scholarly journals Reduction in Path Failures by Adopting Multi-Channel Multi -Path in Routing For Dynamic Activity of Primary Users

2018 ◽  
Vol 7 (4.5) ◽  
pp. 233
Author(s):  
Priyank Mishra ◽  
Brajesh Kumar Tiwari

The Cognitive radio (CR) expertise has been recently proposed to deal with the spectrum shortage problem resulted by inappropriate spectrum supervision policies by enabling unauthorized users to use the authorized spectrum band in opportunistic and non-intrusive vigilant approach. In CRAHNs, the data routing is one of the main challenge as the channel accessibility and the activity of primary users are unpredictable. In this article, a new algorithm is proposed which counteracts the problem of path failure by adopting multi-channel multi-path reverse route for RREP packets. The protocol utilizes the hybrid of path and spectrum diversity techniques in routing. The performance assessment is conducted through simulation using the NS-2 simulator. The performance of the proposed protocol is compared with CAODV and D2CARP protocols in terms of packet delivery ratio, average energy, end-to-end delay, throughput, overhead and hop-count. The simulation consequences prove that the proposed protocol do better than CAODV and D2CARP in terms of the above mentioned performance metrics. 

2020 ◽  
Vol 10 (17) ◽  
pp. 5759 ◽  
Author(s):  
Ravie Chandren Muniyandi ◽  
Faizan Qamar ◽  
Ahmed Naeem Jasim

Vehicle Ad-Hoc Network (VANET) is a dynamic decentralized network that consists of various wireless mobile vehicles with no individual user management. Several routing protocols can be used for VANETs, for example, the Location-Aided Routing (LAR) protocol that utilizes location information provided by the Global Positioning System (GPS) sensors. It can help to reduce the search space for the desired route—limiting the search space results in fewer route discovery messages. However, two essential aspects are ignored while applying the LAR protocol in the VANET-based environment. Firstly, the LAR does not exploit the fact that nodes in VANET do not have pure random movement. In other words, nodes in LAR predict the position of destination node by ignoring the fact that the pre-defined constraint on the destination node navigation is met. Secondly, the nodes in the conventional LAR (or simply stated as LAR) protocol use the location information of the destination node before selecting the route location, which is most likely to expire because of the fast movement of the nodes in the VANET environment. This study presents an estimation based on a heuristic approach that was developed to reject weak GPS location data and accept accurate ones. The proposed routing protocol stated as Rectangle-Aided LAR (RALAR) is based on a moving rectangular zone according to the node′s mobility model. Additionally, the proposed RALAR protocol was optimized by using the Genetic Algorithm (GA) by selecting the most suitable time-out variable. The results were compared with LAR and Kalman-Filter Aided-LAR (KALAR), the most commonly utilized protocols in VANET for performance metrics using Packet Delivery Ratio (PDR), average End-to-End Delay (E2E Delay), routing overhead and average energy consumption. The results showed that the proposed RALAR protocol achieved an improvement over the KALAR in terms of PDR of 4.7%, average E2E delay of 60%, routing overhead of 15.5%, and 10.7% of energy consumption. The results proved that the performance of the RALAR protocol had outperformed the KALAR and LAR protocol in terms of regular network performance measures in the VANET environment.


Path stability of the mobile nodes in MANET plays a vital role in effective data dissemination as it depends on factors such as mobility, energy, signal strength. Several studies reveal that the prediction of path stability might provide solutions thereby routing performance can be increased. In most of the protocols route selection is based on metrics namely hop count, energy, etc. The metric namely mobility factor “MF” is used in some of the protocols. These protocols include nodes with less energy or nodes with high mobility which results in loss of path in a short period of time. Since it preserves the neighbor’s history, more control overhead and maintenance complexity exist. Hence, a new metric namely Active Interactive new Neighbor Rate (AINR) has been considered for optimum path selection. In scenarios of path loss, there is an immediate need for alternative paths for continuous data transfer. From literature it is evident that fuzzy logic is more significant in exploring different possible states under path stability determination. Hence a new prediction mechanism based on fuzzy logic has been proposed by considering the Residual Energy (RE), Hop count (Hop) and proposed metric Active Interactive new Neighbor Rate (AINR) as the factors for the prediction of the optimal path. This prediction mechanism is leveraged in MANET scenarios where alternate paths should be available on hand in situations such as battlefield and natural disaster. From the simulation, it has been proved that fuzzy logic prediction model provides better results in terms of various performance metrics such as Throughput, Packet delivery ratio, End-to-end delay, Energy consumption and routing overhead than the existing protocols.


2020 ◽  
Vol 14 ◽  
Author(s):  
S. Mahima ◽  
N. Rajendran

: Mobile ad hoc networks (MANET) hold a set of numerous mobile computing devices useful for communication with one another with no centralized control. Due to the inherent features of MANET such as dynamic topology, constrained on bandwidth, energy and computing resources, there is a need to design the routing protocols efficiently. Flooding is a directive for managing traffic since it makes use of only chosen nodes for transmitting data from one node to another. This paper intends to develop a new Cluster-Based Flooding using Fuzzy Logic Scheme (CBF2S). To construct clusters and choose proper cluster heads (CHs), thefuzzy logic approach is applied with the use of three parameters namely link quality, node mobility and node degree. The presented model considerably minimizes the number of retransmissions in the network. The presented model instructs the cluster members (CM) floods the packets inside a cluster called intra-cluster flooding and CHs floods the packets among the clusters called inter-cluster flooding. In addition, the gateway sends a packet to another gateway for minimizing unwanted data retransmissions when it comes under different CH. The presented CBF2S is simulated using NS2 tool under the presence of varying hop count. The CBF2S model exhibits maximum results over the other methods interms of overhead, communication overhead, traffic load, packet delivery ratio and the end to end delay.


Sensors ◽  
2021 ◽  
Vol 21 (6) ◽  
pp. 1942
Author(s):  
Rogaia Mhemed ◽  
Frank Comeau ◽  
William Phillips ◽  
Nauman Aslam

Much attention has been focused lately on the Opportunistic Routing technique (OR) that can overcome the restrictions of the harsh underwater environment and the unique structures of the Underwater Sensor Networks (UWSNs). OR enhances the performance of the UWSNs in both packet delivery ratio and energy saving. In our work; we propose a new routing protocol; called Energy Efficient Depth-based Opportunistic Routing with Void Avoidance for UWSNs (EEDOR-VA), to address the void area problem. EEDOR-VA is a reactive OR protocol that uses a hop count discovery procedure to update the hop count of the intermediate nodes between the source and the destination to form forwarding sets. EEDOR-VA forwarding sets can be selected with less or greater depth than the packet holder (i.e., source or intermediate node). It efficiently prevents all void/trapped nodes from being part of the forwarding sets and data transmission procedure; thereby saving network resources and delivering data packets at the lowest possible cost. The results of our extensive simulation study indicate that the EEDOR-VA protocol outperforms other protocols in terms of packet delivery ratio and energy consumption


2020 ◽  
Vol 26 (11) ◽  
pp. 1366-1381
Author(s):  
Sathishkumar Natesan ◽  
Rajakumar Krishnan

The Routing Protocol for Low Power and Lossy Networks (RPL) is operated by gadgets comprised of many devices of embedded type with limited energy, memory as well as resources that do their process. The improvements in the life of the network and energy conservation are the key challenging features in Low Power and Lossy Networks (LLN). Obviously, the LLN has a key strategic part in routing. The Internet of Things (IoT) device is expected to make the apt choice. In LLN, the poor routing choice leads to traffic congestion, reduction in power as well as packet loss ratio. The task in the proposal analyzes Delay (D), Load (L) and Battery Discharge Index (BDI) pivoted Energy Efficient Composite Metric Routing (EECMR) protocol for LLN. The performance of the work in the proposal is evaluated by the COOJA simulator. It outperforms with respect to Network Lifetime (NL), Delay as well as Packet Delivery Ratio (PDR) contrasted to the routing metrics like Traffic Load (TL), Link Quality (LQ), Residual Energy (RE), RE-Battery Discharge Index (RE-BDI) and Hop Count (HC).


2021 ◽  
Vol 6 (9 (114)) ◽  
pp. 6-14
Author(s):  
Shaymaa Kadhim Mohsin ◽  
Maysoon A. Mohammed ◽  
Helaa Mohammed Yassien

Bluetooth uses 2.4 GHz in ISM (industrial, scientific, and medical) band, which it shares with other wireless operating system technologies like ZigBee and WLAN. The Bluetooth core design comprises a low-energy version of a low-rate wireless personal area network and supports point-to-point or point-to-multipoint connections. The aim of the study is to develop a Bluetooth mesh flooding and to estimate packet delivery ratio in wireless sensor networks to model asynchronous transmissions including a visual representation of a mesh network, node-related statistics, and a packet delivery ratio (PDR). This work provides a platform for Bluetooth networking by analyzing the flooding of the network layers and configuring the architecture of a multi-node Bluetooth mesh. Five simulation scenarios have been presented to evaluate the network flooding performance. These scenarios have been performed over an area of 200×200 meters including 81 randomly distributed nodes including different Relay/End node configurations and source-destination linking between nodes. The results indicate that the proposed approach can create a pathway between the source node and destination node within a mesh network of randomly distributed End and Relay nodes using MATLAB environment. The results include probability calculation of getting a linking between two nodes based on Monte Carlo method, which was 88.7428 %, while the Average-hop-count linking between these nodes was 8. Based on the conducted survey, this is the first study to examine and demonstrate Bluetooth mesh flooding and estimate packet delivery ratio in wireless sensor networks


2021 ◽  
Author(s):  
Rahul Johari ◽  
Tanvi Gautam

Abstract Natural calamities leave people helpless by arising several situations such as network breakdown, zero communication, intermittent connectivity, dynamic network topology. In such situation an application of dynamic and intermittent routing scheme is essential to make further communication possible during likewise scenarios. An application of TCP/IP becomes futile in mentioned circumstances as it best works for static nodes and pre-defined network topology wherein source and destination nodes are first establishing the communication link with each other. An alternative measure of such hitches is to encounter an application of DTN protocol which possess all characteristics to withstand in such scenarios such as; dynamic network topology, intermittent connectivity, frequent path breaks, store – carry – forward fashion. In this paper we did thorough investigation of forest fire dataset (Uttarakhand) after exploring its implementation in ONE with Epidemic, Prophet, Spray and Wait, HBPR, GAER respectively. An extensive and thorough investigation for real world traces implementation has been done with OppNet routing protocols against mobility models namely; Shortest path map – based, Random Direction, Random Walk, Random Waypoint, Cluster Movement respectively for network performance metrics namely packet delivery ratio, packet overhead ratio and average latency ratio respectively with the application of K means clustering machine learning algorithm. With the help of this analysis, we explore the real-world traces characteristics and study the areas on which network performance can be improved.


Author(s):  
Gajanan Madhavrao Walunjkar ◽  
Anne Koteswara Rao ◽  
V. Srinivasa Rao

Effective disaster management is required for the peoples who are trapped in the disaster scenario but unfortunately when disaster situation occurs the infrastructure support is no longer available to the rescue team. Ad hoc networks which are infrastructure-less networks can easily deploy in such situation. In disaster area mobility model, disaster area is divided into different zones such as incident zone, casualty treatment zones, transport areas, hospital zones, etc. Also, in order to tackle high mobility of nodes and frequent failure of links in a network, there is a need of adaptive routing protocol. Reinforcement learning is used to design such adaptive routing protocol which shows good improvement in packet delivery ratio, delay and average energy consumed.


Author(s):  
Mannat Jot Singh Aneja ◽  
Tarunpreet Bhatia ◽  
Gaurav Sharma ◽  
Gulshan Shrivastava

This chapter describes how Vehicular Ad hoc Networks (VANETs) are classes of ad hoc networks that provides communication among various vehicles and roadside units. VANETs being decentralized are susceptible to many security attacks. A flooding attack is one of the major security threats to the VANET environment. This chapter proposes a hybrid Intrusion Detection System which improves accuracy and other performance metrics using Artificial Neural Networks as a classification engine and a genetic algorithm as an optimization engine for feature subset selection. These performance metrics have been calculated in two scenarios, namely misuse and anomaly. Various performance metrics are calculated and compared with other researchers' work. The results obtained indicate a high accuracy and precision and negligible false alarm rate. These performance metrics are used to evaluate the intrusion system and compare with other existing algorithms. The classifier works well for multiple malicious nodes. Apart from machine learning techniques, the effect of the network parameters like throughput and packet delivery ratio is observed.


Author(s):  
Geetanjali Rathee ◽  
Hemraj Saini

Secure routing is considered as one of a key challenge in mesh networks because of its dynamic and broadcasting nature. The broadcasting nature of mesh environment invites number of security vulnerabilities to come and affect the network metrics drastically. Further, any node/link failure of a routed path may reduce the performance of the entire network. A number of secure routing protocols have been proposed by different researchers but enhancement of a single network parameter (i.e. security) may affect another performance metrics significantly i.e. throughput, end to end delay, packet delivery ratio etc. In order to ensure secure routing with improved network metrics, a Secure Buffer based Routing Protocol i.e. SBRP is proposed which ensures better network performance with increased level of security. SBRP protocol uses buffers at alternate positions to fasten re-routing mechanism during node/link failure and ensures the security using AES encryption. Further the protocol is analyzed against mAODV protocol in both static and dynamic environment in terms of security, packet delivery ratio, end to end delay and network throughput.


Sign in / Sign up

Export Citation Format

Share Document