On-Demand Multi Path Distance Vector Routing in Ad Hoc Networks

نویسندگان

  • Mahesh K. Marina
  • Mahesh K. Das
چکیده

On-demand routing protocols for ad hoc networks discover and maintain only the needed routes to reduce routing overheads. They use a flood-based route discovery mechanism to find routes when required. Since each route discovery incurs high overhead and latency, the frequency of route discoveries must be kept low for on-demand protocols to be effective. On-demand multipath protocols achieve this objective by computing multiple paths in a single route discovery. In this paper, we present AOMDV, an on-demand multipath distance vector protocol, in the framework of a well-known single path protocol (AODV) of similar nature. AOMDV computes multiple loop-free link disjoint paths during route discovery. We introduce the notion of an advertised hopcount to establish loop free multiple paths. We compare the performance of AOMDV with AODV using extensive simulation experiments based on ns2. Simulation results show that AOMDV is able to reduce the frequency of route discoveries by as much as 30% and also achieve a remarkable reduction in the end-to-end delay — often more than a factor of two.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

In recent years, routing has been the most focused area in ad hoc networks research. On-demand routing in particular, is widely developed in bandwidth constrained mobile wireless ad hoc networks because of its effectiveness and efficiency. Most proposed on-demand routing protocols are built and relied on single route for each data session. Whenever there is a link disconnection on the active ro...

متن کامل

A QoS Ad Hoc On Demand Multi-path Distance Vector Routing Protocol (QAOMDV) over a Distributed TDMA MAC Protocol for Ad Hoc Networks

This paper focuses on the problem of QoS multi-path in wireless ad hoc networks. An integration of a novel multi-path routing protocol and a distributed Time Division Multiple Access (TDMA) MAC protocol is proposed. The MAC considered is called Evolutionary TDMA (E-TDMA) and the analysed multi-path routing protocol is the Ad Hoc On Demand multi-path Distance Vector (AOMDV) protocol. The integra...

متن کامل

Performance Comparison of Two On-demand Multi Path Routing Protocols for Ad Hoc Networks

In recent years, on-demand routing protocols have attained more attention in mobile ad hoc networks as compared to other routing schemes due to their abilities and efficiency. There exist many ondemand routing protocols for Mobile Ad hoc Networks (MANETS). Most of the protocols, however, use a single route and do not utilize multiple alternate paths. Multi path routing allows the establishment ...

متن کامل

Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks

In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...

متن کامل

An Efficient Cluster Based Approach for Multi-source Multicast Routing Protocol in Mobile Ad Hoc Networks

Mobile ad hoc networks are becoming an important concept of modern communication technologies and services. It provides some advantages to this communication world such as self-organizing and decentralization. In this paper, we are going to design a cluster-based multi source multicast routing protocol with new cluster head election, path construction and maintenance techniques. The main object...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001