scholarly journals An Improvement of Ant Colony Adhoc On-Demand Vector (ANT-AODV) with K-Means Clustering Nodes Method in Mobile Adhoc Network (MANET) Environment

2021 ◽  
Vol 5 (1) ◽  
pp. 1-6
Author(s):  
Dimas W.L. Pamungkas ◽  
Radityo Anggoro

MANET (Mobile Ad hoc Network) is a technology used for data communication on mobile media. MANET moves and speeds also randomly with different distances between nodes. In the AODV reactive protocol, the development of a routing protocol with an ant colony model can significantly improve performance. The measurement results will impact the decision on the development of the ant colony protocol implemented in AODV to obtain the best route for data transmission. Several studies have developed the K-Means clustering method to obtain the shortest and best route from the AODV protocol. It does not measure congestion, distance, energy, and signal strength of the wireless network. In this research, a combination of methods was carried out, by combining clustering and also ant colony method to get the best route while dealing with the problems that have been mentioned. Implementation is done by modifying the AODV protocol and adding the two methods. At the end of the research, metric measurements were carried out to determine the Packet Delivery Ratio, End to End Delay and also the Average Hop Count.

Author(s):  
Ganesh Kumar Wadhwani ◽  
Sunil Kumar Khatri ◽  
S K Muttoo

Background: Mobile Ad-hoc network is a set of devices which are capable of communicating with each other without the help of any central entity or fixed infrastructure. The absence of fixed access points makes MANET flexible and deployable at the extreme geographical territories. Each device has routing capabilities to facilitate communication among nodes in the network. Objectives: 1) To selects the stable path which has lowest hop count. 2) To use backup path in case of link break up to minimize delay incurred in finding out the alternate path. Method: Dynamic source routing is modified to choose the most stable path and a backup path is cached to save the route discovery time in case of link failure. Results: The modified-DSR based on Link stability and hop count is performing better as compared to DSR most of the time. Conclusion: A modified-DSR is proposed that selects the path using hop count and link stability as parameters. The advantage of modified-DSR is that if a link breaks in between data communication then back up path can be used for carrying out the data transfer. Analysis is done by varying the node density and counting number of packets received .Modified-DSR gives better results for light to moderate network and DSR performs better if the number of nodes increases beyond a certain limit.


2018 ◽  
Vol 10 (2) ◽  
pp. 73 ◽  
Author(s):  
Amir Abdelkader AOUIZ ◽  
Sofiane BOUKLI HACENE ◽  
Pascal Lorenz ◽  
Marc GILG

Mobile ad hoc network presents generally several challenges such as high dynamic topology, packet loss and frequent routes discovering that result in low throughput and reduced packet delivery ratio. To reduce the number of route discovering process, multipath routing protocols makes use of alternate paths to continue packets transmission. Ad Hoc On-demand, multipath distance vector routing protocol or AOMDV, is one of the well-known multipath protocols that relays on the hop count metric to route packets. However maintaining disjoint active routes can reduce nodes life time and lead to more control messages like error and discovering packets. In this paper, a pre-emptive approach is proposed based on the historical values of nodes energy. Nodes that excessively consume energy in time are considered overloaded and are excluded from route discovering, hence nodes with reduced energy variation are selected to route packets. Simulation results show reduced number of dead nodes by 30 %, overhead by 16%.


2013 ◽  
Vol 684 ◽  
pp. 547-550
Author(s):  
Sery Vuth Tan ◽  
Minh Yuk Choi ◽  
Kee Cheon Kim

Mobile Ad-hoc Network (MANET) is a dynamic wireless network without any infrastructures. The network is weak and vulnerable to many types of attacks. One of these attacks is BlackHole. In this attack, a malicious node advertises itself as having a high sequence number and a shortest path to a specific node to absorb packets. The effect of BlackHole attack on ad-hoc network using AODV as a routing protocol will be examined in this research. We also propose a new mechanism, called DPBA-AODV, to detect and prevent BlackHole attacks on AODV protocol. Simulation result, by using NS2, depicts the efficiency of our proposed mechanism in packet delivery ratio under the presence of BlackHole nodes.


Author(s):  
Sadanand Inamdar ◽  
B. Sathish Babu ◽  
Ravi Yadahalli

In Mobile Ad Hoc Network (MAC), the existing MAC protocol based on the short busy advertisement is not an efficient method for data fragmentation. In addition, the data-fragment length adjustment according to the network environments is still an issue. In order to overcome this issue, in this article, the authors propose to design an Adaptive Directional Monitoring MAC (ADM-MAC) protocol for smart Antennas using Ant colony optimization (ACO) technique. In this technique, the network density and traffic intensity information is estimated using Ant Colony Optimization (ACO) technique and then passed on to the MAC protocol. Then data fragment transmission is performed by adaptively adjusting the directional monitoring period based on the packet size. By simulation results, the authors show that the proposed technique reduces the delay, packet drop due to collision and increases the throughput and packet delivery ratio.


2016 ◽  
Vol 2016 ◽  
pp. 1-8 ◽  
Author(s):  
Elham Zamani ◽  
Mohammadreza Soltanaghaei

Mobile ad hoc network (MANET) is one of the most widely used networks, which has attracted attentions, having features such as limited energy resources, limited bandwidth, and security weaknesses due to lack of a central infrastructure. Safe and suitable routing is one of the research aspects of MANET. In this paper, a proposed method, called M-AODV, which is a type of overhearing backup protocol, based on AODV, is presented. The simulation results of this protocol, applied by NS2 simulator, showed the improvement of packet delivery rate and reduction of overhead and delay. Moreover, to assess the security of the proposed protocol, we simulated M-AODV and AODV protocols under black hole and wormhole attacks, using no security solution. The results showed that M-AODV had been improved in terms of packet delivery ratio, and the delay had been reduced as well, but the amount of overhead had been increased.


Computers ◽  
2020 ◽  
Vol 10 (1) ◽  
pp. 2
Author(s):  
Tri Kuntoro Priyambodo ◽  
Danur Wijayanto ◽  
Made Santo Gitakarma

A Mobile Ad Hoc Network (MANET) protocol requires proper settings to perform data transmission optimally. To overcome this problem, it is necessary to select the correct routing protocol and use the routing protocol’s default parameter values. This study examined the effect of route request parameters, such as RREQ_RETRIES and MAX_RREQ_TIMOUT, on the Ad Hoc On-demand Distance Vector (AODV) protocol, which was then compared with the default AODV performance Optimized Link State Routing (OLSR) protocols. The performance metrics used for measuring performance were Packet Delivery Ratio (PDR), throughput, delay, packet loss, energy consumption, and routing overhead. The results show that the OLSR protocol has a smaller delay than the AODV protocol, while in other measurements, the AODV protocol is better than OLSR. By reducing the combination value of RREQ_RETRIES, MAX_RREQ_TIMEOUT in AODV routing to (2, 10 s) and (3, 5 s), the protocol’s performance can be improved. The two combinations result in an average increase in throughput performance of 3.09%, a decrease in delay of 17.7%, a decrease in packet loss of 27.15%, and an increase in PDR of 4.8%. For variations in the speed of movement of nodes, 20 m/s has the best performance, while 5 m/s has the worst performance.


Mobile Adhoc Networks (MANETs) is one of the fastest growing research areas in the field of communications technologies. The constant movement of the nodes in such networks leads to topological changes which causes link breakages among the nodes. The existing work focuses on optimizing the path from source to destination using simple ant colony optimization without focusing on improving the energy consumption or reducing the link breakages. The proposed work considers different parameters such as Pheromone Value, Euclidean distance, Residual energy and mobility of the nodes into account while optimizing the route of the mobile ad hoc network. The proposed system has been implemented using NS2 and the performance has been analyzed based on remaining energy of the network, packet drops, packet delivery ratio, throughput and end to end delay. Experimental results indicate increased performance of the network against current techniques.


Author(s):  
Gurwinder Singh

Abstract: Security in mobile ad-hoc network (MANET) is the most serious issue impacting performance of network. In general, routing methods is one of the complicated and exciting analysis places. In black hole attack, a harmful node uses its routing technique to be able to promote itself for having the quickest direction to the place node or to the bundle it wants to identify. In this research, performance of one of the most efficient solutions for preventing single black hole attack in MANET using AODV routing protocol will be investigated in terms of packet delivery ratio, packet loss percentage, average end-to-end delay, and route request overhead. This chapter describes the introduction, background of the study, research objectives and questions, the scope of the study and its primary objectives.


2020 ◽  
Vol 2 (1) ◽  
pp. 67-75
Author(s):  
Priya Tama Sugara ◽  
Andy Hidayat Jatmika ◽  
Ariyan Zubaidi

VANET is part of the Mobile Ad-hoc Network (MANET), but the nodes on VANET have a higher level of mobility. Each node that moves will cause network activity (topology changes) such as route search and message sending handled by each node. So that each node must have a routing protocol to facilitate communication in the network. The selection of the appropriate routing protocol is needed in urban and  rural scenarios.This study aims to determine the effect of propagation model variants on data communication on the TORA, MDART and ZRP routing protocols on the VANET network on the Praya City and Bypass Lombok road maps with an area of ​​1000x1000 m2. For the variation of the routing protocol using four variations of the propagation model, namely the freespace propagation model, tworayground, shadowing, and nakagami. The number of nodes used in the Praya City road map is 35, 55, 70 nodes and in Lombok Bypass 25, 40, 60 nodes. The test parameters used are throughput, packet delivery ratio and end to end delay.In an urban scenario with an area of ​​1000x1000 m2, the TORA protocol gets a very good throughput parameter on nakagami propagation of 40.95 Kbps and on the ZRP protocol the value of the freespace propagation parameter PDR is 100%. While in the rural scenario a good value is obtained in freespace propagation is  4.82 second. Keywords: VANET, Routing Protocol, Propagation, NS2


2020 ◽  
Vol 14 ◽  
Author(s):  
S. Mahima ◽  
N. Rajendran

: Mobile ad hoc networks (MANET) hold a set of numerous mobile computing devices useful for communication with one another with no centralized control. Due to the inherent features of MANET such as dynamic topology, constrained on bandwidth, energy and computing resources, there is a need to design the routing protocols efficiently. Flooding is a directive for managing traffic since it makes use of only chosen nodes for transmitting data from one node to another. This paper intends to develop a new Cluster-Based Flooding using Fuzzy Logic Scheme (CBF2S). To construct clusters and choose proper cluster heads (CHs), thefuzzy logic approach is applied with the use of three parameters namely link quality, node mobility and node degree. The presented model considerably minimizes the number of retransmissions in the network. The presented model instructs the cluster members (CM) floods the packets inside a cluster called intra-cluster flooding and CHs floods the packets among the clusters called inter-cluster flooding. In addition, the gateway sends a packet to another gateway for minimizing unwanted data retransmissions when it comes under different CH. The presented CBF2S is simulated using NS2 tool under the presence of varying hop count. The CBF2S model exhibits maximum results over the other methods interms of overhead, communication overhead, traffic load, packet delivery ratio and the end to end delay.


Sign in / Sign up

Export Citation Format

Share Document