M-TORA: A TORA-based multi-path routing algorithm for mobile ad hoc networks

Qiang Liu*, Hua Wang, Jingming Kuang, Zheng Wang, Zhiming Bi

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

In this paper we present M-TORA, a new multi-path routing protocol based on Temporally-Ordered Routing Algorithm (TORA) for mobile ad hoc networks (MANETs). Although TORA is a highly adaptive distributed routing algorithm, it can not make the most use of multiple paths which are already built and maintained in the process of route creation. We designed M-TORA for unleashing the potential power of multiple paths and optimizing performance of classical TORA. According to the modification of Internet MANET Encapsulation Protocol (IMEP), a node can spread its MAC layer information to its neighbors. The MAC information and the route hop count will be used in the calculation of route selection probability when a node has multiple paths to the destination. By using the probability routing algorithm, M-TORA can spread the network overload to multiple routing paths, which will lead to automatic load balancing. In simulation based on OPNET we show that M-TORA can outperform classical TORA in decreasing packet end-to-end delay, improving network packet delivery ratio and achieving fair node's local energy consumption.

Original languageEnglish
Title of host publicationIEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference
DOIs
Publication statusPublished - 2006
EventIEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference - San Francisco, CA, United States
Duration: 27 Nov 20061 Dec 2006

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Conference

ConferenceIEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference
Country/TerritoryUnited States
CitySan Francisco, CA
Period27/11/061/12/06

Fingerprint

Dive into the research topics of 'M-TORA: A TORA-based multi-path routing algorithm for mobile ad hoc networks'. Together they form a unique fingerprint.

Cite this