SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
Onkar Nath Thakur et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.493-498

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Enhancing the Communication Range and Reliability of Mobile
ADHOC Network Using AODV-OSPF Protocol
Onkar Nath Thakur, Amit Saxena
Department of Computer Science & Engineering Truba college, Bhopal, India

Abstract
The increasing density of node and communication range of mobile node raised some problem such as dropping
of packet and degraded the performance of network. For the improvement of performance of AODV routing
Protocol in mobile ADHOC network various authors used different size of adjacency matrix in AODV routing
protocol. In this paper proposed an improved AODV routing protocol using OSPF routing adjacency matrix in
AODV protocol. The size of OSPF matrix is large instead of AODV.The change the size of matrix increases the
communication range of mobile node. The increased range of communication increases the throughput of
mobile ADHOC network. The proposed model simulates in ns-2.34 and compared with AODV routing protocol.
Our experimental result shows better performance of AODV-OSPF routing protocol.
Keywords: - ADHOC Network, AODV, MDR and OSPF

I. INTRODUCTION
A mobile, ad hoc network is a self-directed
system of mobile node connected by communication
links. The nature of infrastructure of mobile ADHOC
network is dynamic. The process of communication
are performed in dedicated area If two mobile node
are not within signal range, all message
communication between them must pass through one
or more intermediate mobile node[11]. The mobile
nodes are free to move full range of communication,
thus varying the network topology animatedly. Thus
routing protocols must be adaptive and able to
maintain routes in spite of the changing network
connectivity[16]. The process of communication of
AODV routing protocol suffered from the problem of
dropping of packet and huge amount of traffic. The
generation of traffic and dropping raised due to size
of adjacency matrix. The sizes of matrix are changed
control the traffic situation in AODV routing
protocol[15]. For the improvement of size used OSPF
protocol. The OSPF mechanism providing control
traffic reduction is the designated router mechanism
OSPF [19]. However, in a mobile ADHOC network,
due to the fact that mobile ADHOC network do not
have the same set of mobile ADHOC network
neighbors. OSPF extensions for MANET thus use
alternative mechanisms. Aside of miscellaneous
tweaks and tricks such as implicit acknowledgements
or control traffic multicasting, these alternative
mechanisms can be classified in the following
categories. Flooding reduction and support[12].
Instead of the usual, raw flooding scheme, use more
sophisticated techniques that reduce redundant
transmissions adjacency matrix Selection. Instead of
attempting to become adjacent with all it’s near, a
www.ijera.com

router becomes adjacent with only some selected near
nods. Topology Reduction[18,24]. Report only
partial topology information in LSAs, instead of full
topology information. Hello Redundancy Reduction.
In some Hello messages, report only changes in
neighborhood
information
instead
of
full
neighborhood
information.
Flooding
Optimization[14]. The above section discuss
introduction of ADHOC network and OSPF[13,25].
In section II we describe related work of AODVOSPF routing protocol. In section III proposed
methodology. In section IV discuss our experimental
result analysis finally conclude in section V.

II. RELATED WORK
This section gives an extensive related work
on the existing AODV with OSPF routing protocol
for secured communication and increase the range of
communication area. A lot of work has been done on
proposing solutions to the fundamental issues
generated when integrating MANETs with fixed
networks. Some of the proposed solutions have
involved using an extension of the OSPF routing
protocol used in fixed networks and modifying some
key properties to enable it to function in MANETs,
others have taken the path of combining the already
existing MANET routing protocols with OSPF with
techniques that accomplish the goal of inter-domain
routing.
[I] in this paper authors describe reactive protocols
like AODV for TANs because of its higher latency
and route request flooding. In the case of AODV, the
overhead saturated the network constantly with all toall traffic. Some modified work is needed to
understand if tuning AODV parameters would
493 | P a g e
Onkar Nath Thakur et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.493-498
benefit the network. All in all, traditional MANET
protocols can be leveraged for tactical airborne
networks and additional work is needed to ensure
high delivery success without increasing overhead.
[2]OSPF routing protocol increase the convergence
range of communication, Also, the large size of
routing domain, and possible occurrence of mobile
ADHOC network (MANET) mechanism, requires
highly scalable operation on part of OSPF to stay
away from routing flux. Current decade have seen
important hard work to improving OSPF’s
convergence speed as well as scalability and
extending OSPF to achieve seamless integration of
mobile ADHOC networks with conventional wired
networks.
[3] Authors used genetic algorithm to solve a
network routing problem related to communication.
The proposed algorithm to find the shortest path
between the source and destination nodes. A simple
genetic algorithm is developed to find the shortest
path routing in a dynamic network. The developed
algorithm uses an efficient coding scheme.
[4] Authors propose a new heterogeneous routing
protocol specifically designed for the hierarchical ad
hoc network routing protocol. also there a new active
clustering scheme to help build a new constant
hierarchical configuration, which is fundamental to
heterogeneous routing protocols. Stable clustering
scheme to dynamically build a physically hierarchical
ad hoc network. A large-scale network is then
divided into stable small local subnets, similar to the
current Internet hierarchical structure [17,22].
However, our wireless backbones are mobile
backbones, thus suitable to the mobile computing
environment.
[6] Author describe a new algorithm for dynamic
routing of bandwidth guaranteed tunnels where
tunnel routing requests arrive one-by-one and there is
no a priori knowledge regarding future requirements.
The problem is motivated by service provider needs
for fast deployment of bandwidth guaranteed services
and the consequent need in backbone networks for
fast provisioning of bandwidth certain path. Offline
routing algorithms cannot be used since they require
a priori knowledge of all tunnel requests that are to
be routed[20]. Instead of , on-line algorithms that
hold requests arriving one by one and that satisfy as
many potential future demands as possible are
needed.
[7] Authors propose a new mobility model founded
on social network theory. This proposed model
allows collection of hosts to be grouped together in a
way that is based on social relationships among the
individuals. The combination is then mapped to a
topographical space, with activities prejudiced by the
strength of social ties that may also change in time.

www.ijera.com

www.ijera.com

[8]Routing adaptation methodologies are investigate,
which make use of traditional routing protocols such
as OSPF in grouping with MPLS. even as having the
common of traffic routed along optimized shortest
paths, MPSL is only partially introduce to
complement the adaptation process.
[9]Author proposes the oblivious routing scheme
based on shortest-path routing and load balancing.
here present the LP model that find the optimal
routing path. The gain that can be achieved for many
topologies is significant, and grows with the degree
of a node in the network. It is exposed that gain is
achieve for all major ISP topologies. The completion
of this routing method would make it possible to
satisfy greater demands without changing the
network topology. Since it is based on the OSPF
algorithm, and a simple linear programming
algorithm, the required network upgrade is of
acceptable complexity[21,23].
[10]This title thus focuses on schemes that
complement existing ad hoc broadcast mechanisms
(inherently unreliable), which can assurance the full
transmission of critical messages, when necessary.
An exciting approach in this domain is the use of a
covered network, over which significant messages
are approved peer to peer, in order to confirm the
actual diffusion.

III. PROPOSED METHODOLOGY
In this paper we modified the OSPF-MDR
routing protocol for mobile ADHOC network. OSPFMDR routing protocol is extension of mobile
ADHOC routing protocol for the improvement of
communication range of node. In mobile ADHOC
network multi-hope commutation loss of data rate is
very high. For the increasing range of signal strength
and reliable communication Proposed optimal routing
protocol for MANET using MDR. The MDR process
increases the range of adjunct of OSPF routing.
According to survey of OSPF implementation of
MANET network on data accumulate by their
researchers, OSPF-MDR has been challenged as a
suitable routing protocol for MANETs. OSPF-MDR
is the MANET extension of OSPF. It is based on the
selection of a subset of MANET routers consisting of
MANET designated routers (MDRs) and Backup
MDRs that form a connected dominating set (CDS).
The CDS is used to reduce flooding overhead, as
only the MDRs and Backup MDRs flood new link
state advertisements (LSAs) out the receiving
interface to their neighbors. In addition, adjacencies
are formed only between MDRs and a subset of their
neighbors which provides proper scaling in large
scale networks. Fast convergence to topology
changes has emerged as a critical requirement for
today’s routing infrastructures. However, limiting the
processing/bandwidth overhead of the routing
494 | P a g e
Onkar Nath Thakur et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.493-498
protocol continues to be as important as before.
OSPF, being a distributed protocol, requires timely
execution of certain operations, e.g., generation and
processing of hello packets, by the participating
routers. This process might be causing the alleged
lack of convergence of OSPF. AODV routing
protocol is enhanced by MDR technique. In MDR
technique basically three sections are added in basic
AODV routing protocol. There are three new
elements introduced to improve the existing AODV
in recvReply() function namely are 1) the rrep_table
to store incoming RREP packet, 2) mali_list to keep
the optimal path and 3) the rt_upd, parameter to
control the routing table update. In this fashion MDR
technique of improved AODV routing protocol for
diversity range of communication. An outlier is
process from that process we find the boundary side
node in ADHOC network under certain condition.
The outlier detection algorithm is Unsupervised
learning approach is employed to this model. The rate
of unsupervised learning is a new description or
demonstration of the inspection data, which will then
lead to improved potential responses or decisions.
Outlier methods do not need the prior knowledge of
inner node and outer node communication in
ADHOC network, but instead detect changes in
behavior or unusual communication. These methods
model a baseline distribution that represents normal
behavior and then detect observations that show
greatest loss of packet from the normal. Outliers are a
basic form of non-standard examination that can be
used for outer node detection. In supervised methods,
models are trained to discriminate between outer
node and non-outer node behavior so that new
observations can be predefined to class. Supervised
methods require accurate identification of outer node
communication in ADHOC network and can only be
used to detect outer node of a type that have before
occur. An improvement of using unsupervised
methods over supervised methods is that beforehand
undiscovered types of outer node may be detected.
Supervised methods are only trained to tell apart
between legitimate communications and previously
known outer node. In the process of MDR with
outlier is perform as , the outer node form range of
communication treat as abnormal and stop the
control message transmission and create spate class
of all these node and spread information to all
neighbor node for updating routing table. This
algorithm consists of two sections: the outlier class
and the outer node class. And the entire node of
ADHOC network treats as normal node.

www.ijera.com

METHOD:
BEGIN
MDR _OD (RECV (),d,k);
When (RECV=0) MN (m);
END
1) Outlier class
PROCEDURE MDR _OD (RECV (),d,k);
BEGIN
(1) FOR each node with distance d=0;
(2) IF the destination node d=∞
Found all (MN)
(3) FOR all node= 0 III normal class DO
(4)N .addclass( m);
(5) ENDIF
(6) Remove normal node N form outer node MN
from current class
(7) outerslist MN(d=∞);
END
2). Outer node class
PROCEDURE MN(m)
BEGIN
(1) Perform a RECV() and MAIL LIST FROM MN
GROUP;
(2) Return M node with minimal class (MN)
END

IV. Algorithm description
ALGRITHM: MDR _OD INPUT: RECV (), distance
d, number of node k, number of outlier node m
OUTPUT: m outliers, outer node node MN
www.ijera.com

Figure 1 proposed model of improved AODV-OSPF
routing protocol.
495 | P a g e
Onkar Nath Thakur et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.493-498

www.ijera.com

V. EXPERIMENTAL RESULT
ANALYSIS
For the effectiveness of our proposed model
simulate in discrete network simulator ns-2, and used
some standard parameter for performance analysis.
Parameter
Value
Simulation duration
Simulation area
Number of mobile node
Traffic type

100 sec
1000*1000
30
Cbr(udp)

Packet rate
Host pause time

4 packet/sec
10sec

Performance Parameter:Throughput: It gives the fraction of the
channel capacity used for useful transmission (Data
packets correctly delivered to the destination) and is
defined as the total number of packets received by the
destination. It is in fact a measure of the effectiveness
of a routing protocol [14].
Average end-to-end delay: This includes all
possible delays caused by buffering during route
discovery latency, queuing at the interface queue,
retransmission delays at the MAC, and propagation
and transfer times[7].
Packet delivery fraction: The ratio of the
data packets delivered to the destinations to those
generated by the traffic sources [10]

Figure 3 shows that throughput of packet send and
received in communication mode in both two
protocols AODV and AODV-OSPF.

Figure 4 shows that packet delivery ratio of simulated
node in given scenario of AODV Protocol and
AODV-OSPF routing protocol.

VI. CONCLUSION AND FUTURE
WORK
Figure 2 shows that the compression of 30 node
simulation of overall simulation in terms of packet
received, packet send and packet lost in both protocol
AODV and AODV-OSPF routing protocol.

www.ijera.com

Without infrastructure and node mobility in
ad hoc network is a great challenge in reliability
concern. For reliability concern various method are
proposed for node signal strength in mobile ad hoc
network. The MDR scheme of leader agent and
member surveillance greatly reduces the relative
496 | P a g e
Onkar Nath Thakur et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.493-498
calculating overheads and communication costs.
Generally speaking, when leader agent node and
surveillance nodes can ensure the reliability, the
communication result is reliable. The dissertation
proposes a novel scheme for outer outlier node
detection in mobile ad hoc network. Our proposed
method uses unsupervised learning technique for
MDR formation. Our proposed method also removes
the node ambiguity in outer range node. And
minimize a packet dropping in mobile ad hoc
network. Our proposed mechanism has overcome
some of the limitations like it has the required some
extra computational time for the process of MDR
allocation in terms of normal and abnormal. It also
introduces little bit computational overhead during
route advertisement and path establishment. proposed
state of the art on reliable MANETs against packet
dropping of outer node. The outer scheme as well as
prevention, detection and reaction mechanism we
have explored. We categorized them into three
categories according to their goals and their specific
strategies. We concluded the proposed schemes based
upon certain assumptions and their specific
characteristics. These works assume that a node tries
always to maximize its benefit by choosing whether
to cooperation the network or not. However those
works are based on assumption that the majority of
the nodes are inner which not a usual case in
MANET is. We can extend this existing approach for
maximum number of nodes in a wireless environment
through the use of more secure channel and
functionality of using buffer system. In future the
current AODV-MDR performance can be improved
with the help of other techniques. In future
enhancement we can improve this performance by
using rough set theory approach.

[5]

[6]

[7]

[8]

[9]

[10]

[11]

[12]

[13]

REFERENCES
[1]

[2]

[3]

[4]

Bow-Nan Cheng, Scott Moore” A
Comparison of MANET Routing Protocols
on Airborne Tactical Networks” 978-4673,
IEEE 2013,PP 67-89.
M. Goyal, M. Soperi, E. Baccelli, G.
Choudhury, A. Shaikh, H. Hosseini, and K.
Trivedi ” Improving Convergence Speed
and Scalability inOSPF: A Survey” IEEE
Communications Surveys & Tutorials 1553877, Ieee 2012,Pp 86-92.
Gihan Nagib and Wahied G. Ali” Network
Routing Protocol using Genetic Algorithms”
International Journal of Electrical &
Computer Sciences IJECS-IJENS Vol: 10,
2010, PP 56-67.
Joseph Chabarek, Joel Sommers, Paul
Barford, Cristian Estan, David Tsiang,
Stephen right” Power Awareness in

www.ijera.com

[14]

[15]

[16]

[17]

[18]

www.ijera.com

Network Design and Routing” 9781-4244IEEE 2008,PP 42-53.
Kaixin Xu, Mario Gerla” A Heterogeneous
Routing Protocol Based on A New Stable
Clustering Scheme” IEEE 2010,PP 36-45.
Murali Kodialam T. V. Lakshman”
Minimum Interference Routing with
Applications to MPLS Traffic Engineering”
IEEE 2010,PP 56-64.
Mirco Musolesi, Cecilia Mascolo” A
Community Based Mobility Model for Ad
Hoc Network Research” 1595933603 ACM
2010,PP 85-94.
Anton Riedl” Optimized Routing Adaptation
in IP Networks Utilizing OSPF and
PLS”IEEE 2010,PP56-67.
Marija Anti´c, Aleksandra Smiljani´c”
Oblivious Routing Scheme Using Load
Balancing Over Shortest Paths” IEEE
2010,26-35.
Cedric Adjih, Pascale Minet, Paul
Muhlethaler, Emmanuel Baccelli and
Thierry Plesse” QoS support, security and
OSPF interconnection in a MANET using
OLSR” Journal of Telecommunications and
Information Technology 2008,PP 74-85.
Nick
McKeown,
Tom
Anderson”
OpenFlow: Enabling Innovation in Campus
Networks”IEEE 2008,45-55.
Emmanuel Baccelli, Juan Antonio Cordero
and Philippe Jacquet” Using Relative
Neighborhood Graphs for Reliable Database
Synchronization in MANETs” published in
WIMESH 2010 - Fifth IEEE Workshop On
Wireless Mesh Networks IEEE 2010,PP 5059.
Gihan Nagib and Wahied G. Ali” Network
Routing Protocol using Genetic Algorithms”
IJENS –IJECS 2010,PP 54-65.
Joseph Chabarek, Joel Sommers, Paul
Barford, Cristian Estan, David Tsiang,
Stephen right” Power Awareness in
Network Design and Routing” 9781-4244
IEEE 2008,PP 45-55.
Kaixin Xu, Mario Gerla” A Heterogeneous
Routing Protocol Based on A New Stable
Clustering Scheme” IEEE 2008,PP 23-30.
Murali Kodialam T. V. Lakshman”
Minimum Interference Routing with
Applications to MPLS Traffic Engineering”
IEEE 2010, PP 35-42.
Youngseok Lee, Biswanath Mukherjee”
Traffic Engineering in Next-Generation
Optical Networks” Third Quarter 2004,
Volume 6, No. 3, 2004, Pp 52-63.
Lidong Zhou, Zygmunt J. Haas” Securing
Ad Hoc Networks”IEEE 2008, PP 36-45.
497 | P a g e
Onkar Nath Thakur et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.493-498
[19]

[20]

[21]

[22]

Yufei Wang, Zheng Wang, Leah Zhang”
Internet Traffic Engineering without Full
Mesh Overlaying” INFOCOM 2001,PP 5664.
Steven Cheung” An Efficient Message
Authentication Scheme for Link State
Routing” 1997,PP 28-36.
Sanket
Nesargi,
Ravi
Prakash”
MANETconf: Configuration of Hosts in a
Mobile Ad Hoc Network” 7803-7476 IEEE
2002,PP 87-96.
Shree Murthy and J.J. Garcia-Luna-Aceves”
A Routing Protocol for Packet Radio
Networks” IEEE 2010,PP 74-83.

www.ijera.com

[23]

[24]

[25]

www.ijera.com

Yu-Chee Tseng, Sze-Yao Ni, En-Yu Shih”
Adaptive
Approaches
to
Relieving
Broadcast Storms in a Wireless Multihop
Mobile
Ad
Hoc
Network”
IEEE
TRANSACTIONS ON COMPUTERS,
VOL. 52, NO. 5, IEEE 2003, PP 52-61.
Daniele Raffo, C´edric Adjih, Thomas
Clausen, Paul M¨ uhlethaler” An Advanced
Signature System for OLSR” SASN’04,
2004,PP 34-41.
YU-CHEE TSENG, SZE-YAO NI, YUHSHYAN CHEN” The Broadcast Storm
Problem in a Mobile Ad Hoc Network”
Wireless Networks 8, 153–167, 2002, PP
54-62.

498 | P a g e

Contenu connexe

Tendances

DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLIJCNCJournal
 
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...IJCNCJournal
 
Optimization Algorithm to Control Interference-based Topology Control for De...
 Optimization Algorithm to Control Interference-based Topology Control for De... Optimization Algorithm to Control Interference-based Topology Control for De...
Optimization Algorithm to Control Interference-based Topology Control for De...IJCSIS Research Publications
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manetAlexander Decker
 
O dsr optimized dsr routing
O dsr optimized dsr routingO dsr optimized dsr routing
O dsr optimized dsr routingijwmn
 
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVA Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVEditor IJMTER
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetIAEME Publication
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingIOSR Journals
 
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESIJCNCJournal
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
 
MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...
MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...
MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...IJCNCJournal
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...TELKOMNIKA JOURNAL
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
 
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...IRJET Journal
 

Tendances (18)

DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
 
C0351725
C0351725C0351725
C0351725
 
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
 
Optimization Algorithm to Control Interference-based Topology Control for De...
 Optimization Algorithm to Control Interference-based Topology Control for De... Optimization Algorithm to Control Interference-based Topology Control for De...
Optimization Algorithm to Control Interference-based Topology Control for De...
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet
 
O dsr optimized dsr routing
O dsr optimized dsr routingO dsr optimized dsr routing
O dsr optimized dsr routing
 
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVA Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided Routing
 
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANET
 
MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...
MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...
MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
 
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
 

En vedette (20)

Bv4201481484
Bv4201481484Bv4201481484
Bv4201481484
 
Bw4201485492
Bw4201485492Bw4201485492
Bw4201485492
 
Be4201384387
Be4201384387Be4201384387
Be4201384387
 
Bh4201396402
Bh4201396402Bh4201396402
Bh4201396402
 
Lw3620362041
Lw3620362041Lw3620362041
Lw3620362041
 
Lu3620212028
Lu3620212028Lu3620212028
Lu3620212028
 
Lq3620002008
Lq3620002008Lq3620002008
Lq3620002008
 
Lj3619451955
Lj3619451955Lj3619451955
Lj3619451955
 
Mu3621742180
Mu3621742180Mu3621742180
Mu3621742180
 
Mg3620962101
Mg3620962101Mg3620962101
Mg3620962101
 
Hy3613901394
Hy3613901394Hy3613901394
Hy3613901394
 
Gn3611721176
Gn3611721176Gn3611721176
Gn3611721176
 
Gi3611461154
Gi3611461154Gi3611461154
Gi3611461154
 
Gv3612301235
Gv3612301235Gv3612301235
Gv3612301235
 
Gq3611971205
Gq3611971205Gq3611971205
Gq3611971205
 
Hb3612621270
Hb3612621270Hb3612621270
Hb3612621270
 
Gc3611111116
Gc3611111116Gc3611111116
Gc3611111116
 
Gd3611171122
Gd3611171122Gd3611171122
Gd3611171122
 
Gh3611391145
Gh3611391145Gh3611391145
Gh3611391145
 
ApresentaçãO Nintendo
ApresentaçãO NintendoApresentaçãO Nintendo
ApresentaçãO Nintendo
 

Similaire à Bx4201493498

Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)ijngnjournal
 
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...IJCNCJournal
 
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...IJCNCJournal
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIJCNCJournal
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...IOSR Journals
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...IOSR Journals
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
 
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...ijasuc
 
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET Journal
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
 

Similaire à Bx4201493498 (20)

Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
 
A340105
A340105A340105
A340105
 
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
 
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
 
Ijetr021261
Ijetr021261Ijetr021261
Ijetr021261
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
 
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 

Dernier

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Dernier (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Bx4201493498

  • 1. Onkar Nath Thakur et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.493-498 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Enhancing the Communication Range and Reliability of Mobile ADHOC Network Using AODV-OSPF Protocol Onkar Nath Thakur, Amit Saxena Department of Computer Science & Engineering Truba college, Bhopal, India Abstract The increasing density of node and communication range of mobile node raised some problem such as dropping of packet and degraded the performance of network. For the improvement of performance of AODV routing Protocol in mobile ADHOC network various authors used different size of adjacency matrix in AODV routing protocol. In this paper proposed an improved AODV routing protocol using OSPF routing adjacency matrix in AODV protocol. The size of OSPF matrix is large instead of AODV.The change the size of matrix increases the communication range of mobile node. The increased range of communication increases the throughput of mobile ADHOC network. The proposed model simulates in ns-2.34 and compared with AODV routing protocol. Our experimental result shows better performance of AODV-OSPF routing protocol. Keywords: - ADHOC Network, AODV, MDR and OSPF I. INTRODUCTION A mobile, ad hoc network is a self-directed system of mobile node connected by communication links. The nature of infrastructure of mobile ADHOC network is dynamic. The process of communication are performed in dedicated area If two mobile node are not within signal range, all message communication between them must pass through one or more intermediate mobile node[11]. The mobile nodes are free to move full range of communication, thus varying the network topology animatedly. Thus routing protocols must be adaptive and able to maintain routes in spite of the changing network connectivity[16]. The process of communication of AODV routing protocol suffered from the problem of dropping of packet and huge amount of traffic. The generation of traffic and dropping raised due to size of adjacency matrix. The sizes of matrix are changed control the traffic situation in AODV routing protocol[15]. For the improvement of size used OSPF protocol. The OSPF mechanism providing control traffic reduction is the designated router mechanism OSPF [19]. However, in a mobile ADHOC network, due to the fact that mobile ADHOC network do not have the same set of mobile ADHOC network neighbors. OSPF extensions for MANET thus use alternative mechanisms. Aside of miscellaneous tweaks and tricks such as implicit acknowledgements or control traffic multicasting, these alternative mechanisms can be classified in the following categories. Flooding reduction and support[12]. Instead of the usual, raw flooding scheme, use more sophisticated techniques that reduce redundant transmissions adjacency matrix Selection. Instead of attempting to become adjacent with all it’s near, a www.ijera.com router becomes adjacent with only some selected near nods. Topology Reduction[18,24]. Report only partial topology information in LSAs, instead of full topology information. Hello Redundancy Reduction. In some Hello messages, report only changes in neighborhood information instead of full neighborhood information. Flooding Optimization[14]. The above section discuss introduction of ADHOC network and OSPF[13,25]. In section II we describe related work of AODVOSPF routing protocol. In section III proposed methodology. In section IV discuss our experimental result analysis finally conclude in section V. II. RELATED WORK This section gives an extensive related work on the existing AODV with OSPF routing protocol for secured communication and increase the range of communication area. A lot of work has been done on proposing solutions to the fundamental issues generated when integrating MANETs with fixed networks. Some of the proposed solutions have involved using an extension of the OSPF routing protocol used in fixed networks and modifying some key properties to enable it to function in MANETs, others have taken the path of combining the already existing MANET routing protocols with OSPF with techniques that accomplish the goal of inter-domain routing. [I] in this paper authors describe reactive protocols like AODV for TANs because of its higher latency and route request flooding. In the case of AODV, the overhead saturated the network constantly with all toall traffic. Some modified work is needed to understand if tuning AODV parameters would 493 | P a g e
  • 2. Onkar Nath Thakur et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.493-498 benefit the network. All in all, traditional MANET protocols can be leveraged for tactical airborne networks and additional work is needed to ensure high delivery success without increasing overhead. [2]OSPF routing protocol increase the convergence range of communication, Also, the large size of routing domain, and possible occurrence of mobile ADHOC network (MANET) mechanism, requires highly scalable operation on part of OSPF to stay away from routing flux. Current decade have seen important hard work to improving OSPF’s convergence speed as well as scalability and extending OSPF to achieve seamless integration of mobile ADHOC networks with conventional wired networks. [3] Authors used genetic algorithm to solve a network routing problem related to communication. The proposed algorithm to find the shortest path between the source and destination nodes. A simple genetic algorithm is developed to find the shortest path routing in a dynamic network. The developed algorithm uses an efficient coding scheme. [4] Authors propose a new heterogeneous routing protocol specifically designed for the hierarchical ad hoc network routing protocol. also there a new active clustering scheme to help build a new constant hierarchical configuration, which is fundamental to heterogeneous routing protocols. Stable clustering scheme to dynamically build a physically hierarchical ad hoc network. A large-scale network is then divided into stable small local subnets, similar to the current Internet hierarchical structure [17,22]. However, our wireless backbones are mobile backbones, thus suitable to the mobile computing environment. [6] Author describe a new algorithm for dynamic routing of bandwidth guaranteed tunnels where tunnel routing requests arrive one-by-one and there is no a priori knowledge regarding future requirements. The problem is motivated by service provider needs for fast deployment of bandwidth guaranteed services and the consequent need in backbone networks for fast provisioning of bandwidth certain path. Offline routing algorithms cannot be used since they require a priori knowledge of all tunnel requests that are to be routed[20]. Instead of , on-line algorithms that hold requests arriving one by one and that satisfy as many potential future demands as possible are needed. [7] Authors propose a new mobility model founded on social network theory. This proposed model allows collection of hosts to be grouped together in a way that is based on social relationships among the individuals. The combination is then mapped to a topographical space, with activities prejudiced by the strength of social ties that may also change in time. www.ijera.com www.ijera.com [8]Routing adaptation methodologies are investigate, which make use of traditional routing protocols such as OSPF in grouping with MPLS. even as having the common of traffic routed along optimized shortest paths, MPSL is only partially introduce to complement the adaptation process. [9]Author proposes the oblivious routing scheme based on shortest-path routing and load balancing. here present the LP model that find the optimal routing path. The gain that can be achieved for many topologies is significant, and grows with the degree of a node in the network. It is exposed that gain is achieve for all major ISP topologies. The completion of this routing method would make it possible to satisfy greater demands without changing the network topology. Since it is based on the OSPF algorithm, and a simple linear programming algorithm, the required network upgrade is of acceptable complexity[21,23]. [10]This title thus focuses on schemes that complement existing ad hoc broadcast mechanisms (inherently unreliable), which can assurance the full transmission of critical messages, when necessary. An exciting approach in this domain is the use of a covered network, over which significant messages are approved peer to peer, in order to confirm the actual diffusion. III. PROPOSED METHODOLOGY In this paper we modified the OSPF-MDR routing protocol for mobile ADHOC network. OSPFMDR routing protocol is extension of mobile ADHOC routing protocol for the improvement of communication range of node. In mobile ADHOC network multi-hope commutation loss of data rate is very high. For the increasing range of signal strength and reliable communication Proposed optimal routing protocol for MANET using MDR. The MDR process increases the range of adjunct of OSPF routing. According to survey of OSPF implementation of MANET network on data accumulate by their researchers, OSPF-MDR has been challenged as a suitable routing protocol for MANETs. OSPF-MDR is the MANET extension of OSPF. It is based on the selection of a subset of MANET routers consisting of MANET designated routers (MDRs) and Backup MDRs that form a connected dominating set (CDS). The CDS is used to reduce flooding overhead, as only the MDRs and Backup MDRs flood new link state advertisements (LSAs) out the receiving interface to their neighbors. In addition, adjacencies are formed only between MDRs and a subset of their neighbors which provides proper scaling in large scale networks. Fast convergence to topology changes has emerged as a critical requirement for today’s routing infrastructures. However, limiting the processing/bandwidth overhead of the routing 494 | P a g e
  • 3. Onkar Nath Thakur et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.493-498 protocol continues to be as important as before. OSPF, being a distributed protocol, requires timely execution of certain operations, e.g., generation and processing of hello packets, by the participating routers. This process might be causing the alleged lack of convergence of OSPF. AODV routing protocol is enhanced by MDR technique. In MDR technique basically three sections are added in basic AODV routing protocol. There are three new elements introduced to improve the existing AODV in recvReply() function namely are 1) the rrep_table to store incoming RREP packet, 2) mali_list to keep the optimal path and 3) the rt_upd, parameter to control the routing table update. In this fashion MDR technique of improved AODV routing protocol for diversity range of communication. An outlier is process from that process we find the boundary side node in ADHOC network under certain condition. The outlier detection algorithm is Unsupervised learning approach is employed to this model. The rate of unsupervised learning is a new description or demonstration of the inspection data, which will then lead to improved potential responses or decisions. Outlier methods do not need the prior knowledge of inner node and outer node communication in ADHOC network, but instead detect changes in behavior or unusual communication. These methods model a baseline distribution that represents normal behavior and then detect observations that show greatest loss of packet from the normal. Outliers are a basic form of non-standard examination that can be used for outer node detection. In supervised methods, models are trained to discriminate between outer node and non-outer node behavior so that new observations can be predefined to class. Supervised methods require accurate identification of outer node communication in ADHOC network and can only be used to detect outer node of a type that have before occur. An improvement of using unsupervised methods over supervised methods is that beforehand undiscovered types of outer node may be detected. Supervised methods are only trained to tell apart between legitimate communications and previously known outer node. In the process of MDR with outlier is perform as , the outer node form range of communication treat as abnormal and stop the control message transmission and create spate class of all these node and spread information to all neighbor node for updating routing table. This algorithm consists of two sections: the outlier class and the outer node class. And the entire node of ADHOC network treats as normal node. www.ijera.com METHOD: BEGIN MDR _OD (RECV (),d,k); When (RECV=0) MN (m); END 1) Outlier class PROCEDURE MDR _OD (RECV (),d,k); BEGIN (1) FOR each node with distance d=0; (2) IF the destination node d=∞ Found all (MN) (3) FOR all node= 0 III normal class DO (4)N .addclass( m); (5) ENDIF (6) Remove normal node N form outer node MN from current class (7) outerslist MN(d=∞); END 2). Outer node class PROCEDURE MN(m) BEGIN (1) Perform a RECV() and MAIL LIST FROM MN GROUP; (2) Return M node with minimal class (MN) END IV. Algorithm description ALGRITHM: MDR _OD INPUT: RECV (), distance d, number of node k, number of outlier node m OUTPUT: m outliers, outer node node MN www.ijera.com Figure 1 proposed model of improved AODV-OSPF routing protocol. 495 | P a g e
  • 4. Onkar Nath Thakur et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.493-498 www.ijera.com V. EXPERIMENTAL RESULT ANALYSIS For the effectiveness of our proposed model simulate in discrete network simulator ns-2, and used some standard parameter for performance analysis. Parameter Value Simulation duration Simulation area Number of mobile node Traffic type 100 sec 1000*1000 30 Cbr(udp) Packet rate Host pause time 4 packet/sec 10sec Performance Parameter:Throughput: It gives the fraction of the channel capacity used for useful transmission (Data packets correctly delivered to the destination) and is defined as the total number of packets received by the destination. It is in fact a measure of the effectiveness of a routing protocol [14]. Average end-to-end delay: This includes all possible delays caused by buffering during route discovery latency, queuing at the interface queue, retransmission delays at the MAC, and propagation and transfer times[7]. Packet delivery fraction: The ratio of the data packets delivered to the destinations to those generated by the traffic sources [10] Figure 3 shows that throughput of packet send and received in communication mode in both two protocols AODV and AODV-OSPF. Figure 4 shows that packet delivery ratio of simulated node in given scenario of AODV Protocol and AODV-OSPF routing protocol. VI. CONCLUSION AND FUTURE WORK Figure 2 shows that the compression of 30 node simulation of overall simulation in terms of packet received, packet send and packet lost in both protocol AODV and AODV-OSPF routing protocol. www.ijera.com Without infrastructure and node mobility in ad hoc network is a great challenge in reliability concern. For reliability concern various method are proposed for node signal strength in mobile ad hoc network. The MDR scheme of leader agent and member surveillance greatly reduces the relative 496 | P a g e
  • 5. Onkar Nath Thakur et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.493-498 calculating overheads and communication costs. Generally speaking, when leader agent node and surveillance nodes can ensure the reliability, the communication result is reliable. The dissertation proposes a novel scheme for outer outlier node detection in mobile ad hoc network. Our proposed method uses unsupervised learning technique for MDR formation. Our proposed method also removes the node ambiguity in outer range node. And minimize a packet dropping in mobile ad hoc network. Our proposed mechanism has overcome some of the limitations like it has the required some extra computational time for the process of MDR allocation in terms of normal and abnormal. It also introduces little bit computational overhead during route advertisement and path establishment. proposed state of the art on reliable MANETs against packet dropping of outer node. The outer scheme as well as prevention, detection and reaction mechanism we have explored. We categorized them into three categories according to their goals and their specific strategies. We concluded the proposed schemes based upon certain assumptions and their specific characteristics. These works assume that a node tries always to maximize its benefit by choosing whether to cooperation the network or not. However those works are based on assumption that the majority of the nodes are inner which not a usual case in MANET is. We can extend this existing approach for maximum number of nodes in a wireless environment through the use of more secure channel and functionality of using buffer system. In future the current AODV-MDR performance can be improved with the help of other techniques. In future enhancement we can improve this performance by using rough set theory approach. [5] [6] [7] [8] [9] [10] [11] [12] [13] REFERENCES [1] [2] [3] [4] Bow-Nan Cheng, Scott Moore” A Comparison of MANET Routing Protocols on Airborne Tactical Networks” 978-4673, IEEE 2013,PP 67-89. M. Goyal, M. Soperi, E. Baccelli, G. Choudhury, A. Shaikh, H. Hosseini, and K. Trivedi ” Improving Convergence Speed and Scalability inOSPF: A Survey” IEEE Communications Surveys & Tutorials 1553877, Ieee 2012,Pp 86-92. Gihan Nagib and Wahied G. Ali” Network Routing Protocol using Genetic Algorithms” International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 10, 2010, PP 56-67. Joseph Chabarek, Joel Sommers, Paul Barford, Cristian Estan, David Tsiang, Stephen right” Power Awareness in www.ijera.com [14] [15] [16] [17] [18] www.ijera.com Network Design and Routing” 9781-4244IEEE 2008,PP 42-53. Kaixin Xu, Mario Gerla” A Heterogeneous Routing Protocol Based on A New Stable Clustering Scheme” IEEE 2010,PP 36-45. Murali Kodialam T. V. Lakshman” Minimum Interference Routing with Applications to MPLS Traffic Engineering” IEEE 2010,PP 56-64. Mirco Musolesi, Cecilia Mascolo” A Community Based Mobility Model for Ad Hoc Network Research” 1595933603 ACM 2010,PP 85-94. Anton Riedl” Optimized Routing Adaptation in IP Networks Utilizing OSPF and PLS”IEEE 2010,PP56-67. Marija Anti´c, Aleksandra Smiljani´c” Oblivious Routing Scheme Using Load Balancing Over Shortest Paths” IEEE 2010,26-35. Cedric Adjih, Pascale Minet, Paul Muhlethaler, Emmanuel Baccelli and Thierry Plesse” QoS support, security and OSPF interconnection in a MANET using OLSR” Journal of Telecommunications and Information Technology 2008,PP 74-85. Nick McKeown, Tom Anderson” OpenFlow: Enabling Innovation in Campus Networks”IEEE 2008,45-55. Emmanuel Baccelli, Juan Antonio Cordero and Philippe Jacquet” Using Relative Neighborhood Graphs for Reliable Database Synchronization in MANETs” published in WIMESH 2010 - Fifth IEEE Workshop On Wireless Mesh Networks IEEE 2010,PP 5059. Gihan Nagib and Wahied G. Ali” Network Routing Protocol using Genetic Algorithms” IJENS –IJECS 2010,PP 54-65. Joseph Chabarek, Joel Sommers, Paul Barford, Cristian Estan, David Tsiang, Stephen right” Power Awareness in Network Design and Routing” 9781-4244 IEEE 2008,PP 45-55. Kaixin Xu, Mario Gerla” A Heterogeneous Routing Protocol Based on A New Stable Clustering Scheme” IEEE 2008,PP 23-30. Murali Kodialam T. V. Lakshman” Minimum Interference Routing with Applications to MPLS Traffic Engineering” IEEE 2010, PP 35-42. Youngseok Lee, Biswanath Mukherjee” Traffic Engineering in Next-Generation Optical Networks” Third Quarter 2004, Volume 6, No. 3, 2004, Pp 52-63. Lidong Zhou, Zygmunt J. Haas” Securing Ad Hoc Networks”IEEE 2008, PP 36-45. 497 | P a g e
  • 6. Onkar Nath Thakur et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.493-498 [19] [20] [21] [22] Yufei Wang, Zheng Wang, Leah Zhang” Internet Traffic Engineering without Full Mesh Overlaying” INFOCOM 2001,PP 5664. Steven Cheung” An Efficient Message Authentication Scheme for Link State Routing” 1997,PP 28-36. Sanket Nesargi, Ravi Prakash” MANETconf: Configuration of Hosts in a Mobile Ad Hoc Network” 7803-7476 IEEE 2002,PP 87-96. Shree Murthy and J.J. Garcia-Luna-Aceves” A Routing Protocol for Packet Radio Networks” IEEE 2010,PP 74-83. www.ijera.com [23] [24] [25] www.ijera.com Yu-Chee Tseng, Sze-Yao Ni, En-Yu Shih” Adaptive Approaches to Relieving Broadcast Storms in a Wireless Multihop Mobile Ad Hoc Network” IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 5, IEEE 2003, PP 52-61. Daniele Raffo, C´edric Adjih, Thomas Clausen, Paul M¨ uhlethaler” An Advanced Signature System for OLSR” SASN’04, 2004,PP 34-41. YU-CHEE TSENG, SZE-YAO NI, YUHSHYAN CHEN” The Broadcast Storm Problem in a Mobile Ad Hoc Network” Wireless Networks 8, 153–167, 2002, PP 54-62. 498 | P a g e