Computer Science ›› 2019, Vol. 46 ›› Issue (6): 112-117.doi: 10.11896/j.issn.1002-137X.2019.06.016

Previous Articles     Next Articles

MANET Routing Discovery and Establishment Strategy Based on Node State

ZHAO Xin-wei, LIU Wei   

  1. (Institute of Fifth,Information Engineering University,Zhengzhou 450001,China)
  • Received:2018-06-13 Published:2019-06-24

Abstract: AODV is a typical on-demand routing protocol in MANET networks.For the defect of AODV routing strategy,a routing discovery and establishment strategy based on node state was proposed.By modeling the MANET network,Markov chain is used to predict the state of neighbor nodes during routing discovery.Based on the original AODV routing strategy,the last hop node uses the reverse routing established by the AODV routing discovery to obtain the status information of the neighbor node.When routing is set up,combining neighboring node status information,the idle and dormant nodes are preferentially selected as the next hop routing.The simulation results show that the AODV routing protocol optimized based on this strategy improves the packet delivery rate in the network,reduces the end-to-end delay,and improves the network performance.

Key words: AODV protocol, Delay, Delivery rate, Markov chain, Mobile ad-hoc networks, Node state

CLC Number: 

  • TP393
[1]RAJESHWAR J,NARSIMHA G.Secure way routing protocol for mobile ad hoc network[J].Wireless Networks,2017,23(2):345-354.
[2]KUMARI N,KUMAR R,BAJAJ R.Energy Efficient Communication Using Reconfigurable Directional Antenna in MANET[C]∥6th International Conference on Smart Computing and Computing and Communications,ICSCC 2017.Kurukshetra,India:Elsevier B V,2018:194-200.
[3]HAO S,ZHANG H Y,SONG M K.A Stable and Energy-Efficient Routing Algorithm Based on Learning Automata Theory for MANET[J].Journal of Communications and Information Networks,2018,3(2):52-66.
[4]SHELKE M P,MALHOTRA A,MAHALLE P.A packet priority intimation-based data transmission for congestion free traffic management in wireless sensor networks[J].Computers &Electrical Engineering,2017,https://doi.org/10.1016/j.com-peleceng.2017.03.007.
[5]AZZA M,HACENE S B.An Enhanced Reputation-based for Detecting Misbehaving Nodes in MANET[J].International Journal of Wireless and Microwave Technologies(IJWMT),2017,7(4):28-37.
[6]PENG J L,NIU H T,HUANG W J,et al.Cross Layer Design and Optimization for Multi-hop Ad Hoc Networks[C]∥Proceedings of 2017 IEEE 2nd Advanced Information Technology,Electronic and Automation Control Conference(IAEAC 2017).Chongqing,China:IEEE Press,2017:1734-1738.
[7]DING G S,LEI W M,HU Z X,et al.QoS routing mechanism for MANET to support real-time service[C]∥2016 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics(AMEII 2016).Hangzhou,China:Atlantis Press,2016:1122-1132.
[8]CHAVAN A A,KURULE D S,DERE P U.Performance Ana-lysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Black Hole Attack[J].Procedia Computer Science,2016,79:835-844.
[9]AZZUHRI S R,NOOR M B M,JAMALUDIN J,et al.Towards a Better Approach for Link Breaks Detection and Route Repairs Strategy in AODV Protocol[J].Wireless Communications and Mobile Computing,https://doi.org/10.1155/2018/9029785.
[10]PARMAR B M,MARADIA K G.GPS-Aided AODV Routing Protocol for MANET[M]∥Optical and Wireless Technologies.Singapore:Springer,2018.
[11]LEONOV A V,LITVINOV G A.Simulation-Based Packet Delivery Performance Evaluation with Different Parameters in Flying Ad-Hoc Network(FANET) using AODV and OLSR[J].Journal of Physics:Conference Series,2018,https://doi.org/10.1088/1742-6596/1015/3/032178.
[12]SINGH M,KUMAR S.Link Failure Avoidance Mechanism (LFAM) and Route Availability Check Mechanism(RACM):For Secure and Efficient AODV Routing Protocol[J].International Journal of Wireless Networks and Broadband Technologies(IJWNBT),2018,7(1):1-14.
[13]DAMODAR N C,ELAPPILA M,PATRO A,et al.ENL-AODV:Energy and Load-Based Routing Protocol in Ad Hoc Networks[M]∥Optical and Wireless Technologies.Singapore:Springer,2018:341-350.
[14]CHO C,AHN S,PAEK J.Efficient Maintenance of AODV Routes in the Vehicular Communication Environment with Sparsely Placed Road Side Units[J].Mobile Information Systems,https://doi.org/10.1155/2018/6252907.
[15]HARTONO R,WIDYAWAN,WIBOW S B,et al.Wireless Sensor Network Quality of Service Improvement on Flooding Attack Condition[J].IOP Conference Series:Materials Science and Engineering,2018,333(1):1-6.
[16]HA R W,HO P H,SHEN X.Optimal sleep scheduling with transmission range assignment in application-specific wireless sensor networks[J].International Journal of Sensor Network,2006,1(1-2):72-88.
[17]BHANUMATHI V,DHANASEKARAN R.Path discovery and selection for energy efficient routing with transmit power control in MANET[J].Malaysian Journal of Computer Science,2013,26(2):124-139.
[1] XU Tian-hui, GUO Qiang, ZHANG Cai-ming. Time Series Data Anomaly Detection Based on Total Variation Ratio Separation Distance [J]. Computer Science, 2022, 49(9): 101-110.
[2] FANG Tao, YANG Yang, CHEN Jia-xin. Optimization of Offloading Decisions in D2D-assisted MEC Networks [J]. Computer Science, 2022, 49(6A): 601-605.
[3] XU Hao, CAO Gui-jun, YAN Lu, LI Ke, WANG Zhen-hong. Wireless Resource Allocation Algorithm with High Reliability and Low Delay for Railway Container [J]. Computer Science, 2022, 49(6): 39-43.
[4] MA Li-wen, ZHOU Ying. BBR Unilateral Adaptation Algorithm for Improving Empty Window Phenomenon in STARTUP Phase [J]. Computer Science, 2022, 49(2): 321-328.
[5] ZHANG Kai, LIU Jing-ju. Attack Path Analysis Method Based on Absorbing Markov Chain [J]. Computer Science, 2021, 48(5): 294-300.
[6] ZHANG Yuan-ming, YU Jia-rui, JIANG Jian-bo, LU Jia-wei, XIAO Gang. Intermediate Data Transmission Pipeline Optimization Mechanism for MapReduce Framework [J]. Computer Science, 2021, 48(2): 41-46.
[7] WU Pei-pei, WU Zhao-xian, TANG Wen-bing. Real-time Performance Analysis of Intelligent Unmanned Vehicle System Based on Absorbing Markov Chain [J]. Computer Science, 2021, 48(11A): 147-153.
[8] LIU Tong, FANG Lu, GAO Hong-hao. Survey of Task Offloading in Edge Computing [J]. Computer Science, 2021, 48(1): 11-15.
[9] GUO Fei-yan, TANG Bing. Mobile Edge Server Placement Method Based on User Latency-aware [J]. Computer Science, 2021, 48(1): 103-110.
[10] ZHANG Hong-ying, SHEN Rong-miao, LUO Qian. Study on Optimal Scheduling of Gate Based on Mixed Integer Programming [J]. Computer Science, 2020, 47(8): 278-283.
[11] WEI De-bin,YANG Peng,YANG Li,SHI Huai-feng. Virtual Network Function Fast Mapping Algorithm over Satellite Network [J]. Computer Science, 2020, 47(3): 248-254.
[12] ZHANG Hua-wei, XIE Dong-feng, ZOU Yan-fang, HU Yong-hui. Multi-hop Dynamic Resource Allocation Protocol with Guaranteed QoS [J]. Computer Science, 2020, 47(11A): 310-315.
[13] ZHANG Cheng-wei, LUO Feng-e, DAI Yi. Prediction Method of Flight Delay in Designated Flight Plan Based on Data Mining [J]. Computer Science, 2020, 47(11A): 464-470.
[14] HE Ming-xing, ZHOU Jie, WU Peng, LIU Yang. Acoustic Signal Propagation Model and Its Performance in Cave Environment [J]. Computer Science, 2019, 46(9): 113-119.
[15] LIU Feng, GE Pei-xin, ZENG Lian-sun. Transmission Scheme for Asymmetric Two-way Relay X Channel Based on Delayed CSIT [J]. Computer Science, 2019, 46(8): 152-156.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!