7

Click here to load reader

Performance Enhancement of Wireless Ad Hoc Network Using Cross Layer and Diversity Scheme

Embed Size (px)

DESCRIPTION

Journal of Telecommunications, ISSN 2042-8839, Volume 16, Issue 2, October 2012 http://www.journaloftelecommunications.co.uk

Citation preview

Page 1: Performance Enhancement of Wireless Ad Hoc Network Using Cross Layer and Diversity Scheme

JOURNAL OF TELECOMMUNICATIONS, VOLUME 16, ISSUE 2, OCTOBER 2012

1

© 2012 JOT

www.journaloftelecommunications.co.uk

Performance Enhancement of Wireless Ad Hoc Network Using Cross Layer and Diversity

Scheme A. M . E. ALSAYAH, S. J. Muhammad, U. C. Ahamefula and S. H. Hadya.

Abstract— Ad hoc network provides efficient and innovative telecommunication technology scenarios where infrastructures are not access-

ible. This unique form of wireless network facilitates the use of reliable and efficient information and communication system in areas that are constrained by fixed line networks. However, numerous challenges limits its mobility leading to interference with other unpredictable radio station channel that potentially disrupts its network links and proper transportation as significant fraction of packets are lost resulting and or are received as erroneous. To overcome these limitations, the present study exploites potential technique that detects and uses reliable route among which include cross layer and diversity technique. The use of cross-layer measurements could be to detect various reliable routes while multi-path diversity improves the reliability of packet and route operating robustness. Integration of these techniques could potentially improve the reliability and effectiveness of wireless ad hoc network by leveraging interactions between spectrums of network layers. The present study provides developmental phases for cross layer ad hoc network protocols which are reliably supportive to congestion control and tolerant to delayed network. The study further investigated diversity schemes with focus on network coding and coding erasure imple-

mentation. Index Terms— Ad hoc network, Coding erasure, Cross layer, Network coding, Routing protocols.

—————————— ——————————

1 INTRODUCTION

obile wireless ad hoc network (MANET) represents a dynamic reconfigurable organized wireless net-

work of mobile nodes with no need for central adminis-trative infrastructure. Nodes used in MANET establish communication structure instantly as individual node moves arbitrarily. Change in the node topological link causes mobility of all nodes to act as router while for-warding unrelated packets [1]. Enhanced performance of MANETs makes it viable for use in wide range of applica-tions such as recovery during disaster and for content distribution communications such as used for IP, VoIP, TV and P2P TV. The flexibility in the performance of MANET provides an ideal communication architectural network where fixed communication infrastructures are restricted. Viable potentials of MANET network allows their used for personal communication, in battlefield, for disaster relief and as vehicular networks [2], [3] [4], [5]. Ad hoc networks technology requires no fixed infrastructure as user devices communicate through its arbitrary and tem-

porary network topologies that esablishes its infrastruc-tural topology base on a stable traditional WLAN [5], [6], [7], [8] and [9]] that is potentially dynamic in a MANET [10] and has been extensively been supportive to emer-gency response telecommunication network [4], [7], [8], [11].

Mobility results to change in the network topolo-gy and frequently breaks communication link. Moreover, shared medium in wireless causes interference, conten-tion and congestion which collectively amount to increase in erroneous packet making it difficulty to implement an efficient end-to-end control. Solution to these problems is visible from the integration of cross layer feedback with lower layer comprising physical and MAC layer which can potentially detect reliable links [3], [4]. In addition, flow of information from upper layer is helpful in detect-ing transmission methods. However, temporal diversity such as its network coding and coding erasure also pro-vide alternative pathway to ensure efficient and reliable communication.

Therefore the present study on routing in ad hoc networks explored cross layer interactions as well as the diversities in ad hoc network which are needed to under-stand and enhance the operational principles of an MA-NET characteristic features specifically fot protocols that exploits cross layer interaction with diversities in network coding and erasure.

2 ROUTING IN AD HOC NETWORKS

Routing in telecommunication network engineering en-tails mechanism that are used to direct data flow packet from source to the required destination. Various routing

M

————————————————

A. M. E. ALSAYAH is MSc student at the Department of Telecommunica-tion Engineering, Faculty of Electronic and Computer Engineering (FKEKK), Universiti Teknikal Malaysia Melaka (UTeM).

S. J. Muhammad is a senior lecturer at the Department of Telecommunication

Engineering, Faculty of Electronic and Computer Engineering

(FKEKK), Universiti Teknikal Malaysia Melaka (UTeM).

U. C. Ahamefula is a physicist (PhD) at School of Applied Physiscs, Faculty

of Science and Technology National University of Malaysia 43600 Bangi, Se-

langor D.E Malaysia. S.H. Hadya is a PhD candidate at Faculty of Computer Sciemce and Mathe-

matics, Universiti Technologi Mara (UiTM), 40450 Shah Alam, Selangor Da-rul Ehsan, Malaysia.

Page 2: Performance Enhancement of Wireless Ad Hoc Network Using Cross Layer and Diversity Scheme

2

protocols have been used for different algorithms [12]. The topology of ad hoc wireless networks is often con-straints by factors such as maximum path capacities at reduced costs. Although different routing protocols and algorithms have been used for ad hoc networks, the use is application-specific. For instance, ad hoc network re-quires no fixed topology which makes managing its routing an important task to maintain service quality. This adds to complexities of routing in ad hoc networks com-pare to routing networks in fixed topology [13]. In MA-NET, three major routing protocols classifications are con-strained specifically base on their operational scenario to realized mobile network [10]. Three common protocols in use comprise proactive routing, source-initiated on-demand routing and hybrid routing protocols. 2.1 Proactive Routing Protocol Proactive routing algorithm often referred to as table dri-ven algorithm operate on a frequently updated routing table to keep every node in the network active [14]. This enables the routing tables to always be available when a packet is needed to be sent through the node whose route is detected by certain algorithm. Proactive routing proto-cols are constrained by dynamic maintenance nature of their network topology which requires large network bandwidth [15] such as found in destination sequenced distance vector routing (DSDV) [16], cluster-head gate-way switch-routing (CGSR) [16] as well as in optimized-link-state routing protocol (OLSR) [17]. 2.2 Source initiated on-demand Routing Protocol On-demand routing protocol is often referred to as reac-tive protocol. Its paths are designed out of demand to send packets and require no constant updating of the routing tables. However, the path discovery algorithm used for sending packets is initiated by source node. In-formation is resent back through constructed path to the source node as soon as it reaches its destination node. This form of routing protocol use little bandwidth com-pare to proactive routing protocol that require more time to construct a route to resend information from its source through to its destination nodes. Typical algorithm used includes ad hoc on-demand distance vector (AODV) [18] and dynamic source routing (DSR) [19].

2.3 Hybrid Routing Protocols Hybrid as its name implies is a form of routing protocol that combines the advantages of proactive and source on-demand routing protocols which aims at minimizing weaknesses in the individual routing protocol and are used as MANET routing protocol [12]. Zone routing pro-tocol (ZRP) is borne out hybrid routing protocol and uses proactive routing for neighboring nodes among specific number of hops. Routing for farther destinations uses reactive path discovery [10], [11], [12].

3 PERFORMANCE ENHANCEMENT

3.1 Cross Layer Performance Technique

Traditionally, OSI communication model have strict boundaries layers. However, using cross layer approach could break the strict boundaries to transporting feedback thereby improving the overall protocol performance of the MANET network [20]. Additionally, cross layer feed-back provides updated quality information to neighbor-ing layers making it possible for the routing protocol to cope with the changes in the environment and the flow transmission [21]. 3.2 Enhancement Incorporated with ODMRP with Motion Adaptive Refresh Most MANET routing protocols operate using on de-mand architect base on which routing information ex-changes when needed. On demand routing protocols (ODMRP) uses two way techniques to select appropriate path to sender or receiver. Senders, first broadcasts re-quest packet for protocol route through to the network as receivers sends back reply to route packet. However, al-ternative destination route could be searched upon detec-tion of disconnection. Adaptive demand driven multicast routing (ADMR) [22] and multicast ad hoc on demand distance vector network protocol (MAODV) [23] are typi-cal examples of on demand multicast protocol that uses this technique. Building a multicast in-between source and receivers helps in detecting a broken link while the use of ODMRP enables the reconstruction of the forward-ing mesh in a short interval [24]. The periodic broadcast-ing offered by ODMRP provides robust routing and route refresh which is important performance enhancement parameter for the protocol efficiency.

In situation where the refresh period is short, control packets more than needed are usually generated for mesh construction so as to enable the ODMRP to keep with network dynamics that avoid link breakage resulting from packet losses [25], [26]. High performing ODMRP incorporated with adaptive route refresher drive link breakages base on receiver’s reports through the use of simple and uniform recovery receiver scheme [25].

Long refresh interval causes isolated node to momentarily lose data in wait for subsequent route re-construction and maintenance. To connect back a broken route, need arises for a localize node to perform route recovery to facilitate proactive reattachment to a forward-ing mesh or for route refreshment from information source [27]. These performance enhancement processes are facilitated through the use of cross layer technique. Typical illustration can be found in E-ODMRP flow in-formation system via application layers that collect link information through lower layer, PHY and MAC layers while in ODMRP lower packet is delivered in E-ODMRP under slight load as packet losses are used as an indicator for link breakage. However, overhead is reduced (about 90%) causing better information delivery at high load and uses ODMRP as a basic protocol for ADMR, E-ODMRP and PathchODMRP [27].

Page 3: Performance Enhancement of Wireless Ad Hoc Network Using Cross Layer and Diversity Scheme

3

3.3 On-Demand Multicast Routing Protocol (ODMRP) ODMRP [24] requires query and reply section to forward-ing mesh. A source sending data broadcasts and are in-cluded in the query packet allowing for constituted net-work nodes to stores upstream addresses so as to facili-tate reverse rebroadcasting. Receiver develops and broad-casts reply packet to surrounding neighbors which is re-layed back to the source making the reversed nodes a forwarding mesh that delivers data after which the source simultaneously joins query packet to refresh the forward-ing mesh. Rejoining of the node to mesh receivers re-quires waiting for response to join query packet. Howev-er, in ODMRP, soft-state technique reconstructs member groups explicitly controls messages. Join queries are ter-minated when node has no packet and does not respond to receivers messages making forwarding nodes non-forwarders. This time is referred to as timeout and re-quires multiple refresh [26]. 3.4 Adaptive Demand-Driven Multicast Routing (ADMR) Construction of ADMR route follows the same step as in ODMRP (forwarding mesh through query and replying packet control exchange) [22]. ADMR differs in that its forwarding structure is designed for individual sender whereas in ODMRP, group shares mesh. Secondly, ADMR refresh route every tens seconds trying to repair local path breakages and uses passive scheme noted with un-necessary multicast branches to detect broken link and to monitor traffic pattern. 3.5 Motion Adaptive Refresh E-ODMRP is ODMRP adaptive refresh that enhances mo-bility through the creation of a forwarding mesh initiated by a source. This operation follows the same pattern in ODMRP to transmit data packets through to controlling of signaled information referred in this study as joint query packets which the receives sends back to the source using intermediate nodes to transmit non-duplicated data packets. E-ODMRP sources refreshes at interval and the forwarded mesh vary from minimum prefixed to maxi-mum via adaptive refresh [26], [27], [28].

Adaptive refresh request estimates route lifetime when recovery fails and detects route breakages. The maximum period establishes forwarding mesh function for receivers and is recorded in route refresh packets which are delivered through to the network sources. The network delivery sources reverse the refresh rate which is adapted to route’s lifetime. Importantly, E-ODMRP re-freshes forwarding interconnections before they break. Refresh request packets is sent at interval during when the route refreshes scheme in an attempt to reduce slow-ing down of the overhead refresh update [29]. Decrease refresh rate in the maximum limit could result to short refresh interval which could potentially lead to waste in channel bandwidths which reduces the performance of network. Local recovery contributes to maintaining a dy-namic network in E-ODMRP with increase in efficiency in

low and high mobility. Although network connection in ODMRP and E-

ODMRP is similar, behavior of the nodes differs as a re-sult of differences in network maintenance. Therefore the implementation of a passive acknowledges (ACK) re-quires that every nodes in E-ODMRP network and inter-mediate nodes forwards and receives non-duplicates data packets indicating sender’s node. Forwarder lifetime is absent in E-ODMRP while in ODMRP, forwarders time-out exist and are set at 3-times of the refresh interval and discharges when forwarding expires [27]. The inter

mediate node in E-ODMRP forwards data packets using passive ACK network mechanisms and is as illustrated in Fig. 1. 3.6 Link breakage detection and local recovery

Receivers and intermediate notes can be isolated from interconnected network resulting from mobility. In situa-tion where nodes are disconnected from source, it is im-portant to perform local recovery so as to reconnect to the proactively mesh. Disconnection/breakage and malfunc-tioning link during traffic is detected and monitored us-ing E-ODMRP. This is achieved by estimating packet ar-rival interval from application and informing the receiver through recording the signaled information source to the join query packet. Based on which individual nodes cal-culate and update packet arrival interval before receiving subsequent join query. A node is detached if it does not receive data during packet arrival. The mesh starts recov-ery which is similar to receiver join processes except that it could send dummy packets. Dummy packet is generat-ed and transmitted via sub tree when receiver join packet is received from source node which is a performance measure to prevent explosion of recovery [28]. Nodes dummy packets waits for subsequent packet recovery when new packet is received from the application before timeout. However, the source resends dummy packet when the timer expires and removes information about multicast group.

Fig. 1. E-ODMRP interconnections (queries and reply flow).

Page 4: Performance Enhancement of Wireless Ad Hoc Network Using Cross Layer and Diversity Scheme

4

3.7 Passive ACK and Pruning During route refreshment and recovery, the forwarder becomes bigger because of the addition of new forward-ers. Forwarding unnecessary data result to increase in delivery ratio, high overhead and degrades system per-formance. These effects necessitates pruning of redundant data forwarding through the use of passive ACK scheme. Packets are sent as passive ACK with no control and are self-pruned from the mesh when forwarders omit many passive ACK [27]. This strategy helps remove unneces-sary forwarding that impedes the system performance.

However, the overhead could be high because the entire interconnected nodes forwards packets. The overhead could be reduced using passive ACK suppres-sion strategy incorporated with leaf nodes to forward packets after short delay and allowing the intermediate nodes to forward packets immediately they are received and to skip from sending packets during short delay by passive ACK due to change in mobility. 3.8 PatchODMRP PatchODMRP is derived from ODMRP and operates in similar principles to forward interconnecting structure but differs in mesh maintenance [27]. However, Pat-chODMRP local maintenance technique is used to detect broken link as all nodes periodically send signal via MAC layer in about 3 second interval, making it difficult to avoid extra overhead. Hop ADVT packet is flooded as soon as a broken link is detected [28]; Passive data ac-knowledges ODMRP (PDAODMRP) [29] as an improved versions of PatchODMRP. However, the overhead route repair reduces route collection information using passive ACK.

4 PERFORMANCE EVALUATION

Nodes selected from different destination can be uniform-ly moved at a steady minimum speed of using metrics of packet delivery ratio of received packets, normalized packet overhead (total packet transmitted through a net-work /total data packets received), total control packets transmitted is the total number of transmitted control. E-ODMRP's, ODMRP's, and ADMR's performance in differ-ent mobility conditions can be used to vary node maxi-mum speed [30], [31], [32]. 4.1 Bandwidth Estimation and Resource Reserva-tion Ad hoc QoS Multicasting (AQM) network could be used to support neighboring nodes by broadcasting hello mes-sage at interval with inclusion of own bandwidth [33 and 34]. The nodes records neighbors’ information on receiv-ing the message in a table and could be used to calculate bandwidth of multicast session. This is achieved by flood-ing initiation packets during the beginning of a multicast session which is being forwarded by intermediate nodes through neighboring table. The message introduces sig-

nificant overhead in ad hoc mobile network and interferes with QoS support.

In addition, Lantern tree (LTM) that utilizes mul-tipath often referred to as lantern-path could be used as routing network path in ad hoc multicast employing CDMA-TDMA model at MAC interface layer that allows for overlapping of flows. The use of LTM could be used to exploit CDMA multiuser ability to distribute additional flow in occupied network. However, QoS guarantees are kept within the load limit and are being constrained by need for unstandardized CDMA-TDMA MAC incorpo-rated with time synchronizer.

The use of on-demand mesh-base protocol such as QoS multicast routing protocol (QMR) [35], [36], [37] to forward ODMRP mesh [24] are useful for establishing a multiple-path forwarding mesh that reserves bandwidth for multicast sessions. This could be achieved when data packets are received from multicast session with no reser-vations and are forwarded when shared bandwidth are available. This is a form of hybrid scheme and requires that nodes divides bandwidth as fix and shared band-width. This structure could ensure efficient delivery ratio by employing redundant forwarding [38]. In the other hand, flood redundancy could result to traffic congestion as well as excessive overhead which can potentially im-pede the performance of QoS reserved flow. 4.2 Bandwidth Fair Sharing The use of FairCast algorithm designed by Marfia et al. [39], [40] for sharing across multicast flow which does not reject flows could be employed to control congestion. In this situation, FairCast algorithm operates in the basis that the inelastic flow posses sufficient erasure coding redundancy that tolerate substantial losses and can be adjusted using local-base flow interaction and packets drops to obtain fairness through introducing distribution proportionality in wireless interconnection [38]. The local flows interact by exchanging information on packet losses rate and drops in packets to optimize operating perfor-mance. 4.3 Exploiting Diversity Disruptive MANET network result to networks and transportation of protocols failure. To overcome this prob-lem, need arises to provide reliable and efficient network-ing system with spatial, temporal and spectrum diversity scheme. MANET multicast uses coding scheme by inject-ing packets that are redundant through the nodes to the network by allowing receivers to recover packet without requesting for retransmission. Ad hoc network coding and erasure coding schemes are compatible with ad hoc multicast and increases efficient transmission, reliability and are robustness [41]. The variables base on which the design ad hoc network are made are subject to perturba-tion after the optimal performance is determined and re-sults to their robustness with change in design of the va-riables that delivers satisfactory services.

Spatial diversity in ad hoc routing using multi-path packet replication is used for robust communication

Page 5: Performance Enhancement of Wireless Ad Hoc Network Using Cross Layer and Diversity Scheme

5

to withstand link breakages resulting from mobility. Packets that are duplicated get through to destination that travels through all paths causing the packet delivery to increases in losses over the channel. The major problem to multipath routing in ad hoc network is overhead channe-ling which as earlier discoursed, can be reduced through the use of network coding onto multipath routing proto-col. However, dynamic multipath routing can be used to flexibly change the routing mode and channel losses. This measure could successfully reduce overhead and maintain high data delivery efficiency [42].

Currently, wireless network communications ex-ploits multiple channel such as seen in multiple-input multiple output (MIMO), cognitive radio as well as in ultra-wideband system and has been noted for improved performance compare to conventional-base systems [43]. Multiple channels can be used to solve problems asso-ciated with hidden terminal which is common with IEEE 802.11 MAC by forwarding mesh such as ODMRP to ex-ploit selective receptions capacities to overcome possible hidden terminal [44], [45].

5 CONCLUSION

An enhanced performance of ODMRP with motion adap-tive refresh has been presented. Periodic refresh at adapted rate to the nodes mobility enhances unified local recovery and receiver joining processes. The operation facilitates nodes to perform search during when a broken route is detected in other to be grafted to forwarding in-terconnection proactively. These features can be imple-mented via cross-layer approaches. Multipath routing technique utilizes spatial redundancy through the injec-tion of duplicated data in the network which increases robustness to cope with channel errors arising from mo-bility. However, the occurrence of additional overhead could result to network congestion and can be resolved through the use of dynamic routing mode switching to correct routing mode to suit with the channel features.

Network coding and erasure coding provides poten-tial pathway that can be used to increase the reliability of ad hoc wireless network communications. This can be achieved through the exploitation of temporal diversity by injecting redundant packets in such a way to recon-struct a destination to its original data by retrieving sub-set of packets. However, the use of network coding could be used to obtain highly reliable saving network re-sources. It has been shown that erasure coding is reliable with low code rating although they generate high over-head that can possibly degrade the performance of the entire network as a result of congestion. The usefulness of temporal diversity in MANET topology is pronounced in its ability to improve the reliability of redundant packets which enables network to overcome unstable losses in channel. However, the performance of ad hoc wireless network can potentially be enhanced through the use of cross layer and diversity scheme and are prerequisite to the innovative advances in telecommunication technolo-gy.

REFERENCES

[1] C. Yuh-Shyan and K.O Yun-Wen. "A Lantern-Tree-Based QoS On-

Demand Multicast Protocol for a Wireless Mobile Ad Hoc Network."

IEICE transactions on communications, vol. 87, no. 37, pp.17-726, 2004.

[2] C. Tracy, J. Boleng, and V. Davies. "A Servey of Mobility Models

for Ad Hoc Network Research." Wireless Communication and Mobile

Computiong (WCMC): Special Issue on Mobile Ad Hoc Networking, vol.

2, no. 5, pp. 483-502, 2002.

[3] F. Altiparmak, B. Dengiz, and A.E. Smith, "Reliability estimation

of computer communication networks: Ann models," in: Proceedings

of the 8th IEEE International Symposium on Computers and Communica-

tion (ISCC 2003), pp. 1353-1358, 2003.

[4] H. Ammari, and H. El-Rewini, "A location information-based

route discovery protocol for mobile ad hoc networks," in: Proceedings

of the IEEE International Conference on Performance, Computing, and

Communications, pp. 625-630, 2004.

[5] I. Chlamtac, M. Conti and J. J. N. Liu, "Mobile ad hoc network-

ing: Imperatives and challenges," Ad Hoc Networks vol. 1, no. 1, pp.

13-64, 2003.

[6] T. Chu, and I. Nikolaidis, "Node density and connectivity proper-

ties of the random waypoint model," Computer Communications vol.

27, no. 10, pp. 914-922, 2004.

[7] C. R. Dow, P. J. Lin, S. C. Chen, J. H. Lin, and S.F. Hwang, "A

study of recent research trends and experimental guidelines in mo-

bile ad-hoc network," in: Proceedings of the 19th Intrernational Confe-

rence on Advanced Information Networking and Applications (AINA'05),

pp. 72-77, 2005.

[8] M. Forodigh, P. Johansson and P. Larsson, "Wireless ad hoc net-

working-the art of networking without a network," Ericsson Review

no. 4, pp. 248-263, 2000.

[9] D. Simplot-Ryl and I. Stojmenovic, "Data communications and

topology control in wireless ad hoc networks," Ad Hoc Networks vol.

3, no. 5, pp. 507-508, 2005.

[10] B. Ishibashi and R. Boutaba, "Topology and mobility considera-

tions in mobile ad hoc networks," Ad Hoc Networks vol. 3, no. 6, pp.

762-776, 2005.

[11] N. Aschenbruck, M. Frank, P. Martini and J. Tolle, "Human mo-

bility in manet disaster area simulation - a realistic approach," in:

Proceedings of the 29th Annual IEEE International Conference on Local

Computer Networks (LCN'04), pp. 668-675, 2004.

[12] M. R. Pearlman and Z. J. Haas, "Determining the optimal confi-

guration for the zone routing protocol," IEEE Journal on Selected Areas

in Communications vol. 17, no. 8, pp. 1395-1414, 1999.

[13] T. Camp, J. Boleng and V. Davies, "A survey of mobility models

for ad hoc network research," Wireless Communications & Mobile Com-

puting (WCMC): Special issue on Mobile Ad Hoc Networking: Research,

Trends and Applications vol. 2, no. 5, pp. 483-502, 2002.

[14] R. Huang and G. V. Zaruba, "Location tracking in mobile ad hoc

networks using particle filters," Journal of Discrete Algorithms vol. 5,

no. 3, pp. 455-470, 2007.

[15] C. E. Perkins and P. Bhagwat, "Highly dynamic destination-

sequenced distance vector routing (dsdv) for mobile computers,"

ACM SIGCOMM Computer Communication Review vol. 24, no. 4, pp.

234-244, 1994.

[16] C. C. Chiang, "Routing in clustered multihop, mobile wireless

networks with fading channel," in: Proceedings of the IEEE Singapore

International Conferenceon Networks, pp. 197-211, 1997.

[17] P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum,

and L. Viennot, "Optimized link state routing protocol for ad hoc

networks," in: Proceedings of the IEEE International Multi Topic Confe-

Page 6: Performance Enhancement of Wireless Ad Hoc Network Using Cross Layer and Diversity Scheme

6

rence (INMIC 2001), Technology for the 21st Century, pp. 62-68, 2001.

[18] C. E. Perkins and E.M. Royer, "Ad-hoc on-demand distance

vector routing," in: Proceedings of the Second IEEE Workshop on Mobile

Computing Systems and Applications (WMCSA '99), pp. 90-100,1999.

[19] D. B. Johnson and D. A. Maltz, Dynamic source routing in ad-

hoc wireless

networks, in: H.K. T. Imielinski (Ed.), Mobile computing, Kluwer,

Boston, pp.153-181, 1996.

[20] N. Rahnavard and F. Fekri. "CRB cast: a reliable and energy-

efficient broadcast scheme for wireless sensor networks using rate-

less codes." IEEE Transactions on Wireless Communications,vol. vol. 7,

no. 12, pp. 5390-5400, Dec 2008.

[21] S. Katti, D. Katabi, W. Hu, H. Rahul, and M. Medard. "The Im-

portance of Being Opportunistic: Practical Network Coding for Wire-

less Environments." In 43rd Allerton Conference on Communication,

Control, and Computing, Monticello, IL, Sep 2005.

[22] G. J. Jetcheva and D. B. Johnson. "Adaptive demand-driven mul-

ticast routing in multi-hop wireless ad hoc networks." In MobiHoc

'01: Proceedings of the 2nd ACM international symposium on Mobile ad

hoc networking & computing, pp. 33-44, Long Beach, CA, USA,2001.

[23] M. E. Royer and C. E. Perkins. "Multicast Operation of the Ad-

hoc On-Demand Distance Vector Routing Protocol." In The 5th annual

ACM/IEEE international conference on Mobile computing and networking

(MobiCom '99), Seattle, WA, USA, 1999.

[24] J. L. Sung, W. Su, and M. Gerla. "On-demand multicast routing

protocol in multihop wireless mobile networks." Mobile Networks and

Applications, vol. 7, no. 6, pp. 441-453, 2002.

[25] Y. O. Soon, J. S. Park and M. Gerla. "E-ODMRP: Enhanced

ODMRP with Motion Adaptive Refresh." In 2nd International Sympo-

sium on Wireless Communication System (ISWCS 2005), pp. 130-134,

Siena, Italy, Sep 2005.

[26] Y. O. Soon, J. S. Park, and M. Gerla. "E-ODMRP: Enhanced

ODMRP with Motion Adaptive Refresh." Journal of Parallel and Dis-

tributed System, vol. 64, no. 8, pp. 1044-1053, 2008.

[27] M. Lee and Y. K. Kim. "Patch ODMRP: an ad hoc multicast

routing protocol." In The 15th International Conference on Information

Networking (ICOIN '01), Oita, Japan, Jan 2001.

[28] S. Cai and X. Yang. "The performance of PoolODMRP." In The

6th IFIP'/IEEE International Conference on Management of Multimedia

Networks and Service (MMNS 2003), Belfast, Northern Ireland, Sep

2003.

[29] S. Cai, X. Yang, and L. Wang. "PDAODMRP: An extended Poo-

lODMRP based on passive data acknowledgement." Journal of Com-

munications and Networks, vol. 6, no. 4, pp. 362-375, 2004.

[30] L. Seoung-Bum, A. Gahng-Seop, X. Zhang, and A. T. Capbell.

"INSIGNIA: an IP-based quality of service framework for mobile ad

Hoc networks." Journal of Parallel and Distributed Computing, vol. 60,

no. 4, pp. 374-406, 2000.

[31] A. Gahng-Seop, A. T. Campbell, A. Veres and S. Li-Hsiang.

"Supporting Service Differentiation for Real-Time and Best- Effort

Traffic in Stateless Wireless Ad Hoc Networks (SWAN)." IEEE Trans-

actions on Mobile Computing, vol. l, no. 3, pp.192-207, 2002.

[32] H. Xiao, K. Chua, W. Seah and A. Lo. "A Flexible Quality of Ser-

vice Model for Mobile Ad-hoc Networks." In Proceedings of Vehicular

Technology Conference (VTC), pp. 445-449, Tokyo, Japan, 2000.

[33] K. Birr and C. Ersoy. "Multicast Routing for Ad Hoc Networks

with a Multiclass Scheme for Quality of Service." In 19th International

Symposium on Computer and Information Sciences (ISCIS), pp. 187-197,

Kemer-Antalya, Turkey, 2004.

[34] K. Birr and C. Ersoy. "Multicast Routing for Ad Hoc Networks

with a Quality of Service Scheme for Session Efficiency." In 15th IEEE

International Symposium on Personal, Indoor and Mobile Radio Commu-

nication (PIMRC 2004), pp. 1000-1004, Barcelona, Spain, 2004.

[35] M. Saghir, T. C. Wan, and R. Budiarto. "Load Balancing QoS

Multicast Routing Protocol in Mobile Ad Hoc Networks." In Proceed-

ings of Asian Internet Engineering Conference (AINTEC 2005), pp. 83-97,

Bankok, Thailand, 2005.

[36] M. Ghaderi, D. Towsley, and J. Kurose. "Network Coding Per-

formance for Reliable Multicast." In Military Communications Confe-

rence, 2007. MILCOM 2007. IEEE, Orlando Florida, USA, 2007.

[37] M. Ghaderi, D. Towsley, and J. Kurose. "Reliability Gain of Net-

work Coding in Lossy Wireless Networks." In IEEE INFOCOM,

Phoeniz, AX, USA, Apr 2008.

[38] Szymon Chachulski, Michael Jennings, Sachin Katti, and Dina

Katabi. "Trading Structure for Randomness in Wireless Opportunis-

tic Routing." In In Proceedings of SIGCOMM 07, 2007.

[39] Gustavo Marfia, Paolo Lutterotti, Stephan J. Eidenbenz, Giovan-

ni Pau, and Mario Gerla. "FairCast: Fair Multi-Media Straming in Ad

Hoc Networks through Local Congestion Control." In 11th ACM

International Conference on Modeling, Analysis and Simulation of Wire-

less and Mobile System (MSWiM '08), Vancouver, BC, Canada, Oct

2008.

[40] J. S. Park, A. Nandan, M. Gerla, and H. Lee. "SPACE-MAC:

Enabling spatial reuse using MIMO channel-aware MAC." In in Proc.

IEEE Int. Conf. Communications (ICC), Seoul, Korea, Seoul, Korea), May

2005.

[41] A. Fujimura, S. Y. Oh, and M. Gerla. "Network Coding vs. Era-

sure Coding: Reliable Multicat in Ad hoc Networks." In IEEE Mili-

tary Communications Conference (MILCOM '08), San Diego, CA, USA,

Nov 2008.

[42] S. Y. Oh, M. Gerla, and A. Tiwari. "Robust MANET Routing

using Adaptive Path Redundancy and Coding." In THE FIRST Inter-

national Conference on COMmunication Systems and NETworkS

(COMSNETS), Bangalore, India, Jan 2009.

[43] S. Y. Oh, M. Gerla, P. Zhao, B. Daneshrad, G. Pei, and H. J. Kim.

"MIMO-CAST:A Cross-Layer Ad Hoc Multicast Protocol Using MI-

MO Radios." In IEEE Military Communications Conference (Milcom 07),

Orlando Florida, USA, 2007.

[44] A. Laouiti, A. Qayyum, and L. Viennot. "Multipoint Relaying:

An Efficient Technique for Flooding in Mobile Wireless Networks."

In Proceeding of 35th Annual Hawaii International Conference on System

Sciences (HICSS' 2001), Maui, Hawaii, USA, Jan 2001.

[45] J. Rachit and L. Shrivastava, Study and Performance Compari-

son of AODV & DSR on the basis of Path Loss Propagation Models

International Journal of Advanced Science and Technology, Vol. 32, July,

2011

[45] J. Rachit and L. Shrivastava, Study and Performance Compari-

son of AODV & DSR on the basis of Path Loss Propagation Models

International Journal of Advanced Science and Technology, Vol. 32, July,

2011. Mr. A. M. E. ALSAYAH

is a MSc student at the Department of Tele-

communication Engineering, Faculty of Electronic and Computer Engineering (FKEKK), Universiti Teknikal Malaysia Melaka (UTeM). He obtain his bachelor degree in 2006 in telecommunication enegi-neering and is currently researching on Ad Hoc Network.

Assoc. Prof. S. J. MUHAMMAD is a senior lecturer (PhD) at the Department of Telecommunication Engineering, Faculty of Electronic and Computer Engineering (FKEKK), Universiti Teknikal Malaysia Melaka (UTeM).

Dr. C. U. AHAMEFULA obtained his Dip. in Mech. & Electrical

Page 7: Performance Enhancement of Wireless Ad Hoc Network Using Cross Layer and Diversity Scheme

7

/Electronic Engineering and Adv. Dip. In Mech. & Electrical/Electronic Engineering from City & Guides of London Institute (1999-2003), BSc in Mechnical Engineering from University of Lagos, Nigeria in 2003, MSc in Energy Technology from National University of Malay-sia in 2008 and PhD (Physics) from National University of Malaysia in 2012. He is currently research on Nanotechnology application in low-cost quantum dot sensitized solar cell. Mr. S. H. HADYA is a PhD candidate at Faculty of Computer Sciemce and Mathematics, Universiti Technologi Mara (UiTM), 40450 Shah Alam, Selangor Darul Ehsan, Malaysia. He received the degree in Computer Science from Al Mirqab University Libya in 1998. In 2007, he obtain a master degree in Information Technology and Communications from Academy of Graduate Studies, Tripoli, Libya. He is currently research on organizational intelligence and management practices in Universiti Teknologi MARA (UiTM) Malay-sia.