SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue.5




       Energy Efficient Reliable Routing Protocol for Mobile Ad Hoc
                                 Networks
                     1
                      T. SANTOSH, 2B.Kiran Kumar, 3E.SATISH BABU


Abstract
An important issue for mobile ad hoc network is the routing protocol design. Due to frequent changes in the
topology of the network this becomes a major technical challenge. Node failures and link breakages in the
network may cause loss of the network resources. Our proposed scheme enhances the QoS parameters likenetwork
stability, efficient packet delivery ratio and network lifetime which thereby improves the reliability of
thenetwork.This routing scheme is based on backbone nodes in the network and is incorporated in the AODV
protocol. It combines stable routes, battery power and signal strength of the nodes to achieve the QoS
parameters.

Key Words: Ad hoc network, Routing protocols, AODV, power, signal strength, Quality of Service.

I. Introduction
A Mobile Ad hoc Network (MANET) is collection of mobile nodes with no existing pre established infrastructure,
forming a temporary network. Each mobile node in the network acts as a router. Such networks are characterized
by: Dynamic topologies, existence of bandwidth constrained and variable capacity links, energy constrained
operations and are highly prone to security threats. Due to all these features routing is a major concern in ad hoc
networks. MANET is viewed as suitable systems which can support some specific applications as virtual classrooms,
military communications, emergency search and rescue operations, data acquisition in hostile environments,
communications set up in Exhibitions, conferences and meetings, in battle field among soldiers to coordinate defense
or attack, at airport terminals for workers to share files etc. Due to the frequent changes in network topology and
the lack of the network resources both in the wireless medium and in the mobile nodes, mobile ad hoc
networking becomes a challenging task. Routing in Ad hoc networks experiences more link failures than in
other networks. Hence, a routing protocol that supports QoS for ad hoc networks requires considering the reasons
for link failure to improve its performance. Link failure stems from node mobility and lack ofthe network resources.
For instance, it is possible that a route that was earlier found to meet certain QoS requirements no longer
does so due to the dynamic nature of the topology. In such a case, it is Important that the network intelligently adapts
the session to its new and changed conditions. Quality of service means providing a set of service
requirements to the flows while routing them throughthe network. A new scheme has been suggested which
combines three basic features to Achieve QoS; these are stable routing, concept of battery power and signal
strength. The scheme uses backbone nodes for stable routes and uses power factor and signal strength to determine
active nodes to participate in routing.The rest of the paper is organized as follows: Section 2 takes a look at the Routing
protocols classification, Section 3 analyzes new proposed scheme and Section 4 summarizes the study and the status
of the work.

Ii. Routing Protocol Classifications
A routing protocol has to find a route for packet delivery and make the packet delivered to the correct
destination. Many protocols [2] have been suggested keeping applications and type of network in view. Routing
Protocols in Ad Hoc Networks can be classified into two types:
A. Table Driven Or Proactive Protocols
Table driven routing protocols maintain consistent, up- to-date routing information from each node to every other
node in the network. These protocols require each node to maintain one or more tables to store routing
information. These routing protocols respond to changes in network topology by propagating updates
information throughout network. This type of routing is called as source routing. The areas in which they differ are
the number of necessary routing tables and changes in network structure are broadcast. Some of the table driven or
proactive protocols are: GSR, WRP, ZRP, STAR etc.



Issn 2250-3005(online)                                 September| 2012                                         Page 1470
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue.5



B. On Demand or Reactive Protocols
A different approach from table-driven routing is source-initiated on-demand routing. This type of routing
creates routes only when desired by the source node. When a node requires a route to a destination, it initiates a
route discovery process within the network. This process is completed once a route is found or all
possible route permutations have been examined. Once a route has been established, it is maintained by a
route maintenance procedure until either the destination becomes inaccessible along every path from the source
or until the route is no longer desired. Some famous on demand routing protocols are: DSR, RDMAR, AODV
etc. The study has been concentrated on reactive routing protocols because of proposed scheme is suitable for
this protocols




                                       Figure1: routing protocols classification

Iii. Proposed Scheme: E2r2p
The proposed scheme “Energy Efficient Reliable Routing Protocol” takes care of on demand routing along
with a new concept of backbone nodes with optimal power factor and signal strength. This scheme concerns about
the reliable routes and better packet delivery ratio. The emphasis is on concept of battery power and signal strength or
energy requirement for routing process.
In this paper three different concepts have been joined together to make an efficient protocol. The backbone nodes
help in reconstruction phase i.e., they assist in fast selection of new routes. Selection of backbone nodes is made
upon availability of nodes, battery status and signal strength. Each route table has an entry for number of
backbone nodes attached to it and their battery status and signal strength. The protocol is divided into three phases.
Route Request (RREQ), Route Repair (RREP) and Error Phase (ERR).
The proposed scheme is explained with the help of an example shown in Figure 2. The light colored nodes depict
the node with less power factor. The Route selection from S (source) to D (destination) is made via 1-2-3-4-5
using shortest path routing.




                                             Figure 2: Example of routing

In case any of the participating nodes get damaged or move out of the range, the backbone nodes (6,8 and 9) can
be takes care of the process. These nodes are nearer to the routing path nodes and have a sufficient power and
signal strength so they can join the process any time. This may lead to slight delay but improves overall
efficiency of theprotocol by sending more packets without link break than the state when some node is unable to
process route due to inadequate battery power and signal strength. The process also helps when some
intermediate node moves out of the range and link break occurs. In such cases the backbone nodes take care of
the process and the route is established again without much overhead. The nodes which are having battery power
and signal strength can be selected for route reconstruction. Backbone Node will be selected at one hop distance
from the affected node.
A. Route Construction (Req) Phase
In AODV routing protocol [5], route request and route reply operations are the most important, and route discovery
with AODV is purely on-demand. When a node wishes to send a packet to a destination node, it checks its route
table to determine whether it currently has a route to that node. If so, it forwards the packet to the next appropriate
hop toward the destination; otherwise, it has to initiate a route discovery process. The source node broadcasts a
flooding RREQ packet, which contains the source and destination node’s IP address and broadcast ID to form a
unique identifier for the RREQ. The intermediate nodes can avoid processing the same RREQ using this unique
identifier. After broadcasting the RREQ, the source node sets a timer to wait for a reply.
The node that successfully received the RREQ should The node that successfully received the RREQ should judge
whether it is the destination or it has a route to the destination with corresponding sequence number
Issn 2250-3005(online)                                September| 2012                                       Page 1471
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue.5



greater than or equal to that contained in the RREQ. In the latter case, the node uncast a route reply (RREP)
packet back to the source; otherwise, it rebroadcasts the RREQ. If the intermediate nodes receive the RREQ
they have already processed, the RREQ should be discarded directly. When the route reply process is done, a forward
route is set up. When a link break in an active route is detected, an ERR message is used to notify that the loss of link
has occurred to its one hop neighbor. Here ERR message indicates those destinations which are no longer
reachable. Taking advantage of the broadcast nature of wireless communications, a node promiscuously
overhears packets that are transmitted by their neighboring nodes. When a node that is not part of the route
overhears a REP packet not directed to itself transmit by a neighbor (on the primary route), it records that neighbor as
the next hop to the destination in its alternate route table. From these packets, a node obtains alternate path
information and makes entries of these backbone nodes (BN) in its route table. If route breaks occurs it just starts
route construction phase from that node. The protocol updates list of BNs and their power status and signal
strength periodically in the route table.
.
B. Route Maintenance
When a node detects a link break [1], it performs a one hop data broadcast to its immediate neighbors. The node
specifies in the data header that the link is disconnected and thus the packet is candidate for alternate routing.
Upon receiving this packet route maintenance phase starts b selecting alternate path and checking power
status, signal strength.
C. Local Repair
When a link break in an active route occurs as shown in figure 3, the node upstream of that break may choose to
repair the link locally if the destination was no farther and there exists BNs that are active. When a link break
occurs the route is disconnected. Backbone nodes are broad casts their power status and signal strength to the
neighbor nodes. The nodes which are having maximum battery power and signal strength can be selected as
route.[7] The received signal strength can be calculated as




Here pr is the total received signal strength, pT is the the transmission power of the node and di is the distance of the
node.When link breaks at node C, route repair starts, node C starts searching for new paths, buffering packets
from S-A in its buffer. The nodes L, M, K, K1, L1, P1, P2 are broadcasts their power status and signal
strength to its neighbor nodes. Now backbone nodes are selected and proper selection of nodes is done based
on power factor and signal strength. Path selected becomes [C - L – M – K – Destination], instead of [C – L – P
–Destination], since the node P is not in active state.Simulation study has been performed for packet delivery ratio.




                                                 Figure 3: Local repair
Even though the route may become longer, the selected route path is far more stable and delivery of packets is
reliable. Stability and reliability of route depends upon three major aspects as: Life time, Power status and signal
strength.

Iv. Simulation And Results
Simulation study has been carried out to studythe Performance studyofexistingdifferent protocols. Simulation
Environment used is NS-2 (network simulator) version NS2.29 to carry out the process. Simulation results have
been compared with EERRP,AODV, DSR and TORA.




Issn 2250-3005(online)                                September| 2012                                        Page 1472
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue.5




V. Conclusion
A new scheme has been presented that utilizes a mesh structure and alternate paths. The scheme can be
incorporated into any ad hoc on-demand unicast routing protocol to improve reliable packet delivery in the face
of node movements and route breaks. Alternate routes are utilized only when data packets cannot be delivered
through the primary route. The process of checking the protocol scheme is to be done for more sparse mediums
and real life scenarios. This scheme can also be extended for metrics like End-to-End delay, Throughput and Path
optimality, Link layer overhead.

References
 [1]    Vinay Rishiwal, Ashwani Kush, Shekhar Verma “Stable and Energy Efficient Routing for Mobile
        AdhocNetworks” Fifth International Conference on Information Technology: New Generations 2008,
         1028-1033.
 [2]     E.M. Royer and C.K. Toh, “A review of current routing protocols for ad hoc mobile wireless networks”.
        IEEE Personal Communications, pages 46–55, April 1999.
 [3]    J.J. Garcia, M. Spohn and D. Bayer, “Source Tree Adaptive Routing protocol”, IETF draft, October 1999.
 [4]    D.B. Johnson, D.A. Maltz, "Dynamic Source Routing in Ad Hoc Networks", Mobile Computing, T.
        Imielinski and H. Korth, Eds., Kulwer, 1996, pp. 152-81 protocol for mobile ad hoc networks
        (RDMAR)”, CCSR ,UK.
 [5]    C.E. Perkins, E.M. Royer, “Ad-Hoc On Demand Distance Vector Routing”, Proceedings of the 2nd IEEE
        Workshop on Mobile Computing Systems and Application New Orleans, LA, February
         1999, pp. 90-100.
 [6]    Josh Broch, David A.Maltz and Jorjeta Jetcheva, “A performance Comparison of Multi hop Wireless
        Adhoc Network Routing Protocols”, Mobicomm’98, Texas, Oct 1998.
 [7]    WU Da-peng , WU Mu-qing, ZHEN Yan, “Reliable routing mechanism based on neighbor stability
        for       MANET” www.buptjournal.cn/xben June 2009, 16(3): 33–39.
 [8]    C. K. Toh, “Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc
        networks”, IEEE Comm. Mag., June 2001, pp. 138-147.
 [9]     Z.J. Hass, M.R. Pearlman, “Zone routing protocol (ZRP)”, Internet draft. June 1999, at www.ietf.org
 [10]    E. Crawley, R. Nair, B. Rajagopalan, and H. Sandick, “A framework for QoS based routing in the
        internet,” RFC 2386, Aug. 1998.
 [11]   M. Ettus. System Capacity, Latency, and Power Consumption in Multihop-routed SS-CDMA Wireless
        Networks. In Radio and Wireless Conference (RAWCON ’98), pages 55–58, Aug.1998.
 [12]   X. Lin and I. Stojmenovic. Power-Aware Routing in Ad Hoc                        Wireless Networks. In SITE,
        University of Ottawa, TR-98- 11, Dec. 1998.
 [13]   A. Chockalingam and M. Zorzi, “Energy Consumption Performance of a Class of Access Protocols for
        Mobile Data Networks,” Proc. IEEE VTC, May 1998, pp. 820–24.
 [14]   A. Michail and A. Ephremides, “Energy Efficient Routing for Connection Oriented Traffic in Ad-hoc
        Wireless Networks,” Proc. IEEE PIMRC, Sept. 2000, pp. 762–66.
 [15]   G. Zussman and A. Segall. Energy efficient routing in ad hoc disaster recovery networks. Proceedings of
        IEEE INFOCOM, April,          2003.
 [16]   C. Schurgers and M. B. Srivastava. Energy efficient routing in wireless sensor networks. Proceedings of
        IEEE MILCOM, pages 28–31, October 2001




Issn 2250-3005(online)                               September| 2012                                     Page 1473

Contenu connexe

Tendances

Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
idescitation
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
IJCNCJournal
 

Tendances (15)

Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
 
O26087092
O26087092O26087092
O26087092
 
A survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsA survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane ts
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)
 
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
 
Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
 

En vedette

Pet410.ruyi
Pet410.ruyiPet410.ruyi
Pet410.ruyi
iburns5
 
Sustainable Agile Development
Sustainable Agile DevelopmentSustainable Agile Development
Sustainable Agile Development
Gabriele Lana
 
Convite para o inaugurar o centro do couto2
Convite para o inaugurar o centro do couto2Convite para o inaugurar o centro do couto2
Convite para o inaugurar o centro do couto2
oscargaliza
 

En vedette (17)

Ali (1)
Ali (1)Ali (1)
Ali (1)
 
Mind of the Innovator: Taming the Traps of Traditional Thinking (a ChangeThis...
Mind of the Innovator: Taming the Traps of Traditional Thinking (a ChangeThis...Mind of the Innovator: Taming the Traps of Traditional Thinking (a ChangeThis...
Mind of the Innovator: Taming the Traps of Traditional Thinking (a ChangeThis...
 
EURISCO demo installations of IPT, at GBIF EU Nodes meeting in Alicante (11 M...
EURISCO demo installations of IPT, at GBIF EU Nodes meeting in Alicante (11 M...EURISCO demo installations of IPT, at GBIF EU Nodes meeting in Alicante (11 M...
EURISCO demo installations of IPT, at GBIF EU Nodes meeting in Alicante (11 M...
 
sat-practice-test
sat-practice-testsat-practice-test
sat-practice-test
 
Crowd Sourcing A Business - a SEO dream? by Eike Sievert
Crowd Sourcing A Business - a SEO dream? by Eike Sievert Crowd Sourcing A Business - a SEO dream? by Eike Sievert
Crowd Sourcing A Business - a SEO dream? by Eike Sievert
 
Code & Creativity
Code & CreativityCode & Creativity
Code & Creativity
 
Cara care p.ptin
Cara care p.ptinCara care p.ptin
Cara care p.ptin
 
Stuart Spore Open Forum - MLA 2011
Stuart Spore Open Forum - MLA 2011Stuart Spore Open Forum - MLA 2011
Stuart Spore Open Forum - MLA 2011
 
Uncover Hidden Population Using Predictive Modeling Tool
Uncover Hidden Population Using Predictive Modeling Tool Uncover Hidden Population Using Predictive Modeling Tool
Uncover Hidden Population Using Predictive Modeling Tool
 
Strutta: Build a Better Promotion
Strutta: Build a Better PromotionStrutta: Build a Better Promotion
Strutta: Build a Better Promotion
 
The surge of ideas
The surge of ideasThe surge of ideas
The surge of ideas
 
Pet410.ruyi
Pet410.ruyiPet410.ruyi
Pet410.ruyi
 
Horari classe 3 anys
Horari classe 3 anysHorari classe 3 anys
Horari classe 3 anys
 
Sustainable Agile Development
Sustainable Agile DevelopmentSustainable Agile Development
Sustainable Agile Development
 
Convite para o inaugurar o centro do couto2
Convite para o inaugurar o centro do couto2Convite para o inaugurar o centro do couto2
Convite para o inaugurar o centro do couto2
 
Varis 2 . AULA DEL BALL DE LA MANIERA (5 ANYS C)
Varis 2 . AULA DEL BALL DE LA MANIERA (5 ANYS C)Varis 2 . AULA DEL BALL DE LA MANIERA (5 ANYS C)
Varis 2 . AULA DEL BALL DE LA MANIERA (5 ANYS C)
 
Is the future of mobile social?
Is the future of mobile social?Is the future of mobile social?
Is the future of mobile social?
 

Similaire à IJCER (www.ijceronline.com) International Journal of computational Engineering research

Similaire à IJCER (www.ijceronline.com) International Journal of computational Engineering research (20)

Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
 
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless Networks
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
 
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of ManetsIRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
Ab25144148
Ab25144148Ab25144148
Ab25144148
 
En33838844
En33838844En33838844
En33838844
 
En33838844
En33838844En33838844
En33838844
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

IJCER (www.ijceronline.com) International Journal of computational Engineering research

  • 1. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue.5 Energy Efficient Reliable Routing Protocol for Mobile Ad Hoc Networks 1 T. SANTOSH, 2B.Kiran Kumar, 3E.SATISH BABU Abstract An important issue for mobile ad hoc network is the routing protocol design. Due to frequent changes in the topology of the network this becomes a major technical challenge. Node failures and link breakages in the network may cause loss of the network resources. Our proposed scheme enhances the QoS parameters likenetwork stability, efficient packet delivery ratio and network lifetime which thereby improves the reliability of thenetwork.This routing scheme is based on backbone nodes in the network and is incorporated in the AODV protocol. It combines stable routes, battery power and signal strength of the nodes to achieve the QoS parameters. Key Words: Ad hoc network, Routing protocols, AODV, power, signal strength, Quality of Service. I. Introduction A Mobile Ad hoc Network (MANET) is collection of mobile nodes with no existing pre established infrastructure, forming a temporary network. Each mobile node in the network acts as a router. Such networks are characterized by: Dynamic topologies, existence of bandwidth constrained and variable capacity links, energy constrained operations and are highly prone to security threats. Due to all these features routing is a major concern in ad hoc networks. MANET is viewed as suitable systems which can support some specific applications as virtual classrooms, military communications, emergency search and rescue operations, data acquisition in hostile environments, communications set up in Exhibitions, conferences and meetings, in battle field among soldiers to coordinate defense or attack, at airport terminals for workers to share files etc. Due to the frequent changes in network topology and the lack of the network resources both in the wireless medium and in the mobile nodes, mobile ad hoc networking becomes a challenging task. Routing in Ad hoc networks experiences more link failures than in other networks. Hence, a routing protocol that supports QoS for ad hoc networks requires considering the reasons for link failure to improve its performance. Link failure stems from node mobility and lack ofthe network resources. For instance, it is possible that a route that was earlier found to meet certain QoS requirements no longer does so due to the dynamic nature of the topology. In such a case, it is Important that the network intelligently adapts the session to its new and changed conditions. Quality of service means providing a set of service requirements to the flows while routing them throughthe network. A new scheme has been suggested which combines three basic features to Achieve QoS; these are stable routing, concept of battery power and signal strength. The scheme uses backbone nodes for stable routes and uses power factor and signal strength to determine active nodes to participate in routing.The rest of the paper is organized as follows: Section 2 takes a look at the Routing protocols classification, Section 3 analyzes new proposed scheme and Section 4 summarizes the study and the status of the work. Ii. Routing Protocol Classifications A routing protocol has to find a route for packet delivery and make the packet delivered to the correct destination. Many protocols [2] have been suggested keeping applications and type of network in view. Routing Protocols in Ad Hoc Networks can be classified into two types: A. Table Driven Or Proactive Protocols Table driven routing protocols maintain consistent, up- to-date routing information from each node to every other node in the network. These protocols require each node to maintain one or more tables to store routing information. These routing protocols respond to changes in network topology by propagating updates information throughout network. This type of routing is called as source routing. The areas in which they differ are the number of necessary routing tables and changes in network structure are broadcast. Some of the table driven or proactive protocols are: GSR, WRP, ZRP, STAR etc. Issn 2250-3005(online) September| 2012 Page 1470
  • 2. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue.5 B. On Demand or Reactive Protocols A different approach from table-driven routing is source-initiated on-demand routing. This type of routing creates routes only when desired by the source node. When a node requires a route to a destination, it initiates a route discovery process within the network. This process is completed once a route is found or all possible route permutations have been examined. Once a route has been established, it is maintained by a route maintenance procedure until either the destination becomes inaccessible along every path from the source or until the route is no longer desired. Some famous on demand routing protocols are: DSR, RDMAR, AODV etc. The study has been concentrated on reactive routing protocols because of proposed scheme is suitable for this protocols Figure1: routing protocols classification Iii. Proposed Scheme: E2r2p The proposed scheme “Energy Efficient Reliable Routing Protocol” takes care of on demand routing along with a new concept of backbone nodes with optimal power factor and signal strength. This scheme concerns about the reliable routes and better packet delivery ratio. The emphasis is on concept of battery power and signal strength or energy requirement for routing process. In this paper three different concepts have been joined together to make an efficient protocol. The backbone nodes help in reconstruction phase i.e., they assist in fast selection of new routes. Selection of backbone nodes is made upon availability of nodes, battery status and signal strength. Each route table has an entry for number of backbone nodes attached to it and their battery status and signal strength. The protocol is divided into three phases. Route Request (RREQ), Route Repair (RREP) and Error Phase (ERR). The proposed scheme is explained with the help of an example shown in Figure 2. The light colored nodes depict the node with less power factor. The Route selection from S (source) to D (destination) is made via 1-2-3-4-5 using shortest path routing. Figure 2: Example of routing In case any of the participating nodes get damaged or move out of the range, the backbone nodes (6,8 and 9) can be takes care of the process. These nodes are nearer to the routing path nodes and have a sufficient power and signal strength so they can join the process any time. This may lead to slight delay but improves overall efficiency of theprotocol by sending more packets without link break than the state when some node is unable to process route due to inadequate battery power and signal strength. The process also helps when some intermediate node moves out of the range and link break occurs. In such cases the backbone nodes take care of the process and the route is established again without much overhead. The nodes which are having battery power and signal strength can be selected for route reconstruction. Backbone Node will be selected at one hop distance from the affected node. A. Route Construction (Req) Phase In AODV routing protocol [5], route request and route reply operations are the most important, and route discovery with AODV is purely on-demand. When a node wishes to send a packet to a destination node, it checks its route table to determine whether it currently has a route to that node. If so, it forwards the packet to the next appropriate hop toward the destination; otherwise, it has to initiate a route discovery process. The source node broadcasts a flooding RREQ packet, which contains the source and destination node’s IP address and broadcast ID to form a unique identifier for the RREQ. The intermediate nodes can avoid processing the same RREQ using this unique identifier. After broadcasting the RREQ, the source node sets a timer to wait for a reply. The node that successfully received the RREQ should The node that successfully received the RREQ should judge whether it is the destination or it has a route to the destination with corresponding sequence number Issn 2250-3005(online) September| 2012 Page 1471
  • 3. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue.5 greater than or equal to that contained in the RREQ. In the latter case, the node uncast a route reply (RREP) packet back to the source; otherwise, it rebroadcasts the RREQ. If the intermediate nodes receive the RREQ they have already processed, the RREQ should be discarded directly. When the route reply process is done, a forward route is set up. When a link break in an active route is detected, an ERR message is used to notify that the loss of link has occurred to its one hop neighbor. Here ERR message indicates those destinations which are no longer reachable. Taking advantage of the broadcast nature of wireless communications, a node promiscuously overhears packets that are transmitted by their neighboring nodes. When a node that is not part of the route overhears a REP packet not directed to itself transmit by a neighbor (on the primary route), it records that neighbor as the next hop to the destination in its alternate route table. From these packets, a node obtains alternate path information and makes entries of these backbone nodes (BN) in its route table. If route breaks occurs it just starts route construction phase from that node. The protocol updates list of BNs and their power status and signal strength periodically in the route table. . B. Route Maintenance When a node detects a link break [1], it performs a one hop data broadcast to its immediate neighbors. The node specifies in the data header that the link is disconnected and thus the packet is candidate for alternate routing. Upon receiving this packet route maintenance phase starts b selecting alternate path and checking power status, signal strength. C. Local Repair When a link break in an active route occurs as shown in figure 3, the node upstream of that break may choose to repair the link locally if the destination was no farther and there exists BNs that are active. When a link break occurs the route is disconnected. Backbone nodes are broad casts their power status and signal strength to the neighbor nodes. The nodes which are having maximum battery power and signal strength can be selected as route.[7] The received signal strength can be calculated as Here pr is the total received signal strength, pT is the the transmission power of the node and di is the distance of the node.When link breaks at node C, route repair starts, node C starts searching for new paths, buffering packets from S-A in its buffer. The nodes L, M, K, K1, L1, P1, P2 are broadcasts their power status and signal strength to its neighbor nodes. Now backbone nodes are selected and proper selection of nodes is done based on power factor and signal strength. Path selected becomes [C - L – M – K – Destination], instead of [C – L – P –Destination], since the node P is not in active state.Simulation study has been performed for packet delivery ratio. Figure 3: Local repair Even though the route may become longer, the selected route path is far more stable and delivery of packets is reliable. Stability and reliability of route depends upon three major aspects as: Life time, Power status and signal strength. Iv. Simulation And Results Simulation study has been carried out to studythe Performance studyofexistingdifferent protocols. Simulation Environment used is NS-2 (network simulator) version NS2.29 to carry out the process. Simulation results have been compared with EERRP,AODV, DSR and TORA. Issn 2250-3005(online) September| 2012 Page 1472
  • 4. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue.5 V. Conclusion A new scheme has been presented that utilizes a mesh structure and alternate paths. The scheme can be incorporated into any ad hoc on-demand unicast routing protocol to improve reliable packet delivery in the face of node movements and route breaks. Alternate routes are utilized only when data packets cannot be delivered through the primary route. The process of checking the protocol scheme is to be done for more sparse mediums and real life scenarios. This scheme can also be extended for metrics like End-to-End delay, Throughput and Path optimality, Link layer overhead. References [1] Vinay Rishiwal, Ashwani Kush, Shekhar Verma “Stable and Energy Efficient Routing for Mobile AdhocNetworks” Fifth International Conference on Information Technology: New Generations 2008, 1028-1033. [2] E.M. Royer and C.K. Toh, “A review of current routing protocols for ad hoc mobile wireless networks”. IEEE Personal Communications, pages 46–55, April 1999. [3] J.J. Garcia, M. Spohn and D. Bayer, “Source Tree Adaptive Routing protocol”, IETF draft, October 1999. [4] D.B. Johnson, D.A. Maltz, "Dynamic Source Routing in Ad Hoc Networks", Mobile Computing, T. Imielinski and H. Korth, Eds., Kulwer, 1996, pp. 152-81 protocol for mobile ad hoc networks (RDMAR)”, CCSR ,UK. [5] C.E. Perkins, E.M. Royer, “Ad-Hoc On Demand Distance Vector Routing”, Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Application New Orleans, LA, February 1999, pp. 90-100. [6] Josh Broch, David A.Maltz and Jorjeta Jetcheva, “A performance Comparison of Multi hop Wireless Adhoc Network Routing Protocols”, Mobicomm’98, Texas, Oct 1998. [7] WU Da-peng , WU Mu-qing, ZHEN Yan, “Reliable routing mechanism based on neighbor stability for MANET” www.buptjournal.cn/xben June 2009, 16(3): 33–39. [8] C. K. Toh, “Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks”, IEEE Comm. Mag., June 2001, pp. 138-147. [9] Z.J. Hass, M.R. Pearlman, “Zone routing protocol (ZRP)”, Internet draft. June 1999, at www.ietf.org [10] E. Crawley, R. Nair, B. Rajagopalan, and H. Sandick, “A framework for QoS based routing in the internet,” RFC 2386, Aug. 1998. [11] M. Ettus. System Capacity, Latency, and Power Consumption in Multihop-routed SS-CDMA Wireless Networks. In Radio and Wireless Conference (RAWCON ’98), pages 55–58, Aug.1998. [12] X. Lin and I. Stojmenovic. Power-Aware Routing in Ad Hoc Wireless Networks. In SITE, University of Ottawa, TR-98- 11, Dec. 1998. [13] A. Chockalingam and M. Zorzi, “Energy Consumption Performance of a Class of Access Protocols for Mobile Data Networks,” Proc. IEEE VTC, May 1998, pp. 820–24. [14] A. Michail and A. Ephremides, “Energy Efficient Routing for Connection Oriented Traffic in Ad-hoc Wireless Networks,” Proc. IEEE PIMRC, Sept. 2000, pp. 762–66. [15] G. Zussman and A. Segall. Energy efficient routing in ad hoc disaster recovery networks. Proceedings of IEEE INFOCOM, April, 2003. [16] C. Schurgers and M. B. Srivastava. Energy efficient routing in wireless sensor networks. Proceedings of IEEE MILCOM, pages 28–31, October 2001 Issn 2250-3005(online) September| 2012 Page 1473