SlideShare a Scribd company logo
International Journal of Computer Applications Technology and Research
Volume 2– Issue 3, 289 - 292, 2013
www.ijcat.com 289
A Multiparametric Reliable AODV Protocol using
Alternate Routing in MANET’s using NS-2
Sonal Beniwal
Department of Computer
Science and Engineering.
BPSMV, Khanpur Kalan
Sonepat,India
Pinki
Department of Computer
Science and Engineering.
BPSMV, Khanpur Kalan,
Sonepat,India
Rashmi Jatain
Department of Computer
Science and Engineering
UIET,MDU
Rohtak,India
Abstract: In this paper, we design and formulate a trust-based routing protocol for secure transactions, such as military and disaster
relief operations, banking in mobile ad hoc networks (MANETs). The proposed approach is showing the idea of a trust model in the
network layer of MANET.AODV is ad hoc on demand distance vector, this protocol starts the route specially when some node claims
to send data. In AODV whenever a link breaks an error message is sent indicating the link and packet sending is dropped. In our
proposed scheme a packet is sent through alternative path. In this approach a trust node is made with neighbors. Simulation results
shows that proposed scheme has less packet loss and packet ratio delivered is more.
Keywords:MANET,Ad hoc, AODV, Routing Algorithm, Reverse Route
1. INTRODUCTION
A mobile ad hoc network (MANET)is a kind of wireless
network without centralized administration or fixed network
infrastructure in which nodes communicate over relatively
bandwidth constrained wireless links and perform routing
discovery and routing maintenance in a self-organized way.
The topology of the MANET may change uncertainly and
rapidly due to the high mobility of the independent mobile
nodes, and because of the network decentralization, each node
in the MANET will act as a router to discover the topology.
Nowadays the MANET enables many promising applications
in the areas of emergency operations, disaster relief efforts.
The Mobile Ad hoc network is one of most commonly used
wireless network. As the number of user in this network
increases it also suffer from most of the network problems
like congestion, packet loss, intrusion etc. In case of multicast
such kind of problem is quite common. AODV is the most
efficient on demand protocol used in Mobile Adhoc network.
This protocol support efficient transmission in Multicast and
broadcast communication. It create a loop free efficient
routing. But because of some attack or the congestion it
provide higher loss. There is the requirement of some
improvement over the existing AODV protocol to provide the
secure and efficient communication over the network.
The Ad-hoc On-Demand Distance Vector (AODV) routing
protocol is designed for use in ad-hoc mobile networks.
AODV is a reactive protocol: the routes are created only when
they are needed. It uses traditional routing tables, one entry
per destination, and sequence numbers to determine whether
routing information is up-to-date and to prevent routing loops.
An important feature of AODV is the maintenance of time-
based states in each node: a routing entry not recently used is
expired. In case of a route is broken the neighbours can be
notified. Route discovery is based on query and reply cycles,
and route information is stored in all intermediate nodes along
the route in the form of route table entries. The following
control packets are used: routing request message (RREQ) is
broadcasted by a node requiring a route to another node,
routing reply message (RREP) is unicaste back to the source
of RREQ, and route error message (RERR) is sent to notify
other nodes of the loss of the link. HELLO messages are used
for detecting and monitoring links to neighbors.
AODV is a relative of the Bellmann-Ford distant vector
algorithm, but is adapted to work in a mobile environment.
AODV determines a route to a destination only when a node
wants to send a packet to that destination. Routes are
maintained as long as they are needed by the source.
Sequence numbers ensure the freshness of routes and
guarantee the loop-free routing.
The objective of this paper is route maintenance using
alternative path at each node. Study and analysis of different
Routing Protocol in Mobile Network. Implement the
TAODV protocol to identify reliable route based on trust level
analysis. Implementation of proposed Protocol in NS2
environment Analysis of proposed system using XGraph in
terms of throughput and packet loss.[2,6 ]
The remaining paper is described as section2 describes the
work related to AODV .The proposed scheme is described in
section3.Section4 represents the experimental results.Section5
represents the conclusion and then references.
2. RELATED WORK
Debdutta Barman Roy propose a new Intrusion Detection
System (IDS) based on Mobile Agents. The approach uses a
set of Mobile Agent (MA) that can move from one node to
another node within a network. This as a whole reduces
network bandwidth consumption by moving the computation
for data analysis to the location of the intrusion. Besides, it
has been established that the proposed method also decreases
the computation overhead in each node in the network. [1]
International Journal of Computer Applications Technology and Research
Volume 2– Issue 3, 289 - 292, 2013
www.ijcat.com 290
Shailender Gupta defined a work on selfish node detection. A
selfish node is one that tries to utilize the network resources
for its own profit but is reluctant to spend its own for others. If
such behaviour prevails among large number of the nodes in
the network, it may eventually lead to disruption of network.
This paper studies the impact of selfish nodes concentration
on the quality of service in MANETs. [2]
Md. Amir Khusru Akhtar presented a mathematical model to
detect the selfish node. In this paper Author are presenting the
mathematical model to detect selfish nodes using the
probability density function. The proposed model works with
existing routing protocol and the nodes that are suspected of
having the selfishness are given a Selfishness test. This model
formulates this problem with the help of prior probability and
continuous Bayes’ theorem.[3]
. Li Zhao performed a work to detect misbehaviour on data
and mitigate adverse effects, Author propose and evaluate a
Multipath Routing Single path transmission (MARS) scheme.
The MARS combines multipath routing, single path data
transmission, and end-to-end feedback mechanism together to
provide more comprehensive protection against misbehaviour
from individual or cooperating misbehaving nodes. [5]
Zougagh Hicham performed a comparative study of intrusion
detection in adhoc nework. In recent years, the use of mobile
ad hoc network (MANETs) has been widespread in many
applications. Due to its deployment nature, MANETs are
more vulnerable to malicious attack. The absolute security in
the mobile ad hoc network is very hard to achieve because of
its fundamental characteristics, such as dynamic topology,
open medium, absence of infrastructure, limited power and
limited bandwidth. In this article Author classify the
architecture for IDS that have so far been introduced for
MANETs, and then existing intrusion detection techniques in
MANETs presented and compared. Author then provide some
directions for future researches. [6,7,8]
Michael Wayne Probus performed a work on selfish node
isolation. This thesis will focus on the topic of Selfish Nodes
within a Mobile Ad-Hoc Networks (MANET), specifically
sensor networks due to their lower power and bandwidth. The
approach used is a reputation based algorithm to isolate the
selfish nodes from communication by using past history to
determine how reliable the node is. The reputation of each
node is determined by their behavior within the network. As a
node continuously acts selfishly, their reputation is decreased,
until finally meeting the minimum threshold; therefore they
are determined to be malicious. [11,12]
3. PROPOSED WORK
In this chapter basic AODV protocol is defined along with its
properties and the problem. The AODV protocol itself gives
the concept of network reconfiguration to provide the network
stability. The AODV protocol is capable to identify the
broken link over the network. As the broken link is identified,
it find the compromising path to perform the rerouting for
network communication .In this chapter the proposed model
is also defined with TAODV procol.In our proposed work we
are providing an early decision about the node stability:
1.Here each node will inform the node regarding the broken
link earlier because of this the route can be changed earlier.
2.A timeout based flooding will be performed by each node
periodically. If some node is not responding for n number of
trails then the decision will be taken that node is a bad node.
3.The bad node will be marked as the inactive node in routing
table and while communicating the earlier decision will be
taken regarding this.
4.As the bad node is identified an agent will be set as
neighbour to the bad node. The agent will keep watch on this
bad link or the node.
5.As the bad link get repaired the agent will inform the node
to perform communication from the initial path. [9,10]
In this present work we have improved the communication by
representing the node as an intelligent node. In this present
work the first time communication performed by the network
is same as of existing AODV.It means it will detect the attack
or the broken link in same way as of actual AODV. But once
the attack is detected it will enable the immediate previous
node to attack as the manager node that will track the attack
position or the attack node periodically. Till there is attack in
the network it will not allow the communication on that route.
It means it will identify the preventive path to communicate
from the alternate path or the node. As that manager node
identify that the broken link or attack is repaired dynamically,
it will start the communication from this previous path.
The proposed system will give the following benefits.
1.It not only dynamically reconfigure the network as the
attack found, it will also identify the dynamic repairing of the
network. If the network is repaired dynamically it will move
back to the previous effective path.
2.The nodes are taken as intelligent node and converted to
manager node as the attack found on their immediate
communication path or the node.
4.SIMULATION AND RESULTS
Hardware Used :
Processor : Pentium 5
Processor Speed : 1.5 GHZ
Memory(RAM) : 256 MB
Hard disk : 40 GB
Software Used :
Operating system : Linux 8.0
Language : OTcl
Software : NS 2.35
4.1.1 NS2 Overview
NS is a discrete event network simulator where the
timing of events is maintained by a scheduler and able to
simulate various types of network such as LAN and WPAN
according to the programming scripts written by the user. It
provides substantial support for simulation of TCP, routing
and multicast protocols over wired and wireless networks. It
consists of two simulation tools. The network simulator (ns)
contains all commonly used IP protocols. The network
animator (NAM) is graphical software which is used to
visualize the simulations. NS2 fully simulates a layered
International Journal of Computer Applications Technology and Research
Volume 2– Issue 3, 289 - 292, 2013
www.ijcat.com 291
network from the physical radio transmission channel to high-
level applications.
NS2 is an object-oriented simulator written in C++ and
OTcl (an object oriented extension of Tcl). The simulator
supports a class hierarchy in C++ and a similar class hierarchy
within the OTcl interpreter. There is a one-to-one
correspondence between a class in the interpreted hierarchy
and one in the compile hierarchy. The reason to use two
different programming languages is that OTcl is suitable for
the programs and configurations that demand frequent and
fast change while C++ is suitable for the programs that have
high demand in speed. NS2 is highly extensible. It not only
supports most commonly used IP protocols but also allows the
users to extend or implement their own protocols. The latest
NS2 version supports the four ad hoc routing protocols,
including DSR. It also provides powerful trace functionalities,
which are very important in our project since information
need to be logged for analysis. The full source code of NS2
can be downloaded and compiled for multiple platforms such
as UNIX, Windows etc.
4.1.2. Performance Metrics
a) Packet Lost : The total no. of packets dropped by the node
when there exist no route to destination.[13 ,14, 15]
b) Packet Delay : It is the average time a Packet takes to
reach from source to destination.
c) Bytes Transmitted : The rate of successfully transmitted
Bytes in the netwok during simulation.
4.1.3. Network Parameters
[1] Area [2] 784x569
[3] Routing Protocol [4] AODV
[5] MAC protocol [6] 802.11
[7] Number of Nodes [8] 26
[9] Queue Length [10] 50
[11] Antenna [12] OmniAntenna
4.2. Analysis Results:
Figure 4.1:Packet Lost (Existing Vs Proposed Approach)
Here figure 4.1 is showing the comparative analysis of packet
lost over the network. Here x axis represents the time and y
axis represents the packet transmitted. As we can see after
implementing the proposed approach the packet loss over the
network is decreased.
Figure 4.2 : Packet Delay (Existing Vs Proposed Approach)
Here figure 4.2 is showing the comparative analysis of Packet
Delay over the network.Here x axis represents the time and y
axis represents the Packet Delay of communication. As we
can see after implementing the proposed approach the Packet
Delay over the network is decreased.
International Journal of Computer Applications Technology and Research
Volume 2– Issue 3, 289 - 292, 2013
www.ijcat.com 292
Figure 4.3 :Bytes transmitted (Existing Vs Proposed
Approach)
Here figure 4.3 is showing the comparative analysis of bytes
transmitted over the network. Here x axis represents the time
and y axis represents the btes transmitted. As we can see after
implementing the proposed approach the bytes transmitted
over the network is increased.
5. CONCLUSION
In this present work we have shown the improvement over
AODV protocol to ensure the stability with less delay. In this
work we have provided the stability in case of broken link
reconfiguration. It means as the broken link is detected the
routing path is modified by the AODV protocol. But it does
not define to on the previous path back when the link is been
repaired. In this present work we have included the concept of
manager node. The manager node is maintained just previous
to the broken link node. The broken link node will keep a
watch on the link and check for its reconfiguration after a
short delay. As the link is repaired it will again change the
communication path to the previous routing path. The
presented work has provided the better stability within
efficient time and without using any extra rersources.
6. FUTURE SCOPE
In this present work we deal with the AODV protocol, but in
future we can use some other protocol to improve it respective
to the network stability. In this work we deal basically with
unicasting and the improvement can be done to check it for
multicasting. We can also try the same approach on different
scenarios also.
7.REFERENCES
[1] Michael Gerharz,” A Practical View on Quality-of-
Service Support in Wireless Ad Hoc Networks”,proceedings
of the 3rd IEEE Workshop onApplications 2003.
[2] Youngki Hwang,” An Adaptive QoS Routing Protocolwith
Dispersity for Ad-hoc Networks”, Proceedings of the 36th
Hawaii International Conference on System Sciences – 2003.
[3] Robert Akl,” NonuniformGrid-Based Coordinated Routing
in Wireless Sensor Networks”, Hindawi Publishing
Corporation Journal of Sensors, Hindawi Publishing
Corporation Journal of Sensors Volume 2009, Article ID
491349, 11 pages.
[4] Rajendiran M.,” An Improved Routing Algorithm to
Enhance Energy Efficiency in Multicast Ad Hoc Networks”,
European Journal of Scientific Research ISSN 1450-21, 2012.
[5] Sridhar K N,” Stability and Hop-Count based Approach
for Route Computation in MANET”, Computer
Communications and Networks, 2005. ICCCN, 17-19 Oct.
2005.
[6] Sima,” SIMULATION STUDY OF AODV&DSR”,
International Journal of Computing and Business Research
ISSN (Online) : 2229-6166 Volume 2 Issue 3 September
2011.
[7] Jyoti Jain,” OVERVIEW AND CHALLENGES OF
ROUTING PROTOCOL AND MAC LAYER IN MOBILE
AD-HOC NETWORK”, journal of Theoretical and Applied
Information Technology. © 2005 - 2009 JATIT.
[8] Aditya Kumar Mishra,’ Power-Aware Routing in Mobile
Ad Hoc Networks”,Proceedings of the 4th annual ACM/IEEE
international conference on MobileComputing and
Networking, October 1998.
[9] Anuradha Banerjee,” Fuzzy-Controlled Adaptive and
Intelligent Route (FAIR) Selection in Ad Hoc Networks”,
European Journal of Scientific Research. ISSN 1450-216X
Vol.45 No.3 (2010), pp.367-382.
[10] Hasnaa Moustafa,” Source Routing-based Multicast
Protocol for Mobile Ad hoc Networks”, 10th
International
Conference on Telecommunication Systems Modeling and
Analysis (ICTSM-10), October 2002.
[11] Michael Gerharz,” Link Stability in Mobile Wireless Ad
Hoc Networks”, Proc. of the 27th IEEE Conference on Local
Computer Networks (LCN), pp. 30-39, 2002
[12] Arash Dana,” A Reliable routing algorithm for Mobile
Adhoc Networks based on fuzzy logic”, International Journal
of Computer Science Issues Year: 2011 Vol: 8 Issue: 3 , 128-
133
[13] C. Venkatesh,” DYNAMIC SOURCE ROUTING
PROTOCOL USING FUZZY LOGIC CONCEPTS FOR AD
HOC NETWORKS”, In. Transactions of Academic Open
Internet Journal, Vol.15,pp 1-14. 2008[14] V. Bharathi,” A
Performance Enhancement of an Optimized Power Reactive
Routing based on AODV Protocol for Mobile AD-HOC
Network”, ©gopalax -International Journal of Technology
And Engineering System(IJTES) Jan – March 2011- Vol2
.No1.
[15] Panagiotis,” Path Set Selection in Mobile Ad Hoc
Networks”, ACM Mobihoc 2002, Lausanne, Switzerland,
June 2002.

More Related Content

PDF
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
ijdpsjournal
 
PDF
A novel defence scheme against selfish Node attack in manet
ijcsa
 
PDF
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
ijcncs
 
PDF
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
pijans
 
PDF
Ds35676681
IJERA Editor
 
PDF
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
IDES Editor
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
ijdpsjournal
 
A novel defence scheme against selfish Node attack in manet
ijcsa
 
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
ijcncs
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
pijans
 
Ds35676681
IJERA Editor
 
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
IDES Editor
 

What's hot (20)

PDF
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
IJERDJOURNAL
 
PDF
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
IJNSA Journal
 
PDF
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
IJARIIT
 
PDF
Paper id 311201512
IJRAT
 
PDF
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
cscpconf
 
PDF
B04660610
IOSR-JEN
 
PDF
A NOVEL METHODOLOGY TO OVERCOME ROUTING MISBEHAVIOR IN MANET USING RETALIATIO...
ijwmn
 
PDF
525 529
Editor IJARCET
 
PDF
Effect of multipath routing in autonomous mobile mesh networks
eSAT Journals
 
PDF
Optimised Proactive Link State Routing For DOS Attack Prevention
Editor IJCATR
 
PDF
Analytical Study of Cluster Based Routing Protocols in MANET
International Journal of Computer and Communication System Engineering
 
PDF
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
IJMER
 
PDF
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
IRJET Journal
 
PDF
E0942531
IOSR Journals
 
PDF
A2546035115
Prafull Maktedar
 
PDF
Credit risk value based detection of multiple selfish node attacks in cogniti...
eSAT Publishing House
 
PDF
Cv31424430
IJMER
 
PDF
F04503057062
ijceronline
 
PDF
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
ijsptm
 
PDF
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
IJET - International Journal of Engineering and Techniques
 
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
IJERDJOURNAL
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
IJNSA Journal
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
IJARIIT
 
Paper id 311201512
IJRAT
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
cscpconf
 
B04660610
IOSR-JEN
 
A NOVEL METHODOLOGY TO OVERCOME ROUTING MISBEHAVIOR IN MANET USING RETALIATIO...
ijwmn
 
Effect of multipath routing in autonomous mobile mesh networks
eSAT Journals
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Editor IJCATR
 
Analytical Study of Cluster Based Routing Protocols in MANET
International Journal of Computer and Communication System Engineering
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
IJMER
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
IRJET Journal
 
E0942531
IOSR Journals
 
A2546035115
Prafull Maktedar
 
Credit risk value based detection of multiple selfish node attacks in cogniti...
eSAT Publishing House
 
Cv31424430
IJMER
 
F04503057062
ijceronline
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
ijsptm
 
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
IJET - International Journal of Engineering and Techniques
 
Ad

Viewers also liked (14)

PDF
An Evaluation of Two-Step Techniques for Positive- Unlabeled Learning in Text...
Editor IJCATR
 
PDF
A new Approach towards Cost and Benefit Enterprise Architecture Analysis
Editor IJCATR
 
PDF
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Editor IJCATR
 
PDF
Intrusion Detection System Using Self Organizing Map Algorithms
Editor IJCATR
 
PDF
DNA Query Language DNAQL: A Novel Approach
Editor IJCATR
 
PDF
Protecting Global Records Sharing with Identity Based Access Control List
Editor IJCATR
 
PDF
Authenticating Location Based Skyline Queries in Mobile Environment
Editor IJCATR
 
PDF
Study of Cross-Site Scripting Attacks and Their Countermeasures
Editor IJCATR
 
PDF
An Efficient Framework for Predicting and Recommending M-Commerce Patterns Ba...
Editor IJCATR
 
PDF
Performance Analysis for Parallel MRA in Heterogeneous Wireless Networks
Editor IJCATR
 
PDF
Tagging based Efficient Web Video Event Categorization
Editor IJCATR
 
PDF
Identifying the Number of Visitors to improve Website Usability from Educatio...
Editor IJCATR
 
PDF
Data Mining in the World of BIG Data-A Survey
Editor IJCATR
 
PDF
A Survey on the Classification Techniques In Educational Data Mining
Editor IJCATR
 
An Evaluation of Two-Step Techniques for Positive- Unlabeled Learning in Text...
Editor IJCATR
 
A new Approach towards Cost and Benefit Enterprise Architecture Analysis
Editor IJCATR
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Editor IJCATR
 
Intrusion Detection System Using Self Organizing Map Algorithms
Editor IJCATR
 
DNA Query Language DNAQL: A Novel Approach
Editor IJCATR
 
Protecting Global Records Sharing with Identity Based Access Control List
Editor IJCATR
 
Authenticating Location Based Skyline Queries in Mobile Environment
Editor IJCATR
 
Study of Cross-Site Scripting Attacks and Their Countermeasures
Editor IJCATR
 
An Efficient Framework for Predicting and Recommending M-Commerce Patterns Ba...
Editor IJCATR
 
Performance Analysis for Parallel MRA in Heterogeneous Wireless Networks
Editor IJCATR
 
Tagging based Efficient Web Video Event Categorization
Editor IJCATR
 
Identifying the Number of Visitors to improve Website Usability from Educatio...
Editor IJCATR
 
Data Mining in the World of BIG Data-A Survey
Editor IJCATR
 
A Survey on the Classification Techniques In Educational Data Mining
Editor IJCATR
 
Ad

Similar to A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s using NS-2 (20)

PDF
A New Energy Efficient Approach in MANETs: A Review
BRNSSPublicationHubI
 
PDF
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...
pijans
 
PDF
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
PDF
Hd3612761280
IJERA Editor
 
PDF
Hu3114871491
IJERA Editor
 
PDF
Energy efficiency cross layer protocol for wireless mesh network
IJCNCJournal
 
PDF
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
IJCNCJournal
 
PDF
eaodv
Chandu Chiru
 
PDF
Multipath Fault Tolerant Routing Protocol in MANET
pijans
 
PPTX
Review on design of advanced opportunistics routing in manet
yatin1988
 
PDF
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
ijsrd.com
 
PDF
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
pijans
 
PDF
A Survey of Enhanced Routing Protocols for Manets
pijans
 
PDF
Link Reliability based Detection and Predecessor base Route Establishment for...
IJERA Editor
 
PDF
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
IJCNCJournal
 
PDF
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
ijsrd.com
 
PDF
Security Enhancement in AODV Routing Protocol for MANETs
idescitation
 
PDF
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
ijceronline
 
PDF
Distance’s quantification
csandit
 
PDF
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
pijans
 
A New Energy Efficient Approach in MANETs: A Review
BRNSSPublicationHubI
 
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...
pijans
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
Hd3612761280
IJERA Editor
 
Hu3114871491
IJERA Editor
 
Energy efficiency cross layer protocol for wireless mesh network
IJCNCJournal
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
IJCNCJournal
 
Multipath Fault Tolerant Routing Protocol in MANET
pijans
 
Review on design of advanced opportunistics routing in manet
yatin1988
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
ijsrd.com
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
pijans
 
A Survey of Enhanced Routing Protocols for Manets
pijans
 
Link Reliability based Detection and Predecessor base Route Establishment for...
IJERA Editor
 
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
IJCNCJournal
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
ijsrd.com
 
Security Enhancement in AODV Routing Protocol for MANETs
idescitation
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
ijceronline
 
Distance’s quantification
csandit
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
pijans
 

More from Editor IJCATR (20)

PDF
Advancements in Structural Integrity: Enhancing Frame Strength and Compressio...
Editor IJCATR
 
PDF
Maritime Cybersecurity: Protecting Critical Infrastructure in The Digital Age
Editor IJCATR
 
PDF
Leveraging Machine Learning for Proactive Threat Analysis in Cybersecurity
Editor IJCATR
 
PDF
Leveraging Topological Data Analysis and AI for Advanced Manufacturing: Integ...
Editor IJCATR
 
PDF
Leveraging AI and Principal Component Analysis (PCA) For In-Depth Analysis in...
Editor IJCATR
 
PDF
The Intersection of Artificial Intelligence and Cybersecurity: Safeguarding D...
Editor IJCATR
 
PDF
Leveraging AI and Deep Learning in Predictive Genomics for MPOX Virus Researc...
Editor IJCATR
 
PDF
Text Mining in Digital Libraries using OKAPI BM25 Model
Editor IJCATR
 
PDF
Green Computing, eco trends, climate change, e-waste and eco-friendly
Editor IJCATR
 
PDF
Policies for Green Computing and E-Waste in Nigeria
Editor IJCATR
 
PDF
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Editor IJCATR
 
PDF
Optimum Location of DG Units Considering Operation Conditions
Editor IJCATR
 
PDF
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Editor IJCATR
 
PDF
Web Scraping for Estimating new Record from Source Site
Editor IJCATR
 
PDF
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Editor IJCATR
 
PDF
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Editor IJCATR
 
PDF
A Strategy for Improving the Performance of Small Files in Openstack Swift
Editor IJCATR
 
PDF
Integrated System for Vehicle Clearance and Registration
Editor IJCATR
 
PDF
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Editor IJCATR
 
PDF
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Editor IJCATR
 
Advancements in Structural Integrity: Enhancing Frame Strength and Compressio...
Editor IJCATR
 
Maritime Cybersecurity: Protecting Critical Infrastructure in The Digital Age
Editor IJCATR
 
Leveraging Machine Learning for Proactive Threat Analysis in Cybersecurity
Editor IJCATR
 
Leveraging Topological Data Analysis and AI for Advanced Manufacturing: Integ...
Editor IJCATR
 
Leveraging AI and Principal Component Analysis (PCA) For In-Depth Analysis in...
Editor IJCATR
 
The Intersection of Artificial Intelligence and Cybersecurity: Safeguarding D...
Editor IJCATR
 
Leveraging AI and Deep Learning in Predictive Genomics for MPOX Virus Researc...
Editor IJCATR
 
Text Mining in Digital Libraries using OKAPI BM25 Model
Editor IJCATR
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Editor IJCATR
 
Policies for Green Computing and E-Waste in Nigeria
Editor IJCATR
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Editor IJCATR
 
Optimum Location of DG Units Considering Operation Conditions
Editor IJCATR
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Editor IJCATR
 
Web Scraping for Estimating new Record from Source Site
Editor IJCATR
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Editor IJCATR
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Editor IJCATR
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
Editor IJCATR
 
Integrated System for Vehicle Clearance and Registration
Editor IJCATR
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Editor IJCATR
 

Recently uploaded (20)

PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PPTX
CDH. pptx
AneetaSharma15
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PPTX
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
CDH. pptx
AneetaSharma15
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
How to Apply for a Job From Odoo 18 Website
Celine George
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 

A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s using NS-2

  • 1. International Journal of Computer Applications Technology and Research Volume 2– Issue 3, 289 - 292, 2013 www.ijcat.com 289 A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s using NS-2 Sonal Beniwal Department of Computer Science and Engineering. BPSMV, Khanpur Kalan Sonepat,India Pinki Department of Computer Science and Engineering. BPSMV, Khanpur Kalan, Sonepat,India Rashmi Jatain Department of Computer Science and Engineering UIET,MDU Rohtak,India Abstract: In this paper, we design and formulate a trust-based routing protocol for secure transactions, such as military and disaster relief operations, banking in mobile ad hoc networks (MANETs). The proposed approach is showing the idea of a trust model in the network layer of MANET.AODV is ad hoc on demand distance vector, this protocol starts the route specially when some node claims to send data. In AODV whenever a link breaks an error message is sent indicating the link and packet sending is dropped. In our proposed scheme a packet is sent through alternative path. In this approach a trust node is made with neighbors. Simulation results shows that proposed scheme has less packet loss and packet ratio delivered is more. Keywords:MANET,Ad hoc, AODV, Routing Algorithm, Reverse Route 1. INTRODUCTION A mobile ad hoc network (MANET)is a kind of wireless network without centralized administration or fixed network infrastructure in which nodes communicate over relatively bandwidth constrained wireless links and perform routing discovery and routing maintenance in a self-organized way. The topology of the MANET may change uncertainly and rapidly due to the high mobility of the independent mobile nodes, and because of the network decentralization, each node in the MANET will act as a router to discover the topology. Nowadays the MANET enables many promising applications in the areas of emergency operations, disaster relief efforts. The Mobile Ad hoc network is one of most commonly used wireless network. As the number of user in this network increases it also suffer from most of the network problems like congestion, packet loss, intrusion etc. In case of multicast such kind of problem is quite common. AODV is the most efficient on demand protocol used in Mobile Adhoc network. This protocol support efficient transmission in Multicast and broadcast communication. It create a loop free efficient routing. But because of some attack or the congestion it provide higher loss. There is the requirement of some improvement over the existing AODV protocol to provide the secure and efficient communication over the network. The Ad-hoc On-Demand Distance Vector (AODV) routing protocol is designed for use in ad-hoc mobile networks. AODV is a reactive protocol: the routes are created only when they are needed. It uses traditional routing tables, one entry per destination, and sequence numbers to determine whether routing information is up-to-date and to prevent routing loops. An important feature of AODV is the maintenance of time- based states in each node: a routing entry not recently used is expired. In case of a route is broken the neighbours can be notified. Route discovery is based on query and reply cycles, and route information is stored in all intermediate nodes along the route in the form of route table entries. The following control packets are used: routing request message (RREQ) is broadcasted by a node requiring a route to another node, routing reply message (RREP) is unicaste back to the source of RREQ, and route error message (RERR) is sent to notify other nodes of the loss of the link. HELLO messages are used for detecting and monitoring links to neighbors. AODV is a relative of the Bellmann-Ford distant vector algorithm, but is adapted to work in a mobile environment. AODV determines a route to a destination only when a node wants to send a packet to that destination. Routes are maintained as long as they are needed by the source. Sequence numbers ensure the freshness of routes and guarantee the loop-free routing. The objective of this paper is route maintenance using alternative path at each node. Study and analysis of different Routing Protocol in Mobile Network. Implement the TAODV protocol to identify reliable route based on trust level analysis. Implementation of proposed Protocol in NS2 environment Analysis of proposed system using XGraph in terms of throughput and packet loss.[2,6 ] The remaining paper is described as section2 describes the work related to AODV .The proposed scheme is described in section3.Section4 represents the experimental results.Section5 represents the conclusion and then references. 2. RELATED WORK Debdutta Barman Roy propose a new Intrusion Detection System (IDS) based on Mobile Agents. The approach uses a set of Mobile Agent (MA) that can move from one node to another node within a network. This as a whole reduces network bandwidth consumption by moving the computation for data analysis to the location of the intrusion. Besides, it has been established that the proposed method also decreases the computation overhead in each node in the network. [1]
  • 2. International Journal of Computer Applications Technology and Research Volume 2– Issue 3, 289 - 292, 2013 www.ijcat.com 290 Shailender Gupta defined a work on selfish node detection. A selfish node is one that tries to utilize the network resources for its own profit but is reluctant to spend its own for others. If such behaviour prevails among large number of the nodes in the network, it may eventually lead to disruption of network. This paper studies the impact of selfish nodes concentration on the quality of service in MANETs. [2] Md. Amir Khusru Akhtar presented a mathematical model to detect the selfish node. In this paper Author are presenting the mathematical model to detect selfish nodes using the probability density function. The proposed model works with existing routing protocol and the nodes that are suspected of having the selfishness are given a Selfishness test. This model formulates this problem with the help of prior probability and continuous Bayes’ theorem.[3] . Li Zhao performed a work to detect misbehaviour on data and mitigate adverse effects, Author propose and evaluate a Multipath Routing Single path transmission (MARS) scheme. The MARS combines multipath routing, single path data transmission, and end-to-end feedback mechanism together to provide more comprehensive protection against misbehaviour from individual or cooperating misbehaving nodes. [5] Zougagh Hicham performed a comparative study of intrusion detection in adhoc nework. In recent years, the use of mobile ad hoc network (MANETs) has been widespread in many applications. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The absolute security in the mobile ad hoc network is very hard to achieve because of its fundamental characteristics, such as dynamic topology, open medium, absence of infrastructure, limited power and limited bandwidth. In this article Author classify the architecture for IDS that have so far been introduced for MANETs, and then existing intrusion detection techniques in MANETs presented and compared. Author then provide some directions for future researches. [6,7,8] Michael Wayne Probus performed a work on selfish node isolation. This thesis will focus on the topic of Selfish Nodes within a Mobile Ad-Hoc Networks (MANET), specifically sensor networks due to their lower power and bandwidth. The approach used is a reputation based algorithm to isolate the selfish nodes from communication by using past history to determine how reliable the node is. The reputation of each node is determined by their behavior within the network. As a node continuously acts selfishly, their reputation is decreased, until finally meeting the minimum threshold; therefore they are determined to be malicious. [11,12] 3. PROPOSED WORK In this chapter basic AODV protocol is defined along with its properties and the problem. The AODV protocol itself gives the concept of network reconfiguration to provide the network stability. The AODV protocol is capable to identify the broken link over the network. As the broken link is identified, it find the compromising path to perform the rerouting for network communication .In this chapter the proposed model is also defined with TAODV procol.In our proposed work we are providing an early decision about the node stability: 1.Here each node will inform the node regarding the broken link earlier because of this the route can be changed earlier. 2.A timeout based flooding will be performed by each node periodically. If some node is not responding for n number of trails then the decision will be taken that node is a bad node. 3.The bad node will be marked as the inactive node in routing table and while communicating the earlier decision will be taken regarding this. 4.As the bad node is identified an agent will be set as neighbour to the bad node. The agent will keep watch on this bad link or the node. 5.As the bad link get repaired the agent will inform the node to perform communication from the initial path. [9,10] In this present work we have improved the communication by representing the node as an intelligent node. In this present work the first time communication performed by the network is same as of existing AODV.It means it will detect the attack or the broken link in same way as of actual AODV. But once the attack is detected it will enable the immediate previous node to attack as the manager node that will track the attack position or the attack node periodically. Till there is attack in the network it will not allow the communication on that route. It means it will identify the preventive path to communicate from the alternate path or the node. As that manager node identify that the broken link or attack is repaired dynamically, it will start the communication from this previous path. The proposed system will give the following benefits. 1.It not only dynamically reconfigure the network as the attack found, it will also identify the dynamic repairing of the network. If the network is repaired dynamically it will move back to the previous effective path. 2.The nodes are taken as intelligent node and converted to manager node as the attack found on their immediate communication path or the node. 4.SIMULATION AND RESULTS Hardware Used : Processor : Pentium 5 Processor Speed : 1.5 GHZ Memory(RAM) : 256 MB Hard disk : 40 GB Software Used : Operating system : Linux 8.0 Language : OTcl Software : NS 2.35 4.1.1 NS2 Overview NS is a discrete event network simulator where the timing of events is maintained by a scheduler and able to simulate various types of network such as LAN and WPAN according to the programming scripts written by the user. It provides substantial support for simulation of TCP, routing and multicast protocols over wired and wireless networks. It consists of two simulation tools. The network simulator (ns) contains all commonly used IP protocols. The network animator (NAM) is graphical software which is used to visualize the simulations. NS2 fully simulates a layered
  • 3. International Journal of Computer Applications Technology and Research Volume 2– Issue 3, 289 - 292, 2013 www.ijcat.com 291 network from the physical radio transmission channel to high- level applications. NS2 is an object-oriented simulator written in C++ and OTcl (an object oriented extension of Tcl). The simulator supports a class hierarchy in C++ and a similar class hierarchy within the OTcl interpreter. There is a one-to-one correspondence between a class in the interpreted hierarchy and one in the compile hierarchy. The reason to use two different programming languages is that OTcl is suitable for the programs and configurations that demand frequent and fast change while C++ is suitable for the programs that have high demand in speed. NS2 is highly extensible. It not only supports most commonly used IP protocols but also allows the users to extend or implement their own protocols. The latest NS2 version supports the four ad hoc routing protocols, including DSR. It also provides powerful trace functionalities, which are very important in our project since information need to be logged for analysis. The full source code of NS2 can be downloaded and compiled for multiple platforms such as UNIX, Windows etc. 4.1.2. Performance Metrics a) Packet Lost : The total no. of packets dropped by the node when there exist no route to destination.[13 ,14, 15] b) Packet Delay : It is the average time a Packet takes to reach from source to destination. c) Bytes Transmitted : The rate of successfully transmitted Bytes in the netwok during simulation. 4.1.3. Network Parameters [1] Area [2] 784x569 [3] Routing Protocol [4] AODV [5] MAC protocol [6] 802.11 [7] Number of Nodes [8] 26 [9] Queue Length [10] 50 [11] Antenna [12] OmniAntenna 4.2. Analysis Results: Figure 4.1:Packet Lost (Existing Vs Proposed Approach) Here figure 4.1 is showing the comparative analysis of packet lost over the network. Here x axis represents the time and y axis represents the packet transmitted. As we can see after implementing the proposed approach the packet loss over the network is decreased. Figure 4.2 : Packet Delay (Existing Vs Proposed Approach) Here figure 4.2 is showing the comparative analysis of Packet Delay over the network.Here x axis represents the time and y axis represents the Packet Delay of communication. As we can see after implementing the proposed approach the Packet Delay over the network is decreased.
  • 4. International Journal of Computer Applications Technology and Research Volume 2– Issue 3, 289 - 292, 2013 www.ijcat.com 292 Figure 4.3 :Bytes transmitted (Existing Vs Proposed Approach) Here figure 4.3 is showing the comparative analysis of bytes transmitted over the network. Here x axis represents the time and y axis represents the btes transmitted. As we can see after implementing the proposed approach the bytes transmitted over the network is increased. 5. CONCLUSION In this present work we have shown the improvement over AODV protocol to ensure the stability with less delay. In this work we have provided the stability in case of broken link reconfiguration. It means as the broken link is detected the routing path is modified by the AODV protocol. But it does not define to on the previous path back when the link is been repaired. In this present work we have included the concept of manager node. The manager node is maintained just previous to the broken link node. The broken link node will keep a watch on the link and check for its reconfiguration after a short delay. As the link is repaired it will again change the communication path to the previous routing path. The presented work has provided the better stability within efficient time and without using any extra rersources. 6. FUTURE SCOPE In this present work we deal with the AODV protocol, but in future we can use some other protocol to improve it respective to the network stability. In this work we deal basically with unicasting and the improvement can be done to check it for multicasting. We can also try the same approach on different scenarios also. 7.REFERENCES [1] Michael Gerharz,” A Practical View on Quality-of- Service Support in Wireless Ad Hoc Networks”,proceedings of the 3rd IEEE Workshop onApplications 2003. [2] Youngki Hwang,” An Adaptive QoS Routing Protocolwith Dispersity for Ad-hoc Networks”, Proceedings of the 36th Hawaii International Conference on System Sciences – 2003. [3] Robert Akl,” NonuniformGrid-Based Coordinated Routing in Wireless Sensor Networks”, Hindawi Publishing Corporation Journal of Sensors, Hindawi Publishing Corporation Journal of Sensors Volume 2009, Article ID 491349, 11 pages. [4] Rajendiran M.,” An Improved Routing Algorithm to Enhance Energy Efficiency in Multicast Ad Hoc Networks”, European Journal of Scientific Research ISSN 1450-21, 2012. [5] Sridhar K N,” Stability and Hop-Count based Approach for Route Computation in MANET”, Computer Communications and Networks, 2005. ICCCN, 17-19 Oct. 2005. [6] Sima,” SIMULATION STUDY OF AODV&DSR”, International Journal of Computing and Business Research ISSN (Online) : 2229-6166 Volume 2 Issue 3 September 2011. [7] Jyoti Jain,” OVERVIEW AND CHALLENGES OF ROUTING PROTOCOL AND MAC LAYER IN MOBILE AD-HOC NETWORK”, journal of Theoretical and Applied Information Technology. © 2005 - 2009 JATIT. [8] Aditya Kumar Mishra,’ Power-Aware Routing in Mobile Ad Hoc Networks”,Proceedings of the 4th annual ACM/IEEE international conference on MobileComputing and Networking, October 1998. [9] Anuradha Banerjee,” Fuzzy-Controlled Adaptive and Intelligent Route (FAIR) Selection in Ad Hoc Networks”, European Journal of Scientific Research. ISSN 1450-216X Vol.45 No.3 (2010), pp.367-382. [10] Hasnaa Moustafa,” Source Routing-based Multicast Protocol for Mobile Ad hoc Networks”, 10th International Conference on Telecommunication Systems Modeling and Analysis (ICTSM-10), October 2002. [11] Michael Gerharz,” Link Stability in Mobile Wireless Ad Hoc Networks”, Proc. of the 27th IEEE Conference on Local Computer Networks (LCN), pp. 30-39, 2002 [12] Arash Dana,” A Reliable routing algorithm for Mobile Adhoc Networks based on fuzzy logic”, International Journal of Computer Science Issues Year: 2011 Vol: 8 Issue: 3 , 128- 133 [13] C. Venkatesh,” DYNAMIC SOURCE ROUTING PROTOCOL USING FUZZY LOGIC CONCEPTS FOR AD HOC NETWORKS”, In. Transactions of Academic Open Internet Journal, Vol.15,pp 1-14. 2008[14] V. Bharathi,” A Performance Enhancement of an Optimized Power Reactive Routing based on AODV Protocol for Mobile AD-HOC Network”, ©gopalax -International Journal of Technology And Engineering System(IJTES) Jan – March 2011- Vol2 .No1. [15] Panagiotis,” Path Set Selection in Mobile Ad Hoc Networks”, ACM Mobihoc 2002, Lausanne, Switzerland, June 2002.