Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33093
Bandwidth and Delay Aware Routing Protocol with Scheduling Algorithm for Multi Hop Mobile Ad Hoc Networks
Authors: Y. Harold Robinson, E. Golden Julie, S. Balaji
Abstract:
The scheduling based routing scheme is presented in this paper to avoid link failure. The main objective of this system is to introduce a cross-layer protocol framework that integrates routing with priority-based traffic management and distributed transmission scheduling. The reservation scheme is based on ID. The presented scheme guarantees that bandwidth reserved time slot is used by another packet in which end-to-end reservation is achieved. The Bandwidth and Delay Aware Routing Protocol with Scheduling Algorithm is presented to allocate channels efficiently. The experimental results show that the presented schemes performed well in various parameters compared to existing methods.Keywords: Integrated routing, scheduling, MAC layer, IEEE 802.11.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1340074
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1185References:
[1] E. Carlson, C. Prehofer, C. Bettstetter, H. Karl, and A. Wolisz, “A Distributed End-to-End Reservation Protocol for IEEE 802.11-Based Wireless Mesh Networks,” IEEE J. Selected Areas in Comm.,vol. 24, no. 11, pp. 2018-2027, Nov. 2006.
[2] R. Menchaca-Mendez and J.J. Garcia-Luna-Aceves, “An Interest- Driven Approach to Integrated Unicast and Multicast Routing in MANETs,” Proc. IEEE 16th IEEE Int’l Conf. Network Protocols (ICNP ’08), pp. 248-257, Oct. 2008.
[3] Harold Robinson, Y., & Rajaram, M. (2015). “Trustworthy link failure recovery algorithm for highly dynamic mobile adhoc networks”, World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, vol.9, no.2, 233–236.
[4] J. Yuan, Z. Li, W. Yu, and B. Li, “A Cross-Layer Optimization Framework forMultihop Multicast in Wireless Mesh Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 11, pp. 2092-2103, Nov. 2006.
[5] Y. Wu, P.A. Chou, Q. Zhang, K. Jain, W. Zhu, and S.-Y. Kung, “Network Planning in Wireless Ad Hoc Networks: A Cross-Layer Approach,” IEEE J. Selected Areas in Comm., vol. 23, no. 1, pp. 136-150, Jan. 2005.
[6] Harold Robinson, Y., & Rajaram, M. (2016), “A memory aided broadcast mechanism with fuzzy classification on a device-to-device mobile Ad Hoc network”, Wireless Personal Communications, 1–23, doi:10.1007/s11277-016-3213-0.
[7] E. Setton, T. Yoo, X. Zhu, A. Goldsmith, and B. Girod, “Crosslayer Design of Ad Hoc Networks for Real-Time Video Streaming,” IEEE Wireless Comm., vol. 12, no. 4, pp. 59-65, Aug. 2005.
[8] C.E. Perkins and E.M. Royer, “Ad-Hoc On-Demand Distance Vector Routing,” Proc. Second IEEE Workshop Mobile Computing Systems and Apps. (WMCSA ’99), pp. 90-100, Feb. 1999.
[9] Harold Robinson, Y., & Rajaram, M. (2015), “Energy-aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks”, The Scientific World Journal, 1–9. doi:10.1155/2015/284276.
[10] T. Melodia, M.C. Vuran, and D. Pompili, “The State of the Art in Cross-Layer Design for Wireless Sensor Networks,” Proc. EURONGI Workshops Wireless and Mobility, pp. 78-92, 2006.
[11] C.R. Lin and M. Gerla, “Asynchronous Multimedia Multihop Wireless Networks,” Proc. IEEE INFOCOM, vol. 1, pp. 118-125, Apr. 1997.
[12] Harold Robinson, Y., & Rajaram, M. (2015), “Establishing pairwise keys using key Predistribution schemes for sensor networks”, World Academy of Science, Engineering and Technology International Journal of Computer, Electrical, Automation, Control and Information Engineering, 9(2), 608–612.
[13] S. Biswas, R. Morris, Opportunistic routing in multi-hop wireless networks, ACM SIGCOMM Computer Communication Review 34 (1), (2004) 69–74.
[14] E. Rozner, J. Seshadri, Y. Mehta, L. Qiu, Soar: Simple opportunistic adaptive routing protocol for wireless mesh networks, MobileComputing, IEEE Transactions on 8 (12) (2009) 1622–1635.
[15] Balaji, S., Harold Robinson, Y. and Rajaram, M. (2016) SCSBE: Secured Cluster and Sleep Based Energy-Efficient Sensory Data Collection with Mobile Sinks. Circuits and Systems, 7, 1992-2001.http://dx.doi.org/10.4236/cs.2016.78173
[16] H. Dubois-Ferrière, M. Grossglauser, M. Vetterli, Valuable detours: Least-cost anypath routing, Networking, IEEE/ACM Transactions on 19 (2) (2011) 333–346.
[17] Z. Zhong, J. Wang, S. Nelakuditi, G.-H. Lu, On selection of candidates for opportunistic anypath forwarding, ACM SIGMOBILE Mobile Computing and Communications Review 10 (4) (2006) 1–2.
[18] Robinson, Y.H., Balaji, S. and Rajaram, M. (2016) “ECBK: Enhanced Cluster Based Key Management Scheme for Achieving Quality of Service”, Circuits and Systems, 7, 2014-2024. http://dx.doi.org/10.4236/cs.2016.78175.
[19] Y. Li, W. Chen, Z.-L. Zhang, Optimal forwarder list selection in opportunistic routing, in: Mobile Adhoc and Sensor Systems, 2009. MASS’09. IEEE 6th International Conference on, IEEE, 2009, pp. 670–675.
[20] H. Füßler, J. Widmer, M. Käsemann, M. Mauve, H. Hartenstein, Contention-based forwarding for mobile ad hoc networks, Ad Hoc Networks 1 (4) (2003) 351–369.
[21] Harold Robinson, Y., Rajaram, M., Golden Julie, E. and Balaji, S. (2016) Dominating Set Algorithm and Trust Evaluation Scheme for Secured Cluster Formation and Data Transferring. World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 10, 388-393.
[22] S. Yang, F. Zhong, C. K. Yeo, B. S. Lee, J. Boleng, Position based opportunistic routing for robust data delivery in MANETs, in: Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, IEEE, 2009, pp. 1–6.
[23] A. Darehshoorzadeh, L. Cerda-Alabern, Distance progress based opportunistic routing for wireless mesh networks, in: Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International, IEEE, 2012, pp. 179–184.
[24] Harold Robinson, Y., Rajaram, M., Golden Julie, E. and Balaji, S. (2016), “Tree Based Data Fusion Clustering Routing Algorithm for Illimitable Network Administration in Wireless Sensor Network”, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:10, No:6, pp. 1123 – 1130.
[25] S. Gupta, S. K. Dhurandher, I. Woungang, A. Kumar, M. S. Obaidat, Trust-based security protocol against blackhole attacks in opportunistic networks, in: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE, 2013, pp. 724–729.
[26] M. M. Mahmoud, X. Lin, X. Shen, et al., Secure and reliable routingprotocols for heterogeneous multihop wireless networks, Parallel andDistributed Systems, IEEE Transactions on 26(4), (2015) 1140–1153.
[27] Harold Robinson, Y., Rajaram, M., Golden Julie, E. and Balaji, S. (2016), “TBOR: Tree Based Opportunistic Routing for Mobile Ad Hoc Networks”, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:10, No:6, pp. 1115 – 1122.
[28] J.-H. Cho, A. Swami, R. Chen, A survey on trust management for mobile ad hoc networks, Communications Surveys & Tutorials, IEEE 13 (4) (2011) 562–583.
[29] H. Yu, Z. Shen, C. Miao, C. Leung, D. Niyato, A survey of trust and reputation management systems in wireless communications, Proceedings of the IEEE 98 (10) (2010) 1755–1772.
[30] Ramalakshmi, S., & Robinson, Y. H. (2014). “ATMPH: Attaining optimal throughput capacity of MANET with power control in heterogeneous network”, Programmable Device Circuits and Systems, 6(4), 111–115.
[31] A. Ayyasamy and K. Venkatachalapathy, “Context aware adaptive service based dynamic channel allocation approach for providing an optimal QoS over MANET”, International journal of engineering and technology (IJET), vol. 6, no. 3, pp. 1465-1479, jun-jul 2014. ISSN: 0975-4024.
[32] G. Han, J. Jiang, L. Shu, J. Niu, H.-C. Chao, Management and applications of trust in wireless sensor networks: A survey, Journal of Computer and System Sciences 80 (3) (2014) 602–617.
[33] Robinson, Y. H., &Rajeswari, S. R. (2011). “Energy-based dynamic encryption for wireless sensor networks. Wireless Communication”, vol.3, no.9, pp. 661–663.
[34] S. Buchegger, J.-Y. Le Boudec, Performance analysis of the confidant protocol, in: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, ACM, 2002, pp. 226–236.
[35] P. Michiardi, R. Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in: Advanced Communications and Multimedia Security, Springer, 2002, pp. 107–121.
[36] Harold Robinson, Y., & Rajaram, M. (2014). “A novel approach to allocate channels dynamically in wireless mesh networks”, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 8, no.10, pp. 1865–1868.
[37] T. Ghosh, N. Pissinou, K. Makki, Towards designing a trusted routing solution in mobile ad hoc networks, Mobile Networks and Applications 10 (6) (2005) 985–995.
[38] A. Boukerche, Y. Ren, R. W. N. Pazzi, An adaptive computational trust model for mobile ad hoc networks, in: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, ACM, 2009, pp. 191–195.
[39] Golden Julie, E., Tamil Selvi, S., & Harold Robinson, Y. (2014). “Opportunistic routing with secure coded wireless multicast using MAS approach”,World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 8, no.7, pp. 1247–1250.
[40] N. Li, S. K. Das, A trust-based framework for data forwarding in opportunistic networks, Ad Hoc Networks 11 (4) (2013) 1497–1509.
[41] R. Chen, F. Bao, M. Chang, J.-H. Cho, Dynamic trust management for delay tolerant networks and its application to secure routing, Parallel and Distributed Systems, IEEE Transactions on 25 (5) (2014) 1200– 1210.
[42] Golden Julie, E., Tamil Selvi, S., & Harold Robinson, Y. (2016). “Performance Analysis of Energy Efficient Virtual Back Bone Path Based Cluster Routing Protocol for WSN”, Wireless Personal Communications, Springer, 1–19, DOI 10.1007/s11277-016-3520-5.
[43] S. Gupta, S. K. Dhurandher, I. Woungang, A. Kumar, M. S. Obaidat,Trust-based security protocol against blackhole attacks in opportunisticnetworks, in: 2013 IEEE 9th International Conference on Wireless andMobile Computing, Networking and Communications (WiMob), IEEE,2013, pp. 724–729.
[44] S. Biswas, R. Morris, Exor: opportunistic multi-hop routing for wireless networks, in: ACM SIGCOMM Computer Communication Review, Vol. 35, ACM, 2005, pp. 133–144.
[45] Harold Robinson, Y., Rajaram, M., Golden Julie, E. and Balaji, S. (2016), “Detection of Black Holes in MANET Using Collaborative Watchdog with Fuzzy Logic”, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:10, No:3, pp. 575 – 581.
[46] Z. Zhao, B. Mosler, T. Braun, Performance evaluation of opportunistic routing protocols: A framework-based approach using omnet++, in: Proceedings of the 7th Latin American Networking Conference, ACM, 2012, pp. 28–35.
[47] I. F. Akyildiz, W. Su, Y. Ankara subramaniam, E. Cayirci, Wirelesssensornetworks: a survey, Computer networks 38 (4) (2002) 393–422.
[48] Golden Julie, E., & Tamil Selvi, S. (2016),“Development of energy efficient clustering protocol in wireless sensor network using neuro-fuzzy approach” The Scientific World Journal, Article ID 5063261, 1–8.
[49] M. P. Ðurišic, Z. Tafa, G. Dimic, V. Milutinovic, A survey of military applications of wireless sensor networks, in: Embedded Computing (MECO), 2012 Mediterranean Conference on, IEEE, 2012, pp. 196–199.
[50] Ayyasamy, A., and K. Venkatachalapathy. "Context aware adaptive fuzzy based QoS routing scheme for streaming services over MANETs." Wireless Networks 21.2 (2015): 421-430.
[51] E. Golden Julie, E. Sahaya Rose Vigita, S. Tamil Selvi(2014), “Distributed Self-Healing Protocol for Unattended Wireless Sensor Network”, World Academy of Science, Engineering and Technology, International Journal of Computer, Information, Systems and Control Engineering Vol:8 No:10, pp. 1680 – 1683.
[52] I. F. Akyildiz, D. Pompili, T. Melodia, Underwater acoustic sensor networks: research challenges, Ad hoc networks 3 (3) (2005) 257–279.
[53] L. F. M. Vieira, Performance and trade-offs of opportunistic routing in underwater networks, in: Wireless Communications and Networking Conference (WCNC), 2012 IEEE, IEEE, 2012, pp. 2911–2915.
[54] S. Balaji, M. Rajaram (2014), “EUDIS-An Encryption Scheme for User-Data Security in Public Networks”, World Academy of Science, Engineering and Technology, International Journal of Computer, Information, Systems and Control Engineering Vol:8 No:11, pp. 1825 – 1830.
[55] J.K. Hart, K. Martinez, Environmental sensor networks: A revolution in the earth system science, Earth-Science Reviews 78 (3) (2006) 177– 191.
[56] L. Atzori, A. Iera, G. Morabito, The internet of things: A survey, Computer networks 54 (15) (2010) 2787–2805.
[57] G.ArunSamPaul Thomas, R.Karthik Ganesh, A.Kandasamy, S.Balaji, Y.Harold Robinson, (2011) “An Advanced Controlled-Flooding Routing with Group Organization for Delay Tolerant Networks using A-SMART”, Emerging Trends in Electrical and Computer Technology (ICETECT), 978-1-4244-7926-9/11, IEEE.
[58] Ayyasamy, A., and K. Venkatachalapathy. "Increased Throughput for Load based Channel Aware Routing in MANETs with Reusable Paths." International Journal of Computer Applications 40.2 (2012): 20-23.
[59] A. Darehshoorzadeh, R. De Grande, A. Boukerche, Towards a comprehensive model for performance analysis of opportunistic routing in wireless mesh networks, Transactions on Vehicular Technology PP (99) (2015) 1–15.
[60] S. Balaji, M. Rajaram (2016), “SIPTAN: Securing Inimitable and Plundering Track for Ad Hoc Network”, Wireless Personal Communications, Springer, 1-21, DOI 10.1007/s11277-016-3187-y.