Aug13

Page 1

INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013

UK: Managing Editor International Journal of Innovative Technology and Creative Engineering 1a park lane, Cranford London TW59WA UK E-Mail: editor@ijitce.co.uk Phone: +44-773-043-0249 USA: Editor International Journal of Innovative Technology and Creative Engineering Dr. Arumugam Department of Chemistry University of Georgia GA-30602, USA. Phone: 001-706-206-0812 Fax:001-706-542-2626 India: Editor International Journal of Innovative Technology and Creative Engineering Dr. Arthanariee. A. M Finance Tracking Center India 17/14 Ganapathy Nagar 2nd Street Ekkattuthangal Chennai -600032 Mobile: 91-7598208700

www.ijitce.co.uk

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013

IJITCE PUBLICATION

International Journal of Innovative Technology & Creative Engineering Vol.3 No.8 August 2013

www.ijitce.co.uk

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013

From Editor's Desk Dear Researcher, Greetings! Research article in this issue discusses about AODV routing protocol, probabilistic Reactive Routing Protocol. Let us review research around the world this month; Space station poised to launch open-source satellites. Want to do your own space experiment? Now, you will be able to run science projects on the world's first open-source satellites. And it won't break the bank. ArduSat-1 and ArduSat-X were launched to the International Space Station (ISS) on 3 August aboard a Japanese resupply vehicle (which is also carrying fresh food, supplies and a talking humanoid robot). Known as CubeSats, each mini satellite packs an array of devices – including cameras, spectrometers and a Geiger counter – into a cube just 10 centimetres to a side. The cargo ship carrying the CubeSats should arrive at the ISS on 9 August, and the satellites will then be deployed using a robotic-arm technique tested last year. The method can put several small satellites into orbit around Earth, eliminating the need for dedicated launch vehicles and making citizen-science missions like ArduSat more affordable. Plants could soon have robotic counterparts. Barbara Mazzolai from the Italian Institute of Technology in Genoa and colleagues are creating a system that mimics the behaviour of roots. The team plans to use bespoke soft sensors for underground exploration, tips that grow by unwinding material and a mechanism to reduce friction when penetrating the soil. The artificial system will be equipped to detect gravity, water, temperature, touch, pH, nitrate and phosphate. When Pierre Legagneux of the University of Quebec at Rimouski and Simon Ducatez of McGill University in Montreal, both in Canada, were working together in France in 2006, they began studying the birds they encountered on the drive home from the lab. Birds are aware of speed limits on roads. Birds cannot read road signs, but they know that some roads have higher speed limits than others. They will take off further away from an approaching car on a faster road than on a slower road – regardless of the speed of the car. They found that where there was a 50-kilometre-per-hour speed limit, birds on the road typically took off when the car was about 15 metres away, whereas on a 110-km-per-hour road, they took off when a car was nearer 75 metres away. They did this even when faced with a car travelling faster on the slow road or slower on the fast road. It has been an absolute pleasure to present you articles that you wish to read. We look forward to many more new technologies related research articles from you and your friends. We are anxiously awaiting the rich and thorough research papers that have been prepared by our authors for the next issue.

Thanks, Editorial Team IJITCE

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013

Editorial Members Dr. Chee Kyun Ng Ph.D Department of Computer and Communication Systems, Faculty of Engineering, Universiti Putra Malaysia,UPM Serdang, 43400 Selangor,Malaysia. Dr. Simon SEE Ph.D Chief Technologist and Technical Director at Oracle Corporation, Associate Professor (Adjunct) at Nanyang Technological University Professor (Adjunct) at Shangai Jiaotong University, 27 West Coast Rise #08-12,Singapore 127470 Dr. sc.agr. Horst Juergen SCHWARTZ Ph.D, Humboldt-University of Berlin, Faculty of Agriculture and Horticulture, Asternplatz 2a, D-12203 Berlin, Germany Dr. Marco L. Bianchini Ph.D Italian National Research Council; IBAF-CNR, Via Salaria km 29.300, 00015 Monterotondo Scalo (RM), Italy Dr. Nijad Kabbara Ph.D Marine Research Centre / Remote Sensing Centre/ National Council for Scientific Research, P. O. Box: 189 Jounieh, Lebanon Dr. Aaron Solomon Ph.D Department of Computer Science, National Chi Nan University, No. 303, University Road, Puli Town, Nantou County 54561, Taiwan Dr. Arthanariee. A. M M.Sc.,M.Phil.,M.S.,Ph.D Director - Bharathidasan School of Computer Applications, Ellispettai, Erode, Tamil Nadu,India Dr. Takaharu KAMEOKA, Ph.D Professor, Laboratory of Food, Environmental & Cultural Informatics Division of Sustainable Resource Sciences, Graduate School of Bioresources, Mie University, 1577 Kurimamachiya-cho, Tsu, Mie, 514-8507, Japan Mr. M. Sivakumar M.C.A.,ITIL.,PRINCE2.,ISTQB.,OCP.,ICP Project Manager - Software, Applied Materials, 1a park lane, cranford, UK Dr. Bulent Acma Ph.D Anadolu University, Department of Economics, Unit of Southeastern Anatolia Project(GAP), 26470 Eskisehir, TURKEY Dr. Selvanathan Arumugam Ph.D Research Scientist, Department of Chemistry, University of Georgia, GA-30602, USA.

Review Board Members Dr. Paul Koltun Senior Research ScientistLCA and Industrial Ecology Group,Metallic & Ceramic Materials,CSIRO Process Science & Engineering Private Bag 33, Clayton South MDC 3169,Gate 5 Normanby Rd., Clayton Vic. 3168, Australia Dr. Zhiming Yang MD., Ph. D. Department of Radiation Oncology and Molecular Radiation Science,1550 Orleans Street Rm 441, Baltimore MD, 21231,USA Dr. Jifeng Wang Department of Mechanical Science and Engineering, University of Illinois at Urbana-Champaign Urbana, Illinois, 61801, USA Dr. Giuseppe Baldacchini ENEA - Frascati Research Center, Via Enrico Fermi 45 - P.O. Box 65,00044 Frascati, Roma, ITALY. Dr. Mutamed Turki Nayef Khatib Assistant Professor of Telecommunication Engineering,Head of Telecommunication Engineering Department,Palestine Technical University (Kadoorie), Tul Karm, PALESTINE. Dr.P.Uma Maheswari Prof & Head,Depaartment of CSE/IT, INFO Institute of Engineering,Coimbatore.

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013 Dr. T. Christopher, Ph.D., Assistant Professor & Head,Department of Computer Science,Government Arts College(Autonomous),Udumalpet, India. Dr. T. DEVI Ph.D. Engg. (Warwick, UK), Head,Department of Computer Applications,Bharathiar University,Coimbatore-641 046, India. Dr. Renato J. orsato Professor at FGV-EAESP,Getulio Vargas Foundation,São Paulo Business School,Rua Itapeva, 474 (8° andar),01332-000, São Paulo (SP), Brazil Visiting Scholar at INSEAD,INSEAD Social Innovation Centre,Boulevard de Constance,77305 Fontainebleau - France Y. Benal Yurtlu Assist. Prof. Ondokuz Mayis University Dr.Sumeer Gul Assistant Professor,Department of Library and Information Science,University of Kashmir,India Dr. Chutima Boonthum-Denecke, Ph.D Department of Computer Science,Science & Technology Bldg., Rm 120,Hampton University,Hampton, VA 23688 Dr. Renato J. Orsato Professor at FGV-EAESP,Getulio Vargas Foundation,São Paulo Business SchoolRua Itapeva, 474 (8° andar),01332-000, São Paulo (SP), Brazil Dr. Lucy M. Brown, Ph.D. Texas State University,601 University Drive,School of Journalism and Mass Communication,OM330B,San Marcos, TX 78666 Javad Robati Crop Production Departement,University of Maragheh,Golshahr,Maragheh,Iran Vinesh Sukumar (PhD, MBA) Product Engineering Segment Manager, Imaging Products, Aptina Imaging Inc. Dr. Binod Kumar PhD(CS), M.Phil.(CS), MIAENG,MIEEE HOD & Associate Professor, IT Dept, Medi-Caps Inst. of Science & Tech.(MIST),Indore, India Dr. S. B. Warkad Associate Professor, Department of Electrical Engineering, Priyadarshini College of Engineering, Nagpur, India Dr. doc. Ing. Rostislav Choteborský, Ph.D. Katedra materiálu a strojírenské technologie Technická fakulta,Ceská zemedelská univerzita v Praze,Kamýcká 129, Praha 6, 165 21 Dr. Paul Koltun Senior Research ScientistLCA and Industrial Ecology Group,Metallic & Ceramic Materials,CSIRO Process Science & Engineering Private Bag 33, Clayton South MDC 3169,Gate 5 Normanby Rd., Clayton Vic. 3168 DR.Chutima Boonthum-Denecke, Ph.D Department of Computer Science,Science & Technology Bldg.,Hampton University,Hampton, VA 23688 Mr. Abhishek Taneja B.sc(Electronics),M.B.E,M.C.A.,M.Phil., Assistant Professor in the Department of Computer Science & Applications, at Dronacharya Institute of Management and Technology, Kurukshetra. (India). Dr. Ing. Rostislav Chotěborský,ph.d, Katedra materiálu a strojírenské technologie, Technická fakulta,Česká zemědělská univerzita v Praze,Kamýcká 129, Praha 6, 165 21

Dr. Amala VijayaSelvi Rajan, B.sc,Ph.d, Faculty – Information Technology Dubai Women’s College – Higher Colleges of Technology,P.O. Box – 16062, Dubai, UAE

Naik Nitin Ashokrao B.sc,M.Sc Lecturer in Yeshwant Mahavidyalaya Nanded University

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013 Dr.A.Kathirvell, B.E, M.E, Ph.D,MISTE, MIACSIT, MENGG Professor - Department of Computer Science and Engineering,Tagore Engineering College, Chennai Dr. H. S. Fadewar B.sc,M.sc,M.Phil.,ph.d,PGDBM,B.Ed. Associate Professor - Sinhgad Institute of Management & Computer Application, Mumbai-Banglore Westernly Express Way Narhe, Pune - 41 Dr. David Batten Leader, Algal Pre-Feasibility Study,Transport Technologies and Sustainable Fuels,CSIRO Energy Transformed Flagship Private Bag 1,Aspendale, Vic. 3195,AUSTRALIA Dr R C Panda (MTech & PhD(IITM);Ex-Faculty (Curtin Univ Tech, Perth, Australia))Scientist CLRI (CSIR), Adyar, Chennai - 600 020,India Miss Jing He PH.D. Candidate of Georgia State University,1450 Willow Lake Dr. NE,Atlanta, GA, 30329 Jeremiah Neubert Assistant Professor,Mechanical Engineering,University of North Dakota Hui Shen Mechanical Engineering Dept,Ohio Northern Univ. Dr. Xiangfa Wu, Ph.D. Assistant Professor / Mechanical Engineering,NORTH DAKOTA STATE UNIVERSITY Seraphin Chally Abou Professor,Mechanical & Industrial Engineering Depart,MEHS Program, 235 Voss-Kovach Hall,1305 Ordean Court,Duluth, Minnesota 55812-3042 Dr. Qiang Cheng, Ph.D. Assistant Professor,Computer Science Department Southern Illinois University CarbondaleFaner Hall, Room 2140-Mail Code 45111000 Faner Drive, Carbondale, IL 62901 Dr. Carlos Barrios, PhD Assistant Professor of Architecture,School of Architecture and Planning,The Catholic University of America Y. Benal Yurtlu Assist. Prof. Ondokuz Mayis University Dr. Lucy M. Brown, Ph.D. Texas State University,601 University Drive,School of Journalism and Mass Communication,OM330B,San Marcos, TX 78666 Dr. Paul Koltun Senior Research ScientistLCA and Industrial Ecology Group,Metallic & Ceramic Materials CSIRO Process Science & Engineering Dr.Sumeer Gul Assistant Professor,Department of Library and Information Science,University of Kashmir,India Dr. Chutima Boonthum-Denecke, Ph.D Department of Computer Science,Science & Technology Bldg., Rm 120,Hampton University,Hampton, VA 23688 Dr. Renato J. Orsato Professor at FGV-EAESP,Getulio Vargas Foundation,S찾o Paulo Business School,Rua Itapeva, 474 (8째 andar)01332-000, S찾o Paulo (SP), Brazil Dr. Wael M. G. Ibrahim Department Head-Electronics Engineering Technology Dept.School of Engineering Technology ECPI College of Technology 5501 Greenwich Road - Suite 100,Virginia Beach, VA 23462

Dr. Messaoud Jake Bahoura Associate Professor-Engineering Department and Center for Materials Research Norfolk State University,700 Park avenue,Norfolk, VA 23504

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013 Dr. V. P. Eswaramurthy M.C.A., M.Phil., Ph.D., Assistant Professor of Computer Science, Government Arts College(Autonomous), Salem-636 007, India. Dr. P. Kamakkannan,M.C.A., Ph.D ., Assistant Professor of Computer Science, Government Arts College(Autonomous), Salem-636 007, India. Dr. V. Karthikeyani Ph.D., Assistant Professor of Computer Science, Government Arts College(Autonomous), Salem-636 008, India. Dr. K. Thangadurai Ph.D., Assistant Professor, Department of Computer Science, Government Arts College ( Autonomous ), Karur - 639 005,India. Dr. N. Maheswari Ph.D., Assistant Professor, Department of MCA, Faculty of Engineering and Technology, SRM University, Kattangulathur, Kanchipiram Dt - 603 203, India. Mr. Md. Musfique Anwar B.Sc(Engg.) Lecturer, Computer Science & Engineering Department, Jahangirnagar University, Savar, Dhaka, Bangladesh. Mrs. Smitha Ramachandran M.Sc(CS)., SAP Analyst, Akzonobel, Slough, United Kingdom. Dr. V. Vallimayil Ph.D., Director, Department of MCA, Vivekanandha Business School For Women, Elayampalayam, Tiruchengode - 637 205, India. Mr. M. Moorthi M.C.A., M.Phil., Assistant Professor, Department of computer Applications, Kongu Arts and Science College, India Prema Selvaraj Bsc,M.C.A,M.Phil Assistant Professor,Department of Computer Science,KSR College of Arts and Science, Tiruchengode Mr. G. Rajendran M.C.A., M.Phil., N.E.T., PGDBM., PGDBF., Assistant Professor, Department of Computer Science, Government Arts College, Salem, India. Dr. Pradeep H Pendse B.E.,M.M.S.,Ph.d Dean - IT,Welingkar Institute of Management Development and Research, Mumbai, India Muhammad Javed Centre for Next Generation Localisation, School of Computing, Dublin City University, Dublin 9, Ireland Dr. G. GOBI Assistant Professor-Department of Physics,Government Arts College,Salem - 636 007 Dr.S.Senthilkumar Post Doctoral Research Fellow, (Mathematics and Computer Science & Applications),Universiti Sains Malaysia,School of Mathematical Sciences, Pulau Pinang-11800,[PENANG],MALAYSIA. Manoj Sharma Associate Professor Deptt. of ECE, Prannath Parnami Institute of Management & Technology, Hissar, Haryana, India RAMKUMAR JAGANATHAN Asst-Professor,Dept of Computer Science, V.L.B Janakiammal college of Arts & Science, Coimbatore,Tamilnadu, India Dr. S. B. Warkad Assoc. Professor, Priyadarshini College of Engineering, Nagpur, Maharashtra State, India Dr. Saurabh Pal Associate Professor, UNS Institute of Engg. & Tech., VBS Purvanchal University, Jaunpur, India Manimala Assistant Professor, Department of Applied Electronics and Instrumentation, St Joseph’s College of Engineering & Technology, Choondacherry Post, Kottayam Dt. Kerala -686579

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013 Dr. Qazi S. M. Zia-ul-Haque Control Engineer Synchrotron-light for Experimental Sciences and Applications in the Middle East (SESAME),P. O. Box 7, Allan 19252, Jordan Dr. A. Subramani, M.C.A.,M.Phil.,Ph.D. Professor,Department of Computer Applications, K.S.R. College of Engineering, Tiruchengode - 637215 Dr. Seraphin Chally Abou Professor, Mechanical & Industrial Engineering Depart. MEHS Program, 235 Voss-Kovach Hall, 1305 Ordean Court Duluth, Minnesota 558123042 Dr. K. Kousalya Professor, Department of CSE,Kongu Engineering College,Perundurai-638 052 Dr. (Mrs.) R. Uma Rani Asso.Prof., Department of Computer Science, Sri Sarada College For Women, Salem-16, Tamil Nadu, India. MOHAMMAD YAZDANI-ASRAMI Electrical and Computer Engineering Department, Babol "Noshirvani" University of Technology, Iran. Dr. Kulasekharan, N, Ph.D Technical Lead - CFD,GE Appliances and Lighting, GE India,John F Welch Technology Center, Plot # 122, EPIP, Phase 2,Whitefield Road,Bangalore – 560066, India. Dr. Manjeet Bansal Dean (Post Graduate),Department of Civil Engineering ,Punjab Technical University,Giani Zail Singh Campus, Bathinda -151001 (Punjab),INDIA Dr. Oliver Jukić Vice Dean for education, Virovitica College, Matije Gupca 78,33000 Virovitica, Croatia Dr. Lori A. Wolff, Ph.D., J.D. Professor of Leadership and Counselor Education, The University of Mississippi, Department of Leadership and Counselor Education, 139 Guyton University, MS 38677

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013

Contents Performance study of AODV routing protocol using ETX as a metric by Chaitra Gaonkar, Vishalaxi Tandel, Vikash Kumar...........................................................................[109] An assessment of probabilistic Reactive Routing Protocol For MANET’s by Aditya Pare, Prof. Gaurav shrivastav…............................................................................................................[116]

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013

Performance study of AODV routing protocol using ETX as a metric Chaitra Gaonkar 1, Vishalaxi Tandel 2, Vikash Kumar 3 Department Of Computer Science and Engineering, B.V.Bhoomaraddi College of Engineering and Technology Hubli, Karnataka-India 1

chaitragaonkarl1266@gmail.com 2 vishalaxit@gmail.com 3 vikashkumar1143k3@gmail.com

Abstract - Due to unstable link states and interference between neighbour nodes, routing in wireless mesh network (WMN) is much more complicated and unpredictable than wired network. As the simplest and most primitive routing metric, hop count does not always work well in WMN where routing with least hop count does not bring the best performance. Recent research shows that radio metrics, such as ETX reflect more accurately the link conditions in a mesh network in terms of delay, loss, bandwidth, and so on. The ETX metric routing method is used with a cross-layer design taking the asymmetry of a wireless link into account, in which monitoring and measurement functions provide metrics in both forward and reverse directions and captures the link state between the node and each of its neighbours. This method is applied to Ad-hoc On-demand Distance Vector (AODV) routing protocol during the route discovering operation. AODV-ETX finds the best path based on value of the ETX by sending the probe packets to find the delivery ratios in the forward and reverse directions, from source to destination and from destination to source respectively. We evaluate performance of the AODV-ETX protocol using NS-2 simulator. The results show that the AODVETX outperforms the original AODV, where the results show a significant reduction of delay compared to the original AODV and also the packet delivery ratio is comparable to the packet delivery ratio in the original AODV. Keywords: AODV, ETX, internetwork, MAC, Mesh topology, Network traffic, NS-2.34, Radio nodes, X-graphs

I. INTRODUCTION Wireless Networks have been an emerging technology in recent years due to their attributes such as flexibility, high robustness and bandwidth efficiency. There are many kinds of wireless topologies and wireless mesh networks (WMN) is one among them. Recently, wireless mesh networks have attracted much attention. Wireless mesh networks is a communications network made up of radio nodes organized in a mesh topology. A mesh network is reliable and offers redundancy. Wireless mesh networks can self form and self heal. Such networks, also known as ‘‘community wireless networks’’, can be used for various applications such as shared broadband access, neighbourhood gaming, video surveillance, and media repository. In wireless mesh networks data will hop from one device to another until it reaches its destination. Dynamic routing algorithms implemented in each device allow this to happen. To implement such dynamic routing protocols, each device needs to communicate routing information to other devices in the network. Each device then determines what to do with the data it receives — either pass it on to the next device or keep it, depending on the protocol. The routing algorithm used should attempt to always ensure that the data takes the most appropriate (fastest) route to its destination. Routing refers to the process of selecting paths in a network along which to send network traffic. Routing involves two basic activities: determining optimal routing paths and forwarding packets through an internetwork. The routing process usually directs forwarding on the basis of routing tables which maintain a record of the routes to various network destinations. Constructing routing tables, which are held in the router's memory, is very important for efficient routing. The problem of routing flow in a network of computers is extremely complex.

109

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013 Routing protocols periodically probe the links to networks we choose NS-2 as the network simulator to determine appropriate routes across the network. Routing evaluate the performance of ETX metric with AODV protocols try to find the shortest, least cost, highest routing protocol. throughput, minimum delay and minimum overhead paths between a source and the destination. The common Rest of the paper is organized as follows: Section 2 purpose of routing protocols is to compute the best route describes the related work about AODV and ETX. Section for data delivery. Routing protocols use metrics to 3 firstly explains why minimum hop-count often finds evaluate what path will be the best for a packet to travel. A routes with significantly less throughput than the best metric is a standard of measurement, such as path available and then it presents the design, implementation, bandwidth, that is used by routing algorithms to determine and evaluation of the ETX metric. Finally, it describes a the optimal path to a destination. To use or design an set of detailed design changes to the AODV protocols (to appropriate routing metric for a routing protocol, it is which ETX is an extension), that enable them to more important to understand the characteristics of Wireless accurately choose routes with the best metric. Section 4 networks and identify what challenges will be faced. shows the results displayed after evaluating ETX metric by Therefore, to guarantee link quality, a good routing metric making use of X-graphs and execution of AWK scripts, must take into account the metric characteristics to and Section 5 concludes the paper. improve the performance of the routing protocol. A good routing metric should address the issues related to the key II. RELATED W ORK characteristics, such as, throughput, delay and overhead. In this section, we give an overview of various The routers in mesh networks are static, and thus research works that has already been carried out in AODV dynamic topology changes are much less of a concern in and ETX. These works have helped us in implementing such networks. As a consequence, the main design goal ETX metric in AODV. for routing protocols is shifted from maintaining In order to successfully implement ETX in AODV connectivity between source and destination nodes to we need to first understand the working and behaviour of finding high-throughput paths between the nodes. AODV [6] protocol. The Ad hoc On-Demand Distance Towards this goal, more sophisticated routing metrics than Vector (AODV) algorithm enables dynamic, self-starting, the hop-count metric need to be used to find paths that multi-hop routing between participating mobile nodes achieve high throughput, as protocols based on the hop- wishing to establish and maintain an ad hoc network and count metric often choose long links which tend to be to enable operation in AODV, Various message formats lossy and give low throughput. defined such are Route Requests (RREQs), Route Replies (RREPs), and Route Errors (RERRs). There are various kinds of routing metrics like hop count, ETX, ETT and so on. The concept of hop-count is Now to implement ETX in AODV, an extra packet quite simple where every link is counted as one unit and is type is required to sense the link quality between the independent of the quality of the link and hence it is the source and destination. Thus, the widespread ETX metric most widely used metric in routing protocols. The [3] is calculated by sending probe packets to neighbours existence of error-free links is the implicit assumption and calculating the loss ratio of the probe packets. The made when hop count metric is chosen and hence while ETX is used as an indicator for the congestion level and selecting the path for routing a packet it chooses the path the collision probability. with the smallest number of hops and ignores the quality of a link which ignores the possibility that a longer path To implement ETX in any of the protocol researchers might actually offer higher throughput. [5] tried to understand the meaning and complete definition of ETX. And then they came up with an ETX ETX makes use of delivery ratios which are measured formula that can easily be applied and implemented for using dedicated link probe packets. Each node broadcasts any of the protocol. Researchers defined ETX as link probes of a fixed size, at a fixed time period. Every Expected transmission count (ETX) is a metric that finds node remembers the probes it receives during last interval high throughput paths on multi-hop wireless networks which allows it to calculate the delivery ratio. In this paper incorporating the effects of link loss ratios and interference we describe about implementation of ETX (Expected among the Successive links of a path. transmission count) metric in AODV (Ad hoc On-Demand Distance Vector) routing protocol. Since Ns-2 is a widely Research has further been carried out [9] to show used tool to simulate the behaviour of wired and wireless that ETX metric performs better than hop count metric.

110

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013 Minimum hop-count metric regardless of large differences reflect the changes mentioned in the following section we in throughput, chooses different paths of same minimum need to understand the dependencies that exist between length. This metric also account to issues like interference different files in AODV and then configure NS-2 to analyse between successive hops among multi-hop paths. ETX the results. metric provides better improvement for paths with two or more hops, suggesting that transmission count offers A. Changes to be made to AODV to calculate ETX No more than 3 levels of headings should be used. All increased benefit as networks grows larger and paths become longer. Research has been done on various steps headings must be in 10pt font. Every word in a heading [7] to implement new protocol in ns2.A detailed description must be capitalized except for short minor words as listed on various procedures and files to be included in ns2 was in Section III-B. proposed by the researchers. 1) Aodv_rtable.cc: AODV is a routing protocol, and it deals with route table management. Route table information must be kept even for short-lived routes, such III. PROPOSED W ORK as are created to temporarily store reverse paths towards In this section we describe the plug-in of ETX as a nodes originating RREQs. The different fields used by routing metric in AODV routing protocol for wireless mesh AODV with each route table entry are Destination IP networks. ETX metric uses both MAC layer and network Address, Destination Sequence Number, Valid layer features like number of transmissions from MAC and Destination Sequence Number flag, Other state and based on ETX routing will happen at the network layer. routing flags (e.g., valid, invalid, repairable, being The ETX in AODV proves to be an appealing cost metric repaired), Network Interface, Hop Count (number of hops because minimizing the total no of transmissions and needed to reach destination) Next Hop, List of retransmissions maximizes the throughput of an individual Precursors, Lifetime (expiration or deletion time of the link and then overall network. We shall discuss the route) In order to include the value of ETX while routing modifications to be done for some of the files in NS-2 to another field named ETX should be added to the above include ETX metric in AODV. We also present the mentioned fields. changes to be made to AODV protocol to calculate the 2) Aodv.cc: In the TCL script, when the user value of ETX which is used while routing the packets. configures AODV as a routing protocol by using the The AODV algorithm enables dynamic, self-starting, command “ $ns node-config -adhocRouting AODV” the multi-hop routing between participating mobile nodes pointer moves to the “start” and this “start” moves the wishing to establish and maintain an ad hoc network. pointer to the Command function of AODV protocol. In the AODV allows mobile nodes to respond to link breakages Command function, the user can find three extra timers in and changes in network topology in a timely manner. And the “start”. The first timer is used for sending ETX probe on the other hand, the ETX measures MAC transmissions packets, the second timer handles the probe window timer and retransmissions to recover from frame losses.ETX of and the third timer is used to manage the ETX probe the wireless link is the estimated average number of packets. transmissions of data frames and ACK frames necessary When the timer for sending ETX probes is set an for the successful transmission of the packet. appropriate interval of Probe Packets is defined to Alternatively, ETX of the link can also be defined as schedule the packets. The node receiving the packet will inverse of the probability of successful packet delivery or check for different packets types and calls the respective link reliability. Using ETX in AODV is advantageous receive mechanisms function. because once the ETX value is known data packets can On receiving an ETX probe packet the forward be transmitted and the calculated ETX will be used by the packets to choose best path to travel from its source to delivery ratio of a link is calculated using the formula destination. Hence ETX does produce higher throughput probes count than other routing metrics. Implementing ETX in AODV Forward delivery ratio  has shown better results with respect to some of the PROBE _ WINDOW performance parameters than AODV alone. When the timer for handling the probe window timer is set an interval for Probe Window is defined to handle To begin with the implementation the files already present in NS-2 are to be changed according to the files the window of the probe packets. The reverse delivery presented in [1]. The detailed description of the ratio is calculated for the number of probe packets modifications shall be discussed in the next section. To

111

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013 received by a node from each neighbours during the last A node generates a RREP if either, it is itself the interval and then the timer is rescheduled. destination, or it has an active route to the destination where the destination sequence number in the node's On receiving an ETX probe packet the reverse delivery existing route table entry for the destination is valid and ratio of a link is calculated using the formula greater than or equal to the Destination Sequence probes neighbors[neighbor] Number of the RREQ and also the ETX value in the Reverse delivery ratio  node's existing route table entry is better the ETX vale of PROBE _ WINDOW the RREQ packet. Once created, the RREP is sent towards the originator of the RREQ, as indicated by the Finally the timer for managing ETX probes is set to route table entry for that originator. As the RREP is some interval which removes all the old probe packets i.e. forwarded back towards the node which originated the RREQ message, the Hop Count field is incremented by the packets that have expired. one at each hop and the ETX of the route is maintained. Routing table Management: The routes chosen for Thus, when the RREP reaches the originator, the Hop routing the packets should consider the ETX value while Count represents the distance, in hops, and ETX updating the routing table in order to keep the latest represents the link conditions of the route from the information regarding the link quality. Whenever the route destination to the originator. is down the ETX value is set to INFINITY (which is a very The expected transmission count (ETX) metric which high value) which indicates the absence of a link. is based on the expected number of transmissions Packet Reception Management: When a node receives required to send a unicast packet over a link, including a packet of type REQUEST, it firstly creates an entry for retransmissions. To calculate ETX, each node measures reverse route and calculates the value of ETX. Once the the probability that a packet successfully reaches the ETX value is known if we have a fresher sequence receiver, denoted as df, and the probability that an ACK is number or if we have a better link for the same sequence successfully received by the sender, denoted as d r. The number then the routing table entry is updated with the ETX value of the link is given by new link quality as indicated by the ETX value. After taking 1 care of the reverse route the receiving node now checks if ETX  it can send a route reply, if the receiving node itself is the d f  dr destination it sends a reply with zero ETX value else if it is not the destination, but it has a fresh enough route then it sends a reply with the appropriate ETX value otherwise it The AODV routing algorithm then selects the path simply forwards the route request. with the least sum of ETX values of its constituent links. To measure df and dr, each node broadcasts a probe When a node receives a packet of type REPLY, it adds packet every second. Each such probe contains the a forward route table entry if a newer route is found to be number of probes the node received from each of its better by comparing the ETX values of the newer and the neighbours in the last probe interval. Since the 802.11 older routes and updates the routing table entry. If the MAC layer protocol does not retransmit broadcast REPLY packet is destined for the receiving node then packets, nodes use this information to estimate the discard the packet else forward the route reply using the forward and reverse delivery probabilities. ETX value if the route is UP. 3) Aodv_packet.h: Here all kinds of packets used in Packet Transmission Management: A node AODV is defined. Since ETX is calculated by looking for disseminates a RREQ when it determines that it needs a the number of transmissions and retransmissions of the route to a destination and does not have one available. probe packets, we need to include an extra packet type. This can happen if the destination is previously unknown This packet type is probe packet. A new packet format to the node or if a previously valid route to the destination named PROTOCOLETXTYPE_PROBE is defined by expires or is marked as invalid. It fills out the RREQ using a header macro for probe types. Another field packet and sets the ETX field to zero and sends the named etx is defined and included while calculating the REQUEST messages. The first time a source node size of the structure defining the header of the request and broadcasts a RREQ, it waits for a fixed interval of time for reply type. Thus, a new structure to hold the probe packet the reception of a RREP. If a RREP is not received within information is defined as follows: that time, the source node sends a new RREQ. struct hdr_protocoletx_probe {

112

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013 Packet Type Source IP Address Broadcast ID Number of neighbours from which probes have been received Their addresses Number of the probes received Timestamp when it was sent

IV. RESULT ANALYSIS In this section, we present simulation results comparing the performance of AODV-ETX with AODV under different performance parameters. B. Simulation setup 1) Scenario: NS 2.34 simulator is used for the simulation study. The model parameters that have been used in the following experiments are summarized in Table I.

size= sizeof(hdr_protocoletx_probe);

TABLE I FONT SIZES FOR PAPERS

Return size }

Sl. No 1.

This probe packet type structure defined must be included while calculating the header space reservation which affects the packet header class defined for AODV routing protocol as shown below:

2.

static class AODVETXHeaderClass:

3.

public PacketHeaderClass {

4.

AODVETXHeaderClass (): 5.

PacketHeaderClass "PacketHeaderAODVETX", size of (hdr_all_aodvetx)) {

6. 7. 8.

bind_offset (&hdr_aodvetx:: offset_;

Parameter

Values

Simulator Routing protocol

NS-2.34 AODV, AODVETX wireless 45 seconds 150

Channel Simulation time Number of nodes Bandwidth Traffic Type Packet Size

1Mbps FTP 512 bytes

bind (); }

As we know packets are used to exchange information between objects in the simulation, and our aim is to add our new struct hdr_protoname_pkt to them. Doing so our control packets will be able to be sent and received by nodes in the simulation. And hence probe packets are an extension to the already available types of control packets in AODV. The structure defined earlier defining the probe packet is now added to struct hdr_protoname_pkt which is used to bind our packet header to Tcl interface. An extra probe packet is being used to determine the link quality and thus this packet type should be added to the function named format_aodv () defined within the file “ ns-allinone-2.34\ns-2.34\trace\cmu-trace\.cc”.

2) Evaluation: The following performance parameters are used to evaluate the protocol: Average End to End delay: This metric represents average end- to-end delay and indicates how long it took for a packet to travel from the source to the application layer of the destination. It includes all possible delay caused by buffering during route discovery latency, transmission delays at the MAC, queuing at interface queue, and propagation and transfer time. It is calculated using the formula:

AED 

  time received - time sent  Total data packets received

Packet delivery ratio: This parameter is defined as the ratio of total number of packets successfully received by the destination nodes to the number of packets sent by the source nodes throughout the simulation which is given as:

113

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013

PDR 

Number of received packets Number of sent packets

Normalized Routing Load: This parameter is defined as the ratio of total no of routing packets received to the total number of data packets received which is given as:

NRL 

  Re ceived routing packets    Re ceived data packets 

C. Results In this section we present the performance results in the form of numerically calculated values of Average end to end delay, packet delivery ratio, normalized routing overhead for both AODV and AODV-ETX. We also compare the performance of AODV-ETX versus AODV in the form of x-graph obtained after simulation which shall prove that performance of AODV-ETX is better than AODV alone. 1) Results Of Numerical Calculation The numerical results obtained after the execution of AODV and AODV-ETX are given in the Table II: TABLE FONT SIZES FOR PAPERS Sl. No 1. 2. 3.

Performance Parameter Average End-End Delay Packet Delivery Ratio Normalized Routing Load

III

AODV

AODV-ETX

654.553m s

557.266ms

43.4783

43.8483

51.766

55.390

Fig 1. Comparison on the basis of End-End delay Whenever a link is busy in case of AODV the sending node waits until the link gets free whereas in AODV-ETX another path is chosen to forward the packet instead of waiting for the link to get free. This extra time spent by the sender waiting for a free link increases the total delay. Thus, AODV has an average delay of 654.553 ms to AODV-ETX’s average delay of 557.266 ms which reveals that note that AODV-ETX has a better average delay than AODV. There is 17.46% improvement in average delay from AODV to AODV-ETX. Packet delivery ratio:

2) Results in the form of X-graphs Average End to End delay: We assume, in AODV only singular path exists between a source and destination node and hence during a link break the packet would not reach the destination due to unavailability of another path from source to destination. This packet increases the traffic which leads to the congestion in the network. In AODV-ETX when a link breaks the ETX value changes to INFINITY (some large value) which indicates the absence of the link. In such a case another path with the lowest ETX value is considered by the node to forward the packet. Thus an alternate path exists from source to destination during link failure.

Fig 2. Comparison on the basis of Packet Delivery Ratio

114

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013 The X-graph of packet delivery ratio versus the DSR, TORA and release a patch that can be easily simulation time indicates that for most of the time the plugged-in to any of the reactive routing protocols. packet delivery ratio of AODV-ETX is higher than that of ACKNOWLEDGMENT AODV and thus the average value of packet delivery ratio for the entire simulation time of AODV-ETX is higher than The scene of contentment and elation that accompanies AODV. Thus, AODV has a packet delivery ratio of 43.4783 the successful completion of our task would be incomplete to AODV-ETX’s packet delivery ratio of 43.8483. Thus without mentioning the names of the people who have there is 0.37 increase in packet delivery ratio from AODV helped in accomplishment of this work, whose constant to AODV-ETX. guidance, support and encouragement resulted in realization. Normalized routing overhead: We would like to express our sincere thanks to Principal, B. V. Bhoomaraddi College of Engineering and Technology, Dr. Ashok Shettar and Head of the Department, Computer science, Prof.K.R.Biradar, for providing all necessary support. We thankfully acknowledge the help we received from Prof. Jayalaxmi G.N. for guiding us in completing the work successfully in accordance with the University requirements’.

Fig 3. Ratio

Comparison on the basis of Packet Delivery

The normalized routing load is number of routing packets sent per number of data packet received. From Fig 3 it can be observed that AODV-ETX has more routing overhead compared to AODV. In AODV-ETX extra probe packets are used to determine the link quality apart from RREQ, RREP packets as used in AODV. And thus the routing overhead for AODV-ETX is 7% higher than AODV. V. CONCLUSION AND FUTURE SCOPE This paper evaluates the performance of AODV and AODV-ETX using NS-2. Comparison was based on the packet delivery ratio, end-to-end delay and normalized routing load. We concluded that in the network with the simulation time of 45 seconds, AODV-ETX gives better performance as compared to AODV in terms of packet delivery fraction and end-end delay whereas AODV gives better performance in terms of routing overhead. As future work, we intend to develop a module with ETX as a metric for routing in all the reactive protocols like

REFERENCES [1] https://code.google.com/p/wisnes/source/browse/trun k/aodv-etx-metric [2] Lijun Chen,Steven H. Low and John C. Doyle,”Cross-layer design in multihop wireless networks”,2010. [3] Douglas S.J De Couto,Daniel Aguayo, John Bicket and Robert Morris ,” A High-Throughput Path Metric for Multi-Hop Wireless Routing”2010. [4] A. K. Dwivedi, Sunita Kushwaha and O. P. Vyas, “Performance of Routing Protocols for Mobile Adhoc and Wireless Sensor Networks: A Comparative study”, volume 2, International Journal of Recent Trends in Engineering, November 2010. [5] Nadeem javaid, Akmal Javaid and Imran Ali Khan and Karim Djouani, "Performance study of ETX based wireless routing metrics". [6] C. Perkins and E. Belding-Royer and S. Das, "Ad hoc On-demand Distance Vector (AODV) Routing", IETF RFC 3561,july,2003. [7] Francisco J. Ros and Pedro M. Ruiz, "Implementing a new MANET unicast routing protocol in NS2",December,2004. [8] Douglas C. Schmidt, "Software Design principles and guidelines",2003. [9] Sumathy S, Dr.R Saravanan, ETX metric for extremely opportunistic routing to improve the performance of the hybrid wireless network",volume 2, International Journal of Ad hoc Sensor and Ubiquitous Computing,December 2011. [10] Sumathy S and Dr. R Saravanan, "ETX metric for extremely opportunistic routing to improve the performance of hybrid wireless networks",2011.

115

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013

An assessment of probabilistic Reactive Routing Protocol For MANET’s Aditya Pare#1 Prof. Gaurav shrivastav#*2 M.tech Research scholar #*2 Assistant Professor Dept of computer science RKDF IST,Bhopal RKDF IST,Bhopal Abstract— MANET is an temporary decentralized

infrastructure less network where each node can behave like receiver and transmitter and having a permission to move any were across the network without loss the connectivity with rest of network. Message sharing is an important task of MANET, MANET have verity of routing protocol to serve massage sharing .Performance of these routing protocol depend upon collision rate ,reach ability, rebroadcasting and average latency. Message sharing scheme in MANET is categorized namely into deterministic and probabilistic schemes. This paper give an bird eye over MANET and its routing algorithms mainly probabilistic scheme for routing and also include recent research towards better performance in term of lower collision rate, battery consumption, rebroadcasting rate and higher degree of reach ability ,average latency .

Keywords:

MANET, Bayesian Approach

I.

Probabilistic

Algorithm,

INTRODUCTION

With incredible expansion of uses of personal computers and mobile computers lead to need a wireless network for sharing the information among the different computers. Wireless networks come in picture in mid of 1970s and their interest has been growing gradually. But during the last two decade, because of internet (also known as global information sharing system) importance of Wireless network has been exploded [3]. But at that time information sharing between mobile node in limited resource and without uses of any centralized administration is difficult.But now this day a temporary infrastructure less wireless network having no central access point or any centralized administration is in existence and known as Mobile Ad-Hoc Network (MANET) [1]. Mobile ad-hoc networks encompass number of quality, use dynamic network topology, having limited bandwidth and consume less battery power. Mobile ad hoc network is significant for military operation to provide communication

between squads, emergency case in out-of-theway places, medical control etc. Whereas higher degree of node mobility lead to changes network topology because of that routing is a challenging task in ad-hoc network ever since it’s came into existence [2]. This paper gives a descriptive overview regarding ad-hoc network and their routing protocol especially reactive routing protocol along with probabilistic routing algorithm, Bayesian probabilistic routing algorithm and value of affinity index, mutual affinity index and other parameter for probabilistic routing algorithms. The presented paper concludes in total seven sections including this one. The second section gives an idea of mobile ad-hoc network, third section describe different routing protocol and their hierarchy. The fourth section illustrates probabilistic routing approach over MANET. Fifth section throws some light on previous work of MANET. Finally the paper concludes in six section th and reference in seven section. II. MOBILE AD-HOC NETWORK Mobile ad-hoc network is temporary infra structure less computer network where node of network can be move any were within the network without any centralized authority. MANET initially introduce and used by military in the field of war and at the time of natural digesters in sort duration of time with limited resource in order to establish communication channel. Each node in MANET works as independent router having both transmitter and receiver and communicate directly with other node that’s comes under its radio range (radio range is generally transmitting and receiving range of any node) as show in figure 1 number with dark circle is an independent node whereas dashes circle represent radio range of respective node [1,4]. MANET is also known as Cooperative ad-hoc networks Communication over the mobile ad-hoc network is performed by stations cooperation with each other, i.e., if any node want to communicate

116

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013 with other node that’s not comes under its radio range then it is the responsibility of intermediate node also know as relay node to maintain communication between source and destination. MANET is very advantageous to use provide services and sharing the information regardless of geographical position, time and resources. Because of above special feature mobile ad-hoc network windy used in Military operation , rescue operation by disaster management team ,police

exercises in remote aria ,Sensor networks, VNET, PAN for communication of several portable devices etc [5]. Along with above encouraging points there are some limitations in MANET. MANET has higher degree of security threads, lack of authorization facilities and Volatile network topology makes its very hard to identify misbehave nodes due to volatile network topology [4,5].

Radio Range of Node C

C

A

B

Radio Range of Node A

Radio Range of Node B Figure 1 Scenario of MANET

over the network but simultaneously increase data overhead by continuously updating routing information. DSDV, WRP, CGSR are the example of proactive protocols.

III. PROTOCOLS USED IN MANET Routing protocol used in MANET for establishment of communication over network between mobile nodes is namely divided into three types proactive, reactive and hybrid. Figure 2 shows the hierarchy of the protocols. i.

ii.

Proactive protocol: - Proactive MANET routing protocol (PMPs) is a table driven routing protocol, need to continuously update network topology information and guarantee that it is presented to all nodes. PMPs lead to reduce time delay of packet

117

Reactive MANET protocols:-Reactive MANET protocols is an on demand routing protocol, need to path hunting only when there is need of the path. Lower protocol data over head is advantage with Reactive protocol but having longer packet delays. There is number of reactive protocol like AODV, DSR and TORA.

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013 iii.

Hybrid MANET routing protocols:-The Hybrid MANET routing protocols is an advantageous amalgamation of both proactive and reactive MANET protocols with better resultant protocol overhead and packet delay than any of individual protocols[6]. It is also capable of regulating packet dynamically on the basis of different network conditions. ZRP protocol is an example of hybrid model.

This paper gives a main concentration over probabilistic approach of routing and present different flavor of probabilistic reactive routing

protocol as suggest in recent research in related work section of this paper. Some of basic reactive routing protocols are describe below. DSR:- DSR routing protocol is used to suggest Multiple routes and for Promiscuous overhearing but its suffer from scalability problem and large delay. AODV:-AODV is highly applicable for dynamic topology but it also suffer form scalability and larger delay problem along with that AODV having higher degree of protocol overhead.

Figure 2 Hierarchy of MANET Routing Protocol

118

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013 In recent research AODV is might to be updated and Each probability model is represented by the equation gives AODV-BR, AOMDV[18], AODV-ABR[19].Where [5,6,7]: AODV-BR having higher throughput than AODV but even efficient for frequently changing network. AOMDV n lead to minimized routing overhead and coordination Where P is the probability of successful transmission overhead by intermediate node but performance of via radio node (rn) from source node (s) that comes AOMDV going to degrade in moderate and sparse under the radio range of source node (s). The function f network. AODV-ABR is more appreciable in higher depends on the specific protocol being analyzed. dynamic network with lower control overhead but having Bayesian approach is one of most popular probabilistic lower probability to find alternate route. method that’s works on the basis of historical record of TORA:- TORA provides the reliable supports for successful transmission via any intermediate node. sensing link status towards neighbor node that’s comes Figure 3 shows the basic functionality of the Bayesian under its radio range. TORA supports higher degree of Approach. security authentication and lower degree of control overhead [17, 18]. It depends on synchronized clocks among nodes in the ad hoc network & dependence over intermediate lower layers for certain functionality R O presumes with higher overhead[17]. IV. PROBABILISTIC ALGORITHM

S A

In probabilistic routing algorithms for MANET calculation for route suggestion between any sources to destination end is depend upon probability of past lower rebroadcasting rate. Probabilistic approach tries to minimized rebroadcast. In a probabilistic scheme, nodes transmit a message with a pre determined probability p.

P X

Historical data

Bayesian Approach Figure 3 Bayesian Approach

Probability based

Probabilistic Routing Algorithm Distance based

Counterbased

Figure 3:- Classification of Probabilistic routing algorithms Recent research shows that rebroadcasting rate in probabilistic approach is significantly lower as compared to blind flooding in deterministic routing approach. Probabilistic schemes that’s had been proposed in past comes under three categories namely probability-based, counter-based and distance-based.

Bayesian probabilistic approach depend upon singular affinity index (SAI) ie any node want to transmits any packet towards destination then source node (A) apply Bayesian probability over all of its radio node and find most probabilistic node on the basis of historical data and send packet via that selected node. As show in figure 3 solid arrow line show selected node for transmission. But degree of accuracy in case of singular affinity index is not up to mark; mostly during the initiation of network probability of rebroadcast is very high. Where some enhancement version of Bayesian approach used mutual affinity index to calculate probability of any successive node for packet forwarding which is depend upon belief function, procedure of calculation belief function is show in equation 1 [9,10].

119

…1

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013 time and space information to compute the route from ∑ ⌉ ⌈ source to destination. The results show that there is Now since we are multiplying the probabilities of each major improvement in delivery ratio, control packets and every attribute hence; even if one of the attributes overhead w.r.t. mobility and control packet overhead w.r.t. network size . has a zero probability; the whole index will become zero. Because of this; zero probability will be replaced with a VI. CONCLUSION very low probability (0.001). V. PREVIOUS WORK This paper gives a bird eye over routing algorithm in Many research works has been done in this area. Some MANET. Routing algorithm generally classify into two subtype deterministic and probabilistic routing of them are presented here. algorithms. Deterministic routing algorithm suffer from The author presents and shows obtained results in his blind flooding whereas probabilistic routing algorithm research. This work is based on Bayesian approach, Queuing theory and reliability theory. Here the methods overcome the problem of blind flooding and maintain bound of application of Bayesian approach to some historical record of time and space for all node to problems of queuing theory and reliability theory. This maintaining network traffic in order to reduce probability approach could be used, for instance, for calculating of collision, rebroadcast at the expense of reach ability moment and quintile characteristics for performance and and enhanced scheme has higher throughput, lower reliability characteristics of large groups of systems or latency and better reach ability. devices [11]. Nadia Bali [12] proposed a hierarchical Markov model REFERENCES for the sources with a common hidden classification field [1]. B. Williams and T. Camp, Comparison of broadcast in which is modeled via a Potts–Markov field. Classical techniques for mobile ad hoc networks. In Proc. ACM methods of dimensionality reduction in hyper spectral Symposium on Mobile Ad Hoc Networking & imaging use classification methods either to classify the Computing (MOBIHOC 2002), pp. 194–205, 2002. spectra or to classify the images in classes where is, in [2]. S.-Y. Ni, Y.-C. Tseng, Y.-S. Chen, and J.-P. Sheu, “The general, much less than the number of spectra or the broadcast storm problem in a mobile ad hoc network”, number of observed images. However, these methods Proc.Mobicom_99, 1999. neglect either the spatial organization of the spectra or [3]. Y. Sasson, D. Cavin, and A. Schiper, Probabilistic the spectral property of the pixels along the spectral Broadcast for flooding in wireless mobile ad hoc networks, In Proc. IEEE Wireless Communications & bands. Networking Conference (WCNC 2003), pp. 1124–1130, The processes for decision making problems based on March 2003. the use of the Dempster-Shafer (D-S) theory can be J. Wu and W. Lou, "Forward-node-set-based broadcast able in different ways according to the requirements of [4]. in clustered mobile ad hoc networks," Wireless each single problem. In this input the authors present a Communication and Mobile Computing, vol. 3, pp. 155 decision making scheme based on Dempster-Shafer (D– 173, 2003. S) theory. Jose M. Merigo [13] proposed the use of a [5]. A. Keshavarz-Haddad, V. Ribeiro, and R. Riedi, "Colorhybrid averaging operator (2-THA) which uses the 2Based Broadcasting for Ad Hoc Networks," in tuple linguistic representation model. Due to use of 2Proceeding of the 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and THA in D-S theory, obtained a new aggregation Wireless Network (WIOPT' 06). Boston, MA, 2006, pp. 1 operator: the belief structure - 2-THA (BS-2-THA) - 10. operator and studied some of its main properties and [6]. J. Cartigny and D. Simplot, "Border node retransmission then show the descriptive example of the new approach based probabilistic broadcast protocols in ad hoc in a decision making problem. networks," Telecommunication Systems,, vol. 22, pp. Nidhi S Kulkarni [14] study and analyses the on demand 189-204, 2003. routing protocols in deep and gives an overview of the [7]. C. E. Perkins, and E. M. Royer, “Ad-hoc on-demand existing on demand routing protocols and a parametric distance vector routing,” 2nd IEEE Workshop on Mobile comparison is made with the recently developed Computing Systems and Applications, Monterey, California, USA: Feb 25 – 26, 1999: 90-100. protocols, also covers some important conventional routing protocols and the recently proposed extensions [8]. H D-Ferriere, M Grossglauser, and M Vetterli, “Age Matters: Efficient Route Discovery in Mobile Ad Hoc of AODV. These protocols are the multipath extensions Networks Using Encounter Ages,” 4th ACM of Ad Hoc On Demand Distance Vector routing protocol International Symposium on MANET and Computing, (AODV) such as AODV with break avoidance (AODV2003 BR), Scalable Multipath on demand routing (SMORT). [9]. C. E. Perkins, E. M. Belding-Royer, and S. Das, “Ad hoc One of the typical routing methods in mobile ad-hoc on-demand distance vector (AODV) Routing,” RFC networks use on demand distance vector, or Ad-hoc On3561, July 2003, demand Distance Vector (AODV). The key concern in [10]. David Johnson, David Maltz and Yih-Chun Hu, “The Dynamic Source Routing Protocol for Mobile Ad Hoc this protocol is the cost of route establishment. Rusheel Networks,” Internet Draft, draft-ietf-manet-dsr10.txt,July Jain [15] suggested an efficient routing algorithm for 2004 mobile ad-hoc networks with a route establishment technique using Bayesian approach. They consider both

120

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013 [11].

[12].

[13].

[14].

[15].

[16].

[17].

[18].

[19].

Alexey Kudryavtsev and Sergey Shorgin, “On the Bayesian Approach to the Analysis of Queueing Systems and Reliability Characteristics”, IEEE 2010, pp 1042-1045. Nadia Bali and Ali Mohammad-Djafari, “Bayesian Approach With Hidden Markov Modeling and Mean Field Approximation for Hyperspectral Data Analysis”, IEEE 2008, pp 217-225. Jose M. Merigo, Montserrat Casanovas and Luis Martinez, “A Decision Making Model Based on Dempster-Shafer Theory and Linguistic Hybrid Aggregation Operators”, IEEE 2008, pp 180-185. Nidhi S Kulkarni, Balasubramanian Ramant, and Indra Gupta, “On Demand Routing Protocols for Mobile Ad Hoc Networks: A Review”, IEEE 2009, pp 586-591. Rusheel Jain, Murali Parameswaran and Chittaranjan Hota, “An Efficient On-Demand Routing Protocol for MANETs using Bayesian Approach”, IEEE 2011 Mehran Abolhasan, Tadeusz Wysocki, Eryk Dutkiewicz,“A review of routing protocols for mobile ad hoc networks” in Elsevier,2004 TamilarasanSanthamurthy,“A Quantitative Study and Comparison of AODV, OLSR and TORA Routing Protocols in MANET” in International Journal of Computer Science Issues, Vol. 9, Issue 1, No 1, January 2012 Sunil Taneja and Ashwani Kush“A Survey of Routing Protocols in Mobile Ad Hoc Networks” in International Journal of Innovation, Management and Technology, Vol. 1, No. 3, August 2010 ,ISSN: 2010-0248 Pankaj Palta and Sonia Goyal,“Comparison of OLSR and TORA Routing Protocols Using OPNET Modeler” in International Journal of Engineering Research & Technology (IJERT),Vol. 1 Issue 5, July – 2012,ISSN: 2278-01

121

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.3 NO.8 AUGUST 2013

122

www.ijitce.co.uk


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.