ArticlePDF Available

Performance evaluation of AOMDV routing algorithm with local repair for wireless mesh networks

Authors:
  • Vindhya Institute of Technology and Science (VITS)

Abstract

Recently, wireless mesh networks (WMNs) technology has gained a lot of attention in network research community. WMN is a multi-hop wireless access network where nodes can act both as a router as well as a host. One of the factors that influence the performance of WMNs is the underlying routing protocol used. Thus, numbers of different multipath routing protocols are proposed in recent years. This paper addresses the requirement of local repair under high speed movement scene of wireless mesh network, of route breakage in multipath routing in wireless mesh networks. In this context we have proposed a local repair based AOMDV protocol, to maximize the benefit of proposed algorithm to achieve better performance metrics in both packet loss ratio and routing overhead and packet delivery ratio in high speed mobility networks. Various simulations with varying nodes has been conducted to validate the improvement of the proposed algorithm against the original AOMDV. Performance comparison between AOMDV and AOMDVLR has been analysed in detail, showing that proposed AOMDVLR has achieved better outcome in certain scenarios.
ORIGINAL RESEARCH
Performance evaluation of AOMDV routing algorithm with local
repair for wireless mesh networks
Uday Singh Kushwaha
1
P. K. Gupta
1
S. P. Ghrera
1
Received: 5 August 2014 / Accepted: 3 June 2015
Ó CSI Publications 2015
Abstract Recently, wireless mesh networks (WMNs)
technology has gained a lot of attention in network rese arch
community. WMN is a multi-hop wireless access network
where nodes can act both as a router as well as a host. One of
the factors that influence the performance of WMNs is the
underlying routing protocol used. Thus, numbers of differ-
ent multipath routing protocols are proposed in recent years.
This paper addresses the requirement of local repair under
high speed movement scene of wireless mesh networ k, of
route breakage in multipat h routing in wireless mesh net-
works. In this context we have proposed a local repair based
AOMDV protocol, to maximize the benefit of proposed
algorithm to achieve better performance metrics in both
packet loss ratio and routing overhead and packet delivery
ratio in high speed mobility networks. Various simulations
with varying nodes has been conducted to validate the
improvement of the proposed algorithm against the original
AOMDV. Performance comparison between AOMDV and
AOMDVLR has been analysed in detail, showing that pro-
posed AOMDVLR has achieved better outcome in certain
scenarios.
Keywords Multipath AOMDV AOMDVLR WMN
Local repair NS-2
1 Introduction
Wireless mesh networking (WMN) is a promising com-
munication paradigm and consist of mesh client s (MCs)
and mesh routers (MRs) as shown in Fig. 1. Mesh networ ks
are planned/unplanned multi-hop wireless networks [1].
Mesh routers generally have minimal mobility in a mesh
network and form the backbone of WMNs. This type of
network is very attractive in developing count ries or in the
sparsely populated rural areas where infrastructure is either
non-existent or prohibitively expensive. Due to this
intrinsic property, WMNs have become the focus of
research to increase the coverage range with low cost and
easy deployment [2].
Routing in mesh networks is challenging, since the radio
environment is hostile and unstable, and limited by inter-
ference, with new performance issues. So, many routing
protocols have been proposed in literature by considering
the characteristics of WMN. Here, ad hoc routing algo-
rithms are used due to some similarities between them and
can be categorized in two different category: proactive and
reactive algorithms [3]. In proactive algo rithms the routers
conserve consistent, up-to-date routing information to each
node in the network without considering of whether these
routes are needed or not. Routing tables are updated every
time when the topology changes [4].
Reactive routing protocols are also called as on-demand
approach, In this algorithm, when any new packets needs to
be delivered to the destination and there is no valid route to
carry out this delivery, a new route is to be discovered [5] and
if the route is no longer in use, the routing table will not be
maintained. This type of protocols has low routing overhead
and power consumption, but relatively high route latency [4].
These reactive and proactive protocols are divided into sin-
gle path and multipath routing. The main body of routing
& P. K. Gupta
pradeep1976@yahoo.com
Uday Singh Kushwaha
uday.jptc@gmail.com
S. P. Ghrera
spghrera@rediffmail.com
1
Department of Computer Science and Engineering, Jaypee
University of Information Technology, Solan,
Waknaghat 173234, HP, India
123
CSIT
DOI 10.1007/s40012-015-0065-9
protocol proposals regards single path routing, i.e., for each
source–destination pair a single (shortest) path is discovered
and used for data transmission [6]. Dynamic sourc e routing
(DSR) [5, 7], Ad hoc On-demand Distance Vector (AODV)
[5, 8] are best known single path routing protocol. An
alternative is multi-path routing [911] in which mul tiple
paths are used, thereby offering more opportunities for reg-
ulating the traffic over the network. Multi-path routing
enhances single-path routing mainly in two directions: (i) to
have backup paths available in case of path failures and (ii) to
spread traffic to increase the effective bandwidth so that
packet delivery ratio is good. AODV-BR [12] and AOMDV
[13, 14] are best known multipath routing protocol.
As the mobility of nodes increases the network topolo-
gies are changed dynamically. Because of these regular
changes of the network topologies, maintenance and for-
mation of the network is to be difficult. Several multipath
algorithms have been proposed for this purpose that
maintains multiple alternate connections towards the des-
tination along with a primary path with minimum hop
count. When the primary route fails and no alternate path
available towards the destination, rote discovery is started
from source. In WMNs link failure occurs frequently since
nodes in the WMNs are either fixed or mobile. Due to the
high frequency of link failure there should be a mechani sm
that can repair failed link locally or find another path in its
own level instead of sending REER to source to reduce
latency for route recovery.
In this context this paper proposes a Ad hoc on demand
multipath distance vector routing with local repair based
(AOMDVLR) to reducing the routing overhead and packet
loss and increasing packet delivery ratio. AOMDVLR is
applied by the failure sensed node to find new route from
failure sensed no de to destination or next existing node in
the path. Once new paths are available, it starts transmis-
sion from one of the best available with minimum number
of hop count. Since recoveries of routes are done by
intermediate nodes to next available alternate path or
destination, it reduces control overhead and packet loss but
increases packet delivery ratio.
The rest of the paper is ordered as follows: in Sect. 2,
present related work. Section 3 presents proposes AOMDV
with local repair method i.e. AOMDVLR. Section 4 pre-
sents Performance eval uation and results. Section 5 pre-
sents the conclusion and plans for future work.
2 Related work
2.1 Ad hoc on-demand distance vector (AODV)
Ad hoc on demand distance vector is a very popular single
path reactive routing protocol. Routes are set up on demand
basis, and maintain only active routes. This reduces the
routing overhead, but during the on demand route setup it
introduces some initial latency. AODV is based on a simple
request–reply mechanism for the discovery of routes.
AODV protocol mainly involves three packets. They are
route request (RREQ), route reply (RREP) and route error
(RERR). The route request (RREQ) is used for the estab-
lishment of route from source to destination. The route
reply (RREP) is sent by the destination to the source after
the establishment of route. The route error (RERR) is sent
by intermediate node or destination in following
Fig. 1 Infrastructure/backbone
WMNs [17]
CSIT
123
conditions. (i) When there is no path available to the des-
tination (ii) When there is link break in the valid path to the
destination. Source node first broadcast the RREQ packet
by keeping the source and destination IP address in the
RREQ packet. These packets will be received by the
intermediate nodes and these nodes will check whether
there is a suitable route to the destination node or not. If it
has, then the RREQ is further rebroadcasted, otherwise
REER is sent to the source node. The duplicates of route
request packets is discarded by route request id present in
the RREQ packets. When the destination gets the RREQ
packets from different paths, it judge only one path as a
valid path i.e. the path along which it receives the route
request first and other paths are discarded. Destination
replies the RREP packet back to the source with the path
details from source to destination. The main benefit of
AODV is it does not need any centralized scheme to handle
routing process and reacts quickly when topological
changes. But, AODV does not utilize any control or
avoidance mechanism for reducing packet loss. Also, as the
numbers of connection are increased the delivery ratio of
AODV drops dramatically [5, 8, 15].
2.2 The dynamic source routing (DSR)
The DSR protocol is an on-demand reactive routing pro-
tocol based on source routing. In the source routing pro-
cedure, source node determines the accurate sequence of
nodes through which a packet is propagated. In DSR, every
mobile node to maintain a route cache where it caches
source routes that it has learned. Route discovery and route
maintenance are major parts of the DSR protocol. When
any node in the network wants to send a packet to any other
node, it first checks its route cache for a valid route from
source to the destination. If it exists, then the source node
uses this entry to transmit the packet and also attach its
source address on the packet. If it is no t exist in the cache
or the entry in cache is expired (because of long time idle),
the source broadcasts a RREQ packet to all of its neigh-
bours asking for a valid path to the destination. The source
waits till the valid route is discovered towards the desti-
nation. During waiting time, the source can do other tasks
such as sending/forwarding other packets. As the RREQ
packets arrive at intermediate node, it checks from its
caches or from its neighbors whether the required desti-
nation is known or not. If the required route information is
known, it sends back a RREP packet to the source node
otherwise it broadcasts the same route request packet to
their neighbours. When the route is discovered towards the
destination, the data packets are transmitted by the source
node via discovered route. Also, an entry is inserted in the
cache for the future use. The source node also maintains
the age information for each entry to know whether the
cache is fresh enough or not. When a data packet is
received by intermediate nodes, it first checks whether the
packet is intended for itself or not. If it is intended for itself
(i.e. the intermediate node is the destination), the packet
path is attached on the data packet. Since in WMNs any
link might fail anytime route maintenance process, con-
stantly monitors and notifies the nodes if there is any
failure in the exis ting path. Consequently, the node changes
the entries of their route cache otherwise the same is for-
warded using the path attached on the data packet. In
addition, route maintenance process, constantly observe
and notifies the nodes for any change in the entries of their
route cache [5, 7].
2.3 Ad hoc on-demand distance vector—backup
routing (AODV-BR)
AODV-BR protocol is an extensive version of AODV
protocol with a reserve route. AODV-BR route construc-
tion process is based on AODV protocol by flooding of
route request (RREQ) packet. When intermediate nodes get
a RREQ packet from its neighbor, it records the preceding
hop information and the source node information and then
further broadcast the packet to its neighbors or if a route is
known to the desired destination it sends a RREP packet to
the source. The destination replies through a RREP packet
via selected route when it receives the first RREQ or later
RREQs after examine a better route with less number of
hops. It maintains two routing table primary and alternate
routing table. The primary path is established during the
RREQ stage and the alternate paths are established during
the RREP stage. When a node that is not part of the pri-
mary route sensed a RREP packet that is not directed to it,
records the sending neighbor as the next hop to the desti-
nation in its alternate routing table. In this way a node can
receive several RREPs for a single route and select a route
with minimum number of hops count among them and
insert it into the alternate route table. When RREP reaches
at the source of the route, a primary route between source
and destination is constructed. All nodes that have an
alternate route to the destination in their alternate route
table configure a fish bone network [16].
2.4 Ad hoc on-demand multipath distance vector
routing (AOMDV)
This protocol is an extension to the AODV protocol that
compute multiple loop-free and link disjoint paths. The
routing entries for every destination include a list of the
next hops along with the corresponding hop count. All the
next hops contain the identical sequence numb er. This
helps to keep track of a route. Maximum number of hop
count is preserved for each destination by the advertising
CSIT
123
hop count, and defined as the maximum hop count for all
the paths. This hop count is used for sending route adver-
tisements to the destination node. An alternate path to the
destination is defined by duplicate route advertisement
received by a node. Loop freedom is guaranteed for a node
by accepting alternat e paths to destination if it has a fewer
hop count than the advertised hop count for that destina-
tion. Since the maximum hop count is used, therefore the
advertised hop count does not change for the identical
sequence number. The next hop lists as well as the
advertised hop count are reinitialized when a route adver-
tisement is rece ived for a destination with a larger sequence
number. AOMDV may be used to find node disjoint or link
disjoint routes. Each node do not immediately discard
duplicate RREQs to find node disjoint routes. Each RREQs
arriving via a dissimilar neighbour of the source node
defines a node disjoint path. This is because nodes cannot
broadcast replica of RREQs, so any multiple RREQs
arriving at any intermediate nodes via a different neigh-
bour’s node of the source could not have traversed the
identical node. In an attempt to obtain multiple li nk disjoint
routes, the destination replies to replica of RREQs arriving
by unique neighbours. The RREP follows the reverse paths
after the first hop, which is node disjoint and thus link
disjoint. The route of each RREP may overlap at an
intermediate node, but each RREP takes a different reverse
path to the source to make sure link disjointness. Advan-
tage of AOMDV is that it permits to intermediate nodes to
reply to RREQs, while still select disjoint paths. AOMDV
maintains multiple entries towards the destinations; one
entry is selected as primary path and other as an alternative
path. When primary route get fail, alternate path is selected
with minimum number of hops. But, AOMDV has addi-
tional message overheads during route discovery due to
increased flooding and since it is a multipath routing pro-
tocol therefore destination replies to the multiple RREQs
those results are in longer overhead [12, 13].
3 Proposed work
In this paper we proposed a local repair based AOMDV for
the purpose of fault tolerant in WMN s. This protocol works
same as existing AOMDV protocol except route mainte-
nance. In the AOMDV protocol, when no alter nate path is
available then a RERR message is sent to the source node
for the route rediscovery from source to destination. The
proposed AOMDVLR uses different type of control mes-
sages such as RREQ, RREP, HELLO and REER. RREQ is
used to establish forward path from source to destination
and RREP is used to establish backward path destination to
source. HELLO message are used to communicate node
each other. Once the routes has been established the source
node selects a path minimum number of hop count as a
primary path and start transmission via selected primary
path. When the primary path goes down and fails as shown
in Fig. 2, the alternate path is selected with minimum
number of hop count from routing table as shown in
Table 1. The selected alternate path is used for the further
transmission of data packets but when there is no alternate
path available as shown in Fig. 2 it start local repair.
The failure sensed node first check that is has any other
valid alternate path to the destination in its routing table, if
it is found then this selected alternate path with minimum
number of hop count is used for further transmission
otherwise it increment destination sequence number by one
and set TTL in RREQ packet and broadcast it to their old
neighbour and newly came neighbour as shown in Fig. 3
and wait for TTL.
The RREQ receiving node is a newly came node then it
first check freshness of RREQ by destination sequence, if it
fresh RREQ it reply with RREP to their precursor node and
forward this RREQ to next nodes. If the RREQ receiving
node is a old node that have valid path toward the desti-
nation, reply from its cache. If RREP is received within
TTL, it is recorded in the routing table and a new path is
selected with minimum number of hop count as shown in
Fig. 2. Otherwise it generates a RRER message and sends
it to their precursor as shown in Fig. 4.
This precursor node in turn start local repair if it is not a
source node otherwise it will start route rediscovery. A
summarised flowchart for local repair in AOMDVLR is
shown in Fig. 5.
Fig. 2 Node or link break in the active route
CSIT
123
4 Performance evaluation and results
To evaluate the performance improvements of proposed
algorithm we have comp ared the simulation results of
thread protocol AOMDV with and without applying our
scheme. Here, we termed the AOMDV protocol as
AOMDV-LR (AOMDV with local repair) applied on our
algorithm. NS-2 simulator is used to simulate and evaluate
the performance of the AOMDVLR comparing to the
original AOMDV. We have used Red Hat Linux environ-
ment with version NS-2.34 of network simulator. The radio
model uses in the simulation has a nominal bit-rate of
2 Mb/s and a nominal radio range of 250 m. The error-free
wireless channel model is selected in the simulations in
order to isolate the effects of node mobility. The simula-
tions with varying nodes has been performed in a square
field of dimensions 2000 m 9 2000 m. The nodes are
initially placed uniformly at random in the field. The ran-
dom waypoint mobil ity model has been used to simulate
node movements. Pause time is always set to zero. Traffic
pattern consists of several CBR/UDP connections between
randomly chosen source destination pairs. Data packets
have a fixed size of 512 bytes in all the experiments, and
the simulation time is 1000 s. Each data point in the plots is
an average of five such runs with different number of
nodes. Identical traffic and mobility scenarios are used
across all protocol variations. All the summarised simula-
tion parameter is given as in Table 2 .
In Multipath traffic environment with node mobility
following metric are chosen to compare the performance of
routing protocol. The sample screen shot of a scenario of
25 mobile nodes is shown in the Fig. 6.
4.1 Routing overhead
It is the total number of control or routing packets gener-
ated by rout ing protocol during the simulation. The entire
packets sent or forwarded at network layer is consider
routing overhead.
RO ¼
X
n
i¼1
Cs
i
þ
X
n
i¼1
Cf
i
where RO is routing overhead, Cs
i
is control packet sent
and Cf
i
is control packet forwarded.
4.2 Packet loss ratio
Packet loss ratio is the difference betwee n number of data
packet sent and data packet receive in the network.
PLR ¼
P
n
i¼1
Ds
i
P
n
i¼1
Dr
i
P
n
i¼1
Ds
i
100
where PLR is packet loss ratio, Ds
i
is data packet sent and
Dr
i
is data packet received.
4.3 Packet delivery ratio
Packet delivery ratio (PDR) is defined as the percentage of
the ratio between the number of received packets at des-
tination and the number of packets sent by sources. This
performance evaluation parameter measures reliability,
effectiveness and efficiency of a protocol.
Fig. 4 Source restart route discovery after receiving RERR
Fig. 3 Local repair by intermediate route
Table 1 Routing table for Node B
Destination Dest. seq. no. Next hop Hop count Priority notice
D 2 C 2 Active route
D 2 K 3 Sub route
CSIT
123
PDR ¼
P
n
i¼1
Dr
i
P
n
i¼1
Ds
i
100
where PDR is packet delivery ratio, Ds
i
is data packet sent
and Dr
i
is data packet received.
5 Result
In the simulated scena rio the number of CBR/UDP con-
nections is varied while the mean speed is fixed at 5 m/s
and the offered load at 160 kb/s. For a constant mean node
speed and constant offered load, increasing the number of
connections will spread the same amount of traffic among
several connections. This will stress the protocol, as it
requires a routing prot ocol to maintain routes between
more numbers of source–destination pairs. Moreover, each
route discovery will become more expensive because of the
smaller amount of traffic over each connection. Figure 7
demonstrates how protocol routing overhead varies with
varying number of nodes. The general trend observed from
the figure, AOMDVLR outperform AOMDV. This can also
be observed that the routing overhead of AOMDVLR is
lower than AOMDV for all varied connection. As the
Fig. 5 Local repair flowchart
for each node
Table 2 Simulation parameters for AOMDV-LR and AOMDV
S.No. Parameters Values
1 Area size 2000 m 9 2000 m
2 Number of nodes 5–25
3 Node mobility speed 0.9–1.1 v
4 Propagation range 250 m
5 Mobility model Random way point
6 Data rate 5 Kbps
7 Simulation time 1000 s
8 Pause time 0
9 No. of experiments Five times
CSIT
123
number of nodes increases the performance gain by local
repair becomes more significant. This shows that the
AOMDVLR performs better as compared to AOMDV in
all possible number of nodes.
Now we can analyze the Fig. 8. It shows that, packet
loss ratio for AOMDVLR decreases as the number of nodes
increased. It can be concluded that the packet loss ratio of
AOMDV-LR is comparatively better than AOMDV which
is highly real time requirement.
It is maximised the Packet Delivery ratio of proposed
routing protocol due to local route repair of AOMDV.
From Fig. 9 it is observed that, AOMDVLR performance
Fig. 6 Sample simulation scenario with 25 nodes
0
5000
10000
15000
20000
25000
30000
35000
40000
45000
5 10152025
Routing overhead (packets)
Number of nodes
AOMDV
AOMDVLR
Fig. 7 Routing overhead in varied connections
0
1
2
3
4
5
6
7
510152025
AOMDV
AOMDVLR
Fig. 8 Packet loss ratio in varied connections
92.5
93
93.5
94
94.5
95
95.5
96
5 10152025
PDR %
Number of nodes
AOMDV
AOMDVLR
Fig. 9 Packet delivery ration in varied connections
CSIT
123
in terms of PDR is better than AOMDV in different
connections.
6 Summary and discussion
From all the above discussed scenarios, it can be find that
the AOMDVLR protocol can successfully calculate route
and forward data packets in wireless mesh networks sce-
narios better than the original AOMDV in the aspects of
RO, PDR, and PLR.
7 Conclusion and future work
In this paper, the performance of original AOMDV and the
proposed AOMDVLR, which includes an additional
mechanism of local repair, have been analysed. NS-2
simulator has been used to evaluate the performance of the
proposed protocol, in comparison with the original
AOMDV. Using a more active route discovery mechanism,
the proposed AOMDVLR performs better than the original
AOMDV in the aspects of RO, PDR, and PLR. For future
work, the buffer may be used in the intermediates node to
decrease the packet loss value with local repair needs to be
analysed and carefully selected, as well as hardware test-
bed experiments will also be implemented for more
extensive and thorough performance eval uation.
References
1. Akyildiz IF, Wang X, Wang W (2005) Wireless mesh networks: a
survey. Elsevier Comput Netw 47(4):445–487
2. Bicket J, Aguayo D, Biswas S, Morris R (2005) Architecture and
evaluation of an unplanned 802.11b mesh network. In: Proceed-
ings of 11th international conference on mobile computing and
networking, vol. 1, New York, pp 31–42
3. Abolhasan M, Wysocki T, Dutkiewicz E (2004) A review of
routing protocols for mobile ad hoc networks. Ad Hoc Netw 2:1–22
4. Zakaria A, Mohamad H, Ramli N, Ismail M (2013) Performance
evaluation of routing protocols in wireless mesh network. In:
Advanced communication technology (ICACT), 2013 15th
international conference, IEEE, pp 1111–1115
5. Tomar GS, Sharma T, Bhattacharyya D, Kim T-H (2011) Per-
formance comparision of AODV, DSR and DSDV under various
network conditions: a survey. In: Ubiquitous computing and
multimedia applications (UCMA), 2011 international conference,
IEEE, pp 3–7
6. Campista MEM, Passos DG (2008) Routing metrics and proto-
cols for wireless mesh networks. IEEE Netw Mag 22:6–12
7. Johnson D, Hu Y, Maltz D (2007) The dynamic source routing
protocol (DSR) for mobile ad hoc networks for IPv4. RFC4728,
2–100
8. Perkins C, Belding-Royer E, Das S (2003) RFC 3561: ad hoc on-
demand distance vector (AODV) routing. http://www.ietf.org/rfc/
rfc3561.txt
9. Rong B, Yi Q, Lu K, Hu RQ, Kadoch M (2010) Multipath routing
over wireless mesh networks for multiple description video
transmission. IEEE J Sel Areas Commun 28(3):321–331
10. Mao S, Hou YT, Sherali HD, Midkiff SF (2008) Multimedia-
centric routing for multiple description video in wireless mesh
networks. IEEE Netw, Spec Issue Wirel Mesh Netw: Appl, Arch
Protoc 22:19–24
11. Li D, Zhang Q, Chuah CN, Ben Yoo SJ (2006) Multi-source
multi-path video streaming over wireless mesh networks. In:
Circuits and systems, 2006 international symposium, IEEE,
pp 698–701
12. Lee S-J, Mario G (2000) AODV-BR: backup routing in ad hoc
networks. In: Wireless communications and networking confer-
ence, WCNC IEEE, vol. 3, pp. 1311–1316
13. Marina MK, Das SR (2006) Ad Hoc on-demand multipath dis-
tance vector routing. Wirel Commun Mob Comput 6(7):969–988
14. Yuan Y, Chen H, Jia M (2005) An optimized ad-hoc on-demand
multipath distance vector (AOMDV) routing protocol. In: Com-
munications, 2005 Asia-Pacific conference, IEEE, pp 569–573
15. Chennikara-Varghese J, Chen W, et al. (2006) Survey of routing
protocols for inter-vehicle communications, In: IEEE
16. Lee S-J, Gerla M (2000) AODV-BR: backup routing in ad hoc
networks. In: Wireless communications and networking confer-
ence. WCNC IEEE, vol. 3, pp 1311–1316
17. Akyildiz IF, Wang X, Wang W (2005) Wireless mesh networks: a
survey. Comput Netw 47(4):445–487
CSIT
123
... In this protocol all previous nodes contribute in local repair, therefore routes are get healed speedily with negligible routing overhead as least number of control packets RREQ, RREP and RERR are used. Since the originating node is not disturbed with route rediscover, it boosts the throughput of the communication with slighter end to end delay with negligible overhead [33]. ...
... AODVM may not build other routes based on the path over which the RREP packets are transmitted if it overhears the neighbor's packets. Furthermore, AODV-BR is not a multipath routing protocol in the strictest sense, because it only uses neighbor nodes surrounding the main routes to preserve by pass routes when the main route is broken (Ahn et al. 2010;Kushwaha and Gupta 2014). MP-AODV is a node-disjoint multipath enhancement for AODV presented by the authors. ...
Article
Full-text available
The Mobile Ad hoc Network (MANET) is a group of nodes connected to each other wirelessly without the use of a central server or a traditional network structure. In MANETs, data packets are sent through wireless channels to keep communication going. Ad hoc On Demand Distance Vector Protocol is a MANET-related reactive protocol technology that generates a route of nodes to a destination node by broadcasting packets of route request across the network. In this kind of Routing protocol, a connection loss causes the source to send control (RREQ) on the network, causing network congestion and performance deterioration. This study offers a Node List (NLAODV) Node List Ad-hoc On-Demand Distance Vector routing method that includes links and path-nodes to identify if any node on the network is involved in the route discovery process for sending control packets from wireless source node to the wireless destination node. Simulation findings reveal that the proposed NLAODV algorithm minimizes flood Packets to get the best network as it is not necessary for all nodes to be present in route discovery.
... To use the specified mobile applications, a strong internet connection and a lot of mobile data storagewhere the cloud plays an important role-are required. Malware detection serves a crucial role and continuously gathers crucial data because there is a reason for downloading different programs [1]. According to statistical analysis, a small number of new threats will be introduced by mobile applications. ...
Article
In recent days, there has been a significant development in the field of computers as they need to handle the vast resource using cloud computing and performing various cloud services. The cloud helps to manage the resource dynamically based on the user demand and is transmitted to multiple users in healthcare organizations. Mainly the cloud helps to reduce the performance cost and enhance data scalability & flexibility. The main challenges faced by the existing technologies integrated with the cloud need to be solved in managing the data and the problem of data heterogeneity. As the above challenges, mitigation makes the services more data stable should the healthcare organization identify the malware. Developed countries are utilizing the services through the cloud as it needs more security. In this work, a secure data agreement approach is proposed as it is associated with feature extraction with cloud computing for healthcare to examine and enhance the user parties to make effective decisions. The proposed method classifies into two components. The first component deals with the modified data formulation algorithm, used to identify the relationship among variables, i.e., data correlation, and validate the data using trained data. It helps to achieve data reduction and data scale development. In the second component, Feature selection is used to validate the model using subset selection to determine the model fitness based on the data. It is necessary to have more samples of different Android applications to examine the framework using factors like data correctness and the F-measure. As feature selection is a concern, this study focuses on Chi-square, gain ratio, information gain, logistic regression analysis, OneR, and PCA.
... In this protocol all preceding node participate in local repair, hence routes are get healed quickly with minor routing overhead as minimum number of control packets RREQ, REEP and RERR are spread. Since the source node is not concerned with route rediscover, it increases the throughput of the transmission with lesser end to end delay with minor overhead [23]. ...
... With the improvement in wireless signals, routing algorithms [1] and with the introduction of IoT in the market, there is slight increase in the production of smartphones. Smartphone and its apps have become the integral part of human life. ...
Article
Full-text available
This research paper presents MLDroid—a web-based framework—which helps to detect malware from Android devices. Due to increase in the popularity of Android devices, malware developers develop malware on daily basis to threaten the system integrity and user’s privacy. The proposed framework detects malware from Android apps by performing its dynamic analysis. To detect malware from real-world apps, we trained our proposed framework by selecting features which are gained by implementing feature selection approaches. Further, these selected features help to build a model by considering different machine learning algorithms. Experiment was performed on 5,00,000 plus Android apps. Empirical result reveals that model developed by considering all the four distinct machine learning algorithms parallelly (i.e., deep learning algorithm, farthest first clustering, Y-MLP and nonlinear ensemble decision tree forest approach) and rough set analysis as a feature subset selection algorithm achieved the highest detection rate of 98.8% to detect malware from realworld apps.
Chapter
The expansion of the Internet and technological innovations have revolutionized the world. This digital effervescence has fostered in its path an increased connectivity of services and applications. Optimal use of these requires support for quality of service (QoS), fault resilience, reduced transmission delay, reliable packet delivery, network security, and fair sharing of data. Resources available in the network as needed. In order to satisfy these requirements, disjoint routing algorithms have been developed to improve network performance. These algorithms distribute the load evenly over several paths between the different nodes of the network. The objective of this article is to provide a comprehensive literature review on disjoint routing algorithms as a whole, unlike several research works in the literature which focus only on specific network architectures including MANET, SDN, WSN, ... First, we review the advantages and disadvantages of disjoint routing algorithms, which will allow us to identify future research work. Then, we will present a detailed study of disjoint routing algorithms. Finally, we will also describe disjoint routing algorithms based on some specific network architectures.KeywordsMultipath routingVertex-disjoint pathsEdge-disjoint paths
Chapter
Full-text available
Detecting accident in smart cities is hypothetical task in day-to-day life. It is hard to control by traffic police; the police cannot be available for all the 24 * 7 (all the month). Due to this, many accidents are passing by in everyone life. Many humans are losing their life due to lack of first aid support from the hospital. It takes at least 5 min to pass the accident information to the hospital; hence to overcome this problem, we have used computer vision technique to identify the accident in specific location, and the messages will be passed automatically to the nearby hospital. When the accident is detected the local hospital, and patrol is intimated by the Gmail else by SMS through SMTP to take necessary action. Using deep learning techniques, we are able to achieve a promising solution to this problem.KeywordsDeep learningCCTV surveillance footageFaster R-CNNAlarm systemZFVGG-16
Chapter
As there is drastic improvement in the wireless signals, which is associated with IoT environment and results in the development mobile devices. This is needed as there is growth in the impact of the mobile devices nowadays, threat developers also active in spreading the malware day to day to weaken the user’s data privacy and integrity as it is eventually need for the mobile users. So, there is a need of effective framework to identify the malware, which is exist in the smartphone android applications and able to analysis the devices dynamically from time to time. To develop a machine learning-based web framework, which is able to identify the malware in the mobile devices. As this framework should be more effective for the real-time applications as it the propose framework needs more salient features to gain the effectiveness based on the feature selection concept. For the analysis, we have to take more samples on various android applications and analysis the framework with certain parameters like F-measure and data accuracy. As feature selection is concern, we can consider chi-square, gain ratio, information gain, logistic regression analysis, one R and PCA.KeywordsMobile devicesAndroidFeature selectionF-measureData accuracy
Article
Full-text available
Mobile ad-hoc networks (MANETs) and wireless mesh networks (WMNs) are used in a variety of research areas, including the military, industry, healthcare, agriculture, the Internet of Things (IoT), transportation, and smart cities. The swift advancement in MANET technology is the driving force behind this rising adoption rate. Routing over MANET is a critical problem due to the dynamic nature of the link qualities, even when nodes are static. A key challenge in MANETs is the need for an efficient routing protocol that establishes a route according to certain performance metrics related to the link quality. The routing protocols utilised by the nodes in WMNs and MANETs are distinct. Nodes in both types of networks exchange data packets through the routing protocols. For this highly mobile network, the ad-hoc On-Demand Distance Vector (AODV) routing protocol has been suggested as a possible solution. Recent years have attracted researchers’ attention to AODV since it is a routing technique for ad-hoc networks that prevents looping. The architecture of this routing protocol considers several factors, including the mobility of nodes, the failure of connection links, and the loss of packets. In this systematic review, one of the key focuses is bringing attention to the classic AODV, which was developed after discussing the recent development of several versions of AODV. The AODV routing protocol performs a path strength check to generate a more reliable and secure route between the source and destination nodes. In AODV, investigations demonstrate advances in both the format protocol approach and the network simulation-2 (NS-2), and these improvements were made in the same scenario used to revitalise AODV. It has been discovered that the AODV is more effective in several aspects, such as throughput, end-to-end delay, packet delivery ratio (PDR), energy consumption, jitter, packet loss ratio, and network overhead. Furthermore, this paper presents this systematic review based on AODV modifications in the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA). It also provides a methodological framework for the papers’ selection.
Article
A directional airborne network consisting of nodes equipped with multibeam antennas is considered. These nodes use the frequency division duplex mode of communication. This allows formation of multiple routes between a pair of source and destination nodes, where every forward and reverse route completely overlaps. Each of these routes supports the bidirectional traffic. These routes are formed using the bidirectional ad hoc on-demand multipath distance vector (BAOMDV) routing protocol. In this article, we propose a local route repair scheme, called BAOMDV-LR, when these routes break due to node mobility. The proposed route repair scheme preserves the overlapping and link-disjoint (or node-disjoint) characteristics of the routes, while reducing the need for expensive route rediscovery. The proposed scheme significantly improves the overall network performance for bidirectional traffic (in terms of packet delivery ratio, end-to-end delay, and routing overhead) as compared to the BAOMDV and other existing routing schemes, especially at higher node speeds and data rates.
Article
Full-text available
In the past few years, wireless mesh networks (WMNs) have drawn significant attention from academia and industry as a fast, easy, and inexpensive solution for broadband wireless access. In WMNs, it is important to support video communications in an efficient way. To address this issue, this paper studies the multipath routing for multiple description (MD) video delivery over IEEE 802.11 based WMN. Specifically, we first design a framework to transmit MD video over WMNs through multiple paths; we then investigate the technical challenges encountered. In our proposed framework, multipath routing relies on the maximally disjoint paths to achieve good traffic engineering performance. However, video applications usually have strict delay requirements, which make it difficult to find multiple qualified paths with the least joints. To overcome this problem, we develop an enhanced version of Guaranteed-Rate (GR) packet scheduling algorithm, namely virtual reserved rate GR (VRR-GR), to shorten the packet delay of video communications in multiservice network environment. Simulation study shows that our proposed approach can reduce the latency of video delivery and achieve desirable traffic engineering performance in multipath routing environment.
Conference Paper
Wireless mesh network has been considered as a viable solution to offer broadband connectivity to rural community due to its ability to provide extended coverage and scalable deployment. However, there are still impediments that need to be addressed in terms of throughput degradation, latency and interference due to multi hop transmission and potential isolated nodes. In this contribution, an investigation of suitable routing protocol in the context of providing rural broadband communication is presented by evaluating various of routing approaches, namely reactive, proactive and hybrid routing protocols. Specifically, performance analysis was simulated for ad hoc on demand distance vector (AODV), optimized link state routing (OLSR) and hybrid wireless mesh protocol (HWMP). The impacts of traffic loads, number of sources and the network size on wireless mesh network have been investigated through the simulation. HWMP has a clear advantage compare to AODV and OLSR in terms of maximizing throughput and minimizing end to end delay.
Article
Mobile Ad-hoc networks are characterized by constant topology changes, in the absence of fixed infrastructure and lack of any centralized control. Traditional routing algorithms prove to be inefficient in such a changing environment. Ad-hoc routing protocols such as Dynamic Source Routing (DSR), Ad-hoc On-Demand Distance Vector Routing (AODV) and Destination sequence Vector (DSDV) have been proposed to solve the multi hop routing problem in Ad-hoc networks. Extensive research has been done in comparing the different proposed ad-hoc routing protocols under varying network scenarios. Routing overhead, packet delivery ratio, end-to-end delay, path optimality, and throughput are some metrics commonly used in the comparisons. In this survey paper we had analyzed the performance of the routing algorithms under various networks conditions.
Article
Inter-vehicle communications is a topic of growing interest, with a number of target applications under consideration. One significant application for inter-vehicle communications is dissemination of vehicle safety information such as road and traffic-related events and conditions. To support vehicle safety information, a reliable and efficient intervehicle communications system which can meet stringent safety application performance requirements is needed. This paper reviews developments in routing schemes targeted for ad hoc vehicle networks and considers them in the context of safety communications
Article
We develop an on-demand, multipath distance vector routing protocol for mobile ad hoc networks. Specifically, we propose multipath extensions to a well-studied single path routing protocol known as ad hoc on-demand distance vector (AODV). The resulting protocol is referred to as ad hoc on-demand multipath distance vector (AOMDV). The protocol guarantees loop freedom and disjointness of alternate paths. Performance comparison of AOMDV with AODV using ns-2 simulations shows that AOMDV is able to effectively cope with mobility-induced route failures. In particular, it reduces the packet loss by up to 40% and achieves a remarkable improvement in the end-to-end delay (often more than a factor of two). AOMDV also reduces routing overhead by about 30% by reducing the frequency of route discovery operations. Copyright © 2006 John Wiley & Sons, Ltd.
Conference Paper
This paper proposes to leverage multi-source multi-path diversity to design a video streaming system for supporting concurrent video-on-demand (VoD) services over wireless mesh networks (WMNs). By integrating a wireless interference model into consideration, we have a more realistic network model to capture the characteristics of wireless networks. Based on that, we mathematically formulate the route selection problem for the proposed streaming system using rate/interference-distortion optimization framework, and rely on a genetic algorithm to solve it heuristically. Simulation results show that the proposed system has better performance than systems using single-source, single-path and systems that do not consider interference
Article
Wireless mesh networks (WMNs) consist of mesh routers and mesh clients, where mesh routers have minimal mobility and form the backbone of WMNs. They provide network access for both mesh and conventional clients. The integration of WMNs with other networks such as the Internet, cellular, IEEE 802.11, IEEE 802.15, IEEE 802.16, sensor networks, etc., can be accomplished through the gateway and bridging functions in the mesh routers. Mesh clients can be either stationary or mobile, and can form a client mesh network among themselves and with mesh routers. WMNs are anticipated to resolve the limitations and to significantly improve the performance of ad hoc networks, wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless metropolitan area networks (WMANs). They are undergoing rapid progress and inspiring numerous deployments. WMNs will deliver wireless services for a large variety of applications in personal, local, campus, and metropolitan areas. Despite recent advances in wireless mesh networking, many research challenges remain in all protocol layers. This paper presents a detailed study on recent advances and open research issues in WMNs. System architectures and applications of WMNs are described, followed by discussing the critical factors influencing protocol design. Theoretical network capacity and the state-of-the-art protocols for WMNs are explored with an objective to point out a number of open research issues. Finally, testbeds, industrial practice, and current standard activities related to WMNs are highlighted.