In wireless ad hoc networks, the traditional routing protocols make the route selection based on minimum distance between the nodes and the minimum number of hop counts. Most of the routing decisions do not consider the condition of the network such as link quality and residual energy of the nodes. Also, when a link failure occurs, a route discovery mechanism is initiated which incurs high routing overhead. If the broadcast nature and the spatial diversity of the wireless communication are utilized efficiently it becomes possible to achieve improvement in the performance of the wireless networks. In contrast to the traditional routing scheme which makes use of a predetermined route for packet transmission, such an opportunistic routing scheme defines a predefined forwarding candidate list formed by using single network metrics. In this paper, a protocol is proposed which uses multiple metrics such as residual energy and link quality for route selection and also includes a monitoring mechanism which initiates a route discovery for a poor link, thereby reducing the overhead involved and improving the throughput of the network while maintaining network connectivity. Power control is also implemented not only to save energy but also to improve the network performance. Using simulations, we show the performance improvement attained in the network in terms of packet delivery ratio, routing overhead, and residual energy of the network.
In wireless ad hoc networks, traditional routing considers hop count and distance for making the route selection. The network is prone to various types of attacks by intruders in which packets maybe modified or dropped. A trust based mechanism maybe employed in which the nodes are constantly monitored for malicious behaviour. An abnormality in the behaviour of the intermediate node effects the trust value and such malicious nodes that are detected maybe excluded from the route and a new route discovery maybe initiated. In this paper, such a trust based routing is proposed to detect network layer attacks. A route discovery is initiated under the detection of malicious nodes as against the use of control packets for route rediscovery. Using simulation, it is proved that the proposed scheme achieves better performance in terms of Packet Delivery Fraction, end-to-end delay and therefore improves the performance of the network under adverse environment
There is an ever increasing demand for wireless communication devices that support high data rates. Many modern communication devices support variable data rates. The maximum data rate that can be sent over the wireless channels is determined by the channel capacity and its condition. For the efficient utilization of the scarce radio spectrum, it becomes very important to compute the capacity of these wireless channels. The capacity of the channel varies depending on the radio propagation environment considered. Certain factors such as fading and interference that have a detrimental effect in the physical layer are to be considered, while evaluating the performance of the network. Further, in a mobile ad hoc network, all nodes are exposed to interference due to the free mobility of nodes. In an IEEE802.11 based ad hoc network, it is found that the advantage of using high data rates is diminished by the shorter transmission range associated with it. Using simulations, the analysis of single hop and multihop network is carried out for a good understanding of the performance of the network under multiple data rates. This paper focuses on the capacity of the wireless ad hoc networks and analyses the effect of certain key factors namely, data rate, mobility of the nodes and residual energy of the nodes. The key motivation of this paper is to study the mobile network behavior, which provides useful insights in developing better routing strategies in a resource constrained network.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.