Updating the Routing Position in Adhoc Networks by using Adaptive Position

نویسندگان

  • Ravi Kumar Poluru
  • T. Sunil Kumar Reddy
  • D. Nagaraju
چکیده

In geographic routing, nodes to theirinstantaneous neighbors call for to maintain up-to-date positions for making successfulforwarding decisions. The geographic location coordinates of the nodes by the periodic broadcasting of beacon packetsis atrendy method used by the majority geographic routing protocols to preserve neighbor positions. We contend and display that periodicbeaconing apart from of the node mobility and traffic patterns in the network is not nice-looking from both update cost and routingrecital points of view. We recommend the Adaptive Position Update (APU) strategy for geographic routing, which enthusiasticallyadjusts the occurrence of position updates based on the mobility dynamics of the nodes and the forwarding patterns in the system. APUis based on two easy principles: 1) nodes whose arrangements are harder to guess update their positions more recurrently (and viceversa), and (ii) nodes faster to forwarding paths update their positions more recurrently (and vice versa). Our speculative analysis, whichis validated by NS2 simulations of a well-known geographic routing procedure, Greedy Perimeter Stateless Routing Protocol (GPSR),shows that APU can drastically reduce the update cost and pick up the routing performance in terms of packet delivery ratio andregular end-to-end delay in assessment with periodic beaconing and other recently proposed updating schemes. The benefits of APUare additional confirmed by responsibility evaluations in realistic network scenarios, which account for localization error, practical radiopropagation, and sparse system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptive Routing In Mobile Adhoc Networks And Comparison Between Routing Protocols Aodv And Dsr For Apu Strategy

The Adhoc networks becomes very popular everyone is using these networks because of which we need to maintain up-to-date positions of their immediate neighbors for making effective forwarding decisions. Periodic broadcasting of beacon packets that contain the geographic location coordinates of the nodes is a popular method used by most geographic routing protocols to maintain neighbor positions...

متن کامل

Routing in Wireless Networks with Position Trees

Sensor networks are wireless adhoc networks where all the nodes cooperate for routing messages in the absence of a fixed infrastructure. Non-flooding, guaranteed delivery routing protocols are preferred because sensor networks have limited battery life. Location aware routing protocols are good candidates for sensor network applications, nevertheless they need either an external location servic...

متن کامل

Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks

In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...

متن کامل

Performance Analyses of Routing Protocol in Multihop Mobile Adhoc Networks

An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. A number of routing protocols such as Dynamic Source Routing (DSR), Ad Hoc on-Demand Distance Vector Routing (AODV) and DestinationSequenced Distance-Vector (DSDV) have been implemented. Routing in adhoc networks...

متن کامل

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1404.7751  شماره 

صفحات  -

تاریخ انتشار 2014