Next Article in Journal
Analysis, Design, and Experimental Validation of a Primary Side Current-Sensing Flyback Converter for Use in a Battery Management System
Previous Article in Journal
Power Efficient Fully Differential Bulk Driven OTA for Portable Biomedical Application
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Effective Multipath Routing Technique Providing High Availability in Wireless Networks

1
Department of Information and Communications Engineering, Myongji University, 116 Myongji-ro, Yongin, Gyeonggi 17058, Korea
2
Department of Electronic Engineering, Myongji University, 116 Myongji-ro, Yongin, Gyeonggi 17058, Korea
*
Author to whom correspondence should be addressed.
Electronics 2018, 7(4), 42; https://doi.org/10.3390/electronics7040042
Submission received: 25 January 2018 / Revised: 19 March 2018 / Accepted: 20 March 2018 / Published: 22 March 2018
(This article belongs to the Special Issue Mobile Sensor Networks)

Abstract

:
Wireless networks, such as mobile ad hoc networks (MANETs) or wireless sensor networks (WSNs), usually suffer link failures and topology changes, due to the mobility of wireless nodes, the insufficient power of wireless nodes, the unstable state of wireless links, and unpredictable environmental interference. If any link or node failure occurs, a lack of fault-tolerant mechanisms may lead to the interruption of active communication between the source and destination nodes. Multipath routing protocols have been proposed to solve the problem. In this paper, we propose a novel multipath routing approach called node-disjoint multipath routing (NDMR) for discovering and establishing two node-disjoint paths between a source and a destination in a wireless network. The proposed approach uses the request-reply mechanism to find the node-disjoint paths. However, it discards duplicates of request messages instead of re-broadcasting them as occurs in several existing approaches. Additionally, NDMR uses a two-way handshake or three-way handshake process for discovering the node-disjoint paths. If the destination can find two node-disjoint paths in the first route discovery, it uses the two-way handshake process. Otherwise, it applies the three-way handshake process. By decreasing the number of steps in the route discovery process, NDMR reduces the route discovery time achieved by existing techniques. These advantages make NDMR very useful for applications that demand high availability and fault tolerance in MANETs and WSNs. The performance of NDMR has been analyzed, evaluated, and compared with that of several existing approaches. Various simulations were conducted to validate the analyzed results. The analyzed and simulated results show that NDMR significantly reduces the control overhead as well as the time required, by existing approaches, for route discovery.

1. Introduction

A wireless network is a collection of wireless nodes that communicate with each other using wireless links. A node can communicate only with other nodes in its wireless transmission range. A mobile ad hoc network (MANET) is a wireless network typically characterized by node mobility and topology change. In a MANET, nodes exchange data among themselves without reliance on any additional infrastructure, such as a base station or a wired backbone network, and the network topology may dynamically and unpredictably change since the nodes are free to move [1]. A wireless sensor network (WSN) consists of many nodes, each of which is connected to one (or several) sensors. These sensors monitor and sense changes in environmental or physical conditions and then transmit this data to a main location, called a sink node. WSNs can be considered a special type of ad hoc wireless network with reduced or no mobility [1,2]. Nodes in MANETs and WSNs are constrained by their limited power, computational capabilities, storage, bandwidth, and mobility. A node usually requires multiple hops to exchange data with any other node. Thus, routing is a crucial issue to the design of MANETs and WSNs.
There are two main types of routing in MANETs and WSNs: single path routing and multiple path routing. Single path routing is simple and scalable but does not efficiently satisfy the requirements of high availability, fault tolerance, and load balancing. Ad hoc on-demand distance vector (AODV) [3] is one of the most popular on-demand single path routing protocols. AODV uses a request-reply mechanism associated with hop-by-hop routing to discover and establish a path between a source and a destination in a wireless network. AODV does not support multipath routing. Link failures and topology changes, however, often happen in MANETs and WSNs due to the mobility of wireless nodes, the insufficient power of wireless nodes, the unstable state of wireless links, and unpredictable environmental interference. If any link or node failure occurs, a lack of fault-tolerant mechanisms may lead to the interruption of active communication between the source and destination nodes. Multipath routing is an alternative routing technique that selects multiple paths to deliver data from the source to the destination. If a link or node fails, only one path is disconnected, and data transmission is still available through redundant paths, resulting in no interruption of the data communication between the source and destination nodes. A typical multipath routing protocol consists of three phases: path discovery, traffic distribution, and path maintenance. Path discovery is the process of discovering and establishing multiple routes between a source and a destination in a wireless network. The multiple routes can be node-disjoint, link-disjoint, or non-disjoint. Node-disjoint routes are completely disjoint, with no common nodes and links. Link-disjoint routes have no links in common but may share some common intermediate nodes. Non-disjoint routes can have nodes and links in common. Node-disjoint routes are usually preferred because they are the most fault-tolerant [4]. After establishing multiple paths between the source and destination nodes, the source can begin sending data to the destination along the paths. There are various strategies for distributing traffic over available paths. A multipath protocol may forward traffic using only the path with the best metric and keep other discovered paths as backups; it may also use the paths concurrently [4]. Depending on the traffic distribution used, multipath routing can provide different capabilities for MANETs and WSNs, such as fault tolerance and load balancing. Path maintenance is the process of re-establishing paths after the initial path discovery process. The path maintenance process provides a mechanism for detecting a path failure and recovering from it. Multipath routing provides many benefits for MANETs and WSNs, including fault tolerance, load balancing, bandwidth aggregation, and reduced delay [4]. Therefore, multipath routing plays an important role in MANETs and WSNs. Several multipath routing protocols have been proposed to provide fault tolerance and load balancing for MANETs and WSNs [5,6,7,8,9,10,11,12,13,14,15,16,17,18].
Some of the multipath routing protocols have been proposed based on the AODV protocol, including on-demand multipath distance vector (AOMDV) [8], ad hoc on-demand distance vector multipath (AODVM) [9], and multipath AODV (MP-AODV) [10]. AOMDV discovers and establishes multiple link-disjoint paths, while AODVM and MP-AODV can set up multiple node-disjoint paths between a source and a destination in a wireless network. However, these multipath routing variants of AODV generate too many duplicates of the control messages in wireless networks. In addition, some of the multipath routing variants use a four-way route discovery process to discover and establish paths, which results in a long route discovery period. To solve the mentioned problems, this paper proposes a novel multipath routing variant of AODV, called node-disjoint multipath routing (NDMR). NDMR is an on-demand node-disjoint multipath routing technique that uses the request-reply mechanism to discover and establish two node-disjoint paths between a source and destination in a wireless network, such as a MANET or a WSN, whenever the source needs to communicate with a destination for which the source has no routing information in its route table. NDMR establishes the two node-disjoint paths by using a two-way or three-way handshake process. Once the two paths are established, the source sends two identical copies of each data frame to the destination through the paths, one frame on each path. By discarding duplicates of control messages and decreasing the number of steps in the route discovery process, NDMR significantly reduces the control overhead as well as the time needed to discover and establish routes compared with existing node-disjoint route discovery approaches, such as AODVM and MP-AODV. Additionally, with its traffic distribution strategy, NDMR can provide seamless communications with fault tolerance for MANETs and WSNs.
The rest of this paper is organized as follows: Section 2 contains reports on several related studies. In Section 3, we describe NDMR. In Section 4, the performance of NDMR is analyzed, evaluated, and compared to that of existing approaches. Section 5 contains descriptions of various simulations and their results to evaluate and validate the performance analysis of NDMR. Finally, we provide our conclusions in Section 6.

2. Related Works

AODV is one of the most popular on-demand routing protocols in wireless networks. AODV uses the request-reply mechanism plus hop-by-hop routing to discover and establish a path between a source and destination in a wireless network. When a source needs to communicate with a destination for which it has no routing information in its route table, it initiates a route discovery process by sending a route request (RREQ) message and waiting for a route reply (RREP) message. When an intermediate node receives an RREQ, the node first sets up a reverse path to the source using the previous hop of the RREQ as the next hop on the reverse path. If the intermediate node has a valid route to the destination, it sends an RREP back to the source. Otherwise, the node re-broadcasts the RREQ. When the destination receives an RREQ, it generates an RREP. The RREP is sent back to the source via the reverse path. When the source receives the RREP, the forward path is established. AODV is designed for single path routing and does not support multipath routing. Several approaches have been proposed to provide multipath routing for wireless networks [8,9,10,11,12,13,14,15,16,17,18]. Out of the proposed multipath routing approaches, AOMDV, AODVM, and MP-AODV are multipath routing variants of AODV. AOMDV is a link-disjoint multipath routing approach that discovers link-disjoint paths whereas AODVM and MP-AODV can set up multiple node-disjoint paths in wireless networks.

2.1. AOMDV

AOMDV [8] computes and establishes multiple link-disjoint paths between a source and a destination in a wireless network. AOMDV consists of two main activities: computing multiple loop-free paths and finding link-disjoint paths. Unlike AODV, which discards duplicates of RREQ messages at intermediate nodes, AOMDV allows an intermediate node to accept and process duplicates of the RREQs if the duplicates arrive via a trajectory that does not already include the intermediate node. This mechanism establishes multiple loop-free paths at every node.
Each RREQ carries an additional field called firsthop to indicate the first hop taken by it. Each node also maintains a firsthop-list for each RREQ to keep track of the list of neighbors of the source through which the node has received a copy of the RREQ. When an intermediate node receives a duplicate of an RREQ, it does not immediately discard the duplicate. Instead, the intermediate node checks the RREQ copy to see if it provides a new node-disjoint path to the source by comparing the firsthop field in the RREQ copy and the firsthop-list in the node for the RREQ. If it provides a new path, AOMDV invokes the route update rule to check if a reverse path can be set up. If a reverse path is set up and a valid route to the destination is available, the intermediate node sends an RREP back to the source. RREPs are sent for each received RREQ. The multiple routes are made by RREPs that follow the reverse routes previously set up in intermediate nodes. At the destination, reverse routes are set up just as in the case of intermediate nodes.
Since there are many copies of RREQ and RREP messages sent in the network, AOMDV has high control overhead for discovering and establishing multiple paths.

2.2. AODVM

AODVM [9] is another modification of AODV that discovers multiple node-disjoint paths between a source and a destination in a wireless network. As with AOMDV, intermediate nodes under AODVM receive duplicates of RREQs, record the information contained in these copies in the RREQ table, and re-transmit the received RREQ copies instead of discarding them. Information stored in the RREQ table includes the source that generated the RREQ, the intended destination of the RREQ, the neighbor who transmitted the RREQ, and some additional information. However, unlike the original AODV and AOMDV, intermediate nodes do not send an RREP back to the source even if they have routes to the destination. Instead, the destination sends an RREP to the source for each received RREQ copy though the path traversed by the RREQ copy.
When the destination receives the first RREQ copy from one of its neighbors, it updates its sequence number, generates an RREP, and sends the RREP back to the source. When the destination receives duplicates of the RREQ from other neighbors, it updates the sequence number and sends RREPs for each of them. The RREP contains a last_hop_ID field to indicate the neighbor from which the corresponding RREQ was received. When an intermediate node receives an RREP from one of its neighbors, it removes the corresponding entry to this neighbor from its RREQ table and adds a new entry into its routing table to indicate the discovered route to the destination. The intermediate node then identifies the neighbor in the RREQ table via which the path to the source is the shortest and forwards the RREP to that neighbor. Then the entry corresponding to this neighbor is deleted from the RREQ table. To ensure that an intermediate node does not participate in multiple paths, whenever a node overhears one of its neighbors broadcasting RREP, it removes that neighbor from its RREQ table. If an intermediate node cannot forward the RREP (either because there is no route to the source or because its RREQ table is empty), the node sends a route discovery error (RDER) message back to the neighbor that forwarded the RREP to this node. When the neighbor receives an RDER, it searches its RREQ table for the next shortest path to the source and attempts to forward the RREP to the source through the path. To confirm how many paths were discovered and established, the source sends a route confirmation (RRCM) message to the destination for each received RREP. The RRCM also contains information about the hop count of the route and the first and last hops.
Figure 1a shows the process of route discovery of AODVM. The route discovery is a three-way handshake process. Since many control messages, including RREQs, RREPs, RDERs, and RRCMs, are used to discover and establish routes, and because duplicates of RREQs are not discarded at intermediate nodes, AODVM generates too many duplicates of the control messages in wireless networks, resulting in high control overhead for discovering and establishing routes in the networks.

2.3. MP-AODV

MP-AODV [10] is a modification of AODV that discovers and establishes two node-disjoint routes, two link-disjoint routes, or two hybrid routes between a source and a destination in a wireless network. MP-AODV divides the route discovery process into two phases: the main route discovery and the backup route discovery. MP-AODV first discovers and establishes the main route and then performs the second route discovery. MP-AODV maintains only one alternate path. The paths established between the source and destination are either node-disjoint or link-disjoint. MP-AODV first attempts to establish two node-disjoint routes. If it does not find two such routes, it then discovers and sets up two link-disjoint routes to improve the reliability of data transmission. MP-AODV uses an additional one-bit flag to distinguish between control messages in the main routes (RREQ, RREP) and the backup route (RREQ_2, RREP_2).
To establish the main route, the source broadcasts an RREQ. Upon receiving the RREQ, intermediate nodes store information about the RREQ’s identification (RREQ ID) and the source node in a seen table. When the destination receives the RREQ, it sends an RREP back to the source along the reverse path. When an intermediate node that belongs to the main route receives the RREP, it increases the RREQ ID value in the seen table and then forwards the RREP to the source. When the source receives the RREP, the main route is established, and the source starts data transmission and initiates the route discovery process for the backup route by broadcasting an RREQ_2. When an intermediate node receives the RREQ_2, it compares the ID of the RREQ_2 with that stored in the seen table. If it is identical, the node discards the RREQ_2. Otherwise, the node re-broadcasts the RREQ_2. At intermediate nodes belonging to the main route, the ID of the RREQ_2 and the stored ID are the same because MP-AODV has already increased the stored ID during the main route discovery process. Therefore, these intermediate nodes discard the RREQ_2. When the RREQ_2 reaches the destination, the backup route is discovered, and the destination sends an RREP_2 back to the source. When the source receives the RREP_2, the backup route is established. Unlike in the main route discovery process, intermediate nodes in the backup route discovery process do not increase the RREQ ID value stored in the seen table when they receive the RREP_2. Therefore, intermediate nodes along the main route have a higher RREQ ID value than nodes in the backup route.
If a node-disjoint route does not exist, MP-AODV will find a link-disjoint route. The process of link-disjoint route discovery is similar to that of node-disjoint route discovery
Figure 1b shows the process used by MP-AODV to discover and establish node-disjoint routes. The route discovery is a four-way handshake process. MP-AODV has high control overhead for discovering and establishing node-disjoint routes. Additionally, MP-AODV requires a long period to establish node-disjoint routes due to the four-way handshake route discovery process.
Out of the existing multipath routing techniques, AOMDV is a link-disjoint multipath routing technique, whereas AODVM and MP-AODV node-disjoint multipath routing techniques. These techniques generate too many duplicates of control messages due to the use of many control messages and the distribution of the control messages. In addition, the node-disjoint multipath routing techniques, including AODVM and MP-AODV, use three-way and four-way route discovery process, respectively that take a long route discovery time. The motivation of this research is to propose a novel multipath routing variant of AODV that reduces the duplicates of control messages as well as decreases the route discovery time.
The main contributions of the proposed NDMR approach are as follows:
  • NDMR discovers and establishes two node-joint paths instead of many paths between a source and a destination in a wireless network to provide redundancy communications, resulting in reducing the number of network traffic frames sent between the source and the destination in the network compared with the existing multipath routing techniques.
  • NDMR reduces duplicates of the control messages used for discovering and establishing paths between the source and destination nodes in wireless networks compared with the existing multipath routing techniques.
  • NDMR uses a two-way or three-way handshake route discovery process instead of four-way process, resulting in decreasing the route discovery period compared with the existing multipath routing techniques.

3. The NDMR Approach

NDMR is an on-demand multipath routing technique that can provide fault-tolerant capability for wireless networks, such as MANETs and WSNs. NDMR provides multipath routing in a wireless network by establishing two node-disjoint paths between a source node and a destination in the network.

3.1. Control Messages

NDMR uses control messages to discover and establish two node-disjoint paths between source and destination nodes in a wireless network. Figure 2 shows the structure of the control messages.
NDMR uses PREQ and PREP messages for path discovery and path failure (PFLR) messages for path maintenance.
  • Path request message: A PREQ message is broadcast by the source node when it initiates a new path discovery process. The PREQ contains the following data field:
    +
    Node_list: the list of nodes through which the PREQ has been passed.
  • Path reply message: A PREP message is used to report a path discovered. The PREP contains the following data field:
    +
    Discovered_path: the path discovered between the source and destination.
  • Secondary path request message: A secondary path request (SPREQ) message is used to discover the second path. The SPREQ contains the following data fields:
    +
    Node_list: the list of nodes through which the SPREQ has been passed.
    +
    First path: the first path discovered and established between the source and destination.
The sequence number associated with the source address is used to uniquely identify each control message and detect duplicates of the message. To prevent control messages from being duplicated and circulated in wireless networks, intermediate nodes discard duplicates of the control messages.

3.2. NDMR Operations

The proposed NDMR approach includes the following steps:
  • Path discovery
  • Frame forwarding
  • Path maintenance
When a source node needs to communicate with a destination node for which it has no routing information in its route table, NDMR initiates the path discovery process by sending control messages to find two node-disjoint paths between the source and destination nodes. Upon receiving the control messages, intermediate nodes along the discovered paths build and maintain their route table. The source then forwards frames to the destination through the two established paths. During the communication, the path maintenance process is used to check and maintain the two active paths between the source and destination nodes.

3.2.1. Path Discovery

The path discovery process of NDMR is shown in Figure 3. The path discovery can be either a two-way handshake or three-way handshake process depending on the paths received and found at the destination.
The path discovery process is initiated whenever the source needs to communicate with a destination for which the source has no routing information in its route table. To discover and establish two node-disjoint paths to the destination, the source broadcasts a PREQ. When an intermediate node receives a PREQ for the first time, the node adds a potential reverse route to its buffer. The potential route contains the following information: destination, source, next hop, and route_timeout. The intermediate node then adds itself to the node_list field of the received PREQ and rebroadcast the message. Since the PREQ was broadcast in the wireless network by the source, a node in the network may receive multiple copies of the PREQ from its various neighbors. The maximum number of PREQ copies received at a node is equal to the number of neighbors that the node has. When an intermediate node receives a duplicate of the PREQ, the node discards the duplicate and does not rebroadcast it.
The destination node performs the selection of two node-disjoint paths, including the first and second paths. When the destination receives the first copy of the PREQ, it chooses the first path based on the node_list of the received PREQ. The selection of the second path depends on receiving the next copies of the PREQ. At the destination, NDMR uses two parameters during the selection of the second path, including Path_selection_timer and Maximum_received_PREQ. The Path_selection_timer is a period in which copies of the PREQ received at the destination node are valid and processed. The Maximum_received_PREQ value is equal to the number of neighbors that the destination has. After receiving the first copy of the PREQ, the destination starts the Path_selection_timer and begins receiving duplicates of the PREQ. When the destination receives a duplicate of the PREQ, it forms a path candidate based on the node_list of the received duplicate and checks if the path candidate and the first path are node-disjoint paths. The following two cases can occur:
1. Case 1: The two-way handshake process
The destination has found a path candidate that is node-disjoint with the first path. In this case, the candidate is chosen as the second path, and the second path selection is ended. The destination then unicasts two PREPs to the source; one contains the first path, and the other contains the second path. When an intermediate node receives a PREP, it checks if the PREP’s sequence number for the originating node (i.e., the destination node in this case) is greater than that recorded by the intermediate node. If not, it means that the received PREP is a duplicate, and the intermediate node discards the PREP. If so, the intermediate node looks at the discovered_path field of the PREP. The intermediate node discards the PREP if the discovered_path does not contain the node. Otherwise, it means that the intermediate node is along the communication path between the source and destination, and the node then adds the corresponding forward and reverse routes into its route table. The intermediate node then forwards the PREP towards the source. Eventually, the two PREPs arrive at the source. The source sets up two node-disjoint paths to the destination based on the discovered_path field of the received PREPs.
The path discovery in this case is a two-way handshake process as shown in Figure 4a.
2. Case 2: The three-way handshake process
In this case, the second path has not been selected yet, and either the Path_selection_timer expired or the number of PREQ copies received at the destination reached the Maximum_received_PREQ value. The destination informs the first discovered path by sending a PREP to the source and initiates the second path discovery by broadcasting an SPREQ. Both these messages contain the first path. The propagation process of the PREP is similar to that described in Case 1. When the PREQ arrives at the source, the source sets up the first path to the destination based on the discovered_path field of the received PREP. Like a PREQ, an SPREQ is broadcast in the wireless network. An SPREQ, however, is delivered from the destination to the source and contains the first path. Intermediate nodes along the first path discard the SPREQ and do not re-transmit the message. Other intermediate nodes re-broadcast the SPREQ. Like PREQ, duplicates of the SPREQ are discarded at the intermediate nodes. Eventually, copies of the SPREQ arrive at the source node. The source selects the second path based on the node_list field of the first received copy of the SPREQ. The source then sends a PREP containing the second path to the destination. Upon receiving the PREP, intermediate nodes along the second path add corresponding route entries for the forward and reverse paths into their route table. Finally, the destination receives the PREP and then adds the second path to its route table.
The path discovery in this case is a three-way handshake process as shown in Figure 4b.
Intermediate nodes belonging to the discovered paths build their route table based on receiving PREQ/SPREQ and PREP messages. For each discovered path between the source and destination, two route entries are created, namely a forward route for the forward path and a reverse route for the reverse path. The forward route is built based on information contained in the received PREP whereas the reverse route is determined based on the received PREQ. Each entry of the route table contains the following information: source node, destination node, next hop, route_age_time. The route_age_time of an entry determines the lifetime of the entry in the route table. Each time a route entry is used to transmit data frames, its route_age_time is reset. If the route_age_time of a route entry is timeout, the entry is removed from the route table.
When an intermediate node receives a PREQ or SPREQ, the node adds a potential reverse route into its buffer. The potential reverse route contains several fields aforementioned in Section 3.2.1, including source node, destination node, next hop, and route_timeout.
Later, if the intermediate node receives a PREP of which the node sees itself in the discovered_path field, the node immediately adds two route entries into its route table as follows:
  • Reverse route is determined based on the potential reverse route stored in its buffer.
  • Forward route is built based on the received PREP.
Otherwise, if the intermediate node has not received any PREP for the pair of the source and destination nodes and route_timeout of a potential reverse route expired, the node removes the potential route from its buffer.

3.2.2. Frame Forwarding

To send a data frame to the destination, the source transmits the frame containing the address of the source and destination. Neighbors of the source located in its transmission range can hear the frame. Only two of the neighbors that belong to the two node-disjoint paths have a route entry that matches the frame and they re-transmit it. When an intermediate node receives the data frame, it makes a forwarding decision by looking up its route table. Each entry of the route table contains information about the source, the destination, and the next hop. If the intermediate node has a route entry that matches the source and destination nodes of the received frame, the intermediate node will transmit the data frame to the next hop of the route entry. Otherwise, it discards the frame. Eventually, two identical copies of the data frame arrive at the destination through the two node-disjoint paths. The destination receives the first copy, sends it to upper layers and then discards the duplicate.
By using the traffic distribution strategy, NDMR can provide fault tolerance capability for MANETs and WSNs.

3.2.3. Path Maintenance

After discovering and establishing two node-disjoint paths between the source and destination nodes, the path maintenance process is used to check and maintain the active paths of the active communication.
1.
Case 1: During the active communication between the source and destination nodes, the movement of intermediate nodes that do not lie along an active path does not affect the communication.
2.
Case 2: If the source node moves during the active communication, it will decide whether to initiate a new path discovery process or not to establish one or two node-disjoint paths to the destination.
(a)
If the source can communicate with both its neighbors, which belong to the first and second paths, respectively, the movement of the source does not affect the active communication.
(b)
If the source becomes unreachable with a neighbor lying along an active path, the source will remove the path from its route table and set the remaining path to the first path. An SPREQ is then broadcast by the source to establish the second path to the destination.
(c)
If the source cannot communicate with its neighbors that belong to the first and second paths, the source will re-initiate a new path discovery to establish two new node-disjoint paths to the destination.
3.
Case 3: If any node along an active path fails or becomes unreachable, the node upstream of the break will send a PFLR message to the source. Upon the message, the source removes the corresponding path from its route table and then initiates the secondary path discovery by broadcasting an SPREQ to establish the new alternate path.

4. Performance Analysis

AODVM attempts to find as many node-disjoint routes as possible in a wireless network. AODVM, however, uses too many control messages to discover and establish the node-disjoint paths. Additionally, duplicates of RREQs are not discarded at intermediate nodes. Instead, the intermediate nodes process the duplicates, store related information in the RREQ table, and re-transmit the duplicates. The drawback generates excessive duplicates of control messages in the wireless network, resulting in high control overhead for route discovery.
Both MP-AODV and NDMR discover and establish two node-disjoint routes in a wireless network. Intermediate nodes under both approaches discard duplicates of request messages (RREQ/PREQ); therefore, these approaches significantly reduce control overhead for discovering routes when compared with the AODVM approach.
In this section, the performance of MP-AODV and NDMR is analyzed, evaluated, and compared. For the performance analysis, the sample network shown in Figure 5 is used, and the following two cases are considered:
  • Case 1: Source node 0 communicates with destination node 22.
  • Case 2: Source node 0 communicates with destination node 24.

4.1. Hop Counts

Assume that messages are propagated between any two adjacent nodes in the wireless network with the same speed and delay. The shortest path between a source and a destination is the path with the least number of hop counts.

4.1.1. Under MP-AODV

MP-AODV has two processes of route discovery: the main route discovery and the backup route discovery. The main route discovery process establishes the first path, and the backup route discovery process sets up the second path.
Let p 1 M P - A O D V and p 2 M P - A O D V be the first and second paths, respectively.
Clearly, p 1 M P - A O D V is the shortest path between the source and the destination, and p 2 M P - A O D V is the shortest path without intermediate nodes belonging to p 1 M P - A O D V .
Let n 1 M P - A O D V and n 2 M P - A O D V be the hop counts of p 1 M P - A O D V and p 2 M P - A O D V , respectively.
n 1 M P - A O D V n 2 M P - A O D V .
For the sample network in Figure 5, the discovered paths and their hop counts are as follows:
  • Case 1:
    p 1 M P - A O D V = { 0 ,   1 ,   8 ,   15 ,   22 }   and   n 1 M P - A O D V = 4
    p 2 M P - A O D V = { 0 ,   7 ,   14 ,   21 ,   22 }   and   n 2 M P - A O D V = 4
  • Case 2:
    p 1 M P - A O D V = { 0 ,   6 ,   12 ,   18 ,   24 }   and   n 1 M P - A O D V = 4
    p 2 M P - A O D V = { 0 ,   7 ,   13 ,   19 ,   24 }   and   n 2 M P - A O D V = 4

4.1.2. Under NDMR

The route discovery under NDMR is either a two-way handshake process or a three-way handshake process depending on the paths discovered in the primary route discovery.
Let p 1 N D M R and p 2 N D M R be the first and second paths, respectively. The shortest path between the source and the destination is p 1 N D M R , and p 2 N D M R is the shortest path without intermediate nodes along p 1 N D M R .
Let n 1 N D M R and n 2 N D M R be the hop counts of p 1 N D M R and p 2 N D M R , respectively.
n 1 N D M R n 2 N D M R .
For the sample network in Figure 5, the discovered paths and their hop counts are as follows:
  • Case 1:
    p 1 N D M R = { 0 ,   1 ,   8 ,   15 ,   22 }   and   n 1 N D M R = 4
    p 2 N D M R = { 0 ,   7 ,   14 ,   21 ,   22 }   and   n 2 N D M R = 4
  • Case 2:
    p 1 N D M R = { 0 ,   6 ,   12 ,   18 ,   24 }   and   n 1 N D M R = 4
    p 2 N D M R = { 0 ,   7 ,   13 ,   19 ,   24 }   and   n 2 N D M R = 4
It is clear that node-disjoint paths discovered and established under both MP-AODV and NDMR are have similar hop counts.

4.2. Control Overhead

To analyze and evaluate performance of control overhead for discovering and establishing node-disjoint paths, the number of control messages transmitted and re-transmitted in the network is used as a metric for the performance analysis.
Unlike AODVM, which uses many types of control messages during the route discovery process, MP-AODV and NDMR use two: request messages (RREQ/PREQ) and reply messages (RREP/PREP). Additionally, intermediate nodes under MP-AODV and NDMR discard duplicates of RREQs/PREQs instead of re-transmitting them as under the AODVM.

4.2.1. Under MP-AODV

During the main route discovery, the RREQ is transmitted by the source and re-transmitted by all the other nodes when they receive the RREQ for the first time, except the destination.
The number of RREQ copies transmitted and re-transmitted during the main route discovery, denoted by n u m R R E Q 1 M P - A O D V , is calculated as follows:
n u m R R E Q 1 M P - A O D V = N 1 ,
where N is the number of nodes in the network.
The number of RREP copies transmitted and re-transmitted during the main route discovery, denoted by n u m R R E P 1 M P - A O D V , is determined as follows:
n u m R R E P 1 M P - A O D V = n 1 M P - A O D V ,
where n 1 M P - A O D V is the hop count of the first path.
During the backup route discovery, the RREQ_2 is transmitted by the source and re-transmitted by intermediate nodes, except for the destination and intermediate nodes belonging to the first path.
The number of RREQ_2 copies transmitted and re-transmitted during the backup route discovery, denoted by n u m R R E Q 2 M P - A O D V , is calculated thusly:
n u m R R E Q 2 M P - A O D V = N - n 1 M P - A O D V .
The number of RREP_2 copies transmitted and re-transmitted during the backup route discovery, denoted by n u m R R E P 2 M P - A O D V , is determined as follows:
n u m R R E P 2 M P - A O D V = n 2 M P - A O D V ,
where n 2 M P - A O D V is the hop count of the second path.
The total numbers of request and reply messages transmitted and re-transmitted for discovering two node-disjoint paths, denoted by n u m R R E Q M P - A O D V and n u m R R E P M P - A O D V , respectively, are as follows:
n u m R R E Q M P - A O D V = 2 N n 1 M P - A O D V 1 ,
n u m R R E P M P - A O D V = n 1 M P - A O D V + n 2 M P - A O D V .
For the sample network in Figure 5, the number of RREQs and RREPs are as follows.
  • Case 1: Source node 0 communicates with destination node 22:
    n u m R R E Q M P - A O D V = 55
    n u m R R E P M P - A O D V = 8
  • Case 2: Source node 0 communicates with destination node 24:
    n u m R R E Q M P - A O D V = 55
    n u m R R E P M P - A O D V = 8

4.2.2. Under NDMR

Under NDMR, the number of request and reply messages transmitted and re-transmitted in the network depends on whether a two-way handshake or three-way handshake discovery process is used.

Two-Way Handshake Process

In the two-way handshake route discovery process, the source transmits only one PREQ, and other nodes, except the destination, re-transmit the PREQ when they receive it for the first time. Upon receiving copies of the PREQ, the destination selects two node-disjoint paths and then sends two PREPs back to the source. Like MP-AODV, NDMR discards duplicates of the PREQ received at intermediate nodes.
The total numbers of PREQ and PREP copies, denoted by n u m P R E Q N D M R and n u m P R E P N D M R , respectively, are determined as follows:
n u m P R E Q N D M R = N 1 ,
n u m P R E P N D M R = n 1 N D M R + n 2 N D M R ,
where n 1 N D M R and n 2 N D M R are the hop counts of the first and second paths, respectively.

Three-Way Handshake Process

In the three-way handshake discovery process, the source first transmits a PREQ. Upon receiving this PREQ, the destination sends a PREP back to the source and transmits an SPREQ. Intermediate nodes belonging to the first path discard the SPREQ. When the source receives the first copy of the SPREQ, it sends back a PREP to the destination.
The total numbers of request and reply messages transmitted and re-transmitted in the three-way handshake route discovery process are calculated as follows:
n u m P R E Q N D M R = 2 N n 1 M P - A O D V 1 ,
n u m P R E P N D M R = n 1 N D M R + n 2 N D M R .
For the sample network in Figure 5, the number of RREQs and RREPs are as follows.
  • Case 1: The route discovery in this case is the two-way handshake process:
    n u m R R E Q M P - A O D V = 29
    n u m R R E P M P - A O D V = 8
  • Case 2: The route discovery in this case is the three-way handshake process:
    n u m R R E Q M P - A O D V = 55
    n u m R R E P M P - A O D V = 8
It can be seen from the results that the control overhead of the three-way handshake process-based NDMR (NDMR-3HS) is similar to that of MP-AODV, whereas the two-way handshake process-based NDMR (NDMR-2HS) significantly reduces the control overhead when compared with MP-AODV.

4.3. Route Discovery Time

Route discovery time is a period starting when the source node begins the route discovery process and ending when two node-disjoint paths are discovered and established.
When a frame is transmitted from a source to a destination in a network, the latency of delivering the frame is calculated as follows [19]:
τ l a t e n c y = τ p r o p + τ q + τ t x + τ p r o c .
where τ l a t e n c y is the latency, τ p r o p is propagation time, and τ q , τ t x , τ p r o c are queueing time, transmission time, and processing delay, respectively at nodes in the path between the source and the destination.
Assume that the queueing time, transmission time, and processing delay at nodes in the network are the same. Let t n o d e be the processing time at a node, including queueing time, transmission time, and processing delay, and let t p r o p . be the propagation time between two adjacent nodes in the network.
Therefore, the latency of delivering a frame through a path from the source to the destination can be determined as follows:
τ l a t e n c y = n h o p × t p r o p . + ( n h o p + 1 ) × t n o d e ,
where n h o p is the hop counts of the path between the source and the destination.

4.3.1. Under MP-AODV

MP-AODV uses a four-way handshake process to discover and establish node-disjoint paths. MP-AODV first discovers and establishes the main route by sending the first RREQ and RREP, and then performs the second route discovery the second RREQ and RREP, as shown in Figure 1b.
The latency of delivering the first RREQ from the source to the destination, denoted by t R R E Q 1 M P - A O D V , can be calculated this way:
t R R E Q 1 M P - A O D V = n 1 M P - A O D V × t p r o p . + ( n 1 M P - A O D V + 1 ) × t n o d e ,
where n 1 M P - A O D V is the hop count of the first path.
The latency of delivering the first RREP from the destination back to the source, denoted by t R R E P 1 M P - A O D V , can be determined thusly:
t R R E P 1 M P - A O D V = n 1 M P - A O D V × t p r o p . + ( n 1 M P - A O D V + 1 ) × t n o d e .
Similarly, the latency of delivering the second RREQ and RREP, denoted by t R R E Q 2 M P - A O D V and t R R E P 2 M P - A O D V , respectively, are as follows:
t R R E Q 2 M P - A O D V = n 2 M P - A O D V × t p r o p . + ( n 2 M P - A O D V + 1 ) × t n o d e ,
t R R E P 2 M P - A O D V = n 2 M P - A O D V × t p r o p . + ( n 2 M P - A O D V + 1 ) × t n o d e ,
where n 2 M P - A O D V is the hop count of the second path.
The total time used for route discovery under MP-AODV, denoted by t M P - A O D V , can be determined as follows:
t M P - A O D V = t R R E Q 1 M P - A O D V + t R R E P 1 M P - A O D V + t R R E Q 2 M P - A O D V + t R R E P 2 M P - A O D V .
Therefore:
t M P - A O D V = 2 ( n 1 M P - A O D V + n 2 M P - A O D V ) ( t p r o p . + t n o d e ) + 4 t n o d e .

4.3.2. Under NDMR

Two-Way Handshake Process

The two-way handshake process of discovering two node-disjoint paths under NDMR is shown in Figure 4a.
The latency of delivering the PREQ from the source to the destination at which the second path has been found, denoted by t P R E Q N D M R - 2 H S , can be calculated as follows:
t P R E Q N D M R - 2 H S = n 2 N D M R × t p r o p . + ( n 2 N D M R + 1 ) × t n o d e .
The latency of delivering two PREPs from the destination back to the source, denoted by t P R E P 1 N D M R - 2 H S and t P R E P 2 N D M R - 2 H S , can be determined thusly:
t P R E P 1 N D M R - 2 H S = n 1 N D M R × t p r o p . + ( n 1 N D M R + 1 ) × t n o d e ,
t P R E P 2 N D M R - 2 H S = n 2 N D M R × t p r o p . + ( n 2 N D M R + 1 ) × t n o d e ,
where n 1 N D M R and n 2 N D M R are the hop counts of the first and second paths, respectively.
Since n 1 N D M R n 2 N D M R , therefore t P R E P 1 N D M R - 2 H S t P R E P 2 N D M R - 2 H S .
The total time used for route discovery under NDMR, denoted by t N D M R - 2 H S , is as follows:
t N D M R - 2 H S = t P R E Q N D M R - 2 H S + m a x ( t P R E P 1 N D M R - 2 H S , t P R E P 2 N D M R - 2 H S ) .
Therefore:
t N D M R - 2 H S = 2 n 2 N D M R ( t p r o p . + t n o d e ) + 2 t n o d e .

Three-Way Handshake Process

The three-way handshake process of discovering two node-disjoint paths under NDMR is shown in Figure 4b.
The latency of delivering the first PREQ from the source to the destination, denoted by t P R E Q 1 N D M R - 3 H S , can be calculated as follows:
t P R E Q 1 N D M R - 3 H S = n 1 N D M R × t p r o p . + ( n 1 N D M R + 1 ) × t n o d e .
The latency of delivering the second PREQ from the destination to the source, denoted by t P R E Q 2 N D M R - 3 H S , can be calculated thusly:
t P R E Q 2 N D M R - 3 H S = n 2 N D M R × t p r o p . + ( n 2 N D M R + 1 ) × t n o d e .
The latency of delivering the second PREP from the source back to the destination, denoted by t P R E P 2 N D M R - 3 H S , can be determined as follows:
t P R E P 2 N D M R - 3 H S = n 2 N D M R × t p r o p . + ( n 2 N D M R + 1 ) × t n o d e .
The route discovery time can be determined as follows:
t N D M R - 3 H S = ( n 1 N D M R + 2 n 2 N D M R ) ( t p r o p . + t n o d e ) + 3 t n o d e .
From Equations (20), (25) and (29), it is clear that the route discovery time of NDMR is smaller than that of MP-AODV.

5. Simulations and Discussion

5.1. Simulations

To validate the analytical results derived in Section 4, several simulations have been conducted using the network simulation tool OMNeT++ v4.6 [20].

5.1.1. Simulation Description

We consider an ad hoc wireless network with nodes uniformly distributed in the network area of 1000   m × 600   m . Nodes move at random speeds and in random directions in the network area.
In these simulations, control messages were sent to discover and establish node-disjoint paths between a source and a destination in simulation networks. The number of nodes in simulation networks increased from 20 to 100 nodes.
Performance metrics, including control overhead and route discovery time, were recorded under the MP-AODV and NDMR approaches to evaluate and compare the performance of these approaches. For the evaluation of overhead performance, in addition to the number of control messages that were transmitted and re-transmitted in the network, the number of control messages received at all nodes in the network was also recorded to evaluate and compare. Among the control messages, only request messages (RREQ/PREQ) are broadcast and re-broadcast in the network. Therefore, most of the control overhead for discovering routes is made from duplicates of the request messages. The number of the received RREQs is that of the total copies of the RREQs that are received at nodes in the network regardless of discarded copies or forwarded copies.
Additionally, to facilitate the evaluation and comparison of the route discovery time, we assumed that the processing time at each node ( t n o d e ) is 10   μ s and that the propagation time between two adjacent nodes ( t p r o p . ) is 5   μ s .

5.1.2. Simulation Results

Figure 6a,b show comparisons of the number of request messages (RREQ/PREQ) and all control messages (request messages, reply messages, and others), respectively, that were transmitted and re-transmitted in the simulation networks. The simulation results show that MP-AODV and NDMR-3HS generated the same number of transmitted request messages. NDMR-3HS reduced the transmitted request messages by 68% compared with AODVM, while NDMR-2HS reduced the transmitted request messages by 48% compared with NDMR-3HS and 83% compared with AODVM, as shown in Figure 6a. As a result, NDMR-2HS reduced the transmitted control messages by 44% compared with NDMR-3HS and MP-AODV, and by 84% compared with AODVM, as shown in Figure 6b.
Figure 7a,b show comparisons of the number of request messages and all control messages received at nodes in the simulation networks, respectively. The simulation results show that MP-AODV and NDMR-3HS had the same number of received request messages. NDMR-3HS reduced the received request messages by 70% compared with AODVM, while NDMR-2HS reduced the received request messages by 48% compared with NDMR-3HS and 84% compared with AODVM, as shown in Figure 7a. As a result, NDMR-2HS reduced the received control messages by 42% compared with NDMR-3HS and MP-AODV, and by 85% compared with AODVM, as shown in Figure 7b.
It is clear that AODVM generates too many duplicates of request messages in the networks because nodes re-transmit the duplicates instead of discarding them as under the MP-AODV and NDMR approaches.
Figure 8 compares the route discovery time between the MP-AODV and NDMR approaches in simulation networks with various numbers of nodes. It can be seen from the line chart that the route discovery time of NDMR is smaller than that of MP-AODV. Specially, NDMR-2HS has the best route discovery time. Numerically, for the simulation networks, NDMR-3HS reduced the route discovery time by about 25%, and NDMR-2HS reduced the route discovery time by about 50% compared with MP-AODV, as shown in Figure 8.

5.2. Discussion

Unlike AODVM, which re-broadcasts duplicates of request messages (RREQs), MP-AODV and NDMR discard the duplicates. Therefore, MP-AODV and NDMR significantly reduce the number of copies of request messages re-transmitted and received at nodes in the network when compared with the AODVM approach, resulting in the significant decrease of control overhead for discovering routes in the network. The line chart in Figure 6a illustrates that too many copies of RREQs were re-transmitted at nodes under AODVM. MP-AODV and NDMR-3HS had the same number of transmitted request messages whereas NDMR-2HS generated the smallest number of the request message copies. Numerically, for the simulation networks, MP-AODV and NDMR-3HS reduced the transmitted request messages by 68% compared with AODVM; meanwhile, NDMR-2HS reduced the transmitted request messages by 48% compared with MP-AODV and 83% compared with AODVM. As a result, MP-AODV and NDMR-3HS reduced the transmitted control messages by 72% compared with AODVM whereas NDMR-2HS reduced the transmitted control messages by 44% compared with MP-AODV and 84% compared with AODVM, as shown in Figure 6b.
The more control messages were transmitted, the more the control messages were received. Line graphs in Figure 7a,b provide information on request messages and all control messages that were received at nodes in the simulation networks. Since AODVM re-transmitted too many request messages, there were a huge number of request messages received at nodes in the network. MP-AODV and NDMR-3HS had the same number of control messages received in the networks. NDMR-2HS had the fewest received control messages. Numerically, for the simulation networks, MP-AODV and NDMR-3HS reduced the received request messages and the received control messages by 70% and 74%, respectively, compared with AODVM; meanwhile, NDMR-2HS reduced the received request messages and the received control messages by 48% and 42%, respectively, compared with MP-AODV and 84% and 85%, respectively, compared with AODVM.
Both MP-AODV and NDMR discover and establish two node-disjoint paths between a source and a destination. These approaches find similar node-disjoint paths. The MP-AODV route discovery, however, is a four-way handshake process whereas the route discovery of NDMR is a two-way or three-way handshake process. Therefore, NDMR reduces the route discovery time compared with MP-AODV. In other words, NDMR establish the node-disjoint paths much faster than MP-AODV. Numerically, for the simulation networks, NDMR-3HS reduced the route discovery time by about 25%, and NDMR-2HS reduced the route discovery time by about 50% compared with MP-AODV, as shown in Figure 8.

6. Conclusions

In this paper, we have proposed a novel on-demand node-disjoint multipath routing approach called NDMR. The proposed approach finds two node-disjoint paths between a source and a destination in a wireless network using the request-reply mechanism. By using a two-way or three-way handshake route discovery process and discarding duplicates of request messages at nodes in the network, NDMR significantly reduces the control overhead as well as decreasing the time needed for discovering routes when compared with existing node-disjoint route discovery approaches, such as AODVM and MP-AODV. Numerically, for simulation networks used in this paper, NDMR-2HS reduced the received control messages by 42% compared with MP-AODV and NDMR-3HS and by 85% compared with AODVM. Additionally, NDMR and MP-AODV can discover and establish similar node-disjoint paths, but NDMR-2HS reduced the route discovery time by 50% and NDMR-3HS reduced it by 25% when compared with MP-AODV. These features make NDMR suitable for applications that require fault tolerance in MANETs and WSNs.
Our future work is to develop and implement the proposed approach in hardware devices to evaluate and compare its performance in the real environment of wireless networks.

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (grant number: 2017R1A2B4003964), and Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (grant number: 2016R1D1A1B03933315).

Author Contributions

Authors Nguyen Xuan Tien, Jong Myung Rhee, and Sang Yoon Park conceived and developed the ideas behind the research. Nguyen Xuan Tien carried out the performance analysis and simulations and wrote the paper under supervision of Jong Myung Rhee. Jong Myung Rhee and Sang Yoon Park supervised the research and finalized the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Carlo, M.C.; Dharma, P.A. Ad Hoc and Sensor Networks—Theory and Applications, 2nd ed.; World Scientific Publishing Co. Pte. Ltd.: Singapore, 2011. [Google Scholar]
  2. Callaway, E.H. Wireless Sensor Networks—Architectures and Protocols; Auerbach Publications: Boca Raton, FL, USA, 2004. [Google Scholar]
  3. Perkins, C.; Belding-Royer, E.; Das, S. Ad hoc On-Demand Distance Vector (AODV) Routing. In Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, USA, 25–26 February 1999. [Google Scholar]
  4. Tsai, J.; Moors, T. A Review of Multipath Routing Protocols: From Wireless Ad Hoc to Mesh Networks. In Proceedings of the ACoRN Early Career Researcher Workshop on Wireless Multihop Networking, Sydney, Australia, 17–18 July 2006. [Google Scholar]
  5. Tarique, M.; Tepe, K.E.; Adibi, S.; Erfani, S. Survey of multipath routing protocols for mobile ad hoc networks. J. Netw. Comput. Appl. 2009, 32, 1125–1143. [Google Scholar] [CrossRef]
  6. Sha, K.; Gehlot, J.; Greve, R. Multipath Routing Techniques in Wireless Sensor Networks: A Survey. Wirel. Pers. Commun. 2013, 70, 807–829. [Google Scholar] [CrossRef]
  7. Radi, M.; Dezfouli, B.; Bakar, K.A.; Lee, M. Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges. Sensors 2012, 12, 650–658. [Google Scholar] [CrossRef] [PubMed]
  8. Marina, M.K.; Das, S.R. On-demand Multipath Distance Vector Routing in Ad Hoc Networks. In Proceedings of the International Conference for Network Protocol, Los Angeles, CA, USA, 11–14 November 2001. [Google Scholar] [CrossRef]
  9. Ye, Z.; Krishnamurthy, S.V.; Tripathi, S.K. A Framework for Reliable Routing in Mobile Ad Hoc Networks. In Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications (INFORCOM 2003), Los Angeles, CA, USA, 30 March–3 April 2003. [Google Scholar] [CrossRef]
  10. Lee, Y.S.; Chung, S.H. MP-AODV: A New Multipath Routing Protocol Based on AODV in Mobile Ad Hoc Networks. J. Korea Soc. Comput. Inf. 2011, 16, 131–142. [Google Scholar] [CrossRef]
  11. Taha, A.; Alsaqour, R.; Uddin, M.; Abdelhaq, M.; Saba, T. Energy Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function. IEEE Access 2017, 5, 10369–10381. [Google Scholar] [CrossRef]
  12. Igartua, M.A.; Frías, V.C. Self-configured multipath routing using path lifetime for video-streaming services over Ad Hoc networks. Comput. Commun. 2010, 33, 1879–1891. [Google Scholar] [CrossRef] [Green Version]
  13. Kanellopoulos, D. QoS routing for multimedia communication over wireless mobile ad hoc networks: A survey. Int. J. Multimed. Data Eng. Manag. 2017, 8, 42–71. [Google Scholar] [CrossRef]
  14. Tien, N.X.; Kim, S.; Rhee, J.M.; Park, S.Y. A Novel Dual Separate Paths (DSP) Algorithm Providing Fault-Tolerant Communication for Wireless Sensor Networks. Sensors 2017, 17, 1699. [Google Scholar] [CrossRef] [PubMed]
  15. Agrawal, J.; Singhal, A.; Yadav, R.N. Multipath Routing in Mobile Ad-hoc Network using Meta-heuristic Approach. In Proceedings of the 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India, 13–16 September 2017. [Google Scholar]
  16. Bennis, I.; Fouchal, H.; Piamrat, K.; Zytoune, O.; Aboutajdine, D. A Realistic Multipath Routing for Ad Hoc Networks. In Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 25 February 2016. [Google Scholar]
  17. Xiao, Y.; Zhao, X.; Wang, H.; Hsu, C.H. Energy-aware multipath routing for data aggregation in wireless sensor networks. In Proceedings of the 2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS), Hsinchu, Taiwan, 16–19 December 2014. [Google Scholar]
  18. Jemili, I.; Tekaya, G.; Belghith, A. A Fast Multipath Routing Protocol for wireless sensor networks. In Proceedings of the 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA), Doha, Qatar, 10–13 November 2014. [Google Scholar]
  19. Forouzan, B.A. Data Communications and Networking, 4th ed.; McGraw-Hill: Singapore, 2007. [Google Scholar]
  20. OMNeT++ Discrete Event Simulator Version 4.6. Available online: http://www.omnetpp.org/ (accessed on 15 April 2017).
Figure 1. The route discovery process.
Figure 1. The route discovery process.
Electronics 07 00042 g001
Figure 2. The structure of NDMR control messages.
Figure 2. The structure of NDMR control messages.
Electronics 07 00042 g002
Figure 3. The process of path discovery under NDMR.
Figure 3. The process of path discovery under NDMR.
Electronics 07 00042 g003
Figure 4. The path discovery of NDMR.
Figure 4. The path discovery of NDMR.
Electronics 07 00042 g004
Figure 5. A sample wireless network with 30 wireless nodes.
Figure 5. A sample wireless network with 30 wireless nodes.
Electronics 07 00042 g005
Figure 6. A comparison of transmitted control messages.
Figure 6. A comparison of transmitted control messages.
Electronics 07 00042 g006
Figure 7. A comparison of received control messages.
Figure 7. A comparison of received control messages.
Electronics 07 00042 g007
Figure 8. A comparison of route discovery time under the MP-AODV and NDMR approaches.
Figure 8. A comparison of route discovery time under the MP-AODV and NDMR approaches.
Electronics 07 00042 g008

Share and Cite

MDPI and ACS Style

Tien, N.X.; Rhee, J.M.; Park, S.Y. A Novel Effective Multipath Routing Technique Providing High Availability in Wireless Networks. Electronics 2018, 7, 42. https://doi.org/10.3390/electronics7040042

AMA Style

Tien NX, Rhee JM, Park SY. A Novel Effective Multipath Routing Technique Providing High Availability in Wireless Networks. Electronics. 2018; 7(4):42. https://doi.org/10.3390/electronics7040042

Chicago/Turabian Style

Tien, Nguyen Xuan, Jong Myung Rhee, and Sang Yoon Park. 2018. "A Novel Effective Multipath Routing Technique Providing High Availability in Wireless Networks" Electronics 7, no. 4: 42. https://doi.org/10.3390/electronics7040042

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop