, we show how to determine the optimal path in terms of route stability, under the Random Direction mobility models. Keywords- MANETs, node mobility, mobility model, path availability, optimal path. 1. INTRODUCTION Mobile Ad hoc Network (MANET) is different from traditional wireless networks in many ways. One of the basic differences is that a MANET is a multi-hop wireless network, i.e., a routing path is composed of a number of intermediate mobile nodes and wireless links connecting them which can communicate with each other without any infrastructure support. In these networks, nodes typically cooperate with each other, by forwarding packets for nodes which are not in the communication range of the source node. Since nodes can move at any time, wireless links are prone to be broken. Any link breakage along an established routing path will lead to a path failure. A shortest path may fail sooner than another path connecting a given source and destination pair. Frequent routing discovery is costly and inefficient. Mobile ad hoc network (MANET) consists of mobile platform which communicate with each other through wireless links, without infrastructure base stations. Each node not only is a host but also a router that maintains routes to and forwards data packets for other nodes in the network that may not be within direct wireless transmission range. Topology of a mobile ad hoc network will often change rapidly; this behavior needs some management and solving problem of this type of networks. If source and destination nodes are not within the transmission range of each other, intermediate nodes are needed to serve as intermediate routers for the communication between the two nodes [1]. Moreover, mobile platforms moves autonomously and communicate via dynamically changing network. Thus, frequent change of network topology is a main challenge for many important topics, such as routing protocol robustness, and performance degradation [2, 3].
  • 2. 12 www.arpublication.org Originally, the MANET was proposed for military applications in the battlefield. However, future MANETs could be deployed in various environments. City-wide MANETs (Bai et al., 2003) have attracted research attentions recently because of its potential applications. Different from movements in the battlefield, movements in a city are highly restricted by roadways, i.e., the following movement rules must be obeyed: a vehicle or person can only move along roads, turn or stay at intersections. In addition, the driving speed of a vehicle on a specific road segment cannot exceed its prescribed speed limit. A similar mobility pattern is described in the Manhattan mobility model (Bai et al., 2003). Therefore, it is possible for us to make a relatively accurate prediction for mobility of mobile nodes, which will provide a good insight for finding reliable routing paths. Traffic relaying in MANETs, however, is a difficult task. Node mobility, signal interference and power outages make the network topology frequently change. As a consequence, the links along a route may fail, and an alternate path must be found. To avoid the degradation of the system performance, several solutions for route creation and maintenance have been proposed in the literature, taking into account various metrics of interest. A method that has been advocated to improve routing efficiency is to select the most stable path [4], [5], [6], [7] so as to avoid packet losses and limit the latency and overhead due to route reconstruction. Specifically, an algorithm should be able to select a route based on some knowledge of the nodes motion and on a probability model of the future availability of the route. Furthermore, if an estimate of the route duration is available, route disruption can be avoided by creating an alternative path before the current one breaks [7]. 2. ASSUMPTIONS AND DEFINITIONS While studying path duration and availability in MANETs, we make the following assumptions. (i) The network comprises of nodes having a common transmission range, R, and has the same mobility pattern. (ii) Nodes move independently of each other. (iii)The received signal only depends on its distance from the transmitter. (iv)Communication links are bidirectional. Let us consider two generic nodes, A and B, and let X (A) and X (B) be their positions, respectively, at time t. We define the distance between the two nodes at time t as d A, B (t) = ||X (A)-X (B) ||. According to assumption (3), a communication link between A and B exists if the two nodes are within the radio range of each other. Then, considering assumption (1), we say that a link between A and B exists at time t if d A, B (t) <R, and this link is bidirectional. A. SSA Routing Protocol Signal Stability based Adaptive (SSA) is a routing protocol, which finds route based on signal strength, and location stability. In SSA, a mobile node measures the signal strength received from other nodes, and this information is used to estimate the link stability between them. The location stability mechanism is considered only as a supplement to signal-strength measurements. B. Link Stability Link stability refers to the ability of a link to survive for certain duration. The higher the link stability, the longer is the link duration. The stability of a link depends on how long two nodes, which form that link, remain as neighbors. Two nodes are neighbors when they remain within each other’s communication range, or the signal strength is above certain threshold. Mobility causes link breakage and leads causes link breakage and leads to route recovery.
  • 3. International Journal of Wireless and Mobile Networking (IJWAMN)Vol. 2, No. 1(May 2014) 13 www.arpublication.org C. Path Duration and Path Availability We define the path duration as the time interval from when the route is established until one of the links along the route becomes unavailable, while we say that a path is available at a given time instant t when all links along the path are active at time t. D. Mobility Patterns Node mobility is one of the most important characteristics of MANET. There have been various mobility models or patterns proposed for MANETs. These patterns try to capture most of the common mobility patterns, but few patterns capture realistic movements of nodes in MANETs. Here we focus on bidimensional random mobility [8], and we consider nodes moving according to the Random Direction (RD) mobility model, which was first introduced in [9], [10]. According to such model, each node alternates periods of movement (move phase) to periods during which it pauses (pause phase); at the beginning of each move phase, a node independently selects its new direction and speed of movement [9]. Speed and direction are kept constant for the whole duration of the node move phase. 3. SYSTEM DESIGN 3.1 Product Description A fundamental issue arising in mobile ad hoc networks (MANETs) is the selection of the optimal path between any two nodes. A method that has been advocated to improve routing efficiency is to select the most stable path so as to reduce the latency and the overhead due to route reconstruction. In this work, we study both the availability and the duration probability of a routing path that is subject to link failures caused by node mobility. In particular, we focus on the case where the network nodes move according to the Random Direction model, and we derive both exact and approximate (but simple) expressions of these probabilities. Through our results, we study the problem of selecting an optimal route in terms of path availability. Finally, we propose an approach to improve the efficiency of reactive Routing protocols. 3.2 Module Description There are mainly three modules, they are: 1. Module for Routing By this Module the server determines the nodes in Range and determines the nodes within range among which communication has to be started applying proper Routing Algorithms. 2. Module for finding the path The implicit neighbor detection techniques used by routing protocols is based on periodic broadcast of hello messages by a node, allowing neighbors to detect it. Two nodes that are at two hop distance can be made to believe that they are neighbors, by simply replaying their messages by the middle node. This is how the path is found out between nodes. The search mechanism goes this way: • UP-CLOCKWISE • UP-ANTICLOCKWISE • DOWN-CLOCKWISE • DOWN-ANTICLOCKWISE 3. Module for Network Establishment By this Module the Network among which transmission has to take place is determined. The number of Nodes and the Network range is detected.
  • 4. 14 www.arpublication.org 3.3 Performance Requirements Increased admin security: The PC should be highly secured and accessible only by the administrator to avoid the misuse of the application. Portability: The GUIs of this application is user-friendly so it is very easy for the user to understand and respond to the same. Reliability: This system has high probability to deliver us the required queries and the functionalities available in the application. Response time: The time taken by the system to complete a task given by the user is found to be very less. Scalability: The system can be extended to integrate the modifications done in the present application to improve the quality of the product. This is meant for the future works that is to be done on the application. 3.4 Requirement Analysis Requirement analysis in system engineering and software engineering encompasses those tasks that go into determining the needs or conditions to meet for a new or altered product, taking account of the possibly conflicting requirements of the various stake holders, such as beneficiaries or users. 3.4.1 Functional Requirements These are statements of services the system should provide, how the system should react to particular inputs and how the system should behave in particular situations. • Simulation should run and it should simulate the network. • Topology should have mobile nodes with pre defined frequency. • Nodes should keep entering and leaving the network. • Nodes should have all the information about itself. • Get the network path and number of hops of the transmission. • Get the Path availability and probability of the overall network. 3.4.2 Non Functional requirements Non-Functional requirements presents a systematic and pragmatic approach to ‘building quality into’ software systems. System must exhibit software quality attributes, such as accuracy, performance, security, and modifiability. Since NFRs might not be absolutely achieved, they may simply be satisfied sufficiently. To reflect this, NFRs are represented ‘soft goals’ whose interdependencies, such as tradeoffs and synergy, are captured in graphs. 4. ARCHITECTURE OF PROPOSED METHOD 4.1 Existing System A mobile ad hoc network, sometimes called a mobile mesh network, is a self-configuring network of mobile devices connected by wireless links. Each device in a MANET is free to move independently in any direction, and will therefore changes its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a route. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. They are also a type of mesh network, but many mesh networks are not mobile or not wireless. 4.2 Proposed System We focus on the stability of a routing path, which is subject to link failures caused by node mobility.
  • 5. International Journal of Wireless and Mobile Networking (IJWAMN)Vol. 2, No. 1(May 2014) 15 www.arpublication.org We define the path duration as the time interval from when the route is established until one of the links along the route becomes unavailable While we say that a path is available at a given time instant t when all links along the path are active at time t. Then, our objective is to derive the probability of path duration till time t and the probability of path availability at time t. 4.3 Design Consideration The software is framed in such a way that it provides the flexibility for analyzing for various sender and recipient maintaining account in same or different bank. A Joint bank account is owned together (jointly) by two or more people. A joint account agreement is typically needed to open such an account. This agreement will detail whether transactions require the signatures of all parties or whether one party can take actions on his/her own. The way to restrict each holder’s authority over the account is to request collective signing arrangements. To support this feature we have come up with a scheme in which an e-cheque signed by all the Joint Account Holders, when submitted for clearance, can be verified that it is signed by all the Joint Account Holders by the clearing bank using a single verification equation. We propose to use the concept of Forward- secure Multi-signatures for signing e-cheques used with Joint Accounts. 4.3.1 Development Methods The development method used in this software design is the modular or functional development method. In this, the system is broken down into different modules, with a certain amount of dependency among them. The input-output data that flows from one-module to another will show the dependency. 4.3.2 Process Flow Chart A flowchart is a common type of chart that represents an algorithm or process, showing the steps as boxes of various kinds, and their order by connecting these with arrows. Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields.
  • 6. 16 www.arpublication.org 5. RESULTS AND OBSERVATIONS Fig 5.1 is the primary page which allows user to Run, stop and reset the simulation.
  • 7. International Journal of Wireless and Mobile Networking (IJWAMN)Vol. 2, No. 1(May 2014) 17 www.arpublication.org Fig 5.1 Simulation Run Fig 5.2 shows the options in the simulations. By selecting Topology button, user can view the network, by selecting Throughput button, user can calculate the network throughput and number of collisions, by clicking on Statistics button, user can calculate the overall statistics of the network, by clicking on Traffic button, user can know the network traffic and by selecting Exit button, user comes out of the simulation. Fig 5.2 Simulation Run with Options In fig 5.3 blue circles represent the nodes and brown line indicates the nodes moving according to Random Direction Mobility Model.
  • 8. 18 www.arpublication.org Fig 5.3 Network Topology Fig 5.4 Throughput and Collision calculator Fig 5.4 shows the calculator which is used to calculate the throughput based on number of covered nodes in the network and number of collisions which is based on the formula number of collisions in each node/ broadcastpeers (No of active nodes at that point of time) in the network. Fig 5.5 General Status Update of the Network Fig 5.5 provides the status of the mobile ad hoc network like number of Broadcastpeers (active nodes in the network at that point of time), broadcast peers count will be equal to number of nodes in the network, leaves (a node which can’t be destination to itself), channelnoise nodes
  • 9. International Journal of Wireless and Mobile Networking (IJWAMN)Vol. 2, No. 1(May 2014) 19 www.arpublication.org (nodes from which the optimal path can’t be established), Uptime (time during which the node is active), average number of connections( number of immediate neighbors) capacity (source capacity of each node) and used capacity (capacity/broadcastpeers) at that point of time. Fig 5.6 Traffic Update Fig 5.6 provides the traffic update like number of bytes up (avg bytes up / broadcastpeers where bytes up is the number of bytes sent), bytes down (avg bytes down / broadcastpeers where bytes down is the number of bytes received), bytes dropped (avg Bytes Dropped / broadcastpeers) , bytes collided (avg Bytes Collided / brodcastpeers), packet queue (avg Packet Queue /brodcastpeers) of the mobile ad hoc network at that point of time. 6. CONCLUSION We studied the duration and availability probabilities of routing paths in MANETs—a fundamental issue to provide reliable routes and short route disruption times. We focused on the Random Direction mobility model and derived both exact and approximate (but simple) expressions for the probability of path duration and availability. We used these results to determine the optimal path in terms of route stability; in particular, we showed some properties of the optimal path.. Finally, based on our findings, we proposed an approach to find and select routes, which accounts for the expected data transfer time over the path and allows to reduce the overhead of reactive routing protocols. REFERENCES [1] C. E. Perkins and E. M. Royer, “Ad hoc on-demand distance vector routing.” In Proc. WMCSA. New Orleans. LA. Feb. 1999. Pp. 90-100. [2] Zhi Li and Yu-Kwong Kwok, “A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks” in Proc. ICPPW 2005. [3] Y. Kim. J. Jung.S. Lee and C. Kim, “A Belt-Zone Method for Decreasing Control Messages in Ad Hoc Networks,” ICSA 2006, LNCS 3982, pp 64-72. 2006. [4] C. K. Toh, “Associativity-Based Routing for Ad-Hoc Mobile Networks,” Wireless Personal Communications Journal, Vol 4, No. 2, pp. 103-139, Mar. 1997.
  • 10. 20 www.arpublication.org [5] K. Dube, C. D. Rais, K. Y. Wang, S. K Tripathi, “Signal Stability based Adaptive Routing(SSA) for Ad-Hoc Mobile Networks,” IEEE Personnal Communication,pp. 36-45, Feb. 1997. [6] S. Agarwal, A. Ahuja, J. P. Singh, and R Shorey, “Route Lifetime Assesment Basesd Routing(RABR) Protocol for Mobile Ad-Hoc Networks,” ICC 2000, New Orleans, USA, pp. 1697-1701, June 2000. [7] W. Su, S. J. Lee, M. Gerla, “Mobility Prediction and Routing in Ad Hoc Wireless Networks,” International Journal of Networks Management, Vol. 11. No. 1, pp. 3-30, Jan-Feb. 2001. [8] T. Camp, J. Boleng, and V. Davies, “A Survey of Mobility Models for Ad Hoc Network Research,” Wireless Comm. & Mobile Computing (WCMC ’02), special issue on mobile ad hoc networking: research, trends, and applications, vol. 2, no. 5, pp. 483-502, 2002. [9] P. Nain, D. Towsley, B. Liu, and Z. Liu, “Properties of Random Direction Model,” Proc. IEEE INFOCOM, Mar. 2005. [10] E.M. Royer, P.M. Melliar, and L.E. Moser-Smith, “An Analysis of the Optimum Node Density for Ad hoc Mobile Networks,” Proc. IEEE Int’l Conf. Comm. (ICC ’01), June 2001.