International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us

IJSTR >> Volume 1 - Issue 11, December 2012 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Route Resurgence By Congestion Endurance (RRCE): A Strategic Routing Topology For Mobile Ad Hoc Networks

[Full Text]



S. Vidhya Reddy, K.Srimathi



Keywords: Mobile Ad Hoc Networks, Reserved Path routing, Quality of Service, Shortest Reserved Path Routing Topology.



Abstract:- In mobile ad hoc networks, common mobility during the communication of data causes route failure which results in path rediscovery. In this, we suggest strategic routing topology for route resurgence by congestion endurance in Mobile Ad hoc Networks. In this topology, every source and destination pair establishes manifold paths in the single route discovery and they are cached in their route caches. The cached routes sorts on the basis of their resources availability. In case of route failure within the main route, overhearing neighbor establishes a local recovery path with maximum bandwidth from its route cache. In simulation results, we explain that the proposed approach improves network routing performance.



[1]. Aminu, M., M. Ould-Khaoua, L.M. Mackenzie, C. Perkins and J.D. Abdulai, 2009. Probabilistic counter-based route discovery for mobile ad hoc networks. Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, (WCMC'09) ACMNewYork, NY, USA, pp: 1335-1339.DOI: 10.1145/1582379. 1582672

[2]. Dhirendra, K.S., S. Kumar and C. Kumar, 2010. Enhancement of split manifold path routing topology in MANET. Int. J. Comput. Sci. Eng., 02: 679-685.

[3]. Juanwei, L., J. Chen and Y. Kuo, 2009. Manifold path routing topology for network lifetime maximization in ad-hoc networks. Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing, (WCNMC' 09), IEEE Xplore Press, Piscataway, NJ, USA, pp: 2713-2716. DOI: 10.1109/WIC0M.2009.5305828In

[4]. Kang, B.S. and I.Y. Ko, 2010. Effective route maintenance and restoration schemes in mobile ad hoc networks. Sensors, 10: 808-821.

[5]. Keming, D.U. and Y. Yang, 2010. A QoS routing for maximum bandwidth in ad hoc networks. Proceedings of the 2nd International Conference on Future Networks (ICFN), Jan. 22-24, Sanya, Hainan, pp: 343-345. DOI: 10.1109/ICFN.2010.11

[6]. Khazaei, M. and R. Berangi, 2009. A multi-path routing topology with fault tolerance in mobile ad hoc networks. Proceedings of the 14th International CSI Computer Conference, Oct. 20-21, IEEE Xplore Press, Tehran, pp: 77-82. DOI: 10.1109/CSICC.2009.5349359

[7]. Khetwal, N. and Sharma, 2012. Multimedia based dynamic source routing for mobile ad hoc networks. J. Inform. Operations Manage., 3: 213216.

[8]. Seethalakshmi, P., M.J.A. Jude and G. Rajendran, 2011. An optimal path management strategy in a mobile ad hoc network using fuzzy and rough set theory. Am. J. Applied Sci., 1314-1321. DOI: 10.3844/ajassp. 2011.1314.1321

[9]. Suganthi, P. and A. Tamilarasi, 2012. Impact of malicious nodes under different route refresh intervals in ad hoc network. Am. J. Applied Sci., 18-23. DOI: 10.3844/ajassp. 2012.18.23

[10]. Sung-Won, L., J.Y. Choi, K.W. Lim, Y. Ko and B. Roh, 2010. A reliable and hybrid multi-path routing topology for multi-interface tactical ad hoc networks. Proceedings of the Conference on Military Communication Unclassified Program Networking Protocols and Performance Track, (MCUPNPP' 10), pp: 1531-1536.

[11]. Atef Abdrabou and Weihua Zhuang 2009. Statistical QoS Routing for IEEE 802.11 Multihop Ad Hoc Networks. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH 2009.

[12]. Wu, Y.C. and C.C. Tuan, 2009. Power saving routing topology with power sieving in wireless ad hoc networks. Proceeding of the International Conference on Networks Security, Wireless Communications and Trusted Computing, April 25-26, IEEE Xplore Press, Wuhan, Hubei, pp: 349352. DOI: 10.1109/NSWCT.2009.36