SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 14, Issue 2 (Sep. - Oct. 2013), PP 06-12
www.iosrjournals.org
www.iosrjournals.org 6 | Page
An optimized link state routing protocol based on a cross layer
design for wireless mesh network
Prof. Rekha Patil.1
, Abhishek2
1
Associate Professor, Department of computer science and engineering, Poojya doddappa Appa College of
engineering, Gulbarga, Karnataka, India,
2
Department of computer science and engineering, Poojya doddappa Appa College of engineering, Gulbarga,
Karnataka, India,
Abstract: Analysis of routing in Mesh Network reveals that Proactive routes are fast but suffers vulnerability of
route failure under high mobility. Reactive routes on the other hand add extra overhead in the network for
obtaining a route before every communication session. As Link state routing provides a Network Map at each
node, It is well suited for a mesh network. However due to uncertain demand in the mesh network, link states
needs frequent updation and refreshing. A refreshing phase halts current session thus adding latency to the
session. In order to avoid this pitfall we propose a unique Cross layer Based Link State Routing for Mesh
network. Nodes keep monitoring the link quality as an when a packet is received in a link. Signal to Noise Ratio
and Received power is measured at the MAC layer. Any change in the stored value raises an event which is read
directly by the network layer. Once Network layer gets the notification, it automatically updates the route table
entry with new metric values. Thus there is no specific refresh phase and nodes automatically update the links
and route cache. Once a node realizes that the link quality with its next hop has degraded and a better one is
available, it opts a handover of the connection called vertical handover. Thus proposed system provides
seamless connectivity under varying load and mobility.
Keywords: Cross layer routing, Link state routing protocol, Wireless mesh networks (WMNs).
I. Introduction
Wireless mesh networks (WMNs) have emerged as a key technology for next-generation wireless
networking. Because of their advantages over other wireless networks, WMNs are undergoing rapid progress
and inspiring numerous applications. However, many technical issues still exist in this field. In order to provide
a better understanding of the research challenges of WMNs, here author has presented a detailed investigation of
current state-of-the-art protocols and algorithms for WMNs. Open research issues in all protocol layers are also
discussed, with an objective to spark new research interests in this field In WMNs, nodes are comprised of mesh
routers and mesh clients. Each node operates not only as a host but also as a router, forwarding packets on
behalf of other nodes that may not be within direct wireless transmission range of their destinations. A WMN is
dynamically self-organized and self-configured, with the nodes in the network automatically establishing and
maintaining mesh connectivity among themselves (creating, in effect, an ad hoc network). This feature brings
many advantages to WMNs such as low up-front cost, easy network maintenance, robustness, and reliable
service coverage. Conventional nodes (e.g., desktops, laptops, PDAs, Pocket PCs, phones, etc.) equipped with
wireless network interface cards (NICs) can connect directly to wireless mesh routers.
Wireless mesh networks (WMNs) are dynamically self-organized and self-configured, with the nodes
in the network automatically establishing an ad hoc network and maintaining the mesh connectivity. WMNs are
comprised of two types of nodes: mesh routers and mesh clients. Other than the routing capability for
gateway/bridge functions as in a conventional wireless router, a mesh router contains additional routing
functions to support mesh networking. Through multi-hop communications, the same coverage can be achieved
by a mesh router with much lower transmission power. To further improve the flexibility of mesh networking, a
mesh router is usually equipped with multiple wireless interfaces built on either the same or different wireless
access technologies. In spite of all these differences, mesh and conventional wireless routers are usually built
based on a similar hardware platform. Mesh routers have minimal mobility and form the mesh backbone for
mesh clients. Thus, although mesh clients can also work as a router for mesh networking, the hardware platform
and software for them can be much simpler than those for mesh routers. For example, communication protocols
for mesh clients can be light-weight, gateway or bridge functions do not exist in mesh clients, and only a single
wireless interface is needed in a mesh client, and so on. In addition to mesh networking among mesh routers and
mesh clients, the gateway/bridge functionalities in mesh routers enable the integration of WMNs with various
other networks. Conventional nodes equipped with wireless network interface cards (NICs) can connect directly
to WMNs through wireless mesh routers.
An optimized link state routing protocol based on a cross layer design for wireless mesh network
www.iosrjournals.org 7 | Page
Customers without wireless NICs can access WMNs by connecting to wireless mesh routers through,
for example, Ethernet. Thus, WMNs will greatly help users to be always-on-line anywhere, anytime.
Consequently, instead of being another type of ad-hoc networking, WMNs diversify the capabilities of ad-hoc
networks. This feature brings many advantages to WMNs, such as low up-front cost, easy network maintenance,
robustness, reliable service coverage, etc. Therefore, in addition to being widely accepted in the traditional
application sectors of ad hoc networks, WMNs are undergoing rapid commercialization in many other
application scenarios such as broadband home networking, community networking, building automation, high-
speed metropolitan area networks, and enterprise networking.
WMNs support ad hoc networking, and have the capability of self-forming, self-healing, and self-
organization. WMNs are multi-hop wireless networks, but with a wireless infrastructure/backbone provided by
mesh routers. Mesh routers have minimal mobility and perform dedicated routing and configuration, which
significantly decreases the load of mesh clients and other end nodes. Mobility of end nodes is supported easily
through the wireless infrastructure. Mesh routers integrate heterogeneous networks, including both wired and
wireless. Thus, multiple types of network access exist in WMNs. Power-consumption constraints are different
for mesh routers and mesh clients. WMNs are not stand-alone and need to be compatible and interoperable with
other wireless networks.
The paper is organized as follows section I Introduction, section II related work, section III represents
Methodology, system design and implementation algorithm, section IV represents Results and Discussion,
section V finally conclusion.
II. Related Work
Wireless mesh network (WMN) is a novel kind of distributed broadband network architecture, of
which the key idea is that every node in the network can be the access In recent years, the research approach of
integrating cross-layer idea into the WMN routing protocol design has made obvious progress, which can
increase the utilization of network resources to a large extent and enhance the Qos guarantee to users.
Point and the router at the same time [1]. This approach has obtained the recognition of a growing
number of scholars and research institutions. The traditional minimum hop based routing protocol [2 ]has the
flaws that it cannot effectively control congestion, has poor fairness, and cannot realize load balance. Reference
[3] proposed a capacity-aware routing (CAR) protocol, which adopted a routing metric called bottleneck link
capacity (BLC). This metric can increase the network throughput and reduce the end-to-end delay to a certain
degree by the cross-layer operation of considering the link interference, the link load, and other link quality
information.
Proposed a QoS-aware routing with a congestion control and load balancing protocol (QRCCLB) [4],
which, by introducing the cross-layer operation, takes dynamic source routing protocol in an Ad hoc network as
the prototype and can make the network traffic bypass the network‟s business hotspot, thus achieve the effect of
congestion control and load balance. In [5], a wireless fidelity Ad hoc on-demand distance vector (WiFi-
AODV) routing protocol was proposed, which fully exploits the adaptive rate switching mechanism of
IEEE802.11 by introducing the cross-layer mechanism, in which nodes use the data transmission rate of the
physical layer as a metric and are able to establish a route with a high data rate and low transmission delay.
proposed an integrated metrics based extended dynamic source routing method (EDSR) [6], which uses
the cross-layer design to provide the frame delivery rate, extra bandwidth, and the node load of the media access
control (MAC) layer for the network layer routing algorithm, thus improving the throughput rate and load
balance capability of the network and satisfying users‟ QoS requirements by promoting the network‟s overall
performance. These routing protocols are all proposed based on existing on-demand routing protocols of Ad hoc
network, such as dynamic source routing, and Ad hoc on-demand distance vector routing. But for WMN, the
network node is relatively fixed. Only node failures, as well as joining, leaving, and the uncertainty of wireless
links will result in changes in the network topology. The change rate of network topology is far below the
arrival rate of the data flow and the main business in WMN is the Internet business with certain delay
requirements. These routing protocols have jumped out of the traditional route of taking the minimum hop as the
routing metric and introduced the idea of cross-layer design. But there is a lack of systemic knowledge for the
cross-layer design of WMN, in which the implementation process is complex and the practicality is low
The design of a CL-OLSR protocol for WMN based on optimized link state routing (OLSR) protocol.
CL-OLSR based on [6] refines the idea of cross-layer design, and proposes a brand-new routing metric CLM
applicable to WMN. This routing metric [7] takes into account four cross-layer factors: node available
bandwidth, node balance, link delivery rate, and link interference by introducing the cross-layer operation
mechanism. Through considering these four factors, the route selection is optimized to a large extent, the
network throughput is improved and the goal of load balance is achieved. Compared with the on-demand
routing, CL-OLSR is a proactive routing protocol[8] of hop-by-hop forwarding, which is more suitable for
An optimized link state routing protocol based on a cross layer design for wireless mesh network
www.iosrjournals.org 8 | Page
approximately static topological properties of WMN, and satisfies the requirements of low delay of the traffic
flow. Moreover, the algorithm is relatively simple and practical.
III. Methodology
The overview of the project methodology is explained in brief as follows.
 Every Node Measure the SINR and Received signal strength for every received packet. This value is
updated in Neighbor Table by Network layer if there is a significant variation with past value.
 A route is established using OLSR which takes into account of current state of links
 In the Middle of a session if a node tracks that better access point/relay node is available with better link
quality, then requests for a change in connection.
 Transmission starts through this path upon link switch over.
 Thus routing is through the best link. Best link is always maintained without rerouting. MAC layer
parameter like Packet Rate. In physical layer calculate Power Loss.
Fig. 1 Cross-layer module
Proposed Work
Routing is simply the function of knowing which path to take in order to deliver the data from one end
to another. It must include an addressing scheme and a routing protocol. To put it most simply, if the addressing
scheme consisted of house addresses, then a knowledgeable postman would be the routing protocol. Routing
protocols are worked hard in a mesh, particularly if it is mobile. We can imagine our postman‟s job if houses
were regularly to disappear and re-appear somewhere else, or if they are all moved constantly in different
directions. This is the nature of the mobile routing protocol challenge. Routing protocols must be efficient and
must either keep their knowledge proactively up-to-date, or be quickly reactive when routes are required. Which
of these two routing approaches is better depends on the behaviour of the mesh users. And the traffic which
must be carried. Each mesh node must participate in the routing and relay of other‟s traffic. Every node is a
router In an Mesh network environment, each node participates within the network not only as a possible source
and sink of traffic but, also as a relay and a router, enabling the forwarding of traffic between nodes in the
network. Thus, in a mesh, each and every node needs to know what the route traffic needs to follow in order to
reach its destination. This is directly analogous to router behaviour in the internet, although the big difference is
that not all internet nodes need to be routers. It follows mobility adds volatility to the routing problem.
Every node is a relay It is always necessary for nodes to act as relays to form a mesh. This is essential but has
several consequences.
Firstly, by acting as a relay, anode takes on a workload over and above that needed to support its user‟s
requirements. This accepted consensus from both academic and commercial published work is that nodes often
need to be able to relay traffic of a volume a few times above that of their own service, i.e. they must handle not
only their user generated traffic but potentially that of several other users as well. This implies that meshes will
require more capable user nodes than otherwise equivalent cellular systems. Secondly, a consequence of having
a service level which depends on the performance of user nodes is an increased difficulty in maintenance and
upgrade. For example with the introduction of EDGE onto GSM it was possible to upgrade base stations, and
then allow subscribers to sign up to the new services as and when required, if at all. With a mesh system, users
are dependent on the installed base of fellow subscribers and so new services cannot be provided unless all or at
least a substantial fraction of existing users are persuaded to upgrade their units. Proactive and reactive routing
Mesh routing protocols are used in environments where there is not necessarily a well-controlled infrastructure
network but where there is a common routing policy. There are two main categories of routing: proactive and
reactive. Proactive routing protocols are based on the „normal‟ routing protocols used in wired networks, such as
today‟s internet. Algorithms based on distance vector and link state are common. Distance vector often uses the
number of hops as a metric to minimise when selecting the best route, but can also go beyond this to consider
more parameters, for example link bandwidth and delay. This is used to construct a route table, which is shared
with other routers.
An optimized link state routing protocol based on a cross layer design for wireless mesh network
www.iosrjournals.org 9 | Page
Link state operation is more complex and requires each router to build its own map of the network.
Thus, in proactive protocols, there is an attempt to build locally, at each node, a picture of roots within the
network before they are required for use. The routing tables are usually built periodically through the normal
operation of the protocol exchanging routing update packets. In normal operation, this has advantage that the
routes are already pre-computed and so packet forwarding can take place as soon as a packet for a particular
destination appears at a node. The drawback is that routes may be calculated and re-calculated (for e.g. due to
node mobility) when they are actually not required for data. This wastes bandwidth and, for mobile nodes, also
waste battery power via the sending and receiving of unnecessary routing updates. Reactive routing takes an
alternative approach by building routes only upon demand. It may also cache route information according to
some short time-out or stale-ness policy. Cached routes can be used as required, but if a route is not known then
it has to be „discovered‟. This has advantage that routes are only evaluated when needed, although this approach
adds latency to packet forwarding when routes are not already known. Generally, the reactive routing approach
is the one that has received most attention in the adhoc networking community.
Sequence Numbers
A difficulty with flooding, as described so far, is that when all routers have received all LSAs, the
flooding must stop. A time-to-live value in the packets could simply be relied on to expire, but it is hardly
efficient to permit LSAs to wander the network until they expire. Take the network in Figure 2. Subnet
172.22.4.0 at Router A has failed, and A has flooded an LSA to its neighbors B and D, advertising the new state
of the link. B and D dutifully flood to their neighbors, and so on.
Fig. 2 When a topology change occurs, LSAs advertising the change will be flooded throughout the network.
Look next at what happens at Router C. An LSA arrives from Router B at time t1, is entered into C's
topological database, and is forwarded to Router F. At some later time t3, another copy of the same LSA arrives
from the longer A-D-E-F-C route. Router C sees that it already has the LSA in its database; the question is,
should C forward this LSA to Router B? The answer is no because B has already received the advertisement.
Router C knows this because the sequence number of the LSA it received from Router F is the same as the
sequence number of the LSA it received earlier from Router B. When Router A sent out the LSA, it included an
identical sequence number in each copy. This sequence number is recorded in the routers' topological databases
along with the rest of the LSA; when a router receives an LSA that is already in the database and its sequence
number is the same, the received information is discarded. If the information is the same but the sequence
number is greater, the received information and new sequence number are entered into the database and the LSA
is flooded. In this way, flooding is abated when all routers have seen a copy of the most recent LSA.
As described so far, it seems that routers could merely verify that their link state databases contain the
same LSA as the newly received LSA and make a flood/discard decision based on that information, without
needing a sequence number. But imagine that immediately after Figure 2‟s network 172.22.4.0 failed, it came
back up. Router A might send out an LSA advertising the network as down, with a sequence number of 166;
then it sends out a new LSA announcing the same network as up, with a sequence number of 167. Router C
receives the down LSA and then the up LSA from the A-B-C path, but then it receives a delayed down LSA
from the A-D-E-F-C path. Without the sequence numbers, C would not know whether or not to believe the
delayed down LSA. With sequence numbers, C's database will indicate that the information from Router A has a
sequence number of 167; the late LSA has a sequence number of 166 and is therefore recognized as old
information and discarded.
An optimized link state routing protocol based on a cross layer design for wireless mesh network
www.iosrjournals.org 10 | Page
Algorithm
Step 1: The number of nodes are initialized over an area of a=X*Y mts.
Step 2: Any node is represented by layer L={A,N,P,LL,NB}
Where,
A= application layer
N= network layer
P= physical layer
LL=link layer
NB=notification board.
Step 3: At the time of initialization each node Ni broadcast its equal li to its neighbours. Upon receiving li by
Nj. Nj calculates link quality Qij makes an table entry P.IJ= {i. j, li Qij}
Step 4: At the saturation state any routes RI finds a path to all the nodes either directly or through any other
arbitrary router Rj by iterating in T.
Step 5: Every router RI exchanges every possible route with every other route RJ.
Step 6: Association phase – where NI closure to RI request for an association which is replied by RI.
Step 7: Request phase – NI generates data packets for destination d.
Step 8: Forwarding phase – upon receiving packet from NI to d
.RI finds route from T and forwards to the next hop.
Step 9: Topology change phase – any node NI moves to a next location Xi2, Yi2 from its current location Xi1
,Yi1 at a speed Vi using linear mobility model.
Step 10: Link quality change –The above event results in change of link quality measured at llj of a node J
initiating RE routing request.
Step 11: Node updates T and goes to saturation phase for obtaining new route. Further packets are forwarded
through new path
IV. Results And Discussion
wmn is composed of mesh routers and clients. The mobility of the node have significant impanct on the
performance of the system.global route cache keeps a record of the network map based on the signal to noise
ratio and the received power. Later routing is done to achive max throughput and to reduce the delay.
Fig. 3 Hand over networks
Fig. 4 Hand over networks with airframe packets
An optimized link state routing protocol based on a cross layer design for wireless mesh network
www.iosrjournals.org 11 | Page
Fig. 5 Performance measurement at each node upon receiving packet
Here delay refers to the time taken for a packet to be transmitted across a network from source to destination
Speed Vs proposed delay is plotted in the above fig.The different delays are queuing delay, propagation delay,
processing delay, processing time. The delay is calculated for different number of nodes. As shown in figure the
end to end delays compared with existing ETX method, which shows that the delay is less for the proposed
bandwidth system as the speed is increased in regular interval
Jitter is the variation in time between packets arriving, caused by network congestion, time drift, or route
changes. A jitter buffer can be used to handle jitter. The types of jitter are random jitter and deterministic jitter.
Jitter is defined as a variation in the delay of received packets. At the sending side, packet are sent in a
continuous stream with the packets spaced evenly apart. Due to network congestion, improper queuing , or
configuration errors, this steady stream can become lumpy, or the delay between each packet can vary instead of
remaining constant. The data packets forwarding overhead increases as numbers of node increases. The jitter
occurs because of traffic, interference etc. also while sending more data in the routing path the data packet
overhead is occurred. Since jitter is less for the proposed system.
Threshold is the minimum, of the maximum value to be achieved, here the sinr gradually decreases.
An optimized link state routing protocol based on a cross layer design for wireless mesh network
www.iosrjournals.org 12 | Page
V. Conclusion
In this paper we show that link quality in WMN varies Due to factors like mobility, energy
consumption, and power losses. Variation in link quality results in fluctuations in packet delivery ration, latency
and other performances. So under link variations, routes cannot be considered as stable. Therefore incorporating
link quality and deriving a suitable technique to include the same as cost metric in routing is essential. There are
several techniques which estimates the link quality based on either movement or power loss. As SINR and
received power directly or indirectly affects all the other parameters, we have considered SINR based link
quality metric for Link State routing and vertical handoff in WMN
Here in this work we measure link stability as consistency of data and control packet rate in the links.
Links with consistent rates irrespective of high or low are considered as more stable Links. Through OLSR we
find the routes that incorporate the most stable links. Further if the current router's link fails or degrades, the
next best router is selected. Result shows that the technique results in better routing, energy, Control Overhead
under different link variability constraints like high mobility.
References
[1] J. Ren, “Wireless mesh network resource allocation and congestion control algorithm research,” Ph.D. dissertation, Beijing Jiaotong
University, Beijing, 2010 (in Chinese).
[2] S. Waharte, R. Boutaba, Y. Iraqi, and B. Ishibashi, “Routing protocols in wireless mesh networks: challenges and design
considerations,” Multimedia Tools and Applications, vol. 29, no. 3, pp. 285−303, 2006.
[3] T.-H. Liu and W.-J. Liao, “Capacity-aware routing in multi-channel multi-rate wireless mesh networks,” in Proc. of 2006 IEEE
International Conf. on Communications, Istanbul, 2006, pp. 1971−1976.
[4] W. Song and X.-M. Fang, “Routing with congestion control and load balancing in wireless mesh networks,” in Proc. of the 6th
International Conf. on ITS Telecommunications, Chengdu, 2006, pp. 719−724.
[5] Y.-F. Wai, Y. Zhang, M. Song, and J. Song, “An improved AODV routing protocol for WiFi mesh networks,” Journal of Beijing
University of Posts and Telecommunication, vol. 30, no. 4, pp. 120−124, 2007 (in Chinese).
[6] Q. Shen and X.-M. Fang, “An integrated metrics based extended dynamic source routing protocol in wireless mesh networks,” in
Proc. of International Conf. on Communications, Circuits and Systems, Guilin, 2007, pp. 1457−1461.
[7] Y.-L. Yang, J. Wang, and R. Kravets, “Designing routing metrics for mesh networks,” in Proc. of the IEEE Workshop on Wireless
Mesh Networks (WiMesh), Santa Clara, 2005, pp. 1−9.
[8] P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot, “Optimized link state routing protocol for ad hoc
networks,” IEEE International Multi Topoic Conf., Lahore, 2001, pp. 62−68 .

Contenu connexe

Tendances

Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsidescitation
 
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...1crore projects
 
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...LeMeniz Infotech
 
A survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsA survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsIAEME Publication
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
 
A distributed three hop routing protocol to
A distributed three hop routing protocol toA distributed three hop routing protocol to
A distributed three hop routing protocol tojpstudcorner
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...ijceronline
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase thePvrtechnologies Nellore
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
 
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...IJCNCJournal
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
 

Tendances (19)

Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
 
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...
 
A survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsA survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane ts
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
 
Ij3415561561
Ij3415561561Ij3415561561
Ij3415561561
 
A distributed three hop routing protocol to
A distributed three hop routing protocol toA distributed three hop routing protocol to
A distributed three hop routing protocol to
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
 
Eb35725731
Eb35725731Eb35725731
Eb35725731
 
A0110104
A0110104A0110104
A0110104
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase the
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
eaodv
eaodveaodv
eaodv
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
 
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 

En vedette

Impact of Insect Resistant Cotton
Impact of Insect Resistant CottonImpact of Insect Resistant Cotton
Impact of Insect Resistant CottonIOSR Journals
 
Emotion Recognition Based On Audio Speech
Emotion Recognition Based On Audio SpeechEmotion Recognition Based On Audio Speech
Emotion Recognition Based On Audio SpeechIOSR Journals
 
A Novel Method to Improve the Control Performance of Multilevel Inverter by M...
A Novel Method to Improve the Control Performance of Multilevel Inverter by M...A Novel Method to Improve the Control Performance of Multilevel Inverter by M...
A Novel Method to Improve the Control Performance of Multilevel Inverter by M...IOSR Journals
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...IOSR Journals
 
Impulsion of Mining Paradigm with Density Based Clustering of Multi Dimension...
Impulsion of Mining Paradigm with Density Based Clustering of Multi Dimension...Impulsion of Mining Paradigm with Density Based Clustering of Multi Dimension...
Impulsion of Mining Paradigm with Density Based Clustering of Multi Dimension...IOSR Journals
 
The Electrochemical Synthesis and Corrosion Inhibitive Nature of Di N-Propyl ...
The Electrochemical Synthesis and Corrosion Inhibitive Nature of Di N-Propyl ...The Electrochemical Synthesis and Corrosion Inhibitive Nature of Di N-Propyl ...
The Electrochemical Synthesis and Corrosion Inhibitive Nature of Di N-Propyl ...IOSR Journals
 
Low Leakage Low Ground Bounce Noise Power Gating Techniques for FPGAs
Low Leakage Low Ground Bounce Noise Power Gating Techniques for FPGAsLow Leakage Low Ground Bounce Noise Power Gating Techniques for FPGAs
Low Leakage Low Ground Bounce Noise Power Gating Techniques for FPGAsIOSR Journals
 
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...IOSR Journals
 
Fast Human Detection in Surveillance Video
Fast Human Detection in Surveillance VideoFast Human Detection in Surveillance Video
Fast Human Detection in Surveillance VideoIOSR Journals
 
Ab Initio Study of the Electronic and Phonon Band Structure Of the Mixed Vale...
Ab Initio Study of the Electronic and Phonon Band Structure Of the Mixed Vale...Ab Initio Study of the Electronic and Phonon Band Structure Of the Mixed Vale...
Ab Initio Study of the Electronic and Phonon Band Structure Of the Mixed Vale...IOSR Journals
 
Efficiency of Optical Fiber Communication for Dissemination of Information wi...
Efficiency of Optical Fiber Communication for Dissemination of Information wi...Efficiency of Optical Fiber Communication for Dissemination of Information wi...
Efficiency of Optical Fiber Communication for Dissemination of Information wi...IOSR Journals
 
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingDetecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingIOSR Journals
 
Cascaded Multilevel Inverter Based Active Power Filters: A Survey of Controls
Cascaded Multilevel Inverter Based Active Power Filters: A Survey of ControlsCascaded Multilevel Inverter Based Active Power Filters: A Survey of Controls
Cascaded Multilevel Inverter Based Active Power Filters: A Survey of ControlsIOSR Journals
 
Experimental Studies on Bioregeneration of Activated Carbon Contaminated With...
Experimental Studies on Bioregeneration of Activated Carbon Contaminated With...Experimental Studies on Bioregeneration of Activated Carbon Contaminated With...
Experimental Studies on Bioregeneration of Activated Carbon Contaminated With...IOSR Journals
 
Video Streaming Compression for Wireless Multimedia Sensor Networks
Video Streaming Compression for Wireless Multimedia Sensor NetworksVideo Streaming Compression for Wireless Multimedia Sensor Networks
Video Streaming Compression for Wireless Multimedia Sensor NetworksIOSR Journals
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...IOSR Journals
 
A New Filtering Method and a Novel Converter Transformer for HVDC System.
A New Filtering Method and a Novel Converter Transformer for HVDC System.A New Filtering Method and a Novel Converter Transformer for HVDC System.
A New Filtering Method and a Novel Converter Transformer for HVDC System.IOSR Journals
 
Simulation And Hardware Analysis Of Three Phase PWM Rectifier With Power Fact...
Simulation And Hardware Analysis Of Three Phase PWM Rectifier With Power Fact...Simulation And Hardware Analysis Of Three Phase PWM Rectifier With Power Fact...
Simulation And Hardware Analysis Of Three Phase PWM Rectifier With Power Fact...IOSR Journals
 
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...IOSR Journals
 
Transient Stability Enhancement of Grid by Using Fuzzy Logic Based Statcom
Transient Stability Enhancement of Grid by Using Fuzzy Logic Based StatcomTransient Stability Enhancement of Grid by Using Fuzzy Logic Based Statcom
Transient Stability Enhancement of Grid by Using Fuzzy Logic Based StatcomIOSR Journals
 

En vedette (20)

Impact of Insect Resistant Cotton
Impact of Insect Resistant CottonImpact of Insect Resistant Cotton
Impact of Insect Resistant Cotton
 
Emotion Recognition Based On Audio Speech
Emotion Recognition Based On Audio SpeechEmotion Recognition Based On Audio Speech
Emotion Recognition Based On Audio Speech
 
A Novel Method to Improve the Control Performance of Multilevel Inverter by M...
A Novel Method to Improve the Control Performance of Multilevel Inverter by M...A Novel Method to Improve the Control Performance of Multilevel Inverter by M...
A Novel Method to Improve the Control Performance of Multilevel Inverter by M...
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
 
Impulsion of Mining Paradigm with Density Based Clustering of Multi Dimension...
Impulsion of Mining Paradigm with Density Based Clustering of Multi Dimension...Impulsion of Mining Paradigm with Density Based Clustering of Multi Dimension...
Impulsion of Mining Paradigm with Density Based Clustering of Multi Dimension...
 
The Electrochemical Synthesis and Corrosion Inhibitive Nature of Di N-Propyl ...
The Electrochemical Synthesis and Corrosion Inhibitive Nature of Di N-Propyl ...The Electrochemical Synthesis and Corrosion Inhibitive Nature of Di N-Propyl ...
The Electrochemical Synthesis and Corrosion Inhibitive Nature of Di N-Propyl ...
 
Low Leakage Low Ground Bounce Noise Power Gating Techniques for FPGAs
Low Leakage Low Ground Bounce Noise Power Gating Techniques for FPGAsLow Leakage Low Ground Bounce Noise Power Gating Techniques for FPGAs
Low Leakage Low Ground Bounce Noise Power Gating Techniques for FPGAs
 
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
 
Fast Human Detection in Surveillance Video
Fast Human Detection in Surveillance VideoFast Human Detection in Surveillance Video
Fast Human Detection in Surveillance Video
 
Ab Initio Study of the Electronic and Phonon Band Structure Of the Mixed Vale...
Ab Initio Study of the Electronic and Phonon Band Structure Of the Mixed Vale...Ab Initio Study of the Electronic and Phonon Band Structure Of the Mixed Vale...
Ab Initio Study of the Electronic and Phonon Band Structure Of the Mixed Vale...
 
Efficiency of Optical Fiber Communication for Dissemination of Information wi...
Efficiency of Optical Fiber Communication for Dissemination of Information wi...Efficiency of Optical Fiber Communication for Dissemination of Information wi...
Efficiency of Optical Fiber Communication for Dissemination of Information wi...
 
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingDetecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
 
Cascaded Multilevel Inverter Based Active Power Filters: A Survey of Controls
Cascaded Multilevel Inverter Based Active Power Filters: A Survey of ControlsCascaded Multilevel Inverter Based Active Power Filters: A Survey of Controls
Cascaded Multilevel Inverter Based Active Power Filters: A Survey of Controls
 
Experimental Studies on Bioregeneration of Activated Carbon Contaminated With...
Experimental Studies on Bioregeneration of Activated Carbon Contaminated With...Experimental Studies on Bioregeneration of Activated Carbon Contaminated With...
Experimental Studies on Bioregeneration of Activated Carbon Contaminated With...
 
Video Streaming Compression for Wireless Multimedia Sensor Networks
Video Streaming Compression for Wireless Multimedia Sensor NetworksVideo Streaming Compression for Wireless Multimedia Sensor Networks
Video Streaming Compression for Wireless Multimedia Sensor Networks
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
 
A New Filtering Method and a Novel Converter Transformer for HVDC System.
A New Filtering Method and a Novel Converter Transformer for HVDC System.A New Filtering Method and a Novel Converter Transformer for HVDC System.
A New Filtering Method and a Novel Converter Transformer for HVDC System.
 
Simulation And Hardware Analysis Of Three Phase PWM Rectifier With Power Fact...
Simulation And Hardware Analysis Of Three Phase PWM Rectifier With Power Fact...Simulation And Hardware Analysis Of Three Phase PWM Rectifier With Power Fact...
Simulation And Hardware Analysis Of Three Phase PWM Rectifier With Power Fact...
 
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...
 
Transient Stability Enhancement of Grid by Using Fuzzy Logic Based Statcom
Transient Stability Enhancement of Grid by Using Fuzzy Logic Based StatcomTransient Stability Enhancement of Grid by Using Fuzzy Logic Based Statcom
Transient Stability Enhancement of Grid by Using Fuzzy Logic Based Statcom
 

Similaire à Optimized Link State Routing for Wireless Mesh Networks

cse Wireless Mesh Networks ppt.pptx
cse  Wireless Mesh Networks ppt.pptxcse  Wireless Mesh Networks ppt.pptx
cse Wireless Mesh Networks ppt.pptxSANTHAKUMARP5
 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networkschetan1nonly
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
 
JPN1401 A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Netw...
JPN1401  A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Netw...JPN1401  A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Netw...
JPN1401 A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Netw...chennaijp
 
IRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET Journal
 
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...ijsrd.com
 
Survey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesSurvey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesIJMER
 
A New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsCSCJournals
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesijcsit
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444IJRAT
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
 
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput IJECEIAES
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...IOSR Journals
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET Journal
 

Similaire à Optimized Link State Routing for Wireless Mesh Networks (20)

cse Wireless Mesh Networks ppt.pptx
cse  Wireless Mesh Networks ppt.pptxcse  Wireless Mesh Networks ppt.pptx
cse Wireless Mesh Networks ppt.pptx
 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
 
JPN1401 A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Netw...
JPN1401  A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Netw...JPN1401  A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Netw...
JPN1401 A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Netw...
 
IRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network Architecture
 
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
 
Survey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesSurvey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering Techniques
 
A New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNs
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
 
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
 
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
 

Plus de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Dernier

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 

Dernier (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 

Optimized Link State Routing for Wireless Mesh Networks

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 14, Issue 2 (Sep. - Oct. 2013), PP 06-12 www.iosrjournals.org www.iosrjournals.org 6 | Page An optimized link state routing protocol based on a cross layer design for wireless mesh network Prof. Rekha Patil.1 , Abhishek2 1 Associate Professor, Department of computer science and engineering, Poojya doddappa Appa College of engineering, Gulbarga, Karnataka, India, 2 Department of computer science and engineering, Poojya doddappa Appa College of engineering, Gulbarga, Karnataka, India, Abstract: Analysis of routing in Mesh Network reveals that Proactive routes are fast but suffers vulnerability of route failure under high mobility. Reactive routes on the other hand add extra overhead in the network for obtaining a route before every communication session. As Link state routing provides a Network Map at each node, It is well suited for a mesh network. However due to uncertain demand in the mesh network, link states needs frequent updation and refreshing. A refreshing phase halts current session thus adding latency to the session. In order to avoid this pitfall we propose a unique Cross layer Based Link State Routing for Mesh network. Nodes keep monitoring the link quality as an when a packet is received in a link. Signal to Noise Ratio and Received power is measured at the MAC layer. Any change in the stored value raises an event which is read directly by the network layer. Once Network layer gets the notification, it automatically updates the route table entry with new metric values. Thus there is no specific refresh phase and nodes automatically update the links and route cache. Once a node realizes that the link quality with its next hop has degraded and a better one is available, it opts a handover of the connection called vertical handover. Thus proposed system provides seamless connectivity under varying load and mobility. Keywords: Cross layer routing, Link state routing protocol, Wireless mesh networks (WMNs). I. Introduction Wireless mesh networks (WMNs) have emerged as a key technology for next-generation wireless networking. Because of their advantages over other wireless networks, WMNs are undergoing rapid progress and inspiring numerous applications. However, many technical issues still exist in this field. In order to provide a better understanding of the research challenges of WMNs, here author has presented a detailed investigation of current state-of-the-art protocols and algorithms for WMNs. Open research issues in all protocol layers are also discussed, with an objective to spark new research interests in this field In WMNs, nodes are comprised of mesh routers and mesh clients. Each node operates not only as a host but also as a router, forwarding packets on behalf of other nodes that may not be within direct wireless transmission range of their destinations. A WMN is dynamically self-organized and self-configured, with the nodes in the network automatically establishing and maintaining mesh connectivity among themselves (creating, in effect, an ad hoc network). This feature brings many advantages to WMNs such as low up-front cost, easy network maintenance, robustness, and reliable service coverage. Conventional nodes (e.g., desktops, laptops, PDAs, Pocket PCs, phones, etc.) equipped with wireless network interface cards (NICs) can connect directly to wireless mesh routers. Wireless mesh networks (WMNs) are dynamically self-organized and self-configured, with the nodes in the network automatically establishing an ad hoc network and maintaining the mesh connectivity. WMNs are comprised of two types of nodes: mesh routers and mesh clients. Other than the routing capability for gateway/bridge functions as in a conventional wireless router, a mesh router contains additional routing functions to support mesh networking. Through multi-hop communications, the same coverage can be achieved by a mesh router with much lower transmission power. To further improve the flexibility of mesh networking, a mesh router is usually equipped with multiple wireless interfaces built on either the same or different wireless access technologies. In spite of all these differences, mesh and conventional wireless routers are usually built based on a similar hardware platform. Mesh routers have minimal mobility and form the mesh backbone for mesh clients. Thus, although mesh clients can also work as a router for mesh networking, the hardware platform and software for them can be much simpler than those for mesh routers. For example, communication protocols for mesh clients can be light-weight, gateway or bridge functions do not exist in mesh clients, and only a single wireless interface is needed in a mesh client, and so on. In addition to mesh networking among mesh routers and mesh clients, the gateway/bridge functionalities in mesh routers enable the integration of WMNs with various other networks. Conventional nodes equipped with wireless network interface cards (NICs) can connect directly to WMNs through wireless mesh routers.
  • 2. An optimized link state routing protocol based on a cross layer design for wireless mesh network www.iosrjournals.org 7 | Page Customers without wireless NICs can access WMNs by connecting to wireless mesh routers through, for example, Ethernet. Thus, WMNs will greatly help users to be always-on-line anywhere, anytime. Consequently, instead of being another type of ad-hoc networking, WMNs diversify the capabilities of ad-hoc networks. This feature brings many advantages to WMNs, such as low up-front cost, easy network maintenance, robustness, reliable service coverage, etc. Therefore, in addition to being widely accepted in the traditional application sectors of ad hoc networks, WMNs are undergoing rapid commercialization in many other application scenarios such as broadband home networking, community networking, building automation, high- speed metropolitan area networks, and enterprise networking. WMNs support ad hoc networking, and have the capability of self-forming, self-healing, and self- organization. WMNs are multi-hop wireless networks, but with a wireless infrastructure/backbone provided by mesh routers. Mesh routers have minimal mobility and perform dedicated routing and configuration, which significantly decreases the load of mesh clients and other end nodes. Mobility of end nodes is supported easily through the wireless infrastructure. Mesh routers integrate heterogeneous networks, including both wired and wireless. Thus, multiple types of network access exist in WMNs. Power-consumption constraints are different for mesh routers and mesh clients. WMNs are not stand-alone and need to be compatible and interoperable with other wireless networks. The paper is organized as follows section I Introduction, section II related work, section III represents Methodology, system design and implementation algorithm, section IV represents Results and Discussion, section V finally conclusion. II. Related Work Wireless mesh network (WMN) is a novel kind of distributed broadband network architecture, of which the key idea is that every node in the network can be the access In recent years, the research approach of integrating cross-layer idea into the WMN routing protocol design has made obvious progress, which can increase the utilization of network resources to a large extent and enhance the Qos guarantee to users. Point and the router at the same time [1]. This approach has obtained the recognition of a growing number of scholars and research institutions. The traditional minimum hop based routing protocol [2 ]has the flaws that it cannot effectively control congestion, has poor fairness, and cannot realize load balance. Reference [3] proposed a capacity-aware routing (CAR) protocol, which adopted a routing metric called bottleneck link capacity (BLC). This metric can increase the network throughput and reduce the end-to-end delay to a certain degree by the cross-layer operation of considering the link interference, the link load, and other link quality information. Proposed a QoS-aware routing with a congestion control and load balancing protocol (QRCCLB) [4], which, by introducing the cross-layer operation, takes dynamic source routing protocol in an Ad hoc network as the prototype and can make the network traffic bypass the network‟s business hotspot, thus achieve the effect of congestion control and load balance. In [5], a wireless fidelity Ad hoc on-demand distance vector (WiFi- AODV) routing protocol was proposed, which fully exploits the adaptive rate switching mechanism of IEEE802.11 by introducing the cross-layer mechanism, in which nodes use the data transmission rate of the physical layer as a metric and are able to establish a route with a high data rate and low transmission delay. proposed an integrated metrics based extended dynamic source routing method (EDSR) [6], which uses the cross-layer design to provide the frame delivery rate, extra bandwidth, and the node load of the media access control (MAC) layer for the network layer routing algorithm, thus improving the throughput rate and load balance capability of the network and satisfying users‟ QoS requirements by promoting the network‟s overall performance. These routing protocols are all proposed based on existing on-demand routing protocols of Ad hoc network, such as dynamic source routing, and Ad hoc on-demand distance vector routing. But for WMN, the network node is relatively fixed. Only node failures, as well as joining, leaving, and the uncertainty of wireless links will result in changes in the network topology. The change rate of network topology is far below the arrival rate of the data flow and the main business in WMN is the Internet business with certain delay requirements. These routing protocols have jumped out of the traditional route of taking the minimum hop as the routing metric and introduced the idea of cross-layer design. But there is a lack of systemic knowledge for the cross-layer design of WMN, in which the implementation process is complex and the practicality is low The design of a CL-OLSR protocol for WMN based on optimized link state routing (OLSR) protocol. CL-OLSR based on [6] refines the idea of cross-layer design, and proposes a brand-new routing metric CLM applicable to WMN. This routing metric [7] takes into account four cross-layer factors: node available bandwidth, node balance, link delivery rate, and link interference by introducing the cross-layer operation mechanism. Through considering these four factors, the route selection is optimized to a large extent, the network throughput is improved and the goal of load balance is achieved. Compared with the on-demand routing, CL-OLSR is a proactive routing protocol[8] of hop-by-hop forwarding, which is more suitable for
  • 3. An optimized link state routing protocol based on a cross layer design for wireless mesh network www.iosrjournals.org 8 | Page approximately static topological properties of WMN, and satisfies the requirements of low delay of the traffic flow. Moreover, the algorithm is relatively simple and practical. III. Methodology The overview of the project methodology is explained in brief as follows.  Every Node Measure the SINR and Received signal strength for every received packet. This value is updated in Neighbor Table by Network layer if there is a significant variation with past value.  A route is established using OLSR which takes into account of current state of links  In the Middle of a session if a node tracks that better access point/relay node is available with better link quality, then requests for a change in connection.  Transmission starts through this path upon link switch over.  Thus routing is through the best link. Best link is always maintained without rerouting. MAC layer parameter like Packet Rate. In physical layer calculate Power Loss. Fig. 1 Cross-layer module Proposed Work Routing is simply the function of knowing which path to take in order to deliver the data from one end to another. It must include an addressing scheme and a routing protocol. To put it most simply, if the addressing scheme consisted of house addresses, then a knowledgeable postman would be the routing protocol. Routing protocols are worked hard in a mesh, particularly if it is mobile. We can imagine our postman‟s job if houses were regularly to disappear and re-appear somewhere else, or if they are all moved constantly in different directions. This is the nature of the mobile routing protocol challenge. Routing protocols must be efficient and must either keep their knowledge proactively up-to-date, or be quickly reactive when routes are required. Which of these two routing approaches is better depends on the behaviour of the mesh users. And the traffic which must be carried. Each mesh node must participate in the routing and relay of other‟s traffic. Every node is a router In an Mesh network environment, each node participates within the network not only as a possible source and sink of traffic but, also as a relay and a router, enabling the forwarding of traffic between nodes in the network. Thus, in a mesh, each and every node needs to know what the route traffic needs to follow in order to reach its destination. This is directly analogous to router behaviour in the internet, although the big difference is that not all internet nodes need to be routers. It follows mobility adds volatility to the routing problem. Every node is a relay It is always necessary for nodes to act as relays to form a mesh. This is essential but has several consequences. Firstly, by acting as a relay, anode takes on a workload over and above that needed to support its user‟s requirements. This accepted consensus from both academic and commercial published work is that nodes often need to be able to relay traffic of a volume a few times above that of their own service, i.e. they must handle not only their user generated traffic but potentially that of several other users as well. This implies that meshes will require more capable user nodes than otherwise equivalent cellular systems. Secondly, a consequence of having a service level which depends on the performance of user nodes is an increased difficulty in maintenance and upgrade. For example with the introduction of EDGE onto GSM it was possible to upgrade base stations, and then allow subscribers to sign up to the new services as and when required, if at all. With a mesh system, users are dependent on the installed base of fellow subscribers and so new services cannot be provided unless all or at least a substantial fraction of existing users are persuaded to upgrade their units. Proactive and reactive routing Mesh routing protocols are used in environments where there is not necessarily a well-controlled infrastructure network but where there is a common routing policy. There are two main categories of routing: proactive and reactive. Proactive routing protocols are based on the „normal‟ routing protocols used in wired networks, such as today‟s internet. Algorithms based on distance vector and link state are common. Distance vector often uses the number of hops as a metric to minimise when selecting the best route, but can also go beyond this to consider more parameters, for example link bandwidth and delay. This is used to construct a route table, which is shared with other routers.
  • 4. An optimized link state routing protocol based on a cross layer design for wireless mesh network www.iosrjournals.org 9 | Page Link state operation is more complex and requires each router to build its own map of the network. Thus, in proactive protocols, there is an attempt to build locally, at each node, a picture of roots within the network before they are required for use. The routing tables are usually built periodically through the normal operation of the protocol exchanging routing update packets. In normal operation, this has advantage that the routes are already pre-computed and so packet forwarding can take place as soon as a packet for a particular destination appears at a node. The drawback is that routes may be calculated and re-calculated (for e.g. due to node mobility) when they are actually not required for data. This wastes bandwidth and, for mobile nodes, also waste battery power via the sending and receiving of unnecessary routing updates. Reactive routing takes an alternative approach by building routes only upon demand. It may also cache route information according to some short time-out or stale-ness policy. Cached routes can be used as required, but if a route is not known then it has to be „discovered‟. This has advantage that routes are only evaluated when needed, although this approach adds latency to packet forwarding when routes are not already known. Generally, the reactive routing approach is the one that has received most attention in the adhoc networking community. Sequence Numbers A difficulty with flooding, as described so far, is that when all routers have received all LSAs, the flooding must stop. A time-to-live value in the packets could simply be relied on to expire, but it is hardly efficient to permit LSAs to wander the network until they expire. Take the network in Figure 2. Subnet 172.22.4.0 at Router A has failed, and A has flooded an LSA to its neighbors B and D, advertising the new state of the link. B and D dutifully flood to their neighbors, and so on. Fig. 2 When a topology change occurs, LSAs advertising the change will be flooded throughout the network. Look next at what happens at Router C. An LSA arrives from Router B at time t1, is entered into C's topological database, and is forwarded to Router F. At some later time t3, another copy of the same LSA arrives from the longer A-D-E-F-C route. Router C sees that it already has the LSA in its database; the question is, should C forward this LSA to Router B? The answer is no because B has already received the advertisement. Router C knows this because the sequence number of the LSA it received from Router F is the same as the sequence number of the LSA it received earlier from Router B. When Router A sent out the LSA, it included an identical sequence number in each copy. This sequence number is recorded in the routers' topological databases along with the rest of the LSA; when a router receives an LSA that is already in the database and its sequence number is the same, the received information is discarded. If the information is the same but the sequence number is greater, the received information and new sequence number are entered into the database and the LSA is flooded. In this way, flooding is abated when all routers have seen a copy of the most recent LSA. As described so far, it seems that routers could merely verify that their link state databases contain the same LSA as the newly received LSA and make a flood/discard decision based on that information, without needing a sequence number. But imagine that immediately after Figure 2‟s network 172.22.4.0 failed, it came back up. Router A might send out an LSA advertising the network as down, with a sequence number of 166; then it sends out a new LSA announcing the same network as up, with a sequence number of 167. Router C receives the down LSA and then the up LSA from the A-B-C path, but then it receives a delayed down LSA from the A-D-E-F-C path. Without the sequence numbers, C would not know whether or not to believe the delayed down LSA. With sequence numbers, C's database will indicate that the information from Router A has a sequence number of 167; the late LSA has a sequence number of 166 and is therefore recognized as old information and discarded.
  • 5. An optimized link state routing protocol based on a cross layer design for wireless mesh network www.iosrjournals.org 10 | Page Algorithm Step 1: The number of nodes are initialized over an area of a=X*Y mts. Step 2: Any node is represented by layer L={A,N,P,LL,NB} Where, A= application layer N= network layer P= physical layer LL=link layer NB=notification board. Step 3: At the time of initialization each node Ni broadcast its equal li to its neighbours. Upon receiving li by Nj. Nj calculates link quality Qij makes an table entry P.IJ= {i. j, li Qij} Step 4: At the saturation state any routes RI finds a path to all the nodes either directly or through any other arbitrary router Rj by iterating in T. Step 5: Every router RI exchanges every possible route with every other route RJ. Step 6: Association phase – where NI closure to RI request for an association which is replied by RI. Step 7: Request phase – NI generates data packets for destination d. Step 8: Forwarding phase – upon receiving packet from NI to d .RI finds route from T and forwards to the next hop. Step 9: Topology change phase – any node NI moves to a next location Xi2, Yi2 from its current location Xi1 ,Yi1 at a speed Vi using linear mobility model. Step 10: Link quality change –The above event results in change of link quality measured at llj of a node J initiating RE routing request. Step 11: Node updates T and goes to saturation phase for obtaining new route. Further packets are forwarded through new path IV. Results And Discussion wmn is composed of mesh routers and clients. The mobility of the node have significant impanct on the performance of the system.global route cache keeps a record of the network map based on the signal to noise ratio and the received power. Later routing is done to achive max throughput and to reduce the delay. Fig. 3 Hand over networks Fig. 4 Hand over networks with airframe packets
  • 6. An optimized link state routing protocol based on a cross layer design for wireless mesh network www.iosrjournals.org 11 | Page Fig. 5 Performance measurement at each node upon receiving packet Here delay refers to the time taken for a packet to be transmitted across a network from source to destination Speed Vs proposed delay is plotted in the above fig.The different delays are queuing delay, propagation delay, processing delay, processing time. The delay is calculated for different number of nodes. As shown in figure the end to end delays compared with existing ETX method, which shows that the delay is less for the proposed bandwidth system as the speed is increased in regular interval Jitter is the variation in time between packets arriving, caused by network congestion, time drift, or route changes. A jitter buffer can be used to handle jitter. The types of jitter are random jitter and deterministic jitter. Jitter is defined as a variation in the delay of received packets. At the sending side, packet are sent in a continuous stream with the packets spaced evenly apart. Due to network congestion, improper queuing , or configuration errors, this steady stream can become lumpy, or the delay between each packet can vary instead of remaining constant. The data packets forwarding overhead increases as numbers of node increases. The jitter occurs because of traffic, interference etc. also while sending more data in the routing path the data packet overhead is occurred. Since jitter is less for the proposed system. Threshold is the minimum, of the maximum value to be achieved, here the sinr gradually decreases.
  • 7. An optimized link state routing protocol based on a cross layer design for wireless mesh network www.iosrjournals.org 12 | Page V. Conclusion In this paper we show that link quality in WMN varies Due to factors like mobility, energy consumption, and power losses. Variation in link quality results in fluctuations in packet delivery ration, latency and other performances. So under link variations, routes cannot be considered as stable. Therefore incorporating link quality and deriving a suitable technique to include the same as cost metric in routing is essential. There are several techniques which estimates the link quality based on either movement or power loss. As SINR and received power directly or indirectly affects all the other parameters, we have considered SINR based link quality metric for Link State routing and vertical handoff in WMN Here in this work we measure link stability as consistency of data and control packet rate in the links. Links with consistent rates irrespective of high or low are considered as more stable Links. Through OLSR we find the routes that incorporate the most stable links. Further if the current router's link fails or degrades, the next best router is selected. Result shows that the technique results in better routing, energy, Control Overhead under different link variability constraints like high mobility. References [1] J. Ren, “Wireless mesh network resource allocation and congestion control algorithm research,” Ph.D. dissertation, Beijing Jiaotong University, Beijing, 2010 (in Chinese). [2] S. Waharte, R. Boutaba, Y. Iraqi, and B. Ishibashi, “Routing protocols in wireless mesh networks: challenges and design considerations,” Multimedia Tools and Applications, vol. 29, no. 3, pp. 285−303, 2006. [3] T.-H. Liu and W.-J. Liao, “Capacity-aware routing in multi-channel multi-rate wireless mesh networks,” in Proc. of 2006 IEEE International Conf. on Communications, Istanbul, 2006, pp. 1971−1976. [4] W. Song and X.-M. Fang, “Routing with congestion control and load balancing in wireless mesh networks,” in Proc. of the 6th International Conf. on ITS Telecommunications, Chengdu, 2006, pp. 719−724. [5] Y.-F. Wai, Y. Zhang, M. Song, and J. Song, “An improved AODV routing protocol for WiFi mesh networks,” Journal of Beijing University of Posts and Telecommunication, vol. 30, no. 4, pp. 120−124, 2007 (in Chinese). [6] Q. Shen and X.-M. Fang, “An integrated metrics based extended dynamic source routing protocol in wireless mesh networks,” in Proc. of International Conf. on Communications, Circuits and Systems, Guilin, 2007, pp. 1457−1461. [7] Y.-L. Yang, J. Wang, and R. Kravets, “Designing routing metrics for mesh networks,” in Proc. of the IEEE Workshop on Wireless Mesh Networks (WiMesh), Santa Clara, 2005, pp. 1−9. [8] P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot, “Optimized link state routing protocol for ad hoc networks,” IEEE International Multi Topoic Conf., Lahore, 2001, pp. 62−68 .