475 research outputs found

    An effective ant-colony based routing algorithm for mobile ad-hoc network

    Get PDF
    An effective Ant-Colony based routing algorithm for mobile ad-hoc network is proposed in this paper. In this routing scheme, each path is marked by path grade, which is calculated from the combination of multiple constrained QoS parameters such as the time delay, packet loss rate and bandwidth, etc. packet routing is decided by the path grade and the queue buffer length of the node. The advantage of this scheme is that it can effectively improve the packet delivery ratio and reduce the end-to-end delay. The simulation results show that our proposed algorithm can improve the packet delivery ratio by 9%-22% and the end-to-end delay can be reduced by 14%-16% as compared with the conventional QAODV and ARA routing schemes

    An efficient broadcasting routing protocol WAODV in mobile ad hoc networks

    Get PDF
    Information broadcasting in wireless network is a necessary building block for cooperative operations. However, the broadcasting causes increases the routing overhead. This paper brings together an array of tools of our adaptive protocol for information broadcasting in MANETs. The proposed protocol in this paper named WAODV (WAIT-AODV). This new adaptive routing discovery protocol for MANETs, lets in nodes to pick out a fantastic motion: both to retransmit receiving request route request (RREQ) messages, to discard, or to wait earlier than making any decision, which dynamically confgures the routing discovery feature to decide a gorgeous motion through the usage of neighbors’ knowledge. Simulations have been conducted to show the effectiveness of the using of techniques adaptive protocol for information broadcasting RREQ packet when integrated into ad hoc on-demand distance vector (AODV) routing protocols for MANET (which is based on simple flooding)

    Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless networks

    Get PDF
    An innovative technology that is widely used in many applications is the Mobile Ad-hoc Network (MANET). Discovery and maintenance of routes at MANET are important issues. Within MANET, broadcasting is used to discover a path within on-demand routing protocols. Establishing and maintaining a route periodically among the nodes is the challenge that requires the transmitting of control packets across a network. This state leads to the issue of broadcasting storms. Broadcasting control packets increase control packets overhead and decrease network performance. In this paper, we proposed a scheme called AODV-Velocity and Dynamic (AODV-VD) for effective broadcast control packets. The routing protocol for the ad-hoc on-demand distance victor (AODV) is used to implement the proposed AODV-VD scheme. AODV-VD scheme reduces both the excessive route discovery control packets and network overhead. Network simulator version 2.35 (NS2.35) was used to compare the proposed AODV-VD scheme to the AODV routing protocol in terms of end-to-end latency, average throughput, packet transmission ratio and overhead ratio

    Eaodv: A*-based Enhancement Ad-hoc on Demand Vector Protocol to Prevent Black Hole Attacks

    Get PDF
    Black hole attack is an attack where a node that responds to RREQ from the source node by replying a fake freshness information and false hop count. The black hole nodes do not respond to distributed co-operation in routing protocol to absorb all the packets, as a result, the network performance will drop. Most previous works are focused on anomaly detection through dynamic trusted of the neighbouring nodes. We find out that the internal comparisons take a long time. This loss can be shortened by changing the routing mechanism. We propose an enhancement of AODV protocol, named EAODV, that is able to prevent black hole attacks. The EAODV can find a shortest path of routing discovery using A* heuristic search algorithm. Values of hop count and estimate time to reach the destination node are used as input in the heuristic equation and one-way hash function is used to make a secure value and then to casting it to all neighbouring nodes. Experiments were conducted in NS2 to simulate EAODV in different running time with and without black hole nodes. The EAODV performance results are indicated better in terms Packet loss and Average End-to-End delay

    A Survey on Underwater Acoustic Sensor Network Routing Protocols

    Full text link
    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research
    • …
    corecore