SlideShare a Scribd company logo
Tejal Arvind Sonawale, Dr Shikha Nema / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.259-263
259 | P a g e
Comparison of Routing Protocol in MANETs
*Tejal Arvind Sonawale, **Dr Shikha Nema
*M.E(EXTC) V.E.S.I.T,Chembur Mumbai, India
**EXTC V.E.S.I.T,Chembur Mumbai, India
Abstract
AOMDV is widely used protocol these
days. But, its permissive for link failure. It takes
the necessary action after detecting the link
failure thus holding/queuing packets till new
route is discovered after detecting failure in
existing link.. Early Link Failure Detection-
AOMDV (ELFDAOMDV) keeps on monitoring
distance between two mobile nodes. As soon
distance between two nodes crosses specified
threshold then it sends a request to source node
to start discovering new route but continues to
transfer data packets as the link is still up. In
most of the cases, new route is discovered (if some
exists) before link failure. Then using the
intelligence data packets are automatically
shifted to this newly discovered route, thus
preventing the link failure. Hence, the algorithm
is named as Early Link Failure Detection -
AOMDV.
Keywords- Ad hoc networks; Routing protocols;
AODV, DSR, AOMDV.
1. INTRODUCTION
In contrast to infrastructure based wireless
networks, in ad hoc networks all nodes are mobile
are connected dynamically in an arbitrary manner. A
collection of mobile host with wireless network
interfaces may form a temporary network without
the aid of any established infrastructure or
centralized administration.
In the case where only two hosts, within the
transmission range, are involved in the ad hoc
network, no real routing protocol or routing
decisions are necessary. But in many practical ad
hoc networks, two hosts that wish to communicate
may not be close enough within wireless
transmission range of each other. These hosts could
communicate if other nodes between them
participated willfully to forward packets to the
destination or the next hop towards the destination.
So all nodes behave as routers and take part in
discovery and maintenance of routes to other nodes
in the network. Route construction should be done
with minimum overhead and bandwidth
consumption.
1.2 AD-HOC NETWORK DESIGN ISSUES
The Ad Hoc architecture has many benefits,
such as self-reconfiguration, ease of deployment,
and so on. However, this flexibility and convenience
come at a price. Ad hoc wireless networks inherit the
traditional problems of wireless communications,
such as bandwidth optimization, power control, and
transmission quality enhancement, while, in
addition, their mobility, multi-hop nature, and the
lack of fixed infrastructure create a number of
complexities and design issues that are specific to
mobile ad hoc networks.
 Infrastructure-less
 Dynamically Changing Network
Topologies
 Physical Layer Limitations
 Limited Link Bandwidth and Quality
 Variation in Link and Node Capabilities
 Energy Constrained Operation
 Network Robustness and Reliability
 Network Security
 Network Scalability
 Quality of Service

2 ROUTING PROTOCOL
Many protocols have been proposed for ad
hoc networks, all fall in any of the three sets, namely
Table-Driven, Source-Initiated On-Demand, and
Zone based.
2.1Table-Driven Routing Protocols
Table-driven routing protocols attempt to
maintain consistent, up-to-date routing information
from each node to every other node in the network.
These protocols require each node to maintain one or
more tables to store routing information, and they
respond to changes in network topology by
propagating updates throughout the network in order
to maintain a consistent network view. The areas in
which they differ and the number of necessary
routing-related tables and the methods by which
changes in network structure are broadcast
2.2 Source-Initiated On-Demand Routing
A different approach from table-driven
routing is source-initiated on-demand routing. This
type of routing creates routes only when desired by
the source node. When a node requires a route to a
destination, it initiates a route discovery process
within the network. This process is completed once a
route is found or all possible route permutations
have been examined. Once a route has been
established, it is maintained by a route maintenance
Tejal Arvind Sonawale, Dr Shikha Nema / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.259-263
260 | P a g e
procedure until either the destination becomes
inaccessible along every path from the source or
until the route is no longer desired.
2.3 Zone Routing Protocol
ZRP divides its network in different zones.
That's the nodes local neighborhood. Each node may
be within multiple overlapping zones, and each zone
may be of a different size. The size of a zone is not
determined by geographical measurement. It is given
by a radius of length, where the number of hops is
the perimeter of the zone. Each node has its own
zone.
Advantage
 less control overhead as in a proactive
protocol or an on demand protocol

Disadvantage
 short latency for finding new routes
3 SECURITY IN AD HOC NETWORK
The security needs of Ad Hoc Network are not
different from the traditional networks
 Confidentiality
 Availability
 Integrity
 Authentication
 Non-repudiation
 Link Level Security
 Secure Routing
Wireless technologies are unequivocally among the
most rapidly progressing technology sectors. There
is a vast range of wireless technologies, applications
and devices, which are either already a substantial
part of our daily life or could play this role in future.
Wireless ad hoc networking is one of these
applications, which can potentially enhance our
abilities to solve real life challenges.
4. ROUTING Protocol Approach
4.1. Adhoc on demand Multi-path distance
vector(AOMDV)
Adhoc On-demand Multi-path Distance
Vector (AOMDV) [12] is an extension to the
AODV. The main difference lies in the number of
routes found in each route discovery. A little
additional overhead is required for the computation
of multiple paths. This protocol does not require any
special type of control packets but makes use of
AODV control packets with a few extra fields in the
packet headers. The AOMDV protocol computes
multiple loop-free and link-disjoint paths. There are
three phases of the AOMDV protocol. The first
phase is the Route Request, second is the Route
Reply and the third phase is the Route Maintenance
phase.
 Route Request:
The protocol propagates RREQ from source
towards the destination. Node S as in AODV
broadcasts multiple requests to its neighboring nodes
1 and 2. This means that request with same
sequence numbers are sent to the destination node.
They further broadcast the request to the other
neighboring nodes, which are further sent to the
destination node D.
 Route Reply:
The protocol establishes multiple reverse
paths both at intermediate nodes as well as
destination. Multiple RREPs traverse these reverse
paths back to form multiple forward paths to the
destination at the source and intermediate nodes. If
the intermediate nodes have the route defined for the
destination then they send the RREP to the source
node S. The protocol is designed to keep track of
multiple routes where the routing entries for each
destination contain a list of next hops together with
the corresponding hop counts. All the hop counts
have the same sequence number then the path with
the minimum hop count is selected and all the other
paths are discarded. The protocol computes multiple
loop-free and link-disjoint paths. Loop-freedom is
guaranteed by using a notion of “advertised hop
count”. Each duplicate route advertisement received
by a node defines an alternative path to the
destination. To ensure loop freedom, a node only
accepts an alternative path to the destination if it has
a lower hop count than the advertised hop count for
that destination. The advertised hop count is
generally the maximum hop count value possible for
a node S to reach a node D. If any value that is
received by the source S is greater than the
advertised hop count value then a loop is formed so
this RREP is discarded. The multiple RREPs are
received by the source via multiple paths and a
minimum hop count route is selected, the other
routes carrying a higher hop count value are
discarded.
Destination is the node where the packet is
destined to, the sequence number to maintain the
freshness of the routes, the advertised hop count that
avoids the formation of loops. The route list consists
of Hop Count required to reach a particular
destination, Next Hop is the next hop the packet is
supposed to take to reach the required destination,
Last Hop is the last hop taken to reach the
destination. If the packet is following the same path
then this value is same as the Next Hop or else it
changes and Expiration Timeout is the time for
which the path will exist. There are multiple entries
for a single destination but the routes that contain the
lowest hop count are only recorded in the routing
table and the other routes are discarded.
Tejal Arvind Sonawale, Dr Shikha Nema / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.259-263
261 | P a g e
 Route Maintenance Phase:
The third phase is the Route Maintenance
Phase. This phase works in exactly same as AODV.
If the intermediate nodes are not able to receive a
response of the HELLO message then they broadcast
a Route Error message. After receiving this message
all the nodes that use the particular route to reach the
destination make this particular route as infinity and
inform the source node to run a fresh route
discovery.
There are two types of disjoint paths, one is
the node disjoint and the other is the link disjoint.
Node-disjoint paths do not have any nodes in
common, except the source and destination. The link
disjoint paths do not have any common link.
An AODV protocol is been developed
which develops route on-demand. The biggest
drawback of AODV is with respect to its route
maintenance. If a node detects a broken link while
attempting to forward the packet to the next hop then
it generates a RERR packet that is sent to all sources
using the broken link. The source runs a new route
discovery after receiving RERR packet. The
frequent route breaks cause intermediate nodes to
drop packets because no alternate path to destination
is available. This reduces overall throughput, packet
delivery ratio and increases average end-to-end
delay if there is high mobility. The other drawback is
that multiple RREP packets are received in response
to a single RREQ packet and can lead to heavy
control overhead. The HELLO message leads to
unnecessary bandwidth consumption.
The AOMDV is an extension to the AODV
protocol for computing multiple loop-free and link-
disjoint paths. The protocol computes multiple loop-
free and link-disjoint paths. Loop-freedom is
guaranteed by using a notion of “advertised hop
count”. Each duplicate route advertisement received
by a node defines an alternative path to the
destination. To ensure loop freedom, a node only
accepts an alternative path to the destination if it has
a lower hop count than the advertised hop count for
that destination. With multiple redundant paths
available, the protocol switches routes to a different
path when an earlier path fails. Thus a new route
discovery is avoided. Route discovery is initiated
only when all paths to a specific destination fail. For
efficiency, only link disjoint paths are computed so
that the paths fail independently of each other.
In AOMDV[12] RREQs reaching the node
may not be from disjoint paths, if RREQ is from one
common node one of the RREQ is discarded, this
messages implicitly provide knowledge about the
mobility and accessibility of their sender and
originator. for example, if node A is constantly
receiving messages initiated by another node B, this
implies that node B is relatively stationary to node
A. furthermore a valid route from node A to node B
is available either directly or through other nodes.
Instead of discarding repeated RREQs messages
node can perform additional computation on
available routing data and predict accessibility of
other nodes.
Now AOMDV[8] routing make use of pre-
computed routes determined during route discovery.
These solutions, however, suffer during high
mobility because the alternate paths are not actively
maintained. Hence, precisely when needed, the
routes are often broken. To overcome this problem,
we will go for link breakage prediction. Prediction
will be done only for multiple paths that are formed
during the route discovery process. All the paths are
maintained by means of periodic update packets
unicast along each path. These update packets are
MAC frames which gives the transmitted and
received power from which distance can be
measured. This distance can be used to predict
whether the node is moving inward or outward
relative to the previous distance value that is it give
the signal strength. At any point of time, only the
path with the strongest signal strength is used for
data transmission.
4.2. Early Link Failure Detection AOMDV
(ELFD-AODV)
AODV is widely used protocol these days. But, its
permissive for link failure. It takes the necessary
action after detecting the link failure thus
holding/queuing packets till new route is discovered
after detecting failure in existing link.
ELFD-AOMDV keeps on monitoring distance
between two mobile nodes. As soon distance
between two nodes crosses specified threshold then
it sends a request to source node to start discovering
new route but continues to transfer data packets as
the link is still up. In most of the cases, new route is
discovered (if some exists) before link failure. Then
using the intelligence data packets are automatically
shifted to this newly discovered route, thus
preventing the link failure. Hence, the algorithm is
named as Early Link Failure DetectionAOMDV.
Logic to monitor the distance between two mobile
nodes-
Source mobile node cannot know the
distance till destination mobile node or co-ordinates
of destination mobile node. So, source node cannot
calculate distance from source to destination. It
follows the reverse approach. Algorithm uses the
facts that each node knows the current co-ordinates
of self. While sending packets source nodes inserts
its own co-ordinates in the header. Destination node
receives the pakcet containing the source node
identification and co-ordinates of source node.
Destination node calculates the distance between
source and self as it knows its own co-ordinates and
co-ordiantes of source node which are received in
header. If this distance crosses threshold then
destination nodes informs the source node by
Tejal Arvind Sonawale, Dr Shikha Nema / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.259-263
262 | P a g e
sending packet that link may break soon. As soon as
source node receives such packet, it starts looking
for new node.
5. Performance Metrics Comparison
 Packet Delivery Ratio – The ratio of total
number of data packets successfully received by
all the destinations to the total number of data
packets generated by all the sources.
 Throughput: Throughput is total packets
successfully delivered to individual destination
over total time.
SIMULATION RESULT AND ANALYSIS
Channel Type Wireless
Radio Propagation Model TwoRayGround
Network interface type
Phy/WirelessPhy
MAC type
Mac/802_11
Interface Queue Type
DropTail/PriQueue
Antenna Type OmniAntenna
Max Queue Length 50
No. Of Mobile nodes 06
Routing protocol-AOMDV/ELFDAOMDV
Mobility Random Way Point Model
Throughput: Measure how soon the receiver is
able to get a certain amount of data send by the
sender
Throughput in kbps = ((Total size of
packets transferred)/(StopTime -
StartTime)) * (8/1000)
Fig5.1 Throughput ELFD-AOMDV vs AOMDV
 Average throughput of AOMDV== 99.46 kbps
 Average throughtput ELFD-AOMDV
==190.52 Kbps
PACKET DELIVERY RATIO
Fig 5.2 Shows Packet Delivery Ratio of ELFD-
AOMDV and AOMDV
Packet Delivery Ratio = (No. Of Packets received
/No. Of Packets sent) * 100.
 Generated Packets=2400
 Received Packets=1118
 PDR (AOMDV)=46.5833%
 Generated Packets=2572
 Received Packets=2142
 PDR (ELFD-AOMDV)== 83.28%
6 CONCLUSION
In MANETS’s due to movement of the
nodes, network topology may change rapidly and
unpredictably over time. In this decentralized
network, discovering the route and delivering of data
becomes complicated. In mobility scenario already
developed routing algorithms like AOMDV gives
degraded results compared to ELFD-AOMDV
performance characteristics. ELFD-AOMDV came
up with the advantage of Increased Throughput and
Packet Delivery Ratio.
References
[1] www.ietf.org/html.charters/manet-
charter.html
[2] Murthy, S. and J.J. Garcia-Luna-Aceves,
An Efficient Routing Protocol for Wireless
Networks, ACM Mobile Networks and
App. J., Special Issue on Routing in Mobile
Communication Networks, Oct. 1996, pp.
183-97.
[3] C. E. Perkins and P. Bhagwat, “Highly
Dynamic Destination-Sequenced Distance-
Vector Routing (DSDV) for Mobile
Tejal Arvind Sonawale, Dr Shikha Nema / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.259-263
263 | P a g e
Computers”, in Proceedings of ACM
SIGCOMM 1994, August 1994, pp. 234-
244.
[4] G. Pei, M. Gerla and T.-W. Chen, Fisheye
State Routing in Mobile Ad Hoc Networks.
In Proceedings of the 2000 ICDCS
Workshops, Taipei, Taiwan, Apr. 2000, pp.
D71-D78
[5] B. Johnson, D.A. Maltz, Y.-C. Hu, “The
Dynamic Source Routing Protocol for
Mobile Ad Hoc Networks”, Internet-Draft,
draft-ietf-manet-dsr-10.txt, July 2004,
[6] V. Park, and S. Corson, Temporally
Ordered Routing Algorithm (TORA)
Version 1 Functional Specification.
IETF Internet draft, 1997.
[7] Y. B. Ko and N. H. Vaidya. Location Aid
Routing (LAR) in mobile ad hoc networks.
In Proc. ACM/IEEE MOBICOM, Oct.
1998.
[8] Z. J. Haas and M.R Pearlman, “The Zone
Routing Protocol (ZRP) for ad hoc
networks”, IETF Internet draft , August
1998.
[9] Navid Nikaein, Christian Bonnet and Neda
Nikaein, “HARP - Hybrid Ad Hoc Routing
Protocol”, in proceeding of IST 2001:
International Symposium on
Telecommunications, Iran/Tehran 2001.
[10] M. Joa-Ng and I-Tai Lu, “A peer-to-peer
zone-based two-level link state routing for
mobile ad hoc net-works”, IEEE on
Selected Areas in Communications, vol. 17,
no. 8, pp. 1415 1425, 1999.
[11] C. E. Perkins and E. M. Royer, “Ad Hoc
On-Demand Distance Vector Routing”,
Proceedings of IEEE Workshop on Mobile
Computing Systems and Applications 1999,
February 1999, pp. 90-100.
[12] Mahesh K. Marina and Samir R. Das,”On-
Demand Multipath Distance Vector
Routing in Ad Hoc Networks”, in IEEE
Proceedings 2001.
[13] C. E. Perkins, E. M. Royer, S. R. Das, and
M. K. Marina,”Performance comparison of
two on-demand routing protocols for ad hoc
networks”,. IEEE Personal Commun. Mag.,
vol. 8, pp. 16.28, Feb. 2001.
[14] J. Broch, D. A. Maltz, D. B. Johnson, Y.-C.
Hu, and J. Jetcheva, “A performance
comparison of multi-hop wireless ad hoc
network
[15] routing protocols”, in Proceeding. Int.
Conf. on Mobile Computing and
Networking, Oct. 1998.
[16] C. E. Perkins, ed., Ad Hoc Networking, ch.
3. Addison Wesley, 2001.
[17] Rohit Dube, Cynthia D. Rais, Kuang-Yeh
Wang, and Satish K. Tripathi, “Signal
stability based adaptive routing (SSA) for
adhoc mobile networks”, in IEEE Personal
Communication, February 1997, vol. 4.
[18] Ian D. Chakeres and Elizabeth M. Belding-
Royer, “The utility of hello messages for
determining link connectivity”, in
Proceedings of the 5th International
Symposium on Wireless Personal
Multimedia Communications (WPMC),
Honolulu, Hawaii, October 2002.
[19] T. Camp, J. Boleng, V. Davies, “A survey
of mobility for ad hoc network research”, in
Proc. WCMC, 2002, pp.483-502.
[20] Michael Bahr, “Proposed Routing for IEEE
802.11s WLAN Mesh Networks”, In Proc.
2nd Annual International Wireless Internet
Conference, 2006.
[21] P Sambasivam, A Murthy, EM Belding,”
Dynamically Adaptive Multipath Routing
based on AODV”, In Proc. 3rd Annual,
2004- Citeseer
[22] Rehman, H. Wolf, L. “Performance
enhancement in AODV with accessibility
prediction”, in mobile adhoc and sensor
system, MASS 2007 IEEE International
conference,pp 1-6
[23] http://www.isi.edu/nsnam/ns-
build.html#allinone

More Related Content

PDF
Comparing: Routing Protocols on Basis of sleep mode
IJMER
 
PDF
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
pijans
 
PDF
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
IOSR Journals
 
PDF
IMPROVED NETWORK CONNECTIVITY IN MANETS
IJCNCJournal
 
PDF
J0935461
IOSR Journals
 
PDF
O26087092
IJERA Editor
 
PDF
Hd3312521256
IJERA Editor
 
PDF
Energy efficient routing protocol to increase manet life time using cluster 2
IAEME Publication
 
Comparing: Routing Protocols on Basis of sleep mode
IJMER
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
pijans
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
IOSR Journals
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IJCNCJournal
 
J0935461
IOSR Journals
 
O26087092
IJERA Editor
 
Hd3312521256
IJERA Editor
 
Energy efficient routing protocol to increase manet life time using cluster 2
IAEME Publication
 

What's hot (20)

PDF
Q01821111115
IOSR Journals
 
PDF
A new parameter proposed for route selection in routing protocol
IAEME Publication
 
PDF
Paper id 71201928
IJRAT
 
PDF
Research on performance of routing protocols in manet
Australian Society for Commerce Industry Engineering
 
PDF
Fo35991995
IJERA Editor
 
PDF
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
ijasuc
 
PDF
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
ijsrd.com
 
PDF
Local distance's neighbouring quantification
ijwmn
 
PDF
Distance’s quantification
csandit
 
PDF
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
IRJET Journal
 
PDF
Zone Routing Protocol (ZRP)
Senthil Kanth
 
PDF
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
ijsrd.com
 
PDF
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ijasuc
 
PDF
Routing protocols in Ad-hoc Networks- A Simulation Study
IOSR Journals
 
PPTX
MANET Routing Protocols , a case study
Rehan Hattab
 
PDF
Performance analysis on multihop transmission using arp routing protocol in i...
eSAT Journals
 
PDF
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
IAEME Publication
 
PDF
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
ijasuc
 
PDF
Performance analysis on multihop transmission using
eSAT Publishing House
 
PDF
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
IJCSIT Journal
 
Q01821111115
IOSR Journals
 
A new parameter proposed for route selection in routing protocol
IAEME Publication
 
Paper id 71201928
IJRAT
 
Research on performance of routing protocols in manet
Australian Society for Commerce Industry Engineering
 
Fo35991995
IJERA Editor
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
ijasuc
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
ijsrd.com
 
Local distance's neighbouring quantification
ijwmn
 
Distance’s quantification
csandit
 
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
IRJET Journal
 
Zone Routing Protocol (ZRP)
Senthil Kanth
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
ijsrd.com
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ijasuc
 
Routing protocols in Ad-hoc Networks- A Simulation Study
IOSR Journals
 
MANET Routing Protocols , a case study
Rehan Hattab
 
Performance analysis on multihop transmission using arp routing protocol in i...
eSAT Journals
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
IAEME Publication
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
ijasuc
 
Performance analysis on multihop transmission using
eSAT Publishing House
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
IJCSIT Journal
 
Ad

Viewers also liked (20)

PDF
If3314021407
IJERA Editor
 
PDF
B33004007
IJERA Editor
 
PPS
Subprime
Florian Dumont
 
PPTX
Ikt ak gure ikastetxeetan
guest55a8b883
 
PPT
Albun de fotografias
Yoana Pantoja
 
PPTX
Homer simpson
guest5091976
 
PPTX
Diapositivas laura
Laura
 
PDF
12th issue
Janta Ka Aaina
 
PDF
CV_Daniel_Stoll
Daniel Stoll
 
PDF
Manuale Raptor 30 V2
Sabattinicars
 
PPTX
Regiones naturales de colombia
guest3fbdc1e
 
PPTX
Izadas de bandera
ALEJANDROBARRAGAN
 
PPS
MisiĂłn evanxelizadora da comunidade
diruab
 
PPT
Cicles formatius 2011
garrigatorres
 
PPT
Skate
oli345
 
PPSX
Suggestion
RO0RO0
 
PPTX
Введение в Share point2010, ppt
Roman Kalita
 
PPT
Bosnia
guest128f73
 
PDF
Antologia de reflexions
Sirk92
 
PPTX
Muni programa bx
Juan carlos
 
If3314021407
IJERA Editor
 
B33004007
IJERA Editor
 
Subprime
Florian Dumont
 
Ikt ak gure ikastetxeetan
guest55a8b883
 
Albun de fotografias
Yoana Pantoja
 
Homer simpson
guest5091976
 
Diapositivas laura
Laura
 
12th issue
Janta Ka Aaina
 
CV_Daniel_Stoll
Daniel Stoll
 
Manuale Raptor 30 V2
Sabattinicars
 
Regiones naturales de colombia
guest3fbdc1e
 
Izadas de bandera
ALEJANDROBARRAGAN
 
MisiĂłn evanxelizadora da comunidade
diruab
 
Cicles formatius 2011
garrigatorres
 
Skate
oli345
 
Suggestion
RO0RO0
 
Введение в Share point2010, ppt
Roman Kalita
 
Bosnia
guest128f73
 
Antologia de reflexions
Sirk92
 
Muni programa bx
Juan carlos
 
Ad

Similar to As33259263 (20)

PDF
Hd3612761280
IJERA Editor
 
PDF
IRJET- Optimum Routing Algorithm for MANET
IRJET Journal
 
PDF
Comparative study of multipath extensions of aodv
eSAT Publishing House
 
PDF
Comparative study of multipath extensions of aodv
eSAT Journals
 
PDF
Bh4103368374
IJERA Editor
 
PDF
A41040105
IJERA Editor
 
PDF
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Computer Science Journals
 
PDF
Performance Improvement of Multiple Connections in AODV with the Concern of N...
pijans
 
PDF
En33838844
IJERA Editor
 
PDF
En33838844
IJERA Editor
 
PDF
A New Energy Efficient Approach in MANETs: A Review
BRNSSPublicationHubI
 
PDF
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET Journal
 
PDF
A Survey of Enhanced Routing Protocols for Manets
pijans
 
PDF
E41022938
IJERA Editor
 
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
PDF
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Narendra Singh Yadav
 
PDF
Br31467472
IJERA Editor
 
PDF
G343741
IJERA Editor
 
PDF
G343741
IJERA Editor
 
PDF
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
IDES Editor
 
Hd3612761280
IJERA Editor
 
IRJET- Optimum Routing Algorithm for MANET
IRJET Journal
 
Comparative study of multipath extensions of aodv
eSAT Publishing House
 
Comparative study of multipath extensions of aodv
eSAT Journals
 
Bh4103368374
IJERA Editor
 
A41040105
IJERA Editor
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Computer Science Journals
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
pijans
 
En33838844
IJERA Editor
 
En33838844
IJERA Editor
 
A New Energy Efficient Approach in MANETs: A Review
BRNSSPublicationHubI
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET Journal
 
A Survey of Enhanced Routing Protocols for Manets
pijans
 
E41022938
IJERA Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Narendra Singh Yadav
 
Br31467472
IJERA Editor
 
G343741
IJERA Editor
 
G343741
IJERA Editor
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
IDES Editor
 

Recently uploaded (20)

PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Software Development Methodologies in 2025
KodekX
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 

As33259263

  • 1. Tejal Arvind Sonawale, Dr Shikha Nema / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.259-263 259 | P a g e Comparison of Routing Protocol in MANETs *Tejal Arvind Sonawale, **Dr Shikha Nema *M.E(EXTC) V.E.S.I.T,Chembur Mumbai, India **EXTC V.E.S.I.T,Chembur Mumbai, India Abstract AOMDV is widely used protocol these days. But, its permissive for link failure. It takes the necessary action after detecting the link failure thus holding/queuing packets till new route is discovered after detecting failure in existing link.. Early Link Failure Detection- AOMDV (ELFDAOMDV) keeps on monitoring distance between two mobile nodes. As soon distance between two nodes crosses specified threshold then it sends a request to source node to start discovering new route but continues to transfer data packets as the link is still up. In most of the cases, new route is discovered (if some exists) before link failure. Then using the intelligence data packets are automatically shifted to this newly discovered route, thus preventing the link failure. Hence, the algorithm is named as Early Link Failure Detection - AOMDV. Keywords- Ad hoc networks; Routing protocols; AODV, DSR, AOMDV. 1. INTRODUCTION In contrast to infrastructure based wireless networks, in ad hoc networks all nodes are mobile are connected dynamically in an arbitrary manner. A collection of mobile host with wireless network interfaces may form a temporary network without the aid of any established infrastructure or centralized administration. In the case where only two hosts, within the transmission range, are involved in the ad hoc network, no real routing protocol or routing decisions are necessary. But in many practical ad hoc networks, two hosts that wish to communicate may not be close enough within wireless transmission range of each other. These hosts could communicate if other nodes between them participated willfully to forward packets to the destination or the next hop towards the destination. So all nodes behave as routers and take part in discovery and maintenance of routes to other nodes in the network. Route construction should be done with minimum overhead and bandwidth consumption. 1.2 AD-HOC NETWORK DESIGN ISSUES The Ad Hoc architecture has many benefits, such as self-reconfiguration, ease of deployment, and so on. However, this flexibility and convenience come at a price. Ad hoc wireless networks inherit the traditional problems of wireless communications, such as bandwidth optimization, power control, and transmission quality enhancement, while, in addition, their mobility, multi-hop nature, and the lack of fixed infrastructure create a number of complexities and design issues that are specific to mobile ad hoc networks.  Infrastructure-less  Dynamically Changing Network Topologies  Physical Layer Limitations  Limited Link Bandwidth and Quality  Variation in Link and Node Capabilities  Energy Constrained Operation  Network Robustness and Reliability  Network Security  Network Scalability  Quality of Service  2 ROUTING PROTOCOL Many protocols have been proposed for ad hoc networks, all fall in any of the three sets, namely Table-Driven, Source-Initiated On-Demand, and Zone based. 2.1Table-Driven Routing Protocols Table-driven routing protocols attempt to maintain consistent, up-to-date routing information from each node to every other node in the network. These protocols require each node to maintain one or more tables to store routing information, and they respond to changes in network topology by propagating updates throughout the network in order to maintain a consistent network view. The areas in which they differ and the number of necessary routing-related tables and the methods by which changes in network structure are broadcast 2.2 Source-Initiated On-Demand Routing A different approach from table-driven routing is source-initiated on-demand routing. This type of routing creates routes only when desired by the source node. When a node requires a route to a destination, it initiates a route discovery process within the network. This process is completed once a route is found or all possible route permutations have been examined. Once a route has been established, it is maintained by a route maintenance
  • 2. Tejal Arvind Sonawale, Dr Shikha Nema / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.259-263 260 | P a g e procedure until either the destination becomes inaccessible along every path from the source or until the route is no longer desired. 2.3 Zone Routing Protocol ZRP divides its network in different zones. That's the nodes local neighborhood. Each node may be within multiple overlapping zones, and each zone may be of a different size. The size of a zone is not determined by geographical measurement. It is given by a radius of length, where the number of hops is the perimeter of the zone. Each node has its own zone. Advantage  less control overhead as in a proactive protocol or an on demand protocol  Disadvantage  short latency for finding new routes 3 SECURITY IN AD HOC NETWORK The security needs of Ad Hoc Network are not different from the traditional networks  Confidentiality  Availability  Integrity  Authentication  Non-repudiation  Link Level Security  Secure Routing Wireless technologies are unequivocally among the most rapidly progressing technology sectors. There is a vast range of wireless technologies, applications and devices, which are either already a substantial part of our daily life or could play this role in future. Wireless ad hoc networking is one of these applications, which can potentially enhance our abilities to solve real life challenges. 4. ROUTING Protocol Approach 4.1. Adhoc on demand Multi-path distance vector(AOMDV) Adhoc On-demand Multi-path Distance Vector (AOMDV) [12] is an extension to the AODV. The main difference lies in the number of routes found in each route discovery. A little additional overhead is required for the computation of multiple paths. This protocol does not require any special type of control packets but makes use of AODV control packets with a few extra fields in the packet headers. The AOMDV protocol computes multiple loop-free and link-disjoint paths. There are three phases of the AOMDV protocol. The first phase is the Route Request, second is the Route Reply and the third phase is the Route Maintenance phase.  Route Request: The protocol propagates RREQ from source towards the destination. Node S as in AODV broadcasts multiple requests to its neighboring nodes 1 and 2. This means that request with same sequence numbers are sent to the destination node. They further broadcast the request to the other neighboring nodes, which are further sent to the destination node D.  Route Reply: The protocol establishes multiple reverse paths both at intermediate nodes as well as destination. Multiple RREPs traverse these reverse paths back to form multiple forward paths to the destination at the source and intermediate nodes. If the intermediate nodes have the route defined for the destination then they send the RREP to the source node S. The protocol is designed to keep track of multiple routes where the routing entries for each destination contain a list of next hops together with the corresponding hop counts. All the hop counts have the same sequence number then the path with the minimum hop count is selected and all the other paths are discarded. The protocol computes multiple loop-free and link-disjoint paths. Loop-freedom is guaranteed by using a notion of “advertised hop count”. Each duplicate route advertisement received by a node defines an alternative path to the destination. To ensure loop freedom, a node only accepts an alternative path to the destination if it has a lower hop count than the advertised hop count for that destination. The advertised hop count is generally the maximum hop count value possible for a node S to reach a node D. If any value that is received by the source S is greater than the advertised hop count value then a loop is formed so this RREP is discarded. The multiple RREPs are received by the source via multiple paths and a minimum hop count route is selected, the other routes carrying a higher hop count value are discarded. Destination is the node where the packet is destined to, the sequence number to maintain the freshness of the routes, the advertised hop count that avoids the formation of loops. The route list consists of Hop Count required to reach a particular destination, Next Hop is the next hop the packet is supposed to take to reach the required destination, Last Hop is the last hop taken to reach the destination. If the packet is following the same path then this value is same as the Next Hop or else it changes and Expiration Timeout is the time for which the path will exist. There are multiple entries for a single destination but the routes that contain the lowest hop count are only recorded in the routing table and the other routes are discarded.
  • 3. Tejal Arvind Sonawale, Dr Shikha Nema / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.259-263 261 | P a g e  Route Maintenance Phase: The third phase is the Route Maintenance Phase. This phase works in exactly same as AODV. If the intermediate nodes are not able to receive a response of the HELLO message then they broadcast a Route Error message. After receiving this message all the nodes that use the particular route to reach the destination make this particular route as infinity and inform the source node to run a fresh route discovery. There are two types of disjoint paths, one is the node disjoint and the other is the link disjoint. Node-disjoint paths do not have any nodes in common, except the source and destination. The link disjoint paths do not have any common link. An AODV protocol is been developed which develops route on-demand. The biggest drawback of AODV is with respect to its route maintenance. If a node detects a broken link while attempting to forward the packet to the next hop then it generates a RERR packet that is sent to all sources using the broken link. The source runs a new route discovery after receiving RERR packet. The frequent route breaks cause intermediate nodes to drop packets because no alternate path to destination is available. This reduces overall throughput, packet delivery ratio and increases average end-to-end delay if there is high mobility. The other drawback is that multiple RREP packets are received in response to a single RREQ packet and can lead to heavy control overhead. The HELLO message leads to unnecessary bandwidth consumption. The AOMDV is an extension to the AODV protocol for computing multiple loop-free and link- disjoint paths. The protocol computes multiple loop- free and link-disjoint paths. Loop-freedom is guaranteed by using a notion of “advertised hop count”. Each duplicate route advertisement received by a node defines an alternative path to the destination. To ensure loop freedom, a node only accepts an alternative path to the destination if it has a lower hop count than the advertised hop count for that destination. With multiple redundant paths available, the protocol switches routes to a different path when an earlier path fails. Thus a new route discovery is avoided. Route discovery is initiated only when all paths to a specific destination fail. For efficiency, only link disjoint paths are computed so that the paths fail independently of each other. In AOMDV[12] RREQs reaching the node may not be from disjoint paths, if RREQ is from one common node one of the RREQ is discarded, this messages implicitly provide knowledge about the mobility and accessibility of their sender and originator. for example, if node A is constantly receiving messages initiated by another node B, this implies that node B is relatively stationary to node A. furthermore a valid route from node A to node B is available either directly or through other nodes. Instead of discarding repeated RREQs messages node can perform additional computation on available routing data and predict accessibility of other nodes. Now AOMDV[8] routing make use of pre- computed routes determined during route discovery. These solutions, however, suffer during high mobility because the alternate paths are not actively maintained. Hence, precisely when needed, the routes are often broken. To overcome this problem, we will go for link breakage prediction. Prediction will be done only for multiple paths that are formed during the route discovery process. All the paths are maintained by means of periodic update packets unicast along each path. These update packets are MAC frames which gives the transmitted and received power from which distance can be measured. This distance can be used to predict whether the node is moving inward or outward relative to the previous distance value that is it give the signal strength. At any point of time, only the path with the strongest signal strength is used for data transmission. 4.2. Early Link Failure Detection AOMDV (ELFD-AODV) AODV is widely used protocol these days. But, its permissive for link failure. It takes the necessary action after detecting the link failure thus holding/queuing packets till new route is discovered after detecting failure in existing link. ELFD-AOMDV keeps on monitoring distance between two mobile nodes. As soon distance between two nodes crosses specified threshold then it sends a request to source node to start discovering new route but continues to transfer data packets as the link is still up. In most of the cases, new route is discovered (if some exists) before link failure. Then using the intelligence data packets are automatically shifted to this newly discovered route, thus preventing the link failure. Hence, the algorithm is named as Early Link Failure DetectionAOMDV. Logic to monitor the distance between two mobile nodes- Source mobile node cannot know the distance till destination mobile node or co-ordinates of destination mobile node. So, source node cannot calculate distance from source to destination. It follows the reverse approach. Algorithm uses the facts that each node knows the current co-ordinates of self. While sending packets source nodes inserts its own co-ordinates in the header. Destination node receives the pakcet containing the source node identification and co-ordinates of source node. Destination node calculates the distance between source and self as it knows its own co-ordinates and co-ordiantes of source node which are received in header. If this distance crosses threshold then destination nodes informs the source node by
  • 4. Tejal Arvind Sonawale, Dr Shikha Nema / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.259-263 262 | P a g e sending packet that link may break soon. As soon as source node receives such packet, it starts looking for new node. 5. Performance Metrics Comparison  Packet Delivery Ratio – The ratio of total number of data packets successfully received by all the destinations to the total number of data packets generated by all the sources.  Throughput: Throughput is total packets successfully delivered to individual destination over total time. SIMULATION RESULT AND ANALYSIS Channel Type Wireless Radio Propagation Model TwoRayGround Network interface type Phy/WirelessPhy MAC type Mac/802_11 Interface Queue Type DropTail/PriQueue Antenna Type OmniAntenna Max Queue Length 50 No. Of Mobile nodes 06 Routing protocol-AOMDV/ELFDAOMDV Mobility Random Way Point Model Throughput: Measure how soon the receiver is able to get a certain amount of data send by the sender Throughput in kbps = ((Total size of packets transferred)/(StopTime - StartTime)) * (8/1000) Fig5.1 Throughput ELFD-AOMDV vs AOMDV  Average throughput of AOMDV== 99.46 kbps  Average throughtput ELFD-AOMDV ==190.52 Kbps PACKET DELIVERY RATIO Fig 5.2 Shows Packet Delivery Ratio of ELFD- AOMDV and AOMDV Packet Delivery Ratio = (No. Of Packets received /No. Of Packets sent) * 100.  Generated Packets=2400  Received Packets=1118  PDR (AOMDV)=46.5833%  Generated Packets=2572  Received Packets=2142  PDR (ELFD-AOMDV)== 83.28% 6 CONCLUSION In MANETS’s due to movement of the nodes, network topology may change rapidly and unpredictably over time. In this decentralized network, discovering the route and delivering of data becomes complicated. In mobility scenario already developed routing algorithms like AOMDV gives degraded results compared to ELFD-AOMDV performance characteristics. ELFD-AOMDV came up with the advantage of Increased Throughput and Packet Delivery Ratio. References [1] www.ietf.org/html.charters/manet- charter.html [2] Murthy, S. and J.J. Garcia-Luna-Aceves, An Efficient Routing Protocol for Wireless Networks, ACM Mobile Networks and App. J., Special Issue on Routing in Mobile Communication Networks, Oct. 1996, pp. 183-97. [3] C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance- Vector Routing (DSDV) for Mobile
  • 5. Tejal Arvind Sonawale, Dr Shikha Nema / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.259-263 263 | P a g e Computers”, in Proceedings of ACM SIGCOMM 1994, August 1994, pp. 234- 244. [4] G. Pei, M. Gerla and T.-W. Chen, Fisheye State Routing in Mobile Ad Hoc Networks. In Proceedings of the 2000 ICDCS Workshops, Taipei, Taiwan, Apr. 2000, pp. D71-D78 [5] B. Johnson, D.A. Maltz, Y.-C. Hu, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks”, Internet-Draft, draft-ietf-manet-dsr-10.txt, July 2004, [6] V. Park, and S. Corson, Temporally Ordered Routing Algorithm (TORA) Version 1 Functional Specification. IETF Internet draft, 1997. [7] Y. B. Ko and N. H. Vaidya. Location Aid Routing (LAR) in mobile ad hoc networks. In Proc. ACM/IEEE MOBICOM, Oct. 1998. [8] Z. J. Haas and M.R Pearlman, “The Zone Routing Protocol (ZRP) for ad hoc networks”, IETF Internet draft , August 1998. [9] Navid Nikaein, Christian Bonnet and Neda Nikaein, “HARP - Hybrid Ad Hoc Routing Protocol”, in proceeding of IST 2001: International Symposium on Telecommunications, Iran/Tehran 2001. [10] M. Joa-Ng and I-Tai Lu, “A peer-to-peer zone-based two-level link state routing for mobile ad hoc net-works”, IEEE on Selected Areas in Communications, vol. 17, no. 8, pp. 1415 1425, 1999. [11] C. E. Perkins and E. M. Royer, “Ad Hoc On-Demand Distance Vector Routing”, Proceedings of IEEE Workshop on Mobile Computing Systems and Applications 1999, February 1999, pp. 90-100. [12] Mahesh K. Marina and Samir R. Das,”On- Demand Multipath Distance Vector Routing in Ad Hoc Networks”, in IEEE Proceedings 2001. [13] C. E. Perkins, E. M. Royer, S. R. Das, and M. K. Marina,”Performance comparison of two on-demand routing protocols for ad hoc networks”,. IEEE Personal Commun. Mag., vol. 8, pp. 16.28, Feb. 2001. [14] J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva, “A performance comparison of multi-hop wireless ad hoc network [15] routing protocols”, in Proceeding. Int. Conf. on Mobile Computing and Networking, Oct. 1998. [16] C. E. Perkins, ed., Ad Hoc Networking, ch. 3. Addison Wesley, 2001. [17] Rohit Dube, Cynthia D. Rais, Kuang-Yeh Wang, and Satish K. Tripathi, “Signal stability based adaptive routing (SSA) for adhoc mobile networks”, in IEEE Personal Communication, February 1997, vol. 4. [18] Ian D. Chakeres and Elizabeth M. Belding- Royer, “The utility of hello messages for determining link connectivity”, in Proceedings of the 5th International Symposium on Wireless Personal Multimedia Communications (WPMC), Honolulu, Hawaii, October 2002. [19] T. Camp, J. Boleng, V. Davies, “A survey of mobility for ad hoc network research”, in Proc. WCMC, 2002, pp.483-502. [20] Michael Bahr, “Proposed Routing for IEEE 802.11s WLAN Mesh Networks”, In Proc. 2nd Annual International Wireless Internet Conference, 2006. [21] P Sambasivam, A Murthy, EM Belding,” Dynamically Adaptive Multipath Routing based on AODV”, In Proc. 3rd Annual, 2004- Citeseer [22] Rehman, H. Wolf, L. “Performance enhancement in AODV with accessibility prediction”, in mobile adhoc and sensor system, MASS 2007 IEEE International conference,pp 1-6 [23] http://www.isi.edu/nsnam/ns- build.html#allinone