scholarly journals Route discovery optimization of reactive routing protocols for mobile ad hoc networks

2005 ◽  
Author(s):  
Boon Chong Seet
2015 ◽  
Vol 22 (7) ◽  
pp. 2239-2257 ◽  
Author(s):  
Hui Xia ◽  
Jia Yu ◽  
Zhen-kuan Pan ◽  
Xiang-guo Cheng ◽  
Edwin H. -M. Sha

Author(s):  
Sanaa A. Alwidian ◽  
Ismail M. Ababneh ◽  
Muneer O. Bani Yassein

Network–wide broadcasting is used extensively in mobile ad hoc networks for route discovery and for disseminating data throughout the network. Flooding is a common approach to performing network-wide broadcasting. Although it is a simple mechanism that can achieve high delivery ratio, flooding consumes much of the communication bandwidth and causes serious packet redundancy, contention and collision. In this paper, the authors propose new broadcast schemes that reduce the overhead associated with flooding. In these schemes, a node selects a subset of its neighbors for forwarding the packet being broadcast to additional nodes. The selection process has for goal reducing the number of neighbors and maximizing the number of nodes that they can reach (i.e., forward the packet to). By applying this novel neighborhood-based broadcasting strategy, the authors have come up with routing protocols that have very low overhead. These protocols were implemented and simulated within the GloMoSim 2.03 network simulator. The simulation experiments show that our routing protocols can reduce the overhead for both low and high mobility substantially, as compared with the well-known and promising AODV routing protocol. In addition, they outperform AODV by increasing the delivery ratio and decreasing the end-to-end delays of data packets.


2019 ◽  
Vol 3 (2) ◽  
pp. 32-40 ◽  
Author(s):  
Mohammad Riyaz Belgaum ◽  
Shahrulniza Musa ◽  
Mazliham MohdSu’ud ◽  
Muhammad Alam ◽  
Safeeullah Soomro ◽  
...  

Routing protocols are used to transmit the packets from the source to the destination node in mobile ad hoc networks. The intruders seek chance to pierce into the network and becomes a cause of malfunctioning in the network. These protocols are always prone to attacks. During the phases of routing in different types of protocols, each of the attack finds a way to degrade the performance of the routing protocols. The reactive routing protocols DSR and AODV have lot of similar features and so are considered in this study. In order to transmit the packets safely, a secured approach using triple factor has been proposed. This triple factor computes the trust by using the direct information then verifies the reputation by collecting the information from the neighbouring nodes called distributed factor and uses cryptographic algorithm to ensure security. And to ensure that there are routes available to perform the routing process, the reasons for such attacks are studied so as to re-integrate back the nodes in to the network, once it has repented for being malicious before. The availability of routes increases the throughput.


Author(s):  
Raj Kamal Kapur ◽  
Sunil Kumar Khatri

Mobile ad hoc networks (MANETs) are ad hoc networks in which the nodes co-operatively route the traffic to the destination nodes which are beyond the wireless range of source nodes. The nodes in the network act as both end devices and routers. The routing mechanism in MANETs differentiates it from other wireless networks. Developing a routing protocol which is light on resources and efficient is a challenging task. Several routing protocols have been developed but the reactive routing protocols have found favor in most applications since these obtain the route when a node has data to send. This results in lower routing load and better conservation of meagre resources of the nodes. The two prominent reactive routing protocols for mobile ad hoc networks-Dynamic Source Routing (DSR) and Ad-hoc On-demand Distance Vector (AODV) routing. Both the protocols have similar on-demand behavior, but the differences in the protocol mechanism can lead to significant performance differentials. The performance differentials are analyzed using varying network load and mobility.


Sign in / Sign up

Export Citation Format

Share Document