SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 9
DVR-BASED HYBRID ROUTING PROTOCOLS IN MOBILE AD-HOC
NETWORK: APPLICATION AND CHALLENGES
Mrinal Kanti Debbarma1
, Jhunu Debbarma2
, Santanu Kr. Sen3
, Sudipta Roy4
1
Department of Information Technology, Assam University
2
Department of Information Technology, Assam University
3
Department of Computer Science & Engg., BBIT, Kolkata
4
Department of Information Technology, Assam University
Abstract
DVR- hybrid routing protocol proposal derives from the conventional distance vector routing algorithm which, in turn, is based on
Distributed Asynchronous Bellman Ford’s shortest path algorithm, however, with some minor to significant variations as needed for
the ad hoc and mobile nature of the MANET A major thrust of the protocol designers towards the development and deployment of
DVR-based routing protocols, irrespectively in wired, wireless or even in ad hoc and sensor networks is primarily because of the
conceptual and implementation simplicity and elegance coupled with the minimum information requirement by each node of the DVR.
A good amount of research has been done in the past towards the improvement of routing algorithms in MANET, but the area has not
become stable till date. This paper, focused on several applications, challenges and solutions, in the perspective of routing in MANET.
Keywords: MANET, Count-To-Infinity (CTI), Slow Convergence, Path Vector Routing (PVR).
---------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
Mobile Ad-hoc network is a collection of mobile devices
denoted as nodes, which can communicate between themselves
using wireless links without the need or intervention of any
infrastructure like base stations, access points etc [1][2][3]. A
node in a MANET, which is equipped with a wireless
transmitter and receiver (transceiver) and is powered by a
battery, plays the dual role of a host and a router as well. Two
nodes willing to communicate with each other need to be either
in the direct common range of each other or should be assisted
by other nodes acting as routers to carry forward the packets
from a defined source to a destination in the best possible
routing path [3,][4].
Internet Engineering Task Force (IETF) activity has
standardized several routing protocols for MANET. Routing
protocols are the backbone to provide efficient services in
MANET, in terms of performance and reliability. Designing
routing protocol in MANET is quite difficult and tricky
compared to that of any classic or non-ad hoc (formal) network
due to some inherent limitations of the MANET like dynamic
nature of network topology, limited bandwidth, asymmetric
links, scalability, mobility of nodes limited battery power and
alike. Moreover, the intrinsic nature of the nodes to move freely
and independently in any arbitrary direction by potentially
changing ones link to other’s on a regular basis, is really an
exigent concern while designing the desired routing algorithm.
MANET is IP based and the nodes have to be configured with a
free IP address not only to send and receive messages, but also
to act as router to forward traffic to some destination unrelated
to its own use.
The main challenge to setup a MANET is that each node has to
maintain the information required to route traffic properly and
thus designing a routing protocol for MANET has several
difficulties. Firstly, MANET has a dynamically changing
topology as the nodes are mobile. However, this behavior favors
routing protocols that dynamically discover routes (e.g.
Dynamic Source Routing [5], TORA [6], Associativity Based
Routing (ABR) [7] etc.) over conventional distance vector
routing protocols (DVR) [5][6][8]. Secondly, the fact that
MANET lacks any structure and thus makes IP subnetting
inefficient. Thirdly, limitation of battery power and power
depletion of nodes due to large number of messages passed
during cluster formation. Links in mobile networks could be
asymmetric at times. If a routing protocol relies only on bi-
directional links, the size and connectivity of the network may
be severely limited; in other words, a protocol that makes use of
unidirectional links can significantly reduce network partitions
and improve routing performance. DVRP is one of two major
routing protocols for communications approach that use packets
which are sent over IP. DVRP required routing how to report
the distance of various nodes within a network or IP topology in
order to determine the best and most efficient route for packets.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 10
2. APPLICATIONS AND CHALLENGES
The primary application of the MANET is in various field viz.,
battle field, disaster recovery, reuse operation, natural calamity,
fast traffic information delivery on highways, network
extension, local interconnection network, ubiquitous computing,
sensor network, urban sensing, vehicular networking, home and
enterprise networking, Wireless Local Area Network (WLAN),
Private Area Network (PAN), health monitoring, tracking
application, monitoring the aquatic environment, localization
application, law enforcement, emergency service, educational
application, conference/meeting/lectures, wildlife monitoring,
intelligent home applications, urban areas, ubiquitous Internet
access, delivery of location-wise information/service,
entertainment, multiuser games, robotic pets and etc. However,
a slight variation, namely wireless sensor networks (WSN),
Vehicle Ad hoc Networks (VANET) which are ad hoc in nature,
do possess wide applicability in the modern electronics world.
Routing in such ad hoc networks possess a vital role in
transmission of messages for what they are intended to. Routing
is the heart of a network and optimality and reliability are the
keen requirements for the success of such a routing protocol.
The important challenges in routing in MANETs are due to
same intrinsic characteristic of MANETs, like limited battery
power, highly dynamic nature of network topology, limited
bandwidth, asymmetric links, scalability, mobility of nodes etc
Recent challenges for ad-hoc wireless networks comprise:
 Multicast [4]
 QoS support
 Power-aware routing [5]
 Location-aided routing [6]
Multicast is appropriate to support cooperative /multiparty
wireless communications. The multicast tree is highly dynamic
in nature (i.e., its topology is subject to change over time), the
multicast routing protocol must be able to handle with mobility,
including multicast membership dynamics (e.g., join and leave).
In case of QoS, it is insufficient to consider QoS simply at the
network level without considering the underlying MAC layer
[7]. Again, as nodes are dynamic in nature, the problems
associated with the hidden station, and inconsistent link
characteristics, supporting end-to-end QoS is a nontrivial issue
that involves in-depth analysis and research. In recent years,
there is a trend toward an adaptive QoS approach as a substitute
of the “plain” resource reservation method with hard QoS
guarantees. An additional important factor is the limited power
source in handheld nodes, which can seriously forbid packet
forwarding in an ad hoc mobile environment. Therefore, routing
traffic based on nodes’ power metrics is one way to differentiate
routes that are more prolonged than others. Finally, as a
substitute of using beacon or broadcast search Location-Aided
Routing (LAR) uses positioning information to define
associated regions at the routing is spatially concerned with.
This is comparable to associativity-oriented and restricted
broadcast in ABR.
3. DVR BASED ROUTING PROTOCOLS IN
MANETS: CLASSIFICATIONS
The Distance Vector Routing Algorithm (DVRA) is a dynamic
(adaptive), distributed (decentralized), asynchronous and
iterative routing protocol where the routing tables are
continuously updated with the information received from the
neighbouring routers [2], [7]. The DVRA requires each router to
periodically compute its shortest path (best route) to every other
router in the network, exchange this distance information in the
form of a DVT, with its neighbours and thereby update its own
routing table (DVRT). This DVRT updation process is
continued till a stable DVRT is obtained which the router can
then use to forward packets to other routers. Among the other
routers in the network, some are its neighbours who are
connected to it either by a direct point-to-point link or via any
broadcast subnets like Ethernet or Token Ring. The shortest
path or best route often implies the minimum-delay path.
Periodically, but not synchronously with other routers, each
router measures its distance to each neighbouring router by
sending time-stamped ECHO REQUEST packets to them and
receiving time-stamped ECHO RESPONSE packets from them.
It then updates its DVRT using the Distributed Asynchronous
Bellman-ford Algorithm [7] and checks if any change has
occurred. In case any change occurs, it builds an updated DVT
from this updated DVRT and sends this updated DVT to all its
neighbouring routers. Finally, it starts using its updated DVRT
for routing packets. Similarly, it receives, in turn, and,
asynchronously, the periodically updated DVTs sent by each of
its neighbours.
Before proceeding farther, it should be expressly pointed out
that, unlike a DVT which a router sends to and receives from its
neighbours, a DVRT is for the router’s own use and each entry
in the DVRT has one additional column (parameter) compared
to those in the DVT, namely, the identity of the next-hop, i.e.,
the neighbouring router that provides this (shortest path) route.
Now, upon receiving a regular or expected DVT from a
neighbour, corresponding to the Periodic Update (PU) carried
out by the latter, a router recomputed its own DVRT. In case
any change occurs in its DVRT, the router immediately sends its
correspondingly changed DVT to all its neighbours. Receipt of
this updated DVT triggers the neighbours to immediately
recompute their respective DVRTs. If this triggered update (TU)
brings about any change in the DVRT of any of the neighbours,
the latter immediately sends its updated DVT to all its
neighbours which may, in turn, result in further TUs. This
additional DVT exchange process (besides the periodic
exchange process) continues till no TU yields any further
change in the DVRT of any router. The DVRA is then said to
have converged, i.e., attained a stable state.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 11
DVR is a simple, elegant and widely used as the Internet
Gateway Protocol (IGP) and Extended Gateway Protocol (EGP)
[3] in the Global Internet as well as in the private Internets in
the form of Routing Information Protocol (RIP)[2,3], RIP-2 and
Boarder Gateway Protocol (BGP)[2,3]. The Distance Vector
Routing Algorithm (DVRA) is a dynamic, distributed,
asynchronous and iterative routing protocol where the routing
tables are continuously updated with the information received
from the neighbouring routers [2], [10].
As a distributed dynamic routing algorithm which is expected to
adapt to changes in topology and traffic. The existing DVRA,
though simple and conceptually elegant, suffers from some
well-known problems like Count-to-Infirmity (CTI), slow
convenience, looping, frequent route oscillation. Out of all
these, the CTI is more vulnerable, which actually, made
practical DVR out of race.
Though good amount of research has been done in the past
towards the improvement of the basic DVRA [18], none of the
proposed techniques like Hold-Down, Split Horizon and Poison
Reverse have been able to satisfactory solve the problems in the
DVRA.
DVRA is used in routing protocols similar to IGRP [18], ISO
and Novell IPX due to its simplicity, elegance and flexibility.
We have investigated a modified DVRA (MDVRA), which uses
a host of novel techniques to remove all the weaknesses,
particularly the CTIP, inherent to the existing DVRA.
Additionally, the goal is to augment the existing capabilities of
the DVRA so as to make it efficient, robust, fully dynamic and
fully fit to the environment of the MANET primarily and WSN
in the extended phase.
4. CHALLENGES OF DVR
There are some weaknesses of the asynchronous DVRA are as
follows:
 Count-To-Infinity (CTI) Problem
 Slow Convergence Problem
 Oscillation Problem
4.1 Count-To-Infinity (CTI) Problem
The DVRA cannot perform fine if there are topological changes
in the internetwork. DVRA suffers from CTI problem due to
link or router failure or due to unending routing loops. The CTI
caused by routing loops involving more than two routers are
providing in [8].
4.2 Slow Convergence (SC) Problem
When there is growth in terms of cost of any link or there is a
failure in the link between two corresponding neighboring nodes
in an internetwork, then it considered as worst case or requires
unnecessary number of iterations to terminate.
4.3 Oscillation Problem
Besides CTI and slow convergence the another important
problem of the DVR or compatible shortest path routing
protocols is that because of the need to always use the shortest
path, there may be frequent switching of routes caused by even
small increase or decrease in the link costs. This frequent route
switching gives rise to instability in routing and this problem is
known as the route oscillation problem [17]. If two paths to a
destination have delays which are marginally different, then the
choice of the lower delay path as the shortest path invites more
traffic on this path so that it ceases to be the shortest path in no
time and, as a result, the other path becomes shorter than this
path. As a consequence, more traffic now flows through the
second path, thus increasing its delay and makes it lose the
status of the shortest path to the original shortest path. The route
oscillation problem degrades overall performance of a network
and hence some mechanism is needed to dampen the oscillation,
i.e., to reduce the frequency of route switching. It should be
noted in this context that if hop count is used as the metric in the
DVR, then the route oscillation problem does not arise at all
because the traffic changes which cause changes in the link
delays are ignored.
4.4 Existing Solutions to the CTI Problem in the
DVRA
In the global Internet, the DVR is used as an intra- domain
routing protocol [14], i.e., it can be used inside an autonomous
system (AS), but it is not suitable for inter-domain routing,
mainly because of the CTI problem. The Path Vector Routing
(PVR) [14], which is also derived from the DVR, is used for
inter-domain routing. In the PVR, there is at least one node,
known as speaker node, in each AS that acts on behalf of the
entire AS. The speaker node in an AS creates a routing table and
advertises it to speaker nodes in the neighboring AS. The idea is
the same as for the DVR except that only speaker nodes in each
AS can communicate with the speaker nodes in the
neighbouring AS. However, what is advertised is different. A
speaker node advertises its full AS path for reaching every
destination AS. Just as in the DVR, an AS in the PVR shares its
table with only its immediate neighbours.
The instability of the DVR and the possibility of the creation of
loops are avoided in the PVR because it advertises the full path
to a destination, instead of only the distance (number of AS
hops). When a router receives a route update message, it checks
to see if its own AS is in the path list to the destination. If it is,
the message is ignored and thus looping is avoided. Border
Gateway Protocol (BGP) [13], [17], which is the de-facto
standard for inter domain routing protocol in the Internet is
based on the PVR and avoids looping and CTI problem.
However, advertisement of the full path in the BGP entails large
overhead (BGP is a complex routing protocol having many
other attributes besides path vector which also requires large
overhead) [14],[20],[21]. On the other hand, although BGP is
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 12
based on the DVR, the actual implementation of BP has moved
much away from the DVR. The simplicity and elegance of
DVR, which it is famous for, is ignored and overlooked in BGP
and the other PVR-based routing protocols.
4.5 Distributed Routing Approach
Distributed Routing adapts a compromise between the two
extreme approaches adapted by the centralized routing (a fully
global but centralized approach) and isolated routing (a purely
local approach) by sharing the knowledge about the network
gained by other routers. This makes Distributed Routing
perform much better than the other two dynamic routing
algorithms and, as a result, most of today’s routing algorithms
are distributed in nature.
Among the distributed routing algorithms, two are most widely
used, namely the Distance Vector Routing Algorithm (DVRA)
which is based on the well-known Bellman-Ford shortest path
algorithm and the Link State Routing Algorithm (LSRA) which
is based on the well-known Dijkstra’s shortest path algorithm.
In the DVRA, each router periodically exchanges, with its
neighbouring routers, its Distance Vector Table (DVT)
containing entries specifying the identity of each known router
(destination) along with the current estimated distance of the
shortest path to reach the router. Utilizing the DVTs received
from all its neighbours and measuring its own distance to each
neighbour, a route computes the shortest path distance to each
destination, builds its own Distance Vector Routing Table
(DVRT) and sends the DVT (unlike the DVRT, the DVT does
not contain the next-hop information in the entries).The
manuscript should be prepared in accordance with the
reviewer’s comments after having the final acceptance. BGP
has been derived from the DVR protocol. However, BGP differs
from the DVR protocol in at least two important ways. First,
instead of just advertising its distance in total number of hops to
a certain destination, the AS advertises its complete AS-path
upto the destination. For this reason BGP is also called a path
vector protocol. Second, the path or route selection in the BGP
is based on not only the shortest path criterion but also the
“import” and “export” policies that may be independently
chosen by each router [13] [14].
5. CONCLUSIONS
The problems of routing in MANETs and other such ad hoc
networks like wireless sensor networks (WSN), Vehicle Ad hoc
Networks (VANET), etc are primarily because of the mobility
of the nodes, random topology changes, limited battery power,
limited bandwidth, asymmetric links, frequent link breakage due
to random addition and deletion of nodes, to name a few, for
which, many routing protocols already proposed and/or in
research, have not found to be stable and thus providing enough
scope of improvement through research and investigations.
In this paper, focused on several applications, challenges and
solutions, in the perspective of routing in MANET and many
routing schemes based on DVR in the said field have been
investigated and compared with each other keeping technical
relevancy, as far as practicable. The review shows that a
majority class of existing routing protocols is fundamentally
DVR based as because of the conceptual and implementation
simplicity and elegancy of the DVR. In this paper, a DVR-based
routing algorithm for MANETs has been investigated and
suggested keeping stress on the existing solution to the CTI
problem of DVRA. The key focus is made on application and
challenges with proper identification of solution, so that each
neighbour can provide more and more information of different
nature to its adjacent router and thus each router could enrich its
information database by collecting such information from all of
its next-hop neighbours, which would help during routing traffic
proactively or reactively as the situation demands.
REFERENCES
[1] Albeto Leon-Garcia and Indra Widjaja, Communication
Networks, Tata McGraw Hill, 2000
[2] N. H. Saeed, M.F. Abbod, and H S. AI Raweshidy,
“MANET Routing Protocols Taxanomy”, IEEE
International Conference on Future Communication
Networks, PP-123-128, 2012
[3] M. Abolhasan et al. “ A review of routing protocols for
mobile ad hoc networks” Elsevier Ad Hoc networks 2
(2004) 1-22
[4] M. Gerla, C.C Chiang, and l. Zhang, “Tree Maulticast
Strategies in Mobile, Multihop Wireless Networks,”
ACM/Baltzer Mobile Networks and Apps. J,. 1988
[5] S. Singh, M. Woo, and C. S. Raghavendra, “Power-
Aware Routing in Mobile Ad Hoc Networks,” Proc.
ACM/IEEE MOBICOM ’98, Oct. 1998.
[6] Y. B. Ko and N. H. Vaidya, “Location-Aided Routing
(LAR) in Mobile Ad Hoc Networks,” Proc. ACM/IEEE
MOBICOM ’98, Oct. 1998.
[7] S. Das, C. Perkins, E. Royer, Ad hoc on demand
distancevector (AODV) routing, Internet Draft, draft-
ietf-manetaodv-11.txt, work in progress, 2002.
[8] S. Murthy J.J. Garcia-Luna-Aceves, A routing protocol
for packet radio networks, in: Proceedings of the First
AnnualACM International Conference on Mobile
Computing andNetworking, Berkeley, CA, 1995, pp. 86–
95.
[9] C. C. Chiang, T. C. Tsai, W. Liu, and M. Gerla, “Routing
in clustered multihop, mobile wireless networks with
fading channel,” The Next Millennium, Proceedings of
IEEE Singapore International Conference on Networks,
SICON, pp. 197–221, 1997.
[10] G. Pei, M. Gerla, X. Hong, and C. C. Chiang, “A
wireless hierarchical routing protocol with group
mobility,” IEEE Wireless Communications and
Networking Conference, WCNC ’99, vol.3, pp. 1538–
1542, New Orleans, LA, 1999.
[11] P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A.
Qayyum, L. Viennot, Optimized link state routing
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 13
protocolfor ad hoc networks, IEEE INMIC, Pakistan,
2001.
[12] M. Gerla, Fisheye state routing protocol (FSR) for ad hoc
networks, Internet Draft, draft-ietf-manet-aodv-
03.txt,work in progress, 2002.
[13] T.-W. Chen, M. Gerla, Global state routing: a new
routing scheme for ad-hoc wireless networks, in:
Proceedings of theIEEE ICC, 1998.
[14] T. Griffin and G. Wilfong, “ A safe Path Vector
Protocol” Proc. IEEE INFOCOM, vol. 2, March 2000,
pp-490-499.
[15] C. Toh, A novel distributed routing protocol to support
ad- hoc mobile computing, in: IEEE 15th Annual
International Phoenix Conf., 1996, pp. 480–486.
[16] S. Tenenbaum, Computer Networks, 3rd Ed., PHI, 2000.
[17] Douglas E. Comer, David L. Stevens, Internetworking
with TCP/IP Vol-II, 3rd Ed., Pearson Education
(Singapore), LPE, 2005
[18] D. Bertsekas and R. Gallagar: “Data Networks”, 2nd Ed.,
Englewood cliffs, NJ, Prentice Hall, 1992
[19] J. F. Kurose and K. W. Ross, Computer Networking: A
Top-Down Approach Featuring the Interent, Third
Edition, Pearson Education, Inc, Singapore, 2005.
[20] S. K. Ray, J. Kumar, S. K. Sen and J. Nath, “Modified
Distance Vector Routing Scheme for a MANET”, Proc.
Of the 13th National Conference on Communications
(NCC) held at IIT, Kanpur during Jan 26-28, 2007, pp.
197-201.
[21] G.V. Kumar et al. “Current Research Work on Routing
Protocols for MANET: A Literature Survey”
International Journal on Computer Science and
Engineering, Vol. 02, No. 03, 2012, 706-713

Contenu connexe

Tendances

Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
A survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsA survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsIAEME Publication
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
 
Secured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolSecured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolAhmad Sharifi
 
Active path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessActive path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessAlexander Decker
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocolsrahulmonikasharma
 

Tendances (17)

Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
A survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsA survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane ts
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Mane ts
Mane tsMane ts
Mane ts
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
Secured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolSecured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing Protocol
 
A0110104
A0110104A0110104
A0110104
 
E1073644
E1073644E1073644
E1073644
 
Active path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessActive path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wireless
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
 
Br31467472
Br31467472Br31467472
Br31467472
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
Ij3415561561
Ij3415561561Ij3415561561
Ij3415561561
 
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
 

En vedette

Multi criteria decision model for biodiesel selection in an electrical powe...
Multi   criteria decision model for biodiesel selection in an electrical powe...Multi   criteria decision model for biodiesel selection in an electrical powe...
Multi criteria decision model for biodiesel selection in an electrical powe...eSAT Publishing House
 
Flip invariant video copy detection using sparse-coded features
Flip invariant video copy detection using sparse-coded featuresFlip invariant video copy detection using sparse-coded features
Flip invariant video copy detection using sparse-coded featureseSAT Publishing House
 
Seismic evaluation of rc framed buildings with
Seismic evaluation of rc framed buildings withSeismic evaluation of rc framed buildings with
Seismic evaluation of rc framed buildings witheSAT Publishing House
 
Vehicle anti theft system based on an embedded
Vehicle anti theft system based on an embeddedVehicle anti theft system based on an embedded
Vehicle anti theft system based on an embeddedeSAT Publishing House
 
Performance evaluation of various types of nodes in
Performance evaluation of various types of nodes inPerformance evaluation of various types of nodes in
Performance evaluation of various types of nodes ineSAT Publishing House
 
Identification of isomorphism and detection of distinct mechanism of kinemati...
Identification of isomorphism and detection of distinct mechanism of kinemati...Identification of isomorphism and detection of distinct mechanism of kinemati...
Identification of isomorphism and detection of distinct mechanism of kinemati...eSAT Publishing House
 
An approach for discrimination prevention in data mining
An approach for discrimination prevention in data miningAn approach for discrimination prevention in data mining
An approach for discrimination prevention in data miningeSAT Publishing House
 
Pca based support vector machine technique for volatility forecasting
Pca based support vector machine technique for volatility forecastingPca based support vector machine technique for volatility forecasting
Pca based support vector machine technique for volatility forecastingeSAT Publishing House
 
Effect of elements on linear elastic stress analysis
Effect of elements on linear elastic stress analysisEffect of elements on linear elastic stress analysis
Effect of elements on linear elastic stress analysiseSAT Publishing House
 
A review on fuel cell and its applications
A review on fuel cell and its applicationsA review on fuel cell and its applications
A review on fuel cell and its applicationseSAT Publishing House
 
Template based framework for rapid fast development
Template based framework for rapid fast developmentTemplate based framework for rapid fast development
Template based framework for rapid fast developmenteSAT Publishing House
 
Extracting interesting knowledge from versions of dynamic xml documents
Extracting interesting knowledge from versions of dynamic xml documentsExtracting interesting knowledge from versions of dynamic xml documents
Extracting interesting knowledge from versions of dynamic xml documentseSAT Publishing House
 
Open channel flow velocity profiles for different
Open channel flow velocity profiles for differentOpen channel flow velocity profiles for different
Open channel flow velocity profiles for differenteSAT Publishing House
 
Wireless facsimile connectivity using gsm module
Wireless facsimile connectivity using gsm moduleWireless facsimile connectivity using gsm module
Wireless facsimile connectivity using gsm moduleeSAT Publishing House
 
Real time implementation of object tracking through
Real time implementation of object tracking throughReal time implementation of object tracking through
Real time implementation of object tracking througheSAT Publishing House
 
Partial replacement of coarse aggregates by expanded
Partial replacement of coarse aggregates by expandedPartial replacement of coarse aggregates by expanded
Partial replacement of coarse aggregates by expandedeSAT Publishing House
 
Real time reservoir operation (calibration phase) a case study
Real time reservoir operation (calibration phase) a case studyReal time reservoir operation (calibration phase) a case study
Real time reservoir operation (calibration phase) a case studyeSAT Publishing House
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Publishing House
 
Performance of nano crystalline h zsm-5 as additive in fcc catalyst a review
Performance of nano crystalline h zsm-5 as additive in fcc catalyst a reviewPerformance of nano crystalline h zsm-5 as additive in fcc catalyst a review
Performance of nano crystalline h zsm-5 as additive in fcc catalyst a revieweSAT Publishing House
 
Comparison of parallel summation and weak
Comparison of parallel summation and weakComparison of parallel summation and weak
Comparison of parallel summation and weakeSAT Publishing House
 

En vedette (20)

Multi criteria decision model for biodiesel selection in an electrical powe...
Multi   criteria decision model for biodiesel selection in an electrical powe...Multi   criteria decision model for biodiesel selection in an electrical powe...
Multi criteria decision model for biodiesel selection in an electrical powe...
 
Flip invariant video copy detection using sparse-coded features
Flip invariant video copy detection using sparse-coded featuresFlip invariant video copy detection using sparse-coded features
Flip invariant video copy detection using sparse-coded features
 
Seismic evaluation of rc framed buildings with
Seismic evaluation of rc framed buildings withSeismic evaluation of rc framed buildings with
Seismic evaluation of rc framed buildings with
 
Vehicle anti theft system based on an embedded
Vehicle anti theft system based on an embeddedVehicle anti theft system based on an embedded
Vehicle anti theft system based on an embedded
 
Performance evaluation of various types of nodes in
Performance evaluation of various types of nodes inPerformance evaluation of various types of nodes in
Performance evaluation of various types of nodes in
 
Identification of isomorphism and detection of distinct mechanism of kinemati...
Identification of isomorphism and detection of distinct mechanism of kinemati...Identification of isomorphism and detection of distinct mechanism of kinemati...
Identification of isomorphism and detection of distinct mechanism of kinemati...
 
An approach for discrimination prevention in data mining
An approach for discrimination prevention in data miningAn approach for discrimination prevention in data mining
An approach for discrimination prevention in data mining
 
Pca based support vector machine technique for volatility forecasting
Pca based support vector machine technique for volatility forecastingPca based support vector machine technique for volatility forecasting
Pca based support vector machine technique for volatility forecasting
 
Effect of elements on linear elastic stress analysis
Effect of elements on linear elastic stress analysisEffect of elements on linear elastic stress analysis
Effect of elements on linear elastic stress analysis
 
A review on fuel cell and its applications
A review on fuel cell and its applicationsA review on fuel cell and its applications
A review on fuel cell and its applications
 
Template based framework for rapid fast development
Template based framework for rapid fast developmentTemplate based framework for rapid fast development
Template based framework for rapid fast development
 
Extracting interesting knowledge from versions of dynamic xml documents
Extracting interesting knowledge from versions of dynamic xml documentsExtracting interesting knowledge from versions of dynamic xml documents
Extracting interesting knowledge from versions of dynamic xml documents
 
Open channel flow velocity profiles for different
Open channel flow velocity profiles for differentOpen channel flow velocity profiles for different
Open channel flow velocity profiles for different
 
Wireless facsimile connectivity using gsm module
Wireless facsimile connectivity using gsm moduleWireless facsimile connectivity using gsm module
Wireless facsimile connectivity using gsm module
 
Real time implementation of object tracking through
Real time implementation of object tracking throughReal time implementation of object tracking through
Real time implementation of object tracking through
 
Partial replacement of coarse aggregates by expanded
Partial replacement of coarse aggregates by expandedPartial replacement of coarse aggregates by expanded
Partial replacement of coarse aggregates by expanded
 
Real time reservoir operation (calibration phase) a case study
Real time reservoir operation (calibration phase) a case studyReal time reservoir operation (calibration phase) a case study
Real time reservoir operation (calibration phase) a case study
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Performance of nano crystalline h zsm-5 as additive in fcc catalyst a review
Performance of nano crystalline h zsm-5 as additive in fcc catalyst a reviewPerformance of nano crystalline h zsm-5 as additive in fcc catalyst a review
Performance of nano crystalline h zsm-5 as additive in fcc catalyst a review
 
Comparison of parallel summation and weak
Comparison of parallel summation and weakComparison of parallel summation and weak
Comparison of parallel summation and weak
 

Similaire à Dvr based hybrid routing protocols in mobile ad-hoc network application and challenges

Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingeSAT Publishing House
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...eSAT Journals
 
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANETVARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANETcscpconf
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
 
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfLaurie Smith
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANETIRJET Journal
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesijcsit
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
 
Manet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metricsManet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metricsIJARIIT
 
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...IJEEE
 
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANETIntegrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANETijsrd.com
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANETEditor IJCATR
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANETEditor IJCATR
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 

Similaire à Dvr based hybrid routing protocols in mobile ad-hoc network application and challenges (20)

Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
 
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANETVARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
 
J018216275
J018216275J018216275
J018216275
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
 
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdf
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANET
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 
Manet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metricsManet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metrics
 
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
 
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANETIntegrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
 
eaodv
eaodveaodv
eaodv
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANET
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANET
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 

Plus de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Plus de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Dernier

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 

Dernier (20)

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 

Dvr based hybrid routing protocols in mobile ad-hoc network application and challenges

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 9 DVR-BASED HYBRID ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORK: APPLICATION AND CHALLENGES Mrinal Kanti Debbarma1 , Jhunu Debbarma2 , Santanu Kr. Sen3 , Sudipta Roy4 1 Department of Information Technology, Assam University 2 Department of Information Technology, Assam University 3 Department of Computer Science & Engg., BBIT, Kolkata 4 Department of Information Technology, Assam University Abstract DVR- hybrid routing protocol proposal derives from the conventional distance vector routing algorithm which, in turn, is based on Distributed Asynchronous Bellman Ford’s shortest path algorithm, however, with some minor to significant variations as needed for the ad hoc and mobile nature of the MANET A major thrust of the protocol designers towards the development and deployment of DVR-based routing protocols, irrespectively in wired, wireless or even in ad hoc and sensor networks is primarily because of the conceptual and implementation simplicity and elegance coupled with the minimum information requirement by each node of the DVR. A good amount of research has been done in the past towards the improvement of routing algorithms in MANET, but the area has not become stable till date. This paper, focused on several applications, challenges and solutions, in the perspective of routing in MANET. Keywords: MANET, Count-To-Infinity (CTI), Slow Convergence, Path Vector Routing (PVR). ---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION Mobile Ad-hoc network is a collection of mobile devices denoted as nodes, which can communicate between themselves using wireless links without the need or intervention of any infrastructure like base stations, access points etc [1][2][3]. A node in a MANET, which is equipped with a wireless transmitter and receiver (transceiver) and is powered by a battery, plays the dual role of a host and a router as well. Two nodes willing to communicate with each other need to be either in the direct common range of each other or should be assisted by other nodes acting as routers to carry forward the packets from a defined source to a destination in the best possible routing path [3,][4]. Internet Engineering Task Force (IETF) activity has standardized several routing protocols for MANET. Routing protocols are the backbone to provide efficient services in MANET, in terms of performance and reliability. Designing routing protocol in MANET is quite difficult and tricky compared to that of any classic or non-ad hoc (formal) network due to some inherent limitations of the MANET like dynamic nature of network topology, limited bandwidth, asymmetric links, scalability, mobility of nodes limited battery power and alike. Moreover, the intrinsic nature of the nodes to move freely and independently in any arbitrary direction by potentially changing ones link to other’s on a regular basis, is really an exigent concern while designing the desired routing algorithm. MANET is IP based and the nodes have to be configured with a free IP address not only to send and receive messages, but also to act as router to forward traffic to some destination unrelated to its own use. The main challenge to setup a MANET is that each node has to maintain the information required to route traffic properly and thus designing a routing protocol for MANET has several difficulties. Firstly, MANET has a dynamically changing topology as the nodes are mobile. However, this behavior favors routing protocols that dynamically discover routes (e.g. Dynamic Source Routing [5], TORA [6], Associativity Based Routing (ABR) [7] etc.) over conventional distance vector routing protocols (DVR) [5][6][8]. Secondly, the fact that MANET lacks any structure and thus makes IP subnetting inefficient. Thirdly, limitation of battery power and power depletion of nodes due to large number of messages passed during cluster formation. Links in mobile networks could be asymmetric at times. If a routing protocol relies only on bi- directional links, the size and connectivity of the network may be severely limited; in other words, a protocol that makes use of unidirectional links can significantly reduce network partitions and improve routing performance. DVRP is one of two major routing protocols for communications approach that use packets which are sent over IP. DVRP required routing how to report the distance of various nodes within a network or IP topology in order to determine the best and most efficient route for packets.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 10 2. APPLICATIONS AND CHALLENGES The primary application of the MANET is in various field viz., battle field, disaster recovery, reuse operation, natural calamity, fast traffic information delivery on highways, network extension, local interconnection network, ubiquitous computing, sensor network, urban sensing, vehicular networking, home and enterprise networking, Wireless Local Area Network (WLAN), Private Area Network (PAN), health monitoring, tracking application, monitoring the aquatic environment, localization application, law enforcement, emergency service, educational application, conference/meeting/lectures, wildlife monitoring, intelligent home applications, urban areas, ubiquitous Internet access, delivery of location-wise information/service, entertainment, multiuser games, robotic pets and etc. However, a slight variation, namely wireless sensor networks (WSN), Vehicle Ad hoc Networks (VANET) which are ad hoc in nature, do possess wide applicability in the modern electronics world. Routing in such ad hoc networks possess a vital role in transmission of messages for what they are intended to. Routing is the heart of a network and optimality and reliability are the keen requirements for the success of such a routing protocol. The important challenges in routing in MANETs are due to same intrinsic characteristic of MANETs, like limited battery power, highly dynamic nature of network topology, limited bandwidth, asymmetric links, scalability, mobility of nodes etc Recent challenges for ad-hoc wireless networks comprise:  Multicast [4]  QoS support  Power-aware routing [5]  Location-aided routing [6] Multicast is appropriate to support cooperative /multiparty wireless communications. The multicast tree is highly dynamic in nature (i.e., its topology is subject to change over time), the multicast routing protocol must be able to handle with mobility, including multicast membership dynamics (e.g., join and leave). In case of QoS, it is insufficient to consider QoS simply at the network level without considering the underlying MAC layer [7]. Again, as nodes are dynamic in nature, the problems associated with the hidden station, and inconsistent link characteristics, supporting end-to-end QoS is a nontrivial issue that involves in-depth analysis and research. In recent years, there is a trend toward an adaptive QoS approach as a substitute of the “plain” resource reservation method with hard QoS guarantees. An additional important factor is the limited power source in handheld nodes, which can seriously forbid packet forwarding in an ad hoc mobile environment. Therefore, routing traffic based on nodes’ power metrics is one way to differentiate routes that are more prolonged than others. Finally, as a substitute of using beacon or broadcast search Location-Aided Routing (LAR) uses positioning information to define associated regions at the routing is spatially concerned with. This is comparable to associativity-oriented and restricted broadcast in ABR. 3. DVR BASED ROUTING PROTOCOLS IN MANETS: CLASSIFICATIONS The Distance Vector Routing Algorithm (DVRA) is a dynamic (adaptive), distributed (decentralized), asynchronous and iterative routing protocol where the routing tables are continuously updated with the information received from the neighbouring routers [2], [7]. The DVRA requires each router to periodically compute its shortest path (best route) to every other router in the network, exchange this distance information in the form of a DVT, with its neighbours and thereby update its own routing table (DVRT). This DVRT updation process is continued till a stable DVRT is obtained which the router can then use to forward packets to other routers. Among the other routers in the network, some are its neighbours who are connected to it either by a direct point-to-point link or via any broadcast subnets like Ethernet or Token Ring. The shortest path or best route often implies the minimum-delay path. Periodically, but not synchronously with other routers, each router measures its distance to each neighbouring router by sending time-stamped ECHO REQUEST packets to them and receiving time-stamped ECHO RESPONSE packets from them. It then updates its DVRT using the Distributed Asynchronous Bellman-ford Algorithm [7] and checks if any change has occurred. In case any change occurs, it builds an updated DVT from this updated DVRT and sends this updated DVT to all its neighbouring routers. Finally, it starts using its updated DVRT for routing packets. Similarly, it receives, in turn, and, asynchronously, the periodically updated DVTs sent by each of its neighbours. Before proceeding farther, it should be expressly pointed out that, unlike a DVT which a router sends to and receives from its neighbours, a DVRT is for the router’s own use and each entry in the DVRT has one additional column (parameter) compared to those in the DVT, namely, the identity of the next-hop, i.e., the neighbouring router that provides this (shortest path) route. Now, upon receiving a regular or expected DVT from a neighbour, corresponding to the Periodic Update (PU) carried out by the latter, a router recomputed its own DVRT. In case any change occurs in its DVRT, the router immediately sends its correspondingly changed DVT to all its neighbours. Receipt of this updated DVT triggers the neighbours to immediately recompute their respective DVRTs. If this triggered update (TU) brings about any change in the DVRT of any of the neighbours, the latter immediately sends its updated DVT to all its neighbours which may, in turn, result in further TUs. This additional DVT exchange process (besides the periodic exchange process) continues till no TU yields any further change in the DVRT of any router. The DVRA is then said to have converged, i.e., attained a stable state.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 11 DVR is a simple, elegant and widely used as the Internet Gateway Protocol (IGP) and Extended Gateway Protocol (EGP) [3] in the Global Internet as well as in the private Internets in the form of Routing Information Protocol (RIP)[2,3], RIP-2 and Boarder Gateway Protocol (BGP)[2,3]. The Distance Vector Routing Algorithm (DVRA) is a dynamic, distributed, asynchronous and iterative routing protocol where the routing tables are continuously updated with the information received from the neighbouring routers [2], [10]. As a distributed dynamic routing algorithm which is expected to adapt to changes in topology and traffic. The existing DVRA, though simple and conceptually elegant, suffers from some well-known problems like Count-to-Infirmity (CTI), slow convenience, looping, frequent route oscillation. Out of all these, the CTI is more vulnerable, which actually, made practical DVR out of race. Though good amount of research has been done in the past towards the improvement of the basic DVRA [18], none of the proposed techniques like Hold-Down, Split Horizon and Poison Reverse have been able to satisfactory solve the problems in the DVRA. DVRA is used in routing protocols similar to IGRP [18], ISO and Novell IPX due to its simplicity, elegance and flexibility. We have investigated a modified DVRA (MDVRA), which uses a host of novel techniques to remove all the weaknesses, particularly the CTIP, inherent to the existing DVRA. Additionally, the goal is to augment the existing capabilities of the DVRA so as to make it efficient, robust, fully dynamic and fully fit to the environment of the MANET primarily and WSN in the extended phase. 4. CHALLENGES OF DVR There are some weaknesses of the asynchronous DVRA are as follows:  Count-To-Infinity (CTI) Problem  Slow Convergence Problem  Oscillation Problem 4.1 Count-To-Infinity (CTI) Problem The DVRA cannot perform fine if there are topological changes in the internetwork. DVRA suffers from CTI problem due to link or router failure or due to unending routing loops. The CTI caused by routing loops involving more than two routers are providing in [8]. 4.2 Slow Convergence (SC) Problem When there is growth in terms of cost of any link or there is a failure in the link between two corresponding neighboring nodes in an internetwork, then it considered as worst case or requires unnecessary number of iterations to terminate. 4.3 Oscillation Problem Besides CTI and slow convergence the another important problem of the DVR or compatible shortest path routing protocols is that because of the need to always use the shortest path, there may be frequent switching of routes caused by even small increase or decrease in the link costs. This frequent route switching gives rise to instability in routing and this problem is known as the route oscillation problem [17]. If two paths to a destination have delays which are marginally different, then the choice of the lower delay path as the shortest path invites more traffic on this path so that it ceases to be the shortest path in no time and, as a result, the other path becomes shorter than this path. As a consequence, more traffic now flows through the second path, thus increasing its delay and makes it lose the status of the shortest path to the original shortest path. The route oscillation problem degrades overall performance of a network and hence some mechanism is needed to dampen the oscillation, i.e., to reduce the frequency of route switching. It should be noted in this context that if hop count is used as the metric in the DVR, then the route oscillation problem does not arise at all because the traffic changes which cause changes in the link delays are ignored. 4.4 Existing Solutions to the CTI Problem in the DVRA In the global Internet, the DVR is used as an intra- domain routing protocol [14], i.e., it can be used inside an autonomous system (AS), but it is not suitable for inter-domain routing, mainly because of the CTI problem. The Path Vector Routing (PVR) [14], which is also derived from the DVR, is used for inter-domain routing. In the PVR, there is at least one node, known as speaker node, in each AS that acts on behalf of the entire AS. The speaker node in an AS creates a routing table and advertises it to speaker nodes in the neighboring AS. The idea is the same as for the DVR except that only speaker nodes in each AS can communicate with the speaker nodes in the neighbouring AS. However, what is advertised is different. A speaker node advertises its full AS path for reaching every destination AS. Just as in the DVR, an AS in the PVR shares its table with only its immediate neighbours. The instability of the DVR and the possibility of the creation of loops are avoided in the PVR because it advertises the full path to a destination, instead of only the distance (number of AS hops). When a router receives a route update message, it checks to see if its own AS is in the path list to the destination. If it is, the message is ignored and thus looping is avoided. Border Gateway Protocol (BGP) [13], [17], which is the de-facto standard for inter domain routing protocol in the Internet is based on the PVR and avoids looping and CTI problem. However, advertisement of the full path in the BGP entails large overhead (BGP is a complex routing protocol having many other attributes besides path vector which also requires large overhead) [14],[20],[21]. On the other hand, although BGP is
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 12 based on the DVR, the actual implementation of BP has moved much away from the DVR. The simplicity and elegance of DVR, which it is famous for, is ignored and overlooked in BGP and the other PVR-based routing protocols. 4.5 Distributed Routing Approach Distributed Routing adapts a compromise between the two extreme approaches adapted by the centralized routing (a fully global but centralized approach) and isolated routing (a purely local approach) by sharing the knowledge about the network gained by other routers. This makes Distributed Routing perform much better than the other two dynamic routing algorithms and, as a result, most of today’s routing algorithms are distributed in nature. Among the distributed routing algorithms, two are most widely used, namely the Distance Vector Routing Algorithm (DVRA) which is based on the well-known Bellman-Ford shortest path algorithm and the Link State Routing Algorithm (LSRA) which is based on the well-known Dijkstra’s shortest path algorithm. In the DVRA, each router periodically exchanges, with its neighbouring routers, its Distance Vector Table (DVT) containing entries specifying the identity of each known router (destination) along with the current estimated distance of the shortest path to reach the router. Utilizing the DVTs received from all its neighbours and measuring its own distance to each neighbour, a route computes the shortest path distance to each destination, builds its own Distance Vector Routing Table (DVRT) and sends the DVT (unlike the DVRT, the DVT does not contain the next-hop information in the entries).The manuscript should be prepared in accordance with the reviewer’s comments after having the final acceptance. BGP has been derived from the DVR protocol. However, BGP differs from the DVR protocol in at least two important ways. First, instead of just advertising its distance in total number of hops to a certain destination, the AS advertises its complete AS-path upto the destination. For this reason BGP is also called a path vector protocol. Second, the path or route selection in the BGP is based on not only the shortest path criterion but also the “import” and “export” policies that may be independently chosen by each router [13] [14]. 5. CONCLUSIONS The problems of routing in MANETs and other such ad hoc networks like wireless sensor networks (WSN), Vehicle Ad hoc Networks (VANET), etc are primarily because of the mobility of the nodes, random topology changes, limited battery power, limited bandwidth, asymmetric links, frequent link breakage due to random addition and deletion of nodes, to name a few, for which, many routing protocols already proposed and/or in research, have not found to be stable and thus providing enough scope of improvement through research and investigations. In this paper, focused on several applications, challenges and solutions, in the perspective of routing in MANET and many routing schemes based on DVR in the said field have been investigated and compared with each other keeping technical relevancy, as far as practicable. The review shows that a majority class of existing routing protocols is fundamentally DVR based as because of the conceptual and implementation simplicity and elegancy of the DVR. In this paper, a DVR-based routing algorithm for MANETs has been investigated and suggested keeping stress on the existing solution to the CTI problem of DVRA. The key focus is made on application and challenges with proper identification of solution, so that each neighbour can provide more and more information of different nature to its adjacent router and thus each router could enrich its information database by collecting such information from all of its next-hop neighbours, which would help during routing traffic proactively or reactively as the situation demands. REFERENCES [1] Albeto Leon-Garcia and Indra Widjaja, Communication Networks, Tata McGraw Hill, 2000 [2] N. H. Saeed, M.F. Abbod, and H S. AI Raweshidy, “MANET Routing Protocols Taxanomy”, IEEE International Conference on Future Communication Networks, PP-123-128, 2012 [3] M. Abolhasan et al. “ A review of routing protocols for mobile ad hoc networks” Elsevier Ad Hoc networks 2 (2004) 1-22 [4] M. Gerla, C.C Chiang, and l. Zhang, “Tree Maulticast Strategies in Mobile, Multihop Wireless Networks,” ACM/Baltzer Mobile Networks and Apps. J,. 1988 [5] S. Singh, M. Woo, and C. S. Raghavendra, “Power- Aware Routing in Mobile Ad Hoc Networks,” Proc. ACM/IEEE MOBICOM ’98, Oct. 1998. [6] Y. B. Ko and N. H. Vaidya, “Location-Aided Routing (LAR) in Mobile Ad Hoc Networks,” Proc. ACM/IEEE MOBICOM ’98, Oct. 1998. [7] S. Das, C. Perkins, E. Royer, Ad hoc on demand distancevector (AODV) routing, Internet Draft, draft- ietf-manetaodv-11.txt, work in progress, 2002. [8] S. Murthy J.J. Garcia-Luna-Aceves, A routing protocol for packet radio networks, in: Proceedings of the First AnnualACM International Conference on Mobile Computing andNetworking, Berkeley, CA, 1995, pp. 86– 95. [9] C. C. Chiang, T. C. Tsai, W. Liu, and M. Gerla, “Routing in clustered multihop, mobile wireless networks with fading channel,” The Next Millennium, Proceedings of IEEE Singapore International Conference on Networks, SICON, pp. 197–221, 1997. [10] G. Pei, M. Gerla, X. Hong, and C. C. Chiang, “A wireless hierarchical routing protocol with group mobility,” IEEE Wireless Communications and Networking Conference, WCNC ’99, vol.3, pp. 1538– 1542, New Orleans, LA, 1999. [11] P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, L. Viennot, Optimized link state routing
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 13 protocolfor ad hoc networks, IEEE INMIC, Pakistan, 2001. [12] M. Gerla, Fisheye state routing protocol (FSR) for ad hoc networks, Internet Draft, draft-ietf-manet-aodv- 03.txt,work in progress, 2002. [13] T.-W. Chen, M. Gerla, Global state routing: a new routing scheme for ad-hoc wireless networks, in: Proceedings of theIEEE ICC, 1998. [14] T. Griffin and G. Wilfong, “ A safe Path Vector Protocol” Proc. IEEE INFOCOM, vol. 2, March 2000, pp-490-499. [15] C. Toh, A novel distributed routing protocol to support ad- hoc mobile computing, in: IEEE 15th Annual International Phoenix Conf., 1996, pp. 480–486. [16] S. Tenenbaum, Computer Networks, 3rd Ed., PHI, 2000. [17] Douglas E. Comer, David L. Stevens, Internetworking with TCP/IP Vol-II, 3rd Ed., Pearson Education (Singapore), LPE, 2005 [18] D. Bertsekas and R. Gallagar: “Data Networks”, 2nd Ed., Englewood cliffs, NJ, Prentice Hall, 1992 [19] J. F. Kurose and K. W. Ross, Computer Networking: A Top-Down Approach Featuring the Interent, Third Edition, Pearson Education, Inc, Singapore, 2005. [20] S. K. Ray, J. Kumar, S. K. Sen and J. Nath, “Modified Distance Vector Routing Scheme for a MANET”, Proc. Of the 13th National Conference on Communications (NCC) held at IIT, Kanpur during Jan 26-28, 2007, pp. 197-201. [21] G.V. Kumar et al. “Current Research Work on Routing Protocols for MANET: A Literature Survey” International Journal on Computer Science and Engineering, Vol. 02, No. 03, 2012, 706-713