Packet Reserving and Clogging Control via Routing Aware Packet Reserving Framework in MANET

In MANET, mobile nodes communicate with each
other using the wireless channel where transmission takes place with
significant interference. The wireless medium used in MANET is a
shared resource used by all the nodes available in MANET. Packet
reserving is one important resource management scheme which
controls the allocation of bandwidth among multiple flows through
node cooperation in MANET. This paper proposes packet reserving
and clogging control via Routing Aware Packet Reserving (RAPR)
framework in MANET. It mainly focuses the end-to-end routing
condition with maximal throughput. RAPR is complimentary system
where the packet reserving utilizes local routing information
available in each node. Path setup in RAPR estimates the security
level of the system, and symbolizes the end-to-end routing by
controlling the clogging. RAPR reaches the packet to the destination
with high probability ratio and minimal delay count. The standard
performance measures such as network security level,
communication overhead, end-to-end throughput, resource utilization
efficiency and delay measure are considered in this work. The results
reveals that the proposed packet reservation and clogging control via
Routing Aware Packet Reserving (RAPR) framework performs well
for the above said performance measures compare to the existing
methods.





References:
[1] S. Yang, C. K. Yeo and B. S. Lee, “Toward Reliable Data Delivery for
Highly Dynamic Mobile Ad Hoc Networks”, IEEE Transactions on
Mobile Computing, vol. 11, no. 1, 2012, pp. 111-124.
[2] J. Yu, Y. Qi, G. Wang and X. Gu, “A Cluster-Based Routing Protocol
for Wireless Sensor Networks with Nonuniform Node Distribution”,
International Journal of Electronics and Communications, vol. 66, no. 1,
2012, pp. 54-61.
[3] X. Yang et Al., “Location Aided Opportunistic Routing for Mobile Ad
hoc Networks”, in the Proceedings of the fifth International Conference
on Wireless Communication, Networking and Mobile Computing,
Beijing, IEEE, 2009, pp. 1-5.
[4] S. Bu, F.R. Yu, X. P. Liu, X. P & H. Tang, “Structural Results for
Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad hoc Networks”, IEEE Transactions on
Wireless Communications, vol. 10, no. 9, 2011, pp. 3064-3073.
[5] Q. Guan, F. R. Yu, S. Jiang & V.C. M. Leung, “Joint Topology Control
and Authentication Design in Mobile Ad Hoc Networks With
Cooperative Communications”, IEEE Transactions on Vehicular
Technology, vol. 61, no. 6, 2012, pp. 2674-2685.