SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
ISSN: 2278 – 1323
            International Journal of Advanced Research in Computer Engineering & Technology
                                                                 Volume 1, Issue 5, July 2012



 Energy Efficient Geographical Routing Protocol
   with Location Aware Routing in MANET
                  Shwaita Kodesia                                            Asst. Prof. PremNarayan Arya

             M.Tech Research Scholar                                     Department of Computer Application
        Department of Computer Application                               Samrat Ashok Technological Institute
        Samrat Ashok Technological Institute                                     Vidisha (M.P.), India
                Vidisha (M.P.), India                                     premnarayan.arya@rediffmail.com
           shwaitakodesia20@india.com



Abstract-                                                        nontrivial. Many protocols have been proposed for
                                                                 mobile ad hoc networks, with the goal of achieving
A Mobile Ad hoc Network (MANET) is a kind of wireless            efficient    routing.     Geographic       routing (also
ad-hoc network, and is a self configuring network of
                                                                 called geo-routing or position-based     routing)      is
mobile routers (and associated hosts) connected by
wireless links the union of which forms an arbitrary
                                                                 a routing principle that relies on geographic position
topology. The routers are free to move randomly and              information. It is mainly proposed for wireless
organize themselves arbitrarily, thus the network's              networks and based on the idea that the source sends
wireless topology may change rapidly and unpredictably.          a message to the geographic location of the
Energy is a vital resource for MANET. The amount of              destination instead of using the network address. The
work one can perform while mobile node is                        idea of using position information for routing was
fundamentally constrained by the limited energy supplied         first proposed in the 1980s in the area of packet radio
by one’s battery. Dynamic Source Routing (DSR) protocol          networks and interconnection networks. Geographic
is one of the most well known routing algorithms for ad
                                                                 routing requires that each node can determine its own
hoc wireless networks. DSR uses source routing, which
allows packet routing to be loop free. DSR increases its
                                                                 location and that the source is aware of the location
efficiency by allowing nodes that are either forwarding          of the destination. With this information a message
route discovery requests or overhearing packets through          can be routed to the destination without knowledge of
having frequent listening mode to cache the routing              the network topology or a prior route discovery [1-2].
information. This paper suggests an approach to utilize
                                                                 There are various approaches, such as single-path,
location information using Geographical Routing
Protocol (GRP) to improve performance of Dynamic                 multi-path and flooding-based strategies. Most
Source routing protocols for mobile ad hoc networks. By          single-path strategies rely on two techniques: greedy
using location information, the proposed GRP with                forwarding and face routing. Greedy forwarding tries
Location Aware Routing (LAR) protocols limit the search          to bring the message closer to the destination in each
for a new route to a smaller request zone of the mobile ad       step using only local information. Thus, each node
hoc network. Our experimental results show the                   forwards the message to the neighbor that is most
effectiveness of performance on power consumption than           suitable from a local point of view. The most suitable
existing works.                                                  neighbor can be the one who minimizes the distance
                                                                 to the destination in each step (Greedy).
Keywords- MANET,         DSR,    GRP,    LARP,    Energy
Consumption                                                      Alternatively, one can consider another notion of
                                                                 progress, namely the projected distance on the
                     Introduction                                source-destination-line (MFR, NFP), or the minimum
                                                                 angle between neighbor and destination (Compass
Mobile ad hoc networks consist of wireless mobile                Routing). Not all of these strategies are loop-free, i.e.
hosts that communicate with each other, in the                   a message can circulate among nodes in a certain
absence of a fixed infrastructure.1 Routes between               constellation. It is known that the basic greedy
two hosts in a Mobile Ad hoc Network (MANET)                     strategy and MFR are loop free, while NFP and
may consist of hops through other hosts in the                   Compass Routing are not. Greedy forwarding can
network. Host mobility can cause frequent                        lead into a dead end, where there is no neighbor
unpredictable topology changes. Therefore, the task              closer to the destination. Then, face routing helps to
of finding and maintaining routes in MANET is                    recover from that situation and find a path to another


                                                                                                             172
                                        All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
          International Journal of Advanced Research in Computer Engineering & Technology
                                                               Volume 1, Issue 5, July 2012


node, where greedy forwarding can be resumed. A                second case we can use the energy efficient routing
recovery strategy such as face routing is necessary to         schemes.
assure that a message can be delivered to the                  Current technology supports power control by
destination. The combination of greedy forwarding              enabling the adaptation of power levels at individual
and face routing was first proposed in 1999 under the          nodes in an ad hoc network. Since the power required
name GFG (Greedy-Face-Greedy). It guarantees                   transmitting between two nodes increases with the
delivery in the so-called unit disk graph network              distance between the sender and the receiver, the
model. Various variants, which were proposed later,            power level directly affects the cost of
also for non-unit disk graphs, are based on the                communication. The power level defines the
principles of GFG [4-6]. This paper proposed an                communication range of the node and the topology of
approach to utilize location information using                 the network. Due to the impact on network topology,
Geographical Routing Protocol (GRP) to improve                 artificially limiting the power level to a maximum
performance of Dynamic Source routing protocols                transmit power level at individual nodes is called
for mobile ad hoc networks. By using location                  topology control.
information, the proposed GRP with Location Aware              MAC layer protocols coordinate all nodes within
Routing (LAR) protocols limit the search for a new             transmission range of both the sender and the
route to a smaller request zone of the mobile ad hoc           receiver. In the MAC protocols, the channel is
network.                                                       reserved through the transmission of RTS and CTS
                                                               messages. Node other than the destination node that
                                                               hears these messages backs off, allowing the
              Background Techniques
                                                               reserving nodes to communicate undisturbed. The
                                                               power level at which these control messages are sent
Power Management in MANET
                                                               defines the area in which other nodes are silenced,
The mobile nodes in an ad hoc network are limited
                                                               and so defines the spatial reuse in the network.
battery powered; power management is an important
                                                               Topology control determines the maximum power
issue in such networks. Battery power is a precious
                                                               level for each node in the network. So topology
resource that should be used effectively in order to
                                                               control protocols minimize power levels increase
avoid the early termination of nodes. Power
                                                               spatial reuse, reducing contention in the network and
management deals with the process of managing
                                                               reducing energy consumption due to interference and
resources by means of controlling the battery
                                                               contention. The use of different power levels
discharge, adjusting the transmission power, and
                                                               increases the potential capacity of the network.
scheduling of power sources so as to increase the life
                                                               Once the communication range of a node has been
time of nodes in the ad hoc networks. Battery
                                                               defined by the specific topology control protocol, the
management, transmission power management and
                                                               power level for data communication can be
system power management are three major methods
                                                               determined on a per-link or even per-packet basis. If
to increase the life time of nodes.
                                                               the receiver is inside the communication range
                                                               defined by the specific topology control protocol,
Mechanisms for Energy Consumption
                                                               energy can be saved by transmitting data at a lower
There are two mechanisms affect energy
                                                               power level determined by the distance between the
consumption, these are power control and power
                                                               sender and the receiver and the characteristics of the
management. If these mechanisms are not used
                                                               wireless communication channel.
wisely, the overall effect could be an increase in
                                                               Power aware routing reduces the power consumption
energy consumption or reduced communication in the
                                                               by finding the power efficient routes. At the network
network.
                                                               layer, routing algorithms must select routes that
      Power Control                                           minimize the total power needed to forward packets
The aim of communication-time power conservation               through the network, so-called minimum energy
is to reduce the amount of power used by individual            routing. Minimum energy routing is not optimal
nodes and by the aggregation of all nodes to transmit          because it leads to energy depletion of nodes along
data through the ad hoc network. Two components                frequently used routes and causing network
determine the cost of communication in the network.            partitions.
First one is direct node to node communication or
                                                                     Power Management
transmission. The transmission rate can be adapted by
                                                               Idle-time power conservation spans across all layers
the sender. Second is forwarding of data through the
                                                               of the communication protocol stack. Each layer has
networks. In the first case it can use the power control
                                                               different mechanisms to support power conservation.
techniques to conserve the power. Whereas in the
                                                               MAC layer protocols can save the power by keeping
                                                               the nodes in short term idle periods. Power


                                                                                                        173
                                      All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
           International Journal of Advanced Research in Computer Engineering & Technology
                                                                Volume 1, Issue 5, July 2012


management protocols integrate global information               Selection of Optimal Transmission Power: The
based on topology or traffic characteristics to                 transmission power determines the reach ability of
determine transitions between active mode and power             the nodes. With an increase in transmission power,
save mode. In ad hoc networks, the listening cost is            the battery charge also will increase. So it is
only slightly lower than the receiving cost. Listening          necessary to select an optimum transmission power
costs can be reduced by shutting off the device or              for effectively utilize the battery power.
placing the device in a low-power state when there is           Channel Utilization: The frequency reuse will
no active communication. The low-power state turns              increase with the reduction in transmission power.
off the receiver inside the device, essentially placing         Power control is required to maintain the required
the device in a suspended state from which it can be            SIR at receiver and to increase the channel reusability
resumed relatively quickly. But the time taken to               [5] and [6].
resume a node from completely off state is much
more and may consume more energy.                                                  Related Works
The aim of any device suspension protocol is to
remain awake the node when there is active                            Minimum Energy Routing (MER) Protocol
communication and otherwise suspend. Since both                 Minimum Energy Routing (MER) can be described
the sender and receiver must be awake to transmit               as the routing of a data-packet on a route that
and receive, it is necessary to ensure an overlap               consumes the minimum amount of energy to get
between awake times for nodes with pending                      the packet to the destination which requires the
communication.                                                  knowledge of the cost of a link in terms of the
Different methods such as periodic resume and                   energy expanded to successfully transfer and
triggered resume can be used when to resume a node              receive data packet over the link, the energy to
to listen the channel. In periodic resume, the node is          discover routes and the energy lost to maintain
suspend the nodes most of the time and periodically             routes. MER incurs higher routing overhead, but
resumes checking if any packet destined to it. If a             lower total energy and can bring down the energy
node has some packets destined for it, it remains               consumed of the simulated network within range of
awake until there are no more packets or until the end          the theoretical minimum the case of static and low
of the cycle [3-5].                                             mobility networks. However as the mobility
                                                                increases, the minimum energy routing protocol’s
The main reasons for power management in                        performance degrades although it still yields
MANETs are the following:                                       impressive reductions in energy as compared
                                                                performance of minimum hop routing protocol [6]
Limited Energy Reserve: The main reason for the                and [8].
development of ad hoc networks is to provide a
communication infrastructure in environments where                    Lifetime-aware Tree (LMT) Protocol
the setting up of fixed infrastructure is impossible. Ad        The Lifetime-aware tree routing algorithm
hoc networks have very limited power resources. The             maximizes the ad hoc network lifetime by finding
increasing gap between the power consumption                    routes that minimize the variance of the
requirements and power availability adds to the                 remaining energies of the nodes in the network.
importance of energy management.                                LMT maximizes the lifetime of a source based tree,
                                                                assuming that the energy required to transmit a
Difficulties in Replacing Batteries: In some                   packet is directly proportional to the forwarding
situations, it is very difficult to replace or recharge         distance. Hence, LMT is said to be biased towards
batteries. Power conservation is essential in such              the bottleneck node. Extensive simulation results
situations.                                                     were provided to evaluate the performance of
Lack of Central Coordination: The lack of                      LMT with respect to a number of different
central coordination necessitates some of the                   metrics (i.e., two definitions of the network lifetime,
intermediate node to act as relay nodes. If the                 the root mean square value of remaining energy, the
proportion of relay traffic is more, it may lead to a           packet delivery ratio, and the energy consumption
faster depletion of power source.                               per transmitted packet) in comparison to a variety of
Constraints on the Battery Source: Batteries will              existing routing algorithms and Least-cost Path
increase the size of the mobile nodes. If we reduce             Tree (LPT). These results clearly demonstrate the
the size of the battery, it will results in less capacity.      effectiveness of LMT over a wide range of simulated
So in addition to reducing the size of the battery,             scenarios [3] and [8].
energy management techniques are necessary.



                                                                                                          174
                                       All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
          International Journal of Advanced Research in Computer Engineering & Technology
                                                               Volume 1, Issue 5, July 2012


         Lifetime-aware Refining Energy Efficiency          chosen. CMMBCR protocol selects the shortest
          of Trees (L-REMIT)                                 path if all nodes in all possible routes have
Lifetime of a tree in terms of energy is the duration        adequate battery capacity (i.e. the greater
of the existence of the service until a node dies due        threshold). When the battery capacity for some
its lack of energy. L-REMIT is a distributed                 nodes goes below a predefined threshold, routes
protocol and is part of a group of protocols called          going through these nodes will be avoided, and
REMIT (Refining Energy efficiency of Trees). It              therefore the time until the first node failure, due to
uses a minimum-weight spanning tree (MST) as the             the exhaustion of battery capacity is extended. By
initial tree and improves its lifetime by switching          adjusting the value of the threshold, we can
children of a bottleneck node to another node in the         maximize either the time when the first node
tree. A tree is obtained from the “refined” MST              powers down or the lifetime of most nodes in the
(after all possible refinements have been done) by           network [10] and [11].
pruning the tree to reach only group nodes. L-
REMiT is a distributed algorithm in the sense that                           Proposed Mechanism
each node gets only a local view of the tree and each
node can independently switch its parent as long as          One possibility direction to assist routing in Mobile
the tree remains connected that utilizes an energy           Ad Hoc Network (MANET) is to use geographical
consumption model for wireless communication. L-             location information provided by positioning devices
REMiT takes into account the energy losses due               such as global positioning systems (GPS). Instead of
to radio transmission as well as transceiver                 searching the route in the entire network blindly,
electronics. L-REMiT adapts a given tree to a wide           position-based routing protocol uses the location
range of wireless networks irrespective of whether           information of mobile nodes to confine the route
they use long-range radios or short-range radios [1]         searching space into a smaller estimated range. The
and [4].                                                     smaller route searching space to be searched, the less
                                                             routing overhead and broadcast storm problem will
         Localized Energy-aware Routing (LEAR)              occur. In this paper, we proposed GRP based
          Protocol                                           Location Aware Routing (LAR) protocols limit the
Local       Energy-Aware        Routing        (LEAR)        search for a new route to a smaller request zone of
simultaneously optimizes trade-off between balanced          the mobile ad hoc network.
energy consumption and minimum routing delay
and also avoids the blocking and route cache                 Proposed GRP based Location Aware Routing
problems. LEAR accomplishes balanced energy                  (LAR) protocol
consumption based only on local information, thus            We now describe the GRP based Location Aware
removes the blocking property. Based on the                  Routing (LAR) algorithm. As mentioned in the
simplicity of LEAR, it can be easily be integrated           introduction, we are interested in routing queries to
into existing ad hoc routing algorithms without              regions in proposed sensor-net applications. The
affecting other layers of communication protocols.           process of forwarding a packet to all the nodes in the
Simulation results show that energy usage is better          target region consists of two phases:
distributed with the LEAR algorithm as much as
35% better compared to the DSR algorithm. LEAR is            1. Forwarding the packets towards the target
the first protocol to explore balanced energy                region:
consumption in a pragmatic environment where                 GRP based Location Aware Routing uses a
routing algorithms, mobility and radio propagation           geographical and energy aware neighbor selection
models are all considered [3] and [4] and [8].               heuristic to route the packet towards the target region.
                                                             There are two cases to consider:
        Conditional Max-Min Battery Capacity                (a) When a closer neighbor to the destination exists:
         Routing (CMMBCR) Protocol                           GRP based Location Aware Routing picks a next-hop
The Conditional Max-Min battery capacity routing             node among all neighbors that are closer to the
(CMMBCR) protocol utilizes the idea of a threshold           destination.
to maximize the lifetime of each node and to fairly          (b) When all neighbors are further away: In this case,
use the battery fairly. If all nodes in some possible        there is a hole. GRP based Location Aware Routing
routes between a source-destination pair have larger         picks a next-hop node that minimizes some cost
remaining battery energy than the threshold, the min-        value of this neighbor.
power route among those routes is chosen [3]. If all
possible routes have nodes with lower battery
capacity than the threshold, the max-min route is

                                                                                                        175
                                    All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
           International Journal of Advanced Research in Computer Engineering & Technology
                                                                Volume 1, Issue 5, July 2012


2. Disseminating the packet within the region:                  levels of N, Nmin and the distance between these two
Under most conditions, we use a Recursive                       neighbors.
Geographic Forwarding algorithm to disseminate the              The intuition for minimizing the estimated cost
packet within the region. However, under some low               function C (N, R) is as follows:
density conditions, recursive geographic forwarding             When all nodes have equal energy, these
sometimes does not terminate, routing uselessly                 degenerates to the classical greedy geographic
around an empty target region before the packet’s               forwarding: forwarding the packet to the nearest
hop-count exceeds some bound.                                   neighbor to destination.
Assumptions:                                                    When all neighbors are equidistant, this
1. Each query packet has a target region specified in           degenerates to load splitting among neighbors. Note
some way (for the description of the algorithm, we              that minimizing the energy cost among neighbors is a
assume a rectangular region specification).                     local approximation to the lowest energy cost path, if
2. Each node knows its own location and remaining               it is more expensive to use a node that has less
energy level, and its neighbors’ locations and                  remaining energy. Since GRP based Location Aware
remaining energy levels through a simple neighbor               Routing makes forwarding decision only based on
hello protocol.                                                 local knowledge, an approximation to the global
Note that a node can obtain its location information at         lowest cost path is the best that a local algorithm can
low cost from GPS or some localization system                   achieve.
which presumably is already available due to the
needs of sensor net applications.                               Now that a node has a learned cost state h (N, R)) or
3. The link is bi-directional, i.e., if a node hears from       a default estimated cost function c (N, R)) for each
a neighbor Ni, then its transmission range can reach            neighbor, we now describe the forwarding actions at
Ni. This is not an unreasonable choice as most MAC              node N. As with other geographical routing schemes,
layer protocols, such as IEEE 802.11, assume                    there are two cases to consider:
symmetric links.
                                                                    1.      If at least one neighbor of N is closer to D
Neighbor Computation                                                        than n;
We assume that the node N is forwarding Packet P,                   2.      All neighbors are further away from D than
whose target region is R. The centroid of the target                        N.
region is D. Upon receiving a packet P, the node N
routes P progressively towards the target region, and                 Closer Neighbor
at the same time tries to balance the energy                    As mentioned before, under GRP based Location
consumption across all its neighbors. Node N                    Aware routing, the packet contains a target region
achieves this trade-off by minimizing the learned cost          field. Therefore, a forwarding node can make locally
h (Ni, R)) value of its neighbor Ni. Each node N                greedy choice in selecting next-hop node. Whenever
maintains state h (N, R)) which we call its learned             a node N receives a packet, it will pick the next hop
cost to region R. A node infrequently updates its h             among the neighbors that are closer to the
(N, R) h (N, R) value to its neighbors. We discuss              destination, at the same time, minimizing the learned
this infrequent update later. We implicitly define h            cost value h (Ni, R). Since it picks a next-hop node
(N, R) in the next. If a node does not have h (Ni, R))          from closer neighbors, it will route progressively
state for a neighbor Ni, it computes the estimated cost         towards the target region when there are no holes.
c (Ni, R) as a default value for h (Ni, R) The                  Without holes, the learned cost is a combination of
estimated cost c (Ni, R)) of Ni is defined as follows:          consumed energy and distance, minimizing the
c (Ni, R) = αd (Ni, R) + (1-α) e (Ni)……………(1)                   learned cost value is a trade-off between routing
Where α is a tunable weight, d (Ni, R)) is the distance         towards the next-hop closest to the destination and
from Ni i to the centroid D of region R normalized              balancing energy usage.
by the largest such distance among all neighbors of
N, and e (Ni) is the consumed energy at node Ni                       Neighbors are Farther Away
normalized by the largest consumed energy among                 In this case, N knows it is in a hole. A node’s learned
neighbors of N.                                                 Cost h (N, R)) and its update rule are combined to
After a node picks a next-hop neighbor Nmin, it sets            circumvent holes. Intuitively, when there is no hole
its own h (N, R)) to h (Nmin, R) + C (N, Nmin)                  in the path towards R, the nodes learned cost h (Ni,
where the latter term is the cost of transmitting a             R) is equivalent to the estimated cost c (Ni, R).
packet from N to Nmin. C (N, Nmin) can also be a                However, when there is a hole in the path towards R,
combination function of both the remaining energy               the node’s learned cost represents “resistance” to



                                                                                                            176
                                       All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
          International Journal of Advanced Research in Computer Engineering & Technology
                                                               Volume 1, Issue 5, July 2012


following the path towards that hole; “resistance” that        Recursive Forwarding
the estimated cost cannot provide.
Suppose the distance between the nearest two                   Before a packet reaches the target region R, we use
neighbors is 1, and each node can reach its 8                  the forwarding rules described in the previous
neighbors. The nodes in black, i.e., G, H, I are energy        section. Once the packet is inside the target region, a
depleted nodes, thereby cannot relay packets.                  simple flooding with duplicate suppression scheme
Suppose node S wants to send a packet to region R              can be used to flood the packet inside region R.
with centroid at T. For illustration purposes, we use T        However, flooding is expensive in terms of energy
to denote this region. Again, for simplicity, we               consumption, due to the fact that in this simple
illustrate the algorithm using pure geographic                 flooding scheme, every node has to broadcast once,
routing, i.e., we set in Equation 1 to be 1, and we use        and all its neighbors receive this broadcast message.
direct distance instead of normalized distance                 This is especially expensive in high-density
mentioned.                                                     networks, which is the case for some proposed sensor
After the first packet reaches the destination, the            net applications where nodes are densely and
correct learned cost value will be propagated one-hop          redundantly deployed for robustness. This
back. Every time a packet is delivered, the correct            demonstrates the necessity to use an energy efficient
learned cost value will be propagated one hop away.            routing algorithm in place of flooding in
Therefore, suppose the path length from S to T is n,           disseminating the packet inside the target region, or
the learned cost will converge after the node delivers         any kind of flooding in sensor networks.
n packets to the same target T. Note that the                  Therefore, we use a Recursive Geographic
convergence of learned cost does not affect                    Forwarding approach to disseminate the packet inside
successfully routing a packet out of holes, it only            target region R. Suppose the target region R is the big
affects how efficient is the hole routing path.                rectangle, and now node Ni receives a packet P for
Propagating the learned cost values further upstream           region R, and finds itself inside R. In this case, Ni
through the update rule will enable the packet to have         creates four new copies of p bound to 4 sub-regions
an earlier chance to avoid holes (i.e., more effectively       of region R. Repeat this recursive splitting and
circumnavigate holes), and at the same time avoid              forwarding procedure until the stop condition for
depleting the nodes surrounding the holes.                     recursive splitting and forwarding are satisfied.
The learned costs together with its update rule help to        The recursive splitting terminates if the current node
learn the route around holes. Intuitively, the learned         is the only one inside this sub-region. The criteria to
cost is set to the current best choice available. The          determine this is when the farthest point of the region
estimated cost c (N, R) is a combination of the                is within a node’s transmission range.
normalized distance from a neighbor to the
destination and its normalized remaining energy                                  Results Analysis
level. In equation 1, it can be adjusted to emphasize
minimizing path length to the destination or
balancing energy consumption. We tried several                 Simulation Environment
variants of this estimated cost function. For example,
we tried different energy cost functions and different         In this paper we proposed location information using
normalization denominators. The simulation results             Geographical Routing Protocol (GRP) to improve
show that the algorithm performance is not very                performance of Dynamic Source routing protocols
sensitive to the particular estimated cost function.           was successfully implemented using OPNET modeler
Our explanation is that it is the comparison (relative         14.0, in which I have implemented the algorithm in
value among all the neighbors), not the absolute               existing techniques by making necessary changes in
estimated cost value that matters, since it is used to         the existing system. The following choices are made
make a local selection among all the neighbors. For            for simulation considering accuracy of result and
computing c (N, R), each node needs to know                    available resources. Then, we carry out quantitative
neighbors’ energy levels and locations. A node also            and comprehensive evaluation of performance in
needs neighbors’ learned cost to make forwarding               terms of time, overall performance ratio, and traffic
decisions. Various techniques are possible: e.g.,              sensitivity. The simulation parameters of our paper
piggybacking these on data traffic, requesting this            work as follows:
information on demand, advertising the information
only when its value changes significantly, or a
combination of the above.




                                                                                                         177
                                      All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
           International Journal of Advanced Research in Computer Engineering & Technology
                                                                Volume 1, Issue 5, July 2012


Length of WMN                        1000 (M)                   because as the node mobility increases the network
No. of mobile nodes                  20-3000                    topology changes making nodes send RREQ packets
Packet rate of normal connection     1                          more frequently. The proposed GRP with Location
Movement Model                       Random Waypoint            Aware Routing (LAR) Protocol schemes increases
Traffic type                         CBR, FTP                   the delivery ratio compare with GRP without
Max. mode speed                      5 m/s – 60 m/s             Location Aware Routing (LAR).
No. of connections between nodes     5 – 60
Pause time                           10 s                       Average end-to-end delay
Rate ( packet per sec)               2 packets/s                End-to-end delay in proposed GRP with Location
Data payload (packet size)           28 – 1024 bytes            Aware Routing (LAR) Protocol schemes under
                                                                congestion is high because the adversary node waits
              Table 1 Simulation parameters
                                                                before sending route reply packet. This waiting time
 The random waypoint model is chosen for movement               is random with a maximum equal to the time taken
 patterns. In the random waypoint model of mobility,            by a packet to travel through network diameter as the
 nodes choose a destination and move in a straight line         adversary gives an impression that the packet
 toward the destination at a speed uniformly                    traveled to the actual node. This affects the end-to-
 distributed between 0 meters/second (m/s) and some             end delay, especially for packets whose destinations
 maximum speed. When a node reaches its                         are quite close to source nodes. Thus, end-to-end
 destination, it stays during a specified period of time        delay shows more random pattern for proposed GRP
 called pause time, chooses a new destination and               with Location Aware Routing (LAR) than proposed
 begins moving towards it immediately in the same               GRP without Location Aware Routing (LAR). The
 speed. Depending on number of connections and                  proposed GRP with Location Aware Routing (LAR)
 maximum node speeds, we have designed different                Protocol schemes under traffic restores back the end-
 simulation scenarios on average throughput, and end            to-end delay and the performance better than
 to end delay.                                                  proposed GRP without Location Aware Routing
                                                                (LAR) Protocol schemes.
 Performance Metrics
                                                                                     Conclusion
 The performance metrics used for the comparison are
 the same as those used for evaluating the proposed             In this paper we compared the two protocols DSR
 GRP with Location Aware Routing (LAR) protocols.               (dynamic source routing) and LARP (Local
                                                                Awareness Routing Protocol) for proposing third
 The efficiency of data packet delivery is defined             routing      protocol       GRP       with      LARP.
 as the measured ratio of the number of data packets            DSR is continuously sending packet to every
 delivered to their destinations to the number of all           different node without any request by any node and
 packets generated in the network. Note that each time          wait for their acknowledgement and then send the
 a packet is forwarded this is counted as one packet            packet to it. LARP send the packet only when the
 transmission.                                                  node has any request or any requirement. Hence we
                                                                know that in mobile ad-hoc network node move from
 Average end-to-end delay of transferred data                  different place to place. And in our proposed work
 packets includes all possible delays caused by                 GRP (Geographic routing protocol) with LARP. GRP
 buffering during route discovery, queuing at the               help us to calculate distance. GRP is used to calculate
 interface-queue and retransmission delays at the               the distance between requesting node from the master
 medium access control layer.                                   node and when there is minimum distance from
                                                                master node to requesting/receiver node. The
 The efficiency of data packet delivery ratio                   proposed protocols limit the search for a route to the
 The delivery ratio is plotted against the node mobility        so-called request zone, determined based on the
 we observe that GRP with Location Aware Routing                expected location of the destination node at the time
 (LAR) protocol schemes performs better in low node             of route discovery.
 mobility rate while as the mobility rate increases the
 delivery ratio slightly drops. The performance of the
 network is also significantly reduced when GRP with
 Location Aware Routing (LAR) protocol schemes are
 under congestion and the node mobility increases
 with respect to GRP without Location Aware Routing
 (LAR) protocol. However, this behavior is normal


                                                                                                          178
                                       All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
         International Journal of Advanced Research in Computer Engineering & Technology
                                                              Volume 1, Issue 5, July 2012


                   References

[1] Kirti Aniruddha Adoni and Radhika D. Joshi,           [8] M. Maleki and M. Pedram, “Lifetime-Aware
“Optimization of Energy Consumption for OLSR              Multicast Routing in Wireless Ad hoc Networks”,
Routing Protocol in MANET”, International Journal         Proceedings of IEEE Wireless Communications and
of Wireless & Mobile Networks (IJWMN) Vol. 4, No.         Networking Conference, 2004.
1, February 2012, pp. 251-262.
                                                          [9] M. Gerla, S.J. Lee, W. Su, On-Demand Multicast
[2] Ashish Kumar, M. Q. Rafiq and Kamal Bansal,           Routing Protocol (ODMRP) for Ad-hoc Networks,
“ Performance Evaluation of Energy Consumption            Internet draft, draft-ietf-manet-odmrp-02.txt, 2000.
in MANET”, International Journal of Computer
Applications (0975 – 8887) Volume 42– No.2, March         [10] J. Kao, R. Marculescu, “ Predictive
2012, pp. 7-12.                                           Energy-efficient Multicast for Large Scale
                                                          Mobile Ad Hoc Networks”, Communications and
[3] M. Mohammed, “Energy Efficient Location               Networking Conference, pp. 709-713, January
Aided Routing Protocol for Wireless MANETs“,              2008.
International Journal of Computer Science and
Information Security, vol. 4, no. 1 & 2, 2009.            [11] V. Rishiwal, M. Yadav, S. Verma, S. K.
                                                          Bajapai, “Power Aware Routing in Ad Hoc
                                                          Wireless Networks, Journal of Computer Science
[4] O. Tariq, F. Greg & W. Murray, “ On the               and Technology, vol. 9, no. 2, pp. 101-109, October
Effect of Traffic Model to the Performance                2009”.
Evaluation of Multicast Protocols in MANET”,
Proceedings of the Canadian Conference on
Electrical and Computer Engineering, pp. 404–407,
2005.

[5] B. Wang and S. K. S. Gupta, “On Maximizing
Lifetime of Multicast Trees in Wireless Ad hoc
Networks”, Proceedings of the IEEE International
Conference on Parallel Processing, 2003.

[6] R. Vaishampayan, J.J. Garcia-Luna-Aceves,
“ Energy Efficient and Robust Multicast Routing
in Mobile Ad Hoc Networks”, Proceedings of the
IEEE International Conference on Mobile Ad-hoc
and Sensor Systems, 2004.

[7] Y. Lia, X. Chengb and W. Wuc, “ Optimal
Topology    Control   for  Balanced    Energy
Consumption in Wireless Networks”. J. Parallel
and Distributed Computing, vol. 65, no. 2, pp.
124 – 131, February 2005.




                                                                                                  179
                                 All Rights Reserved © 2012 IJARCET

Weitere ähnliche Inhalte

Was ist angesagt?

OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...IJASCSE
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512IJRAT
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingIOSR Journals
 
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...IJEEE
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsNarendra Singh Yadav
 

Was ist angesagt? (15)

J1102026164
J1102026164J1102026164
J1102026164
 
Jp3417421749
Jp3417421749Jp3417421749
Jp3417421749
 
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
 
Hs2413641369
Hs2413641369Hs2413641369
Hs2413641369
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided Routing
 
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
Br31467472
Br31467472Br31467472
Br31467472
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 

Andere mochten auch (9)

158 162
158 162158 162
158 162
 
134 138
134 138134 138
134 138
 
22 27
22 2722 27
22 27
 
331 340
331 340331 340
331 340
 
213 221
213 221213 221
213 221
 
18 23
18 2318 23
18 23
 
106 110
106 110106 110
106 110
 
51 59
51 5951 59
51 59
 
699 703
699 703699 703
699 703
 

Ähnlich wie 172 179

Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...IJSRD
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...IJRES Journal
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
 
1 p pranitha final_paper--1-5
1 p pranitha final_paper--1-51 p pranitha final_paper--1-5
1 p pranitha final_paper--1-5Alexander Decker
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijasuc
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijasuc
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijsptm
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijasuc
 
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANETIntegrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANETijsrd.com
 
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANETVARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANETcscpconf
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewBRNSSPublicationHubI
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
 
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkLink Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkIOSR Journals
 

Ähnlich wie 172 179 (20)

Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
 
Ly2520762079
Ly2520762079Ly2520762079
Ly2520762079
 
Ly2520762079
Ly2520762079Ly2520762079
Ly2520762079
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
Mw2522122216
Mw2522122216Mw2522122216
Mw2522122216
 
1 p pranitha final_paper--1-5
1 p pranitha final_paper--1-51 p pranitha final_paper--1-5
1 p pranitha final_paper--1-5
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANETIntegrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
 
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANETVARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
 
498 503
498 503498 503
498 503
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
 
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkLink Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
 
CHAPTER-1234
CHAPTER-1234CHAPTER-1234
CHAPTER-1234
 
Mane ts
Mane tsMane ts
Mane ts
 

Mehr von Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Mehr von Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Kürzlich hochgeladen

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Kürzlich hochgeladen (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

172 179

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Energy Efficient Geographical Routing Protocol with Location Aware Routing in MANET Shwaita Kodesia Asst. Prof. PremNarayan Arya M.Tech Research Scholar Department of Computer Application Department of Computer Application Samrat Ashok Technological Institute Samrat Ashok Technological Institute Vidisha (M.P.), India Vidisha (M.P.), India premnarayan.arya@rediffmail.com shwaitakodesia20@india.com Abstract- nontrivial. Many protocols have been proposed for mobile ad hoc networks, with the goal of achieving A Mobile Ad hoc Network (MANET) is a kind of wireless efficient routing. Geographic routing (also ad-hoc network, and is a self configuring network of called geo-routing or position-based routing) is mobile routers (and associated hosts) connected by wireless links the union of which forms an arbitrary a routing principle that relies on geographic position topology. The routers are free to move randomly and information. It is mainly proposed for wireless organize themselves arbitrarily, thus the network's networks and based on the idea that the source sends wireless topology may change rapidly and unpredictably. a message to the geographic location of the Energy is a vital resource for MANET. The amount of destination instead of using the network address. The work one can perform while mobile node is idea of using position information for routing was fundamentally constrained by the limited energy supplied first proposed in the 1980s in the area of packet radio by one’s battery. Dynamic Source Routing (DSR) protocol networks and interconnection networks. Geographic is one of the most well known routing algorithms for ad routing requires that each node can determine its own hoc wireless networks. DSR uses source routing, which allows packet routing to be loop free. DSR increases its location and that the source is aware of the location efficiency by allowing nodes that are either forwarding of the destination. With this information a message route discovery requests or overhearing packets through can be routed to the destination without knowledge of having frequent listening mode to cache the routing the network topology or a prior route discovery [1-2]. information. This paper suggests an approach to utilize There are various approaches, such as single-path, location information using Geographical Routing Protocol (GRP) to improve performance of Dynamic multi-path and flooding-based strategies. Most Source routing protocols for mobile ad hoc networks. By single-path strategies rely on two techniques: greedy using location information, the proposed GRP with forwarding and face routing. Greedy forwarding tries Location Aware Routing (LAR) protocols limit the search to bring the message closer to the destination in each for a new route to a smaller request zone of the mobile ad step using only local information. Thus, each node hoc network. Our experimental results show the forwards the message to the neighbor that is most effectiveness of performance on power consumption than suitable from a local point of view. The most suitable existing works. neighbor can be the one who minimizes the distance to the destination in each step (Greedy). Keywords- MANET, DSR, GRP, LARP, Energy Consumption Alternatively, one can consider another notion of progress, namely the projected distance on the Introduction source-destination-line (MFR, NFP), or the minimum angle between neighbor and destination (Compass Mobile ad hoc networks consist of wireless mobile Routing). Not all of these strategies are loop-free, i.e. hosts that communicate with each other, in the a message can circulate among nodes in a certain absence of a fixed infrastructure.1 Routes between constellation. It is known that the basic greedy two hosts in a Mobile Ad hoc Network (MANET) strategy and MFR are loop free, while NFP and may consist of hops through other hosts in the Compass Routing are not. Greedy forwarding can network. Host mobility can cause frequent lead into a dead end, where there is no neighbor unpredictable topology changes. Therefore, the task closer to the destination. Then, face routing helps to of finding and maintaining routes in MANET is recover from that situation and find a path to another 172 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 node, where greedy forwarding can be resumed. A second case we can use the energy efficient routing recovery strategy such as face routing is necessary to schemes. assure that a message can be delivered to the Current technology supports power control by destination. The combination of greedy forwarding enabling the adaptation of power levels at individual and face routing was first proposed in 1999 under the nodes in an ad hoc network. Since the power required name GFG (Greedy-Face-Greedy). It guarantees transmitting between two nodes increases with the delivery in the so-called unit disk graph network distance between the sender and the receiver, the model. Various variants, which were proposed later, power level directly affects the cost of also for non-unit disk graphs, are based on the communication. The power level defines the principles of GFG [4-6]. This paper proposed an communication range of the node and the topology of approach to utilize location information using the network. Due to the impact on network topology, Geographical Routing Protocol (GRP) to improve artificially limiting the power level to a maximum performance of Dynamic Source routing protocols transmit power level at individual nodes is called for mobile ad hoc networks. By using location topology control. information, the proposed GRP with Location Aware MAC layer protocols coordinate all nodes within Routing (LAR) protocols limit the search for a new transmission range of both the sender and the route to a smaller request zone of the mobile ad hoc receiver. In the MAC protocols, the channel is network. reserved through the transmission of RTS and CTS messages. Node other than the destination node that hears these messages backs off, allowing the Background Techniques reserving nodes to communicate undisturbed. The power level at which these control messages are sent Power Management in MANET defines the area in which other nodes are silenced, The mobile nodes in an ad hoc network are limited and so defines the spatial reuse in the network. battery powered; power management is an important Topology control determines the maximum power issue in such networks. Battery power is a precious level for each node in the network. So topology resource that should be used effectively in order to control protocols minimize power levels increase avoid the early termination of nodes. Power spatial reuse, reducing contention in the network and management deals with the process of managing reducing energy consumption due to interference and resources by means of controlling the battery contention. The use of different power levels discharge, adjusting the transmission power, and increases the potential capacity of the network. scheduling of power sources so as to increase the life Once the communication range of a node has been time of nodes in the ad hoc networks. Battery defined by the specific topology control protocol, the management, transmission power management and power level for data communication can be system power management are three major methods determined on a per-link or even per-packet basis. If to increase the life time of nodes. the receiver is inside the communication range defined by the specific topology control protocol, Mechanisms for Energy Consumption energy can be saved by transmitting data at a lower There are two mechanisms affect energy power level determined by the distance between the consumption, these are power control and power sender and the receiver and the characteristics of the management. If these mechanisms are not used wireless communication channel. wisely, the overall effect could be an increase in Power aware routing reduces the power consumption energy consumption or reduced communication in the by finding the power efficient routes. At the network network. layer, routing algorithms must select routes that  Power Control minimize the total power needed to forward packets The aim of communication-time power conservation through the network, so-called minimum energy is to reduce the amount of power used by individual routing. Minimum energy routing is not optimal nodes and by the aggregation of all nodes to transmit because it leads to energy depletion of nodes along data through the ad hoc network. Two components frequently used routes and causing network determine the cost of communication in the network. partitions. First one is direct node to node communication or  Power Management transmission. The transmission rate can be adapted by Idle-time power conservation spans across all layers the sender. Second is forwarding of data through the of the communication protocol stack. Each layer has networks. In the first case it can use the power control different mechanisms to support power conservation. techniques to conserve the power. Whereas in the MAC layer protocols can save the power by keeping the nodes in short term idle periods. Power 173 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 management protocols integrate global information Selection of Optimal Transmission Power: The based on topology or traffic characteristics to transmission power determines the reach ability of determine transitions between active mode and power the nodes. With an increase in transmission power, save mode. In ad hoc networks, the listening cost is the battery charge also will increase. So it is only slightly lower than the receiving cost. Listening necessary to select an optimum transmission power costs can be reduced by shutting off the device or for effectively utilize the battery power. placing the device in a low-power state when there is Channel Utilization: The frequency reuse will no active communication. The low-power state turns increase with the reduction in transmission power. off the receiver inside the device, essentially placing Power control is required to maintain the required the device in a suspended state from which it can be SIR at receiver and to increase the channel reusability resumed relatively quickly. But the time taken to [5] and [6]. resume a node from completely off state is much more and may consume more energy. Related Works The aim of any device suspension protocol is to remain awake the node when there is active  Minimum Energy Routing (MER) Protocol communication and otherwise suspend. Since both Minimum Energy Routing (MER) can be described the sender and receiver must be awake to transmit as the routing of a data-packet on a route that and receive, it is necessary to ensure an overlap consumes the minimum amount of energy to get between awake times for nodes with pending the packet to the destination which requires the communication. knowledge of the cost of a link in terms of the Different methods such as periodic resume and energy expanded to successfully transfer and triggered resume can be used when to resume a node receive data packet over the link, the energy to to listen the channel. In periodic resume, the node is discover routes and the energy lost to maintain suspend the nodes most of the time and periodically routes. MER incurs higher routing overhead, but resumes checking if any packet destined to it. If a lower total energy and can bring down the energy node has some packets destined for it, it remains consumed of the simulated network within range of awake until there are no more packets or until the end the theoretical minimum the case of static and low of the cycle [3-5]. mobility networks. However as the mobility increases, the minimum energy routing protocol’s The main reasons for power management in performance degrades although it still yields MANETs are the following: impressive reductions in energy as compared performance of minimum hop routing protocol [6] Limited Energy Reserve: The main reason for the and [8]. development of ad hoc networks is to provide a communication infrastructure in environments where  Lifetime-aware Tree (LMT) Protocol the setting up of fixed infrastructure is impossible. Ad The Lifetime-aware tree routing algorithm hoc networks have very limited power resources. The maximizes the ad hoc network lifetime by finding increasing gap between the power consumption routes that minimize the variance of the requirements and power availability adds to the remaining energies of the nodes in the network. importance of energy management. LMT maximizes the lifetime of a source based tree, assuming that the energy required to transmit a Difficulties in Replacing Batteries: In some packet is directly proportional to the forwarding situations, it is very difficult to replace or recharge distance. Hence, LMT is said to be biased towards batteries. Power conservation is essential in such the bottleneck node. Extensive simulation results situations. were provided to evaluate the performance of Lack of Central Coordination: The lack of LMT with respect to a number of different central coordination necessitates some of the metrics (i.e., two definitions of the network lifetime, intermediate node to act as relay nodes. If the the root mean square value of remaining energy, the proportion of relay traffic is more, it may lead to a packet delivery ratio, and the energy consumption faster depletion of power source. per transmitted packet) in comparison to a variety of Constraints on the Battery Source: Batteries will existing routing algorithms and Least-cost Path increase the size of the mobile nodes. If we reduce Tree (LPT). These results clearly demonstrate the the size of the battery, it will results in less capacity. effectiveness of LMT over a wide range of simulated So in addition to reducing the size of the battery, scenarios [3] and [8]. energy management techniques are necessary. 174 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012  Lifetime-aware Refining Energy Efficiency chosen. CMMBCR protocol selects the shortest of Trees (L-REMIT) path if all nodes in all possible routes have Lifetime of a tree in terms of energy is the duration adequate battery capacity (i.e. the greater of the existence of the service until a node dies due threshold). When the battery capacity for some its lack of energy. L-REMIT is a distributed nodes goes below a predefined threshold, routes protocol and is part of a group of protocols called going through these nodes will be avoided, and REMIT (Refining Energy efficiency of Trees). It therefore the time until the first node failure, due to uses a minimum-weight spanning tree (MST) as the the exhaustion of battery capacity is extended. By initial tree and improves its lifetime by switching adjusting the value of the threshold, we can children of a bottleneck node to another node in the maximize either the time when the first node tree. A tree is obtained from the “refined” MST powers down or the lifetime of most nodes in the (after all possible refinements have been done) by network [10] and [11]. pruning the tree to reach only group nodes. L- REMiT is a distributed algorithm in the sense that Proposed Mechanism each node gets only a local view of the tree and each node can independently switch its parent as long as One possibility direction to assist routing in Mobile the tree remains connected that utilizes an energy Ad Hoc Network (MANET) is to use geographical consumption model for wireless communication. L- location information provided by positioning devices REMiT takes into account the energy losses due such as global positioning systems (GPS). Instead of to radio transmission as well as transceiver searching the route in the entire network blindly, electronics. L-REMiT adapts a given tree to a wide position-based routing protocol uses the location range of wireless networks irrespective of whether information of mobile nodes to confine the route they use long-range radios or short-range radios [1] searching space into a smaller estimated range. The and [4]. smaller route searching space to be searched, the less routing overhead and broadcast storm problem will  Localized Energy-aware Routing (LEAR) occur. In this paper, we proposed GRP based Protocol Location Aware Routing (LAR) protocols limit the Local Energy-Aware Routing (LEAR) search for a new route to a smaller request zone of simultaneously optimizes trade-off between balanced the mobile ad hoc network. energy consumption and minimum routing delay and also avoids the blocking and route cache Proposed GRP based Location Aware Routing problems. LEAR accomplishes balanced energy (LAR) protocol consumption based only on local information, thus We now describe the GRP based Location Aware removes the blocking property. Based on the Routing (LAR) algorithm. As mentioned in the simplicity of LEAR, it can be easily be integrated introduction, we are interested in routing queries to into existing ad hoc routing algorithms without regions in proposed sensor-net applications. The affecting other layers of communication protocols. process of forwarding a packet to all the nodes in the Simulation results show that energy usage is better target region consists of two phases: distributed with the LEAR algorithm as much as 35% better compared to the DSR algorithm. LEAR is 1. Forwarding the packets towards the target the first protocol to explore balanced energy region: consumption in a pragmatic environment where GRP based Location Aware Routing uses a routing algorithms, mobility and radio propagation geographical and energy aware neighbor selection models are all considered [3] and [4] and [8]. heuristic to route the packet towards the target region. There are two cases to consider:  Conditional Max-Min Battery Capacity (a) When a closer neighbor to the destination exists: Routing (CMMBCR) Protocol GRP based Location Aware Routing picks a next-hop The Conditional Max-Min battery capacity routing node among all neighbors that are closer to the (CMMBCR) protocol utilizes the idea of a threshold destination. to maximize the lifetime of each node and to fairly (b) When all neighbors are further away: In this case, use the battery fairly. If all nodes in some possible there is a hole. GRP based Location Aware Routing routes between a source-destination pair have larger picks a next-hop node that minimizes some cost remaining battery energy than the threshold, the min- value of this neighbor. power route among those routes is chosen [3]. If all possible routes have nodes with lower battery capacity than the threshold, the max-min route is 175 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 2. Disseminating the packet within the region: levels of N, Nmin and the distance between these two Under most conditions, we use a Recursive neighbors. Geographic Forwarding algorithm to disseminate the The intuition for minimizing the estimated cost packet within the region. However, under some low function C (N, R) is as follows: density conditions, recursive geographic forwarding When all nodes have equal energy, these sometimes does not terminate, routing uselessly degenerates to the classical greedy geographic around an empty target region before the packet’s forwarding: forwarding the packet to the nearest hop-count exceeds some bound. neighbor to destination. Assumptions: When all neighbors are equidistant, this 1. Each query packet has a target region specified in degenerates to load splitting among neighbors. Note some way (for the description of the algorithm, we that minimizing the energy cost among neighbors is a assume a rectangular region specification). local approximation to the lowest energy cost path, if 2. Each node knows its own location and remaining it is more expensive to use a node that has less energy level, and its neighbors’ locations and remaining energy. Since GRP based Location Aware remaining energy levels through a simple neighbor Routing makes forwarding decision only based on hello protocol. local knowledge, an approximation to the global Note that a node can obtain its location information at lowest cost path is the best that a local algorithm can low cost from GPS or some localization system achieve. which presumably is already available due to the needs of sensor net applications. Now that a node has a learned cost state h (N, R)) or 3. The link is bi-directional, i.e., if a node hears from a default estimated cost function c (N, R)) for each a neighbor Ni, then its transmission range can reach neighbor, we now describe the forwarding actions at Ni. This is not an unreasonable choice as most MAC node N. As with other geographical routing schemes, layer protocols, such as IEEE 802.11, assume there are two cases to consider: symmetric links. 1. If at least one neighbor of N is closer to D Neighbor Computation than n; We assume that the node N is forwarding Packet P, 2. All neighbors are further away from D than whose target region is R. The centroid of the target N. region is D. Upon receiving a packet P, the node N routes P progressively towards the target region, and  Closer Neighbor at the same time tries to balance the energy As mentioned before, under GRP based Location consumption across all its neighbors. Node N Aware routing, the packet contains a target region achieves this trade-off by minimizing the learned cost field. Therefore, a forwarding node can make locally h (Ni, R)) value of its neighbor Ni. Each node N greedy choice in selecting next-hop node. Whenever maintains state h (N, R)) which we call its learned a node N receives a packet, it will pick the next hop cost to region R. A node infrequently updates its h among the neighbors that are closer to the (N, R) h (N, R) value to its neighbors. We discuss destination, at the same time, minimizing the learned this infrequent update later. We implicitly define h cost value h (Ni, R). Since it picks a next-hop node (N, R) in the next. If a node does not have h (Ni, R)) from closer neighbors, it will route progressively state for a neighbor Ni, it computes the estimated cost towards the target region when there are no holes. c (Ni, R) as a default value for h (Ni, R) The Without holes, the learned cost is a combination of estimated cost c (Ni, R)) of Ni is defined as follows: consumed energy and distance, minimizing the c (Ni, R) = αd (Ni, R) + (1-α) e (Ni)……………(1) learned cost value is a trade-off between routing Where α is a tunable weight, d (Ni, R)) is the distance towards the next-hop closest to the destination and from Ni i to the centroid D of region R normalized balancing energy usage. by the largest such distance among all neighbors of N, and e (Ni) is the consumed energy at node Ni  Neighbors are Farther Away normalized by the largest consumed energy among In this case, N knows it is in a hole. A node’s learned neighbors of N. Cost h (N, R)) and its update rule are combined to After a node picks a next-hop neighbor Nmin, it sets circumvent holes. Intuitively, when there is no hole its own h (N, R)) to h (Nmin, R) + C (N, Nmin) in the path towards R, the nodes learned cost h (Ni, where the latter term is the cost of transmitting a R) is equivalent to the estimated cost c (Ni, R). packet from N to Nmin. C (N, Nmin) can also be a However, when there is a hole in the path towards R, combination function of both the remaining energy the node’s learned cost represents “resistance” to 176 All Rights Reserved © 2012 IJARCET
  • 6. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 following the path towards that hole; “resistance” that Recursive Forwarding the estimated cost cannot provide. Suppose the distance between the nearest two Before a packet reaches the target region R, we use neighbors is 1, and each node can reach its 8 the forwarding rules described in the previous neighbors. The nodes in black, i.e., G, H, I are energy section. Once the packet is inside the target region, a depleted nodes, thereby cannot relay packets. simple flooding with duplicate suppression scheme Suppose node S wants to send a packet to region R can be used to flood the packet inside region R. with centroid at T. For illustration purposes, we use T However, flooding is expensive in terms of energy to denote this region. Again, for simplicity, we consumption, due to the fact that in this simple illustrate the algorithm using pure geographic flooding scheme, every node has to broadcast once, routing, i.e., we set in Equation 1 to be 1, and we use and all its neighbors receive this broadcast message. direct distance instead of normalized distance This is especially expensive in high-density mentioned. networks, which is the case for some proposed sensor After the first packet reaches the destination, the net applications where nodes are densely and correct learned cost value will be propagated one-hop redundantly deployed for robustness. This back. Every time a packet is delivered, the correct demonstrates the necessity to use an energy efficient learned cost value will be propagated one hop away. routing algorithm in place of flooding in Therefore, suppose the path length from S to T is n, disseminating the packet inside the target region, or the learned cost will converge after the node delivers any kind of flooding in sensor networks. n packets to the same target T. Note that the Therefore, we use a Recursive Geographic convergence of learned cost does not affect Forwarding approach to disseminate the packet inside successfully routing a packet out of holes, it only target region R. Suppose the target region R is the big affects how efficient is the hole routing path. rectangle, and now node Ni receives a packet P for Propagating the learned cost values further upstream region R, and finds itself inside R. In this case, Ni through the update rule will enable the packet to have creates four new copies of p bound to 4 sub-regions an earlier chance to avoid holes (i.e., more effectively of region R. Repeat this recursive splitting and circumnavigate holes), and at the same time avoid forwarding procedure until the stop condition for depleting the nodes surrounding the holes. recursive splitting and forwarding are satisfied. The learned costs together with its update rule help to The recursive splitting terminates if the current node learn the route around holes. Intuitively, the learned is the only one inside this sub-region. The criteria to cost is set to the current best choice available. The determine this is when the farthest point of the region estimated cost c (N, R) is a combination of the is within a node’s transmission range. normalized distance from a neighbor to the destination and its normalized remaining energy Results Analysis level. In equation 1, it can be adjusted to emphasize minimizing path length to the destination or balancing energy consumption. We tried several Simulation Environment variants of this estimated cost function. For example, we tried different energy cost functions and different In this paper we proposed location information using normalization denominators. The simulation results Geographical Routing Protocol (GRP) to improve show that the algorithm performance is not very performance of Dynamic Source routing protocols sensitive to the particular estimated cost function. was successfully implemented using OPNET modeler Our explanation is that it is the comparison (relative 14.0, in which I have implemented the algorithm in value among all the neighbors), not the absolute existing techniques by making necessary changes in estimated cost value that matters, since it is used to the existing system. The following choices are made make a local selection among all the neighbors. For for simulation considering accuracy of result and computing c (N, R), each node needs to know available resources. Then, we carry out quantitative neighbors’ energy levels and locations. A node also and comprehensive evaluation of performance in needs neighbors’ learned cost to make forwarding terms of time, overall performance ratio, and traffic decisions. Various techniques are possible: e.g., sensitivity. The simulation parameters of our paper piggybacking these on data traffic, requesting this work as follows: information on demand, advertising the information only when its value changes significantly, or a combination of the above. 177 All Rights Reserved © 2012 IJARCET
  • 7. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Length of WMN 1000 (M) because as the node mobility increases the network No. of mobile nodes 20-3000 topology changes making nodes send RREQ packets Packet rate of normal connection 1 more frequently. The proposed GRP with Location Movement Model Random Waypoint Aware Routing (LAR) Protocol schemes increases Traffic type CBR, FTP the delivery ratio compare with GRP without Max. mode speed 5 m/s – 60 m/s Location Aware Routing (LAR). No. of connections between nodes 5 – 60 Pause time 10 s Average end-to-end delay Rate ( packet per sec) 2 packets/s End-to-end delay in proposed GRP with Location Data payload (packet size) 28 – 1024 bytes Aware Routing (LAR) Protocol schemes under congestion is high because the adversary node waits Table 1 Simulation parameters before sending route reply packet. This waiting time The random waypoint model is chosen for movement is random with a maximum equal to the time taken patterns. In the random waypoint model of mobility, by a packet to travel through network diameter as the nodes choose a destination and move in a straight line adversary gives an impression that the packet toward the destination at a speed uniformly traveled to the actual node. This affects the end-to- distributed between 0 meters/second (m/s) and some end delay, especially for packets whose destinations maximum speed. When a node reaches its are quite close to source nodes. Thus, end-to-end destination, it stays during a specified period of time delay shows more random pattern for proposed GRP called pause time, chooses a new destination and with Location Aware Routing (LAR) than proposed begins moving towards it immediately in the same GRP without Location Aware Routing (LAR). The speed. Depending on number of connections and proposed GRP with Location Aware Routing (LAR) maximum node speeds, we have designed different Protocol schemes under traffic restores back the end- simulation scenarios on average throughput, and end to-end delay and the performance better than to end delay. proposed GRP without Location Aware Routing (LAR) Protocol schemes. Performance Metrics Conclusion The performance metrics used for the comparison are the same as those used for evaluating the proposed In this paper we compared the two protocols DSR GRP with Location Aware Routing (LAR) protocols. (dynamic source routing) and LARP (Local Awareness Routing Protocol) for proposing third The efficiency of data packet delivery is defined routing protocol GRP with LARP. as the measured ratio of the number of data packets DSR is continuously sending packet to every delivered to their destinations to the number of all different node without any request by any node and packets generated in the network. Note that each time wait for their acknowledgement and then send the a packet is forwarded this is counted as one packet packet to it. LARP send the packet only when the transmission. node has any request or any requirement. Hence we know that in mobile ad-hoc network node move from Average end-to-end delay of transferred data different place to place. And in our proposed work packets includes all possible delays caused by GRP (Geographic routing protocol) with LARP. GRP buffering during route discovery, queuing at the help us to calculate distance. GRP is used to calculate interface-queue and retransmission delays at the the distance between requesting node from the master medium access control layer. node and when there is minimum distance from master node to requesting/receiver node. The The efficiency of data packet delivery ratio proposed protocols limit the search for a route to the The delivery ratio is plotted against the node mobility so-called request zone, determined based on the we observe that GRP with Location Aware Routing expected location of the destination node at the time (LAR) protocol schemes performs better in low node of route discovery. mobility rate while as the mobility rate increases the delivery ratio slightly drops. The performance of the network is also significantly reduced when GRP with Location Aware Routing (LAR) protocol schemes are under congestion and the node mobility increases with respect to GRP without Location Aware Routing (LAR) protocol. However, this behavior is normal 178 All Rights Reserved © 2012 IJARCET
  • 8. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 References [1] Kirti Aniruddha Adoni and Radhika D. Joshi, [8] M. Maleki and M. Pedram, “Lifetime-Aware “Optimization of Energy Consumption for OLSR Multicast Routing in Wireless Ad hoc Networks”, Routing Protocol in MANET”, International Journal Proceedings of IEEE Wireless Communications and of Wireless & Mobile Networks (IJWMN) Vol. 4, No. Networking Conference, 2004. 1, February 2012, pp. 251-262. [9] M. Gerla, S.J. Lee, W. Su, On-Demand Multicast [2] Ashish Kumar, M. Q. Rafiq and Kamal Bansal, Routing Protocol (ODMRP) for Ad-hoc Networks, “ Performance Evaluation of Energy Consumption Internet draft, draft-ietf-manet-odmrp-02.txt, 2000. in MANET”, International Journal of Computer Applications (0975 – 8887) Volume 42– No.2, March [10] J. Kao, R. Marculescu, “ Predictive 2012, pp. 7-12. Energy-efficient Multicast for Large Scale Mobile Ad Hoc Networks”, Communications and [3] M. Mohammed, “Energy Efficient Location Networking Conference, pp. 709-713, January Aided Routing Protocol for Wireless MANETs“, 2008. International Journal of Computer Science and Information Security, vol. 4, no. 1 & 2, 2009. [11] V. Rishiwal, M. Yadav, S. Verma, S. K. Bajapai, “Power Aware Routing in Ad Hoc Wireless Networks, Journal of Computer Science [4] O. Tariq, F. Greg & W. Murray, “ On the and Technology, vol. 9, no. 2, pp. 101-109, October Effect of Traffic Model to the Performance 2009”. Evaluation of Multicast Protocols in MANET”, Proceedings of the Canadian Conference on Electrical and Computer Engineering, pp. 404–407, 2005. [5] B. Wang and S. K. S. Gupta, “On Maximizing Lifetime of Multicast Trees in Wireless Ad hoc Networks”, Proceedings of the IEEE International Conference on Parallel Processing, 2003. [6] R. Vaishampayan, J.J. Garcia-Luna-Aceves, “ Energy Efficient and Robust Multicast Routing in Mobile Ad Hoc Networks”, Proceedings of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004. [7] Y. Lia, X. Chengb and W. Wuc, “ Optimal Topology Control for Balanced Energy Consumption in Wireless Networks”. J. Parallel and Distributed Computing, vol. 65, no. 2, pp. 124 – 131, February 2005. 179 All Rights Reserved © 2012 IJARCET