SlideShare a Scribd company logo
Computer Engineering and Intelligent Systems                                                 www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012


  A Study of Congestion Aware Adaptive Routing Protocols in
                                              MANET
                 Shitalkumar Jain, Shrikant Kokate, Pranita Thakur, Shubhangi Takalkar
                             Maharashtra Academy of engineering, Alandi (D)
                                   Email: sajain@comp.maepune.ac.in


Abstract

Routing protocols for mobile ad hoc networks (MANETs) have been explored extensively in last few years.
Much of this work is targeted at finding a feasible route from a source to a destination without considering
current network traffic or application requirements. Routing may let a congestion happen which is detected
by congestion control, but dealing with congestion in reactive manner results in longer delay, and
unnecessary packet loss and requires significant overhead if a new route is needed. Routing should not be
aware of, but also be adaptive to, network congestion. Adaptation to the congestion helps to increase both
the effectiveness and efficiency of routing. These problems are solved by the congestion-aware routing
protocols in certain degree. These protocols which are adaptive to congestion status of mobile ad-hoc
network can greatly improve the network performance. In this paper, we present the survey of congestion
adaptive routing protocols for mobile ad-hoc network. Finally, the future direction of congestion-aware
routing protocols is described.
Keywords: Ad hoc networks, congestion aware routing, Congestion metric, congestion adaptability
    1.   Introduction
Wireless ad-hoc network is usually defined as a set of wireless mobile nodes dynamically self organizing a
temporary network without any central administration or existing network infrastructure. The node in the
wireless ad-hoc network can serve as routers and hosts. So, they can forward packets for other nodes if they
are on route from source to destination. Routing is important problem in wireless ad-hoc network.
Traditional working protocols cannot work well in wireless ad-hoc network because of the characteristics
of the wireless ad-hoc networks. Since, mobile nodes have limited transmission capacity they mostly
intercommunicate by multihop relay. Multihop routing is challenged by limited wireless bandwidth, low
device power, dynamically changing network topology, high vulnerability to failure. To answer these
challenges, many routing algorithms in MANETs were proposed. There are different dimensions to
categorize them: proactive routing Vs reactive routing or single path routing Vs multipath routing. In
proactive protocols, route between every two nodes are established in advance even though no transmission
is in demand. In reactive protocols, route is discovered when needed transmission and released when
transmission no longer takes place. Congestion is one of the most important restrictions of wireless ad-hoc
network. It may deteriorate the performance of whole network. In the current design routing is not
congestion-adaptive. Routing may let the congestion happen which is detected by congestion control. But
dealing with congestion in reactive manner results in longer delay and an unnecessary packet loss and
requires significant overhead if the new route is needed. But, now there is another dimension for
categorizing for routing protocols: congestion adaptive Vs congestion un-adaptive routing. Our motivation
is that congestion is dominant cause for packet loss, long delay, and high overhead in MANETs.
These problems become visible in large scale transmission of traffic intensive data such as multimedia data
where congestion is more probable and negative impact of packet loss on the service quality is of more
significance. In this paper we studied congestion routing protocols like CRP(Congestion Adaptive Routing
Protocol)[7],ECARP (Efficient Congestion Adaptive Routing Protocol )[11],CARP(Congestion Aware
Routing Protocol),CADV(Congestion Aware Distance Vector)[12],CARA(Congestion Aware Routing plus
rate Adaptation)[12],CARM(Congestion Aware Routing Protocol for Mobile Ad-hoc Network)[12].


                                                    64
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012

The remaining part of the paper is organized as follows: In section II we provide the studied congestion
aware routing protocols. In section III comparison between these algorithms is presented. In section IV we
concluded the paper.

    2.   Algorithm

There are many routing algorithms in mobile ad-hoc networks for routing and congestion free networks.
Some of them are explained below:

2.1 Congestion Adaptive Routing Protocol (CRP):

Congestion Adaptive Routing is a congestion adaptive unicast routing protocol for mobile ad-hoc
network.CRP protocol tries to prevent congestion from occurring in the first place. In CRP, every node
appearing on a route warns its previous node when prone to be congested. So, CRP uses the additional
paths called as “bypass” for bypassing the potential congestion area to the first non congested node on the
primary route. It reduces packet delay. But, at the same time CRP tries to minimize bypass to reduce
protocol overhead. Hence, the traffic is split over bypass and primary and adaptively to network congestion.
Hence, 1) power consumption is efficient.2) Congestion is resolved beforehand and at the same time there
is small packet loss rate.

CRP is on-demand and consists of the following components.

2.1.1    Congestion Monitoring
 When no. of packets coming to the node exceeds its carrying capacity, node becomes congested and its
starts losing packets. Various metrics are used for node to monitor congestion status. Main parameters are
percentage of all packets discarded for lack of buffer space, the average queue length, the no. of the packets
timed out and retransmitted, average packet delay. In all these parameters, rising number indicates growing
congestion.
2.1.2    Primary Route Discovery
Sender discovers the route to the receiver by broadcasting the REQ packet toward receiver. The receiver
responds REQ by sending the REP packet on same path that the REQ previously followed. This is called
primary route and nodes on this are called primary nodes. To reduce traffic due to the primary route
discovery and better deal with Congestion in the network, 2 strategies are adopted 1) REQ is dropped if
arriving at a node which is having congestion status as “red” 2) REQ is dropped I arriving at node already
having a route to destination .
2.1.3    Bypass Discovery
 A primary node periodically broadcasts a UDT i.e. update packet. This packet contains the nodes
congestion status and set of tuples [destination D, next green node G, distance to green node, n] for each
node appearing as a destination in primary table. For this reason is when node P receives an update packet
from next primary node Pnext, about the destination D, P will be aware of congestion status of next. This
causes the congestion to know about the next green node of P which is n hops away from primary route.
But if the next hop is yellow or red, congestion will be there if data packets continue to be forwarded on
P Pnext. But, CRP tries to keep congestion from occurring in the first place, P node starts to select bypass
route toward G-the next green node of P known from the UDT packet. This bypass search is similar to
primary route search, except that 1)the bypass request packet’s TTL is set to 2*m and 2)bypass request is
dropped if arriving at node already present on primary route. It can be also possible that no bypass is found.
So, in such situation packets are delivered to destination by following primary route.
2.1.4    Traffic Splitting and Congestion Adaptability
When the bypass at a node is found, data packets coming to this node are not necessarily spread over

                                                     65
Computer Engineering and Intelligent Systems                                                 www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012

bypass and primary route. To avoid the bypass from being congested no packet is forwarded on bypass
unless any primary node is red i.e. congested. The basic idea behind traffic splitting is that when primary
link consists of less congested node, traffic on primary link should be increased, otherwise it should be
reduced. Bypass and primary routes cannot include more than 2 common nodes, but different bypass paths
can share common node. This increases chance to discover a bypass. But, because of this bypass node may
become congested if it has to carry large loads of bypass traffic. But, this can be solved, by splitting
probability adjustment for congestion adaptation. The probability adjustment is as shown in TABLE I.
2.1.5   Multipath Minimization
To reduce the protocol overhead, CRP tries to minimize using multiple paths. If the probability p to forward
data on a primary link approaches 1.0, this means the next primary node is far from congested or the bypass
route is highly congested. In this case, the bypass at the current node is removed. Similarly, if the next
primary node is very congested (p approaches 0), the primary link is disconnected and the bypass route
becomes primary. To make                                                                                 the
protocol more lightweight, CRP does not allow a node to have more than one bypass. The protocol
overhead due to using bypass is also reduced partly because of short bypass lengths. Each bypass connects
to the first non-congested node after the congestion spot, which should be just a few hops downstream.
2.1.6   Failure Recovery
 CRP is able to quickly resume connectivity after a link breakage by using bypass routes currently
available. There are 3 min cases of failure
2.1.6.1 Primary link failure
When one of link on primary route fails, the initial node sends a DISC packet towards sender along route.
This DISC goes on recording nodes and it stops at node having bypass. This node if finds that its bypass
destination is there in DISC, that bypass is not used and DISC is forwarded upstream towards sender till it
finds a node with bypass and not having failed node as its destination. If both these cases are not there
DISC is sent to the sender and it will find new primary route.

2.1.6.2 Bypass link or node fails
In this case bypass node which finds this failure sends a BPS_DISC packet through bypass route to
primary node and that bypass is removed.

2.1.6.3 Primary node fails
If node on the primary route fails, its previous node sends DISC packet along primary route. If the bypass
node detects some failure, it will also send BPS_DISC packet along bypass until reaching a primary node.
When primary node received both these packet, it removes bypass and DISC packet is forwarded along
primary route. Then this is handled same as first case. If BPS_DISC packet doesn’t arrive at the primary
node on time that bypass is used as primary route. But, if it comes late, it is ignored. But, route remains
broken but it will recover soon because another DISC packet will be sent back.
2.2. An Efficient Congestion Adaptive Routing Protocol for Mobile Ad Hoc Networks (ECARP):
An efficient congestion adaptive routing protocol is better than every other routing protocol during heavy
traffic loads. The ECARP, routing protocol ensures high availability of alternative routes and reduce the
rate of stale routes. ECARP is having mainly AODV as its base. This can be achieved by increasing the
parameters of routing protocols (especially in AODV) that normally take more time for link recovery.
These parameters are active_route_time-out, route_reply_wait_time, reverse_route_life, TTL_start,
TTL_increment, TTL_threshold and delete_period.

ECARP Congestion Control Algorithm
This algorithm provides solution to improve routing protocols due to constrained environment.
Step 1: Check the occupancy of link layer buffer of node periodically. Let Nc be the congestion status

                                                    66
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012

estimated.
Step 2: Compute Nc =Number of packet buffered in buffer/Buffer Size
Step 3: Set the status for congestion. It can be indicated by three statuses “Go”, “careful”, and “Stop”.
[ “Go” indicates there is no congestion with Nc ≤ ½ ], “carefull” indicates the status likely to be congested
with ½ ≤ Nc ≤ ¾ and “Stop” indicates the status already congested, ¾ ≤ Nc ≤ 1.]
Step 4: Invoke congestion control routine when link failed event has occurred in data transfer with using
active route or ¾ ≤ Nc ≤ 1.
Step 5: Assume that neighboring will have alternate route or non-congested route to the destination.
Step 6: Make Query to non-congested neighbors for route to destination
Step 7: after obtaining the routes from the neighbors, select route with minimum hops.
Step 8: Once route is finalized start sending the data packets through non-congested route.
Step 9: If there is no alternative route to destination then start splitting the traffic to the less congested
route.
Step 10: Traffic splitting effectively reduces the congestion status at the next main node.

2.3. Congestion aware routing plus Rate Adaptation (CARA):
The base use of CARA protocol is DSR. The route discovery mechanism of DSR is modified. This protocol
mainly aims to find the bypass route for congested zones or nodes. This can be achieved by combining the
average MAC utilization and the instantaneous transmission queue length to indicate the congestion level
of nodes in the network. When source wants to transmit data to the destination node, it broadcasts RREQ
packets. When intermediate code receives RREQ, it checks its congestion level. If the congestion level is
higher than it discards the RREQ. When RREQ arrives at the destination node, though destination node is
congested or not it handles the RREQ and replies RREP. So, route without congested node is established.
CARA uses two metrics to measure congestion information first is average MAC layer utilization. The
instantaneous MAC layer utilization is considered as 0 only when the medium around the node is available
at the beginning of a transmission and as 1 when the node is not idle. (e.g. detecting physical carrier or
detecting or back off due to virtual carrier sensing.) As, the instantaneous MAC layer utilization is either 1
or 0 the average value with in the period indicates the use of wireless medium around the node.
Second metric used is instantaneous transmission queue length. If the node has many packets waiting in the
queue, it causes long packet latency or even dropping of packets. So we can say that node is congested now.
The above mentioned metric can veraciously reflect the congestion conditions around the node. This
protocol tries to minimize the congestion in two ways: 1) It forbids the RREQ packets to propagate in the
congested area. 2) It guides the route around the congested area or nodes instead of across them.
As a result of this no conditional transmission burden generate in these areas.


2.4. Congestion Aware Routing protocol for Mobile ad hoc networks (CARM):
A congestion aware routing protocol for mobile ad hoc networks uses a metric incorporating data rates,
MAC overhead and buffer delay to control the congestion. The CARM protocol introduces a new
parameter called WCD (Weighted Channel Delay) to measure congestion level and adopts a route
ELDC(Effective link Data-rate Category) to avoid the MDRR(Mismatched data-rate route) problem. The
MDRR problem is shown in following fig.1
The data rate of route shown by dashed (A-B-D-G) is limited by teaming fast link (B-D) with slow link (A-
B and D-G).
As mentioned earlier, the CARM protocol introduces a new parameter called WCD (weighted channel
delay) to measure congestion and it is given as
                                      WCD=a ΣτQ + (1+b)TMACALL+Tdata
where Q is the number of buffered packets for this link. Tdata=Ldata/ R is the data transmission time, Ldata is
the length of data in bytes or bits and R is the data rate of the link. TMACALL is total time spent at the MAC
layer. The constants a and b are parameters with values between 0 and 1 which are used to weight TMACALL.
By weighting TMACALL can avoid misjudgment of congestion as shown in fig.2



                                                      67
Computer Engineering and Intelligent Systems                                                  www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012



In CARM, source node broadcasts RREQ packets with ELDC and WCD information when it attempts to

transmit data to the destination. Intermediate nodes compare source ID, source sequence, and ELDC of the

RREQ packets they receive from neighbors, and drop the RREQ packets whose source ID and source

sequence number are the same with that of other RREQ packets received earlier and ELDC is lower than

the earlier RREQ packets’. Only the destination node can responds to the RREQ packets by sending RREP
packets back to the source along the route from which they came. The route is established when the first

RREP arrives at the source. The subsequent RREP packets are cached for the spare routes. The utilization

of the congestion metric, WCD, is very special in CARM protocol. Because the priority of route packets is
higher than data packets, the route packets can be forwarded without queuing. That is, the congestion level

information inherent in queuing delays is lost. The author proposed a RREQ-delay scheme. An RREQ is

forwarded with a delay of the WCD that is calculated according to the WCD information in the RREQ at

the intermediate nodes. The lower the congestion level of link is, the smaller the delay of RREQ packets

are, the earlier the RREQ packets arrive at the destinations. This scheme ensures that the RREQ packets of

routes with lower congestion level arrive at the destination first and congested links are eliminated in the
routes. This all causes high overhead. So, overhead in case of CARM is very high.



2.5. Congestion-Aware Distance Vector (CADV):



The CADV protocol is based on proactive protocol, DSDV. In a distance vector routing protocol, every host

maintains a routing table contains a distances from itself to possible destinations. A mobile host in ad -hoc

network acts like a single server queuing system. Delay in sending packet is related with congestion. In

CADV, each entry is related with delay expected. This helps to measure congestion at the next hop. The

expected delay is computed follows:
                                      ∑
                                                                             (1)
Where n is the number of sent packets & L is the length of MAC layer packet queue. E [D] estimates the

time. A newly arrived packet has to wait before it is send out.In CADV, routing decision is made based on
distance to the destination as well as the expected delay at the next hop showed in (1) CADV gives the

routes with low expected delay, higher priority. CADV tries to avoid congestion and tries to balance traffic

by giving priority to a route having low expected delay.




                                                     68
Computer Engineering and Intelligent Systems                                                  www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012

CADV routing protocol consist of three components:

1) Traffic Monitor: It monitors traffic going out through the link layer. Currently it keeps track of average

delay for sending one data packet in receipt period of time. Time period is specified by route maintainance

component.

2) Traffic Control: It determines which packet is the next to send or drop. It reschedules packets if needed.

It supports a drop tail FIFO queue and provides functionality to queue packets.
3) Route maintainance: It is the main component. It performs the work of exchanging information with

neighbors, evaluation and maintaining routes. It manages the traffic monitor and traffic control component.



CADV better support for QoS. The real time performance of CADV is good, and end to end delay was

short. The over head of CADV is unacceptable when the network is large. Through put also decreases the

performance of CADV is may be well in the small & steady wireless ad- hoc network.

2.6. Congestion Aware routing Protocol (CARP)

CARP is an on-demand routing protocol. It uses information gathered from MAC layer to discover

congestion free routes. CARP uses combined weight matrix in its standard cost function to check for the

congestion level. The multiple paths are computed during the route discovery. Calculate node weight matrix

NM which assign a cost to each link in the network and select maximum throughput paths.

                                      NM = (Lq * Drate)/(OHmac * Davg)


1)   Route request: Consider the route


                                               S-P1-P2-P3-D

To initiate congestion-aware routing discovery, the source node S sends a RREQ. When the intermediate

node P1 receives the RREQ packet, it first estimates all the node weight metrics.

The node P1 then calculates its node weight NMP1

                                               RREQP1 P2

P2 calculates NMP2 and forward the RREQ packet

                                               RREQP2 P3

Finally the RREQ reaches the destination node D with the sum of node weights

                                               RREQP3 D




                                                     69
Computer Engineering and Intelligent Systems                                                  www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012

2) Route Reply: The destination node D sends the route reply packet RREP along with total node weight

    to the immediate upstream node P3

                                                  RREQD      P3


Now P3 calculates its cost C based on the information from RREP as

                                 CP3= (NMp1+NMp2+NMp3)-(NMp1+NMp2)

By proceeding in the same way, all the intermediate hosts calculate its cost .On receiving the RREP from

all the routes, the source selects the route with minimum cost value.


    3.   COMPARISONS

Congestion is a dominant reason for packet drops in ad hoc networks.CRP sends packets on both bypass

paths and primary routes simultaneously. So, incoming traffic is distributed on primary and bypass route

depending on current congestion status of network. Congestion is subsequently better resolved .In ECARP

some parameters of AODV such as TTL_start, TTL_increment are increased. So, it ensures the high

availability of alternative routes and reduces the rate of broken rut removal process. CADV is not

congestion adaptive. It offers no remedy when the existing route becomes heavily congested. So, CADV
improves AODV in delivery ratio only. The real time performance of the CADV is good and the End-to-

End delay is short. The disadvantage of the CADV is that since, each node maintains all the routes to the

nodes in the network and changes the route information periodically, the overhead for maintaining the

routing tables is huge. The overhead of the CADV is unacceptable when the network is large or the

topology changes frequently. The throughput decreases sharply at the same time. So, CADV may perform

well in the small, steady wireless ad -hoc network. By studying the algorithms of CARM, CARA and

CADV it is conclude that overhead of the CARM and CADV are higher than CARA, the delay of CADV is

shorter than the other two.


    4.   CONCLUSION

It is clear from algorithms available for having adaptive solution for congestion in the network as due to

vast pay load on networks, which may be due to flooding of packets or may be due to repeat requests on the

basis of error correction techniques. Congestion metrics still remains a great challenge for the future work.

It is quite important to obtain an optimal approach that combines related parameters collected from physical

layer, MAC layer to measure congestion. Finally we can conclude that congestion is the problem associated



                                                     70
Computer Engineering and Intelligent Systems                                              www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012

with the network and has to be countered by having compromised solution rather than elimination.



REFERENCES

[1] D. B. Johnson, D. A. Maltz, “Dynamic source routing in ad hoc wireless networks,” Mobile Computing,

pp. 153–181, 1996.

[2] Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, Jorjeta Jetcheva. “A Performance

Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols,” The Fourth Annual ACM/IEEE

International Conference on Mobile Computing and Networking, pp. 1-13, 1998

[3]Chen, X., H. M. Jones, A .D .S. Jayalath, “Congestion-Aware Routing Protocol for Mobile Ad Hoc

Networks,” Vehicular Technology Conference 2007, pp. 21-25, 2007

[4] S. Ramanathan, M. E. Steenstrup, “A survey of routing techniques for mobile communications
networks, mobile networks and applications,” Vol. 1, pp. 98–104, 1996.

[5] C. E. Perkins, “Ad hoc on demand distance vector (AODV) routing,” IEFT Internet Draft, November

1998,

[6] H. Raghavendra and D.A. Tran, “Congestion Adaptive Routing in Ad Hoc Networks (Short Version),”

Proc. ACM Int’l Conf. Mobile Computing and Networking (MOBICOM), Oct. 2004.

[7] H. Raghavendra and D.A. Tran, “Congestion Adaptive Routing in Ad Hoc Networks” IEEE

Transactions on Parallel and Distributed Systems, Vol. 17, No. 11, November 2006.

[8] D.A. Tran and H. Raghavendra, “Routing with Congestion Awareness and Adaptivity in Mobile Ad Hoc

Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), Mar. 2005.
[9] Xiaoqin Chen, Haley M. Jones and Jayalath, "Congestion-Aware Routing Protocol for Mobile Ad Hoc

Networks" IEEE 66th conference on Vehicle Technology, pp.21-25, October 2005.

[10] S. J. Lee and M. Gerla, “Dynamic load-aware routing in ad hoc networks,” Proceedings IEEE

International Conference on Communications, pp. 3206–3210, June 2001.




                                                   71
Computer Engineering and Intelligent Systems                                       www.iiste.org
    ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
    Vol 3, No.4, 2012



                              TABLE I
                                 Splitting probability distribution


Congestion                       Bypass status=green       Bypass status=yellow   Bypass status=red

Next primary node is green       P:=p+(1-p)/4              P:=p+(1-p)/3           P:=p+(1-p)/2

Next primary node is yellow      P unchanged               P unchanged            P:=p+(1-p)/4

Next primary node is red         P:=p-(1-p)/2              P:=p-(1-p)/4           Find another bypass




                                        Fig. 1 An example of MDDR problem




                                                        72
Computer Engineering and Intelligent Systems                                               www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012




Fig. 2 Two scenarios with the same overall delay but different MAC and transmission delay due to different

                                     data-rates and congestion levels.




                                                    73
International Journals Call for Paper
The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals
usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should
send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org

Business, Economics, Finance and Management               PAPER SUBMISSION EMAIL
European Journal of Business and Management               EJBM@iiste.org
Research Journal of Finance and Accounting                RJFA@iiste.org
Journal of Economics and Sustainable Development          JESD@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Developing Country Studies                                DCS@iiste.org
Industrial Engineering Letters                            IEL@iiste.org


Physical Sciences, Mathematics and Chemistry              PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Chemistry and Materials Research                          CMR@iiste.org
Mathematical Theory and Modeling                          MTM@iiste.org
Advances in Physics Theories and Applications             APTA@iiste.org
Chemical and Process Engineering Research                 CPER@iiste.org


Engineering, Technology and Systems                       PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems              CEIS@iiste.org
Innovative Systems Design and Engineering                 ISDE@iiste.org
Journal of Energy Technologies and Policy                 JETP@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Control Theory and Informatics                            CTI@iiste.org
Journal of Information Engineering and Applications       JIEA@iiste.org
Industrial Engineering Letters                            IEL@iiste.org
Network and Complex Systems                               NCS@iiste.org


Environment, Civil, Materials Sciences                    PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science                  JEES@iiste.org
Civil and Environmental Research                          CER@iiste.org
Journal of Natural Sciences Research                      JNSR@iiste.org
Civil and Environmental Research                          CER@iiste.org


Life Science, Food and Medical Sciences                   PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare            JBAH@iiste.org
Food Science and Quality Management                       FSQM@iiste.org
Chemistry and Materials Research                          CMR@iiste.org


Education, and other Social Sciences                      PAPER SUBMISSION EMAIL
Journal of Education and Practice                         JEP@iiste.org
Journal of Law, Policy and Globalization                  JLPG@iiste.org                       Global knowledge sharing:
New Media and Mass Communication                          NMMC@iiste.org                       EBSCO, Index Copernicus, Ulrich's
Journal of Energy Technologies and Policy                 JETP@iiste.org                       Periodicals Directory, JournalTOCS, PKP
Historical Research Letter                                HRL@iiste.org                        Open Archives Harvester, Bielefeld
                                                                                               Academic Search Engine, Elektronische
Public Policy and Administration Research                 PPAR@iiste.org                       Zeitschriftenbibliothek EZB, Open J-Gate,
International Affairs and Global Strategy                 IAGS@iiste.org                       OCLC WorldCat, Universe Digtial Library ,
Research on Humanities and Social Sciences                RHSS@iiste.org                       NewJour, Google Scholar.

Developing Country Studies                                DCS@iiste.org                        IISTE is member of CrossRef. All journals
Arts and Design Studies                                   ADS@iiste.org                        have high IC Impact Factor Values (ICV).

More Related Content

What's hot (17)

PDF
B03406010
ijceronline
 
PDF
rupali published paper
Roopali Singh
 
PDF
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
IJCNCJournal
 
PDF
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
inventionjournals
 
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
PDF
Distance’s quantification
csandit
 
PDF
IMPROVED NETWORK CONNECTIVITY IN MANETS
IJCNCJournal
 
PDF
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
ijasuc
 
PDF
O dsr optimized dsr routing
ijwmn
 
PDF
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Narendra Singh Yadav
 
PDF
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Narendra Singh Yadav
 
PDF
A novel approach of hybrid multipath routing protocol for manets using receiv...
eSAT Publishing House
 
PDF
O26087092
IJERA Editor
 
PDF
Gateway Forwarding Schemes For Manet-Internet Connectivity
ijsrd.com
 
PDF
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
 
PDF
Progressive Routing Protocol using Hybrid Analysis for MANETs
idescitation
 
PDF
Ephemeral Performance of Choke
paperpublications3
 
B03406010
ijceronline
 
rupali published paper
Roopali Singh
 
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
IJCNCJournal
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
inventionjournals
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Distance’s quantification
csandit
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IJCNCJournal
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
ijasuc
 
O dsr optimized dsr routing
ijwmn
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Narendra Singh Yadav
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Narendra Singh Yadav
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
eSAT Publishing House
 
O26087092
IJERA Editor
 
Gateway Forwarding Schemes For Manet-Internet Connectivity
ijsrd.com
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
idescitation
 
Ephemeral Performance of Choke
paperpublications3
 

Similar to 11.a study of congestion aware adaptive routing protocols in manet (20)

PDF
C0351725
iosrjournals
 
PDF
CONGESTION AWARE LINK COST ROUTING FOR MANETS
IJCNCJournal
 
PDF
Enhancing Congestion Control using a Load-Balanced Routing Algorithm for Dist...
ijcncjournal019
 
PDF
Enhancing Congestion Control using a Load-Balanced Routing Algorithm for Dist...
IJCNCJournal
 
PDF
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
IOSR Journals
 
PDF
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
mrcopyxerox
 
PPTX
Cluster based routing protocol
Sudhansu Dash
 
PDF
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
 
PDF
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
IOSR Journals
 
PDF
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
partha pratim deb
 
PPT
a qos aware routing protocols for p2p overlay.ppt
karursasi
 
PDF
Dynamic routing of ip traffic
IJCNCJournal
 
PDF
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
IJET - International Journal of Engineering and Techniques
 
PPTX
MobileAdHocRoutingProtocols.pptx
HirazNor
 
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
PDF
Ha3512291233
IJERA Editor
 
PDF
Ad-hoc routing protocols
Rama Raman
 
PDF
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross Layer
AM Publications
 
PDF
Opportunistic Data Forwarding in Manet
IJTET Journal
 
C0351725
iosrjournals
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
IJCNCJournal
 
Enhancing Congestion Control using a Load-Balanced Routing Algorithm for Dist...
ijcncjournal019
 
Enhancing Congestion Control using a Load-Balanced Routing Algorithm for Dist...
IJCNCJournal
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
IOSR Journals
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
mrcopyxerox
 
Cluster based routing protocol
Sudhansu Dash
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
IOSR Journals
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
partha pratim deb
 
a qos aware routing protocols for p2p overlay.ppt
karursasi
 
Dynamic routing of ip traffic
IJCNCJournal
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
IJET - International Journal of Engineering and Techniques
 
MobileAdHocRoutingProtocols.pptx
HirazNor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Ha3512291233
IJERA Editor
 
Ad-hoc routing protocols
Rama Raman
 
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross Layer
AM Publications
 
Opportunistic Data Forwarding in Manet
IJTET Journal
 
Ad

More from Alexander Decker (20)

PDF
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Alexander Decker
 
PDF
A validation of the adverse childhood experiences scale in
Alexander Decker
 
PDF
A usability evaluation framework for b2 c e commerce websites
Alexander Decker
 
PDF
A universal model for managing the marketing executives in nigerian banks
Alexander Decker
 
PDF
A unique common fixed point theorems in generalized d
Alexander Decker
 
PDF
A trends of salmonella and antibiotic resistance
Alexander Decker
 
PDF
A transformational generative approach towards understanding al-istifham
Alexander Decker
 
PDF
A time series analysis of the determinants of savings in namibia
Alexander Decker
 
PDF
A therapy for physical and mental fitness of school children
Alexander Decker
 
PDF
A theory of efficiency for managing the marketing executives in nigerian banks
Alexander Decker
 
PDF
A systematic evaluation of link budget for
Alexander Decker
 
PDF
A synthetic review of contraceptive supplies in punjab
Alexander Decker
 
PDF
A synthesis of taylor’s and fayol’s management approaches for managing market...
Alexander Decker
 
PDF
A survey paper on sequence pattern mining with incremental
Alexander Decker
 
PDF
A survey on live virtual machine migrations and its techniques
Alexander Decker
 
PDF
A survey on data mining and analysis in hadoop and mongo db
Alexander Decker
 
PDF
A survey on challenges to the media cloud
Alexander Decker
 
PDF
A survey of provenance leveraged
Alexander Decker
 
PDF
A survey of private equity investments in kenya
Alexander Decker
 
PDF
A study to measures the financial health of
Alexander Decker
 
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Alexander Decker
 
A validation of the adverse childhood experiences scale in
Alexander Decker
 
A usability evaluation framework for b2 c e commerce websites
Alexander Decker
 
A universal model for managing the marketing executives in nigerian banks
Alexander Decker
 
A unique common fixed point theorems in generalized d
Alexander Decker
 
A trends of salmonella and antibiotic resistance
Alexander Decker
 
A transformational generative approach towards understanding al-istifham
Alexander Decker
 
A time series analysis of the determinants of savings in namibia
Alexander Decker
 
A therapy for physical and mental fitness of school children
Alexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
Alexander Decker
 
A systematic evaluation of link budget for
Alexander Decker
 
A synthetic review of contraceptive supplies in punjab
Alexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
Alexander Decker
 
A survey paper on sequence pattern mining with incremental
Alexander Decker
 
A survey on live virtual machine migrations and its techniques
Alexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
Alexander Decker
 
A survey on challenges to the media cloud
Alexander Decker
 
A survey of provenance leveraged
Alexander Decker
 
A survey of private equity investments in kenya
Alexander Decker
 
A study to measures the financial health of
Alexander Decker
 
Ad

Recently uploaded (20)

PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Complete Network Protection with Real-Time Security
L4RGINDIA
 
PDF
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
PDF
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PPTX
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
July Patch Tuesday
Ivanti
 
Complete Network Protection with Real-Time Security
L4RGINDIA
 
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 

11.a study of congestion aware adaptive routing protocols in manet

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 A Study of Congestion Aware Adaptive Routing Protocols in MANET Shitalkumar Jain, Shrikant Kokate, Pranita Thakur, Shubhangi Takalkar Maharashtra Academy of engineering, Alandi (D) Email: [email protected] Abstract Routing protocols for mobile ad hoc networks (MANETs) have been explored extensively in last few years. Much of this work is targeted at finding a feasible route from a source to a destination without considering current network traffic or application requirements. Routing may let a congestion happen which is detected by congestion control, but dealing with congestion in reactive manner results in longer delay, and unnecessary packet loss and requires significant overhead if a new route is needed. Routing should not be aware of, but also be adaptive to, network congestion. Adaptation to the congestion helps to increase both the effectiveness and efficiency of routing. These problems are solved by the congestion-aware routing protocols in certain degree. These protocols which are adaptive to congestion status of mobile ad-hoc network can greatly improve the network performance. In this paper, we present the survey of congestion adaptive routing protocols for mobile ad-hoc network. Finally, the future direction of congestion-aware routing protocols is described. Keywords: Ad hoc networks, congestion aware routing, Congestion metric, congestion adaptability 1. Introduction Wireless ad-hoc network is usually defined as a set of wireless mobile nodes dynamically self organizing a temporary network without any central administration or existing network infrastructure. The node in the wireless ad-hoc network can serve as routers and hosts. So, they can forward packets for other nodes if they are on route from source to destination. Routing is important problem in wireless ad-hoc network. Traditional working protocols cannot work well in wireless ad-hoc network because of the characteristics of the wireless ad-hoc networks. Since, mobile nodes have limited transmission capacity they mostly intercommunicate by multihop relay. Multihop routing is challenged by limited wireless bandwidth, low device power, dynamically changing network topology, high vulnerability to failure. To answer these challenges, many routing algorithms in MANETs were proposed. There are different dimensions to categorize them: proactive routing Vs reactive routing or single path routing Vs multipath routing. In proactive protocols, route between every two nodes are established in advance even though no transmission is in demand. In reactive protocols, route is discovered when needed transmission and released when transmission no longer takes place. Congestion is one of the most important restrictions of wireless ad-hoc network. It may deteriorate the performance of whole network. In the current design routing is not congestion-adaptive. Routing may let the congestion happen which is detected by congestion control. But dealing with congestion in reactive manner results in longer delay and an unnecessary packet loss and requires significant overhead if the new route is needed. But, now there is another dimension for categorizing for routing protocols: congestion adaptive Vs congestion un-adaptive routing. Our motivation is that congestion is dominant cause for packet loss, long delay, and high overhead in MANETs. These problems become visible in large scale transmission of traffic intensive data such as multimedia data where congestion is more probable and negative impact of packet loss on the service quality is of more significance. In this paper we studied congestion routing protocols like CRP(Congestion Adaptive Routing Protocol)[7],ECARP (Efficient Congestion Adaptive Routing Protocol )[11],CARP(Congestion Aware Routing Protocol),CADV(Congestion Aware Distance Vector)[12],CARA(Congestion Aware Routing plus rate Adaptation)[12],CARM(Congestion Aware Routing Protocol for Mobile Ad-hoc Network)[12]. 64
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 The remaining part of the paper is organized as follows: In section II we provide the studied congestion aware routing protocols. In section III comparison between these algorithms is presented. In section IV we concluded the paper. 2. Algorithm There are many routing algorithms in mobile ad-hoc networks for routing and congestion free networks. Some of them are explained below: 2.1 Congestion Adaptive Routing Protocol (CRP): Congestion Adaptive Routing is a congestion adaptive unicast routing protocol for mobile ad-hoc network.CRP protocol tries to prevent congestion from occurring in the first place. In CRP, every node appearing on a route warns its previous node when prone to be congested. So, CRP uses the additional paths called as “bypass” for bypassing the potential congestion area to the first non congested node on the primary route. It reduces packet delay. But, at the same time CRP tries to minimize bypass to reduce protocol overhead. Hence, the traffic is split over bypass and primary and adaptively to network congestion. Hence, 1) power consumption is efficient.2) Congestion is resolved beforehand and at the same time there is small packet loss rate. CRP is on-demand and consists of the following components. 2.1.1 Congestion Monitoring When no. of packets coming to the node exceeds its carrying capacity, node becomes congested and its starts losing packets. Various metrics are used for node to monitor congestion status. Main parameters are percentage of all packets discarded for lack of buffer space, the average queue length, the no. of the packets timed out and retransmitted, average packet delay. In all these parameters, rising number indicates growing congestion. 2.1.2 Primary Route Discovery Sender discovers the route to the receiver by broadcasting the REQ packet toward receiver. The receiver responds REQ by sending the REP packet on same path that the REQ previously followed. This is called primary route and nodes on this are called primary nodes. To reduce traffic due to the primary route discovery and better deal with Congestion in the network, 2 strategies are adopted 1) REQ is dropped if arriving at a node which is having congestion status as “red” 2) REQ is dropped I arriving at node already having a route to destination . 2.1.3 Bypass Discovery A primary node periodically broadcasts a UDT i.e. update packet. This packet contains the nodes congestion status and set of tuples [destination D, next green node G, distance to green node, n] for each node appearing as a destination in primary table. For this reason is when node P receives an update packet from next primary node Pnext, about the destination D, P will be aware of congestion status of next. This causes the congestion to know about the next green node of P which is n hops away from primary route. But if the next hop is yellow or red, congestion will be there if data packets continue to be forwarded on P Pnext. But, CRP tries to keep congestion from occurring in the first place, P node starts to select bypass route toward G-the next green node of P known from the UDT packet. This bypass search is similar to primary route search, except that 1)the bypass request packet’s TTL is set to 2*m and 2)bypass request is dropped if arriving at node already present on primary route. It can be also possible that no bypass is found. So, in such situation packets are delivered to destination by following primary route. 2.1.4 Traffic Splitting and Congestion Adaptability When the bypass at a node is found, data packets coming to this node are not necessarily spread over 65
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 bypass and primary route. To avoid the bypass from being congested no packet is forwarded on bypass unless any primary node is red i.e. congested. The basic idea behind traffic splitting is that when primary link consists of less congested node, traffic on primary link should be increased, otherwise it should be reduced. Bypass and primary routes cannot include more than 2 common nodes, but different bypass paths can share common node. This increases chance to discover a bypass. But, because of this bypass node may become congested if it has to carry large loads of bypass traffic. But, this can be solved, by splitting probability adjustment for congestion adaptation. The probability adjustment is as shown in TABLE I. 2.1.5 Multipath Minimization To reduce the protocol overhead, CRP tries to minimize using multiple paths. If the probability p to forward data on a primary link approaches 1.0, this means the next primary node is far from congested or the bypass route is highly congested. In this case, the bypass at the current node is removed. Similarly, if the next primary node is very congested (p approaches 0), the primary link is disconnected and the bypass route becomes primary. To make the protocol more lightweight, CRP does not allow a node to have more than one bypass. The protocol overhead due to using bypass is also reduced partly because of short bypass lengths. Each bypass connects to the first non-congested node after the congestion spot, which should be just a few hops downstream. 2.1.6 Failure Recovery CRP is able to quickly resume connectivity after a link breakage by using bypass routes currently available. There are 3 min cases of failure 2.1.6.1 Primary link failure When one of link on primary route fails, the initial node sends a DISC packet towards sender along route. This DISC goes on recording nodes and it stops at node having bypass. This node if finds that its bypass destination is there in DISC, that bypass is not used and DISC is forwarded upstream towards sender till it finds a node with bypass and not having failed node as its destination. If both these cases are not there DISC is sent to the sender and it will find new primary route. 2.1.6.2 Bypass link or node fails In this case bypass node which finds this failure sends a BPS_DISC packet through bypass route to primary node and that bypass is removed. 2.1.6.3 Primary node fails If node on the primary route fails, its previous node sends DISC packet along primary route. If the bypass node detects some failure, it will also send BPS_DISC packet along bypass until reaching a primary node. When primary node received both these packet, it removes bypass and DISC packet is forwarded along primary route. Then this is handled same as first case. If BPS_DISC packet doesn’t arrive at the primary node on time that bypass is used as primary route. But, if it comes late, it is ignored. But, route remains broken but it will recover soon because another DISC packet will be sent back. 2.2. An Efficient Congestion Adaptive Routing Protocol for Mobile Ad Hoc Networks (ECARP): An efficient congestion adaptive routing protocol is better than every other routing protocol during heavy traffic loads. The ECARP, routing protocol ensures high availability of alternative routes and reduce the rate of stale routes. ECARP is having mainly AODV as its base. This can be achieved by increasing the parameters of routing protocols (especially in AODV) that normally take more time for link recovery. These parameters are active_route_time-out, route_reply_wait_time, reverse_route_life, TTL_start, TTL_increment, TTL_threshold and delete_period. ECARP Congestion Control Algorithm This algorithm provides solution to improve routing protocols due to constrained environment. Step 1: Check the occupancy of link layer buffer of node periodically. Let Nc be the congestion status 66
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 estimated. Step 2: Compute Nc =Number of packet buffered in buffer/Buffer Size Step 3: Set the status for congestion. It can be indicated by three statuses “Go”, “careful”, and “Stop”. [ “Go” indicates there is no congestion with Nc ≤ ½ ], “carefull” indicates the status likely to be congested with ½ ≤ Nc ≤ ¾ and “Stop” indicates the status already congested, ¾ ≤ Nc ≤ 1.] Step 4: Invoke congestion control routine when link failed event has occurred in data transfer with using active route or ¾ ≤ Nc ≤ 1. Step 5: Assume that neighboring will have alternate route or non-congested route to the destination. Step 6: Make Query to non-congested neighbors for route to destination Step 7: after obtaining the routes from the neighbors, select route with minimum hops. Step 8: Once route is finalized start sending the data packets through non-congested route. Step 9: If there is no alternative route to destination then start splitting the traffic to the less congested route. Step 10: Traffic splitting effectively reduces the congestion status at the next main node. 2.3. Congestion aware routing plus Rate Adaptation (CARA): The base use of CARA protocol is DSR. The route discovery mechanism of DSR is modified. This protocol mainly aims to find the bypass route for congested zones or nodes. This can be achieved by combining the average MAC utilization and the instantaneous transmission queue length to indicate the congestion level of nodes in the network. When source wants to transmit data to the destination node, it broadcasts RREQ packets. When intermediate code receives RREQ, it checks its congestion level. If the congestion level is higher than it discards the RREQ. When RREQ arrives at the destination node, though destination node is congested or not it handles the RREQ and replies RREP. So, route without congested node is established. CARA uses two metrics to measure congestion information first is average MAC layer utilization. The instantaneous MAC layer utilization is considered as 0 only when the medium around the node is available at the beginning of a transmission and as 1 when the node is not idle. (e.g. detecting physical carrier or detecting or back off due to virtual carrier sensing.) As, the instantaneous MAC layer utilization is either 1 or 0 the average value with in the period indicates the use of wireless medium around the node. Second metric used is instantaneous transmission queue length. If the node has many packets waiting in the queue, it causes long packet latency or even dropping of packets. So we can say that node is congested now. The above mentioned metric can veraciously reflect the congestion conditions around the node. This protocol tries to minimize the congestion in two ways: 1) It forbids the RREQ packets to propagate in the congested area. 2) It guides the route around the congested area or nodes instead of across them. As a result of this no conditional transmission burden generate in these areas. 2.4. Congestion Aware Routing protocol for Mobile ad hoc networks (CARM): A congestion aware routing protocol for mobile ad hoc networks uses a metric incorporating data rates, MAC overhead and buffer delay to control the congestion. The CARM protocol introduces a new parameter called WCD (Weighted Channel Delay) to measure congestion level and adopts a route ELDC(Effective link Data-rate Category) to avoid the MDRR(Mismatched data-rate route) problem. The MDRR problem is shown in following fig.1 The data rate of route shown by dashed (A-B-D-G) is limited by teaming fast link (B-D) with slow link (A- B and D-G). As mentioned earlier, the CARM protocol introduces a new parameter called WCD (weighted channel delay) to measure congestion and it is given as WCD=a ΣτQ + (1+b)TMACALL+Tdata where Q is the number of buffered packets for this link. Tdata=Ldata/ R is the data transmission time, Ldata is the length of data in bytes or bits and R is the data rate of the link. TMACALL is total time spent at the MAC layer. The constants a and b are parameters with values between 0 and 1 which are used to weight TMACALL. By weighting TMACALL can avoid misjudgment of congestion as shown in fig.2 67
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 In CARM, source node broadcasts RREQ packets with ELDC and WCD information when it attempts to transmit data to the destination. Intermediate nodes compare source ID, source sequence, and ELDC of the RREQ packets they receive from neighbors, and drop the RREQ packets whose source ID and source sequence number are the same with that of other RREQ packets received earlier and ELDC is lower than the earlier RREQ packets’. Only the destination node can responds to the RREQ packets by sending RREP packets back to the source along the route from which they came. The route is established when the first RREP arrives at the source. The subsequent RREP packets are cached for the spare routes. The utilization of the congestion metric, WCD, is very special in CARM protocol. Because the priority of route packets is higher than data packets, the route packets can be forwarded without queuing. That is, the congestion level information inherent in queuing delays is lost. The author proposed a RREQ-delay scheme. An RREQ is forwarded with a delay of the WCD that is calculated according to the WCD information in the RREQ at the intermediate nodes. The lower the congestion level of link is, the smaller the delay of RREQ packets are, the earlier the RREQ packets arrive at the destinations. This scheme ensures that the RREQ packets of routes with lower congestion level arrive at the destination first and congested links are eliminated in the routes. This all causes high overhead. So, overhead in case of CARM is very high. 2.5. Congestion-Aware Distance Vector (CADV): The CADV protocol is based on proactive protocol, DSDV. In a distance vector routing protocol, every host maintains a routing table contains a distances from itself to possible destinations. A mobile host in ad -hoc network acts like a single server queuing system. Delay in sending packet is related with congestion. In CADV, each entry is related with delay expected. This helps to measure congestion at the next hop. The expected delay is computed follows: ∑ (1) Where n is the number of sent packets & L is the length of MAC layer packet queue. E [D] estimates the time. A newly arrived packet has to wait before it is send out.In CADV, routing decision is made based on distance to the destination as well as the expected delay at the next hop showed in (1) CADV gives the routes with low expected delay, higher priority. CADV tries to avoid congestion and tries to balance traffic by giving priority to a route having low expected delay. 68
  • 6. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 CADV routing protocol consist of three components: 1) Traffic Monitor: It monitors traffic going out through the link layer. Currently it keeps track of average delay for sending one data packet in receipt period of time. Time period is specified by route maintainance component. 2) Traffic Control: It determines which packet is the next to send or drop. It reschedules packets if needed. It supports a drop tail FIFO queue and provides functionality to queue packets. 3) Route maintainance: It is the main component. It performs the work of exchanging information with neighbors, evaluation and maintaining routes. It manages the traffic monitor and traffic control component. CADV better support for QoS. The real time performance of CADV is good, and end to end delay was short. The over head of CADV is unacceptable when the network is large. Through put also decreases the performance of CADV is may be well in the small & steady wireless ad- hoc network. 2.6. Congestion Aware routing Protocol (CARP) CARP is an on-demand routing protocol. It uses information gathered from MAC layer to discover congestion free routes. CARP uses combined weight matrix in its standard cost function to check for the congestion level. The multiple paths are computed during the route discovery. Calculate node weight matrix NM which assign a cost to each link in the network and select maximum throughput paths. NM = (Lq * Drate)/(OHmac * Davg) 1) Route request: Consider the route S-P1-P2-P3-D To initiate congestion-aware routing discovery, the source node S sends a RREQ. When the intermediate node P1 receives the RREQ packet, it first estimates all the node weight metrics. The node P1 then calculates its node weight NMP1 RREQP1 P2 P2 calculates NMP2 and forward the RREQ packet RREQP2 P3 Finally the RREQ reaches the destination node D with the sum of node weights RREQP3 D 69
  • 7. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 2) Route Reply: The destination node D sends the route reply packet RREP along with total node weight to the immediate upstream node P3 RREQD P3 Now P3 calculates its cost C based on the information from RREP as CP3= (NMp1+NMp2+NMp3)-(NMp1+NMp2) By proceeding in the same way, all the intermediate hosts calculate its cost .On receiving the RREP from all the routes, the source selects the route with minimum cost value. 3. COMPARISONS Congestion is a dominant reason for packet drops in ad hoc networks.CRP sends packets on both bypass paths and primary routes simultaneously. So, incoming traffic is distributed on primary and bypass route depending on current congestion status of network. Congestion is subsequently better resolved .In ECARP some parameters of AODV such as TTL_start, TTL_increment are increased. So, it ensures the high availability of alternative routes and reduces the rate of broken rut removal process. CADV is not congestion adaptive. It offers no remedy when the existing route becomes heavily congested. So, CADV improves AODV in delivery ratio only. The real time performance of the CADV is good and the End-to- End delay is short. The disadvantage of the CADV is that since, each node maintains all the routes to the nodes in the network and changes the route information periodically, the overhead for maintaining the routing tables is huge. The overhead of the CADV is unacceptable when the network is large or the topology changes frequently. The throughput decreases sharply at the same time. So, CADV may perform well in the small, steady wireless ad -hoc network. By studying the algorithms of CARM, CARA and CADV it is conclude that overhead of the CARM and CADV are higher than CARA, the delay of CADV is shorter than the other two. 4. CONCLUSION It is clear from algorithms available for having adaptive solution for congestion in the network as due to vast pay load on networks, which may be due to flooding of packets or may be due to repeat requests on the basis of error correction techniques. Congestion metrics still remains a great challenge for the future work. It is quite important to obtain an optimal approach that combines related parameters collected from physical layer, MAC layer to measure congestion. Finally we can conclude that congestion is the problem associated 70
  • 8. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 with the network and has to be countered by having compromised solution rather than elimination. REFERENCES [1] D. B. Johnson, D. A. Maltz, “Dynamic source routing in ad hoc wireless networks,” Mobile Computing, pp. 153–181, 1996. [2] Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, Jorjeta Jetcheva. “A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols,” The Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 1-13, 1998 [3]Chen, X., H. M. Jones, A .D .S. Jayalath, “Congestion-Aware Routing Protocol for Mobile Ad Hoc Networks,” Vehicular Technology Conference 2007, pp. 21-25, 2007 [4] S. Ramanathan, M. E. Steenstrup, “A survey of routing techniques for mobile communications networks, mobile networks and applications,” Vol. 1, pp. 98–104, 1996. [5] C. E. Perkins, “Ad hoc on demand distance vector (AODV) routing,” IEFT Internet Draft, November 1998, [6] H. Raghavendra and D.A. Tran, “Congestion Adaptive Routing in Ad Hoc Networks (Short Version),” Proc. ACM Int’l Conf. Mobile Computing and Networking (MOBICOM), Oct. 2004. [7] H. Raghavendra and D.A. Tran, “Congestion Adaptive Routing in Ad Hoc Networks” IEEE Transactions on Parallel and Distributed Systems, Vol. 17, No. 11, November 2006. [8] D.A. Tran and H. Raghavendra, “Routing with Congestion Awareness and Adaptivity in Mobile Ad Hoc Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), Mar. 2005. [9] Xiaoqin Chen, Haley M. Jones and Jayalath, "Congestion-Aware Routing Protocol for Mobile Ad Hoc Networks" IEEE 66th conference on Vehicle Technology, pp.21-25, October 2005. [10] S. J. Lee and M. Gerla, “Dynamic load-aware routing in ad hoc networks,” Proceedings IEEE International Conference on Communications, pp. 3206–3210, June 2001. 71
  • 9. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 TABLE I Splitting probability distribution Congestion Bypass status=green Bypass status=yellow Bypass status=red Next primary node is green P:=p+(1-p)/4 P:=p+(1-p)/3 P:=p+(1-p)/2 Next primary node is yellow P unchanged P unchanged P:=p+(1-p)/4 Next primary node is red P:=p-(1-p)/2 P:=p-(1-p)/4 Find another bypass Fig. 1 An example of MDDR problem 72
  • 10. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 Fig. 2 Two scenarios with the same overall delay but different MAC and transmission delay due to different data-rates and congestion levels. 73
  • 11. International Journals Call for Paper The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org Business, Economics, Finance and Management PAPER SUBMISSION EMAIL European Journal of Business and Management [email protected] Research Journal of Finance and Accounting [email protected] Journal of Economics and Sustainable Development [email protected] Information and Knowledge Management [email protected] Developing Country Studies [email protected] Industrial Engineering Letters [email protected] Physical Sciences, Mathematics and Chemistry PAPER SUBMISSION EMAIL Journal of Natural Sciences Research [email protected] Chemistry and Materials Research [email protected] Mathematical Theory and Modeling [email protected] Advances in Physics Theories and Applications [email protected] Chemical and Process Engineering Research [email protected] Engineering, Technology and Systems PAPER SUBMISSION EMAIL Computer Engineering and Intelligent Systems [email protected] Innovative Systems Design and Engineering [email protected] Journal of Energy Technologies and Policy [email protected] Information and Knowledge Management [email protected] Control Theory and Informatics [email protected] Journal of Information Engineering and Applications [email protected] Industrial Engineering Letters [email protected] Network and Complex Systems [email protected] Environment, Civil, Materials Sciences PAPER SUBMISSION EMAIL Journal of Environment and Earth Science [email protected] Civil and Environmental Research [email protected] Journal of Natural Sciences Research [email protected] Civil and Environmental Research [email protected] Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL Journal of Natural Sciences Research [email protected] Journal of Biology, Agriculture and Healthcare [email protected] Food Science and Quality Management [email protected] Chemistry and Materials Research [email protected] Education, and other Social Sciences PAPER SUBMISSION EMAIL Journal of Education and Practice [email protected] Journal of Law, Policy and Globalization [email protected] Global knowledge sharing: New Media and Mass Communication [email protected] EBSCO, Index Copernicus, Ulrich's Journal of Energy Technologies and Policy [email protected] Periodicals Directory, JournalTOCS, PKP Historical Research Letter [email protected] Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Public Policy and Administration Research [email protected] Zeitschriftenbibliothek EZB, Open J-Gate, International Affairs and Global Strategy [email protected] OCLC WorldCat, Universe Digtial Library , Research on Humanities and Social Sciences [email protected] NewJour, Google Scholar. Developing Country Studies [email protected] IISTE is member of CrossRef. All journals Arts and Design Studies [email protected] have high IC Impact Factor Values (ICV).