IJRIT International Journal of Research in Information Technology, Volume 1, Issue 5, May 2013, Pg. 127-138

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Performance Enhancement of AODV using Cache route discovery in MANET 1

1

Brahm Prakash Dahiya

A.P. in Computer Science Dept., Shyam Lal College , New Delhi, India. 1

[email protected]

Abstract A set of wireless nodes or routers coming together to form a network in which every node acts as a router can be defined as a mobile ad hoc network (MANET). Mobility causes a number of issues in ad hoc networks. To overcome this, routing protocols using various mobility metrics have been suggested. One such protocol is proposed in this paper, whereby the most commonly used ad hoc on-demand distance vector (AODV) routing protocol is modified so that it uses the improve the performance, throughput and decrease the delay by using in addition, the route cache timeout or the Route expiry timeout is set to the value of the route lifetime. To achieve these metrics the author will attach the cache memory and also include the route discovery expired time. If route is available in cache then we will check the expired time of route. If expired time of route remaining then it will be replaced with the broken link and connection reestablished. The author will implement modify AODV (MAODV) using the ns-2 simulator.

Keywords :- AODV , MAODV, Wireless network, NS-2.

1. Introduction Wireless communication technology has rapidly increased in the last few decades. People wish to use their network terminals (laptops, PDAs, etc.) anywhere and anytime. Wireless connectivity has given users the freedom to move where they desire. There exist numerous different wireless networks varying in the way the nodes interconnect. They can be broadly classified in two categories Networks with fixed infrastructure and Ad hoc wireless networks. Typical for networks with fixed infrastructure is using of access points. An access point (AP) can act as a router in the network, or as a bridge. Examples for this type of networks are GSM and UMTS cellular networks. In ad-hoc wireless networks the nodes themselves use each other as routers, so these nodes should be more intelligent than the nodes in a centralized network with APs [1]. In communication networks, such as Ethernet or packet radio, throughput or network throughput is the average rate of successful message delivery over a communication channel. This data may be delivered over a physical or logical link, or pass through a certain network node. The throughput is usually measured in bits per second (bit/s or bps), and sometimes in data packets per second or data packets per time slot. Thus the term throughput is essentially synonymous to digital bandwidth consumption [1]. Brahm Prakash Dahiya, IJRIT

127

1.1 The throughput of a communication system will be limited by a huge number of factors such as

1.1.1 Analog limitations The maximum achievable throughput (the channel capacity) is affected by the bandwidth in hertz and signal-to-noise ratio of the analog physical medium. Wireless Channel Effects, Skin effect etc. fall into this category affect the throughput of the system adversely. 1.1.2 IC hardware considerations Computational systems have finite processing power, and can drive finite current. Limited current drive Capability can limit the effective signal to noise ratio for high capacitance links. 1.1.3 Multi-user considerations Ensuring that multiple users can harmoniously share a single communications link requires some kind of equitable sharing of the link. If a bottle neck communication link offering data rate R is shared by "N" active users (with at least one data packet in queue), every user typically achieves a throughput of approximately R/N, if fair queuing best-effort communication is assumed. Packet loss due to Network congestion, bit errors etc. are crucial here [1].

The Ad-Hoc On-demand Distance Vector (AODV) routing protocol [2] is one of several published routing protocols for mobile ad-hoc networking. Wireless ad- hoc routing protocols such as AODV are currently an area of much research among the networking community.

AODV is a relative of the Bellmann-Ford distant vector algorithm, but is adapted to work in a mobile environment. Each AODV router is essentially a state machine t h a t processes incoming requests from the network entity. AODV determines a route to a destination only when a node wants to send a packet to that destination. Routes are maintained as long as they are needed by the source. Sequence numbers ensure the freshness of routes and guarantee the loop-free routing. Whenever an AODV router receives a request to send a message, it checks its routing table to see if a route exists. Each routing table entry consists of the following fields: 1) 2) 3) 4)

Destination address Next hop address Destination sequence number Hop count

If a route exists, the router simply forwards the message to the next hop. Otherwise, it saves the message in a message queue, and then it initiates a route request to determine a route. The following flow chart illustrates this process:

Brahm Prakash Dahiya, IJRIT

128

Figure1. AODV routing process AODV nodes use four types of messages to communicate among each other. Route Request (RREQ) and Route Reply (RREP) messages are used for route discovery. Route Error (RERR) messages and HELLO messages are used for route maintenance.

1.2 AODV Route Discovery When a node needs to determine a route to a destination node, i t floods the network with a Route Request (RREQ) message. The originating node broadcasts a RREQ message to its neighboring nodes, which broadcast the message to their neighbors, and so on. To prevent cycles, each node remembers recently forwarded route r e q u e s t s i n a r o u t e request buffer (see next section). As these requests spread through the network, intermediate nodes store reverse r o u t e s back to the originating node. Since an intermediate node could have many reverse routes, it always picks the route with the smallest hop count. When a node receiving the request either knows of a “fresh enough” route to the destination (see section on sequence numbers), or is itself the destination, the node generates a Route Reply (RREP) message, and sends this message along the reverse path back towards the originating node. As the RREP message passes through intermediate nodes, these nodes update their routing tables, so that in the future, messages can be routed though these nodes to the destination. Notice that it is possible for the RREQ originator to receive a RREP message from more than one node. In this case, the RREQ originator will update its routing table with the most “recent” routing information; that is, it uses the route with the greatest destination sequence number. (See section on sequence numbers). The vowels (modifiers) can be placed at the left, right (or both), top or bottom of the consonant. The vowels above the header line are called ascenders or upper modifiers and vowels below the consonants are called descanters or lower modifiers. Two consecutive lines touch or overlap each other due to these modifiers. This makes the segmentation of handwritten Hindi text very complex.

Brahm Prakash Dahiya, IJRIT

129

1.3 The Route Request Buffer In the flooding protocol described above, when a node originates or forwards a route request message to its neighbors, the node will likely receive the same route resending the same RREQs (causing infinite cycles), each node maintains a route request buffer, which contains a list of recently broadcasted route requests. Before forwarding a RREQ message, a node always checks the buffer to make sure it has not already forwarded the request. RREQ messages are also stored in the buffer by a node that originates a RREP message. The purpose for this is so a node does not send multiple RREPs for duplicate RREQs that may have arrived from different paths. The exception is if the node receives a RREQ with a better route (i.e. smaller hop count), in which case a new RREP will be sent. Each entry in the route request buffer consists of a pair of values: the address of the node that originated the request, and a route request identification number (RREQ id). The RREQ id uniquely identifies a request originated by a given node. Therefore, the pair uniquely identifies a request across all nodes in the network. To prevent the route request buffers from growing indefinitely, each entry expires after a certain period of time, and then is removed. Furthermore, each node’s buffer has a maximum size. If nodes are to be added beyond this maximum, then the oldest entries will be removed to make room. 1.4 Expanding Ring Search The flooding protocol described above has a scalability problem, because whenever a node requests a route, it sends a message that passes through potentially every node in the network. When the network is small, this is not a major concern. However, when the network is large, this can be extremely wasteful, especially if the destination node is relatively close to the RREQ originator. Preferably, we would like to set the TTL value on the RREQ message to be just large enough so that the message reaches the destination, but no larger. However, it is difficult for a node to determine this optimal TTL without prior global knowledge of the network. To solve this problem, I have implemented an expanding ring search algorithm, which works as follows. When a node initiates a route request, it first broadcasts the RREQ message with a small TTL value (say, 1). If the originating node does not receive a RREP message within a certain period of time, it rebroadcasts the RREQ message with a larger TTL value (and also a new RREQ request message back from its neighbors. To prevent nodes from identifier to distinguish the new request from the old ones). The node continues to broadcast messages with increasing TTL and RREQ ID values until it receives a route reply. If the TTL values in the route request have reached a certain threshold, and still no RREP messages have been received, then the destination is assumed to be unreachable, and the messages queued for this destination are thrown out.

1.5 Sequence Numbers Each destination (node) maintains a monotonically increasing sequence number, which serves as a logical time at that node. Also, every route entry includes a destination sequence number, which indicates the “time” at the destination node when the route was created. The protocol uses sequence numbers to ensure that nodes only update routes with “newer” ones. Doing so, we also ensure loop- freedom for all routes to a destination. All RREQ messages include the originator’s sequence number, and its (latest known) destination sequence number. Nodes receiving the RREQ add/update routes to the originator with the originator sequence number, assuming this new number is greater than that of any existing entry. If the node receives an identical RREQ message via another path, the originator sequence numbers would be the same, so in this case, the node would pick the route with the smaller hop count. If a node receiving the RREQ message has a route to the desired destination, then we use sequence numbers to determine whether this route is “fresh enough” to use as a reply to the route request. To do this, we check if this node’s destination sequence number is at least as great as the maximum destination sequence number of all nodes through which the RREQ message has passed. If this is the case, then we can roughly guess Brahm Prakash Dahiya, IJRIT

130

that this route is not terribly out-of-date, and we send a RREP back to the originator. As with RREQ messages, RREP messages also include destination sequence numbers. This is so nodes along the route path can update their routing table entries with the latest destination sequence number. Where all routes are bi-directional, these lists are essentially the same. Each node periodically sends HELLO messages toots precursors. A node decides to send a HELLO message to a given precursor only if no message has been sent to that precursor recently. Correspondingly, each node expects to periodically receive messages (not limited to HELLO messages) from each of its outgoing nodes. If a node has received no messages from some outgoing node for an extended period of time, then that node is presumed to be no longer reachable. Whenever a node determines one of its next- hops to be unreachable, it removes all affected route entries, and generates a Route Error (RERR) message. This RERR message contains a list of all destinations that have become unreachable as a result of the broken link. The node sends the RERR to each of its precursors. These precursors update their routing tables, and in turn forward the RERR to their precursors, and so on. To prevent RERR message loops, a node only forwards a RERR message if at least one route has been removed.

2. Literature survey The motivation for this paper began with a study of the analysis of the link/path duration. Much research and effort has gone into this field. Initially, most of the analyses were based on simulations, and later, analytical models for the path/link durations were proposed. This paper was based on one such analytical model. First, previous research in the design of a model to calculate the route lifetime is considered, and then, research on the various mobility metrics and their implementation on routing protocols are discussed. The effect of mobility on MANETs was initially studied by Sadagopan et al. [3] using statistical analysis of simulation data. In this paper, the authors studied the relationship between the path/route duration (mobility metrics) and the performance of a protocol across different mobility models. They suggested that for moderate- to highmobility models, the path duration PDFs could be approximated to have an exponential distribution, and for small velocities they would have multi-modal distributions. The analytical model in this paper showed the relationship between the path/link duration and other parameters such as transmission range, velocity of the nodes, etc. Node density was a parameter that was not taken into consideration in this analysis. A conditional probability model was designed by Wei and Wei [2] to analyze the relationship between the link reliability and the link lifetime. Here, path reliability was calculated to be a function of path lifetime. The mathematical model was based on the random-walk mobility model. This analysis was the inspiration for using the link lifetime or route lifetime as the routing metric, instead of using the first route available or the hop count. In [4], Han et al. demonstrated that the nature of path duration is exponential and can be viewed as a random variable. Using Palm's theorem the exponential behavior was proved. It was also proved that the correlation between the excess lifetimes of two neighboring links is very weak for the random waypoint (RW) mobility model. The models developed by Sadagopan et al. [3] and Han et al. [4] is based on the assumption that the existing routing protocols are based on the principle of shortest path. This assumption has also been made in the research described in[5]. Yangcheng et al. [1] analyzed all the route dynamics for routing protocols with the shortest-path-first strategy. Most on-demand routing protocols use the shortest-path-first strategy, which was also used in this paper. The analysis by Yangcheng et al. concentrated on the study of route dynamics for proactive routing protocols [1]. Route dynamics, such as route duration, depend on the routing protocol being used. It has been analyzed and proven that for MANETs with a moderate or high rate of mobility, the route duration is approximated by an exponential distribution, while the route duration of specific lengths cannot be approximated. An empirical approach was developed to obtain the network statistics of link and route durations, including probability density functions and Brahm Prakash Dahiya, IJRIT

131

cumulative density functions (CDFs). Improving on this, a model for reactive routing protocols was analyzed in this paper. [6] Concentrates on the relationship between link distances and hop count. This paper assumes that the relay node is selected based on the principle of least remaining distance (LRD) to the destination. An analytical model was developed for a given Euclidean distance between nodes, assuming that the LRD forwarding can be approximated to shortest path forwarding. In the analysis by Srinivasan [7], a mathematical model for the path/route duration was developed. This analysis was done assuming that routing protocols in ad hoc networks follow the LRD forwarding scheme, which is similar to the shortest path first. This paper concentrated on only reactive routing protocols of mobile ad hoc networks. Since node density is an important parameter in mobile ad hoc networks, it was included in this analysis. This model supports the findings in which the PDF of the path duration is exponential for high speeds and multimodal for speeds lower than 10 m/sec [3]. It also proves that the distribution is exponential when the number of hops is greater than 2. In simulations, it was observed that as the number of nodes in a network increase, there is an exponential drop in the distribution of path duration. It was explained that this was due to “the edge effect.” This unusual behavior needs to be taken into consideration while analyzing the distribution. One of the assumptions made was that the node locations in the network follow Poisson’s distribution, with node density as the variable parameter. This analysis is the most up-to-date analysis for path duration, and this is the model that was considered for this paper. In [8], Cheng and Heinzelman proposed a long-lifetime routing scheme in MANETS. This paper proposes that shortest path is not the most optimal path, if path duration will be taken into consideration. Also expanding the route length will not increase the life of the route. The authors' proposed that estimation of link life time is essential for finding routes with a longer lifetime. An algorithm for implementation of long lifetime route selection was proposed in this paper. The analysis by Xu [9] was a major motivation for the second part of this paper. In on demand routing protocols, stale-route cache entries and new-route discoveries cause routing delays and excessive overhead. This study proposed a practical route-caching strategy in which the route cache timeout is set to the mobility metric, or expected path residual time. Since this strategy is independent of the network traffic load or the path duration distribution that is used, it is feasible to implement. This strategy was implemented in the routing protocol DSR. It was shown that the end-to-end routing delay and the control overhead was minimized by using path duration as a mobility metric. These values were further minimized when the timeout value was set to twice the path residual time.

Brahm Prakash Dahiya, IJRIT

132

3. Proposed Work

Figure 2 Modify AODV Flow Chart

Brahm Prakash Dahiya, IJRIT

133

4. Implementation proposed work The author implemented AODV and Advance MAODV Protocols using the NS-2 simulator.

Figure 3 AODV with broken link

Figure 4 MAODV with Check Cache

Brahm Prakash Dahiya, IJRIT

134

Figure 5 MAODV with Link Replacement

Figure 6 MAODV with Connection reestablished

Brahm Prakash Dahiya, IJRIT

135

5. Experimental results In the result green line show MAODV AND pink line show AODV outputs.

Figure 7 Total Packets transmitted using AODV and MAODV

Figure 8 Total Packets received using AODV and MAODV

Brahm Prakash Dahiya, IJRIT

136

Figure 9 Total Packets lost using AODV and MAODV

Figure 10 Total Packets received using AODV and MAODV

Brahm Prakash Dahiya, IJRIT

137

Metrics Total packets transmitted

AODV 3000

MAODV 3000

Total packets received

2500

2900

500

100

Total packets lost Table 1. Performance comparison between AODV and MAODV.

6. Conclusion and Future work In this paper the author proposed the Modify AODV (MAODV) protocol. Then the author performed the comparison between both AODV and Modify AODV (MAODV) protocol based on the packets received, packets lost. So based on the result the author found Modify AODV (MAODV) protocols is better than the AODV protocols. So in the future work the author will use the Modify AODV (MAODV) protocol for large network.

7. References [1] Schiller J. Mobile Communications. Addison Wesley, 2nd edition, 2003. [2]

Royer

E.M.

Perkins

C.E.

Ad-hoc

on-demand distance vector routing. Proceedings of the 2

nd

IEEE

Workshop on Mobile Computing Systems and Applications, p.90, 1999. [3] R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, “Network Information Flow,” IEEE Transactions on Information Theory, vol. 46, no. 4, July 2000. [4] J. Bicket, D. Aguayo, S. Biswas, and R. Morris, ”Architecture and Evaluation of An Unplanned 802.11b Mesh Network”, In: Proc of ACM MobiCom 2005, Cologne Germany, Sep 2005, pp. 31-42. [5] Yang Tao, Yong Li, Jian Li, and Hong-cheng Huang, "Improve the Throughput of AODV Based on Network Coding Ideas", WASE International Conference on Information Engineering 2010. [6] S. Li, R. Yeung, and N. Cai, “Linear Network Coding”( PDF (http:/ / pdos. lcs. mit. edu/ decouto/ papers/ li03. pdf)), in IEEE Transactions on Information Theory, Vol 49, No. 2, pp. 371-381, 2003. [7] P. Gupta, and P. R. Kumar, “The Capacity of Wireless Networks”, IEEE Transactions on Information Theory, vol. 34, no. 5, pp. 910-917, 2000. [8] R.Draves, J.Padhye, and B.Zill. "Comparison of Routing Metrics for Multi-Hop Wireless Networks". In Proceedings of ACM SIGCOMM, 2004. [9] Z.Li and B.Li. "Network coding: The case for multiple unicast sessions". In Allerton Conference on Communications, 2004. [10] R.Draves, J.Padhye, and B.Zill. "Comparison of Routing Metrics for Multi-Hop Wireless Networks". In Proceedings of ACM SIGCOMM, 2004. Brahm Prakash Dahiya, IJRIT

138

Performance Enhancement of AODV using Cache route ...

use their network terminals (laptops, PDAs, etc.) .... All RREQ messages include the originator's sequence number, and its (latest known) destination sequence ...

4MB Sizes 5 Downloads 246 Views

Recommend Documents

Performance Enhancement of AODV using Cache route ...
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 5 ... 1 A.P. in Computer Science Dept., Shyam Lal College , New Delhi, India.

Performance Enhancement of AODV using Cache route ...
A set of wireless nodes or routers coming together to form a network in which every node acts as a router can be defined as a mobile ad hoc network (MANET). Mobility causes a number of issues in ad hoc networks. To overcome this, routing protocols us

Iterative Route Discovery in AODV
A major challenge in the design of ad hoc network is the ..... Thus, it is logical to assess the behavior of an approach .... [9] D. B. Johnson and D. A. Maltz.

Performance Enhancement of Routing Protocol in MANET
Ghaziabad, U.P., India ... Service (QoS) support for Mobile Ad hoc Networks (MANETs) is an exigent task due to dynamic topology and limited resource. To support QoS, the link state ... Mobile ad hoc network (MANET) is a collection of mobile devices,

Performance Enhancement of Fractional Coefficients ...
Dr. H. B. Kekre is Sr. Professor in Computer Engineering Department with the ... compared with a Training Set of Images and the best ..... Computer Networking.

Performance Enhancement of the Temporally-Ordered Routing ...
dent on the services provided by the Internet MANET Encapsulation Protocol. (IMEP) to effectively carry out its three main ...... radio propagation properties of the mobile nodes are modelled after the Lucent. WaveLan direct sequence spread spectrum

Performance Evaluation of AODV, DSR, DYMO & ZRP ...
Abstract: A Mobile Ad hoc NETwork is a kind of wireless ad-hoc network, and is a self configuring network of mobile routers connected by wireless links. Mobile Ad-Hoc Network (MANET) is a wireless network without infrastructure. Self configurability

Performance Enhancement of the Optical Link with Use of ... - IJRIT
bandwidth and high speed communication. But the .... to the Eye Diagram Analyzer which is used as a visualizer to generate graphs and results such as eye.

applications of the peng-robinson equation of state using ... - CACHE
and ai is given by an equation similar to Eq. (3) for the pure component case. The ..... Binous, H., MATLAB File Exchange Center,

Mindful Sport Performance Enhancement
... Kaufman Carol R Glass Timothy R Pineau on Amazon com FREE shipping The Hardcover of the Mindful ... for Athletes and Coaches, All Ebook Mindful Sport Performance Enhancement: Mental Training for .... other high-pressure domains.

A Performance Enhancement of IEEE 802.11a OFDM ...
Abstract—In this paper, the Doppler frequency estimated for orthogonal frequency division multiplexing (OFDM) systems in time-varying multipath channels. The proposed scheme is a time-domain approach that utilizes pilot subcarriers, which are commo

Enhancement of broadband performance for on-chip ...
of a broadband disc monopole, Electron Lett 29 (1993), 406-407. 2. N.P. Agrawall .... Ko, Novel fully symmetrical inductor, IEEE Electron Device Lett 25. (2004) ...

Performance Enhancement of the Temporally-Ordered ...
School of Computer Science and Software Engineering. The University of Western Australia ... performance problems: the network localization approach and selective node par- ticipation approach. The IMEP ..... is the unique ID of the node itself. The

UNDERWATER SCENE ENHANCEMENT USING ...
xD. A. W. ∈. ⋅. +. ⋅. = λ λ λ λ λ λ. (1). At the scene point x, the artificial light ..... R q y eqyfqyf. W σ. (18) where q is the coordinate of support pixel centered around.

underwater image enhancement using guided trigonometric ... - Name
distortion corresponds to the varying degrees of attenuation encountered by light ... Then, He et al. [9,. 10] proposed the scene depth information-based dark.

Capacity enhancement of 4G- MIMO using Hybrid ...
Capacity enhancement of 4G- MIMO using Hybrid Blast ..... Hybrid BLAST STBC provides the best performance. ... Wireless Mobile Communication and digital.

Soft-OLP: Improving Hardware Cache Performance Through Software ...
Soft-OLP: Improving Hardware Cache Performance Through Software-Controlled. Object-Level Partitioning. Qingda Lu. 1. , Jiang Lin. 2. , Xiaoning Ding. 1.

Soft-OLP: Improving Hardware Cache Performance ...
and Core micro-architectures all use 64-byte L2 cache lines. In this paper we exploit ..... and enforce cache partitioning decisions but never updates the table. The rest of ..... However, unlike CG, LU does not exhibit this trend of performance ...

Soft-OLP: Improving Hardware Cache Performance Through Software ...
weak-locality accesses and place them in a dedicated cache. (bypass buffer) to ... best of our knowledge, Soft-OLP is the first work that uses .... Decision Maker.

Novel Approach for Performance Enhancement in Manets
A mobile ad hoc network (MANET) [1] [2][3] consists of a collection of wireless .... Another example is during disaster relief where various rescue crews (e.g., ...

Novel Approach for Performance Enhancement in Manets
1 Guru Gobind Singh Indraprastha University, Dwarka, New Delhi, India. 2 Department of Information Technology, ABES Engineering college, Ghaziabad, UP, ...