Packet Reserving and Clogging Control via Routing Aware Packet Reserving Framework in MANET
Authors: C. Sathiyakumar, K. Duraiswamy
Abstract:
In MANET, mobile nodes communicate with each other using the wireless channel where transmission takes place with significant interference. The wireless medium used in MANET is a shared resource used by all the nodes available in MANET. Packet reserving is one important resource management scheme which controls the allocation of bandwidth among multiple flows through node cooperation in MANET. This paper proposes packet reserving and clogging control via Routing Aware Packet Reserving (RAPR) framework in MANET. It mainly focuses the end-to-end routing condition with maximal throughput. RAPR is complimentary system where the packet reserving utilizes local routing information available in each node. Path setup in RAPR estimates the security level of the system, and symbolizes the end-to-end routing by controlling the clogging. RAPR reaches the packet to the destination with high probability ratio and minimal delay count. The standard performance measures such as network security level, communication overhead, end-to-end throughput, resource utilization efficiency and delay measure are considered in this work. The results reveals that the proposed packet reservation and clogging control via Routing Aware Packet Reserving (RAPR) framework performs well for the above said performance measures compare to the existing methods.
Keywords: Packet reserving, Clogging control, Packet reservation in MANET, RAPR.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1096940
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1811References:
[1] S. Yang, C. K. Yeo and B. S. Lee, “Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks”, IEEE Transactions on Mobile Computing, vol. 11, no. 1, 2012, pp. 111-124.
[2] J. Yu, Y. Qi, G. Wang and X. Gu, “A Cluster-Based Routing Protocol for Wireless Sensor Networks with Nonuniform Node Distribution”, International Journal of Electronics and Communications, vol. 66, no. 1, 2012, pp. 54-61.
[3] X. Yang et Al., “Location Aided Opportunistic Routing for Mobile Ad hoc Networks”, in the Proceedings of the fifth International Conference on Wireless Communication, Networking and Mobile Computing, Beijing, IEEE, 2009, pp. 1-5.
[4] S. Bu, F.R. Yu, X. P. Liu, X. P & H. Tang, “Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad hoc Networks”, IEEE Transactions on Wireless Communications, vol. 10, no. 9, 2011, pp. 3064-3073.
[5] Q. Guan, F. R. Yu, S. Jiang & V.C. M. Leung, “Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications”, IEEE Transactions on Vehicular Technology, vol. 61, no. 6, 2012, pp. 2674-2685.