SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Journal of Engineering Research and Development 
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com 
Volume 10, Issue 6 (June 2014), PP.38-41 
A Reliable data delivery in Mobile Ad hoc Network, 
Simulation Study 
Anil Kulkarni1, Arati Gouri2 
1Computer Science and Engineering, GNDEC Bidar , Karnataka. 
2Computer Science and Engineering, GNDEC Bidar , Karnataka 
Abstract:- In this, the problem of delivering data packets for highly dynamic mobile ad hoc 
network in a consistently good in quality or performance and the data to be trusted. The 
existing ad hoc routing protocols are vulnerable to node mobility. If route fails , the existing 
protocol called end-to-end protocol is not capable of discovering and recovering of route. To 
overcome the problem of existing protocol we introduce a new protocol called Position based 
routing protocol. The position based opportunistic routing protocol which takes the advantage 
of property of stateless indicates that no node in a network does not maintain any routing 
table and broadcast nature of wireless network. In the case of communication, virtual 
destination based void handling scheme is further proposed to work together with position 
based opportunistic routing protocol. 
Keywords:- Geographic routing, Mobile adhoc network, reliable data delivery. 
I. INTRODUCTION 
By definition, Mobile Ad hoc Network (MANET) is a collection of mobile nodes equipped with both a 
wireless source and destination that communicate with each other via bidirectional wireless links either directly 
or indirectly. 
A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network of mobile 
devices connected without wires. Each device in a MANET is free to move independently in any direction, 
therefore change its links to other devices frequently. Geo-graphic routing uses hop by hop routing to forward 
the packets by making use of the location information. 
The problem in the existing protocol is delivering of data packets in reliable and timely manner. The 
problem occurs because the existing protocol uses predetermination of route, this problem occurs because, if 
there is a route failure discovering of new route and recovering of failed route consume more time. 
So to overcome the above problem the position based opportunistic routing protocol will be introduced. In 
position based opportunistic routing protocol nodes are made as forwarding candidates and the suboptimal 
nodes also involved in packet forwarding. 
If the best forwarder node does not forward the packet in certain time slot, the suboptimal candidates will 
forward the packets according to their order and from this any one of the candidates succeeds in receiving and 
forwarding the packets to destination and transmission route will not be interrupted for any reason. 
An electronic copy can be downloaded from the conference website. For questions on paper 
guidelines, please contact the publications committee as indicated on the website. Information about final paper 
submission is available from the website. 
II. EXISTING SYSTEM 
Geo-graphic routing uses hop-by-hop routing which forwards the packets by using location information. 
To select next node forwarder with the positive progress towards the destination the greedy forwarding is used. 
In the greedy forwarding, the node which is far from the sender node is chosen as next node and if this node 
moves out of the senders coverage area the transmission will fails. 
The error in wireless channel and the dynamic network infrastructure, reliable data delivery in MANETs, in 
challenged environments with high mobility remains an issue. 
It is very difficult to maintain route deterministic for constant and fast changing network topology .Once the 
path fails it consumes more time for path recovery and discovery of new path. 
38
A Reliable data delivery in Mobile Ad hoc Network, Simulation Study 
III. PROPOSED SYSTEM 
To overcome the existing system problem, the position based opportunistic routing protocol is 
39 
proposed. 
In the position based opportunistic routing protocol the nodes which are involved in the transmission 
will be used as forwarding candidates and suboptimal node also used as forwarder if main forwarding nodes are 
not involve in the transmission. If the best forwarder node does not forward the packet in a given time slot, the 
suboptimal node involved in the transmission of the packets[2]. 
The modules which are used in the proposed system are given as follows: 
A. Position based opportunistic routing protocol (POR) 
B. Selection and prioritisation of forwarding candidate 
A. Position based opportunistic routing protocol (POR) 
The POR (position based opportunistic routing protocol) design is based on geographic routing and 
opportunistic forwarding. The nodes which are involved in the POR operation are assumed to be aware of their 
location and position of the neighbors node. The neighbors node information can be exchanged using piggyback 
in the data packets header. While for the position of the destination, we assumed that location registration and 
lookup service which maps node addresses. 
In the POR operation if the source node wants to forward the packet, the source node gets the location of 
the destination and attaches it to the packet header. Due to destination nodes transmission the multiple node path 
may splits from the original or true location of the final destination and the packet may drop even if it has 
already been delivered into the destination. 
B. Selection and prioritisation of forwarding candidate 
The selection and prioritization of forwarding nodes are one of the key problems in POR. The nodes located 
in the forwarding area would get the chance to be backup nodes. Forwarding area is found by source node and 
next node of the source node. There are two conditions which satisfies the node which is located in the given 
range of forwarding area 
a) It makes the positive progress towards the receiver 
b) In the forwarding region all nodes must have distance in such a way that they all must here one another 
and it should not be half of the transmission range of wireless node (i.e., R=2). 
IV. PERFORMANCE EVALUTION 
Network simulation is used to calculate the performance of POR and AOMDV (multipath routing 
protocol) is comparing with GPSR. Some of the simulation parameters which are using in simulation are given 
in the following table[1] . 
Parameter Value 
MAC protocol 
Propagation model 
Transmission range 
Traffic type 
Packet size 
Number of nodes 
Simulation time 
IEEE 802.11 
Two ray ground 
100m 
Constant bit rate 
100 
40 
5.0
A Reliable data delivery in Mobile Ad hoc Network, Simulation Study 
40 
The following are used for performance comparison: 
A. Packet delivery ratio : The ratio of the no of data packets received at the destination to the no of data 
packets send by the source. 
B. End-to-End latency : The total end-to-end delay are evaluated, together with cumulative distribution function 
of the delay. 
C. Path length: The average end-to-end path length(no of nodes) for successful packet delivery. 
Packet forwarding times per hop (FTH): The average number of times a packet Is being forwarded from the 
routing layer to deliver a data packet over each hop[1]. 
D. Packet forwarding times per packet (FTP): The average number of times a packet is being forwarded to 
deliver data packets from source to destination. 
V. RELATED WORK 
Multipath routing is used in wireless medium to increase the reliability of data transmission [2]. Existing 
multipath routing protocols are classified into the following types: 
a. Using different available paths[3][4] 
b. Packets replication with multiple paths 
c. Split and multipath delivery and reconstruction using some coding techniques. 
The connectivity between the mobile node and base station server can be improved by making use of 
opportunistic forwarding [5]. 
VI. RESULT 
In this module, the performance of the proposed method is analyzed. Based on the analyzed results X-graphs 
are plotted. Delay is the basic parameters considered here and X-graph is plotted for this parameters. 
In this graph we are comparing existing system with proposed system. By observing this graph we 
conclude that the delay proposed system is better than existing system. 
VII. CONCLUSION 
To addresses the problem of data delivery in reliable manner for Highly dynamic Mobile adhoc 
Networks changing of network infrastructure makes the adhoc protocols incapable of providing required 
performance. In case of link or path break due to the node mobility the data packets which are within the 
forwarding area get lost before discovery of new path. To overcome this problem a new protocol is proposed 
called POR[1]. 
In the POR the forwarding area will be assumed within and the nodes are selected must be within the 
transmission range and these nodes will be further use for the transmission of data packets and the distance 
between them must be in such a way that nodes must her one another and because of this nodes can share all 
node information from one node to another node and make of this there will be no failure of path and all the 
data packets must be delivered correctly in time to the destination.
A Reliable data delivery in Mobile Ad hoc Network, Simulation Study 
REFERENCES 
[1]. Shengbo Yang,Chal Kiat Yeo and Bu Sung Lee “Towards reliable data delivery for highly dynamic 
mobile ad hoc networks,” IEEE Trans. Mobile Computing, vol. 11, no. 1, Jan 2012. 
[2]. M. Marina and S. Das, “On-Demand Multipath Distance Vector Routing in Ad Hoc Networks,” Proc. 
Ninth Int’l Conf. Network Protocols (ICNP ’01), pp. 14-23, Nov. 2001. 
[3]. D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, “Highly Resilient, Energy-Efficient Multipath 
Routing in Wireless Sensor Networks,” ACM SIGMOBILE Mobile Computing and Comm. Rev., vol. 
5, no. 4, pp. 11-25, 2001. 
[4]. A. Valera, W. Seah, and S. Rao, “Improving Protocol Robustness in Ad Hoc Networks through 
Cooperative Packet Caching and Shortest Multipath Routing,” IEEE Trans. Mobile Computing, vol. 4, 
no. 5, pp. 443-457, Sept./Oct. 2005. 
[5]. M.-H. Lu, P. Steenkiste, and T. Chen, “Design, Implementation and Evaluation of an Efficient 
Opportunistic Retransmission Protocol,” Proc. ACM MobiCom, pp. 73-84, 2009. 
41

Contenu connexe

Tendances

Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
idescitation
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
Saurabh Mishra
 
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
IJECEIAES
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
ijwmn
 

Tendances (18)

218
218218
218
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
 
Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
 
Bx4201493498
Bx4201493498Bx4201493498
Bx4201493498
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided Routing
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
 
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
A02100108
A02100108A02100108
A02100108
 
A340105
A340105A340105
A340105
 

En vedette

En vedette (17)

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A1080107
A1080107A1080107
A1080107
 
Geo connections presentation
Geo connections presentationGeo connections presentation
Geo connections presentation
 
A1060104
A1060104A1060104
A1060104
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
E1083237
E1083237E1083237
E1083237
 
Pratosmart: non esiste città intelligente senza cittadini intelligenti
Pratosmart: non esiste città intelligente senza cittadini intelligentiPratosmart: non esiste città intelligente senza cittadini intelligenti
Pratosmart: non esiste città intelligente senza cittadini intelligenti
 
W. nee-batismo-parte-1
W. nee-batismo-parte-1W. nee-batismo-parte-1
W. nee-batismo-parte-1
 
USB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISE
USB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISEUSB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISE
USB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISE
 
Láminas de anatomia patológica leucemia
Láminas de anatomia patológica leucemiaLáminas de anatomia patológica leucemia
Láminas de anatomia patológica leucemia
 
Ivete
IveteIvete
Ivete
 
2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees
2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees
2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees
 
מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?
מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?
מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?
 
Ap grades 7 10 cg
Ap grades 7 10 cgAp grades 7 10 cg
Ap grades 7 10 cg
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 

Similaire à International Journal of Engineering Research and Development

DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
Editor IJMTER
 
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
IAESIJAI
 
Efficient Destination Discovery using Geographical Gossiping in MANETs
Efficient Destination Discovery using Geographical Gossiping in MANETsEfficient Destination Discovery using Geographical Gossiping in MANETs
Efficient Destination Discovery using Geographical Gossiping in MANETs
idescitation
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
IOSR Journals
 
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ijasuc
 

Similaire à International Journal of Engineering Research and Development (20)

Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
E0942531
E0942531E0942531
E0942531
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
E010322531
E010322531E010322531
E010322531
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
 
A2546035115
A2546035115A2546035115
A2546035115
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
Efficient Destination Discovery using Geographical Gossiping in MANETs
Efficient Destination Discovery using Geographical Gossiping in MANETsEfficient Destination Discovery using Geographical Gossiping in MANETs
Efficient Destination Discovery using Geographical Gossiping in MANETs
 
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
 
19 6 jul17 28apr 6576 8092-1-ed(edit)n
19 6 jul17 28apr 6576 8092-1-ed(edit)n19 6 jul17 28apr 6576 8092-1-ed(edit)n
19 6 jul17 28apr 6576 8092-1-ed(edit)n
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153
 
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
 

Plus de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
IJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
IJERD Editor
 

Plus de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.38-41 A Reliable data delivery in Mobile Ad hoc Network, Simulation Study Anil Kulkarni1, Arati Gouri2 1Computer Science and Engineering, GNDEC Bidar , Karnataka. 2Computer Science and Engineering, GNDEC Bidar , Karnataka Abstract:- In this, the problem of delivering data packets for highly dynamic mobile ad hoc network in a consistently good in quality or performance and the data to be trusted. The existing ad hoc routing protocols are vulnerable to node mobility. If route fails , the existing protocol called end-to-end protocol is not capable of discovering and recovering of route. To overcome the problem of existing protocol we introduce a new protocol called Position based routing protocol. The position based opportunistic routing protocol which takes the advantage of property of stateless indicates that no node in a network does not maintain any routing table and broadcast nature of wireless network. In the case of communication, virtual destination based void handling scheme is further proposed to work together with position based opportunistic routing protocol. Keywords:- Geographic routing, Mobile adhoc network, reliable data delivery. I. INTRODUCTION By definition, Mobile Ad hoc Network (MANET) is a collection of mobile nodes equipped with both a wireless source and destination that communicate with each other via bidirectional wireless links either directly or indirectly. A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires. Each device in a MANET is free to move independently in any direction, therefore change its links to other devices frequently. Geo-graphic routing uses hop by hop routing to forward the packets by making use of the location information. The problem in the existing protocol is delivering of data packets in reliable and timely manner. The problem occurs because the existing protocol uses predetermination of route, this problem occurs because, if there is a route failure discovering of new route and recovering of failed route consume more time. So to overcome the above problem the position based opportunistic routing protocol will be introduced. In position based opportunistic routing protocol nodes are made as forwarding candidates and the suboptimal nodes also involved in packet forwarding. If the best forwarder node does not forward the packet in certain time slot, the suboptimal candidates will forward the packets according to their order and from this any one of the candidates succeeds in receiving and forwarding the packets to destination and transmission route will not be interrupted for any reason. An electronic copy can be downloaded from the conference website. For questions on paper guidelines, please contact the publications committee as indicated on the website. Information about final paper submission is available from the website. II. EXISTING SYSTEM Geo-graphic routing uses hop-by-hop routing which forwards the packets by using location information. To select next node forwarder with the positive progress towards the destination the greedy forwarding is used. In the greedy forwarding, the node which is far from the sender node is chosen as next node and if this node moves out of the senders coverage area the transmission will fails. The error in wireless channel and the dynamic network infrastructure, reliable data delivery in MANETs, in challenged environments with high mobility remains an issue. It is very difficult to maintain route deterministic for constant and fast changing network topology .Once the path fails it consumes more time for path recovery and discovery of new path. 38
  • 2. A Reliable data delivery in Mobile Ad hoc Network, Simulation Study III. PROPOSED SYSTEM To overcome the existing system problem, the position based opportunistic routing protocol is 39 proposed. In the position based opportunistic routing protocol the nodes which are involved in the transmission will be used as forwarding candidates and suboptimal node also used as forwarder if main forwarding nodes are not involve in the transmission. If the best forwarder node does not forward the packet in a given time slot, the suboptimal node involved in the transmission of the packets[2]. The modules which are used in the proposed system are given as follows: A. Position based opportunistic routing protocol (POR) B. Selection and prioritisation of forwarding candidate A. Position based opportunistic routing protocol (POR) The POR (position based opportunistic routing protocol) design is based on geographic routing and opportunistic forwarding. The nodes which are involved in the POR operation are assumed to be aware of their location and position of the neighbors node. The neighbors node information can be exchanged using piggyback in the data packets header. While for the position of the destination, we assumed that location registration and lookup service which maps node addresses. In the POR operation if the source node wants to forward the packet, the source node gets the location of the destination and attaches it to the packet header. Due to destination nodes transmission the multiple node path may splits from the original or true location of the final destination and the packet may drop even if it has already been delivered into the destination. B. Selection and prioritisation of forwarding candidate The selection and prioritization of forwarding nodes are one of the key problems in POR. The nodes located in the forwarding area would get the chance to be backup nodes. Forwarding area is found by source node and next node of the source node. There are two conditions which satisfies the node which is located in the given range of forwarding area a) It makes the positive progress towards the receiver b) In the forwarding region all nodes must have distance in such a way that they all must here one another and it should not be half of the transmission range of wireless node (i.e., R=2). IV. PERFORMANCE EVALUTION Network simulation is used to calculate the performance of POR and AOMDV (multipath routing protocol) is comparing with GPSR. Some of the simulation parameters which are using in simulation are given in the following table[1] . Parameter Value MAC protocol Propagation model Transmission range Traffic type Packet size Number of nodes Simulation time IEEE 802.11 Two ray ground 100m Constant bit rate 100 40 5.0
  • 3. A Reliable data delivery in Mobile Ad hoc Network, Simulation Study 40 The following are used for performance comparison: A. Packet delivery ratio : The ratio of the no of data packets received at the destination to the no of data packets send by the source. B. End-to-End latency : The total end-to-end delay are evaluated, together with cumulative distribution function of the delay. C. Path length: The average end-to-end path length(no of nodes) for successful packet delivery. Packet forwarding times per hop (FTH): The average number of times a packet Is being forwarded from the routing layer to deliver a data packet over each hop[1]. D. Packet forwarding times per packet (FTP): The average number of times a packet is being forwarded to deliver data packets from source to destination. V. RELATED WORK Multipath routing is used in wireless medium to increase the reliability of data transmission [2]. Existing multipath routing protocols are classified into the following types: a. Using different available paths[3][4] b. Packets replication with multiple paths c. Split and multipath delivery and reconstruction using some coding techniques. The connectivity between the mobile node and base station server can be improved by making use of opportunistic forwarding [5]. VI. RESULT In this module, the performance of the proposed method is analyzed. Based on the analyzed results X-graphs are plotted. Delay is the basic parameters considered here and X-graph is plotted for this parameters. In this graph we are comparing existing system with proposed system. By observing this graph we conclude that the delay proposed system is better than existing system. VII. CONCLUSION To addresses the problem of data delivery in reliable manner for Highly dynamic Mobile adhoc Networks changing of network infrastructure makes the adhoc protocols incapable of providing required performance. In case of link or path break due to the node mobility the data packets which are within the forwarding area get lost before discovery of new path. To overcome this problem a new protocol is proposed called POR[1]. In the POR the forwarding area will be assumed within and the nodes are selected must be within the transmission range and these nodes will be further use for the transmission of data packets and the distance between them must be in such a way that nodes must her one another and because of this nodes can share all node information from one node to another node and make of this there will be no failure of path and all the data packets must be delivered correctly in time to the destination.
  • 4. A Reliable data delivery in Mobile Ad hoc Network, Simulation Study REFERENCES [1]. Shengbo Yang,Chal Kiat Yeo and Bu Sung Lee “Towards reliable data delivery for highly dynamic mobile ad hoc networks,” IEEE Trans. Mobile Computing, vol. 11, no. 1, Jan 2012. [2]. M. Marina and S. Das, “On-Demand Multipath Distance Vector Routing in Ad Hoc Networks,” Proc. Ninth Int’l Conf. Network Protocols (ICNP ’01), pp. 14-23, Nov. 2001. [3]. D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, “Highly Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks,” ACM SIGMOBILE Mobile Computing and Comm. Rev., vol. 5, no. 4, pp. 11-25, 2001. [4]. A. Valera, W. Seah, and S. Rao, “Improving Protocol Robustness in Ad Hoc Networks through Cooperative Packet Caching and Shortest Multipath Routing,” IEEE Trans. Mobile Computing, vol. 4, no. 5, pp. 443-457, Sept./Oct. 2005. [5]. M.-H. Lu, P. Steenkiste, and T. Chen, “Design, Implementation and Evaluation of an Efficient Opportunistic Retransmission Protocol,” Proc. ACM MobiCom, pp. 73-84, 2009. 41