Opportunistic Routing Scheme in Mobile Adhoc Network Networks

Download Full-Text PDF Cite this Publication

Text Only Version

Opportunistic Routing Scheme in Mobile Adhoc Network Networks

Opportunistic Routing Scheme in Mobile Ad- hoc Network Networks

Priscilla.J1, Saravana Kumar.S2

1M.E-Student, Department of CSE, Srinivasan Engineering College, Perambalur, Tamilnadu, India

2 Assistant professor Department of CSE, Srinivasan Engineering College, Perambalur, Tamilnadu, India

1priscicse@gmail.com , 2saravana.coolya@gmail.com

Abstract-The opportunistic data transfer in mobile ad hoc network is difficult. For that our solution is called Cooperative Opportunistic Routing in Mobile Ad hoc Networks (CORMAN) .Unfortunately, it ignores the inherent nature of broadcasting wireless communication link. Cooperative communication is an effective approach to achieving such a goal. A flow of data packets are divided into batches. All packets in the same batch carry the same forwarder list when they leave the source node. Proactive Source Routing (PSR), which provides each node with the complete routing information to all other nodes in the network. The forwarder list contains the identities of the nodes on the path from the source node to the destination. CORMAN generalizes the opportunistic data forwarding in ExOR to suit mobile wireless networks. When a batch of packets are forwarded along the route towards the destination node, if an intermediate node is aware of a new route to the destination In corman a new methodology has been implemented to provide a high security in the form of rumor riding where the message and key travels in a different path. Its a new approach where a large amount of data can be transferred securely in the infrastructure as well as infrastructure less environment.

Keywords: Corman, proactive source routing, Ex0R, OLSR

  1. INTRODUCTION

    A mobile ad hoc network (MANET) is a wireless communication network where nodes that are not within direct transmission range establish their communication via the help of other nodes to forward data. It can operate without a fixed infrastructure, support user mobility, and falls under the general scope of multi-hop wireless networking.

    Such a networking paradigm originated from the needs in battlefield communications, emergency operations, search and rescue, and disaster relief operations. Later, it found civilian applications such as community networks. A great deal of research results on MANE Ts has been published since its early days in the 1980s, and the network layer has received the most attention. Two most important operations at the network layer are routing and forwarding. Data forwarding regulates how packets are taken from one link and put on another. Routing determines which path a data packet should follow from the source node to the destination. With different network types, topologies and performance objectives, abundant routing protocols with differing features and for various specific needs have been proposed. Many routing protocols in wireless network are fundamentally derived from two algorithms adopted in the Internet Link State (LS) routing and Distance Vector (DV) routing.In LS routing, every node provide the cost to it neighbors to all other nodes in the network, so every node has the knowledge of the topology of the entire network and it can always select the best route to the destination. In DV routing, a node provide its neighbors the knowledge of the estimated cost to reach a particular destination, so every node can choose the most efficient neighbor as the next hop to reach a destination node. Because LS provides more information about the network structure than DV does, the LS usually has a larger overhead than DV. Meanwhile, routing protocols in MANETs are usually categorized as proactive and

    Priscilla.J, Saravana Kumar.S

    742

    reactive according to their timing strategy. Proactive routing means that nodes in the network should maintain valid routes to all destinations at all time. Instead, reactive routing means the nodes in the network do not always maintain routing information. When a node receives data from the upper layer for a given destination, it must first find out about how to reach the destination. In general, most proposed routing protocols in MANETs can be categorized according to their different fundamental algorithms and timing strategies. For example, Destination- Sequenced Distance Vector is a proactive protocol based on DV, Ad-hoc On Demand Distance Vector is a reactive one based on DV, and Optimized Link State Routing is a proactive routing protocol using LS. Another important type of routing protocol is source routing, which is neither LS nor DV, where the entire route is included in the data packet. Although it might contain security vulnerable, the advantages prevail its possible weaknesses. Source routing protocols can not only provide routing information, but also control data forwarding when it is handled by intermediate nodes, which is quite different from IP forwarding used by LS or DV.

  2. RELATED WORK

Traditional MANET routing protocols are quite susceptible to link failure as well as vulnerable to malicious node attacks. One of the main reasons is due to the property that a predetermined route must be established before packet transmission. (It is realized through periodic update for every node in proactive routing, or on-demand construction in reactive routing.) Such kind of route discovery and establishment process inevitably introduce a variety of control messages which can become an attackers target and can be easily intercepted, modified or just dropped. The QoS of the communication is thus degraded and even worse, the transmission could never be established.Zone-disjoint routes in wireless medium where paths are said to be zone-disjoint when data communication over one path will not interfere with data communication in other path. This project has used this notion as a route selection criterion. However, zone-disjointness alone is also not sufficient for performance improvement. If the path length (number of hops) were large, that would

increase the end-to-end delay even in the context of zone-disjointness. So, it is imperative to select maximally zone-disjoint shortest paths.Adaptive Multipath Routing, Each node in the network uses its current network status information (approximate topology information and ongoing communication information) to calculate the suitable next hop for reaching a specified destination via multiple paths such that the interference with the nodes that are already involved in some communication gets minimized. Our goal is to distribute the network load along a set of diverse paths to achieve load balancing through multipath for an effective gain in throughput.

3 .OBJECTIVES AND CHALLENGES

CORMAN is a network layer solution to the opportunistic data transfer in mobile ad hoc networks. Its node coordination mechanisms is largely inline with that of EXOR and its an extension to EXOR in order to accommodate node mobility.CORMAN has two objectives,1) It broadens the application of EXOR to mobile multi-hop wireless networks without relying on external information sources, such as node positions.2)It incurs a smaller overhead than EXOR.

  1. Corman relies on the assumption that every source node has complete knowledge of how to forward data packets to any node in the network at any time. To reduce the overhead in route calculation we need a lightweight solution.

  2. When the forwarder list is constructed and installed in a data packets, the source node has updated knowledge of the network structure within its proximity but its knowledge about furter areas of the network can be obsolete due to node mobility. This error becomes worse as the data packet is forwarded towards the destination node. To address this issue, intermediate nodes should have the ability to update the forwarder list adaptively with their new knowledge when forwarding data packets.

    Priscilla.J, Saravana Kumar.S

    743

  3. When used in a dynamic environment, a mobile ad hoc network must inevitably face the drastic link quality fluctuation.A short forwarder list carried by data packets implies that they tend to take long and possibly weak links. For opportunistic data transfer, this could be problematic since the list may not contain enough redundancy in selecting intermediate nodes. This should be overcome with little additional overhead.

    1. DSR is a reactive flat protocol. The main difference between DSR and all other reactive protocols is that it is based on source routing scheme. In source routing, the source node specifies the intermediate nodes sequence. In a DSR protocol, mobile nodes are required to maintain route caches that contain the source routes to all mobile nodes that it is aware. The entries in the route cache are updated as new routes are learned. When a node requires sending data to a destination node, it first refers its routing cache to determine if it has a route to the destination. If an unexpired route exists, it will use the route to send the packet.

      Fig1.Route Request propogation

      Fig2 .Route Reply with Reference of destination routecache

    2. OLSR is a link-state and proactive based protocol. Unlike distance victor protocols, link-state protocols do not relay on number of hops to the destination node. Instead, link-state algorithms determined the best route according to the link load, delay, bandwidth etc. Although calculating the best available route by this approach is more complicated than hop count, it is approved that link-state routes are more accurate and stable. Control overheads information is compact and retransmission number to flood these control messages is reduced comparing to pure link-state protocols. The perfect network context for OLSR is low mobile and dense ad hoc networks. OLSR overhead control signals do not require for a reliable transmission link, which is very suitable for wireless networks. OLSR supports node mobility as far as it is traceable by its neighbours. Overhead control signals are periodically broadcasted by each node in the network. The period between each signal is determined according to the nodes expected speed. Each node N in the network, selects a set from the next hop neighbors called multipoint relay nodes.

      1. (b)

Fig 3. OLSR Routing Mechanism

Priscilla.J, Saravana Kumar.S

744

  1. SYSTEM MODEL

    1. PSR runs in the background.so that nodes periodically exchange network structure information.It converges after the number of iterations equal to the network diameter.At this point each node has a spaning tree of the network indicating the shortest path to all other nodes.

    2. When data packets are received by and stored at forwarding node,the node may have a different view of how to forward them to the destination from the forwarder list carried by the packets.since this node is closer to the destination than the source node.when the packets with this updated forwarder list are broadcast by the forwarder,the update about the network topology change propogates back to its upstream neighbor.The neighbor incorporates the changes to the packets in its cache .

    3. A short forwarder list forces packets to be forwarded over long and possibly weak links. To increase the reliability of data forwarding between two listed forwarders, CORMAN allows nodes that are not on the forwarder list but are situated between these two

      listed forwarders to retransmit data packets if the downstream forwarder has not received these packets successfully. Since there may be multiple such nodes between a given pair of listed forwarders, CORMAN coordinates retransmission attempts among them extremely efficiently.

  2. CONCLUSION

In particular, the PSR is motivated by the need of supporting opportunistic data forwarding in mobile ad hoc networks. In order to generalize the milestone work of ExOR and its function in such networks a proactive source routing protocol is going to be implemented. Such protocol is expected to provide more topology information than distance vector. By implementing this concept both the data and network privacy is maintained than the existing system

REFERENCES

  1. S. Biswas and R. Morris, ExOR: Opportunistic Multi-Hop Routing for Wireless Networks, in Proc. ACM Conference of the Special Interest Group on Data Communication (SIGCOMM), Philadelphia, PA, USA, August 2005, pp. 133144.

  2. J. Behrens and J. J. Garcia-Luna-Aceves, Distributed, Scalable Routing based on Link-State Vectors, in Proc. ACM SIGCOMM, 1994, pp. 136 147.

  3. I. Chlamtac, M. Conti, and J.-N. Liu, Mobile Ad hoc Networking: Imperatives and Challenges, Ad Hoc Networks, vol. 1, no. 1, pp. 13 64, July 2003.

  4. S. Chachulski, M. Jennings, S. Katti, and D. Katabi, Trading Structure for Randomness in Wireless Opportunistic Routing, in Proc. ACM Conference of the Special Interest Group on Data Communication (SIGCOMM), Kyoto, Japan, August 2007, pp. 169180.

  5. C. Fragouli, J.-Y. L. Boudec, and J. Widmer, Network Coding: an Instant Primer, SIGCOMM Computer Communication Review, vol. 36, pp. 63 68, January 2006.

    Priscilla.J, Saravana Kumar.S

    745

  6. P. Larsson, Selection Diversity Forwarding in a Multihop Packet Radio Network With Fading Channel and Capture, ACM Mobile Computing and Communications Review, vol. 5, no. 4, pp. 4754, October 2001.

  7. I. Leontiadis and C. Mascolo, GeOpps: Geographical Opportunistic Routing for Vehicular Networks, in Proc. IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM), Helsinki, Finland, June 2007, pp. 16.

  8. S. Murthy, Routing in Packet-Switched Networks Using Path-Finding Algorithms, Ph.D. dissertation, University of California – Santa Cruz, 1156 High Street, Santa Cruz, CA 95064, United States, 1996.

  9. C. E. Perkins and E. M. Royer, Ad hoc On- Demand Distance Vector (AODV) Routing, RFC 3561, July 2003.

Priscilla.J, Saravana Kumar.S

746

Priscilla.J, Saravana Kumar.S

747

Leave a Reply

Your email address will not be published. Required fields are marked *