Advertisement

P-TORA: A TORA Modification Under TCP E2E-NewReno Model

  • Radhika PatelEmail author
  • Bimal Patel
  • Sandip Patel
  • Amit Parmar
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 958)

Abstract

Mobile Ad-hoc network, generally recognized as MANET is a non-wired, self-reliant and multi-hop network comprising of portable nodes that acts like a router in the network-system. It is a dynamic network having no central control. Evaluating the performance of MANET routing protocol is a present research topic. Reactive type of MANET routing protocol is popularly used nowadays because of the amenities provided by them. TORA (Temporally Ordered Routing Algorithm) is on-demand (Reactive) protocol. It is highly adaptive, multihop and the best for dense networks. This paper describes MANET along with the detailed study of TORA and the Proposed TORA protocol with some modifications in Original TORA. The modifications are done using TCP E2E New Reno operating model with the intention to enhance the performance of Original TORA. The new protocol was born and the name given is P-TORA. NS2 (Network Simulator 2) is a simulation tool used for measuring the performance of TORA and P-TORA in the MANET.

Keywords

Mobile Adhoc networks Reactive routing Proactive routing Hybrid protocols TORA TCP E2E New Reno P-TORA Energy consumption PDR NS2 

References

  1. 1.
    Malhotra, R., Gupta, V., Bansal, R.K.: Simulation & performance analysis of wired and wireless computer networks. Global J. Comput. Sci. Technol. 11(3) (2011)Google Scholar
  2. 2.
    Hmalik, M., Awais, Q., Jamil, M., Dhyani, A.: Performance analysis of proactive and reactive protocols in mobile ad-hoc networking: a simulation based analysis. In: 2014 International Conference on Robotics and Emerging Allied Technologies in Engineering (iCREATE), pp. 25–31. IEEE, April 2014Google Scholar
  3. 3.
    Abusalah, L., Khokhar, A., Guizani, M.: A survey of secure mobile ad hoc routing protocols. IEEE Commun. Surv. Tutor. 10(4), 78–93 (2008)CrossRefGoogle Scholar
  4. 4.
    Yu, F., Li, Y., Fang, F., Chen, Q.: A new TORA-based energy aware routing protocol in mobile ad hoc networks. In: 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet, ICI 2007, pp. 1–4. IEEE, September 2007Google Scholar
  5. 5.
    Kaur, A., Mittal, M.: Influence of link sensing mechanism of IMEP on the performance of TORA under different mobility models. In: 2014 International Conference on Parallel, Distributed and Grid Computing (PDGC), pp. 16–21. IEEE, December 2014Google Scholar
  6. 6.
    Gupta, A.K., Sadawarti, H., Verma, A.K.: Performance analysis of AODV, DSR & TORA routing protocols. Int. J. Eng. Technol. 2(2), 226 (2010)Google Scholar
  7. 7.
    Kuppusamy, P., Thirunavukkarasu, K., Kalaavathi, B.: A study and comparison of OLSR, AODV and TORA routing protocols in ad hoc networks. In: 2011 3rd International Conference on Electronics Computer Technology (ICECT), vol. 5, pp. 143–147. IEEE, April 2011Google Scholar
  8. 8.
    Lim, K.H., Datta, A.: An in-depth analysis of the effects of IMEP on TORA protocol. In: 2012 IEEE Wireless Communications and Networking Conference (WCNC), pp. 3051–3056. IEEE, April 2012Google Scholar
  9. 9.
    Yadav, M., Gupta, S.K., Saket, R.K.: Multi-hop wireless ad-hoc network routing protocols-a comparative study of DSDV, TORA, DSR and AODV. In: 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), pp. 1–5. IEEE, January 2015Google Scholar
  10. 10.
    Yadav, M., Uparosiya, N.: Survey on MANET: routing protocols, advantages, problems and security. Int. J. Innov. Comput. Sci. Eng. 1(2), 12–17 (2014)Google Scholar
  11. 11.
    Sumyla, D.: Mobile Ad-hoc Networks (MANETS) (2006)Google Scholar
  12. 12.
    Raju, V.K., Kumar, K.V.: A simple and efficient mechanism to detect and avoid wormhole attacks in mobile ad hoc networks. In: 2012 International Conference on Computing Sciences (ICCS), pp. 271–275. IEEE, September 2012Google Scholar
  13. 13.
    El Miloud, A.R., Ghoumid, K., Ameziane, K., El Mrabet, O.: The improvement of end to end delays in network management system using networkcoding. Int. J. Comput. Netw. Commun. 5(6), 65 (2013)Google Scholar
  14. 14.
    Awerbuch, B., Mishra, A., Hopkins, J.: Ad hoc on demand distance vector (AODV) routing protocol. Johns Hopkins university, USGoogle Scholar
  15. 15.
    Katheeth, Z.D., Raman, K.K.: Performance evaluation with throughput and packet delivery ratio for mobile ad-hoc networks. Int. J. Adv. Res. Comput. Commun. Eng. 3(5), 6416–6419 (2014)Google Scholar
  16. 16.
    Wang, Z., Li, Z., Zhu, X.: Routing algorithms analysis for ODMA-WiFi systems. In: 2014 5th IEEE International Conference on Software Engineering and Service Science (ICSESS), pp. 1122–1125. IEEE, June 2014Google Scholar
  17. 17.
    Cheng, Y.M., Niu, J., Sun, T.J.: Study on performance comparison of OLSR and AODV routing protocols. In: Applied Mechanics and Materials, vol. 672, pp. 1977–1980. Trans Tech Publications (2014)Google Scholar
  18. 18.
    Loo, J.H., Mauri, J.L., Ortiz, J.: Mobile Ad Hoc Networks: Current Status and Future Trends. CRC Press, Boca Raton (2011)CrossRefGoogle Scholar
  19. 19.
    Rajic, M.: Analytical testing for IEEE802.11bGoogle Scholar
  20. 20.
    Abdelfattah, E.: Mobile ad-hoc routing protocols: evaluation of performance. University of Bridgeport, May 2003Google Scholar
  21. 21.
    Meghanathan, N., Nagamalai, D., Chaki, N. (eds.): Advances in Computing and Information Technology: Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13–15, 2012, Chennai, India - Volume 1. Springer, Heidelberg (2012).  https://doi.org/10.1007/978-3-642-31513-8CrossRefGoogle Scholar
  22. 22.
    Wang, J., Mikami, T., Kanamori, K., Kodama, E., Takada, T.: Improving packet delivery fraction of ad hoc network with XORs-based network coding CDS. IAENG Int. J. Comput. Sci. 38(3), 275–282 (2011)Google Scholar
  23. 23.
    Sarwar, Y., Ali, M.A.: Security issues regarding MANET (Mobile Ad Hoc Networks): challenges and solutions (2011)Google Scholar
  24. 24.
    Al-Jubari, A.M., Othman, M., Ali, B.M., Hamid, N.A.W.A.: TCP performance in multi-hop wireless ad hoc networks: challenges and solution. EURASIP J. Wirel. Commun. Netw. 2011(1), 198 (2011)CrossRefGoogle Scholar
  25. 25.
    Kaur, R., Kumar, R.: Comparison study of routing protocol by varying mobility and traffic (CBR, VBR and TCP) using random walk & random way point models. Int. J. Eng. Trends Technol. (IJETT) 7(4), 177–183 (2014)CrossRefGoogle Scholar
  26. 26.
    Balakrishnan, H., Padmanabhan, V.N., Seshan, S., Katz, R.H.: A comparison of mechanisms for improving TCP performance over wireless links. IEEE/ACM Trans. Netw. 5(6), 756–769 (1997)CrossRefGoogle Scholar
  27. 27.
    Banerjee, S., Misra, A.: Minimum energy paths for reliable communication in multi-hop wireless networks. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 146–156. ACM, June 2002Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Radhika Patel
    • 1
    Email author
  • Bimal Patel
    • 1
  • Sandip Patel
    • 1
  • Amit Parmar
    • 1
  1. 1.Charusat UniversityAnandIndia

Personalised recommendations