Bandwidth and Delay Aware Routing Protocol with Scheduling Algorithm for Multi Hop Mobile Ad Hoc Networks

The scheduling based routing scheme is presented in this paper to avoid link failure. The main objective of this system is to introduce a cross-layer protocol framework that integrates routing with priority-based traffic management and distributed transmission scheduling. The reservation scheme is based on ID. The presented scheme guarantees that bandwidth reserved time slot is used by another packet in which end-to-end reservation is achieved. The Bandwidth and Delay Aware Routing Protocol with Scheduling Algorithm is presented to allocate channels efficiently. The experimental results show that the presented schemes performed well in various parameters compared to existing methods. Keywords—Integrated routing, scheduling, MAC layer, IEEE 802.11.

[1]  Sajal K. Das,et al.  A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.

[2]  K. Venkatachalapathy,et al.  Increased Throughput for Load based Channel Aware Routing in MANETs with Reusable Paths , 2012 .

[3]  Y. Harold Robinson,et al.  Energy-Based Dynamic Encryption for Wireless Sensor Networks , 2011 .

[4]  Robert Tappan Morris,et al.  Opportunistic routing in multi-hop wireless networks , 2004, Comput. Commun. Rev..

[5]  M. Rajaram,et al.  ECBK: Enhanced Cluster Based Key Management Scheme for Achieving Quality of Service , 2016 .

[6]  M. Rajaram,et al.  SCSBE: Secured Cluster and Sleep Based Energy-Efficient Sensory Data Collection with Mobile Sinks , 2016 .

[7]  Llorenç Cerdà-Alabern,et al.  Distance Progress Based Opportunistic Routing for wireless mesh networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[8]  M. Rajaram,et al.  Dominating Set Algorithm and Trust Evaluation Scheme for Secured Cluster Formation and Data Transferring , 2016 .

[9]  Wei Yu,et al.  A Cross-Layer Optimization Framework for Multihop Multicast in Wireless Mesh Networks , 2006, IEEE Journal on Selected Areas in Communications.

[10]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[11]  Guangjie Han,et al.  Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..

[12]  S. Ramalakshmi,et al.  ATMPH: Attaining Optimal Throughput Capacity of MANET with Power Control in Heterogeneous Network , 2014 .

[13]  Jörg Widmer,et al.  Contention-based forwarding for mobile ad hoc networks , 2003, Ad Hoc Networks.

[14]  Azzedine Boukerche,et al.  Towards a Comprehensive Model for Performance Analysis of Opportunistic Routing in Wireless Mesh Networks , 2015 .

[15]  M. Rajaram,et al.  A Memory Aided Broadcast Mechanism with Fuzzy Classification on a Device-to-Device Mobile Ad Hoc Network , 2016, Wirel. Pers. Commun..

[16]  M. Rajaram,et al.  Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks , 2015, TheScientificWorldJournal.

[17]  Xiaodong Lin,et al.  Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[18]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[19]  M. Rajaram,et al.  Tree Based Data Fusion Clustering Routing Algorithm for Illimitable Network Administration in Wireless Sensor Network , 2016 .

[20]  Mario Gerla,et al.  Asynchronous multimedia multihop wireless networks , 1997, Proceedings of INFOCOM '97.

[21]  S. Tamil Selvi,et al.  Development of Energy Efficient Clustering Protocol in Wireless Sensor Network Using Neuro-Fuzzy Approach , 2016, TheScientificWorldJournal.

[22]  Jin-Hee Cho,et al.  Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[23]  M. Rajaram,et al.  TBOR: Tree Based Opportunistic Routing for Mobile Ad Hoc Networks , 2016 .

[24]  M. Rajaram,et al.  Establishing Pairwise Keys Using Key Predistribution Schemes for Sensor Networks , 2015 .

[25]  Chunyan Miao,et al.  A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.

[26]  Robert Tappan Morris,et al.  ExOR: opportunistic multi-hop routing for wireless networks , 2005, SIGCOMM '05.

[27]  Wei Chen,et al.  Optimal forwarder list selection in opportunistic routing , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[28]  M. Rajaram,et al.  A Novel Approach to Allocate Channels Dynamically in Wireless Mesh Networks , 2015 .

[29]  V. Milutinovic,et al.  A survey of military applications of wireless sensor networks , 2012, 2012 Mediterranean Conference on Embedded Computing (MECO).

[30]  Sun-Yuan Kung,et al.  Network planning in wireless ad hoc networks: a cross-Layer approach , 2005 .

[31]  Yesudhas Harold Robinson,et al.  Performance Analysis of Energy Efficient Virtual Back Bone Path Based Cluster Routing Protocol for WSN , 2016, Wireless Personal Communications.

[32]  J. J. Garcia-Luna-Aceves,et al.  An interest-driven approach to integrated unicast and multicast routing in MANETs , 2008, 2008 IEEE International Conference on Network Protocols.

[33]  Niki Pissinou,et al.  Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks , 2005, Mob. Networks Appl..

[34]  Y. Harold Robinson,et al.  An advanced controlled-flooding routing with group organization for Delay Tolerant Networks using A-SMART , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.

[35]  M. Rajaram,et al.  Detection of Black Holes in MANET Using Collaborative Watchdog with Fuzzy Logic , 2016 .

[36]  Dario Pompili,et al.  Underwater acoustic sensor networks: research challenges , 2005, Ad Hoc Networks.

[37]  Andrea J. Goldsmith,et al.  Cross-layer design of ad hoc networks for real-time video streaming , 2005, IEEE Wireless Communications.

[38]  S. Tamil Selvi,et al.  Opportunistic Routing with Secure Coded Wireless Multicast Using MAS Approach , 2014 .

[39]  Lili Qiu,et al.  SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks , 2009, IEEE Transactions on Mobile Computing.

[40]  Mohammad S. Obaidat,et al.  Trust-based Security Protocol against blackhole attacks in opportunistic networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[41]  A. Ayyasamy,et al.  Context Aware Adaptive Service based Dynamic Channel Allocation Approach for Providing an Optimal QoS over MANET , 2014 .

[42]  Martin Vetterli,et al.  Valuable Detours: Least-Cost Anypath Routing , 2011, IEEE/ACM Transactions on Networking.

[43]  Srihari Nelakuditi,et al.  On selection of candidates for opportunistic anypath forwarding , 2006, MOCO.

[44]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[45]  Kirk Martinez,et al.  Environmental Sensor Networks: A revolution in the earth system science? , 2006 .

[46]  Luiz Filipe M. Vieira,et al.  Performance and trade-offs of opportunistic routing in underwater networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[47]  Bu-Sung Lee,et al.  Position Based Opportunistic Routing for Robust Data Delivery in MANETs , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[48]  M. Rajaram,et al.  Trustworthy Link Failure Recovery Algorithm for Highly Dynamic Mobile Adhoc Networks , 2015 .

[49]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[50]  Torsten Braun,et al.  Performance evaluation of opportunistic routing protocols: a framework-based approach using OMNeT++ , 2012, LANC.

[51]  Ayyasamy Ayyanar,et al.  Context aware adaptive fuzzy based QoS routing scheme for streaming services over MANETs , 2015, Wirel. Networks.

[52]  Azzedine Boukerche,et al.  An adaptive computational trust model for mobile ad hoc networks , 2009, IWCMC.