You are on page 1of 4

International Journal of Computer Trends and Technology (IJCTT) - volume4 Issue5May 2013

ISSN: 2231-2803 http://www.ijcttjournal.org Page 1471



A Cross Layer Design for Achieving High
Throughput Using S-Odmrp in Wireless Mesh
Networks
R.Satheeskumar
1
, R.Sivaranjani
2
,B.Tamilvanan
3

1
Assistant Professor ,Department of Electronics and Communication

K.S.R. College of Engineering, Namakkal-637215, India

2
PG Student, Department of Electronics and Communication
K.S.R. College of Engineering, Namakkal-637215, India

3
Research Scholar, Department of Computer Science
Bharathiar University, Coimbatore- 641 046, India

Abstract - Multicast is an efficient method for implementing
group communication. Achieving high throughput in wireless
mesh networks is a hard problem due to malicious behavior of
nodes and interference among those nodes in local
transmission. In this paper we propose a cross layer design for
S-ODMRP (Secure on Demand Multicast Routing Protocol) to
enhance the high throughput performance. S-ODMRP
followed rateGuard technique: measurement based detection
and accusation based reaction. In the Cross layer design
combining network layer and MAC layer for S-ODMRP
protocol enhancing high throughput, reduce end to end delay
in the wireless mesh networks.
Keywords - S-ODMRP, Wireless mesh networks, cross layer
design.

I. INTRODUCTION
Wireless Mesh Networks (WMNs) are
increasingly being developed for broadband access
technology. Main objective of WMN is to improve the
application performance such as throughput performance,
Packet Delivery Ratio (PDR), reliability. WMN consist of
mesh router, mesh client and gateways. Infrastructure of
WMN is shown in Fig.1.Application of WMNs are online
games, video conferencing, webcast and multimedia
broadcasting.
Mobile Ad hoc Networks (MANETs) is one of the
access network model in Wireless Mesh Access Networks
(WMANs). MANET is dynamically reconfigurable and it
does not have fixed infrastructure. MANET requires
number of intermediate nodes forwards the packets from
source to destination and also create multi hop path from
source to destination. Multicast routing is one of the
efficient methods for delivers data from multiple
destinations. Recent protocols focus on enhancing the
throughput by selecting path based on metrics that captures
the quality of wireless links. Based on MANET protocols
are classified into tree and mesh based. Tree based
protocols are Ad hoc On Demand Distance Vector
(AODV), Dynamic Source Routing (DSR), Mobile Ad hoc
On Demand Distance Vector (MAODV). Mesh based
protocols are On Demand Multicast Routing (ODMRP),
Core Assisted Mesh Protocol (CAMP). Mesh based
protocols outperforms than the tree based protocols
because tree based protocols provide long path between
source to multiple receivers. The main function of MANET
is learns about the multicast paths by allowing nodes.


Fig 1 Wireless mesh networks
Mesh based routing protocols are reactive routing
protocol. ODMRP routing protocol is mostly used mesh
based protocol. ODMRP does not require maintaining any
International Journal of Computer Trends and Technology (IJCTT) - volume4 Issue5May 2013
ISSN: 2231-2803 http://www.ijcttjournal.org Page 1472

relationship on multicast packet for delivery during
processing of every node. Received multicast packets are
not duplicated. Those are rebroadcasted by the forwarding
nodes to their neighbors. ODMRP protocol is using basic
flood suppression mechanism. Main concern of this paper
is to enhancing high throughput and low overhead and low
congestion.
In the S-ODMRP protocol is based on rateguard
techniques: measurement based detection and accusation
based reaction. It is based on success probability product
(SPP) metric. In this paper implementing Cross layer
design for S-ODMRP (Cross Layer Secure ODMRP), cross
layer design of S-ODMRP enhancing the high throughput,
low congestion and low overhead. Cross layer design is
based on tightly coupled method cross layer design using
network and MAC layer.
The rest of this paper organized as follows: We
describe related work in section II. Review of ODMRP and
S-ODMRP in section III. In section IV we study cross layer
design for S-ODMRP. Simulation results design in section
V. This paper concluded in section VI.

II. RELATED WORK
Designing objective of routing protocols
maintains the connectivity between sources to destinations
nodes proposed by Roy et.al. Mesh based protocols are
used to achieve high throughput performance. Chakeres,
Elizabeth described implementation of AODV. It is a
reactive routing protocol; link break is detected using this
protocol. Mahes and Samir provided multipath extension to
AODV is called Ad hoc on demand Multipath Distance
Vector Routing (AOMDV). Main objective is computing
multiple disjoint loop free path route discovery.
Shivlalmewda and Umeshkumar sigh have discussed Link
Quality Source Routing (LQSR) protocol. LQSR uses the
routing metric. Awerbuch.B, proposes On Demand Secure
Byzantine Resilient (ODSBR). It is an on demand Ad hoc
Routing protocol designed for byzantine attacks. Yih-Chun
Hu et.al,analyzed Secure Efficient Ad hoc Distance Vector
Routing (SEAD). It is an efficient one way hash function
SEAD rejects the asymmetric cryptographic operation to
protect against DOS attacks. Sung-ju-lee et.al, evaluated
ODMRP, this is a mesh based approach. In this ODMRP
nodes are added to the mesh by route selection and
activation protocol and it is a soft state approach put
minimal effort to maintain mesh. High throughput
multicast routing is achieved by various link quality based
on metrics. Jing dong et.al, implemented a novel defense
scheme against the attacks. S-ODMRP is based on
RateGuard technique.
In this paper we implement the cross layer design
in WMNs. Cross layer design between network and MAC
layer. While using this method enhancing high throughput
and low congestion overhead and delay to be reduced by
designing cross layer design for S-ODMRP protocol.


III. AN OVERVIEW OF ODMRP AND S-ODMRP
A.ODMRP (On Demand Multicast Routing Protocol)
On Demand Multicast Routing Protocol is a mesh
based approach in mobile Ad hoc networks. ODMRP is
based on basic flood suppression mechanism that is
ODMRP floods the first received copy of the data. It
consists of two phases ODMRP protocol is shown in Fig.2
in that the source broadcast the JOIN REQUEST to the
group of destinations. Non duplicated JOIN REQUEST is
received by a node means it records relevant upstream node
id in backward manner. JOIN REPLY from all the
destinations (receivers) to the source.


Fig 2 ODMRP Protocol
. Forwarding nodes are plays an important role it
records all the information about the destinations and
source and about the path. ODMRP suffers by high
overhead, congestion due to malicious behavior of the
nodes and attacks by the attacker nodes.
B. S-ODMRP (Secure On Demand Multicast Routing
Protocol)
S-ODMRP is an efficient novel defense scheme
against the attacks. It follows the rateGuard technique, this
method consists of measurement based detection and
accusation based reaction. In measurement based detection
difference between expected Packet Delivery Ratio (ePDR)
and perceived Packet Delivery Ratio (pPDR) does not
exceed the threshold value (). Expected Packet Delivery
Ratio means value of the route metric and perceived Packet
Delivery Ratio means measuring the rate at which it is
receives the data packets from upstream nodes.
1. ePDR=SPP
s-R
(Success probability Product of sender to
receiver.
2. pPDR calculated from Wilson estimate
International Journal of Computer Trends and Technology (IJCTT) - volume4 Issue5May 2013
ISSN: 2231-2803 http://www.ijcttjournal.org Page 1473

3. pPDR=p

+e
Where p

=
m+2
n+4
, where m is the number f packets sent and n
is the number of packets received. And e= z
_
p

(1-p

)
n+4
;
Where z=1.96
Accusation based reaction detects the malicious
behavior of the nodes. Accusation based reaction following
three steps:
1. Set the timer with a timeout value of (1ePDR)
where is set to 0.02sec by experiments.
2. Accusation message propagation and handling.
3. Recovery message propagation and handling.
IV. PROPOSED SYSTEM
S-ODMRP is a novel defense scheme against the
attacks. It follows rateGuard techniques are measurement
based detection and accusation based reaction.
It is briefly discussed in section III.B To
enhancing the high throughput performance and reduce the
end to end delay using cross layer design (CLD) is
proposed. Cross layer design for S-ODMRP using network
and MAC layer, Proposed in this section. CLD for S-
ODMRP is increase the throughput performance in the
network layer. Available bandwidth is calculated in MAC
layer. Delay and loss are concentrated in this layer. S-
ODMRP protocol is also have the high throughput
performance and also provides the security against the
attacks proposed by jing dong et.al. In order to enhance the
throughput performance level and also reduce the end to
end delay level cross layer design is implemented for S-
ODMRP protocol. Cross layer design is done for S-
ODMRP protocol. Network and MAC layer is considered
for this S-ODMRP protocol from these OSI layers.
1. The data is send through network and MAC layer from
source to the destination. Cross layer design focused
network and MAC layer.
2. Data send to the network layer, S-ODMRP routing
protocol is taken in the network layer for forwarding the
data.
3. Cross layer design of S-ODMRP is implemented to
achieving high throughput; reduce the end to end delay.
4. This data is send to the MAC layer from network layer
to achieve available bandwidth.
a. Hop metric is calculated for forwarding from source to
destination. Hop metric for ij node is given
1(minop count | maxno.o noJcs)
b .Bandwidth of the node I in MAC layer is calculated by
Bdw
I
=Bdw
ch
(t
I
/total time)*0.8, Where 0.8 is the
weight factor.
c. Node load also calculated in MAC layer
is given by node load=
qucuc Icngth o] nodc
tot qucuc Icngth o] nodcs

Cross layer design is calculated by multiplication of three
parameters from network and MAC layer.
V. SIMULATION ANALYSIS
S-ODMRP and CLD for S-ODMRP was
implemented in NS-2(network simulator-2). Ns-2 is a
packet level simulator and a discrete event scheduler which
is used to simulate wired and wireless network. Ns-2 is a
standard experiment environment in research community
which uses Tool Command Language (TCL) as a scripting
language. A network environment with 140 nodes has been
simulated, among which 20 nodes are randomly chosen as
multicast group members for experimental evaluation and
one randomly selected among them as a data source.
Malicious nodes are randomly selected among nodes that
are not group members. Group members join the group in
the beginning of the simulation. At the second 100, the
source starts multicasting 512-byte data packets for 400
seconds at the rate of 20 packets/second. The performance
evaluated based on Packet delivery ratio, throughput
performance, and end to end delay is taken into account.
In comparing the three protocols, evaluation could be done
in the following two metrics:
(1) The packet delivery ratio
(2) End to end delay
1. Packet delivery ratio (PDR)
PDR=Number of packets received/total number of
packets send. PDR value of ODMRP, S-ODMRP and
Cross layer design for S-ODMRP was implemented in
NS2.

Fig 3 Comparisons of the PDR value of CLD S-ODMRP, S-ODMRP and
ODMRP.
International Journal of Computer Trends and Technology (IJCTT) - volume4 Issue5May 2013
ISSN: 2231-2803 http://www.ijcttjournal.org Page 1474

Fig 3 shows Packet Delivery Ratio of the
ODMRP, S-ODMRP and CSODMRP. The performance is
compared with the ODMRP and S-ODMRP approach.
Cross layer design for S-ODMRP provides the higher
Packet delivery ratio when compared with the S-ODMRP
and ODMRP
2. End to end delay
Fig 4 shows Average end to end delay in
the presence of attackers and there is no attack. It is clear
from the graph that the end-to-end delay is maintained at
the low level in the absence of attack. The average end-to-
delay is maintained low for Cross Layer Design of S-
ODMRP compared to the S-ODMRP and ODMRP.

Fig 4 Comparisons end to end delay of CS-ODMRP,S-ODMRP and
ODMRP.
Tabular column shows the PDR and end to end
delay of Cross layer design for S-ODMRP, S-ODMRP,
ODMRP protocols. These are implemented in NS-2.
Packet delivery ratio of Cross layer design for S-ODMRP
is high 85% compared to the other protocols. End to end
delay is low for 140 nodes compared to S-ODMRP,
ODMRP protocols. PDR also enhance the throughput
performance level.
Protocol

No. of
nodes
PDR
End to
end delay
CS-ODMRP

140

85 32
S-ODMRP 140 80 35
ODMRP 140 65 50

Table1:-Packet delivery ratio and end to end delay of CLD for S-
ODMRP.S-ODMRP, ODMRP.
VI. CONCLUSION
In this paper we have developed a cross layer
design for S-ODMRP using network and MAC layer. Cross
layer design for S-ODMRP enhancing the high throughput,
reduce the end to end delay. In this paper analyze the cross
layer design for S-ODMRP protocol in network layer and
available bandwidth parameters are considered in MAC
layer.
REFERENCES
[1] J ing Dong; Curtmola, R.; Nita-Rotaru, C., Secure High-
Throughput Multicast Routing in Wireless Mesh
Networks, Mobile Computing, IEEE Transactions on,
vol.10, no.5, pp.653- 668, May, 2011.
[2] Yih-Chun Hu; J ohnson, D.B.; Perrig, A., SEAD: secure
efficient distance vector routing for mobile wireless ad hoc
networks, Mobile Computing Systems and Applications,
2002.Proceedings, Fourth IEEE Workshop on, vol., no., pp.
3- 13, 2002.
[3] LuoJ unhai, Ye Danxia, Xue Liu, Fan Mingyu., A survey of
multicast routing protocols for mobile Ad-Hoc
networksIEEE Communications Surveys & Tutorials
Vol.11,No.1.(2009),pp.78-91.
[4] J ian Tang; GuoliangXue; Weiyi Zhang,, Cross-Layer
Design for End-to-End Throughput and Fairness
Enhancement in Multi-Channel Wireless Mesh Networks,
Wireless Communications,IEEE Transactions on , vol.6,
no.10, pp.3482 3486,October,2007.
[5] LuoJ unhai; Ye Danxia; Xue Liu; Fan Mingyu., A survey of
multicast routing protocols for mobile Ad-Hoc networks,
Communications Surveys & Tutorials, IEEE , vol.11, no.1,
pp.78- 91, First Quarter 2009.
[6] Xiang, X.; Xin Wang; Yang, Y., Supporting Efficient and
Scalable Multicasting over Mobile Ad Hoc Networks,
Mobile Computing, IEEE Transactions on, vol.10, no.4,
pp.544-559, April 2011.
[7] Roy, S.; Addada, V.G.; Setia, S.;J ajodia, Securing
MAODV: attacks and Countermeasures, Sensor and Ad
Hoc Communications and Networks, 2005. IEEE
SECON2005. 2005 Second Annual IEEE Communications
Society Conference on, vol., no., pp. 521-532, 26-29 Sept.,
2005.
[8] Qian Zhang, Ya-Qin Zhang, Cross-Layer Design for QoS
Support in Multihop Wireless Networks, Proceedings of
the IEEE, vol.96, no.1, pp.64-76, J an. 2008.
[9] J ihong Shi; J iang Yu; Haiyan Li; RongZong., AODV
Protocol Optimization Based on Cross- Layer Design of
WMN, Wireless Communications, Networking and Mobile
Computing(WiCOM), 2011 7th International Conference on
, vol., no., pp.1-4, 23-25 Sept.,2011.
[10] Frank Aune, Cross Layer Design Tutorial, November
2004.
[11] Tao Yang; Wang Gang; Zhao Qiang; Lin J ian; Wan J un.,
Improved network coding based on ODMRP protocol in
Ad Hoc network, Advanced Computer Control
(ICACC), 2011 3
rd
International Conference on , vol., no.,
pp.461-464, 18-20 J an. 2011.
[12] Mo'men, A.M.A.; Hamza, H.S.; Saroit, I.A., A survey on
security enhanced multicast routing protocols in Mobile
Ad hoc Networks, High-Capacity Optical Networks and
EnablingTechnologies (HONET), 2010 , vol., no., pp.262-
268, 19-21 Dec. 2010.
[13] Gummadi J ose Moses.; P. Suresh Varma,; N. Supriya,;
CL-S-ODMRP- A Cross Layered Secure ODMRP for
Achieving High-Throughput in Wireless Networks,
European J ournal of Scientific Research ISSN 1450-216X
Vol. 87 No 2 September, 2012, pp.244-253.
[14] Ian F.Akyildiz,;xudong Wang,; Cross-Layer in Wireless
Mesh Networks, IEEE transaction on vehicular
technology.Vol.57,no.2, March 2006.

You might also like