CoreASM-BASED EVALUATION OF THE N-AODV PROTOCOL FOR MOBILE AD-HOC NETWORKS

Authors

  • ALESSANDRO BIANCHI Department of Informatics, University of Bari, Bari, Italy
  • SEBASTIANO PIZZUTILO Department of Informatics, University of Bari, Bari, Italy
  • GENNARO VESSIO Department of Informatics, University of Bari, Bari, Italy

Keywords:

MANETs, network topology awareness, N-AODV, Abstract State Ma-chines, empirical studies

Abstract

Network topology awareness (NTA) is a fundamental issue in the context of computer networks: the lack of control over the topology can negatively impact performance, security, resilience, and so on. However, in Mobile Ad-hoc NETworks (MANETs), NTA is difficult to achieve because of their dynamicity. Differ-ent reactive protocols for MANETs, in which routes are established only when needed, provide different NTA to each host, depending on their algorithmic features. NACK-based AODV (N-AODV) is a variant of the well-known Ad-hoc On-demand Distance Vector (AODV) reactive protocol for MANETs which we proposed with the aim of improving the NTA of the original protocol. In this paper, an experiment aimed at comparing N-AODV to AODV is reported; it moves from an exploratory case study we conducted pre-liminarily. The results obtained show that a MANET adopting N-AODV exploits higher NTA than a MANET adopting AODV. Moreover, the improved awareness positively impacts effectiveness.

 

Downloads

Download data is not yet available.

References

Abuelela M. and Olariu S. Taking VANET to the clouds. In: 8th International Conference on Ad-vances in Mobile Computing and Multimedia, 2010, pp. 6-13.

Agrawal D.P. and Zeng Q.A. Introduction to Wireless and Mobile Systems. Thomson Brooks/Cole, 2003.

Andel T.R. and Yasinsac A. On the credibility of manet simulations. Computer, 39(7), 2006, pp. 48-54.

Bhatsangave S.P. and Chirchi V.R. OAODV Routing Algorithm for Improving Energy Efficiency in MANET. International Journal of Computer Applications, 51(21), 2012, pp. 15-22.

Bianchi A. and Pizzutilo S. Studying MANET through a Petri Net-Based Model. In: 2nd Interna-tional Conference of Evolving Internet, 2010, pp. 220-225.

Bianchi A., Pizzutilo S. and Vessio G. Preliminary Description of NACK-based Ad-hoc On-demand Distance Vector Routing Protocol for MANETs. In: 9th International Conference on Software Engineering and Applications, 2014, pp. 500-505.

Bianchi A., Pizzutilo S. and Vessio G. Suitability of Abstract State Machines for Discussing Mo-bile Ad-hoc Networks. Global Journal of Advanced Software Engineering, 1, 2014, pp. 29-38.

Bianchi A., Pizzutilo S. and Vessio G. Comparing AODV and N-AODV Routing Protocols for Mobile Ad-hoc Networks. In: 13th International Conference on Advances in Mobile Computing and Multimedia, 2015, pp. 159-168.

Börger E. and Stärk R. Abstract State Machines: A Method for High-Level System Design and Analysis. Springer-Verlag, 2003.

Botía Blaya J.A., Demeure I., Gianrossi P., Garcia Lopez P., Martínez Navarro J.A., Meyer E.M., Pelliccione P. and Taste-Cherel F. POPEYE: providing collaborative services for ad hoc and spon-taneous communities. Service Oriented Computing and Applications, 3(1), 2009, pp. 25-45.

Boukerche A. and Bononi L. Simulation and Modeling of Wireless, Mobile and Ad Hoc Net-works. In Basagni S., Conti M., Giordano S. and Stojmenovic I., eds., Mobile Ad Hoc Network-ing, 2004, pp. 373-410.

Conover W.J. Practical Nonparametric Statistics. John Wiley and Sons, 1980.

Das S.R., Castaneda R. and Yan J. Simulation based performance evaluation of mobile ad hoc network routing protocols. ACM/Baltzer Mobile Networks and Applications Journal, 5(3), 2000, pp. 179-189.

Demir T. Simulation of Ad Hoc Networks with DSR Protocol. In: 16th International Symposium on Computer and Information Sciences, 2001, pp. 617-625.

Farahbod R., Gervasi V. and Glässer U. CoreASM: An extensible ASM execution engine. Fun-damenta Informaticae, 77(1-2), 2007, pp. 71-103.

Fehnker A., Höfner P., Kamali M. and Mehta V. Topology-based Mobility Models for Wireless Networks. In: 10th International Conference on Quantitative Evaluation of Systems, 2013, pp. 389-404.

Georgiou S., Tsakalozos K. and Delis A. Exploiting Network-Topology Awareness for VM Placement in IaaS Clouds. In: 3rd International Conference on Cloud and Green Computing, 2013, pp. 151-158.

Gupta A.K., Sadawarti H. and Verma A.K. Performance analysis of AODV, DSR & TORA Rout-ing Protocols. International Journal of Engineering and Technology, 2(2), 2010, pp. 226-231.

Gurevich Y. Sequential Abstract State Machines Capture Sequential Algorithms. ACM Transac-tions on Computational Logic, 1(1), 2000, pp. 77-111.

Hsu C.S., Sheu J.P. and Tung S.C. An On-Demand Bandwidth Reservation QoS Routing Protocol for Mobile Ad Hoc Networks. In: IEEE International Conference on Sensor Networks, Ubiqui-tous, and Trustworthy Computing, 2006, pp. 198-207.

Jefferson D.R. Virtual time. ACM Transactions on Programming Languages and Systems, 7(3), 1985, pp. 404-425.

Kannhavong B., Nakayama H., Kato N., Jamalipour A. and Nemoto Y. A study of a routing attack in OLSR-based mobile ad hoc network. International Journal of Communication Systems, 20(11), 2007, pp. 1245-1261.

Kikuchi H., Karki B.B. and Saini S. Topology-Aware Parallel Molecular Dynamics Simulation Algorithm. In: International Conference on Parallel and Distributed Processing Techniques and Applications, 2006, pp. 1083-1088.

Kim C., Talipov E. and Ahn B. A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks. Emerging Directions in Embedded and Ubiquitous Computing, LCNS 4097, 2006, pp. 522-531.

Kumar P., Kumar R., Kumar S. and Kumar R.D. Improved Modified Reverse AODV Protocol. International Journal of Computer Applications, 12(4), 2010, pp. 22-26.

Kurkowski S., Camp T. and Colagrosso M. MANET Simulation Studies: The Incredibles. ACM SIGMOBILE Mobile Computing and Communications Review, 9(4), 2005, pp. 50-61.

Mirrezaei S.I., Shahparian J. and Ghodsi M. A topology-aware load balancing algorithm for P2P systems. In: 4th International Conference on Digital Information Management, 2009, pp. 1-6.

Monarch Simulator. http://www.monarch.cs.cmu.edu

Nemati A.G. and Takizawa M. Data Transmission Procedures for a Multi-Source Streaming Mod-el in Mobile Peer-to-Peer (P2P) Overlay Networks. J. of M. Multimedia, 5(1), 2009, pp. 45-63.

Network Simulator ns-3. https://www.nsnam.org

OLSR Web Site. http://www.olsr.org

Papadakis H., Roussopoulos M., Fragopoulou P. and Markatos EP. Imbuing unstructured P2P sys-tems with non-intrusive topology awareness. In: 9th International Conference on Peer-to-Peer Computing, 2009, pp. 51-60.

Patil V.P. Performance Evaluation of on demand and Table driven Protocol for Wireless Ad hoc Network. International Journal of Computer Engineering Science, 2(9), 2012, pp. 1-13

Perkins C.E., Belding-Royer E. and Das S.R. Ad hoc On-Demand Distance Vector (AODV) Rout-ing. RFC 3561, http://tools.ietf.org/html/rfc3561, 2003.

Perkins C.E. and Bhagwat P. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers. Computer Communication Review, 24(4), 1994, pp. 234-244.

Perkins C.E., Royer E.M., Das S.R. and Marina M.K. Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks. IEEE Personal Communications, 8(1), 2001, pp. 16-28.

Qasim N., Said F. and Aghvami H. Mobile Ad Hoc Networking Protocols’ Evaluation through Simulation for Quality of Service. Int. Journal of Computer Science, 36(1), 2009, pp. 1-9.

Ramanathan R., Hansen R., Basu P., Rosales-Hain R. and Krishnan R. Prioritized epidemic rout-ing for opportunistic networks. In: 1st international MobiSys workshop on Mobile opportunistic networking, 2007, pp. 62-66.

Rostami H. and Habibi J. A Mathematical Foundation for Topology Awareness of P2P Overlay Networks. Grid and Cooperative Computing, LNCS 3795, 2005, pp. 906-918.

RoyChoudhury R., Paul K. and Bandyopadhyay S. An agent-based protocol to support multimedia communication in ad hoc wireless networks. In: 15th International Parallel and Distributed Pro-cessing Symposium, 2000, pp. 2026-2033.

Sedrati M., Bilami A. and Benmohamed M. M-AODV: AODV variant to Improve Quality of Ser-vice in MANETs. International Journal of Computer Science Issues, 8(1), 2011, pp. 429-436.

Shiguo W. and Ji H. A topology-aware peer-to-peer protocol applicable to wireless network. In: International Conference on Network Infrastructure and Digital Content, 2009, pp. 1004-1009.

Singh A., Ramakrishnan C.R. and Smolka S.A. A process calculus for Mobile Ad Hoc Networks. Science of Computer Programming, 75(6), 2010, pp. 440-469.

Tamilselvan L. and Sankaranarayanan V. Prevention of Co-operative Black Hole Attack in MANET. Journal of Networks, 3(5), 2008, pp. 13-20.

Vasudevan S., Kurose J. and Towsley D. Design and analysis of a leader election algorithm for mobile ad hoc networks. In: 12th Int. Conference on Network Protocols, 2004, pp. 350-360.

Wang L., Zhang L., Shu Y. and Dong M. Multipath source routing in wireless ad hoc networks. In: Canadian Conference on Electrical and Computer Engineering, 2000, pp. 479-483.

Wohlin C., Runeson P., Höst M., Ohlsson M.C., Regnell B. and Wesslén A. Experimentation in Software Engineering. Springer, 2000.

Wu H.K. and Chuang P.H. Dynamic QoS Allocation for Multimedia Ad Hoc Wireless Networks. Mobile Networks and Applications, 2001, pp. 377-384.

Wu D., Wang R. and Zhen Y. Link stability-aware reliable packet transmitting mechanism in mo-bile ad hoc network. Int. Journal of Communication Systems, 25(12), 2012, pp. 1568-1584.

Xiaoqi L., Lyu M.R. and Jiangchuan L. A trust model based routing protocol for secure ad hoc networks. In: 2004 Aerospace Conference, vol. 2, 2004, pp. 1286-1295.

Zapata M.G. Secure Ad-hoc On-Demand Distance Vector Routing. ACM SIGMOBILE Mobile Computing and Communications Review, 6(3), 2002, pp. 106-107.

Downloads

Published

2016-04-28

How to Cite

BIANCHI, A., PIZZUTILO, S. ., & VESSIO, G. . (2016). CoreASM-BASED EVALUATION OF THE N-AODV PROTOCOL FOR MOBILE AD-HOC NETWORKS. Journal of Mobile Multimedia, 12(1-2), 031–051. Retrieved from https://journals.riverpublishers.com/index.php/JMM/article/view/4479

Issue

Section

Articles