MANET Literature Review

download MANET Literature Review

of 29

Transcript of MANET Literature Review

  • 7/27/2019 MANET Literature Review

    1/29

    Chapter 2

    Routing and QoS in Mobile Ad hoc Networks

    Literature Review

    2.1 Ad hoc networks

    Ad hoc networks are wireless networks without a fixed infrastructure, which are usually

    assembled on a temporary basis to serve a specific deployment such as emergency rescue or

    battlefield communication. They are especially suitable for scenarios where the deployment of an

    infrastructure is either not feasible or is not cost effective. The differentiating feature of an ad

    hoc network is that the functionality normally assigned to infrastructure components, such as

    access points, switches, and routers, needs to be achieved by the regular nodes participating in

    the network. For most cases, there is an assumption that the participating nodes are mobile, do

    not have a guaranteed uptime, and have limited energy resources.

    Before describing the types of approaches and example protocols, it is important to explain the

    developmental goals for an ad hoc routing protocol so that the design choices of the protocols

    can be better understood. Hence, the following are typical design goals for ad hoc network

    routing protocols:

    Minimal control overhead: Control messaging consumes bandwidth, processing resources, and

    battery power to both transmit and receive a message. Because bandwidth is at a premium,

    routing protocols should not send more than the minimum number of control messages they need

    for operation, and should be designed so that this number is relatively small. While transmitting

    is roughly twice as power consuming as receiving, both operations are still power consumers for

    the mobile devices. Hence, reducing control messaging also helps to conserve battery power.

    Minimal processing overhead. Algorithms that are computationally complex require significant

    processing cycles in devices. Because the processing cycles cause the mobile device to use

    resources, more battery power is consumed. Protocols that are lightweight and require a

    minimum of processing from the mobile device reserve battery power for more user-oriented

    tasks and extend the overall battery lifetime.

  • 7/27/2019 MANET Literature Review

    2/29

    Multihop routing capability. Because the wireless transmission range of mobile nodes is often

    limited, sources and destinations may typically not be within direct transmission range of each

    other. Hence, the routing protocol must be able to discover multihop routes between sources and

    destinations so that communication between those nodes is possible.

    Dynamic topology maintenance. Once a route is established, it is likely that some link in the

    route will break due to node movement. In order for a source to communicate with a destination,

    a viable routing path must be maintained, even while the intermediate nodes, or even the source

    or destination nodes, are moving. Further, because link breaks on ad hoc networks are common,

    link breaks must be handled quickly with a minimum of associated overhead.

    Loop prevention. Routing loops occur when some node along a path selects a next hop to the

    destination is also a node that occurred earlier in the path. When a routing loop exists, data and

    control packets may traverse the path multiple times until either the path is fixed and the loop is

    eliminated, or until the time to live (TTL) of the packet reaches zero. Because bandwidth is

    scarce and packet processing and forwarding is expensive, routing loops are extremely wasteful

    of resources and are detrimental to the network. Even a transitory routing loop will have a

    negative impact on the network. Hence, loops should be avoided at all times.

    2.2 QoS in MANETs

    According to RFC2386, QoS is a set of service requirements to be met by the network while

    transporting a flow. A flow is a packet stream from a source to a destination (unicast or

    multicast) with an associated (QoS). The associated QoS could, in fact, be best effort. A

    fundamental requirement of any QoS mechanism is a measurable performance metric. Typical

    QoS metrics include available bandwidth, packet loss rate, estimated delay, packet jitter, hop

    count and path reliability.

    Analogous to todays Internet, ad hoc networks are being designed to provide best-effortservice(i.e. do not provide any guarantees regarding packet loss or delay, available bandwidth, jitter

    etc.). In a best-effort service model, packets are dropped regardless of their importance. If a

    packet is lost, the sender can simply retransmit the lost packet. This method is efficient for

    applications that do not require bounds on packet delay or other QoS metrics. However, real-time

    applications, such as video-on-demand (VoD), videoconferencing and Internet telephony have,

  • 7/27/2019 MANET Literature Review

    3/29

    are sensitive to packet loss and delay and may have minimum bandwidth requirements

    Consequently, the best-effort service may not be suitable for these applications.

    Technically, there are two ways in which QoS can be achieved: (1) over-provisioning and (2)

    traffic engineering. Over provisioning utilizes the best-effort approach and simply increases the

    available resources (e.g. bandwidth, buffers etc.). For example, network designers could simply

    increase the capacity of a congestion link or network from 10 to 100 Mb. The second approach,

    traffic engineering, tries to utilize resources efficiently and to make the network QoS-aware. This

    could include additional service classes, admission control, resource reservations and so on. In

    this paper, we focus on the traffic-engineering approach.

    Research and development efforts are under way to enhance the Internet with QoS components

    that will allow the transport of real-time data (e.g. digitized audio and video). However, these

    enhancements may not be suitable for ad hoc networks. For example, current QoS routing

    algorithms require accurate link state (e.g. available bandwidth, packet loss rate, estimated delay

    etc.) and topology information. The time varying capacity of wireless links, limited resources

    and node mobility make maintaining accurate routing information very difficult if not impossible

    in an ad hoc networking environment. Thus, while providing QoS support in addition to

    flexibility and mobility is a tremendously challenging task for the Internet as well as cellular

    networks, in which the mobile node is only a single hop from a wired fixed infrastructure,

    supporting QoS in ad hoc networks is an even more difficult challenge.

    2.3 AD HOC NETWORKS APPLICATIONS

    In this section, we present some applications of ad hoc networks [25]:

    Conferencing:Mobile conferencing is without a doubt one of the most recognized applications.

    Establishment of an ad hoc network is essential for mobile users where they need to collaborate

    in a project outside the typical office environment.

    Emergency Services: Responding to emergency situations such as disaster recovery is yet

    another naturally fitting application in the ad hoc networking domain. During the time of

    emergencies, several mobile users (policeman, firefighters, first response personnel) with

  • 7/27/2019 MANET Literature Review

    4/29

    different types of wireless devices need to not only communicate but also maintain the

    connectivity for long periods of time.

    Home Networking. The wireless computers at home can also create an ad hoc network where

    each node can communicate with the others without taking their original point of attachment into

    consideration. This approach is alternative to assigning multiple IP addresses to each wireless

    device in order to be identified.

    Embedded Computing Applications. Several ubiquitous computing [26] internetworking

    machines offer flexible and efficient ways of establishing communication methods with the help

    of ad hoc networking. Many of the mobile devices already have add-on inexpensive wireless

    components, such as PDAs with wireless ports and Bluetooth radio devices.

    Sensor Dust.This application can be considered a combination of ad hoc and sensor networks.

    In hazardous or dangerous situations, it makes sense to distribute a group of sensors with

    wireless transceivers to obtain critical information about the unknown site by the creation of ad

    hoc networks of these sensors.

    2.4 AD HOC NETWORKS ROUTING PROTOCOLS

    Routing in wireless ad hoc networks is clearly different from routing found in traditional

    infrastructure networks. Routing in ad hoc networks needs to take into account many factors

    including topology, selection of routing path and routing overhead, and it must find a path

    quickly and efficiently. Ad hoc networks generally have lower available resources compared

    with infrastructure networks and hence there is a need for optimal routing. Also, the highly

    dynamic nature of these networks means that routing protocols have to be specifically designed

    for them, thus motivating the study of protocols that aim at achieving routing stability.

    Figure 2.1 shows a simple example of the need for dynamic routing when a wireless topology

    change occurs. In this case, routing provides the functionality to forward traffic from node A to

    node F. As dynamics cause the achievable network topology to change (e.g., node movements,

    wireless link failures), valid routes must be discovered and maintained in order to forward

    network data to the desired destination, node F in this example. This capability is no different

  • 7/27/2019 MANET Literature Review

    5/29

    from the general goal of IP layer routing, but the underlying design assumption of wireless

    interfaces and possibly mobile routing nodes presents increased technical challenges.

    Figure 2.1 Dynamic routing in a changing topology

    The traditional link-state and distance-vector algorithm do not scale in large MANETs. This is

    because periodic or frequent route updates in large networks may consume significant part of the

    available bandwidth, increase channel contention and may require each node to frequently

    recharge their power supply. To overcome the problems associated with the link-state and

    distance-vector algorithms a number of routing protocols have been proposed for MANETs.

    These protocols can be classified into three different groups: global/proactive, on-

    demand/reactive and hybrid. In proactive routing protocols, the routes to all the destination (or

    parts of the network) are determined at the start up, and maintained by using a periodic route

    update process. In reactive protocols, routes are determined when they are required by the source

    using a route discovery process. Hybrid routing protocols combine the basic properties of the

    first two classes of protocols into one. That is, they are both reactive and proactive in nature.

    Each group has a number of different routing strategies, which employ a flat or a hierarchicalrouting structure.

  • 7/27/2019 MANET Literature Review

    6/29

    2.4.1 Proactive versus Reactive Approaches

    Ad hoc routing protocols may generally be categorized as being either proactive or on-demand

    (reactive) according to their routing strategy [50]. Proactive protocols require that nodes in a

    wireless ad hoc network should keep track of routes to all possible destinations so that when a

    packet needs to be forwarded, the route is already known and can be used immediately. Any

    changes in topology are propagated through the network, so that all nodes know of those changes

    in topology. Examples include destination-sequenced distance-vector (DSDV) routing [27],

    wireless routing protocol (WRP) [28], global state routing (GSR) [29], and fisheye state

    routing (FSR) [30].

    On-demand protocols only attempt to build routes when desired by the source node so that the

    network topology is detected as needed (on-demand). When a node wants to send packets to

    some destination but has no routes to the destination, it initiates a route discovery process within

    the network. Once a route is established, it is maintained by a route maintenance procedure until

    the destination becomes inaccessible or until the route is no longerneeded. Examples include ad

    hoc on-demand distance vector routing (AODV) [23], dynamic source routing (DSR) [24],

    and Cluster Based Routing protocol (CBRP) [31].

    Proactive protocols have the advantage that new communications with arbitrary destinations

    experience minimal delay, but suffer the disadvantage of the additional control overhead to

    update routing information at all nodes. To cope with this shortcoming, reactive protocols adopt

    the inverse approach by finding a route to a destination only when needed. Reactive protocols

    often consume much less bandwidth than proactive protocols, but they will typically experience

    a long delay for discovering a route to a destination prior to the actual communication. However,

    because reactive routing protocols need to broadcast route requests, they may also generate

    excessive traffic if route discovery is required frequently.

  • 7/27/2019 MANET Literature Review

    7/29

    2.4.2 Clustering and Hierarchical Routing

    Scalability is one of the important problems in ad hoc networking. Scalability in ad hoc networks

    can be broadly defined as the networks ability to provide an acceptable level of service to

    packets even in the presence of a large number of nodes in the network. In proactive routing

    protocols, when the number of nodes in the network increase, the number of topology control

    messages increases nonlinearly and they may consume a large portion of the available

    bandwidth. In reactive routing protocols, large numbers of route requests to the entire network

    may eventually become packet broadcast storms. Typically, when the network size increases

    beyond certain thresholds, the computation and storage requirements become infeasible. When

    mobility is considered, the frequency of routing information updates may be significantly

    increased, thus worsening the scalability issues.

    One way to address these problems and to produce scalable and efficient solutions is hierarchical

    routing. Wireless hierarchical routing is based on the idea of organizing nodes in groups and then

    assigning nodes different functionalities inside and outside a group. Both the routing table size

    and update packet size are reduced by including in them only part of the network. For reactive

    protocols, limiting the scope of route request broadcasts also helps to enhance efficiency.

    The most popular way of building hierarchy is to group nodes geographically close to each other

    into clusters. Each cluster has a leading node (cluster head) to communicate with other nodes on

    behalf of these clusters. Examples of hierarchical ad hoc routing protocols include zone routing

    protocol (ZRP) [32] and zone-based hierarchical link state (ZHLS) routing protocol [33].

  • 7/27/2019 MANET Literature Review

    8/29

    2.5 Review of Ad hoc Proactive Routing Protocols

    This section presents brief descriptions for several existing proactive routing protocols.

    2.5.1 Dynamic Destination-Sequenced Distance-Vector Routing (DSDV)

    The Destination-Sequenced Distance-Vector (DSDV) Routing Algorithm [27] is a proactive hop-

    by-hop distance vector routing protocol, which is based on the idea of the classical Bellman-Ford

    Routing Algorithm with certain improvements. Every mobile station maintains a routing table

    that lists all available destinations, the number of hops to reach the destination and the sequence

    number assigned by the destination node. The sequence number is used to distinguish stale

    routes from new ones to avoid the formation of loops. The stations periodically transmit their

    routing tables to their immediate neighbours. A station also transmits its routing table if asignificant change has occurred in its table from the last update sent. The update is both time-

    driven and event-driven.

    The routing table updates can be sent in two ways:

    A full dump where the full routing table is sent to the neighbours (which could span many

    packets);

    An incremental update where only those entries from the routing table that have had a metricchange since the last update are sent (and these must fit in a single packet).

    If there is space in the incremental update packet, then those entries whose sequence number has

    changed may be included. When the network is relatively stable, incremental updates are sent to

    avoid extra traffic and full dumps are relatively infrequent. In a fast-changing network,

    incremental packets can grow large so full dumps will be more frequent.

    Each route update packet, in addition to the routing table information, also contains a unique

    sequence number assigned by the transmitter. The route labeled with the highest (i.e. most

    recent) sequence number is used. If two routes have the same sequence number then the route

    with the best metric (i.e. shortest route) is used. Based on past history, the stations estimate the

    settling time of routes. The stations delay the transmission of a routing update by settling time so

    as to eliminate those updates that would occur if a better route were found very soon.

  • 7/27/2019 MANET Literature Review

    9/29

    2.5.2 The Wireless Routing Protocol (WRP)

    The Wireless Routing Protocol (WRP) [28] is a proactive distance-vector routing protocol. Each

    node in the network maintains a distance table, a routingtable, a link-cost table and a message

    retransmission list. is a simple path, a loop or invalid. Storing predecessor and successor in the

    table enables loops to be detected.

    The link-cost table contains the cost of the link to each neighbour of the node and the number

    of timeouts since an error-free message was received from that neighbour.

    The message retransmission list (MRL) contains information to let a node know which of its

    neighbours has not acknowledged its update message and to retransmit update message to that

    neighbour.

    Nodes periodically exchange routing tables with their neighbours using update messages as well

    as on link changes. The nodes present on the response list for the update message (formed using

    the MRL) are required to acknowledge the receipt of the update message. If there is no change in

    the routing table since last update, the node is required to send an idle Hello message to ensure

    connectivity. On receiving an update message, the node modifies its distance table and looks for

    better paths using the new information. Information is sent back to the original nodes about any

    new paths found so that their tables can be updated. The routing table is also updated if the newpath is better than the existing path.

    The distance table of a node x contains the distance of each destination node y via each

    neighbour z of x. It also contains the downstream neighbour of z through which this path is

    realized.

    The routing table of node x contains the distance of each destination node y from node x, the

    predecessor and the successor of node x on this path. It also contains a tag to identify if the entry

  • 7/27/2019 MANET Literature Review

    10/29

    2.5.3 Global State Routing (GSR)

    Global State Routing (GSR) [29] is similar to DSDV in that it takes the idea of link state routing

    but makes an improvement by reducing the flooding of routing messages.

    In this algorithm, each node maintains a neighbor list, a topology table, a next hop table and a

    distance table.

    The neighbour list of a node contains the list of its neighbours (all nodes that can be heard by

    it).

    The link state information for each destination is maintained in the topology table together with

    the timestamp of the information.

    The next hop table contains the next hop to which the packets for each destination must be

    forwarded.

    The distance table contains the shortest distance to each destination node.

    The routing messages are generated on a link change as in all link state protocols. When it

    receives a routing message, the node updates its topology table if the sequence number of the

    message is newer than the sequence number stored in the table and it then reconstructs its routing

    table and broadcasts the information to its neighbours.

    2.5.4 Fisheye State Routing (FSR)

    Fisheye State Routing (FSR) [30] is an improvement of GSR. The large size of update messages

    in GSR wastes a considerable amount of network bandwidth, so to reduce this, FSR takes an

    approach where each update message does not contain information about all nodes. Instead, it

    exchanges information about closer nodes more frequently than it does about farther nodes, thus

    reducing the update message size. In this way, each node gets accurate information about near

    neighbours and accuracy of information decreases as the distance from the node increases.

  • 7/27/2019 MANET Literature Review

    11/29

    Even though a node does not have accurate information about distant nodes, the packets are

    routed correctly because the route information becomes more and more accurate as the packet

    moves closer to the destination.

    2.5.5 Optimized Link State Routing protocol (OLSR)

    The Optimized Link State Routing Protocol (OLSR) is developed for mobile ad hoc networks. It

    operates as a table driven and proactive protocol, thus exchanges topology information with

    other nodes of the network regularly. The nodes which are selected as a multipoint relay (MPR)

    by some neighbor nodes announce this information periodically in their control messages.

    Thereby, a node announces to the network, that it has reachability to the nodes which have

    selected it as MPR. In route calculation, the MPRs are used to form the route from a given node

    to any destination in the network. The protocol uses the MPRs to facilitate efficient flooding of

    control messages in the net- work. OLSR inherits the concept of forwarding and relaying from

    HIPERLAN (a MAC layer protocol) which is standardized by ETSI.

    Optimized Link State Protocol (OLSR) is a proactive routing protocol, so the routes are always

    immediately available when needed. OLSR is an optimization version of a pure link state

    protocol. So the topological changes cause the flooding of the topological information to all

    available hosts in the network. Optimized Link State Routing (OLSR) protocol, which is natively

    based on a simple hop-count metric for the route selection process. Based on such metric, OLSR

    exploits Dijkstras algorithm to find optimal paths across the network. Being a proactive

    protocol, routes to all destinations within the network are known and maintained before use.

    Having the routes available within the standard routing table can be useful for some systems and

    network applications as there is no route discovery delay associated with finding a new route.

    The routing overhead generated, while generally greater than that of a reactive protocol, does not

    increase with the number of routes being created [34],[35].

  • 7/27/2019 MANET Literature Review

    12/29

    2.6 Review of Ad hoc Reactive Routing Protocols

    Reactive protocols take a lazy approach to routing. In contrast to proactive routing protocols, all

    up-to-date routes are not maintained at every node, but instead the routes are created as and when

    required. When a source wants to send to a destination, it invokes the route discovery

    mechanisms to find the path to the destination. In this section several typical reactive (on-

    demand) routing protocols are introduced.

    2.6.1Ad Hoc On-demand Distance Vector Routing (AODV)

    Ad hoc on-demand distance vector (AODV) routing [23] adopts both a modified on-demand

    broadcast route discovery approach used in DSR [24] and the concept of destination sequence

    number adopted from destination-sequenced distance-vector routing (DSDV)[27].

    When a source node wants to send a packet to some destination and does not have a valid route

    to that destination, it initiates a path discovery process and broadcasts a route request (RREQ)

    message to its neighbours. The neighbors in turn forward the request to their neighbour until the

    RREQ message reaches the destination or an intermediate node that has an up-to-date route to

    the destination. Figure 2.2(a) illustrates the propagation of the broadcast RREQs in an ad hoc

    network.

    (a)RREQ messages propagation

  • 7/27/2019 MANET Literature Review

    13/29

    In AODV, each node maintains its own sequence number and a broadcast ID. Each RREQ

    message contains the sequence numbers of the source and destination nodes and is uniquely

    identified by the source nodes address and a broadcast ID. AODV utilizes dest ination sequence

    numbers to ensure loop-free routing and use of up-to-date route information. Intermediate nodes

    can reply to the RREQ message only if they have a route to the destination whose destination

    sequence number is greater or equal to that contained in the RREQ message.

    So that a reverse path can be set up, each intermediate node records the address of the neighbor

    from which it received the first copy of the RREQ message, and additional copies of the same

    RREQ message are discarded. Once the RREQ message reaches the destination (or an

    (b)RREP message sent back to sourceFigure 2.2 Route discovery in AODV

    intermediate node with a fresh route) the destination (or the intermediate node) responds by

    sending a route reply (RREP) packet back to the neighbour from which it first received the

    RREQ message. As the RREP message is routed back along the reverse path, nodes along this

    path set up forward path entries in their routing tables (Figure 2.2(b)).

    When a node detects a link failure or a change in neighbor-hood, a route maintenance procedure

    is invoked:

    If a source node moves, it can restart the route discovery procedure to find a new route to the

    destination. If a node along the route moves so that it is no longer contactable, its upstream

    neighbour sends a link failure notification message to each of its active upstream neighbors.

    These nodes in turn forward the link failure notification to their upstream neighbours until the

    link failure notification reaches the source node.

  • 7/27/2019 MANET Literature Review

    14/29

    2.6.2 Dynamic Source Routing (DSR)

    Dynamic source routing (DSR) [24] is an on-demand routing protocol for wireless ad hoc

    networks. DSR is based on the concept of source routing, in which a source node indicates the

    sequence of intermediate routes in the header of a data packet. Like other on-demand routing

    protocols, the operation of DSR can be divided into two procedures: route discovery and route

    maintenance.

    (a)Building Record Route

    (b)RREP Propagation

    Figure 2.3 Route discovery in DSR

  • 7/27/2019 MANET Literature Review

    15/29

    Each node in the network keeps a cache of the source routes that it has learned. When a node

    needs to send a packet to some destination, it first checks its route cache to determine whether it

    already has an up-to-date route to the destination. If no route is found, the node initiates the route

    discovery procedure by broadcasting a route request message to neighbouring nodes. This route

    request message contains the address of the source and destination nodes, a unique identification

    number generated by the source node, and a route record to keep track of the sequence of hops

    taken by the route request message as it is propagated through the network. When an

    intermediate node receives a route discovery request, it checks whether its own address is

    already listed in the route record of the route request message. If not, it appends its address to the

    route record and forwards the route request to its neighbours. Figure 2.3(a) illustrates the

    formation of the route record as the route request propagates through the network.

    When the destination node receives the route request, it appends its address to the route record

    and returns it to the source node within a new route reply message. If the destination already has

    a route to the source, it can use that route to send the reply; otherwise, it can use the route in the

    route request message to send the reply. The first case is for situations where a network might be

    using unidirectional links and so it might not be possible to send the reply using the same route

    taken by the route request message. If symmetric links are not supported, the destination node

    may initiate its own route discovery message to the source node and piggyback the route reply on

    the new route request message. Figure 2.3(b) shows the transmission of route record back to the

    source node.

    Route maintenance uses route error messages and acknowledgement messages. If a node detects

    a link failure when forwarding data packets, it creates a route error message and sends it to the

    source of the data packets. The route error message contains the address of the node that

    generates the error and the next hop that is unreachable. When the source node receives the route

    error message, it removes all routes from its route cache that have the address of the node in

    error. It may initiate a route discovery for a new route if needed. In addition to route error

    message, acknowledgements are used to verify the correct operation of links.

    To reduce the route search overhead, an important optimization is allowing an intermediate node

    to send a route reply to the source node if it already has an upto-date route to the destination.

  • 7/27/2019 MANET Literature Review

    16/29

    2.7 Review of Ad hoc Hybrid Routing Protocols

    The characteristics of proactive and reactive routing protocols can be integrated in various ways

    to form hybrid networking protocols. Hybrid networking protocols may exhibit proactive

    behavior given a certain set of circumstances, while exhibiting reactive behavior given a

    different set of circumstances. These protocols allow for flexibility based on the characteristics

    of the network.

    2.7.1 Distributed spanning trees based routing protocol (DST)

    In DST [36] the nodes in the network are grouped into a number of trees. Each tree has two types

    of nodes; route node, and internal node. The root controls the structure of the tree and whether

    the tree can merge with another tree, and the rest of the nodes within each tree are the regularnodes.

    Each node can be in one three different states; router, merge and configure depending on the type

    of task that it trying to perform. To determine a route DST proposes two different routing

    strategies; hybrid tree-flooding (HFT) and distributed spanning tree shuttling (DST).

    In HTF, control packets are sent to all the neighbours and adjoining bridges in the spanning tree,

    where each packet is held for a period of time called holding time. The idea behind the holding

    time is that as connectivity increases, and the network becomes more stable, it might be useful to

    buffer and route packets when the network connectivity is increased over time. In DST, the

    control packets are disseminated from the source are rebroadcasted along the tree edges. When a

    control reaches down to a leaf node, it is sent up the tree until it reaches a certain height referred

    to as the shuttling level. When the shuttling level is reached, the control packet can be sent down

    the tree or to the adjoining bridges. The main disadvantage of the DST algorithm is that it relies

    on a root node to configure the tree, which creates a single point of failure. Furthermore, the

    holding time used to buffer the packets may introduce extra delays in to the network.

  • 7/27/2019 MANET Literature Review

    17/29

    2.7.2 Zone routing protocol (ZRP)

    In ZRP [37], the nodes have a routing zone, which defines a range (in hops) that each node is

    required to maintain network connectivity proactively. Therefore, for nodes within the routing

    zone, routes are immediately available. For nodes that lie outside the routing zone, routes are

    determined on-demand (i.e. reactively), and it can use any on-demand routing protocol to

    determine a route to the required destination. The advantage of this protocol is that it has

    significantly reduced the amount of communication overhead when compared to pure proactive

    protocols. It also has reduced the delays associated with pure reactive protocols such as DSR, by

    allowing routes to be discovered faster. This is because, to determine a route to a node outside

    the routing zone, the routing only has to travel to a node which lies on the boundaries (edge of

    the routing zone) of the required destination. Since the boundary node would proactivelymaintain routes to the destination (i.e. the boundary nodes can complete the route from the

    source to the destination by sending a reply back to the source with the required routing address).

    The disadvantage of ZRP is that for large values of routing zone the protocol can behave like a

    pure proactive protocol, while for small values it behaves like a reactive protocol.

    2.7.3 Zone-based hierarchical link state (ZHLS)

    Unlike ZRP, ZHLS [38] routing protocol employs hierarchical structure. In ZHLS, the network

    is divided into non-overlapping zones, and each node has a node ID and a zone ID, which is

    calculated using a GPS. The hierarchical topology is made up of two levels: node level topology

    and zone level topology, as described previously. In ZHLS location management has been

    simplified.

    This is because no cluster-head or location manager is used to coordinate the data transmission.

    This means there is no processing overhead associated with cluster-head or Location Manager

    selection when compared to HSR, MMWN and CGSRprotocol s. This also means that a single

    point of failure and traffic bottlenecks can be avoided. Another advantage of ZHLS is that it has

    reduced the communication overheads when compared to pure reactive protocols such as DSR

    and AODV.

  • 7/27/2019 MANET Literature Review

    18/29

    In ZHLS, when a route to a remote destination is required (i.e. the destination is in another zone),

    the source node broadcast a zonelevel location request to all other zones, which generates

    significantly lower overhead when compared to the flooding approach in reactive protocols.

    Another advantage of ZHLS is that the routing path is adaptable to the changing topology since

    only the node ID and the zone ID of the destination is required for routing. This means that no

    further location search is required as long as the destination does not migrate to another zone.

    However, in reactive protocols any intermediate link breakage would invalidate the route and

    may initiate another route discovery procedure. The Disadvantage of ZHLS is that all nodes must

    have a preprogrammed static zone map in order to function. This may not feasible in applications

    where the geographical boundary of the network is dynamic. Nevertheless, it is highly adaptable

    to dynamic topologies and it generates far less overhead than pure reactive protocols, which

    means that it may scale well to large networks.

    2.8 Ad hoc delay aware routing protocol

    In recent years, MANET has emerged as one of the high growth applications of the wireless

    communication technology. However, it is difficult to provide an end-to-end quality of service

    (QoS) guarantee because of the error prone wireless channel, the changing topology, and the

    energy constrained etc. Routing protocol design is one of the major challenges for wireless Ad

    Hoc network research and implementation. Most existing ad hoc routing protocols do not take

    the traffic load as a factor when making routing decision. The result is that the heavily loaded

    intermediate nodes can be included in the route during the route request time and will be chosen

    to relay the packet during the packet forwarding time. Longer transmission delay and higher

    packet loss may happen due to the overloaded nodes along the route. These problems demand the

    discovery of delay aware routing protocols alarmingly because implementation of a proper

    routing methodology in ad hoc networks makes it efficient in terms of performance.

  • 7/27/2019 MANET Literature Review

    19/29

    2.8.1 Delay-aware multipath source routing protocol (DMSR)

    DMSR is proposed by extending existing DSR to send packets simultaneously over multiple

    paths. It also provide QoS support for realtime multimedia applications in wireless ad hoc

    networks. Based on local information, node delay is calculated as metric for route path selection

    in the DMSR protocol. The metric takes into account the number of the neighbor nodes of the

    forwarding nodes, the channel busy time and the number of packets in the send buffer.

    Simulation analyses and results show that the DMSR protocol can reduce the average end-to-end

    delay and meet the demands of real time multimedia services.

    The protocol includes two parts:

    1) The accumulation delay is considered as the admission metric to choose the paths.

    2) Node delay is considered as the metric to measure the end-to-end delay and determine the best

    routing path.

    DMSR adds maximum delay demand of current services and accumulation delay in route request

    (RREQ). The maximum delay field remains unchanged and the accumulation delay field is

    constantly increasing in route discovery process. DMSR takes the accumulation delay as the

    metric of admission control. Then the intermediate nodes determine whether RREQ should be

    transmitted according to the accumulation delay. The routing cache response function is disabledbecause the routing caches of intermediate nodes do not have enough information about end-to-

    end delay. Protocol uses source routing in which only source nodes should have the information

    about the paths to be followed. The packets are sent along the best shortest paths where the

    subsequent nodes donot need anything special. It simply forwards the packets to next node

    according to the source route in packet header. DMSR also considers the node delay factor in the

    route discovery process. average end-to-end delay increases as the node load increases. When

    the node load is light, the delay of I DSR is larger than original DSR protocol. This is because in

    i-DSR protocol, the routing cache response function is disabled and the detecting of delay is a

    waste of system resources when the network is idle. DMSR outperforms DSR and i-DSR in the

    average end-to-end delay. The reason is the ability of the new metric to decrease the time waiting

    in the send buffer and contending the channel. The multiple path approach can minimize the

    route maintenance time and the frequency of route discovery.[39,40,41,42] .

  • 7/27/2019 MANET Literature Review

    20/29

    2.8.2 Power and Delay aware Temporally Ordered Routing protocol

    Power and Delay aware Temporally Ordered Routing Algorithm (PDTORA), based on

    Temporally Ordered Routing Algorithm (TORA) Protocol, where verification of power and

    delay requirements is carried out with a query packet at each node along the path between source

    and destination. Implementation of QoS routing protocols in ad hoc networks serves to fulfill the

    purpose of reservation of sufficient resources along a route so as to meet the QoS requirements

    of a flow. On the other hand, the QoS routing protocol should be able to find the path that

    consumes minimum resources. QoS metrics vary from application to application. Major QoS

    metrics for ad hoc networks are available bandwidth, cost, end-to-end delay, power, packet loss

    ratio and so on.

    The QoS metrics can be generally classified as, additive metrics, concave metrics and

    multiplicative metrics. As a source-initiated on-demand routing protocol, TORA relies on a link

    reversal algorithm and provides loop-free multipath routes to a specified destination. In this

    approach, a node maintains the topology information involving its one-hop neighbors. During a

    reconfiguration process following a path break, TORA has the unique property to limit the

    control packets to a small region.

    Three major functions performed by TORA are: establishing, maintaining and erasing routes.

    Route establishment function is initiated, when a source node requires a path to a specific

    destination, to which it does not possess a directed link. During this process, a destination

    oriented Directed Acyclic Graph (DAG) is established using a query / update mechanism.

    The extension of TORA protocol is the power and delay aware modification (PDTORA) where

    the nodes in the network which do not satisfy to the QoS requirements of maximum delay and

    minimum power levels, are eliminated from the route of communication, during query phase.

    Each intermediate node on receipt of the query packet determines whether to forward it or not,

    depending on the QoS requirements. At the destination, an update packet is generated.[43,44].

  • 7/27/2019 MANET Literature Review

    21/29

    2.8.3 Delay Aware AODV-Multi-path routing protocol

    In Delay Aware AODV-Multi-path (DAAM). Multiple node disjoint paths are set up during a

    single route discovery, and the delay of each route is recorded during the route discovery.

    Whenever a data packet arrives at the routing layer from the application layer, the type of data

    contained in the packet is classified according to the ToS field in the IP header and a delay

    request is assigned accordingly. This is then used to determine if a new discovered route is

    suitable for a certain traffic type.

    DAAM, shows remarkable improvements of end-to-end packet delay and delay variation of

    voice and video traffic, routing overhead, and packet delivery fraction of video traffic compared

    to AODV, DSR, OLSR End-to-end delay was the main design criteria and DAAM not only

    shows the lowest end-toend delay in all scenarios for both traffic types, but also all end-to-end

    delay is lower than the ITU-Ts maximum recommendation of 400 ms. Although the P.D.F.s for

    voice traffic are in some cases lower for DAAM than that of OLSR, the delay is improved to an

    acceptable level and delivered packets are thus expected to be usable.

    Routing overhead of DAAM is the lowest due to efficient route discovery and management.

    Once routes are established, route rediscovery is only necessary if all known routes to a

    destination fail.

    A potential drawback of the current design is that route delay information might not always be

    up to date. Link delay however, is continually monitored and evaluated, as mentioned. This

    functionality is not optimal, but quite efficient for its simplicity.

    A more optimal solution would be to notify all sources that use a link in an active route of the

    exact change in delay, if the links delay has changed. Each source can then update the delays of

    all routes that use the link.[45,46].

  • 7/27/2019 MANET Literature Review

    22/29

    2.8.4 Link Delay aware Routing protocol

    The rationale behind the LDAR model is based on the observation that the link delay

    experienced by a packet comprises of three types of delays, namely, processing delay, queueing

    delay and transmission delay. In a MANET, the processing is typically the delay incurred due to

    the processing of the packet in the node. The queuing delay is the time spent by the packet in the

    interface queue. The transmission delay of the packet depends on the behaviour of the 802.11

    MAC protocol.

    The 802.11 MAC layer in a MANET node provides the CSMA/CA media access mechanism. In

    order to estimate the total delay for the next packet, we modified the Linux kernel and Madwifi

    driver for Atheros-based wireless interface to compute the processing, queueing and transmission

    delays. The time taken by the network and the data link layers of the TCP/IP stack at the sender

    node to process the packet were taken as the processing delay of the packet. This is measured by

    keeping track of timestamp of the packet when it enters the network layer and before it enters the

    MAC interface queue.

    The queuing delay is the time spent by the packet in the 802.11 MAC interface queue. The

    estimated delay values are sent up to LDAR for dispersion throughout the network. LDAR uses a

    modified Optimized Link State Routing (OLSR) protocol with ETX extension5. In the standard

    OLSR with ETX extension, each node periodically broadcasts HELLO messages that are used to

    maintain information about the 2-hop neighborhood around each node. The HELLO packets are

    used as probe packets for the ETX computation. The 2-hop neighborhood information is used in

    determining the multipoint relay (MPR) set of each node.

    The Topology Control (TC) messages containing ETX information about the links around each

    node are efficiently dispersed in the network through the MPRs. Upon receipt of the TC

    message, each node computes in a centralized fashion the shortest paths to all other nodes in the

    network and updates its routing tables. In the LDAR design, the LDAR module periodically

    requests the IOCTL extension module for the most recent link delay estimates and disperses the

    link delay estimates to the rest of the network using the modified TC message. In addition, the

    shortest path routing in LDAR uses link delay estimates as the link metric to compute routes to

    other nodes in the network. [47]

  • 7/27/2019 MANET Literature Review

    23/29

    BIBLIOGRAPHY

    [1] C. Chaudet, I. Guerin-Lassous: BRuIT: Bandwidth Reservation under InTerferences

    influence, in European Wireless (EW), p. 466-472, 2002.

    [2] S-B. Lee, G-S. Ahn, X. Zhang, A.T. Campbell: INSIGNIA: An IP-Based Quality of Service

    Framework for Mobile ad Hoc Networks, in Journal of Parallel and Distributed Computing,

    NN60, pp.374-406, 2000.

    [3] C. E. Perkins, E. M. Belding-Royer, and S. Das. Ad hoc On- Demand Distance Vector

    (AODV) Routing. RFC 3561, July 2003.

    [4] C. E. Perkins and E. M. Royer. The Ad hoc On-Demand Distance Vector Protocol. In C. E.

    Perkins, editor, Ad hoc Networking, pages 173.219. Addison-Wesley, 2000.

    [5] Extensions to OSPF to Support Mobile Ad Hoc Networking, Madhavi Chandra, Abhay Roy,

    Mar-10,RFC 5820

    [6] R. de Renesse, M. Ghassemian Qos Enabled Routing in Mob International Conference on

    3G pp. 678-682 (2004)

    [7] Nur Idawati Md Enzai, Farhat A Study of QoS-Enabled AODV Conference on May, 2008.

    [8] Nityananda Sarma, Sukumar in Route Recovery for QAODV ,The International conference

    on Symposium and Networks, DOI 10.1109/I-SP

    [9] X. Li, L. Cuthbert, "MultiPath QoS Routing for supporting DiffServ in Mobile Ad Hoc

    Networks, 6th International Conference on Software Engineering, Artificial Intelligence, and

    [10] Spilios Giannoulis, Christos Antonopoulos, Evangelos Topalis, Stavros Koubias ZRP

    versus DSR and TORA: A comprehensive survey on ZRP performance, Emerging

    Technologies and Factory Automation, 2005. ETFA 2005, vol. 1, September 2005.

    [11] A. Duran and C.-C. Shen, "Mobile ad hoc P2P file sharing," WCNC 2004 - IEEE Wireless

    Communications and Networking Conference, Vol. 5, No. 1, March 2004, pp. 114-119.

    http://tools.ietf.org/html/rfc5820http://tools.ietf.org/html/rfc5820http://tools.ietf.org/html/rfc5820http://tools.ietf.org/html/rfc5820
  • 7/27/2019 MANET Literature Review

    24/29

    [12] J. Mischke and B. Stiller, "Efficient protocol specification and implementation for a highly

    scalable peer-to-peer search infrastructure," NOMS 2004 - IEEE/IFIP Network Operations and

    Management Symposium, Vol. 9, No. 1, Apr 2004, pp. 411-424.

    [13]Proceedings of the World Congress on Engineering and Computer Science 2011 Vol II

    WCECS 2011, October 19-21, 2011, San Francisco, USA. Parallel Distributed

    Computing, pp. 308 -313

    [14] IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 11, NO. 4, FOURTH

    QUARTER 2009

    [15] Chang-Woo Ahn, Sang-Hwa Chung, Tae-Hun Kim, and Su-Young Kang. A node-disjoint

    multipath routing protocol based on aodv in mobile ad hoc networks. In Information

    Technology: New Generations (ITNG), 2010 Seventh International Conference on, pages 828

    833, april 2010.

    [16] Shunli Ding and Liping Liu. A node-disjoint multipath routing protocol based on aodv. In

    Distributed Computing and Applications to Business Engineering and Science (DCABES), 2010

    Ninth International Symposium on, pages 312316, aug. 2010.

    [17] Fubao Yang and Baolin Sun. Ad hoc on-demand distance vector multipath routing protocol

    with path selection entropy. In Consumer Electronics, Communications and Networks

    (CECNet), 2011 International Conference on, pages 47154718, april 2011.

    [18] E. Mourad, B. Azzedine, and E. Hisham, "Performance analysis of a distributed

    comparison-based selfdiagnosis protocol for wireless ad-hoc networks," in Proceedings of the

    9th ACM international symposium on Modeling analysis and simulation of wireless and mobile

    systems. Terromolinos, Spain: ACM Press, 2006.

    [19] S. Carl-Fredrik, rensen, W. Maomao, S. Thirunavukkarasu, S. B. Gordon, O. Paul, F.

    Adrian, and D.-L. Hector, "A context-aware middleware for applications in mobile Ad Hoc

    environments," in Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc

    computing. Toronto, Ontario, Canada: ACM Press, 2004.

  • 7/27/2019 MANET Literature Review

    25/29

    [20]. Swati et al. Exploiting Temporal Stability and Low-Rank Structure for Localization in

    Mobile Networks, MobiCom10, September 20 24, 2010, Chicago, Illinois, USA. Copyright

    2010 ACM 978-1-4503-0181-7/10/09.

    [21]. Hamid Mehdi MOBILITY PREDICTION WITH LLT ALGORITHM IN WIRELESS

    NETWORKS 2010 International Conference on Information, Networking and Automation

    (ICINA) 978-1-4244-8106-4/$26.00 CD 2010 IEEE.

    [22] Pranav Kumar Singh, Kapang Lego, Themrichon Tuithung, (March 2011) Network Centric

    Approach using MOVE &Application Centric Approach using TraNS for protocols and safety in

    VANET, International Journal of Research and Reviews in Computer Science (IJRRCS), Vol.

    2, No. 1 .

    [23]C. Perkins and E. Royer. Ad hoc on-demand distance vector routing. 1999.

    [24]J.Broch, D.Johnson, and D. Maltz, The Dynamic Source Protocol for Mobile Ad hoc

    Networks, http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr- 10.txt, IETF Internet draft ,

    19 July 2004.

    [25] Standard for part 15.4: Wireless MAC and PHY specifications for low rate WPAN.

    IEEEStd 802.15.4, IEEE, New York, October 2003.

    [26]J. A. Gutierrez, E. H. Callaway, Jr., and R. L. Barrett, Jr.Low-Rate Wireless Personal Area

    Networks, IEEE Press, New York, 2004.

    [27] C. E. Perkins and P. Bhagwat, Highly Dynamic Destination-Sequenced Distance-Vector

    Routing (DSDV) for Mobile Computers, In Proceedings ofACM SIGCOMM, pages 234-244,

    1994.

    [28] S. Murthy and J.J. Garcia-Luna-Aceves, An efficient routing protocol for wireless

    networks,ACM Mobile Networks and Applications Journal, pp.183-197, 1996.

    [29] T. Chen and M. Gerla, Global state routing: A new routing scheme for ad hoc wireless

    networks, inProceedings of IEEE ICC98, Volume 1, 7-11 June 1998 Page(s):171 - 175 vol.1

    http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-
  • 7/27/2019 MANET Literature Review

    26/29

    [30] A. Iwata, C.-C. Chiang, G. Pei, M. Gerla, and T.-W. Chen, "Scalable Routing Strategies for

    Ad Hoc Wireless Networks"IEEE Journal on Selected Areasin Communications, Special Issue

    on Ad-Hoc Networks, Aug. 1999, pp.1369- 79.

    [31] A. Iwata, C.-C. Chiang, G. Pei, M. Gerla, and T.-W. Chen, "Scalable Routing Strategies for

    Ad Hoc Wireless Networks"IEEE Journal on Selected Areasin Communications, Special Issue

    on Ad-Hoc Networks, Aug. 1999, pp.1369- 79.

    [32] Zygmunt J. Haas, Marc R. Pearlman, The Zone Routing Protocol (ZRP) for Ad Hoc

    Networks, Internet draft, http://www.ics.uci.edu/~atm/adhoc/papercollection/ haas-draft-ietf-

    manet-zone-zrp-00.txt

    [33] M. Joa-Ng and I-Tai Lu, A peer-to-peer zone-based two-level link state routing for mobile

    ad hoc networks, IEEE on Selected Areas in Communications, vol.17, no. 8, pp.1415-1425,

    1999.

    [34] J. N. Boshoff, A. S. J. Helberg, Improving End-to-End Delay for Real-time Multimedia

    Services in Mobile Ad-hoc Networks, SATNAC 2007, 2007.

    [35] J. Burbank, P. Chimento, B. Haberman, and W. Kasch, Key Challenges of Military

    Tactical Networking and the Elusive Promise of MANET Technology, IEEE Communications

    Magazine, 2006.

    [36] S. Radhakrishnan, N.S.V Rao, G. Racherla, C.N. Sekharan, S.G. Batsell, DSTA routing

    protocol for ad hoc networks using distributed spanning trees, in: IEEE Wireless

    Communications and Networking Conference, New Orleans, 1999.

    [37] Z.J. Hass, R. Pearlman, Zone routing protocol for ad-hoc networks, Internet Draft, draft-ietf-

    manet-zrp-02.txt, work in progress, 1999.

    [38]M. Joa-Ng, I.-T. Lu, A peer-to-peer zone-based two-level link state routing for mobile ad

    hoc networks, IEEE Journal on Selected Areas in Communications 17 (8) (1999) 14151425.

    http://www.ics.uci.edu/~atm/adhoc/papercollection/http://www.ics.uci.edu/~atm/adhoc/papercollection/http://www.ics.uci.edu/~atm/adhoc/papercollection/
  • 7/27/2019 MANET Literature Review

    27/29

    [39] Perkin, C.E. Royer, E.M., Das S.R., Ad Hoc On-demand Distance Vector Routing,

    Internet-draft, draft-ietf-manet-aodv-10.txt, Jan 2002.

    [40] Y.H. Sun, P.B. Si, Y.H. Zhang, H. Wang, Practical Realization of Ad hoc Network based

    on DSR Protocol Considering QoS for Multimedia Services. Second International Conference

    on MultiMedia and Information Technology, 2010.

    [41] Kumar, Rakesh, Misra, Manoj, Sarje, Anil K. A Routing Protocol for Delay-Sensitive

    Applications in Mobile Ad Hoc Networks. Ad Hoc and Ubiquitous Computing, 2006.

    [42] S. Singh, M.Woo, and C.S. Raghavendra. Power-aware routing in mobile ad-hoc

    networks. ACM/IEEE International Conference on Mobile Computing and Networking, pp.

    181-190, October 1998.

    [43] C.K. Toh, Maximum battery life routing to support ubiquitous mobile computing in

    wireless ad hoc networks, IEEE Communication Magazine, pp. 2-11, June 2001.

    [44] R. Asokan, M. Pushpavalli and A.M. Natarajan, Delay and throughput aware proactive

    QoS routing in mobile adhoc networks. Proceedings of the International Conference on

    Advanced Communication System (ICACs-2007) pp 1-6, January 2007.

    [45] K. Kim and K. G. Shin, Accurate Measurement of Link Quality in Multi -hop Wireless

    Mesh Networks, Proceedings of 12th ACM Mobicom, 2006.

    [46] W. Wei and A. Zakhor, Path selection for multi -path streaming in wireless ad-hoc

    networks, in Proc. of International Conference on Image transmit, January 2006.

    [47] C. Koksal and H. Balakrishnan, Quality-aware routing metrics for time-varying wireless

    mesh networks, JSAC, 2006.

    [48] Morten Lindeberg, Stein Kristiansen, Thomas Plagemann, and Vera Goebel. Challenges and

    techniques for video streaming over mobile ad hoc networks.Multimedia Systems, 17:5182.

    [49] C. Perkins and E. Royer. Ad hoc on-demand distance vector routing. 1999.

    [50] tools.ietf.org/html/draft-cole-manet-olsrv2-mib-00.

  • 7/27/2019 MANET Literature Review

    28/29

    [51] M.R. Pearlman and Z.J. Haas. Determining the optimal configuration for the zone routing

    protocol. Selected Areas in Communications, IEEEJournal on, 17(8):13951414, aug 1999.

    [52]S. Saunders (1999). Antennas and propagation for wireless communication systems concepts

    and design. Wiley.

    [53] Yaling Yang and Kravets, R. (2005). Contention-aware admission control for ad hoc

    networks.Mobile Computing, IEEE Transactions, july-aug, 4, 363377.

    [54] Chakrabarti, S. and Mishra, A. (2001). QoS issues in ad hoc wireless networks.

    Communications Magazine, IEEE, Feb, 39, 142 -148.

    [55] Neely, M.J. and Modiano, E. (2005). Capacity and delay tradeoffs for ad hoc mobile

    networks.Information Theory, IEEE Transactions, june, 51, 19171937.

    [56]Haenggi, M. and Puccinelli, D. (2005). Routing in ad hoc networks: a case for long

    hops.Communications Magazine, IEEE, Oct, 43, 93101.

    [57] N. Sharma and S. Sharma. Provisioning of quality of service in manets by performance

    analysis and comparison of aodv and olsr. In Com-puter Science and Network Technology

    (ICCSNT), 2011 InternationalConference on, volume 4, pages 23412344, dec. 2011.

    [58] Video Trace:.http://trace.eas.asu.edu/.

    [59] S. Rimac-Drlje, O. Nemcic, and M. Vranjes. Scalable video coding extension of the

    h.264/avc standard. In ELMAR, 2008. 50th International Symposium, volume 1, pages 9 12,

    sept. 2008.

    [60] C.T. Calafate, M.P. Malumbres, and P. Manzoni. Performance of h.264 compressed video

    streams over 802.11b based manets. In Distributed Computing Systems Workshops, 2004.

    Proceedings. 24th InternationalConference on, pages 776781, march 2004.

    [61] Crawley, E. and Nair, R. and Rajagopalan, B. and Sandick, H. (1998). A Framework for

    QoS-based Routing in the Internet.RFC2386, IETF.

    http://trace.eas.asu.edu/http://trace.eas.asu.edu/http://trace.eas.asu.edu/http://trace.eas.asu.edu/
  • 7/27/2019 MANET Literature Review

    29/29

    [62] Reddy, T. Bheemarjuna and Karthigeyan, I. and Manoj, B. S. and Murthy, C. Siva Ram.

    (2006). Quality of service provisioning in ad hoc wireless networks: a survey of issues and

    solutions.Ad Hoc Networks, Jan, 4, 83-124.

    [63] Shigang Chen and Nahrstedt, K. (1999). Distributed quality-of-service routing in ad hoc

    networks. Selected Areas in Communications, IEEE Journal, aug, 17, 1488 -1505.