Preview

Multihop Wireless Network Case Study

Best Essays
Open Document
Open Document
3772 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Multihop Wireless Network Case Study
A SURVEY OF LOAD BALANCING ROUTING PROTOCOL
ON MULTIHOP WIRELESS NETWORKS
ABSTRACT
A Multihop wireless Network have the potential to extend the coverage of a network which composed of mobile nodes where the two nodes can communicate through the number of intermediate nodes in wireless links. Multihop mesh networks, Multihop cognitive radio networks, sensor networks, iMANET, vanet are all the examples of Multihop wireless networks. To improve the network performance, Load Balancing in Routing mechanism is considerable which distribute the traffic through multiple paths which avoids congestion and bursty traffic in Internet based multihop wireless networks for efficient data transmissions.
INTRODUCTION
A Multihop Wireless Network
…show more content…
The models of PALB are filtering, distribution , load balancing. In packet filtering, the data packets are entered and it reduces the packets arrive at the destination out of order. The packet distribution model is that the distribution of traffic based on load balancing and it decides when and how to shift traffic among the multiple paths. Based on path stability and measurement of path statistics, the load balancing will operate. By the load balancing approach, the traffic can be properly distributed and the end to end packet delay, packet dropping can be reduced and energy consumption can be …show more content…
Senthil Murugan Tamilarasan and Kannan Eswariah,” Link Stability With Energy Aware Ad hoc On Demand Multipath Routing Protocol in Mobile Ad hoc Networks” American Journal of Applied Sciences 10 (8),pp. 844-848, 2013
12. D.Maheshwari and R.Nedunchezhian,” Balanced Reliable Shortest Route for AOMDV (BRSR-AOMDV) Using TF Mechanism in MANET” Int.J.Computer Technology & Applications,Vol 4 (6),pp.902-909
13. CHEN Xi-hao, CHEN Hui-min and ZHOU Wei,” Least-mean-square routing with load-balancing for wireless ad hoc networks” J Shanghai Univ (Engl Ed), 2008, vol.12(2),pp. 131–135
14. Jung-Yoon Kim, Geetam S. Tomar, Laxmi Shrivastava, Sarita Singh Bhadauria and Won-Hyoung Lee, “Load Balanced Congestion Adaptive Routing for Mobile Ad Hoc Networks”, International Journal of Distributed Sensor Networks, Volume 2014
15. Hesham A. Ali , Taher T. Hamza and Shadia Sarhan,” Manet Load Balancing Parallel Routing Protocol”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 1, July 2012
16. Laxmi Shrivastava, G.S.Tomar and Sarita S.Bhadauria, ”Secure and Congestion Adaptive Routing Mechanism with Load Balancing for MANET”, IJCSN, Vol.1, No 6,

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 7 Exercise 1

    • 489 Words
    • 2 Pages

    The proposed method is illustrated as a flow chart in Fig 3. First, the source node broadcast the RREQ to neighbor nodes. The neighbor nodes forward the Route Request (RREQ) to the destination node. Destination node stores the neighbor RREQ in a table and checks the RREQ. If RREQ is from the true Source node address, then the system is regular and begins to transmit test data packets otherwise repeat the process. Next, it will check the packet delivery ratio if packet delivery ratio drops to threshold then Send Bait RREQ. The source node randomly chooses one-hop neighbor node (nr) as a destination node. The Source node selects one-hop neighbor node nr as the destination node and sends the RREQ to that node. First, if nr had not launched black hole attack, then after the source node had sent the RREQ, then other nodes in addition to nr node also reply with RREP. It indicates that there is an Attacker in Reply routing. If the only nr sent RREP then…

    • 489 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The load balancer is an attractive feature [43] for network, thus we need to combine the QoS with a load balancer in one topic to solve some…

    • 246 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Week 3 iLab Report

    • 1123 Words
    • 4 Pages

    Ciampa, M. (2013). WNA Guide to Wireless LAN’s (3rd ed.). [VitalSource Bookshelf]. Retrieved from http://www.devryu.net/…

    • 1123 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 410 Words
    • 2 Pages

    AODV has pooled properties of both DSR and DSDV. It uses route discovery process for sustaining route information through the basis of routing table. It is a reactive protocol as it doesn’t need to establish or maintain routes to nodes that are not involved in the communication. AODV handles route discovery process with Route Request (RREQ) messages to broadcast to neighbour nodes. The message floods through the network till the desired destination is reached. Sequence number guarantees the loop freedom. The destination node at once receiving a RREQ unicasts a Route Reply (RREP) back to the source node. Node transmitting a RREP message creates routing table entries for forward route. For route maintenance, nodes send HELLO messages intermittently to neighbour nodes. If any node in the network miss the mark to receive three consecutive HELLO messages from its neighbour, it presumes that link to that particular node is down. A node that perceive a broken link directs a Route Error (RERR) message to any upstream node. At once a node receives a RERR message it will signpost a new source discovery process. The AODV protocol uses sequence numbers to determine the timeliness of each packet and to…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Basios, C. and Solidakis, M. "Current trends and challenges towards wireless Internet", Computer Systems and Applications, 2005. The 3rd ACS/IEEE International Conference on 2005 Page(s):77…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    Earlier mentioned various routing protocols that we have discovered while carrying out this phase, and noted various studies that have been carried out assessing these protocols [23] [24][25]. Among the large number only very few that meet up the requirements to become a VANET protocol such as the protocol being rapid and light weighted. It is now required to select the best that fits our requirement of the project goal.…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    show that the proposed framework is fast (two rounds of communication among nodes, regardless of network size) and outperforms an existing method.…

    • 8009 Words
    • 33 Pages
    Good Essays
  • Good Essays

    The advent of wireless technology is due in part to the ever increasing demands for mobility and flexibility in our daily lives. A wireless LAN (WLAN) is based on cellular architecture where the system is subdivided into cells,…

    • 929 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    802.21

    • 2871 Words
    • 12 Pages

    | D. A. Wassie, D. Loukatos, L. Sarakis, K. Kontovasilis and C. Skianis, "On the energy requirements of vertical handover operations: Measurement-based results for the IEEE 802.21 framework," in Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Barcelona, Spain, 2012.…

    • 2871 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    EIGRP (enhanced interior gateway protocol) is a hybrid protocol. This protocol allows for minimal routing instability as well as the bandwidth processing power of the router. OSPF (open shortest path first) allows the packets to take the shortest path based on the routers routing table. RIP (routing information protocol) limits the number of hops that the data can make. It also has some stability features such as holddown and route poisoning mechanisms that help prevent incorrect routing information from being generated. RIPv2 is a better version of RIP and thus allowing classless inter-domain routing (CIDR). IS-IS protocol stands for intermediate system – intermediate system. This protocol was designed to move information quickly across a network of computers that are physically connected together. Each router independently builds its own routing table to allow the process of information to move faster. The different comment modes of a router include: >, #, (config), and (config-if) or user mode, privilege mode, global configuration mode and interface configuration…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Great Depression was an example of how America’s greediness can get be its greatest downfall. There were many factors that led to The Great Depression. The effects of The Great Depression led to many things, some that can still be seen today. President Roosevelt helped the American people sift the depression with his leadership. The Great Depression has had a lasting effect on America and had influence in decisions later in history and also showed the extent of power a president could have through a time crisis.…

    • 558 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    net204 week 1 quiz

    • 534 Words
    • 5 Pages

    Every router makes its routing decisions based on the information it has in its routing table and on the information in its neighbor routing tables.…

    • 534 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Wireless Network

    • 268 Words
    • 2 Pages

    Last and forth most is determining the location of the wireless devices, as there are many different object that hinder the signal of the access point with all mode from Ad hoc to the standard infrastructure. While they all can be affected, each has special consideration to their locations.…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    (c) Data throughput in sensor networks is a bigger concern than that in mobile ad hoc networks.…

    • 1413 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Network Simulator is a name for a series of discrete event network simulators, specifically ns-1, ns-2 and ns-3. All of them are discrete-event computer network simulators, primarily used in research and teaching. ns-3 is free software, publicly available under the GNU GPLv2 license for research, development, and use.…

    • 1086 Words
    • 5 Pages
    Good Essays