SlideShare a Scribd company logo
1 of 14
Download to read offline
ISSN (ONLINE): 2395-695X
ISSN (PRINT): 2395-695X
International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST)
Vol. 2, Issue 12, December 2016
Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS
Multipath Routing Protocol for Effective Local Route Recovery
in Mobile Ad Hoc Network (Manet)
Ashok N R1
, C.Venkatesh2
PG Scholar, Department of Applied Electronics, Sri Eshwar College of Engineering, Coimbatore, India1
Associate Professor, Department of ECE, Sri Eshwar College of Engineering, Coimbatore, India2
Abstract — In mobile Ad hoc network, frequent mobility during the data transmission of data
causes route failure which results in route discovery. In this we propose multipath routing protocol
for effective local route recovery in mobile Ad hoc networks. In this protocol each source and
destination pair establishes multiple paths in single route discovery and they are cached in their route
caches. The cached routes are sorted on the basis of their bandwidth availability. In case of route
failure in the primary route, a recovery node which is an over heading neighbor, detects it and
establishes a local recovery path with maximum bandwidth from its route cache. This proposed
technique improves network performance and it prevents frequent collision.
Index Terms—Local Route Recovery, Ad Hoc Network, MANET, Multipath Routing.
I. INTRODUCTION
In mobile ad hoc networks, frequent mobility during the transmission of data causes route failure which
results in route rediscovery. Propose multipath routing protocol for effective local route recovery in Mobile
Ad hoc Network (MANET). In this protocol, each source and destination pair establishes multiple paths in
the single route discovery and they are cached in their route caches by sorting on the basis of their
bandwidth availability. In case of route failure in the primary route, a recovery node which is an overhearing
neighbor, detects it and establishes a local recovery path with maximum bandwidth from its route cache.
Provide new theoretical results for the route recovery management technique to avoid the frequent
collision and degradation in the network performance, providing useful insights into the differences in
performances between MP-LRR and MLAR. Simulation and theoretical results show that MP-LRR has
greatly improved network performance over MLAR.
In mobile Ad hoc network, frequent mobility during the data transmission of data causes route failure
which results in route discovery. In this we propose multipath routing protocol for effective local route
recovery in mobile Ad hoc networks. In this protocol each source and destination pair establishes multiple
paths in single route discovery and they are cached in their route caches.
II. LITERATURE SURVEY
In this paper Mobile ad hoc Networks (MANETs) are self -configuring, dynamic networks in which nodes
are free to move. The issues related to MANET routing are unpredictable of environment, unreliability of
wireless medium, resource constrained nodes and dynamic topology. These issues may result in faults such
as transmission errors, node failure, link failure, route breakages, congested nodes or links.
19
ISSN (ONLINE): 2395-695X
ISSN (PRINT): 2395-695X
International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST)
Vol. 2, Issue 12, December 2016
Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS
Traditional on-demand routing protocols produce a large amount of routing control traffic by blindly
flooding the entire network with (RREQ) packets during route discovery.The routing overhead associated
with the dissemination of routing control packets can be quite huge, especially when the network topology
frequently changes.
In this, proposed multipath routing protocol for effective local rout recovery in mobile adhoc network
(MANET). In this, in case of route failure in the primary route, the recovery node detects it and establishes a
local recovery path with maximum bandwidth from its route cache.
The route recovery management technique is handled to avoid the frequent collision and degradation in
the network performance. By simulation results, we have shown that the proposed approach improves
network performance.
III. MOBILE AD HOC NETWORK
Mobile Ad hoc Network is most popularly known as MANET. It is a self-configured network of mobile
routers (and associated hosts) connected by wireless links and this union forms a random topology. Routers
move randomly free. Topology changes rapidly and unpredictably. These networks may operate in
standalone fashion or may be connected to the larger internet.
3.1 Characteristics of Manet
1. Quick deployment
2. Strength
3. Flexibility
4. Essential support for mobility
Figure 3.1: Mobility of Nodes
3.2 Application
1. Emergency situations like naturals or human-induced disaster
2. Military conflicts
20
ISSN (ONLINE): 2395-695X
ISSN (PRINT): 2395-695X
International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST)
Vol. 2, Issue 12, December 2016
Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS
3. Wireless mesh
4. Sensor networks
5. Collective and distributed computing
6. Hybrid network
IV. SCOPE OF THE PROJECT
The main scope of the project is to establish a multiple path in a single route discovery and they are
cached in their route caches by sorting on the basis of their bandwidth availability, which can be used in the
case of route failure in the primary route.
4.1 Problems in the Networks
Wireless Mobile ad hoc Networks (MANETs) are self -configuring, dynamic networks in which nodes are
free to move. The issues related to MANET routing are unpredictable of environment, unreliability of
wireless medium, resource constrained nodes and dynamic topology. These issues may result in faults such
as transmission errors, node failure, link failure, route breakages, congested nodes or links.
Traditional on-demand routing protocols produce a large amount of routing control traffic by blindly
flooding the entire network with (RREQ) packets during route discovery. The routing overhead associated
with the dissemination of routing control packets can be quite huge, especially when the network topology
frequently changes.
Previous versions of multipath routing protocols cache multiple routes to a destination in a single route
discovery. However, in the presence of mobility, multipath protocols incur additional packet drops and
delay due to their dependency on potentially stale routes from caches. Protocols using either limited
broadcast or local error recovery have focused on reducing packet drops and not on utilizing the available
bandwidth efficiently during route recovery.
4.2 Solution
Proposed hybrid technique involves multipath discovery and local error-recovery. Whenever a link or a
route break is occurring, a local error recovery is performed which in turn invokes the alternate route
selection. An effective alternate route is selected from the route cache which is more consistent and having
greater available bandwidth. Hence it avoid the packet drops and delay in transmission of data to the
destination.
Moreover, the multipath routing protocol tries to find disjoint nodes, disjoint link and non-disjoint routes.
The route recovery technique is handled to avoid the frequent collision and degradation in the network
performance.
In this, proposed multipath routing protocol for effective local rout recovery in mobile Adhoc network
21
ISSN (ONLINE): 2395-695X
ISSN (PRINT): 2395-695X
International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST)
Vol. 2, Issue 12, December 2016
Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS
(MANET). In this, in case of route failure in the primary route, the recovery node detects it and establishes a
local recovery path with maximum bandwidth from its route cache. The route recovery management
technique is handled to avoid the frequent collision and degradation in the network performance. By
simulation results, we have shown that the proposed approach improves network performance.
V. PROPOSED TECHNIQUE
5.1 Multipath Routing
Multipath routing is defined as a routing technique of using multiple alternative path through a network
which can yield a variety of benefits such as fault tolerance, increased bandwidth or improved security.
An effective multiple alternative path selected from the route cache which is more consistent and having
greater bandwidth availability.
Figure 5.1: Establishing Multiple Paths among Mobile Nodes
5.2 Components in Multipath Routing
1. Route discovery
2. Route maintenance
3. Traffic allocation
Multipath routing protocol also tries finding the followings such as
1. Disjoint nodes
2. Disjoint links
3. Non –disjoint nodes
5.3 Bandwidth Measurement
Let us consider N routes (n1, n2... nN) are discovered between source and destination nodes. With the
22
ISSN (ONLINE): 2395-695X
ISSN (PRINT): 2395-695X
International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST)
Vol. 2, Issue 12, December 2016
Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS
help of time slots in the destination node, the route of maximum bandwidth (B) can be found out as follows
B = Min (T/2 , Tbi)
Where,
T= Number of total time slots in every route
Tbi= Number of free time slots in the bottleneck link of route
5.4 Steps Involved in Multipath Routing Technique
Step 1: Whenever a data packet needs to forwarded by the source node to the destination and no route is
found in the cache, then the source floods the route request (RREQ) packets to the entire network.
STEP 2: If the non-duplicate RREQ packets reaches the intermediate nodes, it attaches the node ID to the
packet and continues broadcasting.
STEP 3: If the duplicate packets are received, instead of dropping all the duplicate packets, only those
that are received from the longer routes are dropped thus minimizing the packet drop.
STEP 4: Even if, route information to the destination is present in the route cache of intermediate node, it
has no permission to send a Route Reply (RREP) back to source and permission is given only to the
destination node.
STEP 5: The destination node upon receiving all RREQ packets attaches the route code and feeds it back
as RREP packets. Let n RREP packets are generated for the paths p1,p2,....,pn. The route code is to
recognize the available bandwidth. The RREP with route code Rc1 has a maximum available bandwidth and
RREP with route code Rc2 has next maximum bandwidth availability and so on. The priority condition for
bandwidth selection is as follows:
B1>B2>B3>B4........>Bn
Where B1.B2,B3,....Bn are the available bandwidth of the routes.
STEP 6: After the intermediate node receives RREP packets, they store the routes p1,p2,....pn in their
route caches and then forward them to subsequent nodes.
STEP 7: Upon reception of RREP packets, the source node selects the primary route based on the route
code.
STEP 8: In case of route failure in the primary route, the recovery node detects it and establishes a local
recovery path with maximum bandwidth (which is the first available path) from its route cache.
23
ISSN (ONLINE): 2395-695X
ISSN (PRINT): 2395-695X
International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST)
Vol. 2, Issue 12, December 2016
Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS
5.4.1 Route Recovery Technique
During the data transmission, the node mobility and low battery power are the issues causing route
breakage. To handle this, a local recovery mechanism is triggered which is based on the establishment of
recovery nodes. The sequence of steps involved in route recovery technique is as follows:
The nodes that overhear transmitted data on the k sequence of nodes in the primary nodes are selected as
recovery nodes In case the primary route attempts transmission of the data packet to the failed route, the
recovery node detects it and initiates route recovery phase
The recovery nodes listen to the retransmission and then waits for overhear acknowledgement. If no
overhear acknowledgement is heard, then the recovery nodes forwards Vary Route(VR) packet to the that
attempts retransmission
When node receives VR, it updates the route cache and forwards the Ack to recovery node. When the
recovery node receives node receives the Ack, it chooses the first route in its route cache since it has the
maximum bandwidth and use that recovery route to retransmit the data packet. In case the first route is busy
or cannot be established, it fetches the next route from the cache and so on.
5.4.2 Route Recovery Management
The network may possess many recovery nodes in the dense environment. In case of route failure, all the
existing recovery nodes attempts route recovery, by sending VR simultaneously. These results in frequent
collisions and degradation of the network performance.
Every node has a various contention window (C) dimensions as per the overhearing count’s number. If the
number is large the node C dimension is small. These reveals that the recovery node related to the primary
route is more stable than other routes. The recovery nodes elects C in a random manner and waits for time t.
In case recovery node hears VR message sends by another recovery node, the timer is stopped. If VR is not
sent by any node within the time interval t, then the recovery node forwards VR for the purpose of route
discovery.
The mobility of recovery node causes it to misunderstand that route as failed even though original route is
available to transmit the data. If recovery node forwards VR message to a node which connects to the
subsequent node well, it discards the VR and further recovery node is conscious about its misjudgment
because it does not receive the Ack.
5.5 ADVANTAGES OF MULTIPATH ROUTING
1. Reduces packet drops
2. Reduces the recovery time
3. Reduces overhead
4. Utilizes bandwidth efficiently
24
ISSN (ONLINE): 2395-695X
ISSN (PRINT): 2395-695X
International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST)
Vol. 2, Issue 12, December 2016
Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS
VI. SYSTEM IMPLEMENTATION
6.1 Network Simulator – 2.34
Ns-2 (from network simulator) is a name for series of discrete event network simulators. These simulators
are used in the simulation of routing protocols, among others, and are heavily used in ad-hoc networking
research, and support popular network protocols, offering simulation results for wired and wireless networks
alike Ns-2 was built in C++ and provides a simulation interface through OTCL, an object oriented dialect of
TCL. The user describes a network topology by writing OTCL scripts, and then the main Ns-2 program
simulates that topology with specified parameters. The Ns-2 modules included within are nodes ,links,
simple link objects, packets, agents, and applications.
Ns-2 is a discrete event simulator targeted at networking research. Ns provides substantial support for
simulation of TCP, routing, and multicast protocols over wired and wireless (local and satellite) networks.
Ns-2 began as a variant of the REAL network simulator in 1989 and has evolved substantially over the past
few years. In network research area, compare with other software, Ns-2 saves a lot of money and time.
Network simulations also particularly useful in allowing the network designers to test the new network in
protocols or to change the existing protocol in a controlled and reproducing manner.
6.2 TCL
TCL (originally from “Tool Command Language”), is a scripting language. TCL gained acceptance on its
own. It is commonly used for rapid prototyping, scripted applications, GUIs and testing. TCL is used on
embedded systems platforms, both in its full form and in several other small foot-printed version. It is
interpreted string processing language for issuing commands to interactive language.
6.2.1 SCRIPT STRUCTURE OF TCL
Set ns [new simulator]
# [Turn on tracing]
# Create topology
# Setup packet loss, link dynamics
# Create routing agents
# Create:
# - multicast groups
# - protocol agents
# - application and/or setup traffic sources
# Post- processing process
# Start simulation
25
ISSN (ONLINE): 2395-695X
ISSN (PRINT): 2395-695X
International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST)
Vol. 2, Issue 12, December 2016
Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS
6.2.2 TCL FEATURES
TCL’s features include
All operations are commands, including languages structures. They are written in prefix notation.
Commands are commonly variadic
Everything can be dynamically redefined and overridden.
All data types can be manipulated as strings, including source code.
Event-driven interface to sockets and files. Time-based and user-defined events are also possible.
Variable visibility restricted to lexical (static) scope by default, but uplevel and upvar allowing process to
interact with the enclosing function’s scopes.
All commands defined by TCL itself generate error messages on incorrect usage.
Extensibility, via C,C++, JAVA and TCL.
Interpreted language using byte code.
Full Unicode (3.1) support, first released 1999.
Cross-platform: windows API, Unix, Linux, Macintosh, etc.
Close integration with windowing (GUI) interface Tk.
Digital logic simulators often include a TCL scripting interface for simulating Verilog, VHDL and System
Verilog Hardware Languages.
VII. RESULT AND DISCUSSION
7.1 Simulation Results
7.1.1 Performance Metrics
We compared our MP-LRR protocol with MLAR protocol. We evaluate mainly the performance according
to the following metrics.
 Average end-to-end delay
The end to end delay is averaged over all surveying data packets from the source to the destination.
 Average packet delivery ratio
It is the ratio of the number of packets received successfully to the total number of packets sent.
 Drop
It is the number of packets dropped during the data transmission.
 Control Overhead
26
ISSN (ONLINE): 2395-695X
ISSN (PRINT): 2395-695X
International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST)
Vol. 2, Issue 12, December 2016
Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS
The control overhead is defined as total number routing control packets normalized by the total number of
receiving data packets.
7.2 Based on Nodes (Speed-Constant)
X axis – Nodes & Y axis – Delay(s)
Figure 7.2.1: The average end-to-end delay of the proposed MP-LRR protocol is less
When compared to the MLAR protocol.
X axis – Nodes & Y axis – Delivery ratio (bits /sec)
Figure 7.2.2: The Packet delivery ratio for MP-LRR increases, when compared to MLAR,
Since it utilizes robust links
27
ISSN (ONLINE): 2395-695X
ISSN (PRINT): 2395-695X
International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST)
Vol. 2, Issue 12, December 2016
Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS
X axis – Nodes & Y axis – Drop (Packets)
Figure 7.2.3: The packet drop for MP-LRR is less, when compared to MLAR.
X axis – Nodes & Y axis – Overhead (Packets)
Figure 7.2.4: The Overhead for MP-LRR is less, when compared to MLAR.
28
ISSN (ONLINE): 2395-695X
ISSN (PRINT): 2395-695X
International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST)
Vol. 2, Issue 12, December 2016
Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS
7.3 Based on Speed (Node-Constant)
X axis – Speed (m/s) & Y axis – Delay(s)
Figure 7.3.1: The average end to end delay of proposed MP-LRR protocol is less
When compared to MLAR protocol.
X axis – Speed (m/s) & Y axis – Delivery ratio (bits /sec)
Figure 7.3.2: The packet delivery ratio for MP-LRR increases,
When compared to MLAR, since it utilizers robust links.
29
ISSN (ONLINE): 2395-695X
ISSN (PRINT): 2395-695X
International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST)
Vol. 2, Issue 12, December 2016
Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS
X axis – Speed (m/s) & Y axis – Drop (Packets)
Figure7.3.3: The packet drop for MP-LRR is less, when compared to MLAR.
X axis – Speed (m/s) & Y axis – Drop (Packets)
VIII. CONCLUSION
In this, proposed multipath routing protocol for effective local rout recovery in mobile Adhoc
network (MANET). In this, in case of route failure in the primary route, the recovery node detects it and
establishes a local recovery path with maximum bandwidth from its route cache. The route recovery
Figure 7.3.4: The control overhead of the protocols. The values are considerably less in MP-LRR
when compared with MLAR
30
ISSN (ONLINE): 2395-695X
ISSN (PRINT): 2395-695X
International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST)
Vol. 2, Issue 12, December 2016
Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS
management technique is handled to avoid the frequent collision and degradation in the network
performance. By simulation results, we have shown that the proposed approach improves network
performance.
REFERENCE
[1] Aminu, M., et al (2009). Probabilistic counter-based route discovery for mobile ad hoc networks. Proceedings of the 2009
International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, (WCMC’ 09)
ACM New York, NY, USA, pp: 1335-1339. DOI: 10.1145/1582379.1582672
[2] Dhirendra, K.S., S. Kumar and C. Kumar, (2010). Enhancement of split multipath routing protocol in MANET. Int. J.
Comput. Sci. Eng., 02: 679-685.
J. Computer Sci., 8 (7): 1143-1149, 2012 1149
[3] Juanwei, L., J. Chen and Y. Kuo, (2009). Multipath routing protocol for network lifetime maximization in ad-hoc networks.
Proceedings of the 5th
International Conference on Wireless Communications, Networking and Mobile
Computing, (WCNMC’ 09), IEEE Xplore Press, Piscataway, NJ, USA, pp: 713-2716. DOI: 10.1109/WICOM.2009.5305828In
[4] Kang, B.S. and I.Y. Ko, (2010). Effective route maintenance and restoration schemes in mobile ad hoc networks. Sensors, 10:
808-821.
[5] Keming, D.U. and Y. Yang, (2010). A QoS routing for maximum bandwidth in ad hoc networks. Proceedings of the 2nd
International Conference on Future Networks (ICFN), Jan. 22-24, Sanya, Hainan, pp: 343-345. DOI: 0.1109/ICFN.2010.11
[6] Khazaei, M. and R. Berangi, (2009). A multi-path routing protocol with fault tolerance in mobile ad hoc networks.
Proceedings of the 14th International CSI Computer Conference, Oct. 20-21, IEEE Xplore Press, Tehran, pp: 77-82. DOI:
10.1109/CSICC.2009.5349359
[7] Khetwal, N. and Sharma, (2012). Multimedia based dynamic source routing for mobile ad hoc networks. J. Inform. Operations
Manage., 3: 213- 216.
[8] Seethalakshmi, P., M.J.A. Jude and G. Rajendran, (2011). An optimal path management strategy in a mobile ad hoc network
using fuzzy and rough set theory. Am. J. Applied Sci., 1314-1321. DOI: 10.3844/ajassp. 2011.1314.1321
[9] Suganthi, P. and A. Tamilarasi, (2012). Impact of malicious nodes under different route refresh intervals in ad hoc network.
Am. J. Applied Sci., 18-23. DOI: 10.3844/ajassp. 2012.18.23
[10] Sung-Won, L., J.Y. Choi, K.W. Lim, Y. Ko and B. Roh, (2010). A reliable and hybrid multi-path routing protocol for multi-
interface tactical ad hoc networks. Proceedings of the Conference on Military Communication Unclassified Program Networking
Protocols and Performance Track,
(MCUPNPP’ 10), pp: 1531-1536.
[11] Trung, H.D., W. Benjapolakul and P.M. Duc, (2007). Performance evaluation and comparison of different ad hoc routing
protocols. Comput. Commun., 30: 2478-2496. DOI: 10.1016/j.comcom.2007.04.007
[12] Wu, Y.C. and C.C. Tuan, (2009). Power saving routing protocol with power sieving in wireless ad hoc networks. Proceeding
of the International Conference on Networks Security, Wireless Communications and Trusted Computing, April 25-26, IEEE
Xplore Press, Wuhan, Hubei, pp: 349
[13] M. D. Colagrosso, "Intelligent broadcasting in mobile ad hoc networks: Three classes of adaptive protocols," EURASIP
Journal on Wireless Communication and Networking, vol. 2007, pp. Article ID 10216, 16 pages, 2007.
31
ISSN (ONLINE): 2395-695X
ISSN (PRINT): 2395-695X
International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST)
Vol. 2, Issue 12, December 2016
Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS
[14] V. Park and S. Corson, "Temporally-Ordered Routing Algorithm (TORA) Version 1," IETS Internet darft (draft-
ietfmanettora- spec-04.txt), July 2001.
[15] Z. J. Haas, M. R. Pearlman, and P. Samar, "The Zone Routing Protocol (ZRP) for Ad Hoc Networks," IETF Mobile Ad Hoc
Networking Working Group, INTERNET DRAFT, 2002.
[16] Y.-B. Ko and N. H. Vaidya, "Location aided routing (LAR) in mobile ad hoc networks," in Proceedings of the 4th
ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom). Dallas, Texas, 1998, pp. 66 - 75.
[17] “Java Swing” , second edition, Mare Loy, Robert Eckstein, Dave Wood, James Elliott & Brain Cole, 2002, pp. 153 -201.
[18] “Mobile communication” Second edition, Jochen Schriller. 2008, pp. 103 -201.
32

More Related Content

What's hot

Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)inventionjournals
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsIOSR Journals
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...IRJET Journal
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networksijwmn
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET Journal
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
 
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVA Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVEditor IJMTER
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsNarendra Singh Yadav
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 

What's hot (19)

Ij3415561561
Ij3415561561Ij3415561561
Ij3415561561
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)
 
J0935461
J0935461J0935461
J0935461
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing Protocols
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Jp3417421749
Jp3417421749Jp3417421749
Jp3417421749
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing Protocol
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
 
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVA Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Jj3416911698
Jj3416911698Jj3416911698
Jj3416911698
 

Viewers also liked

Quantification of rate of air pollution by means of
Quantification of rate of air pollution by means ofQuantification of rate of air pollution by means of
Quantification of rate of air pollution by means ofIJARBEST JOURNAL
 
Review of Integrated Power Factor Correction (PFC) Boost converter topologies...
Review of Integrated Power Factor Correction (PFC) Boost converter topologies...Review of Integrated Power Factor Correction (PFC) Boost converter topologies...
Review of Integrated Power Factor Correction (PFC) Boost converter topologies...IJARBEST JOURNAL
 
Segmentation and Automatic Counting of Red Blood Cells Using Hough Transform
Segmentation and Automatic Counting of Red Blood Cells Using Hough TransformSegmentation and Automatic Counting of Red Blood Cells Using Hough Transform
Segmentation and Automatic Counting of Red Blood Cells Using Hough TransformIJARBEST JOURNAL
 
Simulation of an adaptive digital beamformer using matlab
Simulation of an adaptive digital beamformer using matlabSimulation of an adaptive digital beamformer using matlab
Simulation of an adaptive digital beamformer using matlabIJARBEST JOURNAL
 
High Speed and Low Power ASIC Using Threshold Logic
High Speed and Low Power ASIC Using Threshold LogicHigh Speed and Low Power ASIC Using Threshold Logic
High Speed and Low Power ASIC Using Threshold LogicIJARBEST JOURNAL
 
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderA New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderIJARBEST JOURNAL
 
Performance Analysis of PAPR Reduction in MIMO-OFDM
Performance Analysis of PAPR Reduction in MIMO-OFDMPerformance Analysis of PAPR Reduction in MIMO-OFDM
Performance Analysis of PAPR Reduction in MIMO-OFDMIJARBEST JOURNAL
 
Training material for vms nsn project rev 0.2 20110906
Training material for vms nsn project rev 0.2 20110906Training material for vms nsn project rev 0.2 20110906
Training material for vms nsn project rev 0.2 20110906Hieu Tran
 

Viewers also liked (9)

Quantification of rate of air pollution by means of
Quantification of rate of air pollution by means ofQuantification of rate of air pollution by means of
Quantification of rate of air pollution by means of
 
Review of Integrated Power Factor Correction (PFC) Boost converter topologies...
Review of Integrated Power Factor Correction (PFC) Boost converter topologies...Review of Integrated Power Factor Correction (PFC) Boost converter topologies...
Review of Integrated Power Factor Correction (PFC) Boost converter topologies...
 
Segmentation and Automatic Counting of Red Blood Cells Using Hough Transform
Segmentation and Automatic Counting of Red Blood Cells Using Hough TransformSegmentation and Automatic Counting of Red Blood Cells Using Hough Transform
Segmentation and Automatic Counting of Red Blood Cells Using Hough Transform
 
Indotech Industrial Solutions Pvt. Ltd. Company Work Profile.
Indotech Industrial Solutions Pvt. Ltd. Company Work Profile.Indotech Industrial Solutions Pvt. Ltd. Company Work Profile.
Indotech Industrial Solutions Pvt. Ltd. Company Work Profile.
 
Simulation of an adaptive digital beamformer using matlab
Simulation of an adaptive digital beamformer using matlabSimulation of an adaptive digital beamformer using matlab
Simulation of an adaptive digital beamformer using matlab
 
High Speed and Low Power ASIC Using Threshold Logic
High Speed and Low Power ASIC Using Threshold LogicHigh Speed and Low Power ASIC Using Threshold Logic
High Speed and Low Power ASIC Using Threshold Logic
 
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderA New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
 
Performance Analysis of PAPR Reduction in MIMO-OFDM
Performance Analysis of PAPR Reduction in MIMO-OFDMPerformance Analysis of PAPR Reduction in MIMO-OFDM
Performance Analysis of PAPR Reduction in MIMO-OFDM
 
Training material for vms nsn project rev 0.2 20110906
Training material for vms nsn project rev 0.2 20110906Training material for vms nsn project rev 0.2 20110906
Training material for vms nsn project rev 0.2 20110906
 

Similar to Local Route Recovery in MANETs

Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET  Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET pijans
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
 
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSSURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSgraphhoc
 
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...IJCNCJournal
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewBRNSSPublicationHubI
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...IJCNCJournal
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...ijwmn
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...ijwmn
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
 

Similar to Local Route Recovery in MANETs (20)

Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET  Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
 
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSSURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
 
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
 
Ha3512291233
Ha3512291233Ha3512291233
Ha3512291233
 
X04505122126
X04505122126X04505122126
X04505122126
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANET
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 

More from IJARBEST JOURNAL

More from IJARBEST JOURNAL (20)

Simulation and Implementation of Electric Bicycle employing BLDC Drive
Simulation and Implementation of Electric Bicycle employing BLDC DriveSimulation and Implementation of Electric Bicycle employing BLDC Drive
Simulation and Implementation of Electric Bicycle employing BLDC Drive
 
Analysis of Modulation Strategies for Two-Stage Interleaved Voltage Source In...
Analysis of Modulation Strategies for Two-Stage Interleaved Voltage Source In...Analysis of Modulation Strategies for Two-Stage Interleaved Voltage Source In...
Analysis of Modulation Strategies for Two-Stage Interleaved Voltage Source In...
 
A SURVEY ON QUESTION AND ANSWER SYSTEM BY RETRIEVING THE DESCRIPTIONS USING L...
A SURVEY ON QUESTION AND ANSWER SYSTEM BY RETRIEVING THE DESCRIPTIONS USING L...A SURVEY ON QUESTION AND ANSWER SYSTEM BY RETRIEVING THE DESCRIPTIONS USING L...
A SURVEY ON QUESTION AND ANSWER SYSTEM BY RETRIEVING THE DESCRIPTIONS USING L...
 
Fermentation Process for Manufacturing of Wine from Emblica officinalis fruits
Fermentation Process for Manufacturing of Wine from Emblica officinalis fruitsFermentation Process for Manufacturing of Wine from Emblica officinalis fruits
Fermentation Process for Manufacturing of Wine from Emblica officinalis fruits
 
V01 i030602
V01 i030602V01 i030602
V01 i030602
 
V01 i010415
V01 i010415V01 i010415
V01 i010415
 
V01 i010414
V01 i010414V01 i010414
V01 i010414
 
V01 i010413
V01 i010413V01 i010413
V01 i010413
 
V01 i010412
V01 i010412V01 i010412
V01 i010412
 
V01 i010411
V01 i010411V01 i010411
V01 i010411
 
V01 i010410
V01 i010410V01 i010410
V01 i010410
 
V01 i010409
V01 i010409V01 i010409
V01 i010409
 
V01 i010408
V01 i010408V01 i010408
V01 i010408
 
V01 i010407
V01 i010407V01 i010407
V01 i010407
 
V01 i010406
V01 i010406V01 i010406
V01 i010406
 
V01 i010405
V01 i010405V01 i010405
V01 i010405
 
V01 i010404
V01 i010404V01 i010404
V01 i010404
 
V01 i010403
V01 i010403V01 i010403
V01 i010403
 
V01 i010402
V01 i010402V01 i010402
V01 i010402
 
V01 i010415
V01 i010415V01 i010415
V01 i010415
 

Recently uploaded

Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate productionChinnuNinan
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
GSK & SEAMANSHIP-IV LIFE SAVING APPLIANCES .pptx
GSK & SEAMANSHIP-IV LIFE SAVING APPLIANCES .pptxGSK & SEAMANSHIP-IV LIFE SAVING APPLIANCES .pptx
GSK & SEAMANSHIP-IV LIFE SAVING APPLIANCES .pptxshuklamittt0077
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 

Recently uploaded (20)

Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate production
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
GSK & SEAMANSHIP-IV LIFE SAVING APPLIANCES .pptx
GSK & SEAMANSHIP-IV LIFE SAVING APPLIANCES .pptxGSK & SEAMANSHIP-IV LIFE SAVING APPLIANCES .pptx
GSK & SEAMANSHIP-IV LIFE SAVING APPLIANCES .pptx
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 

Local Route Recovery in MANETs

  • 1. ISSN (ONLINE): 2395-695X ISSN (PRINT): 2395-695X International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST) Vol. 2, Issue 12, December 2016 Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS Multipath Routing Protocol for Effective Local Route Recovery in Mobile Ad Hoc Network (Manet) Ashok N R1 , C.Venkatesh2 PG Scholar, Department of Applied Electronics, Sri Eshwar College of Engineering, Coimbatore, India1 Associate Professor, Department of ECE, Sri Eshwar College of Engineering, Coimbatore, India2 Abstract — In mobile Ad hoc network, frequent mobility during the data transmission of data causes route failure which results in route discovery. In this we propose multipath routing protocol for effective local route recovery in mobile Ad hoc networks. In this protocol each source and destination pair establishes multiple paths in single route discovery and they are cached in their route caches. The cached routes are sorted on the basis of their bandwidth availability. In case of route failure in the primary route, a recovery node which is an over heading neighbor, detects it and establishes a local recovery path with maximum bandwidth from its route cache. This proposed technique improves network performance and it prevents frequent collision. Index Terms—Local Route Recovery, Ad Hoc Network, MANET, Multipath Routing. I. INTRODUCTION In mobile ad hoc networks, frequent mobility during the transmission of data causes route failure which results in route rediscovery. Propose multipath routing protocol for effective local route recovery in Mobile Ad hoc Network (MANET). In this protocol, each source and destination pair establishes multiple paths in the single route discovery and they are cached in their route caches by sorting on the basis of their bandwidth availability. In case of route failure in the primary route, a recovery node which is an overhearing neighbor, detects it and establishes a local recovery path with maximum bandwidth from its route cache. Provide new theoretical results for the route recovery management technique to avoid the frequent collision and degradation in the network performance, providing useful insights into the differences in performances between MP-LRR and MLAR. Simulation and theoretical results show that MP-LRR has greatly improved network performance over MLAR. In mobile Ad hoc network, frequent mobility during the data transmission of data causes route failure which results in route discovery. In this we propose multipath routing protocol for effective local route recovery in mobile Ad hoc networks. In this protocol each source and destination pair establishes multiple paths in single route discovery and they are cached in their route caches. II. LITERATURE SURVEY In this paper Mobile ad hoc Networks (MANETs) are self -configuring, dynamic networks in which nodes are free to move. The issues related to MANET routing are unpredictable of environment, unreliability of wireless medium, resource constrained nodes and dynamic topology. These issues may result in faults such as transmission errors, node failure, link failure, route breakages, congested nodes or links. 19
  • 2. ISSN (ONLINE): 2395-695X ISSN (PRINT): 2395-695X International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST) Vol. 2, Issue 12, December 2016 Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS Traditional on-demand routing protocols produce a large amount of routing control traffic by blindly flooding the entire network with (RREQ) packets during route discovery.The routing overhead associated with the dissemination of routing control packets can be quite huge, especially when the network topology frequently changes. In this, proposed multipath routing protocol for effective local rout recovery in mobile adhoc network (MANET). In this, in case of route failure in the primary route, the recovery node detects it and establishes a local recovery path with maximum bandwidth from its route cache. The route recovery management technique is handled to avoid the frequent collision and degradation in the network performance. By simulation results, we have shown that the proposed approach improves network performance. III. MOBILE AD HOC NETWORK Mobile Ad hoc Network is most popularly known as MANET. It is a self-configured network of mobile routers (and associated hosts) connected by wireless links and this union forms a random topology. Routers move randomly free. Topology changes rapidly and unpredictably. These networks may operate in standalone fashion or may be connected to the larger internet. 3.1 Characteristics of Manet 1. Quick deployment 2. Strength 3. Flexibility 4. Essential support for mobility Figure 3.1: Mobility of Nodes 3.2 Application 1. Emergency situations like naturals or human-induced disaster 2. Military conflicts 20
  • 3. ISSN (ONLINE): 2395-695X ISSN (PRINT): 2395-695X International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST) Vol. 2, Issue 12, December 2016 Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS 3. Wireless mesh 4. Sensor networks 5. Collective and distributed computing 6. Hybrid network IV. SCOPE OF THE PROJECT The main scope of the project is to establish a multiple path in a single route discovery and they are cached in their route caches by sorting on the basis of their bandwidth availability, which can be used in the case of route failure in the primary route. 4.1 Problems in the Networks Wireless Mobile ad hoc Networks (MANETs) are self -configuring, dynamic networks in which nodes are free to move. The issues related to MANET routing are unpredictable of environment, unreliability of wireless medium, resource constrained nodes and dynamic topology. These issues may result in faults such as transmission errors, node failure, link failure, route breakages, congested nodes or links. Traditional on-demand routing protocols produce a large amount of routing control traffic by blindly flooding the entire network with (RREQ) packets during route discovery. The routing overhead associated with the dissemination of routing control packets can be quite huge, especially when the network topology frequently changes. Previous versions of multipath routing protocols cache multiple routes to a destination in a single route discovery. However, in the presence of mobility, multipath protocols incur additional packet drops and delay due to their dependency on potentially stale routes from caches. Protocols using either limited broadcast or local error recovery have focused on reducing packet drops and not on utilizing the available bandwidth efficiently during route recovery. 4.2 Solution Proposed hybrid technique involves multipath discovery and local error-recovery. Whenever a link or a route break is occurring, a local error recovery is performed which in turn invokes the alternate route selection. An effective alternate route is selected from the route cache which is more consistent and having greater available bandwidth. Hence it avoid the packet drops and delay in transmission of data to the destination. Moreover, the multipath routing protocol tries to find disjoint nodes, disjoint link and non-disjoint routes. The route recovery technique is handled to avoid the frequent collision and degradation in the network performance. In this, proposed multipath routing protocol for effective local rout recovery in mobile Adhoc network 21
  • 4. ISSN (ONLINE): 2395-695X ISSN (PRINT): 2395-695X International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST) Vol. 2, Issue 12, December 2016 Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS (MANET). In this, in case of route failure in the primary route, the recovery node detects it and establishes a local recovery path with maximum bandwidth from its route cache. The route recovery management technique is handled to avoid the frequent collision and degradation in the network performance. By simulation results, we have shown that the proposed approach improves network performance. V. PROPOSED TECHNIQUE 5.1 Multipath Routing Multipath routing is defined as a routing technique of using multiple alternative path through a network which can yield a variety of benefits such as fault tolerance, increased bandwidth or improved security. An effective multiple alternative path selected from the route cache which is more consistent and having greater bandwidth availability. Figure 5.1: Establishing Multiple Paths among Mobile Nodes 5.2 Components in Multipath Routing 1. Route discovery 2. Route maintenance 3. Traffic allocation Multipath routing protocol also tries finding the followings such as 1. Disjoint nodes 2. Disjoint links 3. Non –disjoint nodes 5.3 Bandwidth Measurement Let us consider N routes (n1, n2... nN) are discovered between source and destination nodes. With the 22
  • 5. ISSN (ONLINE): 2395-695X ISSN (PRINT): 2395-695X International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST) Vol. 2, Issue 12, December 2016 Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS help of time slots in the destination node, the route of maximum bandwidth (B) can be found out as follows B = Min (T/2 , Tbi) Where, T= Number of total time slots in every route Tbi= Number of free time slots in the bottleneck link of route 5.4 Steps Involved in Multipath Routing Technique Step 1: Whenever a data packet needs to forwarded by the source node to the destination and no route is found in the cache, then the source floods the route request (RREQ) packets to the entire network. STEP 2: If the non-duplicate RREQ packets reaches the intermediate nodes, it attaches the node ID to the packet and continues broadcasting. STEP 3: If the duplicate packets are received, instead of dropping all the duplicate packets, only those that are received from the longer routes are dropped thus minimizing the packet drop. STEP 4: Even if, route information to the destination is present in the route cache of intermediate node, it has no permission to send a Route Reply (RREP) back to source and permission is given only to the destination node. STEP 5: The destination node upon receiving all RREQ packets attaches the route code and feeds it back as RREP packets. Let n RREP packets are generated for the paths p1,p2,....,pn. The route code is to recognize the available bandwidth. The RREP with route code Rc1 has a maximum available bandwidth and RREP with route code Rc2 has next maximum bandwidth availability and so on. The priority condition for bandwidth selection is as follows: B1>B2>B3>B4........>Bn Where B1.B2,B3,....Bn are the available bandwidth of the routes. STEP 6: After the intermediate node receives RREP packets, they store the routes p1,p2,....pn in their route caches and then forward them to subsequent nodes. STEP 7: Upon reception of RREP packets, the source node selects the primary route based on the route code. STEP 8: In case of route failure in the primary route, the recovery node detects it and establishes a local recovery path with maximum bandwidth (which is the first available path) from its route cache. 23
  • 6. ISSN (ONLINE): 2395-695X ISSN (PRINT): 2395-695X International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST) Vol. 2, Issue 12, December 2016 Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS 5.4.1 Route Recovery Technique During the data transmission, the node mobility and low battery power are the issues causing route breakage. To handle this, a local recovery mechanism is triggered which is based on the establishment of recovery nodes. The sequence of steps involved in route recovery technique is as follows: The nodes that overhear transmitted data on the k sequence of nodes in the primary nodes are selected as recovery nodes In case the primary route attempts transmission of the data packet to the failed route, the recovery node detects it and initiates route recovery phase The recovery nodes listen to the retransmission and then waits for overhear acknowledgement. If no overhear acknowledgement is heard, then the recovery nodes forwards Vary Route(VR) packet to the that attempts retransmission When node receives VR, it updates the route cache and forwards the Ack to recovery node. When the recovery node receives node receives the Ack, it chooses the first route in its route cache since it has the maximum bandwidth and use that recovery route to retransmit the data packet. In case the first route is busy or cannot be established, it fetches the next route from the cache and so on. 5.4.2 Route Recovery Management The network may possess many recovery nodes in the dense environment. In case of route failure, all the existing recovery nodes attempts route recovery, by sending VR simultaneously. These results in frequent collisions and degradation of the network performance. Every node has a various contention window (C) dimensions as per the overhearing count’s number. If the number is large the node C dimension is small. These reveals that the recovery node related to the primary route is more stable than other routes. The recovery nodes elects C in a random manner and waits for time t. In case recovery node hears VR message sends by another recovery node, the timer is stopped. If VR is not sent by any node within the time interval t, then the recovery node forwards VR for the purpose of route discovery. The mobility of recovery node causes it to misunderstand that route as failed even though original route is available to transmit the data. If recovery node forwards VR message to a node which connects to the subsequent node well, it discards the VR and further recovery node is conscious about its misjudgment because it does not receive the Ack. 5.5 ADVANTAGES OF MULTIPATH ROUTING 1. Reduces packet drops 2. Reduces the recovery time 3. Reduces overhead 4. Utilizes bandwidth efficiently 24
  • 7. ISSN (ONLINE): 2395-695X ISSN (PRINT): 2395-695X International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST) Vol. 2, Issue 12, December 2016 Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS VI. SYSTEM IMPLEMENTATION 6.1 Network Simulator – 2.34 Ns-2 (from network simulator) is a name for series of discrete event network simulators. These simulators are used in the simulation of routing protocols, among others, and are heavily used in ad-hoc networking research, and support popular network protocols, offering simulation results for wired and wireless networks alike Ns-2 was built in C++ and provides a simulation interface through OTCL, an object oriented dialect of TCL. The user describes a network topology by writing OTCL scripts, and then the main Ns-2 program simulates that topology with specified parameters. The Ns-2 modules included within are nodes ,links, simple link objects, packets, agents, and applications. Ns-2 is a discrete event simulator targeted at networking research. Ns provides substantial support for simulation of TCP, routing, and multicast protocols over wired and wireless (local and satellite) networks. Ns-2 began as a variant of the REAL network simulator in 1989 and has evolved substantially over the past few years. In network research area, compare with other software, Ns-2 saves a lot of money and time. Network simulations also particularly useful in allowing the network designers to test the new network in protocols or to change the existing protocol in a controlled and reproducing manner. 6.2 TCL TCL (originally from “Tool Command Language”), is a scripting language. TCL gained acceptance on its own. It is commonly used for rapid prototyping, scripted applications, GUIs and testing. TCL is used on embedded systems platforms, both in its full form and in several other small foot-printed version. It is interpreted string processing language for issuing commands to interactive language. 6.2.1 SCRIPT STRUCTURE OF TCL Set ns [new simulator] # [Turn on tracing] # Create topology # Setup packet loss, link dynamics # Create routing agents # Create: # - multicast groups # - protocol agents # - application and/or setup traffic sources # Post- processing process # Start simulation 25
  • 8. ISSN (ONLINE): 2395-695X ISSN (PRINT): 2395-695X International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST) Vol. 2, Issue 12, December 2016 Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS 6.2.2 TCL FEATURES TCL’s features include All operations are commands, including languages structures. They are written in prefix notation. Commands are commonly variadic Everything can be dynamically redefined and overridden. All data types can be manipulated as strings, including source code. Event-driven interface to sockets and files. Time-based and user-defined events are also possible. Variable visibility restricted to lexical (static) scope by default, but uplevel and upvar allowing process to interact with the enclosing function’s scopes. All commands defined by TCL itself generate error messages on incorrect usage. Extensibility, via C,C++, JAVA and TCL. Interpreted language using byte code. Full Unicode (3.1) support, first released 1999. Cross-platform: windows API, Unix, Linux, Macintosh, etc. Close integration with windowing (GUI) interface Tk. Digital logic simulators often include a TCL scripting interface for simulating Verilog, VHDL and System Verilog Hardware Languages. VII. RESULT AND DISCUSSION 7.1 Simulation Results 7.1.1 Performance Metrics We compared our MP-LRR protocol with MLAR protocol. We evaluate mainly the performance according to the following metrics.  Average end-to-end delay The end to end delay is averaged over all surveying data packets from the source to the destination.  Average packet delivery ratio It is the ratio of the number of packets received successfully to the total number of packets sent.  Drop It is the number of packets dropped during the data transmission.  Control Overhead 26
  • 9. ISSN (ONLINE): 2395-695X ISSN (PRINT): 2395-695X International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST) Vol. 2, Issue 12, December 2016 Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS The control overhead is defined as total number routing control packets normalized by the total number of receiving data packets. 7.2 Based on Nodes (Speed-Constant) X axis – Nodes & Y axis – Delay(s) Figure 7.2.1: The average end-to-end delay of the proposed MP-LRR protocol is less When compared to the MLAR protocol. X axis – Nodes & Y axis – Delivery ratio (bits /sec) Figure 7.2.2: The Packet delivery ratio for MP-LRR increases, when compared to MLAR, Since it utilizes robust links 27
  • 10. ISSN (ONLINE): 2395-695X ISSN (PRINT): 2395-695X International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST) Vol. 2, Issue 12, December 2016 Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS X axis – Nodes & Y axis – Drop (Packets) Figure 7.2.3: The packet drop for MP-LRR is less, when compared to MLAR. X axis – Nodes & Y axis – Overhead (Packets) Figure 7.2.4: The Overhead for MP-LRR is less, when compared to MLAR. 28
  • 11. ISSN (ONLINE): 2395-695X ISSN (PRINT): 2395-695X International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST) Vol. 2, Issue 12, December 2016 Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS 7.3 Based on Speed (Node-Constant) X axis – Speed (m/s) & Y axis – Delay(s) Figure 7.3.1: The average end to end delay of proposed MP-LRR protocol is less When compared to MLAR protocol. X axis – Speed (m/s) & Y axis – Delivery ratio (bits /sec) Figure 7.3.2: The packet delivery ratio for MP-LRR increases, When compared to MLAR, since it utilizers robust links. 29
  • 12. ISSN (ONLINE): 2395-695X ISSN (PRINT): 2395-695X International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST) Vol. 2, Issue 12, December 2016 Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS X axis – Speed (m/s) & Y axis – Drop (Packets) Figure7.3.3: The packet drop for MP-LRR is less, when compared to MLAR. X axis – Speed (m/s) & Y axis – Drop (Packets) VIII. CONCLUSION In this, proposed multipath routing protocol for effective local rout recovery in mobile Adhoc network (MANET). In this, in case of route failure in the primary route, the recovery node detects it and establishes a local recovery path with maximum bandwidth from its route cache. The route recovery Figure 7.3.4: The control overhead of the protocols. The values are considerably less in MP-LRR when compared with MLAR 30
  • 13. ISSN (ONLINE): 2395-695X ISSN (PRINT): 2395-695X International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST) Vol. 2, Issue 12, December 2016 Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS management technique is handled to avoid the frequent collision and degradation in the network performance. By simulation results, we have shown that the proposed approach improves network performance. REFERENCE [1] Aminu, M., et al (2009). Probabilistic counter-based route discovery for mobile ad hoc networks. Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, (WCMC’ 09) ACM New York, NY, USA, pp: 1335-1339. DOI: 10.1145/1582379.1582672 [2] Dhirendra, K.S., S. Kumar and C. Kumar, (2010). Enhancement of split multipath routing protocol in MANET. Int. J. Comput. Sci. Eng., 02: 679-685. J. Computer Sci., 8 (7): 1143-1149, 2012 1149 [3] Juanwei, L., J. Chen and Y. Kuo, (2009). Multipath routing protocol for network lifetime maximization in ad-hoc networks. Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing, (WCNMC’ 09), IEEE Xplore Press, Piscataway, NJ, USA, pp: 713-2716. DOI: 10.1109/WICOM.2009.5305828In [4] Kang, B.S. and I.Y. Ko, (2010). Effective route maintenance and restoration schemes in mobile ad hoc networks. Sensors, 10: 808-821. [5] Keming, D.U. and Y. Yang, (2010). A QoS routing for maximum bandwidth in ad hoc networks. Proceedings of the 2nd International Conference on Future Networks (ICFN), Jan. 22-24, Sanya, Hainan, pp: 343-345. DOI: 0.1109/ICFN.2010.11 [6] Khazaei, M. and R. Berangi, (2009). A multi-path routing protocol with fault tolerance in mobile ad hoc networks. Proceedings of the 14th International CSI Computer Conference, Oct. 20-21, IEEE Xplore Press, Tehran, pp: 77-82. DOI: 10.1109/CSICC.2009.5349359 [7] Khetwal, N. and Sharma, (2012). Multimedia based dynamic source routing for mobile ad hoc networks. J. Inform. Operations Manage., 3: 213- 216. [8] Seethalakshmi, P., M.J.A. Jude and G. Rajendran, (2011). An optimal path management strategy in a mobile ad hoc network using fuzzy and rough set theory. Am. J. Applied Sci., 1314-1321. DOI: 10.3844/ajassp. 2011.1314.1321 [9] Suganthi, P. and A. Tamilarasi, (2012). Impact of malicious nodes under different route refresh intervals in ad hoc network. Am. J. Applied Sci., 18-23. DOI: 10.3844/ajassp. 2012.18.23 [10] Sung-Won, L., J.Y. Choi, K.W. Lim, Y. Ko and B. Roh, (2010). A reliable and hybrid multi-path routing protocol for multi- interface tactical ad hoc networks. Proceedings of the Conference on Military Communication Unclassified Program Networking Protocols and Performance Track, (MCUPNPP’ 10), pp: 1531-1536. [11] Trung, H.D., W. Benjapolakul and P.M. Duc, (2007). Performance evaluation and comparison of different ad hoc routing protocols. Comput. Commun., 30: 2478-2496. DOI: 10.1016/j.comcom.2007.04.007 [12] Wu, Y.C. and C.C. Tuan, (2009). Power saving routing protocol with power sieving in wireless ad hoc networks. Proceeding of the International Conference on Networks Security, Wireless Communications and Trusted Computing, April 25-26, IEEE Xplore Press, Wuhan, Hubei, pp: 349 [13] M. D. Colagrosso, "Intelligent broadcasting in mobile ad hoc networks: Three classes of adaptive protocols," EURASIP Journal on Wireless Communication and Networking, vol. 2007, pp. Article ID 10216, 16 pages, 2007. 31
  • 14. ISSN (ONLINE): 2395-695X ISSN (PRINT): 2395-695X International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST) Vol. 2, Issue 12, December 2016 Ashok N R ; C. Venkatesh © IJARBEST PUBLICATIONS [14] V. Park and S. Corson, "Temporally-Ordered Routing Algorithm (TORA) Version 1," IETS Internet darft (draft- ietfmanettora- spec-04.txt), July 2001. [15] Z. J. Haas, M. R. Pearlman, and P. Samar, "The Zone Routing Protocol (ZRP) for Ad Hoc Networks," IETF Mobile Ad Hoc Networking Working Group, INTERNET DRAFT, 2002. [16] Y.-B. Ko and N. H. Vaidya, "Location aided routing (LAR) in mobile ad hoc networks," in Proceedings of the 4th ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom). Dallas, Texas, 1998, pp. 66 - 75. [17] “Java Swing” , second edition, Mare Loy, Robert Eckstein, Dave Wood, James Elliott & Brain Cole, 2002, pp. 153 -201. [18] “Mobile communication” Second edition, Jochen Schriller. 2008, pp. 103 -201. 32