SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
ISSN: 2278 – 1323
                                                                            International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                                                Volume 1, Issue 4, June 2012




               Energy efficient and Demand based Topology
              Maintenance for various network traffic conditions
   Y.Sravana Sandhya                              V.Sreenathasarma                              K. V. Nagendra,
   M.Tech CSE Dept.,                              Asst. Professor, CSE Dept.,                   Asst. Professor, CSE Dept.,
   ASCET, Gudur,                                  ASCET, Gudur,                                 ASCET, Gudur,
   Andhrapradesh, India.                          Andhrapradesh, India.                         Andhrapradesh, India.
   Sairam.sravani@gmail.com                       villari_ss@gmail.com                          kvnagendramtech@gmail.com

   Abstract—Due to the nodes’ limited resource in the adhoc           This method is effective in high data traffic because power
networks, the scalability is the crucial for network operation.       consumption in data transfer dominates the power required to
Energy efficient topology in Ad-hoc networks can be achieved          keep nodes awake. We combine the advantages of these two
mainly in two different ways. In the first method, network
maintains a small number of nodes to form a connected                 techniques to dynamically adjust network topology for various
backbone and the remaining nodes sleep to conserve energy. This       network traffic conditions.
method is effective for low traffic networks. Energy efficiency in       In this paper, we present a demand based topology (DBT) that
the second method is achieved by power control technique. This        dynamically adjust network topology for various network traffic
technique is effective in high traffic conditions. The first method   conditions. We have simulated our proposed protocol DBT by
is not effective in high traffic conditions. Similarly, the second
method is not effective in low traffic networks. So, in this paper    using AODV [8] as routing protocol using network simulator
we propose a Demand Based Topology (DBT) to reduce the                ns2.33 [1] and compared with AODV and AODV with SPAN [3].
energy consumption for mobile ad hoc network, by dynamically          The simulation studies revealed that the proposed scheme
adjusting the topology for various network traffic conditions. We     perform better in terms of energy, delay, and delivery ratio. In
have simulated our proposed protocol DBT by using AODV [8]            general network topology is controlled by keeping small number
as routing protocol in network simulator ns2.33 [1] and
compared with AODV and SPAN [3]. The simulation studies               of nodes awake as in the first technique. The proposed DBT
revealed that the proposed scheme perform better in terms of          keeps more number of nodes along the bulk data transfer path to
energy, delay, and delivery ratio.                                    conserve energy by keeping low link cost as in the second
   Index Terms—Energy efficient topology, Routing, MANET.             technique.
                                                                         The rest of the paper is organized as follows: the next
                       I. INTRODUCTION                                section provides a brief review of related studies. The third
                                                                      section gives the design details of proposed DBT. Integration
   Mobile Ad-hoc Networks (MANETs) are self-organizing,               issues of DBT with routing protocol is discussed in the forth
self-configuring and infrastructure-less multi-hop wireless net-      section. Simulation results along with discussions are provided
works, where each node communicates with other nodes                  in the section 5. The last and final section concludes the paper
directly or indirectly through intermediate nodes without any         with same pointers to future research direction.
infrastructure. Such temporary networks can be used in battle-
fields, disaster areas, military applications, mining operations                                  II. RELATED WORK
and robot data acquisition. Besides these characteristics they           We briefly describe various techniques related to our work
present challenges like limited energy, dynamic topology, low         topology control. Different topologies have been proposed in
bandwidth and security. The description of the arrangement of         the literature to reduce the energy consumption. These
the MANETs, called topology, is usually temporary or                  methods can be classified into centralized controlling and
dynamically changed with time.                                        distributed computing methods. Ideally, for mobile ad hoc
   Energy conserving is one of the challenges because of              network a topology should be computed and maintained in
limited battery resource. The techniques which are used to            distributed, asynchronous, and localized manner.
reduce the initial topology of network to save the energy and            Li and Wan [6] described a distributed protocol to construct
increase the lifetime of network, with the preservence of             a minimum power topology and developed an algorithm
network connectivity, called topology control techniques.             which directly find a path whose length is within a constant
Various techniques, in network layer, are proposed in the             factor of the shortest path. The length of the path is measured
literature to conserve energy. These techniques can be                in term of energy consumption. This proposed algorithm used
classified mainly into two categories: by controlling the             only local information.
number of nodes with the smaller link cost. In the first method          A topology based on minimum spanning tree, called local-
a small number of nodes awake to maintain the network                 ized minimum spanning tree (LMST) was proposed by Li et
connectivity and remaining nodes go into sleep state to               al. [5]. It is a localized distributed protocol with the following
conserve energy. This method is effective in low traffic              properties: (1) the protocol generates a strongly connected
conditions, because the power consumption to keep nodes               communication graph; (2) the degree of any node is at most
awake dominates the power consumption in data transfer. In
the second method, topology is controlled by keeping lesser
cost links in the network.

                                                                                                                                                        61
                                                                       All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                                                                  International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                                                      Volume 1, Issue 4, June 2012



six, and (3) the topology can be made symmetric by removing                III. DEMAND BASED TOPOLOGY
asymmetric links without impairing connectivity.
                                                                       In this section, we present a demand based energy efficient
  A simple localized distributed topological control algorithm      topology (DBT) for mobile ad hoc network, which
(XTC) is proposed by Wattenhpfer et al. Initially each node u       dynamically changes the topology according to the network
computes a total order (<u) over all its neighbors in the           traffic requirements. Initially we compute a small set of nodes,
network graph G with respect to decreasing link quality, such       which form a connected backbone, while the other nodes are
as signal attenuation, and packet arrival rate. Then, each node     put off to conserve energy. These connected backbone is used
start exchanges the neighbour order information among all           for routing the packets under low network load. When there is
neighbors. At the later point, each node locally selects those      a bulk data transfer between a pair of nodes, the topology
neighboring nodes which will form its neighborhood in the           dynamically changes along the path between these nodes by
resulting topology control graph, based on the previously           power control and route optimize technique to minimize the
exchanged neighbour order information’s. It covers three main       power consumption.
advantages: 1) It does not assume the network graph to be a            The proposed DBT can be divided into four phases. The
Unit Disk Graph, 2) it works on weighted network graphs, and        first phase selects a small set of nodes that constitutes a inde-
3) it does not require availability of the node position            pendent set of the network. The second phase is responsible
information. Authors improved by adding node mobility and           for electing more nodes to ensure that the selected nodes form
extended XTC for mobile network [7].                                a connected backbone. Remaining nodes go to sleep to
                                                                    conserve energy. Active node withdraw process is implement
   An energy efficient dynamic path is maintained to send data
                                                                    in the third phase to remove redundant nodes in each region.
from source to destination for MANET is proposed in Sheu,
                                                                    To improve the performance along the high traffic path we use
Tu, and Hsu [10]. Due to mobility existing paths may not be
                                                                    the route optimization with power control technique in the
energy efficient. So, each node in a data path dynamically
                                                                    fourth phase. In this technique, we change topology
updates the path by adjusting its transmission power. Each
                                                                    dynamically to connect more nodes, around the routing path to
node in the networks determines its power for data
                                                                    minimize the total power consumption.
transmission and control packets transmission according to the
received beacon messages from its neighbors. In dynamic path        A. Phase I: Independent set formation
optimization technique protocols dynamically select energy
efficient path as per the requirement of dynamic topological           The first phase selects a minimal set of nodes that constitute
changes in the network [4].                                         a minimal independent set of a connected backbone of the
                                                                    network. This selection is done in a distributed and localized
   Another class of topology control protocols based on the k-      manner using neighbor information available with the network
nearest neighbors graph (k-NNG). In k-NNG every node is             layer. Let ni be the total number of nodes surrounding a node i
connected to its k closest neighbors. The Local Information         and let nai be the number of additional nodes among these
No Topology protocol (LINT) [9] try to keep the number of           neighbors, which are connected, if node i becomes a
neighbors of a node within a low and high threshold centered        coordinator to the forward packets. The following heuristic is
around an optimal value. But the optimal value is not               used in this phase:
characterized. So the estimation of the number of neighbors            • Stability factor (denoted by S): Nodes that are relatively
can be inaccurate and connectivity is not guaranteed. The k-             more stable as compared to the others in the localities are
Neighbors (k-NEIGH) [2] protocol keeps the number of                     given more preference. The node’s stability is measured
neighbors of a node equal to, or slightly below, a given value           as the ratio of number of link failures (fi) and new
k. It connects each node with k-closest neighbor, instant of             connection established (ci) per unit time to the total
require the knowledge of all the neighbors. The
                                                                         number of nodes surrounding that nodei (ni). iTherefore,
communication graph that result is made symmetric by                                          c +f
                                                                            stability of a node i is     i   i
                                                                                                                 . As the values of c and f
removing asymmetric edges, which has k-upper bound                                                                  ni
                                                                            increase, the stability of the node decreases.
neighbors. A characterization of the critical neighbor numbers
                                                                       •    Utility factor (denoted by U): Nodes that have higher
is discussed by Xue and Kumar.
                                                                            number of neighbors without an active neighbor are
   Another way of reducing the power consumption is by                      given more preference. This heuristic is derived from the
using efficient energy path for transmitting packets. These                 fact that such nodes, if elected, can help a larger number
methods choose smaller edges in their path to reduce                        of other nodes, which can then be put to sleep state. Thus,
                                                                                                  i                                   ni−nai
transmission energy. Minimum energy consumption per                         the utility factor U of a node i is calculate as                   .
                                                                                                                                                       ni
packet can be achieved by choosing the optimal energy                  •    Energy factor (denoted by E): Nodes that have higher
consumed path from source to destination. However, this                     amounts of percentage remaining power are given more
technique does not take the nodes’ energy capacity into                     preference over others to be elected as active nodes. This
consideration. So some nodes may exhaust their power since                  introduces fairness in the protocol by ensuring proper
energy consumption is not fair among the nodes in the                       rotation in the selection of active nodes. Let E0i denote
network. There for the network lift-time decrease .                         the initial node’s energy and Eti be the amount of energy
                                                                                                                                                              62
                                                  All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                                                                                                                            International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                                                                                                                Volume 1, Issue 4, June 2012




           of a node at time t. So the energy factor Ei of the node                                                              • If first phase active nodes may move into a region that
           i is calculate as E i −E i .
                               0
                                 E
                                    t

                                   0i
                                                                                                                                   already has another first phase active node so that the
   Thus, the above discussion suggests that the coordinator                                                                        region now has more than one first phase active nodes.
selection factor for phase − I can be the sum of all these                                                                         These active nodes recognize this situation and one of
factors                                                                                                                            them withdraws.
                              ci + fi                     n            n            E                     E                      • If the withdrawal of a first phase active node may mean
        Ci = Si + Ui + Ei =                       +           i   −        ai
                                                                                +       0i            −            ti   (1)
                                                                                             E                                     that the second phase active nodes in the locality no
                                        ni                        ni                             0i
.                                                                                                                                  longer serve their purpose and hence withdraw.
   Only nodes that do not have an active node in their neighbor-                                                              In the above scenarios the respective active nodes withdraw,
hood are allowed to participate in the election. Announcement                                                                 as their need no longer exists. However, when an active node
contention occurs when multiple nodes discover the lack of an                                                                 withdraws by virtue of completion of its quota of time it needs
active node, and all decide to become active nodes. We resolve                                                                to be awake until another node is elected in the locality.
the contention by delaying the announcement with randomized                                                                      The first three phases of proposed DBT and two phases of
back off delay, which is proportional to the extent to which the                                                              SPAN are similar. However DBT have the following
node satisfies the heuristics. The selected nodes forms an                                                                    advantages over SPAN.
independent set of a connecting backbone of the network.                                                                         • The proposed DBT uses only 1-hop neighbor informa-
Selected active nodes go back to sleep after they have used up a                                                                   tion to create an energy efficient connected backbone
fixed percentage of their power to ensure fairness and allow other                                                                 network, but the SPAN use 2-hop neighbor information.
nodes to become active.                                                                                                          • The SPAN consider only energy and utility factor for co-
                                                                                                                                   ordinator’s announcement phase, but the proposed DBT
B. Phase II: Connecting the Independent Set                                                                                        also consider the stability factor for improving the stabil-
   Nodes selected in the first phase are not connected. This is                                                                    ity of the backbone.
because there is only one active node in a given locality. In                                                                    • The SPAN uses same utility factor for all nodes, but
this phase more nodes are elected to ensure that the selected                                                                      proposed DBT’s utility factors (UA and UB) are depend
nodes form a connected network.                                                                                                    upon node’s type. Thus, the total number of coordinators
   All nodes that have two or more active nodes as neighbors,                                                                      (active nodes) are fewer then the SPAN.
which are not connected directly or through one or two active
                                                                                                                              E. Phase IV: Local route customization with Power control
nodes, are eligible to become active in this phase. Preference
                                                                                                                              technique
is given to the nodes satisfying the following criteria:
   • Nodes having higher amount of remaining energy.
                                                                                                                                 The energy consumption per data packet form source to
                                                                                                                              destination is high when each node uses full transmission
   • Nodes having higher stability. This can be measured
                                                                                                                              power. This can be reduced by chooses a lower energy cost
      similar to the one used in the first phase.                                                                                                                                   k
                                                                                                                              Path. The minimum transmission power Pt(d) = ad + c
   • Nodes having more number of active nodes in the 1-hop
                                                                                                                              is required to send data to a node at a distance d, where
      neighborhood.                                                                                                           2 < k < 4 and for some2 constants a and c. The receiving
   The stability and energy factors of this phase is very much                                                                                       h
                                                                                                                                                                     t   hr 2              K
                st
similar with 1 phase. But the utility factor is depends upon
                                                                                                                                                                         4          P
                                                                                                                              power    Pr      = PtGtGr                  d      =   t d4       by surface    Reflection
      st                                                                                                                      model, where ht, Gt, hr, and Gr are respectively antenna height
the 1 phase’s black active nodes. Let nbi be the number of                                                                    and gain ofI,J
                                                                                                                                           sending and receiving nodes [10]. The
                        st
active nodes of the 1 phase in 1 − hop neighborhood of a
                                                                                                                                               P
                                                                                                                              actual power ξ     =K       t
                                                                                                                                                              +X, required for sending data from
                                                                                                                                                                   Pr
node i. If nodes with high nbi become the coordinators in this                                                                a node I to the node J at a distance d, where X represents the
phase, fewer coordinators in total may be needed in order to                                                                  energy consumed by receiving node.
make sure every node can talk to a coordinator. Thus a node                                                                                                   The minimum required energy
with a high nbi should volunteer more quickly than one with                                                                                                for the data transmission can be
smaller value. Thus, the coordinator selection factor for                                                                                                  calculated as follow: each node in
  nd
2 phase is the sum of all these factors                                                                                                                    the network has fixed default full
                                    ci + f i              n            n            E                     E                                                transmission power Pt, when a
             Ci = Si + Ui + Ei =                      +       i   −    bi
                                                                                +                     −                 (2)
                                                                                                                                                           node I receives control mes-sage
                                                                                    0i                        ti
                                                                                             E
                                             ni                   ni                             0i

    .                                                                                                                                                      from node J with power Pr
  The contention if any is also resolved using the back off                                                                   Fig. 1. Minimizing the trans- it calculates the distance between
mechanism like in the first phase.                                                                                            mission power. nodes I and J then node I can
                                                                                                                                                          find minimum energy Pt(d) re-
C. Phase III: Coordinator Withdraw                                                                                            quired for transmitting the data to node J . Let consider the
   Every active node periodically checks if it should goto sleep                                                              nodes B and node C which are in the transmission range of a
state or not. The need for a node to be an active may also cease to                                                           node A as shown in the Fig. 1. If ξA,B + ξB,C < ξA,C then
exist due to the dynamics of the system. More explicitly, this may                                                            sending data packet from node A to the node C via
happen due to one of the following reasons.                                                                                   intermediate node B consume less energy. Our proposed
                                                                                                                                                                                                                        63
                                                                                        All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                                                                   International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                                                       Volume 1, Issue 4, June 2012




DBT uses this power optimization technique locally along the           source to itself > as a piggyback with periodic hello messages
routing path to minimize the energy consumption during the             in full transmission path. After receive the hello messages
transmission.                                                          from the node I and the node C, along with piggyback
   Whenever a new node satisfies the above criteria it remains         information, node X calculate the link cost ξI,X and ξC,X and
awake to participate in the high traffic flow path. Please note        checks whether it can participate in the ongoing data transfer.
that a new node can come either a sleeping node wakes up               The node X can participate in data forwarding, if it reduces the
near high traffic flow path or awake node moves closer to high         cost of the path from the node I to the node C. That is, if ξI,X
traffic flow path.                                                     + ξC,X < δI,C then the new node X participate in the routing
   IV. INTEGRATING DBET WITH                                           by sending route update control message (RUP) to the node I
   ROUTING PROTOCOL                                                    and the node C with route cost δI,C . When the node I and the
                                                                       node C receive (RUP) messages and then update their routing
   The proposed DBT can be integrated with any routing                 tables.
protocol. In this section, we discusses the process of
                                                                       V. PERFORMANCE EVALUATION
integration with AODV. In our approach all control packets
and data packets are transmit on low traffic path with full              We have evaluated the performance of DBT with AODV
transmission power and data packets on high traffic path with          [8] as a routing protocol and compared with AODV and
minimum required energy.                                               AODV with SPAN [3] using the network simulator NS2.33.
Route discovery: Route discovery uses route cost in place of           The simulation parameters are listed in the table I.
hop count as route metric. We use the notation δI,J denotes the
cost of least cost path from the node I to the node J .                                                   TABLE I
                                                                                                  SIMULATION PARAMETERS
   When a source node S wants to find a route to a des-
                                                                            Simulation Time                 500 sec.
tination D, it broadcasts the route request packet (RREQ) to its            Number of nodes                 20, 40, 60, 80, and 100
neighbors. The route request packet contains the least route                Max Node Energy                 3000 J
cost from source node S, which is initially zero. An                        Energy Distribution             Normal Distribution (0 to 3000 J)
                                                                                                                         2
intermediate node J receiving the route request packet from                 Area                            500×500 m
                                                                            Low traffic load                2×512 bytes/sec.
another intermediate node I, it calculates the cost of the path             High traffic load               10×512 bytes/sec.
form node S to nodes J as δS,I + ξI,J . The node J update its               MAC                             IEEE 802.11
routing table if the calculated cost is less than the cost in its           Max Tx power                    0.2 W
routing table and forward the route request packet to its                   Max Rx power                    0.09 W
                                                                            Number of power levels          5
neighbors with updated cost. In order to avoid another cost
                                                                            Power levels                    30 m, 60 m, 90 m, 120 m, and 150 m
update, node J waits for the time (propositional to the cost to             Basic routing protocol          AODV
δS,J ) before forwarding.                                                   Propagation Model               Two ray ground propagation model
                                                                            Node motion                     Random-motion
   When a destination node D receives first route request
packet (RREQ), it calculates the route cost and update its
routing table. It waits for a fixed time interval to receive more         Energy consumption: The energy consumed by DBT is
route request packets and find the least cost route among them.
                                                                       same as that of SPAN in low load traffic (see the Fig. 3(a),
The node D unicast a route reply packet (RREP) back to its
                                                                       since both the methods keep fewer number of nodes in the
neighbor from which it received the least cost route. The
                                                                       backbone and remaining nodes in sleep state to conserve en-
neighbor nodes unicast RREP towards the source node S.
                                                                       ergy. However, in high traffic DBT perform better then SPAN
Local route customization: As we discussed earlier due to              (see the Fig. 3(b)) because of power controlled transmission.
the dynamic nature of the network new node may come closer             The overhead of keeping more nodes in awake state along the
to existing path, which may reduce the existing route cost, if it      high traffic, flow path is less than the energy conserved using
participates in forwarding the data.                                   power controlled data transmission. From these graphs we can
                                                                       also observe that AODV without using any topology control
                                                                       consumes very high energy.
                                                                          End-to-end delay: The end-to-end delay is the average
                                                                       time between data packets sent out from the sources and
                                                                       received at the destination. The Fig. 3(c) and Fig. 3(d) show
                                                                       the delay with respect to the number of nodes and mobility
                                                                       rate. As the mobility rate increases, the end-to-end delay is
                 Fig. 2. Local path customization.
                                                                       always increases because the network topology changes more
                                                                       frequently. In high network load the DBTs performance is
   Let consider the example network given in the Fig. 2(a)             better then SPAN and AODV. This is because the low
with the existing path cost from the node I to the node J is 9         transmission power implies low queuing delay and reduced
units. If a node is in data transmission path, it sends the            interference. Similarly, the increase in delay become more
< Source address, Destination address, Route cost from
                                                                                                                                                               64
                                                     All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                                                                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                                                         Volume 1, Issue 4, June 2012




              (a) Low network load                              (b) High network load                                    (c) High network load
                               Consumed energy v/s Simulation time.                                            Delay v/s number of nodes for mobility=2.




              (d) High network load                              (e) Low network load                                  (f) High network load
                Delay v/s mobility.                                                  Packet delivery ratio v/s mobility.
                                                               Fig. 3. Simulation Results.




significant when the network density increases because more                           [3]  Benjie Chen, Kyle Jamieson, Hari Balakrishnan, and Robert
number of nodes creates more interfaces in the routing.                                    Morris.Span: An energy-efficient coordination algorithm for
   Packet delivery ratio: Packet delivery ratio is the ratio of                            topology mainte- nance in ad hoc wireless networks. ACM
                                                                                           Wireless Networks, 8:85–96, September 2001.
the data packets received at the destination to the data packets                      [4] H. P. Gupta and S. V. Rao. Pclr: Power control-based locally
sent out from the sources. The Fig. 3(e) and Fig. 3(f) show the                            customize routing for Manet. In Proc. IEEE International
overall delivery ratio with respect to the mobility rate. As the                           Conference on RF and Signal Processing Systems, pages 632–
                                                                                           637, 2010.
mobility rate increases, the delivery ratio always decrease. In                       [5] N. Li, J.C. Hou, and L. Sha. Design and analysis of an mst-
low network load, there is not much difference between                                     based topology control algorithm. In INFOCOM 2003. Twenty-
proposed DBT and SPAN. But if the network load is high                                     Second Annual Joint Conference of the IEEE Computer and
                                                                                           Communications. IEEE Societies, pages 1702 – 1712, mar.
DBTs performance drops slower than SPAN. This is because,                                  2003. Xiang-Yang Li and Peng-Jun Wan. Constructing
in SPAN the probability of packet loss increases with increase                             minimum energy mobile wireless networks. SIGMOBILE
in traffic due to collisions and interfering. But DBT over                                 Mob. Comput. Commun. Rev.,5(4):55–672001.
                                                                                      [6] Xiang-Yang Li and Peng-Jun Wan. Constructing minimum
comes the problem by route optimize phase.                                                 energy mobile wireless networks. SIGMOBILE Mob.
                                                                                           Comput. Commun. Rev.,5(4):5567, 2001.
                        VI. CONCLUSIONS                                               [7] Naghshegar, A. Dana, A. Darehshoorzadeh, and K.
                                                                                           Karimpoor.Topology control scheme in manets for aodv
       [1] In this paper, we proposed a demand based energy                                routing. In           Information and Communication
             efficient topology that dynamically adjusts its                               Technologies: From Theory to Applications, 2008. ICTTA
                                                                                           2008. 3rd International Conference on, pages 1 –6, 7-11 2008.
             topology for various network traffic conditions.                         [8] Charles E. Perkins and Elizabeth M. Royer. Ad-hoc on-demand
             We have simulated our proposed protocol DBT                                   distance vector routing. In WMCSA ’99: Proceedings of the
             and compared with AODV and AODV with                                          Second IEEE Workshop on Mobile Computer Systems and
                                                                                           Applications, pages 90– 100, Washington, DC, USA, 1999.
             SPAN. The simulation studies revealed that the                                IEEE Computer Society.
             proposed scheme perform better in terms of                               [9] Ram Ramanathan and Regina Hain. Topology control of
             energy, delay, and delivery ratio.                                            multihop wireless networks using transmit power adjustment. In
                                                                                           INFOCOM, pages 404–413, 2000.
                          REFERENCES
                                                                                      [10] Jang-Ping Sheu, Shin-Chih Tu, and Chi-Hung Hsu. Location-
       [1]   The network simulator - ns-2.33. http://www.isi.edu/nsnam/ns.                 free topol- ogy control protocol in wireless ad hoc networks.
       [2]   Douglas M. Blough, Mauro Leoncini, Giovanni Resta, and                        Comput. Commun.,31(14):341032008.
             Paolo Santi. The k-neighbors approach to interference bounded
             and symmetric topology control in ad hoc networks. IEEE
             Transactions on Mobile Computing, 5(9):1267–1282, 2006.

                                                                                                                                                                 65
                                                               All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                                                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                                         Volume 1, Issue 4, June 2012



Author Profile:




Y.Sravana Sandhya MTECH (SE) from ASCET
Gudur,Andhrapradesh,India,Area of interest in
computer networking and software engineering.




V.sreenathasarma Asst.Professor (CSE) from ASCET
Gudur, Andhrapradesh, India, Area of interest in
computer networking and Datamining and warehousing..




 K.V.Nagendra Asst.Professor (CSE) from ASCET
Gudur, Andhrapradesh, India, Area of interest in
computer networking and Data mining and warehousing.




                                                                                                                                                 66
                                       All Rights Reserved © 2012 IJARCET

Contenu connexe

Tendances

Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...
Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...
Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...Associate Professor in VSB Coimbatore
 
An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...TELKOMNIKA JOURNAL
 
Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013ijcsbi
 
Balancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networksBalancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networksIAEME Publication
 
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...cscpconf
 
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs) A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs) IJMER
 
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SAN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SIJCNCJournal
 
A NODE DEPLOYMENT MODEL WITH VARIABLE TRANSMISSION DISTANCE FOR WIRELESS SENS...
A NODE DEPLOYMENT MODEL WITH VARIABLE TRANSMISSION DISTANCE FOR WIRELESS SENS...A NODE DEPLOYMENT MODEL WITH VARIABLE TRANSMISSION DISTANCE FOR WIRELESS SENS...
A NODE DEPLOYMENT MODEL WITH VARIABLE TRANSMISSION DISTANCE FOR WIRELESS SENS...ijwmn
 
Medium term load demand forecast of Kano zone using neural network algorithms
Medium term load demand forecast of Kano zone using neural network algorithmsMedium term load demand forecast of Kano zone using neural network algorithms
Medium term load demand forecast of Kano zone using neural network algorithmsTELKOMNIKA JOURNAL
 
EFFECTIVE PEEC MODELING OF TRANSMISSION LINES STRUCTURES USING A SELECTIVE ME...
EFFECTIVE PEEC MODELING OF TRANSMISSION LINES STRUCTURES USING A SELECTIVE ME...EFFECTIVE PEEC MODELING OF TRANSMISSION LINES STRUCTURES USING A SELECTIVE ME...
EFFECTIVE PEEC MODELING OF TRANSMISSION LINES STRUCTURES USING A SELECTIVE ME...EEIJ journal
 
Energy efficient load balanced routing protocol for wireless sensor networks
Energy efficient load balanced routing protocol for wireless sensor networksEnergy efficient load balanced routing protocol for wireless sensor networks
Energy efficient load balanced routing protocol for wireless sensor networkscsandit
 
Computational Investigation of Asymmetric Coplanar Waveguides Using Neural Ne...
Computational Investigation of Asymmetric Coplanar Waveguides Using Neural Ne...Computational Investigation of Asymmetric Coplanar Waveguides Using Neural Ne...
Computational Investigation of Asymmetric Coplanar Waveguides Using Neural Ne...Konstantinos Karamichalis
 
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksEnhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksAssociate Professor in VSB Coimbatore
 
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ijasuc
 

Tendances (20)

Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...
Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...
Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...
 
An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...
 
Santhosh hj shivaprakash
Santhosh hj shivaprakashSanthosh hj shivaprakash
Santhosh hj shivaprakash
 
Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013
 
Ijcnc050209
Ijcnc050209Ijcnc050209
Ijcnc050209
 
Balancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networksBalancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networks
 
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 
Kb3418101813
Kb3418101813Kb3418101813
Kb3418101813
 
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs) A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
 
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SAN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
 
A NODE DEPLOYMENT MODEL WITH VARIABLE TRANSMISSION DISTANCE FOR WIRELESS SENS...
A NODE DEPLOYMENT MODEL WITH VARIABLE TRANSMISSION DISTANCE FOR WIRELESS SENS...A NODE DEPLOYMENT MODEL WITH VARIABLE TRANSMISSION DISTANCE FOR WIRELESS SENS...
A NODE DEPLOYMENT MODEL WITH VARIABLE TRANSMISSION DISTANCE FOR WIRELESS SENS...
 
Medium term load demand forecast of Kano zone using neural network algorithms
Medium term load demand forecast of Kano zone using neural network algorithmsMedium term load demand forecast of Kano zone using neural network algorithms
Medium term load demand forecast of Kano zone using neural network algorithms
 
EFFECTIVE PEEC MODELING OF TRANSMISSION LINES STRUCTURES USING A SELECTIVE ME...
EFFECTIVE PEEC MODELING OF TRANSMISSION LINES STRUCTURES USING A SELECTIVE ME...EFFECTIVE PEEC MODELING OF TRANSMISSION LINES STRUCTURES USING A SELECTIVE ME...
EFFECTIVE PEEC MODELING OF TRANSMISSION LINES STRUCTURES USING A SELECTIVE ME...
 
Energy efficient load balanced routing protocol for wireless sensor networks
Energy efficient load balanced routing protocol for wireless sensor networksEnergy efficient load balanced routing protocol for wireless sensor networks
Energy efficient load balanced routing protocol for wireless sensor networks
 
Computational Investigation of Asymmetric Coplanar Waveguides Using Neural Ne...
Computational Investigation of Asymmetric Coplanar Waveguides Using Neural Ne...Computational Investigation of Asymmetric Coplanar Waveguides Using Neural Ne...
Computational Investigation of Asymmetric Coplanar Waveguides Using Neural Ne...
 
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksEnhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
011001010 a
011001010 a011001010 a
011001010 a
 
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
 

En vedette (8)

139 141
139 141139 141
139 141
 
210 214
210 214210 214
210 214
 
256 261
256 261256 261
256 261
 
196 202
196 202196 202
196 202
 
begrippen hc6
begrippen hc6begrippen hc6
begrippen hc6
 
252 256
252 256252 256
252 256
 
395 401
395 401395 401
395 401
 
600 608
600 608600 608
600 608
 

Similaire à 61 66

A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs cscpconf
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419IJRAT
 
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...IDES Editor
 
A review on energy efficient clustering routing
A review on energy efficient clustering routingA review on energy efficient clustering routing
A review on energy efficient clustering routingeSAT Publishing House
 
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
Analysis of Genetic Algorithm for Effective power Delivery and with Best UpsurgeAnalysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurgeijeei-iaes
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijasuc
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijasuc
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijasuc
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijsptm
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
 
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGSCONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGSIJCNCJournal
 
Routing Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachRouting Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachEswar Publications
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...IJERD Editor
 
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...IJECEIAES
 
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...Editor IJCATR
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
 

Similaire à 61 66 (20)

95 101
95 10195 101
95 101
 
95 101
95 10195 101
95 101
 
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419
 
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
 
A review on energy efficient clustering routing
A review on energy efficient clustering routingA review on energy efficient clustering routing
A review on energy efficient clustering routing
 
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
Analysis of Genetic Algorithm for Effective power Delivery and with Best UpsurgeAnalysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
 
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
 
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGSCONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
 
Routing Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachRouting Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient Approach
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
 
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...
 
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

61 66

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Energy efficient and Demand based Topology Maintenance for various network traffic conditions Y.Sravana Sandhya V.Sreenathasarma K. V. Nagendra, M.Tech CSE Dept., Asst. Professor, CSE Dept., Asst. Professor, CSE Dept., ASCET, Gudur, ASCET, Gudur, ASCET, Gudur, Andhrapradesh, India. Andhrapradesh, India. Andhrapradesh, India. Sairam.sravani@gmail.com villari_ss@gmail.com kvnagendramtech@gmail.com Abstract—Due to the nodes’ limited resource in the adhoc This method is effective in high data traffic because power networks, the scalability is the crucial for network operation. consumption in data transfer dominates the power required to Energy efficient topology in Ad-hoc networks can be achieved keep nodes awake. We combine the advantages of these two mainly in two different ways. In the first method, network maintains a small number of nodes to form a connected techniques to dynamically adjust network topology for various backbone and the remaining nodes sleep to conserve energy. This network traffic conditions. method is effective for low traffic networks. Energy efficiency in In this paper, we present a demand based topology (DBT) that the second method is achieved by power control technique. This dynamically adjust network topology for various network traffic technique is effective in high traffic conditions. The first method conditions. We have simulated our proposed protocol DBT by is not effective in high traffic conditions. Similarly, the second method is not effective in low traffic networks. So, in this paper using AODV [8] as routing protocol using network simulator we propose a Demand Based Topology (DBT) to reduce the ns2.33 [1] and compared with AODV and AODV with SPAN [3]. energy consumption for mobile ad hoc network, by dynamically The simulation studies revealed that the proposed scheme adjusting the topology for various network traffic conditions. We perform better in terms of energy, delay, and delivery ratio. In have simulated our proposed protocol DBT by using AODV [8] general network topology is controlled by keeping small number as routing protocol in network simulator ns2.33 [1] and compared with AODV and SPAN [3]. The simulation studies of nodes awake as in the first technique. The proposed DBT revealed that the proposed scheme perform better in terms of keeps more number of nodes along the bulk data transfer path to energy, delay, and delivery ratio. conserve energy by keeping low link cost as in the second Index Terms—Energy efficient topology, Routing, MANET. technique. The rest of the paper is organized as follows: the next I. INTRODUCTION section provides a brief review of related studies. The third section gives the design details of proposed DBT. Integration Mobile Ad-hoc Networks (MANETs) are self-organizing, issues of DBT with routing protocol is discussed in the forth self-configuring and infrastructure-less multi-hop wireless net- section. Simulation results along with discussions are provided works, where each node communicates with other nodes in the section 5. The last and final section concludes the paper directly or indirectly through intermediate nodes without any with same pointers to future research direction. infrastructure. Such temporary networks can be used in battle- fields, disaster areas, military applications, mining operations II. RELATED WORK and robot data acquisition. Besides these characteristics they We briefly describe various techniques related to our work present challenges like limited energy, dynamic topology, low topology control. Different topologies have been proposed in bandwidth and security. The description of the arrangement of the literature to reduce the energy consumption. These the MANETs, called topology, is usually temporary or methods can be classified into centralized controlling and dynamically changed with time. distributed computing methods. Ideally, for mobile ad hoc Energy conserving is one of the challenges because of network a topology should be computed and maintained in limited battery resource. The techniques which are used to distributed, asynchronous, and localized manner. reduce the initial topology of network to save the energy and Li and Wan [6] described a distributed protocol to construct increase the lifetime of network, with the preservence of a minimum power topology and developed an algorithm network connectivity, called topology control techniques. which directly find a path whose length is within a constant Various techniques, in network layer, are proposed in the factor of the shortest path. The length of the path is measured literature to conserve energy. These techniques can be in term of energy consumption. This proposed algorithm used classified mainly into two categories: by controlling the only local information. number of nodes with the smaller link cost. In the first method A topology based on minimum spanning tree, called local- a small number of nodes awake to maintain the network ized minimum spanning tree (LMST) was proposed by Li et connectivity and remaining nodes go into sleep state to al. [5]. It is a localized distributed protocol with the following conserve energy. This method is effective in low traffic properties: (1) the protocol generates a strongly connected conditions, because the power consumption to keep nodes communication graph; (2) the degree of any node is at most awake dominates the power consumption in data transfer. In the second method, topology is controlled by keeping lesser cost links in the network. 61 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 six, and (3) the topology can be made symmetric by removing III. DEMAND BASED TOPOLOGY asymmetric links without impairing connectivity. In this section, we present a demand based energy efficient A simple localized distributed topological control algorithm topology (DBT) for mobile ad hoc network, which (XTC) is proposed by Wattenhpfer et al. Initially each node u dynamically changes the topology according to the network computes a total order (<u) over all its neighbors in the traffic requirements. Initially we compute a small set of nodes, network graph G with respect to decreasing link quality, such which form a connected backbone, while the other nodes are as signal attenuation, and packet arrival rate. Then, each node put off to conserve energy. These connected backbone is used start exchanges the neighbour order information among all for routing the packets under low network load. When there is neighbors. At the later point, each node locally selects those a bulk data transfer between a pair of nodes, the topology neighboring nodes which will form its neighborhood in the dynamically changes along the path between these nodes by resulting topology control graph, based on the previously power control and route optimize technique to minimize the exchanged neighbour order information’s. It covers three main power consumption. advantages: 1) It does not assume the network graph to be a The proposed DBT can be divided into four phases. The Unit Disk Graph, 2) it works on weighted network graphs, and first phase selects a small set of nodes that constitutes a inde- 3) it does not require availability of the node position pendent set of the network. The second phase is responsible information. Authors improved by adding node mobility and for electing more nodes to ensure that the selected nodes form extended XTC for mobile network [7]. a connected backbone. Remaining nodes go to sleep to conserve energy. Active node withdraw process is implement An energy efficient dynamic path is maintained to send data in the third phase to remove redundant nodes in each region. from source to destination for MANET is proposed in Sheu, To improve the performance along the high traffic path we use Tu, and Hsu [10]. Due to mobility existing paths may not be the route optimization with power control technique in the energy efficient. So, each node in a data path dynamically fourth phase. In this technique, we change topology updates the path by adjusting its transmission power. Each dynamically to connect more nodes, around the routing path to node in the networks determines its power for data minimize the total power consumption. transmission and control packets transmission according to the received beacon messages from its neighbors. In dynamic path A. Phase I: Independent set formation optimization technique protocols dynamically select energy efficient path as per the requirement of dynamic topological The first phase selects a minimal set of nodes that constitute changes in the network [4]. a minimal independent set of a connected backbone of the network. This selection is done in a distributed and localized Another class of topology control protocols based on the k- manner using neighbor information available with the network nearest neighbors graph (k-NNG). In k-NNG every node is layer. Let ni be the total number of nodes surrounding a node i connected to its k closest neighbors. The Local Information and let nai be the number of additional nodes among these No Topology protocol (LINT) [9] try to keep the number of neighbors, which are connected, if node i becomes a neighbors of a node within a low and high threshold centered coordinator to the forward packets. The following heuristic is around an optimal value. But the optimal value is not used in this phase: characterized. So the estimation of the number of neighbors • Stability factor (denoted by S): Nodes that are relatively can be inaccurate and connectivity is not guaranteed. The k- more stable as compared to the others in the localities are Neighbors (k-NEIGH) [2] protocol keeps the number of given more preference. The node’s stability is measured neighbors of a node equal to, or slightly below, a given value as the ratio of number of link failures (fi) and new k. It connects each node with k-closest neighbor, instant of connection established (ci) per unit time to the total require the knowledge of all the neighbors. The number of nodes surrounding that nodei (ni). iTherefore, communication graph that result is made symmetric by c +f stability of a node i is i i . As the values of c and f removing asymmetric edges, which has k-upper bound ni increase, the stability of the node decreases. neighbors. A characterization of the critical neighbor numbers • Utility factor (denoted by U): Nodes that have higher is discussed by Xue and Kumar. number of neighbors without an active neighbor are Another way of reducing the power consumption is by given more preference. This heuristic is derived from the using efficient energy path for transmitting packets. These fact that such nodes, if elected, can help a larger number methods choose smaller edges in their path to reduce of other nodes, which can then be put to sleep state. Thus, i ni−nai transmission energy. Minimum energy consumption per the utility factor U of a node i is calculate as . ni packet can be achieved by choosing the optimal energy • Energy factor (denoted by E): Nodes that have higher consumed path from source to destination. However, this amounts of percentage remaining power are given more technique does not take the nodes’ energy capacity into preference over others to be elected as active nodes. This consideration. So some nodes may exhaust their power since introduces fairness in the protocol by ensuring proper energy consumption is not fair among the nodes in the rotation in the selection of active nodes. Let E0i denote network. There for the network lift-time decrease . the initial node’s energy and Eti be the amount of energy 62 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 of a node at time t. So the energy factor Ei of the node • If first phase active nodes may move into a region that i is calculate as E i −E i . 0 E t 0i already has another first phase active node so that the Thus, the above discussion suggests that the coordinator region now has more than one first phase active nodes. selection factor for phase − I can be the sum of all these These active nodes recognize this situation and one of factors them withdraws. ci + fi n n E E • If the withdrawal of a first phase active node may mean Ci = Si + Ui + Ei = + i − ai + 0i − ti (1) E that the second phase active nodes in the locality no ni ni 0i . longer serve their purpose and hence withdraw. Only nodes that do not have an active node in their neighbor- In the above scenarios the respective active nodes withdraw, hood are allowed to participate in the election. Announcement as their need no longer exists. However, when an active node contention occurs when multiple nodes discover the lack of an withdraws by virtue of completion of its quota of time it needs active node, and all decide to become active nodes. We resolve to be awake until another node is elected in the locality. the contention by delaying the announcement with randomized The first three phases of proposed DBT and two phases of back off delay, which is proportional to the extent to which the SPAN are similar. However DBT have the following node satisfies the heuristics. The selected nodes forms an advantages over SPAN. independent set of a connecting backbone of the network. • The proposed DBT uses only 1-hop neighbor informa- Selected active nodes go back to sleep after they have used up a tion to create an energy efficient connected backbone fixed percentage of their power to ensure fairness and allow other network, but the SPAN use 2-hop neighbor information. nodes to become active. • The SPAN consider only energy and utility factor for co- ordinator’s announcement phase, but the proposed DBT B. Phase II: Connecting the Independent Set also consider the stability factor for improving the stabil- Nodes selected in the first phase are not connected. This is ity of the backbone. because there is only one active node in a given locality. In • The SPAN uses same utility factor for all nodes, but this phase more nodes are elected to ensure that the selected proposed DBT’s utility factors (UA and UB) are depend nodes form a connected network. upon node’s type. Thus, the total number of coordinators All nodes that have two or more active nodes as neighbors, (active nodes) are fewer then the SPAN. which are not connected directly or through one or two active E. Phase IV: Local route customization with Power control nodes, are eligible to become active in this phase. Preference technique is given to the nodes satisfying the following criteria: • Nodes having higher amount of remaining energy. The energy consumption per data packet form source to destination is high when each node uses full transmission • Nodes having higher stability. This can be measured power. This can be reduced by chooses a lower energy cost similar to the one used in the first phase. k Path. The minimum transmission power Pt(d) = ad + c • Nodes having more number of active nodes in the 1-hop is required to send data to a node at a distance d, where neighborhood. 2 < k < 4 and for some2 constants a and c. The receiving The stability and energy factors of this phase is very much h t hr 2 K st similar with 1 phase. But the utility factor is depends upon 4 P power Pr = PtGtGr d = t d4 by surface Reflection st model, where ht, Gt, hr, and Gr are respectively antenna height the 1 phase’s black active nodes. Let nbi be the number of and gain ofI,J sending and receiving nodes [10]. The st active nodes of the 1 phase in 1 − hop neighborhood of a P actual power ξ =K t +X, required for sending data from Pr node i. If nodes with high nbi become the coordinators in this a node I to the node J at a distance d, where X represents the phase, fewer coordinators in total may be needed in order to energy consumed by receiving node. make sure every node can talk to a coordinator. Thus a node The minimum required energy with a high nbi should volunteer more quickly than one with for the data transmission can be smaller value. Thus, the coordinator selection factor for calculated as follow: each node in nd 2 phase is the sum of all these factors the network has fixed default full ci + f i n n E E transmission power Pt, when a Ci = Si + Ui + Ei = + i − bi + − (2) node I receives control mes-sage 0i ti E ni ni 0i . from node J with power Pr The contention if any is also resolved using the back off Fig. 1. Minimizing the trans- it calculates the distance between mechanism like in the first phase. mission power. nodes I and J then node I can find minimum energy Pt(d) re- C. Phase III: Coordinator Withdraw quired for transmitting the data to node J . Let consider the Every active node periodically checks if it should goto sleep nodes B and node C which are in the transmission range of a state or not. The need for a node to be an active may also cease to node A as shown in the Fig. 1. If ξA,B + ξB,C < ξA,C then exist due to the dynamics of the system. More explicitly, this may sending data packet from node A to the node C via happen due to one of the following reasons. intermediate node B consume less energy. Our proposed 63 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 DBT uses this power optimization technique locally along the source to itself > as a piggyback with periodic hello messages routing path to minimize the energy consumption during the in full transmission path. After receive the hello messages transmission. from the node I and the node C, along with piggyback Whenever a new node satisfies the above criteria it remains information, node X calculate the link cost ξI,X and ξC,X and awake to participate in the high traffic flow path. Please note checks whether it can participate in the ongoing data transfer. that a new node can come either a sleeping node wakes up The node X can participate in data forwarding, if it reduces the near high traffic flow path or awake node moves closer to high cost of the path from the node I to the node C. That is, if ξI,X traffic flow path. + ξC,X < δI,C then the new node X participate in the routing IV. INTEGRATING DBET WITH by sending route update control message (RUP) to the node I ROUTING PROTOCOL and the node C with route cost δI,C . When the node I and the node C receive (RUP) messages and then update their routing The proposed DBT can be integrated with any routing tables. protocol. In this section, we discusses the process of V. PERFORMANCE EVALUATION integration with AODV. In our approach all control packets and data packets are transmit on low traffic path with full We have evaluated the performance of DBT with AODV transmission power and data packets on high traffic path with [8] as a routing protocol and compared with AODV and minimum required energy. AODV with SPAN [3] using the network simulator NS2.33. Route discovery: Route discovery uses route cost in place of The simulation parameters are listed in the table I. hop count as route metric. We use the notation δI,J denotes the cost of least cost path from the node I to the node J . TABLE I SIMULATION PARAMETERS When a source node S wants to find a route to a des- Simulation Time 500 sec. tination D, it broadcasts the route request packet (RREQ) to its Number of nodes 20, 40, 60, 80, and 100 neighbors. The route request packet contains the least route Max Node Energy 3000 J cost from source node S, which is initially zero. An Energy Distribution Normal Distribution (0 to 3000 J) 2 intermediate node J receiving the route request packet from Area 500×500 m Low traffic load 2×512 bytes/sec. another intermediate node I, it calculates the cost of the path High traffic load 10×512 bytes/sec. form node S to nodes J as δS,I + ξI,J . The node J update its MAC IEEE 802.11 routing table if the calculated cost is less than the cost in its Max Tx power 0.2 W routing table and forward the route request packet to its Max Rx power 0.09 W Number of power levels 5 neighbors with updated cost. In order to avoid another cost Power levels 30 m, 60 m, 90 m, 120 m, and 150 m update, node J waits for the time (propositional to the cost to Basic routing protocol AODV δS,J ) before forwarding. Propagation Model Two ray ground propagation model Node motion Random-motion When a destination node D receives first route request packet (RREQ), it calculates the route cost and update its routing table. It waits for a fixed time interval to receive more Energy consumption: The energy consumed by DBT is route request packets and find the least cost route among them. same as that of SPAN in low load traffic (see the Fig. 3(a), The node D unicast a route reply packet (RREP) back to its since both the methods keep fewer number of nodes in the neighbor from which it received the least cost route. The backbone and remaining nodes in sleep state to conserve en- neighbor nodes unicast RREP towards the source node S. ergy. However, in high traffic DBT perform better then SPAN Local route customization: As we discussed earlier due to (see the Fig. 3(b)) because of power controlled transmission. the dynamic nature of the network new node may come closer The overhead of keeping more nodes in awake state along the to existing path, which may reduce the existing route cost, if it high traffic, flow path is less than the energy conserved using participates in forwarding the data. power controlled data transmission. From these graphs we can also observe that AODV without using any topology control consumes very high energy. End-to-end delay: The end-to-end delay is the average time between data packets sent out from the sources and received at the destination. The Fig. 3(c) and Fig. 3(d) show the delay with respect to the number of nodes and mobility rate. As the mobility rate increases, the end-to-end delay is Fig. 2. Local path customization. always increases because the network topology changes more frequently. In high network load the DBTs performance is Let consider the example network given in the Fig. 2(a) better then SPAN and AODV. This is because the low with the existing path cost from the node I to the node J is 9 transmission power implies low queuing delay and reduced units. If a node is in data transmission path, it sends the interference. Similarly, the increase in delay become more < Source address, Destination address, Route cost from 64 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 (a) Low network load (b) High network load (c) High network load Consumed energy v/s Simulation time. Delay v/s number of nodes for mobility=2. (d) High network load (e) Low network load (f) High network load Delay v/s mobility. Packet delivery ratio v/s mobility. Fig. 3. Simulation Results. significant when the network density increases because more [3] Benjie Chen, Kyle Jamieson, Hari Balakrishnan, and Robert number of nodes creates more interfaces in the routing. Morris.Span: An energy-efficient coordination algorithm for Packet delivery ratio: Packet delivery ratio is the ratio of topology mainte- nance in ad hoc wireless networks. ACM Wireless Networks, 8:85–96, September 2001. the data packets received at the destination to the data packets [4] H. P. Gupta and S. V. Rao. Pclr: Power control-based locally sent out from the sources. The Fig. 3(e) and Fig. 3(f) show the customize routing for Manet. In Proc. IEEE International overall delivery ratio with respect to the mobility rate. As the Conference on RF and Signal Processing Systems, pages 632– 637, 2010. mobility rate increases, the delivery ratio always decrease. In [5] N. Li, J.C. Hou, and L. Sha. Design and analysis of an mst- low network load, there is not much difference between based topology control algorithm. In INFOCOM 2003. Twenty- proposed DBT and SPAN. But if the network load is high Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, pages 1702 – 1712, mar. DBTs performance drops slower than SPAN. This is because, 2003. Xiang-Yang Li and Peng-Jun Wan. Constructing in SPAN the probability of packet loss increases with increase minimum energy mobile wireless networks. SIGMOBILE in traffic due to collisions and interfering. But DBT over Mob. Comput. Commun. Rev.,5(4):55–672001. [6] Xiang-Yang Li and Peng-Jun Wan. Constructing minimum comes the problem by route optimize phase. energy mobile wireless networks. SIGMOBILE Mob. Comput. Commun. Rev.,5(4):5567, 2001. VI. CONCLUSIONS [7] Naghshegar, A. Dana, A. Darehshoorzadeh, and K. Karimpoor.Topology control scheme in manets for aodv [1] In this paper, we proposed a demand based energy routing. In Information and Communication efficient topology that dynamically adjusts its Technologies: From Theory to Applications, 2008. ICTTA 2008. 3rd International Conference on, pages 1 –6, 7-11 2008. topology for various network traffic conditions. [8] Charles E. Perkins and Elizabeth M. Royer. Ad-hoc on-demand We have simulated our proposed protocol DBT distance vector routing. In WMCSA ’99: Proceedings of the and compared with AODV and AODV with Second IEEE Workshop on Mobile Computer Systems and Applications, pages 90– 100, Washington, DC, USA, 1999. SPAN. The simulation studies revealed that the IEEE Computer Society. proposed scheme perform better in terms of [9] Ram Ramanathan and Regina Hain. Topology control of energy, delay, and delivery ratio. multihop wireless networks using transmit power adjustment. In INFOCOM, pages 404–413, 2000. REFERENCES [10] Jang-Ping Sheu, Shin-Chih Tu, and Chi-Hung Hsu. Location- [1] The network simulator - ns-2.33. http://www.isi.edu/nsnam/ns. free topol- ogy control protocol in wireless ad hoc networks. [2] Douglas M. Blough, Mauro Leoncini, Giovanni Resta, and Comput. Commun.,31(14):341032008. Paolo Santi. The k-neighbors approach to interference bounded and symmetric topology control in ad hoc networks. IEEE Transactions on Mobile Computing, 5(9):1267–1282, 2006. 65 All Rights Reserved © 2012 IJARCET
  • 6. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Author Profile: Y.Sravana Sandhya MTECH (SE) from ASCET Gudur,Andhrapradesh,India,Area of interest in computer networking and software engineering. V.sreenathasarma Asst.Professor (CSE) from ASCET Gudur, Andhrapradesh, India, Area of interest in computer networking and Datamining and warehousing.. K.V.Nagendra Asst.Professor (CSE) from ASCET Gudur, Andhrapradesh, India, Area of interest in computer networking and Data mining and warehousing. 66 All Rights Reserved © 2012 IJARCET