1 Introduction

A mobile ad hoc network (MANET) is a self-starting dynamic network, comprising of mobile nodes, where all the participating nodes are voluntarily transmitting the packets from one place to another place and assumed to be dynamic with more or less relative speed in an arbitrary direction [14]. Hence, it is highly difficult to ensure the long-term guaranteed path from one node to the other node. Typically, the MANET is employed for emergency scenarios like military operations, monitoring animal habitats, and disaster relief operation where there is a need for communication network immediately following some major event or some temporary requirement like a conference or seminar at a new place where no earlier network infrastructure exist and an alternative solution is needed [57].

The emergence of real-time applications and the widespread utilization of wireless and mobile devices have generated the need to provide quality of service (QoS) support in wireless and mobile networking environments. It is very important to determine the QoS of the network which is primarily depending upon the network. In MANET, there are several parameters which influence enhancing the QoS of the network such as throughput, end-to-end delay, packet delivery ratio, and jitter [8, 9]. The aforementioned parameters are improved by altering the algorithm, protocol, and mechanisms.

Typically, QoS refers to the ability of a network to provide improved service to selected network traffic over various underlying technologies [8]. QoS routing requires finding not only a route from a source to a destination but also a route that satisfies the end-to-end QoS requirement. QoS is more difficult to guarantee in ad hoc networks than in most other types of networks, because the wireless bandwidth is shared among adjacent nodes and the network topology changes owing to the movement of nodes. Hence, in order to provide QoS in MANET, the extensive collaboration between nodes is essential to establish the route and to secure the resources [10, 11]. Primarily, QoS can be achieved by two ways: (a) over-provisioning and (b) traffic engineering. Over-provisioning employs the best-effort approach and simply increases the available resources. Alternatively, traffic engineering tries to exploit resources efficiently and to make the network QoS aware which includes additional service classes, admission control, and resource reservations [12].

QoS provisioning improves the end-to-end performance in heavily loaded networks through QoS aware routing, admission control, resource reservation, traffic analysis, and scheduling [12]. The goal of QoS provisioning is to achieve more deterministic network behaviors, where in turn, the information carried by the network can be delivered accurately and network resources can be utilized properly. However, there still remains a significant challenge to provide QoS solutions and maintain end-to-end QoS with user mobility. QoS provisioning will lead to an increase in computational and communicational cost. The QoS provisioning approaches can be classified into two categories: hard QoS and soft QoS approaches. If QoS requirements of a connection are guaranteed to be met for the whole duration of the session, the QoS approach is termed as hard QoS approach. In MANETs, it is very challenging to provide hard QoS guarantees to user applications. In soft QoS, the Qos requirements are not guaranteed for the entire session [12]. There are several challenges that are reported while providing Qos in MANETs such as hidden terminal problem, lack of central coordination, insecure medium, limited resource availability, dynamically varying network topology, error-prone shared radio channel, and imprecise state of information. In MANETs, one of the most crucial components of a system for QoS provisioning is to estimate the state of the network resources and thereby decide which application data can be processed. To estimate the available bandwidth in a heavily loaded wireless network is a non-trivial task due to the aforementioned factors of wireless networks [13].

In the literature, there are several non-linear programming methods such as genetic algorithm, fuzzy logic, and neural network which are employed to find the feasible routes in order to improve the QoS. The QoS of MANETs is enhanced using computational intelligent techniques [14], fuzzy multi-objective routing [15], flooding limited and multiconstrained multicast routing using genetic algorithm [16], multicast protocol (codepipe) [17, 18], optimize congestion and dilation [19], physarum optimization for long stating computational problems (Steiner tree problem) with low complexity and high parallelism [20], biology-based algorithm [21], interference-based topology control algorithm [22], spatial reusability aware routing [23], etc.

In MANET, there is no reliable mechanism to provide QoS; therefore, research in this field has received much attention from the last decade. Though there is no QoS mechanism for IEEE 802.11-based MANETs, it can provide some QoS level through service differentiation, due to the IEEE 802.11e amendment. However, no solution has been standardized for estimation of bandwidth which becomes necessary for guaranteed QoS. The estimation of available resources still represents one of the main issues for QoS enhancement. Hence, the bandwidth estimation must be accurate enough to assure the admission of right connections.

In this paper, a priority aware dynamic source routing (DSR) is proposed to enhance the QoS by estimating the available bandwidth in IEEE 802.11-based MANET. Five connections are considered, and their priority is assigned according to its data rates. The QoS parameters throughput, packet delivery ratio, and end-to-end delay are estimated with respect to the simulation time and total number of nodes in the network with and without mobility.

This paper is organized as follows: The reported bandwidth estimation techniques to enhance the QoS are presented in Section 2. The proposed priority aware DSR protocol is given in Section 3. The simulation results of priority aware DSR (PA-DSR) such as the effect of throughput, packet delivery ratio, and end-to-end delay with respect to the simulation time and nodes are discussed in Section 4. Finally, Section 5 concludes the paper.

2 DSR protocol

DSR protocol is a routing protocol for MANET where no infrastructure is required. The multihop nature in DSR enables nodes to forward packets to neighboring nodes when the nodes are within the transmission range. The originator (sender) of the data initiates route discovery whenever the location of the destined receiver is not known. The route discovery packet, i.e., route request (RREQ), is flooded. Upon reaching every node, each node can read the packet information such as sender address, destination address, and request ID determined by the originator. Further, each node appends its identity when forwarding RREQ to the next nodes. Once the information has reached the target node, it sends a route replay message to the originator. Further, the entire route recorded in the RREQ packet is copied to route reply (RREP) and forwarded back to the originator. The originator upon receiving this information caches the route for subsequent routing. The intermediate nodes discard any packet when the packet contains the same ID that it has seen before or it finds its address in the recorded route; otherwise, it appends its address to route record in the RREQ packet [24, 25].

Whenever the topology has changed or a link to the respondent broken, the originator of the packet can sense it and route maintenance indicates that the source route is broken. Now, the originator of the packet can choose any other route to reach its respondent or it can initiate a new route discovery. The route maintenance is used when the originator send packets to its recipient. The on-demand nature of route request and route maintenance requires no periodic routing advertisement or link sensing mechanism. Due to the lack of periodic advertisement, there are no overhead packets caused by DSR. A response to single route discovery enables the node to learn and cache multiple routes to any destination. This mechanism enables any node to react quickly whenever link failure occurs [24, 25].

3 Methodology

3.1 Related work

In MANET, estimation of available bandwidth is a primary component for QoS. The available bandwidth refers to the amount of bandwidth available to the node to send packets to the network. The available bandwidth is employed for analyzing the network performance and optimizing end-to-end transport performance which is used to improve the QoS of multimedia services and video streaming over a network as such applications require large bandwidth [13]. Typically, the bandwidth estimation is classified into four different categories: (a) active probing techniques, (b) passive techniques, (c) techniques only for wireless networks, and (d) other bandwidth estimation techniques [13].

In the literature, there have been several passive techniques reported to estimate the available bandwidth which in turn improve the QoS. The bandwidth estimation using passive technique is the calculation-based technique where the available bandwidth is estimated using the measured channel usage without any impact on the existing flows. De Renesse et al. proposed to calculate the available bandwidth using the ratio between the numbers of transmitted and received packets. The available bandwidth is enhanced as it is calculated by minimizing the unnecessary signaling and stop** the sessions that cannot meet the QoS requirement. Hence, the message overhead is decreased while increasing the data rate [26]. The condense aware admission control protocol provides an efficient, scalable admission control protocol for the MANET to ensure the end-to-end connections with QoS requirements. The abovementioned mechanism offers a better QoS guarantee by limiting the number of flows (connections) in the network [27]. However, a node must have enough bandwidth to admit a flow successfully.

The adaptive admission control is estimated end-to-end with the available bandwidth based on cross-layer QoS routing. It also considered the intraflow contention problem [28]. It assumes that channel idle period between the sender and the receiver is totally overlapped. The assumption overestimates the available bandwidth. Zhao et al. proposed the mechanism to calculate the available bandwidth in the particular link to support QoS in IEEE 802.11-based networks. They have considered synchronization between transmitter and receiver in order to identify the bandwidth in a decided link [

  • Threshold setting

    • ○ The maximum achievable throughput with constant end-to-end delay over the simulation period using DSR under no interference and no motion (one communication, i.e., one source and one destination) is around 85,000 bytes per second. The maximum data rate of 85,000 bytes are optimized through simulation in order to reduce the delay. Since the entire payload packets are in the size of 1000 bytes, the threshold value is converted into a round off value of 85 packets per second. This acts as a rate cutting mechanism according to its data rate.

  • Priority assignment

    • ○ All communications follow certain norms in mentioning their priority, i.e., no communication are greedy to tell that its priority is always high. Every communication tells a distinct priority number from 1 to 5. The priority is assigned based on the data rates. The high data rate connection is designated as higher priority and vice versa.

  • Transmission rate

    • ○ There are two additional information added to every packet

      • ▪ Priority

      • ▪ Estimated transmission rate

    • ○ The transmission rate for every communication is presented in transmission rate field and every data packet. Its values are said in terms of packets per second, typically, 1, 20, 20, 30, and 40 packets per second for communication (flow) 5, 4, 2, 3, and 1, respectively.

  • If the cumulative sum of the transmission rate is greater than or equal to the threshold limit (85 packets per second), then the low priority packet (flow id 5, flow id 4, and so on) is not be able to make the connection, else the packets are transferred from source to destination without any delay. During the data transfer high throughput, high packet delivery ratio can be achieved.

    The priority is assigned based on the data rate, i.e., the highest data rate is considered as the highest priority where a packet contains 1000 bytes. In the proposed PA-DSR, the highest priority is assigned for communication 3 (C3) as it has a high data rate and the low priority is designated for connection 5 (C5). The flow ids, assigned priority with its simulation time, and the assigned data rate for each flow are reported in Table 1.

    Table 1 Connections, flow id, assigned priority, data rate, and simulation time of PA-DSR

    4 Simulation results and discussion

    The QoS performance of DSR and PA-DSR routing protocol is analyzed with simulations which are implemented with NS2.35. The implementation is based on the DSR module. To illustrate the accurate estimation of PA-DSR, initially, a simulation is performed in a 500 m × 500 m static network with 100 nodes. The nodes are randomly positioned five flows with different data rates (connections) which are attempted to be established in the network. The channel capacity is set to 1 Mbps, and five one-hop connections are established in the network. For each flow, the source is randomly chosen among the sources neighbors. Simulations are stopped after the 60th second. For each scenario, the results presented here are obtained over 30 simulation runs with different random seeds. The simulation parameters are listed in Table 2. In this simulation, quality of service evaluation is carried out by calculating the throughput, end-to-end delay, and packet delivery ratio.

    Table 2 Simulation parameters of PA-DSR

    Figure 1a, b represents the throughput evaluation of the five flows for DSR (when no admission control is incorporated) and PA-DSR, respectively. From Fig. 1a, it is observed that the obtained throughput of the network becomes congested for all the connections after the 20th second as there is no admission control mechanism available in the DSR protocol. This indicates that the network is not able to sustain this traffic scenario. As a consequence, the throughputs achieved by the flows are degraded. However, when the priority is assigned in DSR as shown in Fig. 1b, the throughput of the network for all the five flows is stable which represents all the admitted flows that are able to fit into the network. In Fig. 1b, it is noticed that PA-DSR accepts all the connections without any degradation. Therefore, the proposed admission control mechanism is very useful to allow all the users according to their priority without any collision. In addition, it is observed that in Fig. 1b, the communication 1 (C1 → flow id 3) is started at the 2nd second and routed down at the 20th second (before its assigned period) as the threshold limit of the network is reached at the 20th second (once C3 is initiated at the 20th second); the next priority packets are routed down (C1). However, after the 20th second, all the communications are ensured without any degradation of service, because the total capacity of the network is well below the threshold limit.

    Fig. 1
    figure 1

    Schematic representation of throughput vs simulation time for a DSR and b PA-DSR

    The conventional DSR protocol follows the worst scheduling case and underestimates the available bandwidth; hence, the throughput of the network is diminished once the network has reached its maximum capacity which in turn reduces the QoS. Alternatively, Fig. 1b shows the throughput achieved by PA-DSR which performs a more accurate admission control by admitting five flows out of five. All the admitted flows meet their bandwidth requirements. The scenario indicates that the estimation that we preformed is not overestimated against the availability of bandwidth. The accuracy of the available bandwidth estimation and the admission control can be evaluated using a particular metric. This metric indicates the number of right admissions with respect to the bandwidth.

    Figure 2 illustrates the variation of throughput while varying the number of nodes in the network DSR (Fig. 2a) and PA-DSR (Fig. 2b). The throughput for all the five flows are varied non-uniformly when no admission control is implemented as shown in Fig. 2a. The variation of throughput is due to underestimation of the bandwidth in the network. The throughputs of all the five flows are maintained constant while implementing the admission control. From Fig. 2b, it is investigated that the throughput is constant while increasing the number of nodes in the network.

    Fig. 2
    figure 2

    Schematic representation of throughput vs number of nodes for a DSR and b PA-DSR

    Figure 3a, b illustrates the effect of packet delivery ratio with respect to the simulation time for DSR and PA-DSR, respectively. The packet delivery ratio (PDR) is reached about 100 %, i.e., all the packets reached its destination. In Fig. 3a, the PDR of all the five connections is extended at its maximum; however, it consumes a certain amount of time to reach its maximum. It is investigated that the PDR is not reached 100 % immediately once connection 3 (C3 → 2nd second) and connection 5 (C5 → 32nd second) are initiated. The variation occurs owing to the improper bandwidth assignment. Alternatively, the PDR is attained 100 % for all the connections when priority mechanism is involved as shown in Fig. 3b.

    Fig. 3
    figure 3

    Schematic representation of throughput vs number of nodes for a DSR and b PA-DSR

    The time taken to transmit the data from source to destination of the DSR protocol is listed in Table 3. From the results, it is noticed that the average end-to-end delay (EED) is about 16 ms for flow 1; however, for DSR, it is 253 ms. The proposed mechanism greatly reduced the end-to-end delay than the reported one. The reduction of end-to-end delay is due to the proper assignment of bandwidth. Figure 4 shows the throughput comparison of DSR and PA-DSR of flow 3. From the simulation results, it is clearly noticed that the throughput of flow 3 is maintained constant over its simulation period for the proposed priority aware mechanism. However, for DSR, the throughput is varied abruptly.

    Table 3 End-to-end delay for all the connections for DSR and PA-DSR protocols
    Fig. 4
    figure 4

    Throughput comparison of DSR and PA-DSR

    It is hard to provide QoS guarantees when the nodes are having mobility. QoS violations can appear due to the topology changes which result either in route breakage or throughput degradation. In order to analyze the impact of network performance (flow 1 to flow 5) at mobility, the simulation is performed with 100 mobile nodes which are randomly positioned. The random way point mobility model is chosen for the motion of nodes with a speed of 20 m/s at maximum. Five flows are considered with its designated data rates.

    Figure 5a, b depicts the effect of throughput for five different flows when DSR and PA-DSR are at the mobility speed of 20 m/s. From Fig. 5a, it is noticed that when no admission control is performed, the network becomes congested and routes are often broken involving decreased throughput flows. A certain form of admission control may therefore be necessary. From Fig. 5b, it is observed that the performance is enhanced due to the incorporation of the priority aware mechanism in DSR. The throughput of the network at mobility conditions is decreased while comparing the throughput without mobility because the mobility affects the performance of the networks. From the arrived results, it is observed that the proposed mechanism is greatly enhancing the throughput, PDR, and end-to-end delay which in turn enhances the QoS of the network. Hence, it can be implemented for real-time applications.

    Fig. 5
    figure 5

    Schematic representation of throughput vs number of nodes at mobility for a DSR and b PA-DSR

    5 Conclusions

    In this paper, a priority aware dynamic source routing (PA-DSR) protocol is proposed in order to enhance the quality of service (QoS) for mobile ad hoc networks (MANETs). The priority aware mechanism is implemented through a rate cutting mechanism which is eventually executed based on their date rates. Hence, PA-DSR protocol can provide precise admission control which leads to QoS enhancement. The obtained simulation results proved significant improvement in throughput, packet delivery ratio, and end-to-end delay than existing DSR. The PA-DSR can build a QoS route from source to destination with a reserved bandwidth. It works best in small networks under low network mobility. It is hoped that in the future, ad hoc networks will emerge as an effective complement to infrastructure wired and wireless LANs and even wide area-mobile networking services.

    Our future work primarily involves incorporating the proposed priority aware mechanism in other routing protocols such as AODV, AOMDV, DSDV, DYMO, and OLSR; then evaluating its QoS parameters namely throughput, packet delivery ratio, and end-to-end delay while varying the number of nodes in the network at static and dynamic behavior; and, finally, performing comparative analysis of the simulation results obtained for conventional protocol with priority aware mechanism-based protocols, as well as implementing the priority aware mechanism in all the aforementioned protocols and comparing the QoS parameters.