SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 385
DESIGNING AN OPPORTUNISTIC ROUTING SCHEME FOR ADAPTIVE
CLUSTERING IN MOBILE AD-HOC NETWORKS
M. Viswanathan
Senior Software Engineer, Systole consultancy pvt ltd., Chennai-600028, Tamil Nadu, India
Abstract
Mobile networks have received great deal of attention during last few decades due to their potential applications such as large scale,
improved flexibility and reduced costs. This proposed work addresses two problems associated with mobile network such as method to
reduce overhead between the nodes, and energy balanced routing of packets by Co-Operative opportunistic routing for cluster based
communication. We propose a modified algorithm that uses On-Demand Opportunistic Group mobility based clustering
(ODOGMBC) for forming the cluster and predicting the cluster mobility by neighbourhood update algorithm. Cluster formation
involves election of a mobile node as Cluster head. Each cluster comprises of cluster head and non-cluster head node that forms a
cluster dynamically. Each node in the network continuously finds it neighbour by communicating with them, and nodes have
consistent updated routing information in route cache by neighbourhood update algorithm. In routing process packet forwarded by
the source node is updated by intermediate forwarder if topology undergo changes. This opportunistic routing scheme provides
responsive data transportation and managing the node effectively, even in heavily loaded environment. Thus, our proposed routing
technique helps us to reduce overhead, increases efficiency and better control of path selection.
Keywords- Clustering, Forwarder, MANET, Prediction, Reactive, opportunistic routing.
---------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
A mobile ad-hoc network (MANET) is a self-configuring
infrastructure less network of mobile devices interconnected
by wireless network. Each mobile device in mobile networks
is free to move independently, and will therefore change its
links to other devices frequently. The primary challenge in
building a MANET is equipping each device to continuously
maintain the information required to properly route traffic,
end-to-end data transfer, security, and providing support for
real-time multimedia streaming. Such networks may operate
by themselves or may be connected to the larger Internet.
Rapid advancement in mobile computing platform and
wireless communication technology lead us to develop a
method to elect cluster-heads and form clusters [5] in wireless
Manet [9]. Multi-cluster, wireless network should be able
adopts dynamically. Each cluster contains a cluster head and
non-cluster head node. The cluster-head is responsible for
allocating the resources and monitors communication within a
cluster. In a cluster [5], nodes are mutually closer to each other
than to nodes in other clusters. Cluster-Head maintains
consistent cluster structure when a new node enters or the old
one leaves the network, and also the nodes with limited battery
power [2].Prediction the location of the Mobile Node by
neighborhood update algorithm. The past history is used in
predicting the future one based on information found in the
routing table. Based on this information Clustering is
performed. When it is compared to the Original Position the
resulting Cluster Formed are the same. Thus the beacon
message sent from the member nodes to the Cluster-Head
regarding the Current location can be minimized. This will
reduce the power consumption [1], limited Bandwidth and
Increase the Stability of the Cluster.
2. RELATED WORKS
Cluster based opportunistic routing in mobile network has
drawn a lot of research interest about the routing algorithm,
emerges with special emphasis to overcome difficulties in
MANET.S. Biswas and R. Morris focused on ExOR, an
integrated routing and MAC technique that realize some of the
gains of cooperative diversity on standard radio hardware such
as 802.11.ExOR choose each hop of a packet's route after the
transmission for that hops [3]. S. Yang, et al proposed a novel
protocol called Position based Opportunistic Routing (POR)
which takes full advantage of the broadcast nature of wireless
channel and opportunistic forwarding [4]. (Zehua Wang, et al,
2010, 2011, and 2012) concentrated on opportunistic data
forwarding, and the local cooperative relay for (ODF) in
MANET allows more nodes to participate in the opportunistic
data forwarding even the node is not presented in the
forwarder list. It was an extension work of EXOR [8, 6], and
also they tackles the problem of opportunistic data transfer in
Manet. Our solution is called Cooperative Opportunistic
Routing in Mobile Ad hoc Networks (CORMAN) [7].
A Light weight proactive source routing protocol is used for
gathering the neighboring node information, so that each node
has complete information about its neighbors’. Opportunistic
data forwarding to another level by allow nodes that are not
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 386
listed as intermediate forwarders to retransmit data if they
believe certain packets are missing. PDR is constantly around
95% while that of AODV varies between 57% and 82% at
very high network density. A number of clustering algorithms
have been proposed and based on some of criteria to choose
cluster-head such as speed and direction, mobility [2], energy,
position, and the number of neighbor’s node. It has some
advantages and also has some drawbacks as a high
computational overhead for both clustering algorithm
execution and update operations.
3. PROPOSED SYSTEM
3.1 Problem definition:
The objective is to develop a multi-hop non-overlapping
reactive clustering protocol. i.e. every node is member of at
the most one cluster at an equivalent time. Otherwise, the
routing methodology and addressing mechanisms would have
to deal with the situation of multiple nodes. This is often not
the first goal, because it ends up in accrued complexity. The
clusters should be the basis for hierarchical routing. Each and
every node in the cluster has unique value, the cluster
members need to know their current leader, but not vice versa.
3.2 Neighbourhood update algorithm
Step 1: Initialize network (number nodes).
Step 2: For every node of network find (N).
Step 3: For each node which is alive
Find neighbour(s, d); Detect neighbors’ of the node and add it
to the neighbour table where s is the source and d is
destination.
Find average (n, di); Calculate the average distance of all
neighbour of node.
Sort them in ascending order
Step 4: For (all nodes)
If (node is alive)
Transmit the message to the neighbour having maximum
energy among the neighbours whose distance is less than or
equal to the calculated average distance.
Deducts the topology, if it undergoes changes new information
is updated in the routing cache. Find new routing path
If (node is not alive)
Node information is deleted from the routing table
neighborhood trimming.
Deduct the new neighbour to find the best forwarder which
ensures reliability.
3.3 On-Demand Opportunistic Group mobility based
clustering Algorithm
The Proposed reactive clustering algorithm is used in Mobile
Ad-hoc network to reduce communication overhead, and
increases the lifetime and stability of the
network.Neighborhood update algorithm, monitors the nodes
in the network, and maintains their information in Route
cache. The route cache was refreshed when new routes were
discovered and also recognizes its neighbors, which are
appropriate for clustering.
Step 1: Broadcast a beacon message to all its neighbor nodes
in the Cluster within the transmission range [12].
Process the beacon message received from the neighbor nodes
in the network and forms the routing table.
Calculate the cost and distance between the nodes from source
and destination and maintain consistent routing information.
Step 2: Broadcast the routing information to all its neighbour
nodes;
Step 3: Process the message received from the neighbor nodes
in the network and identifies the distance of the neighbor.
Step 4: Find the node with minimum distance and cost in the
neighborhood.
If (Dv is high)
Declare itself as the Cluster-head;
Else
Send request to join the Cluster formed by the neighbor with
least Dv;
Repeat this step for other clusters in Manet
4. SYSTEM ARCHITECTURE
Co-Operative opportunistic routing [11], for cluster based
communication has responsive data transportation and energy
efficient routing techniques. Each node in the network
continuously finds it neighbor by communicating with them,
and nodes have consistent updated routing information in
route cache by neighborhood update algorithm.
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 387
Fig.1. System Architecture
4.1 Discovery of Route:
The route discovery process involves sending route request
packets from a source to its neighbor nodes in the network,
which in turn forwards its request to their neighboring nodes,
and so on [10].Once the route-request message reaches the
destination node, it responds by a route-reply packet back to
the source node via the neighbor from which it first received
the route-request. When the route-request message reaches an
intermediate node that has a sufficiently update routing
information, it stops forwarding and sends a route-reply
message back to the source node. Once the routing path is
established, route maintenance process is carried on each
node. Each node maintains internal data structure of route path
information is called a route-cache until the destination
becomes inaccessible along the route.
4.2 Intermediate Route Update:
When data packets are received and stored by a forwarding
node, the node may have a different view to forward them to
the destination. The node which is closer to the destination
than the source node, (i.e.) forwarding node has more updated
routing information. In this case, the forwarding node updates
the part of the forwarder list in the packets. When the packets
with this updated forwarder list are broadcast by the
forwarder, the update about the network topology change
propagates back to its upstream neighbor. The neighbor makes
change to the packets in its route cache. When these cached
packets are broadcast later, the update cache is further
propagated towards the source node. Routing table is
maintained in route cache of each and every node, and sender
finds an optimal routing path based on the routing information
and minimum hop count, and data packet is forwarded to the
destination node.
4.3 Small Scale Retransmission:
To enhance the reliability of packet transmission between two
listed forwarders in the batch map, a small scale
retransmission is used. If a packet is not reached the
downstream node properly, the node which is not a forwarder
but present between the two listed forwarders can retransmit
the packet if it is closed to the listed forwarders. The node
separation distance can be estimated using the RSSI (Received
Signal Strength Indicator) [7] recorded when packets are
received. We use a scoring function to find a best transmitter.
5. PERFORMANCE EVALUATION
We compare On-Demand Opportunistic Group mobility based
clustering (ODOGMBC), with non-cluster AODV and its
functionality and performance, is simulated by Network
Simulator (version 2.34). There are 200 movable (nodes)
dispersed over a quadratic area measuring 2000 m X 2000
each movable nodes is equipped with an 802.11-capable
device. Routes are determined with AODV and its default
parameters. Each of the result was compared against varying
network dimension. In this model, each node moves towards a
series of target positions. The rate of velocity for each move is
uniformly selected from [0, vmax]. Once it has reached a
target position, it may pause for a specific amount of time
before moving towards the next position. In our tests, we have
a mobile scenario using this mobility model. The first series of
scenarios have a fixed vmax, a constant number of nodes, but
varying network dimensions. We inject CBR (constant bit
rate) data flows in the network. The performance graph is
given below.
Fig.2. PDR vs. Network Dimension
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 388
Fig.3. Throughput vs. Network Dimension
Fig.4. End-End Delay vs. Network Dimension
CONCLUSION AND FUTURE WORK
The proposed On-Demand Opportunistic Group mobility
based clustering (ODOGMBC), routing scheme for mobile ad
hoc networks, reduce overhead, and enhance reliability, higher
packet delivery ratio, throughput and fewer delay.
In future we can compare these parameter with varying node
velocity i.e. in heavily loaded environment, which reduce
overhead further , and the security based routing scheme can
be used for secure data transportation.
REFERENCES
[1]. Ali Bokar, Muslim Bozyigit, &CevatSener (2009).
Scalable Energy-Aware Dynamic Task Allocation.
International Conference on Advanced Information
Networking and Applications Workshops.
[2] S.Muthuramalingam, R.RajaRam, and V.Karthiga
Devi (2010). “A Dynamic Clustering Algorithm for MANETs
by modifying Weighted Clustering Algorithm with Mobility
Prediction”. International Journal of Computer and Electrical
Engineering, Vol. 2, No. 4
[3] S. Biswas and R. Morris, “ExOR: Opportunistic Multi-Hop
Routing for Wireless Networks,” in Proc. ACM Conference of
the Special Interest Group on Data Communication
(SIGCOMM), Philadelphia, PA, USA, August 2005, pp. 133–
144.
[4] S. Yang, F. Zhong, C. K. Yeo, B. S. Lee, and J. Boleng,
“Position Based Opportunistic Routing for Robust Data
Delivery in MANETs,” in Proc.2009 IEEE Conference on
Global Telecommunications (GLOBECOM),Honolulu,
Hawaii, USA, December 2009, pp. 1325–1330.
[5] Gerla .M. & Tsai .J. T. C. (1995). Multi-cluster Mobile
Multimedia Radio Network. ACM/ Baltzer Wireless Networks
Journal 95, vol. 1, pp.255-265.
[6] Zehua Wang, Cheng Li, and Yuan zhu Chen Local
Cooperative Relay for Opportunistic Data Forwarding in
Mobile Ad-hoc Networks Natural Sciences and Engineering
Research Council (NSERC) of Canada (Discovery Grants
293264-07 and327667-2010, and Strategic Project Grant
STPGP 397491-10).
[7] Z. Wang, Y. Chen, and C. Li, “CORMAN: a Novel
Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc
Networks,” IEEE Journal on Selected Areas in
Communications, vol. 30, no. 2, pp. 289–296, February 2012.
[8] Z. Wang, Y. Chen, and C. Li, “A New Loop-Free
Proactive Source Routing Scheme for Opportunistic Data
Forwarding in Wireless Networks,” IEEE Communications
Letters, vol. 15, pp. 1184–1186, November 2011
[9] Mohapatra.P. &Krishnamurthy.S.V. (2005). Ad Hoc
Networks Technologies and Protocols, Springer Science
Business Media.
[10] Perkins and E. M. Royer, “Ad hoc On-Demand
DistanceVector(AODV),Routing,”RFC3561,july2003.[Online
].Available:http://www.ietf.org/rfc/rfc3561.txt

Más contenido relacionado

La actualidad más candente

Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...inventionjournals
 
Replica Placement In Unstable Radio Links
Replica Placement In Unstable Radio LinksReplica Placement In Unstable Radio Links
Replica Placement In Unstable Radio LinksCSCJournals
 
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...ijasuc
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Delay Tolerant Network
Delay Tolerant NetworkDelay Tolerant Network
Delay Tolerant NetworkMichel Chamat
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
 

La actualidad más candente (14)

Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
 
Replica Placement In Unstable Radio Links
Replica Placement In Unstable Radio LinksReplica Placement In Unstable Radio Links
Replica Placement In Unstable Radio Links
 
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Delay Tolerant Network
Delay Tolerant NetworkDelay Tolerant Network
Delay Tolerant Network
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
 
B0781013215
B0781013215B0781013215
B0781013215
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
ROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTNROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTN
 
17 18
17 1817 18
17 18
 

Destacado

Nlp based retrieval of medical information for diagnosis of human diseases
Nlp based retrieval of medical information for diagnosis of human diseasesNlp based retrieval of medical information for diagnosis of human diseases
Nlp based retrieval of medical information for diagnosis of human diseaseseSAT Publishing House
 
The effect of exponentialcosine hyperbolic
The effect of exponentialcosine hyperbolicThe effect of exponentialcosine hyperbolic
The effect of exponentialcosine hyperboliceSAT Publishing House
 
Powerpoint
PowerpointPowerpoint
PowerpointLe Tuan
 
Conception and realisation of a sensor
Conception and realisation of a sensorConception and realisation of a sensor
Conception and realisation of a sensoreSAT Publishing House
 
Presentation 10 15 v1
Presentation 10 15 v1Presentation 10 15 v1
Presentation 10 15 v1Alicia White
 
Arima Beautification Project
Arima Beautification Project Arima Beautification Project
Arima Beautification Project Arima Vibes
 
Fern paradise Green House : Niwat Architects
Fern paradise Green House : Niwat ArchitectsFern paradise Green House : Niwat Architects
Fern paradise Green House : Niwat ArchitectsNiwat Architect Co.,ltd.
 
Fern paradise Architect Green House : Niwat Architects
Fern paradise Architect Green House : Niwat ArchitectsFern paradise Architect Green House : Niwat Architects
Fern paradise Architect Green House : Niwat ArchitectsNiwat Architect Co.,ltd.
 
Novatti banking simplified 2014
Novatti banking simplified 2014Novatti banking simplified 2014
Novatti banking simplified 2014selnekave
 
Mobilization of nano zero valent iron (n zvi) particles
Mobilization of nano zero valent iron (n zvi) particlesMobilization of nano zero valent iron (n zvi) particles
Mobilization of nano zero valent iron (n zvi) particleseSAT Publishing House
 
Thang Nguyen CV Independent
Thang Nguyen CV IndependentThang Nguyen CV Independent
Thang Nguyen CV IndependentThang Nguyen
 
Report based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networksReport based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networkseSAT Publishing House
 

Destacado (19)

Project Potico
Project PoticoProject Potico
Project Potico
 
The Restoration Diagnostic in Practice
The Restoration Diagnostic in PracticeThe Restoration Diagnostic in Practice
The Restoration Diagnostic in Practice
 
Blog 2
Blog 2Blog 2
Blog 2
 
Kaseluvi
KaseluviKaseluvi
Kaseluvi
 
Martin
MartinMartin
Martin
 
Nlp based retrieval of medical information for diagnosis of human diseases
Nlp based retrieval of medical information for diagnosis of human diseasesNlp based retrieval of medical information for diagnosis of human diseases
Nlp based retrieval of medical information for diagnosis of human diseases
 
The effect of exponentialcosine hyperbolic
The effect of exponentialcosine hyperbolicThe effect of exponentialcosine hyperbolic
The effect of exponentialcosine hyperbolic
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Conception and realisation of a sensor
Conception and realisation of a sensorConception and realisation of a sensor
Conception and realisation of a sensor
 
MGC Editorial Planning
MGC Editorial PlanningMGC Editorial Planning
MGC Editorial Planning
 
Presentation 10 15 v1
Presentation 10 15 v1Presentation 10 15 v1
Presentation 10 15 v1
 
Naac new
Naac newNaac new
Naac new
 
Arima Beautification Project
Arima Beautification Project Arima Beautification Project
Arima Beautification Project
 
Fern paradise Green House : Niwat Architects
Fern paradise Green House : Niwat ArchitectsFern paradise Green House : Niwat Architects
Fern paradise Green House : Niwat Architects
 
Fern paradise Architect Green House : Niwat Architects
Fern paradise Architect Green House : Niwat ArchitectsFern paradise Architect Green House : Niwat Architects
Fern paradise Architect Green House : Niwat Architects
 
Novatti banking simplified 2014
Novatti banking simplified 2014Novatti banking simplified 2014
Novatti banking simplified 2014
 
Mobilization of nano zero valent iron (n zvi) particles
Mobilization of nano zero valent iron (n zvi) particlesMobilization of nano zero valent iron (n zvi) particles
Mobilization of nano zero valent iron (n zvi) particles
 
Thang Nguyen CV Independent
Thang Nguyen CV IndependentThang Nguyen CV Independent
Thang Nguyen CV Independent
 
Report based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networksReport based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networks
 

Similar a Designing an opportunistic routing scheme for adaptive clustering in mobile ad hoc networks

Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancingijdpsjournal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...IJECEIAES
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewBRNSSPublicationHubI
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AKARTHIKEYAN V
 
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsIRJET Journal
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 

Similar a Designing an opportunistic routing scheme for adaptive clustering in mobile ad hoc networks (20)

Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancing
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
E1073644
E1073644E1073644
E1073644
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE A
 
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 

Más de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Más de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Último

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 

Último (20)

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 

Designing an opportunistic routing scheme for adaptive clustering in mobile ad hoc networks

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 385 DESIGNING AN OPPORTUNISTIC ROUTING SCHEME FOR ADAPTIVE CLUSTERING IN MOBILE AD-HOC NETWORKS M. Viswanathan Senior Software Engineer, Systole consultancy pvt ltd., Chennai-600028, Tamil Nadu, India Abstract Mobile networks have received great deal of attention during last few decades due to their potential applications such as large scale, improved flexibility and reduced costs. This proposed work addresses two problems associated with mobile network such as method to reduce overhead between the nodes, and energy balanced routing of packets by Co-Operative opportunistic routing for cluster based communication. We propose a modified algorithm that uses On-Demand Opportunistic Group mobility based clustering (ODOGMBC) for forming the cluster and predicting the cluster mobility by neighbourhood update algorithm. Cluster formation involves election of a mobile node as Cluster head. Each cluster comprises of cluster head and non-cluster head node that forms a cluster dynamically. Each node in the network continuously finds it neighbour by communicating with them, and nodes have consistent updated routing information in route cache by neighbourhood update algorithm. In routing process packet forwarded by the source node is updated by intermediate forwarder if topology undergo changes. This opportunistic routing scheme provides responsive data transportation and managing the node effectively, even in heavily loaded environment. Thus, our proposed routing technique helps us to reduce overhead, increases efficiency and better control of path selection. Keywords- Clustering, Forwarder, MANET, Prediction, Reactive, opportunistic routing. ---------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION A mobile ad-hoc network (MANET) is a self-configuring infrastructure less network of mobile devices interconnected by wireless network. Each mobile device in mobile networks is free to move independently, and will therefore change its links to other devices frequently. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic, end-to-end data transfer, security, and providing support for real-time multimedia streaming. Such networks may operate by themselves or may be connected to the larger Internet. Rapid advancement in mobile computing platform and wireless communication technology lead us to develop a method to elect cluster-heads and form clusters [5] in wireless Manet [9]. Multi-cluster, wireless network should be able adopts dynamically. Each cluster contains a cluster head and non-cluster head node. The cluster-head is responsible for allocating the resources and monitors communication within a cluster. In a cluster [5], nodes are mutually closer to each other than to nodes in other clusters. Cluster-Head maintains consistent cluster structure when a new node enters or the old one leaves the network, and also the nodes with limited battery power [2].Prediction the location of the Mobile Node by neighborhood update algorithm. The past history is used in predicting the future one based on information found in the routing table. Based on this information Clustering is performed. When it is compared to the Original Position the resulting Cluster Formed are the same. Thus the beacon message sent from the member nodes to the Cluster-Head regarding the Current location can be minimized. This will reduce the power consumption [1], limited Bandwidth and Increase the Stability of the Cluster. 2. RELATED WORKS Cluster based opportunistic routing in mobile network has drawn a lot of research interest about the routing algorithm, emerges with special emphasis to overcome difficulties in MANET.S. Biswas and R. Morris focused on ExOR, an integrated routing and MAC technique that realize some of the gains of cooperative diversity on standard radio hardware such as 802.11.ExOR choose each hop of a packet's route after the transmission for that hops [3]. S. Yang, et al proposed a novel protocol called Position based Opportunistic Routing (POR) which takes full advantage of the broadcast nature of wireless channel and opportunistic forwarding [4]. (Zehua Wang, et al, 2010, 2011, and 2012) concentrated on opportunistic data forwarding, and the local cooperative relay for (ODF) in MANET allows more nodes to participate in the opportunistic data forwarding even the node is not presented in the forwarder list. It was an extension work of EXOR [8, 6], and also they tackles the problem of opportunistic data transfer in Manet. Our solution is called Cooperative Opportunistic Routing in Mobile Ad hoc Networks (CORMAN) [7]. A Light weight proactive source routing protocol is used for gathering the neighboring node information, so that each node has complete information about its neighbors’. Opportunistic data forwarding to another level by allow nodes that are not
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 386 listed as intermediate forwarders to retransmit data if they believe certain packets are missing. PDR is constantly around 95% while that of AODV varies between 57% and 82% at very high network density. A number of clustering algorithms have been proposed and based on some of criteria to choose cluster-head such as speed and direction, mobility [2], energy, position, and the number of neighbor’s node. It has some advantages and also has some drawbacks as a high computational overhead for both clustering algorithm execution and update operations. 3. PROPOSED SYSTEM 3.1 Problem definition: The objective is to develop a multi-hop non-overlapping reactive clustering protocol. i.e. every node is member of at the most one cluster at an equivalent time. Otherwise, the routing methodology and addressing mechanisms would have to deal with the situation of multiple nodes. This is often not the first goal, because it ends up in accrued complexity. The clusters should be the basis for hierarchical routing. Each and every node in the cluster has unique value, the cluster members need to know their current leader, but not vice versa. 3.2 Neighbourhood update algorithm Step 1: Initialize network (number nodes). Step 2: For every node of network find (N). Step 3: For each node which is alive Find neighbour(s, d); Detect neighbors’ of the node and add it to the neighbour table where s is the source and d is destination. Find average (n, di); Calculate the average distance of all neighbour of node. Sort them in ascending order Step 4: For (all nodes) If (node is alive) Transmit the message to the neighbour having maximum energy among the neighbours whose distance is less than or equal to the calculated average distance. Deducts the topology, if it undergoes changes new information is updated in the routing cache. Find new routing path If (node is not alive) Node information is deleted from the routing table neighborhood trimming. Deduct the new neighbour to find the best forwarder which ensures reliability. 3.3 On-Demand Opportunistic Group mobility based clustering Algorithm The Proposed reactive clustering algorithm is used in Mobile Ad-hoc network to reduce communication overhead, and increases the lifetime and stability of the network.Neighborhood update algorithm, monitors the nodes in the network, and maintains their information in Route cache. The route cache was refreshed when new routes were discovered and also recognizes its neighbors, which are appropriate for clustering. Step 1: Broadcast a beacon message to all its neighbor nodes in the Cluster within the transmission range [12]. Process the beacon message received from the neighbor nodes in the network and forms the routing table. Calculate the cost and distance between the nodes from source and destination and maintain consistent routing information. Step 2: Broadcast the routing information to all its neighbour nodes; Step 3: Process the message received from the neighbor nodes in the network and identifies the distance of the neighbor. Step 4: Find the node with minimum distance and cost in the neighborhood. If (Dv is high) Declare itself as the Cluster-head; Else Send request to join the Cluster formed by the neighbor with least Dv; Repeat this step for other clusters in Manet 4. SYSTEM ARCHITECTURE Co-Operative opportunistic routing [11], for cluster based communication has responsive data transportation and energy efficient routing techniques. Each node in the network continuously finds it neighbor by communicating with them, and nodes have consistent updated routing information in route cache by neighborhood update algorithm.
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 387 Fig.1. System Architecture 4.1 Discovery of Route: The route discovery process involves sending route request packets from a source to its neighbor nodes in the network, which in turn forwards its request to their neighboring nodes, and so on [10].Once the route-request message reaches the destination node, it responds by a route-reply packet back to the source node via the neighbor from which it first received the route-request. When the route-request message reaches an intermediate node that has a sufficiently update routing information, it stops forwarding and sends a route-reply message back to the source node. Once the routing path is established, route maintenance process is carried on each node. Each node maintains internal data structure of route path information is called a route-cache until the destination becomes inaccessible along the route. 4.2 Intermediate Route Update: When data packets are received and stored by a forwarding node, the node may have a different view to forward them to the destination. The node which is closer to the destination than the source node, (i.e.) forwarding node has more updated routing information. In this case, the forwarding node updates the part of the forwarder list in the packets. When the packets with this updated forwarder list are broadcast by the forwarder, the update about the network topology change propagates back to its upstream neighbor. The neighbor makes change to the packets in its route cache. When these cached packets are broadcast later, the update cache is further propagated towards the source node. Routing table is maintained in route cache of each and every node, and sender finds an optimal routing path based on the routing information and minimum hop count, and data packet is forwarded to the destination node. 4.3 Small Scale Retransmission: To enhance the reliability of packet transmission between two listed forwarders in the batch map, a small scale retransmission is used. If a packet is not reached the downstream node properly, the node which is not a forwarder but present between the two listed forwarders can retransmit the packet if it is closed to the listed forwarders. The node separation distance can be estimated using the RSSI (Received Signal Strength Indicator) [7] recorded when packets are received. We use a scoring function to find a best transmitter. 5. PERFORMANCE EVALUATION We compare On-Demand Opportunistic Group mobility based clustering (ODOGMBC), with non-cluster AODV and its functionality and performance, is simulated by Network Simulator (version 2.34). There are 200 movable (nodes) dispersed over a quadratic area measuring 2000 m X 2000 each movable nodes is equipped with an 802.11-capable device. Routes are determined with AODV and its default parameters. Each of the result was compared against varying network dimension. In this model, each node moves towards a series of target positions. The rate of velocity for each move is uniformly selected from [0, vmax]. Once it has reached a target position, it may pause for a specific amount of time before moving towards the next position. In our tests, we have a mobile scenario using this mobility model. The first series of scenarios have a fixed vmax, a constant number of nodes, but varying network dimensions. We inject CBR (constant bit rate) data flows in the network. The performance graph is given below. Fig.2. PDR vs. Network Dimension
  • 4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 388 Fig.3. Throughput vs. Network Dimension Fig.4. End-End Delay vs. Network Dimension CONCLUSION AND FUTURE WORK The proposed On-Demand Opportunistic Group mobility based clustering (ODOGMBC), routing scheme for mobile ad hoc networks, reduce overhead, and enhance reliability, higher packet delivery ratio, throughput and fewer delay. In future we can compare these parameter with varying node velocity i.e. in heavily loaded environment, which reduce overhead further , and the security based routing scheme can be used for secure data transportation. REFERENCES [1]. Ali Bokar, Muslim Bozyigit, &CevatSener (2009). Scalable Energy-Aware Dynamic Task Allocation. International Conference on Advanced Information Networking and Applications Workshops. [2] S.Muthuramalingam, R.RajaRam, and V.Karthiga Devi (2010). “A Dynamic Clustering Algorithm for MANETs by modifying Weighted Clustering Algorithm with Mobility Prediction”. International Journal of Computer and Electrical Engineering, Vol. 2, No. 4 [3] S. Biswas and R. Morris, “ExOR: Opportunistic Multi-Hop Routing for Wireless Networks,” in Proc. ACM Conference of the Special Interest Group on Data Communication (SIGCOMM), Philadelphia, PA, USA, August 2005, pp. 133– 144. [4] S. Yang, F. Zhong, C. K. Yeo, B. S. Lee, and J. Boleng, “Position Based Opportunistic Routing for Robust Data Delivery in MANETs,” in Proc.2009 IEEE Conference on Global Telecommunications (GLOBECOM),Honolulu, Hawaii, USA, December 2009, pp. 1325–1330. [5] Gerla .M. & Tsai .J. T. C. (1995). Multi-cluster Mobile Multimedia Radio Network. ACM/ Baltzer Wireless Networks Journal 95, vol. 1, pp.255-265. [6] Zehua Wang, Cheng Li, and Yuan zhu Chen Local Cooperative Relay for Opportunistic Data Forwarding in Mobile Ad-hoc Networks Natural Sciences and Engineering Research Council (NSERC) of Canada (Discovery Grants 293264-07 and327667-2010, and Strategic Project Grant STPGP 397491-10). [7] Z. Wang, Y. Chen, and C. Li, “CORMAN: a Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 2, pp. 289–296, February 2012. [8] Z. Wang, Y. Chen, and C. Li, “A New Loop-Free Proactive Source Routing Scheme for Opportunistic Data Forwarding in Wireless Networks,” IEEE Communications Letters, vol. 15, pp. 1184–1186, November 2011 [9] Mohapatra.P. &Krishnamurthy.S.V. (2005). Ad Hoc Networks Technologies and Protocols, Springer Science Business Media. [10] Perkins and E. M. Royer, “Ad hoc On-Demand DistanceVector(AODV),Routing,”RFC3561,july2003.[Online ].Available:http://www.ietf.org/rfc/rfc3561.txt