Skip to main content
Top
Published in: Cluster Computing 5/2019

11-11-2017

Multi path interference aware reliable route path establishment in mobile adhoc network environment

Authors: V. Vignesh, K. Premalatha

Published in: Cluster Computing | Special Issue 5/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile adhoc network is a mixture of various mobile sensor nodes that are dispersed in the environment. The key idea of this system uses MANET environments to publicize the truths by increasing the data transmission rate. This influences to changed security problems such as collision, conflict et cetera. These problems would decrease the scattering of the packet ratio. In the preceding research method Interference Avoidance using CoEfficient of Restitution Measure (IA-CERM) is accomplished. This would compute the “restitution” of a collision of a node that is accomplished due to discovering the incoming packets from above one node by opening up this calculation, mounting enhanced route could be accomplished by reducing the interference effect. On the other hand these techniques are short of from the interference all through the subsistence of various paths existence. This is solved in the presented research methodology by proposing the new research methodology called as Multi-Path Interference aware Route Path Establishment (MP-IRPE). In this stage, dynamic analysis route behavior is carried out to discover the route path breakage priory. The non-interfering numerous paths will be chosen parallel while the data’s broadcasting via the principal path to avoid the path breakage. Therefore the instantaneous re-routing could be carried out without delay; consequently the waiting time could be minimized significantly. In this work optimal routing is done with the consideration of multiple QoS parameters using pareto-optimal approach as like in our previous work QoS and interference aware routing in dynamic MANET. The QoS parameters considered are “bandwidth, power, delay, link stability and reliability”. The whole assessment of the research method is performed and executed in the NS2 simulation environment. So, it is shown that the proposed methodology give improved result compared to the existing techniques. While comparing with other familiar protocols, MP-IRPE gives fine qualities in relation to overhead latency, and packet losses. In addition, these outcomes end to be relatively self-sufficient from the degree of mobility.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Yu, W., Mi, Z., Niu, D., Xu, R.: Algorithm of exposed terminals concurrent transmission based on reverse path in MANET. In: Second International Conference on Mechanic Automation and Control Engineering (MACE), IEEE, pp. 3819–3822 (2011) Yu, W., Mi, Z., Niu, D., Xu, R.: Algorithm of exposed terminals concurrent transmission based on reverse path in MANET. In: Second International Conference on Mechanic Automation and Control Engineering (MACE), IEEE, pp. 3819–3822 (2011)
2.
go back to reference Saggar, H., Jiang, Y., Daneshrad, B., Pottie, G.: A concurrent CSMA MAC protocol for mobile ad hoc networks using beamnulling. In: Military Communications Conference (MILCOM), IEEE, pp. 97–102 (2015) Saggar, H., Jiang, Y., Daneshrad, B., Pottie, G.: A concurrent CSMA MAC protocol for mobile ad hoc networks using beamnulling. In: Military Communications Conference (MILCOM), IEEE, pp. 97–102 (2015)
3.
go back to reference Zhang, X., Wu, L., Zhang, Y., Sung, D.K.: Interference dynamics in MANETs with a random direction node mobility model. In: Wireless Communications and Networking Conference (WCNC), IEEE, pp. 3788–3793 (2013) Zhang, X., Wu, L., Zhang, Y., Sung, D.K.: Interference dynamics in MANETs with a random direction node mobility model. In: Wireless Communications and Networking Conference (WCNC), IEEE, pp. 3788–3793 (2013)
4.
go back to reference Bugliesi, M., Gallina, L., Marin, A., Rossi, S., Hamadou, S.: Interference-sensitive preorders for MANETs. In: Ninth International Conference on Quantitative Evaluation of Systems (QEST), IEEE Computer Society, pp. 189–198 (2012) Bugliesi, M., Gallina, L., Marin, A., Rossi, S., Hamadou, S.: Interference-sensitive preorders for MANETs. In: Ninth International Conference on Quantitative Evaluation of Systems (QEST), IEEE Computer Society, pp. 189–198 (2012)
5.
go back to reference Man Shrestha, D., Cho, G.-H.., Ko, Y.-B.., Duke Cho, W.: An interference-aware algorithm for topology control in ubiquitous ad hoc networks. In: Proceedings of the Workshops in the International Conference on Ubiquitous Computing (Ubicomp’05) (2005) Man Shrestha, D., Cho, G.-H.., Ko, Y.-B.., Duke Cho, W.: An interference-aware algorithm for topology control in ubiquitous ad hoc networks. In: Proceedings of the Workshops in the International Conference on Ubiquitous Computing (Ubicomp’05) (2005)
6.
go back to reference Tresch, R., Alfano, G., Guillaud, M.: Interference alignment in clustered ad hoc networks: high reliability regime and per-cluster aloha. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3348–3351 (2011) Tresch, R., Alfano, G., Guillaud, M.: Interference alignment in clustered ad hoc networks: high reliability regime and per-cluster aloha. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3348–3351 (2011)
7.
go back to reference Tang, J., Xue, G., Zhang, W.: Interference aware topology control and QoS routing in multichannel wireless mesh networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc ’05) (2005) Tang, J., Xue, G., Zhang, W.: Interference aware topology control and QoS routing in multichannel wireless mesh networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc ’05) (2005)
8.
go back to reference Akoum, S., Kountouris, M., Debbahz, M., Heath, R.W.: Spatial interference mitigation for multiple input multiple output ad hoc networks: MISO gains. In: Proceedings of 45th Annual Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA (2011) Akoum, S., Kountouris, M., Debbahz, M., Heath, R.W.: Spatial interference mitigation for multiple input multiple output ad hoc networks: MISO gains. In: Proceedings of 45th Annual Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA (2011)
9.
go back to reference Haghighatdoost, V., Espandar, M.: A general approach for minimizing the maximum interference of a wireless ad-hoc network in plane. Int. J. Comput. Commun. Control 7(2), 231–243 (2012) Haghighatdoost, V., Espandar, M.: A general approach for minimizing the maximum interference of a wireless ad-hoc network in plane. Int. J. Comput. Commun. Control 7(2), 231–243 (2012)
10.
go back to reference Awuor, F., Djouani, K., Noelz, G., Olwal, T.: Coupled interference based rate adaptation in ad hoc networks. In: IEEE Conference AFRICON, pp. 1–6 (2011) Awuor, F., Djouani, K., Noelz, G., Olwal, T.: Coupled interference based rate adaptation in ad hoc networks. In: IEEE Conference AFRICON, pp. 1–6 (2011)
11.
go back to reference Jaoua, N., Duflos, E., Vanheeghe, P., Clavier, L., Septier, F.: Impulsive interference mitigation in ad hoc networks based on alpha-stable modeling and particle filtering. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3548–3551 (2011) Jaoua, N., Duflos, E., Vanheeghe, P., Clavier, L., Septier, F.: Impulsive interference mitigation in ad hoc networks based on alpha-stable modeling and particle filtering. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3548–3551 (2011)
12.
go back to reference Feng, G., Chang Liew, S., Fan, P.: Minimizing interferences in wireless ad hoc networks through topology control. In: Proceedings of IEEE International Conference on Communication Society (ICC’08) (2008) Feng, G., Chang Liew, S., Fan, P.: Minimizing interferences in wireless ad hoc networks through topology control. In: Proceedings of IEEE International Conference on Communication Society (ICC’08) (2008)
13.
go back to reference Lee, S., Royer, E.M., Perkins, C.E.: Scalability study of the ad hoc on demand distance vector routing protocol. Int. J. Netw. Manag. 13(2), 97–114 (2003)CrossRef Lee, S., Royer, E.M., Perkins, C.E.: Scalability study of the ad hoc on demand distance vector routing protocol. Int. J. Netw. Manag. 13(2), 97–114 (2003)CrossRef
14.
go back to reference Iwata, A., Chiang, C., Pei, G., Gerla, M., Chen, T.: Scalable routing strategies for ad hoc wireless networks. IEEE J. Sel. Areas Commun. 7(8), 1369–1379 (1999)CrossRef Iwata, A., Chiang, C., Pei, G., Gerla, M., Chen, T.: Scalable routing strategies for ad hoc wireless networks. IEEE J. Sel. Areas Commun. 7(8), 1369–1379 (1999)CrossRef
15.
go back to reference Hong, X., Gerla, M., Xi, Y., Xu, K., Kwon, T.: Scalable ad hoc routing in large, dense wireless networks using clustering and landmarks. In: Proceedings of the IEEE International Conference on Communications, (ICC2002), New York City, New York (2002) Hong, X., Gerla, M., Xi, Y., Xu, K., Kwon, T.: Scalable ad hoc routing in large, dense wireless networks using clustering and landmarks. In: Proceedings of the IEEE International Conference on Communications, (ICC2002), New York City, New York (2002)
16.
go back to reference Kuhn, F., Wattenhofer, R., Zollinger, A.: Ad-hoc networks beyond unit disk graphs. In: Joint Workshop on Foundations of Mobile Computing, DIALMPOMC ’03, pp. 69–78 (2003) Kuhn, F., Wattenhofer, R., Zollinger, A.: Ad-hoc networks beyond unit disk graphs. In: Joint Workshop on Foundations of Mobile Computing, DIALMPOMC ’03, pp. 69–78 (2003)
17.
go back to reference Barriére, L., Fraigniaud, P., Narayanan, L.: Robust position-based routing in wireless ad hoc networks with unstable transmission ranges. In: 5th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, ACM, pp. 19–27 (2001) Barriére, L., Fraigniaud, P., Narayanan, L.: Robust position-based routing in wireless ad hoc networks with unstable transmission ranges. In: 5th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, ACM, pp. 19–27 (2001)
18.
go back to reference Yang, W., Yang, X., Yang, S., Yang, D.: A greedy-based stable multi-path routing protocol in mobile ad hoc networks. Ad Hoc Netw. 9, 662–674 (2011)CrossRef Yang, W., Yang, X., Yang, S., Yang, D.: A greedy-based stable multi-path routing protocol in mobile ad hoc networks. Ad Hoc Netw. 9, 662–674 (2011)CrossRef
Metadata
Title
Multi path interference aware reliable route path establishment in mobile adhoc network environment
Authors
V. Vignesh
K. Premalatha
Publication date
11-11-2017
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 5/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1289-2

Other articles of this Special Issue 5/2019

Cluster Computing 5/2019 Go to the issue

Premium Partner