SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
The International Journal Of Engineering And Science (IJES)
||Volume|| 3 ||Issue|| 2 ||Pages|| 48 - 50 || 2014 ||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805

DBET: Demand Based Energy efficient Topology for MANET
with Security
1,

Minakshi Kivade, 2, Chaitali Bangar, 3, Pragati Vedpathak, 4, Poonam Kulkarni.
1, 2, 3, 4,

Computer Dpartment
Bharati vidyapeeth’s college of engineering for womens, pune.

-------------------------------------------------------ABSTRACT--------------------------------------------------Deman Based Energy efficient topology as the name itself suggests saves the energy efficiently by dynamically
adjusting the totpology of the network. Network is a wireless network of mobile devices also called as MANETs.
The main goal is to save Energy Cunsumption and Power Consumption because these factors are also ,
important in determining the performance of the network. Efficiency in Ad-hoc networks can be achieved mainly
in two different ways. In the first method,network maintains a small number of nodes to form connected
backbone and the remaining nodes sleep to conserve energy. This method is effective for low traffic networks.
Energy efficiency in the second method is achieved by power control technique. This technique is effective in
high traffic conditions. The first method is not effective in high traffic conditions. Similarly, the second method
is not effective in low traffic networks. So, in this paper we propose a Demand Based Energy efficient Topology
(DBET) to reduce the energy consumption for mobile ad hoc network, by dynamically adjusting the topology for
various network traffic conditions. We have simulated our proposed protocol DBET by using AODV [8] as
routing protocol in network simulator ns2.33 [1] and compared with AODV an SPAN [3]. The simulation
studies revealed that the proposed scheme perform better in terms of Energy, Delay, and Delivery ratio. Also in
this paper newly we are implementing the security factor while sending the packets. For that we are using RSA
algorithm.
--------------------------------------------------------------------------------------------------------------------------------------Date of Submission: 02 January 2014
Date of Acceptance: 15 February 2014
---------------------------------------------------------------------------------------------------------------------------------------

I.

INTRODUCTION

In this paper, we present a demand based energy efficient topology (DBET) that dynamically adjust
network topology for various network traffic conditions. Here we are using two methods for two different traffic
conditions. In the first method a small lnumber of nodes awake to maintain the network connectivity and
remaining nodes go into sleep state to conserve energy.This method is effective in low traffic conditions,
because the power consumption to keep nodes awake dominates the power consumption in data transfer.
In the second method, topology is controlled by keeping lesser cost links in the network.An energy efficient
dynamic path is maintained to send data from source to destination for MANET, Due to mobility existing paths
may not be energy efficient. So, each node in a data path Dynamically updates the path by adjusting its
transmission power. Each node in the networks determines its power for data transmission and control packets
transmission according to the received beacon messages from its neighbors. In dynamic path optimization
technique protocols dynamically select energy efficient path as per the requirement of dynamic topological
changes in the network [4].
Working: BET can be divided into four phases. The first phase selects a small set of nodes that constitutes a independent
set of the network. The second phase is responsible for electing more nodes to ensure that the selected nodes form a
connected backbone. Remaining nodes go to sleep to conserve energy. Active node withdraw process is implement in the
third phase to remove redundant nodes in each region. To improve the performance along the high traffic path we use the
route optimization with power control technique in the fourth phase. In this technique, we change topology dynamically to
connect more nodes, around the routing path to minimize the total power consumption.

A. Phase I: Independent set formation
The first phase selects a minimal set of nodes that constitute a minimal independent set of a connected
backbone of the network. This selection is done in a distributed and localized manner using neighbor
information available with the network layer. Let ni be the total number of nodes surrounding a node i and let
nai be the number of additional nodes among these neighbors, which are connected, if node i becomes a
coordinator to the forward packets. The following heuristic is used in this phase:

www.theijes.com

The IJES

Page 48
DBET: Demand Based Energy efficient Topology for MANET with Security
• Stability factor (denoted by S): Nodes that are relatively more stable as compared to the others in the localities
are given more preference. The node’s stability is measured as the ratio of number of link failures (fi) and new
connection established (ci) per unit time to the total number of nodes surrounding that node (ni).
Therefore,stability of a node i is ci+fini. As the values of ci and fiincrease, the stability of the node decreases.
• Utility factor (denoted by U): Nodes that have higher number of neighbors without an active neighbor are
given more preference. This heuristic is derived from the fact that such nodes, if elected, can help a larger
number of other nodes, which can then be put to sleep state. Thus,
the utility factor Ui of a node i is calculate as:
• Energy factor (denoted by E): Nodes that have higher amounts of percentage remaining power are given more
preference over others to be elected as active nodes. This introduces fairness in the protocol by ensuring proper
rotation in the selection of active nodes. Let E0i denote the initial node’s energy and Eti be the amount of energy
of a node at time t. So the energy factor Ei of the node i is calculate as E0i−Eti E0i.Thus, the above discussion
suggests that the coordinator selection factor for phase − I can be the sum of all these factors:

B. Phase II: Connecting the Independent Set
Nodes selected in the first phase are not connected. This is because there is only one active node in a
given locality. In this phase more nodes are elected to ensure that the selected nodes form a connected
network.All nodes that have two or more active nodes as neighbors, which are not connected directly or through
one or two active nodes, are eligible to become active in this phase. Preference is given to the nodes satisfying
the following criteria:
• Nodes having higher amount of remaining energy.
• Nodes having higher stability. This can be measured similar to the one used in the first phase.
• Nodes having more number of active nodes in the 1-hop neighborhood.
The stability and energy factors of this phase is very much similar with 1stphase. But the utility factor
is depends upon the 1stphase’s black active nodes. Let nbi be the number of active nodes of the 1stphase in 1 −
hop neighborhood of a node i. If nodes with high nbi become the coordinators in this phase, fewer coordinators
in total may be needed in order to make sure every node can talk to a coordinator. Thus a node with a high nbi
should volunteer more quickly than one with smaller value. Thus, the coordinator selection factor for 2 nd phase
is the sum of all these factors:

The contention if any is also resolved using the back off mechanism like in the first phase.
C. Phase III: Coordinator Withdraw
Every active node periodically checks if it should goto sleep state or not. The need for a node to be an
active may also cease to exist due to the dynamics of the system. More explicitly,this may happen due to one of
the following reasons. If first phase active nodes may move into a region that already has another first phase
active node so that the region now has more than one first phase active nodes.These active nodes recognize this
situation and one of them withdraws.
• If the withdrawal of a first phase active node may mean that the second phase active nodes in the locality no
longer serve their purpose and hence withdraw.
D. Phase IV: Local route customization with Power control technique
The energy consumption per data packet form source todestination is high when each node uses full
transmission power. This can be reduced by chooses a lower energy cost path. The minimum transmission
power Pt(d) = adk + c is required to send data to a node at a distance d, where 2 < k < 4 and for some constants
a and c. The receiving power Pr = PtGtGrht2hr2/d4 = PtKd4 by surface reflection model, where ht, Gt, hr, and
Gr are respectively antenna height and gain of sending and receiving nodes [10]. Theactual power
ξI,J = K PtPr+X, required for sending data froma node I to the node J at a distance d, where X represents the
energy consumed by receiving node.

www.theijes.com

The IJES

Page 49
DBET: Demand Based Energy efficient Topology for MANET with Security
The proposed DBET can be integrated with any routing protocol. In this section, we discusses the
process of integration with AODV. In our approach all control packets and data packets are transmit on low
traffic path with full transmission power and data packets on high traffic path with minimum required energy.

CONCLUSIONS
In this paper, we proposed a demand based energy efficient topology that dynamically adjusts its
topology for various network traffic conditions. We have simulated our proposed protocol DBET and compared
with AODV and AODV with SPAN. The simulation studies revealed that the proposed scheme perform better
in terms of energy, delay, and delivery ratio. It would be interesting to investigate the use of directional antenna
to further reduce the energy consumption.

REFERENCES
[1.]
[2.]
[3.]
[4.]
[5.]
[6.]

H. P. Gupta and S. V. Rao. Pclr: Power control-based locally customize routing for MANET. In Proc. IEEE International
Conference on RF and Signal Processing Systems, pages 632–637, 2010.
Douglas M. Blough, Mauro Leoncini, Giovanni Resta, and Paolo Santi.The k- neighbors approach to interference bounded and
symmetric topology control in ad hoc networks. IEEE Transactions on Mobile Computing, 5(9):1267–1282, 2006.
Feng Xue and P. R. Kumar. The number of neighbors needed for connectivity of wireless networks. Wireless Networks, 10:169 –
181, 2002.
DBET: Demand Based Energy efficient Topology for MANETS Hari Prabhat Gupta S.V.Rao Department of Computer Science
and Engineering Indian Institute of Technology Guwahati, India.
N. Li, J.C. Hou, and L. Sha. Design and analysis of an mst-based Topology control algorithm. In INFOCOM 2003. TwentySecond Annual Joint Conferences of the IEEE Computer and Communications. IEEE Societies, pages 1702 – 1712, mar. 2003.
The network simulator - ns-2.33. http://www.isi.edu/nsnam/ns.

AUTHORS
First Author –Minakshi Kivade, B.E. (computer engg.), BVCOEW,
Second Author –Chaitali Bangar, B.E. (computer engg.), BVCOEW,
Third Author – Pragati Vedpathak, B.E. (computer engg.), BVCOEW,
Fourth Author-Poonam Kulkarni, B.E. (computer engg.), BVCOEW,
Guide: Prof.Jadhav S.B.

www.theijes.com

The IJES

Page 50

Contenu connexe

Tendances

Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyIAEME Publication
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manetgraphhoc
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...IJCSEA Journal
 
Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...eSAT Publishing House
 
A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...
A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...
A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...IJERA Editor
 
K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement IJECEIAES
 
Performance Analysis on Energy Efficient and Scalable Routing Protocols of Wi...
Performance Analysis on Energy Efficient and Scalable Routing Protocols of Wi...Performance Analysis on Energy Efficient and Scalable Routing Protocols of Wi...
Performance Analysis on Energy Efficient and Scalable Routing Protocols of Wi...ijtsrd
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Aayush Gupta
 
IRJET- Performance Analysis of Energy Efficient Clustering Protocol using TAB...
IRJET- Performance Analysis of Energy Efficient Clustering Protocol using TAB...IRJET- Performance Analysis of Energy Efficient Clustering Protocol using TAB...
IRJET- Performance Analysis of Energy Efficient Clustering Protocol using TAB...IRJET Journal
 
Performance Analysis for Parallel MRA in Heterogeneous Wireless Networks
Performance Analysis for Parallel MRA in Heterogeneous Wireless NetworksPerformance Analysis for Parallel MRA in Heterogeneous Wireless Networks
Performance Analysis for Parallel MRA in Heterogeneous Wireless NetworksEditor IJCATR
 
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET Journal
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...IJMIT JOURNAL
 
Performance evaluation of various routing techniques in wireless multimedia
Performance evaluation of various routing techniques in wireless multimediaPerformance evaluation of various routing techniques in wireless multimedia
Performance evaluation of various routing techniques in wireless multimediaIAEME Publication
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...eSAT Journals
 

Tendances (17)

Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manet
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
 
Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...
 
A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...
A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...
A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...
 
K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement
 
Performance Analysis on Energy Efficient and Scalable Routing Protocols of Wi...
Performance Analysis on Energy Efficient and Scalable Routing Protocols of Wi...Performance Analysis on Energy Efficient and Scalable Routing Protocols of Wi...
Performance Analysis on Energy Efficient and Scalable Routing Protocols of Wi...
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...
 
IRJET- Performance Analysis of Energy Efficient Clustering Protocol using TAB...
IRJET- Performance Analysis of Energy Efficient Clustering Protocol using TAB...IRJET- Performance Analysis of Energy Efficient Clustering Protocol using TAB...
IRJET- Performance Analysis of Energy Efficient Clustering Protocol using TAB...
 
Performance Analysis for Parallel MRA in Heterogeneous Wireless Networks
Performance Analysis for Parallel MRA in Heterogeneous Wireless NetworksPerformance Analysis for Parallel MRA in Heterogeneous Wireless Networks
Performance Analysis for Parallel MRA in Heterogeneous Wireless Networks
 
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
 
H0421043049
H0421043049H0421043049
H0421043049
 
Performance evaluation of various routing techniques in wireless multimedia
Performance evaluation of various routing techniques in wireless multimediaPerformance evaluation of various routing techniques in wireless multimedia
Performance evaluation of various routing techniques in wireless multimedia
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...
 

En vedette

The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
G021201054057
G021201054057G021201054057
G021201054057theijes
 
G021203040047
G021203040047G021203040047
G021203040047theijes
 
B03405012020
B03405012020B03405012020
B03405012020theijes
 
D03202018036
D03202018036D03202018036
D03202018036theijes
 
L03401071075
L03401071075L03401071075
L03401071075theijes
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
B021201015023
B021201015023B021201015023
B021201015023theijes
 
A03240107
A03240107A03240107
A03240107theijes
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
I021203057060
I021203057060I021203057060
I021203057060theijes
 
B03202006011
B03202006011B03202006011
B03202006011theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
I032030075081
I032030075081I032030075081
I032030075081theijes
 
B02120307013
B02120307013B02120307013
B02120307013theijes
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
A021201001014
A021201001014A021201001014
A021201001014theijes
 

En vedette (19)

The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
G021201054057
G021201054057G021201054057
G021201054057
 
G021203040047
G021203040047G021203040047
G021203040047
 
B03405012020
B03405012020B03405012020
B03405012020
 
D03202018036
D03202018036D03202018036
D03202018036
 
L03401071075
L03401071075L03401071075
L03401071075
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
B021201015023
B021201015023B021201015023
B021201015023
 
A03240107
A03240107A03240107
A03240107
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
I021203057060
I021203057060I021203057060
I021203057060
 
B03202006011
B03202006011B03202006011
B03202006011
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
I032030075081
I032030075081I032030075081
I032030075081
 
B02120307013
B02120307013B02120307013
B02120307013
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
A021201001014
A021201001014A021201001014
A021201001014
 

Similaire à G03202048050

Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniqueeSAT Publishing House
 
Minimization of Energy Consumption using EPAR-DSR Protocol in Manet
Minimization of Energy Consumption using EPAR-DSR Protocol in ManetMinimization of Energy Consumption using EPAR-DSR Protocol in Manet
Minimization of Energy Consumption using EPAR-DSR Protocol in ManetIRJET Journal
 
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSNIRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSNIRJET Journal
 
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityComparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityIRJET Journal
 
Energy Efficient Clustering and Routing in Mobile Wireless Sensor Network
Energy Efficient Clustering and Routing in Mobile Wireless Sensor NetworkEnergy Efficient Clustering and Routing in Mobile Wireless Sensor Network
Energy Efficient Clustering and Routing in Mobile Wireless Sensor Networkijwmn
 
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor NodeIRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor NodeIRJET Journal
 
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET Journal
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...IRJET Journal
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetseSAT Publishing House
 
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...IRJET Journal
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
 
Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...ijassn
 
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...ijassn
 
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...iosrjce
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET Journal
 

Similaire à G03202048050 (20)

Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling technique
 
ENERGY EFFICIENT ROUTING ALGORITHM
ENERGY EFFICIENT ROUTING ALGORITHMENERGY EFFICIENT ROUTING ALGORITHM
ENERGY EFFICIENT ROUTING ALGORITHM
 
Minimization of Energy Consumption using EPAR-DSR Protocol in Manet
Minimization of Energy Consumption using EPAR-DSR Protocol in ManetMinimization of Energy Consumption using EPAR-DSR Protocol in Manet
Minimization of Energy Consumption using EPAR-DSR Protocol in Manet
 
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSNIRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
 
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityComparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and Connectivity
 
Energy Efficient Clustering and Routing in Mobile Wireless Sensor Network
Energy Efficient Clustering and Routing in Mobile Wireless Sensor NetworkEnergy Efficient Clustering and Routing in Mobile Wireless Sensor Network
Energy Efficient Clustering and Routing in Mobile Wireless Sensor Network
 
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor NodeIRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
 
1909 1913
1909 19131909 1913
1909 1913
 
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manets
 
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
 
D031202018023
D031202018023D031202018023
D031202018023
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
Wsn ppt
Wsn pptWsn ppt
Wsn ppt
 
Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...
 
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
 
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
 
M017358794
M017358794M017358794
M017358794
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
 

Dernier

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Dernier (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

G03202048050

  • 1. The International Journal Of Engineering And Science (IJES) ||Volume|| 3 ||Issue|| 2 ||Pages|| 48 - 50 || 2014 || ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805 DBET: Demand Based Energy efficient Topology for MANET with Security 1, Minakshi Kivade, 2, Chaitali Bangar, 3, Pragati Vedpathak, 4, Poonam Kulkarni. 1, 2, 3, 4, Computer Dpartment Bharati vidyapeeth’s college of engineering for womens, pune. -------------------------------------------------------ABSTRACT--------------------------------------------------Deman Based Energy efficient topology as the name itself suggests saves the energy efficiently by dynamically adjusting the totpology of the network. Network is a wireless network of mobile devices also called as MANETs. The main goal is to save Energy Cunsumption and Power Consumption because these factors are also , important in determining the performance of the network. Efficiency in Ad-hoc networks can be achieved mainly in two different ways. In the first method,network maintains a small number of nodes to form connected backbone and the remaining nodes sleep to conserve energy. This method is effective for low traffic networks. Energy efficiency in the second method is achieved by power control technique. This technique is effective in high traffic conditions. The first method is not effective in high traffic conditions. Similarly, the second method is not effective in low traffic networks. So, in this paper we propose a Demand Based Energy efficient Topology (DBET) to reduce the energy consumption for mobile ad hoc network, by dynamically adjusting the topology for various network traffic conditions. We have simulated our proposed protocol DBET by using AODV [8] as routing protocol in network simulator ns2.33 [1] and compared with AODV an SPAN [3]. The simulation studies revealed that the proposed scheme perform better in terms of Energy, Delay, and Delivery ratio. Also in this paper newly we are implementing the security factor while sending the packets. For that we are using RSA algorithm. --------------------------------------------------------------------------------------------------------------------------------------Date of Submission: 02 January 2014 Date of Acceptance: 15 February 2014 --------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION In this paper, we present a demand based energy efficient topology (DBET) that dynamically adjust network topology for various network traffic conditions. Here we are using two methods for two different traffic conditions. In the first method a small lnumber of nodes awake to maintain the network connectivity and remaining nodes go into sleep state to conserve energy.This method is effective in low traffic conditions, because the power consumption to keep nodes awake dominates the power consumption in data transfer. In the second method, topology is controlled by keeping lesser cost links in the network.An energy efficient dynamic path is maintained to send data from source to destination for MANET, Due to mobility existing paths may not be energy efficient. So, each node in a data path Dynamically updates the path by adjusting its transmission power. Each node in the networks determines its power for data transmission and control packets transmission according to the received beacon messages from its neighbors. In dynamic path optimization technique protocols dynamically select energy efficient path as per the requirement of dynamic topological changes in the network [4]. Working: BET can be divided into four phases. The first phase selects a small set of nodes that constitutes a independent set of the network. The second phase is responsible for electing more nodes to ensure that the selected nodes form a connected backbone. Remaining nodes go to sleep to conserve energy. Active node withdraw process is implement in the third phase to remove redundant nodes in each region. To improve the performance along the high traffic path we use the route optimization with power control technique in the fourth phase. In this technique, we change topology dynamically to connect more nodes, around the routing path to minimize the total power consumption. A. Phase I: Independent set formation The first phase selects a minimal set of nodes that constitute a minimal independent set of a connected backbone of the network. This selection is done in a distributed and localized manner using neighbor information available with the network layer. Let ni be the total number of nodes surrounding a node i and let nai be the number of additional nodes among these neighbors, which are connected, if node i becomes a coordinator to the forward packets. The following heuristic is used in this phase: www.theijes.com The IJES Page 48
  • 2. DBET: Demand Based Energy efficient Topology for MANET with Security • Stability factor (denoted by S): Nodes that are relatively more stable as compared to the others in the localities are given more preference. The node’s stability is measured as the ratio of number of link failures (fi) and new connection established (ci) per unit time to the total number of nodes surrounding that node (ni). Therefore,stability of a node i is ci+fini. As the values of ci and fiincrease, the stability of the node decreases. • Utility factor (denoted by U): Nodes that have higher number of neighbors without an active neighbor are given more preference. This heuristic is derived from the fact that such nodes, if elected, can help a larger number of other nodes, which can then be put to sleep state. Thus, the utility factor Ui of a node i is calculate as: • Energy factor (denoted by E): Nodes that have higher amounts of percentage remaining power are given more preference over others to be elected as active nodes. This introduces fairness in the protocol by ensuring proper rotation in the selection of active nodes. Let E0i denote the initial node’s energy and Eti be the amount of energy of a node at time t. So the energy factor Ei of the node i is calculate as E0i−Eti E0i.Thus, the above discussion suggests that the coordinator selection factor for phase − I can be the sum of all these factors: B. Phase II: Connecting the Independent Set Nodes selected in the first phase are not connected. This is because there is only one active node in a given locality. In this phase more nodes are elected to ensure that the selected nodes form a connected network.All nodes that have two or more active nodes as neighbors, which are not connected directly or through one or two active nodes, are eligible to become active in this phase. Preference is given to the nodes satisfying the following criteria: • Nodes having higher amount of remaining energy. • Nodes having higher stability. This can be measured similar to the one used in the first phase. • Nodes having more number of active nodes in the 1-hop neighborhood. The stability and energy factors of this phase is very much similar with 1stphase. But the utility factor is depends upon the 1stphase’s black active nodes. Let nbi be the number of active nodes of the 1stphase in 1 − hop neighborhood of a node i. If nodes with high nbi become the coordinators in this phase, fewer coordinators in total may be needed in order to make sure every node can talk to a coordinator. Thus a node with a high nbi should volunteer more quickly than one with smaller value. Thus, the coordinator selection factor for 2 nd phase is the sum of all these factors: The contention if any is also resolved using the back off mechanism like in the first phase. C. Phase III: Coordinator Withdraw Every active node periodically checks if it should goto sleep state or not. The need for a node to be an active may also cease to exist due to the dynamics of the system. More explicitly,this may happen due to one of the following reasons. If first phase active nodes may move into a region that already has another first phase active node so that the region now has more than one first phase active nodes.These active nodes recognize this situation and one of them withdraws. • If the withdrawal of a first phase active node may mean that the second phase active nodes in the locality no longer serve their purpose and hence withdraw. D. Phase IV: Local route customization with Power control technique The energy consumption per data packet form source todestination is high when each node uses full transmission power. This can be reduced by chooses a lower energy cost path. The minimum transmission power Pt(d) = adk + c is required to send data to a node at a distance d, where 2 < k < 4 and for some constants a and c. The receiving power Pr = PtGtGrht2hr2/d4 = PtKd4 by surface reflection model, where ht, Gt, hr, and Gr are respectively antenna height and gain of sending and receiving nodes [10]. Theactual power ξI,J = K PtPr+X, required for sending data froma node I to the node J at a distance d, where X represents the energy consumed by receiving node. www.theijes.com The IJES Page 49
  • 3. DBET: Demand Based Energy efficient Topology for MANET with Security The proposed DBET can be integrated with any routing protocol. In this section, we discusses the process of integration with AODV. In our approach all control packets and data packets are transmit on low traffic path with full transmission power and data packets on high traffic path with minimum required energy. CONCLUSIONS In this paper, we proposed a demand based energy efficient topology that dynamically adjusts its topology for various network traffic conditions. We have simulated our proposed protocol DBET and compared with AODV and AODV with SPAN. The simulation studies revealed that the proposed scheme perform better in terms of energy, delay, and delivery ratio. It would be interesting to investigate the use of directional antenna to further reduce the energy consumption. REFERENCES [1.] [2.] [3.] [4.] [5.] [6.] H. P. Gupta and S. V. Rao. Pclr: Power control-based locally customize routing for MANET. In Proc. IEEE International Conference on RF and Signal Processing Systems, pages 632–637, 2010. Douglas M. Blough, Mauro Leoncini, Giovanni Resta, and Paolo Santi.The k- neighbors approach to interference bounded and symmetric topology control in ad hoc networks. IEEE Transactions on Mobile Computing, 5(9):1267–1282, 2006. Feng Xue and P. R. Kumar. The number of neighbors needed for connectivity of wireless networks. Wireless Networks, 10:169 – 181, 2002. DBET: Demand Based Energy efficient Topology for MANETS Hari Prabhat Gupta S.V.Rao Department of Computer Science and Engineering Indian Institute of Technology Guwahati, India. N. Li, J.C. Hou, and L. Sha. Design and analysis of an mst-based Topology control algorithm. In INFOCOM 2003. TwentySecond Annual Joint Conferences of the IEEE Computer and Communications. IEEE Societies, pages 1702 – 1712, mar. 2003. The network simulator - ns-2.33. http://www.isi.edu/nsnam/ns. AUTHORS First Author –Minakshi Kivade, B.E. (computer engg.), BVCOEW, Second Author –Chaitali Bangar, B.E. (computer engg.), BVCOEW, Third Author – Pragati Vedpathak, B.E. (computer engg.), BVCOEW, Fourth Author-Poonam Kulkarni, B.E. (computer engg.), BVCOEW, Guide: Prof.Jadhav S.B. www.theijes.com The IJES Page 50