SlideShare a Scribd company logo
1 of 7
Download to read offline
ISSN: 2278 – 1323
                         International Journal of Advanced Research in Computer Engineering & Technology
                                                                              Volume 1, Issue 5, July 2012




Dynamically Adjusting Network Topology for MANETS
                                         By using DBET
          T.Damodar Yadav                                                        K.M.Hemambaran
          Department Of E.C.E                                                    Department Of E.C.E
          MTech, SITAMS,                                                     Assistant Professor, SITAMS,
       Chittoor, Andhra Pradesh.                                               Chittoor, Andhra Pradesh.
      Email: damodar419@gmail.com                                         Email: hemambaran@rediffmail.com


Abstract- In MANETS, network topology vary                    mainly into two categories: by controlling the
according to nodes, nodes are usually powered by              number of nodes with the smaller link cost. In the
batteries. To prolong the network life, the energy            first method a small number of nodes awake to
consumption of the routing task is crucial. In previous       maintain the network connectivity and remaining
works, enormous topology control methods were                 nodes go into sleep state to conserve energy. This
given to support the energy-efficient routing, while
the most of them are designed for static network. We
                                                              method is effective in low traffic conditions,
proposed an Energy efficient topology in Ad-hoc               because the power consumption to keep nodes
networks can be achieved mainly in two different .In          awake dominates the power consumption in data
the first method, network maintains a small number            transfer. In the second method, topology is
of nodes to form a connected backbone and the                 controlled by keeping lesser cost links in the
remaining nodes sleep to conserve energy. The second          network. This method is effective in high data
method is achieved by power control technique. So,            traffic because power consumption in data transfer
we propose a Demand Based Energy efficient                    dominates the power required to keep nodes awake.
Topology (DBET) to reduce the energy consumption              We combine the advantages of these two
for mobile ad hoc network, by dynamically adjusting
the topology for various network traffic conditions.
                                                              techniques to dynamically adjust network topology
We have simulated our proposed protocol DBET by               for various network traffic conditions. In this paper,
using AODV as routing protocol in network simulator           we present a demand based energy efficient
ns2.34 and compared AOMDV The simulation studies              topology (DBET) that dynamically adjust network
revealed that the proposed scheme perform better in           topology for various network traffic conditions. We
terms of energy, delay, and delivery ratio.                   have simulated our proposed protocol DBET by
                                                              using AODV [8] as routing protocol using network
Index Term--Energy        efficient topology, Routing,        simulator ns2.34 [1] and compared with AOMDV
MANET.
                                                                       The simulation studies revealed that the
                                                              proposed scheme perform better in terms of energy,
             I. INTRODUCTION                                  delay, and delivery ratio. In general network
                                                              topology is controlled by keeping small number of
          Mobile Ad-hoc Networks(MANETS) are                  nodes awake as in the first technique. The proposed
self-organizing,      infrastructure-less multi-hop           DBET keeps more number of nodes along the bulk
wireless net-works, Such temporary networks can               data transfer path to conserve energy by keeping
be used in battle-fields, disaster areas, military             low link cost as in the second technique. The rest of
applications, mining operations and robot data                the paper is organized as follows: the next section
acquisition. Besides these characteristics they               provides a brief review of related studies. The third
present challenges like limited energy, dynamic               section gives the design details of proposed DBET.
topology, low bandwidth and security. The                     Integration issues of DBET with routing protocol is
description of the arrangement of the MANETs,                 discussed in the forth section. Simulation results
called topology, is usually temporary or                      along with discussions are provided in the section
dynamically changed with time. Energy conserving              5. The last and final section concludes the paper
is one of the challenges because of limited battery           with same pointers to future research direction.
resource. The techniques which are used to reduce
the initial topology of network to save the energy            AODV Routing Protocol
and increase the lifetime of network, with the
preservence of network connectivity, called                            The Ad-hoc On-Demand Distance Vector
topology control techniques. Various techniques,              (AODV) routing protocol is designed for use in ad-
in network layer, are proposed in the literature to           hoc mobile networks. AODV is a reactive protocol
conserve energy. These techniques can be classfied            the routes are created only when they are needed. It


                                                                                                                 95
                                         All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                        International Journal of Advanced Research in Computer Engineering & Technology
                                                                             Volume 1, Issue 5, July 2012

uses traditional routing tables, one entry per              made symmetric by removing asymmetric links
destination, and sequence numbers to determine              without impairing connectivity.
whether routing information is up-to-date and to
prevent routing loops. An important feature of                        A simple localized distributed topological
AODV is the maintenance of time-based states in             control algorithm (XTC) is proposed by
each node: a routing entry not recently used is             Wattenhpfer et al. Initially each node u computes a
expired. In case of a route is broken the neighbours        total order (<u) over all its neighbors in the
can be notified. Route discovery is based on query          network graph G with respect to decreasing link
and reply cycles, and route information is stored in        quality, such as signal attenuation, and packet
all intermediate nodes along the route in the form          arrival rate. Then, each node start exchanges the
of route table entries.                                     neighbor order information among all neighbors.
AOMDV Routing Protocol                                      At the later point, each node locally selects those
                                                            neighboring nodes which will form its
          Ad-hoc On-demand Multipath Distance               neighborhood in the resulting topology control
Vector Routing (AOMDV) protocol is an extension             graph, based on the previously exchanged neighbor
to the AODV protocol for computing multiple                 order informations. It covers three main
loop-free and link disjoint paths. The routing              advantages: 1) It does not assume the network
entries for each destination contain a list of the          graph to be a Unit Disk Graph,2) it works on
next-hops along with the corresponding hop counts.          weighted network graphs, and 3) it does not require
All the next hops have the same sequence number.            availability of the node position information.
This helps in keeping track of a route. For each            Authors improved by adding node mobility and
destination, a node maintains the advertised hop            extended XTC for mobile network [7]. An energy
count, which is defined as the maximum hop count            efficient dynamic path is maintained to send data
for all the paths, which is used for sending route          from source to destination for MANET is proposed
advertisements of the destination. Each duplicate           in Sheu, Tu, and Hsu. Due to mobility existing
route advertisement received by a node defines an           paths may not be energy efficient. So, each node in
alternate path to the destination. Loop freedom is          a data path dynamically updates the path by
assured for a node by accepting alternate paths to          adjusting its transmission power. Each node in the
destination if it has a less hop count than the             networks determines its power for data
advertised hop count for that destination. Because          transmission and control packets transmission
the maximum hop count is used, the advertised hop           according to the received beacon messages from its
count therefore does not change for the same                neighbors. In dynamic path optimization technique
sequence number. When a route advertisement is              protocols dynamically select energy efficient path
received for a destination with a greater sequence          as per the requirement of dynamic topological
number, the next-hop list and the advertised hop            changes in the network [4].
count are reinitialized.
                                                                      Another class of topology control
                                                            protocols based on the k-nearest neighbors graph
           II RELATED WORK                                  (k-NNG). In k-NNG every node is connected to its
          We briefly describe various techniques             k closest neighbors. The Local Information No
related to our work topology control. Different             Topology protocols (LINT) try to keep the number
topologies have been proposed in the literature to          of neighbors of a node within a low and high
reduce the energy consumption. These methods can            threshold centered around an optimal value. But the
be clas-sified into centralized controlling and              optimal value is not characterized. So the
distributed computing methods. Ideally, for mobile          estimation of the number of neighbors can be
ad hoc network a topology should be computed and            inaccurate and connectivity is not guaranteed. The
maintained in distributed, asynchronous, and                k-Neighbors (k-NEIGH) [2] protocol keeps the
localized manner. Li and Wan [6] described a                number of neighbors of a node equal to, or slightly
distributed protocol to construct a minimum power           below, a given value k. It connects each node with
topology and developed an algorithm which                   k-closest neighbor, instant of require the
directly find a path whose length is within a                knowledge       of   all   the    neighbors.    The
constant factor of the shortest path. The length of         communication graph that result is made symmetric
the path is measured in term of energy                      by removing asymmetric edges, which has k-upper
consumption. This proposed algorithm used only              bound neighbors. A characterization of the critical
local information. A topology based on minimum              neighbor numbers is discussed by Xue and Kumar
spanning tree, called localized minimum spanning            Another way of reducing the power consumption is
tree (LMST) was proposed by Li et al. [5]. It is a          by using efficient energy path for transmitting
localized distributed protocol with the following           packets. These methods choose smaller edges in
properties: (1) the protocol generates a strongly           their path to reduce transmission energy. Minimum
connected communication graph; (2) the degree of            energy consumption per packet can be achieved by
any node is at most six, and (3) the topology can be        choosing the optimal energy consumed path from
                                                            source to destination. However, this technique does



                                                                                                             96
                                       All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                         International Journal of Advanced Research in Computer Engineering & Technology
                                                                              Volume 1, Issue 5, July 2012

not take the nodes’ energy capacity into                      c i +f i
                                                                         As the values of 𝑐 𝑖 and fi increase, the stability
consideration. So some nodes may exhaust their                  ni

power since energy consumption is not fair among              of the node decreases.
the nodes in the network. There for the network
                                                              • Utility factor (denoted by U): Nodes that have
lift- time decrease.
                                                              higher number of neighbors without an active
                                                              neighbor are given more preference. This heuristic
                                                              is derived from the fact that such nodes, if elected,
                                                              can help a larger number of other nodes, which can
    III DEMANED BASED ENERGY                                  then be put to sleep state. Thus, the utility factor Ui
        EFFICIENT TOPOLOGY                                                                n i −n a i
                                                              of a node i is calculate as            .
                                                                                                     ni
         In this section, we present a demand based
energy efficient topology (DBET) for mobile ad                • Energy factor (denoted by E): Nodes that have
hoc network, which dynamically changes the                    higher amounts of percentage remaining power are
topology according to the network traffic                     given more preference over others to be elected as
requirements. Initially we compute a small set of             active nodes. This introduces fairness in the
nodes, which form a connected backbone, while the             protocol by ensuring proper Let 𝐸0 𝑖 denote the
other nodes are put off to conserve energy. This              initial node’s energy and 𝐸 𝑡 𝑖 be the amount of
connected backbone is used for routing the packets            energy of a node at time t. So the energy factor 𝐸 𝑖
under low network load. When there is a bulk data                                                         𝐸0 𝑖 +𝐸 𝑡 𝑖
                                                              of the node i is calculate as                             Thus, the above
transfer between a pair of nodes, the topology                                                                𝐸0 𝑖
dynamically changes along the path between these              discussion suggests that the coordinator selection
nodes by power control and route optimize                     factor for phase − I can be the sum of all these
technique to minimize the power consumption. The              factors
proposed DBET can be divided into four phases.
                                                                                          𝑐 𝑖 +𝑓 𝑖       𝑛 𝑖 −𝑛 𝑎 𝑖       𝐸0 𝑖 −𝐸 𝑡 𝑖
The first phase selects a small set of nodes that               𝐶𝑖 = 𝑆 𝑖 + 𝑈𝑖 + 𝐸𝑖 =                  +                +                 (1)
constitutes an independent set of the network. The                                          𝑛𝑖               𝑛𝑖              𝐸0 𝑖

second phase is responsible for electing more nodes
to ensure that the selected nodes form a connected                     Only nodes that do not have an active
backbone. Remaining nodes go to sleep to conserve             node in their neighbor-hood are allowed to
energy. Active node withdraw process is                       participate in the election. Announcement
implement in the third phase to remove redundant              contention occurs when multiple nodes discover the
nodes in each region. To improve the performance              lack of an active node, and all decide to become
along the high traffic path we use the route                  active nodes. We resolve the contention by
optimization with power control technique in the              delaying the announcement with randomized back
fourth phase. In this technique, we change topology           off delay, which is proportional to the extent to
dynamically to connect more nodes, around the                 which the node satisfies the heuristics. The selected
routing path to minimize the total power                      nodes forms an independent set of a connecting
consumption.                                                  backbone of the network. Selected active nodes go
                                                              back to sleep after they have used up a fixed
A. Phase I: Independent set formation                         percentage of their power to ensure fairness and
                                                              allow other nodes to become active.
         The first phase selects a minimal set of
nodes that constitute a minimal independent set of a          B. Phase II: Connecting the Independent Set
connected backbone of the network. This selection
is done in a distributed and localized manner using                Nodes selected in the first phase are not
neighbor information available with the network               connected. This is because there is only one active
layer. Let ni be the total number of nodes                    node in a given locality. In this phase more nodes
surrounding a node i and let 𝑛 𝑎 𝑖 be the number of           are elected to ensure that the selected nodes form a
                                                              connected network. All nodes that have two or
additional nodes among these neighbors, which are
                                                              more active nodes as neighbors, which are not
connected, if node i becomes a coordinator to the
                                                              connected directly or through one or two active
forward packets. The following heuristic is used in
                                                              nodes, are eligible to become active in this phase.
this phase:
                                                              Preference is given to the nodes satisfying the
• Stability factor (denoted by S): Nodes that are             following criteria:
relatively more stable as compared to the others in
the localities are given more preference. The node’s                        Nodes having higher amount of remaining
stability is measured as the ratio of number of link                         energy.
failures (fi ) and new connection established (ci ) per                     Nodes having higher stability. This can be
unit time to the total number of nodes surrounding                           measured similar to the one used in the
that node (ni ). Therefore, stability of a node i is                         first phase.




                                                                                                                                        97
                                         All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                    International Journal of Advanced Research in Computer Engineering & Technology
                                                                                         Volume 1, Issue 5, July 2012

                                                                                                                          𝑃𝑡
         Nodes having more number of active                                                 The actual power 𝜉 𝑖,𝑗 = K        +X, required
                                                                                                                          𝑃𝑟
          nodes in the 1-hop neighborhood.
                                                                                    for sending data from a node I to the node J at a
      The stability and energy factors of this phase                                distance d, where X represents the energy
are very much similar with 1st phase. But the utility                               consumed by receiving node.
factor is depends upon the 1st phase’s black active
nodes. Let 𝑛 𝑏 𝑖 be the number of active nodes of the
1st phase in 1 − hop neighborhood of a node i. If
nodes with high 𝑛 𝑏 𝑖 become the coordinators in this
phase, fewer coordinators in total may be needed in
order to make sure every node can talk to a
coordinator. Thus a node with a high 𝑛 𝑏 𝑖 should
volunteer more quickly than one with smaller                                            Fig.1. Minimizing the transmission power.
value. Thus, the coordinator selection factor for
2 𝑛𝑑 phase is the sum of all these factors                                                    The minimum required energy for the data
                                                                                    transmission can be calculated as follow: each node
                         𝑐 𝑖 +𝑓 𝑖       𝑛 𝑖 −𝑛 𝑏         𝐸0 𝑖 −𝐸 𝑡 𝑖
𝐶 𝑖 =𝑆 𝑖 + 𝑈 𝑖 + 𝐸 𝑖 =              +            𝑖
                                                     +                  (2)         in the network has fixed default full transmission
                           𝑛𝑖              𝑛𝑖               𝐸0 𝑖
                                                                                    power 𝑃 𝑡 , when a node I receives control message
                                                                                    from node J with power Pr it calculates the distance
The contention if any is also resolved using the                                    between nodes I and J then node I can find
back off mechanism like in the first phase.                                          minimum energy 𝑃 𝑡 (d) required for transmitting the
                                                                                    data to node J. Let consider the nodes B and node C
C. Phase III: Coordinator Withdraw                                                  which are in the transmission range of a node A as
        Every active node periodically checks if it                                 shown in the Fig. 1. If 𝜉 𝐴,𝐵 + 𝜉 𝐵,𝐶 < 𝜉 𝐴,𝐶 then
should go o sleep state or not. The need for a node                                 sending data packet from node A to the node C via
to be an active may also cease to exist due to the                                  intermediate node B consume less energy. Our
dynamics of the system. More explicitly, this may                                   proposed DBET uses this power optimization
happen due to one of the following reasons                                          technique locally along the routing path to
                                                                                    minimize the energy consumption during the
         .• If first phase active nodes may move                                     transmission. Whenever a new node satisfies the
into a region that already has another first phase                                   above criteria it remains awake to participate in the
active node so that the region now has more than                                    high traffic flow path. Please note that a new node
one first phase active nodes. These active nodes                                     can come either a sleeping node wakes up near
recognize this situation and one of them withdraws.                                 high traffic flow path or awake node moves closer
                                                                                    to high traffic flow path.
• If the withdrawal of a first phase active node may
mean that the second phase active nodes in the                                          IV. INTEGRATING DBET WITH
locality no longer serve their purpose and hence                                             ROUTING PROTOCOL
withdraw.
                                                                                             The proposed DBET can be integrated
 In the above scenarios the respective active nodes                                 with any routing protocol. In this section, we
withdraw, as their need no longer exists. However,                                  discuss the process of integration with AODV. In
when an active node withdraws by virtue of                                          our approach all control packets and data packets
completion of its quota of time it needs to be awake                                are transmit on low traffic path with full
until another node is elected in the locality.                                      transmission power and data packets on high traffic
                                                                                    path with minimum required energy.
D. Phase IV: Local route customization with
Power control technique                                                             Route discovery: Route discovery uses route cost
                                                                                    in place of hop count as route metric. We use the
         The energy consumption per data packet                                     notation 𝛿 𝐼,𝐽 denotes the cost of least cost path from
form source to destination is high when each node                                   the node I to the node J. When a source node S
uses full transmission power. This can be reduced                                   wants to find a route to a destination D, it
by chooses a lower energy cost path. The minimum                                    broadcasts the route request packet (RREQ) to its
transmission power 𝑃 𝑡 (d) =a 𝑑 𝑘 +c is required to                                 neighbors. The route request packet contains the
send data to a node at a distance d, where 2 <k< 4                                  least route cost from source node S, which is
and for some constants a and c. The receiving                                       initially zero. An intermediate node J receiving the
                     ℎ 2ℎ 2                𝑘
power 𝑃𝑟 =𝑃 𝑡 𝐺 𝑡 𝐺 𝑟 𝑡 4 𝑟 =𝑃 𝑡 4 by surface reflection                             route request packet from another intermediate
                       𝑑         𝑑
                                                                                    node I, it calculates the cost of the path form node
model, where ℎ 𝑡 , 𝐺 𝑡 , ℎ 𝑟 , and 𝐺 𝑟 are respectively
                                                                                    S to nodes J as 𝛿 𝑆,𝐽 + 𝜉 𝐼,𝐽 . The node J update its
antenna height and gain of sending and receiving
nodes [10].                                                                         routing table if the calculated cost is less than the
                                                                                    cost in its routing table and forward the route



                                                                                                                                        98
                                                               All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                         International Journal of Advanced Research in Computer Engineering & Technology
                                                                              Volume 1, Issue 5, July 2012

request packet to its neighbors with updated cost.           End-to-end delay: The end-to-end delay is the
In order to avoid another cost update, node J waits          average time between data packets sent out from
for the time (propositional to the cost to 𝛿 𝑆,𝐽 )           the sources and received at the destination. The Fig
before forwarding. When a destination node D                 C shows the delay with respect to the time. DBET
receives first route request packet (RREQ), it                by AOMDV performance is better than AODV.
calculates the route cost and update its routing             This is because the low transmission power implies
table. It waits for a fixed time interval to receive          low queuing delay and reduced interference.
more route request packets and find the least cost
route among them. The node D unicast a route                        TABEL 1: Simulation Parameters
reply packet (RREP) back to its neighbor from
which it received the least cost route. The neighbor
nodes unicast RREP towards the source node S.
                                                               S.No Parameters                Values
                                                               1        Simulation time       130 sec
Local route customization: As we discussed
earlier due to the dynamic nature of the network               2        Number of nodes       38
new node may come closer to existing path, which
                                                               3        Max node energy       1000J
may reduce the existing route cost, if it participates
in forwarding the data.                                        4        Energy                0-1000J
                                                                        Distribution
                                                               5        MAC                   IEEE802.11
                                                               6        Max Tx power          0.75W
                                                               7        Max Rx power          0.25W
                                                               8        Routing protocol      AODV

        Fig. 2. Local path customization.                      9        Propagation model     Two ray ground
                                                               10       Node motion           Random-motion
          Let consider the example network given in
the Fig. 2(a) with the existing path cost from the             11       Area                  1000x1000𝑚2
node I to the node J is 9 units. If a node is in data
transmission path, it sends the <Source address,
Destination address, Route cost from source to               Packet delivery ratio: Packet delivery ratio is the
itself> as a piggyback with periodic hello messages          ratio of the data packets received at the destination
in full transmission path. After receive the hello           to the data packets sent out from the sources. The
messages from the node I and the node C, along               Fig D shows the overall delivery ratio with respect
with piggyback information, node X calculate the             to the time. As the time rate increases, the delivery
link cost 𝜉 𝐼.𝑋 and 𝜉 𝐶,𝑋 and checks whether it can          ratio always decreases. AOMDV performs better
participate in the ongoing data transfer. The node X         than AODV routing protocol.
can participate in data forwarding, if it reduces the
cost of the path from the node I to the node C. That                     VI. CONCLUSIONS
is, if 𝜉 𝐼,𝑋 + 𝜉 𝐶,𝑋 < 𝛿 𝐼,𝐶 then the new node X
participate in the routing by sending route update                    In this paper, we proposed a demand
control message (RUP) to the node I and the node             based energy efficient topology that dynamically
C with route cost 𝛿 𝐼,𝐶 . When the node I and the            adjusts its topology for various network traffic
node C receive (RUP) messages and then update                conditions. We have simulated our proposed
their routing tables.                                        protocol DBET by AOMDV and compared with
                                                             AODV routing protocol. The simulation studies
 V. PERFORMANCE EVALUATION                                   revealed that the proposed scheme perform better
                                                             in terms of energy, delay, and delivery ratio. It
           We have evaluated the performance of              would be interesting to investigate the use of
DBET with AODV [8] as a routing protocol and                 directional antenna to further reduce the energy
compared with AOMDV using the network                        consumption.
simulator NS2.34. The simulation parameters are
listed in the table I.

Energy consumption: The energy consumed by
DBET by using AOMDV is less when compare
with AODV routing protocol.
                                                                      SIMULATION RESULTS


                                                                                                               99
                                        All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
           International Journal of Advanced Research in Computer Engineering & Technology
                                                                Volume 1, Issue 5, July 2012




  Fig A: Omni antenna
                                                              Fig C: delay (vs.) time




Fig B: directional antenna                             Fig D: delivery ratio (vs.) time




                                                                                          100
                         All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                   International Journal of Advanced Research in Computer Engineering & Technology
                                                                        Volume 1, Issue 5, July 2012

             REFERENCES
                                                                       T.Damodar Yadav, PG Student,
[1] The network simulator -        ns-2.33.
                                                                       Dept of ECE, SITAMS, Chittoor.
http://www.isi.edu/nsnam/ns.
                                                                       He received B.Tech degree from
[2] Douglas M. Blough, Mauro Leoncini,                                 JNTU, Anantapur, doing his
Giovanni Resta, and Paolo Santi. The k-                                research work in MANETS to
                                                                       receive M.Tech degree from
neighbors approach to interference bounde
                                                     JNTU, Anantapur, in communication systems. He
d and symmetric topology control in ad
                                                     presented various papers in national conferences
hoc networks. IEEE Transactions on
Mobile Computing, 5(9):1267–1282,                                      K.M.Hemambaran, Assistant
2006.                                                                  Professor,    Dept of      ECE,
                                                                       SITAMS, Chittoor. He had
[3] Benjie Chen, Kyle Jamieson, Hari                                   completed his MTech and Area
Balakrishnan, and Robert Morris. Span:                                 of Interest in Digital and
An energy-efficient coordination algorithm                             Communication. He presented
                                                                       and published in various national
for topology maintenance in ad hoc                   and international conferences and journals, and he
wireless networks. ACM Wireless                      is a life time member of IETE / ISTE.
Networks, 8:85–96, September 2001.
[4] H. P. Gupta and S. V. Rao. Pclr: Power
control-based locally customize routing for
manet. In Proc. IEEE International
Conference on RF and Signal Processing
Systems, pages 632–637, 2010.
 [5] Charles E. Perkins and Elizabeth M.
Royer. Ad-hoc on-demand distance vector
routing. In WMCSA ’99: Proceedings of
the Second IEEE Workshop on Mobile
Computer Systems and Applications,
pages 90– 100, Washington, DC, USA,
1999. IEEE Computer Society.
[6] N. Li, J.C. Hou, and L. Sha. Design
and analysis of an mst-based topology
control algorithm. In INFOCOM 2003.
Twenty-Second Annual Joint Conference
of     the    IEEE     Computer     and
Communications. IEEE Societies, pages
1702 – 1712, mar. 2003. [6] Xiang-Yang
Li and Peng-Jun Wan. Constructing
minimum      energy   mobile    wireless
networks. SIGMOBILE Mob. Comput.
Commun. Rev., 5(4):55–67, 2001.
[7]A. Naghshegar, A. Dana, A.
Darehshoorzadeh, and K. Karimpoor.
Topology control scheme in manets for
aodv routing. In Information and
Communication      Technologies:  From
Theory to Applications, 2008. ICTTA
2008. 3rd International Conference on,
pages 1 –6, 7-11 2008.

                                                                                                   101
                                All Rights Reserved © 2012 IJARCET

More Related Content

What's hot

M-EPAR to Improve the Quality of the MANETs
M-EPAR to Improve the Quality of the MANETsM-EPAR to Improve the Quality of the MANETs
M-EPAR to Improve the Quality of the MANETsIJERA Editor
 
Review on variants of Power Aware AODV
Review on variants of Power Aware AODVReview on variants of Power Aware AODV
Review on variants of Power Aware AODVijsrd.com
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
 
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...IJCNCJournal
 
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...IJEEE
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd Iaetsd
 
Energy Consumption Analysis of Ad hoc Routing Protocols for Different Energy ...
Energy Consumption Analysis of Ad hoc Routing Protocols for Different Energy ...Energy Consumption Analysis of Ad hoc Routing Protocols for Different Energy ...
Energy Consumption Analysis of Ad hoc Routing Protocols for Different Energy ...IOSR Journals
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
 
Ship Ad-hoc Network (SANET)
Ship Ad-hoc Network (SANET)	Ship Ad-hoc Network (SANET)
Ship Ad-hoc Network (SANET) Benyamin Moadab
 
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...Journal For Research
 
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKSENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKSIJCNCJournal
 
11.performance evaluation of maximal ratio receiver combining diversity with ...
11.performance evaluation of maximal ratio receiver combining diversity with ...11.performance evaluation of maximal ratio receiver combining diversity with ...
11.performance evaluation of maximal ratio receiver combining diversity with ...Alexander Decker
 
Performance evaluation of maximal ratio receiver combining diversity with pri...
Performance evaluation of maximal ratio receiver combining diversity with pri...Performance evaluation of maximal ratio receiver combining diversity with pri...
Performance evaluation of maximal ratio receiver combining diversity with pri...Alexander Decker
 
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...ijcncs
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
 

What's hot (18)

M-EPAR to Improve the Quality of the MANETs
M-EPAR to Improve the Quality of the MANETsM-EPAR to Improve the Quality of the MANETs
M-EPAR to Improve the Quality of the MANETs
 
Review on variants of Power Aware AODV
Review on variants of Power Aware AODVReview on variants of Power Aware AODV
Review on variants of Power Aware AODV
 
Aq4103266271
Aq4103266271Aq4103266271
Aq4103266271
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
 
05173187
0517318705173187
05173187
 
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
 
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by using
 
Energy Consumption Analysis of Ad hoc Routing Protocols for Different Energy ...
Energy Consumption Analysis of Ad hoc Routing Protocols for Different Energy ...Energy Consumption Analysis of Ad hoc Routing Protocols for Different Energy ...
Energy Consumption Analysis of Ad hoc Routing Protocols for Different Energy ...
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 
Ship Ad-hoc Network (SANET)
Ship Ad-hoc Network (SANET)	Ship Ad-hoc Network (SANET)
Ship Ad-hoc Network (SANET)
 
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
 
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKSENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
 
11.performance evaluation of maximal ratio receiver combining diversity with ...
11.performance evaluation of maximal ratio receiver combining diversity with ...11.performance evaluation of maximal ratio receiver combining diversity with ...
11.performance evaluation of maximal ratio receiver combining diversity with ...
 
Performance evaluation of maximal ratio receiver combining diversity with pri...
Performance evaluation of maximal ratio receiver combining diversity with pri...Performance evaluation of maximal ratio receiver combining diversity with pri...
Performance evaluation of maximal ratio receiver combining diversity with pri...
 
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
 

Viewers also liked

Viewers also liked (7)

Moscow
MoscowMoscow
Moscow
 
Judy Moses, Mentor
Judy Moses, MentorJudy Moses, Mentor
Judy Moses, Mentor
 
300 305
300 305300 305
300 305
 
Illas CíEs
Illas CíEsIllas CíEs
Illas CíEs
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Sem 27 02 09 3
Sem 27 02 09 3Sem 27 02 09 3
Sem 27 02 09 3
 
Replicate &amp; Perform
Replicate &amp; PerformReplicate &amp; Perform
Replicate &amp; Perform
 

Similar to 95 101

A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs cscpconf
 
Energy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc NetworksEnergy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc NetworksZac Darcy
 
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkLink Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkIOSR Journals
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
 
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...IJCI JOURNAL
 
A survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsA survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsIAEME Publication
 
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...CSCJournals
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijasuc
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijasuc
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijasuc
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijsptm
 
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SAN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SIJCNCJournal
 
7. 7775 8118-1-pb
7. 7775 8118-1-pb7. 7775 8118-1-pb
7. 7775 8118-1-pbIAESIJEECS
 
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...IDES Editor
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 

Similar to 95 101 (20)

61 66
61 6661 66
61 66
 
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
 
Energy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc NetworksEnergy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc Networks
 
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkLink Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
 
L0947075
L0947075L0947075
L0947075
 
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
 
A survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsA survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane ts
 
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
A02100108
A02100108A02100108
A02100108
 
Fo2510211029
Fo2510211029Fo2510211029
Fo2510211029
 
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SAN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
 
7. 7775 8118-1-pb
7. 7775 8118-1-pb7. 7775 8118-1-pb
7. 7775 8118-1-pb
 
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
 

Recently uploaded

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

95 101

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Dynamically Adjusting Network Topology for MANETS By using DBET T.Damodar Yadav K.M.Hemambaran Department Of E.C.E Department Of E.C.E MTech, SITAMS, Assistant Professor, SITAMS, Chittoor, Andhra Pradesh. Chittoor, Andhra Pradesh. Email: damodar419@gmail.com Email: hemambaran@rediffmail.com Abstract- In MANETS, network topology vary mainly into two categories: by controlling the according to nodes, nodes are usually powered by number of nodes with the smaller link cost. In the batteries. To prolong the network life, the energy first method a small number of nodes awake to consumption of the routing task is crucial. In previous maintain the network connectivity and remaining works, enormous topology control methods were nodes go into sleep state to conserve energy. This given to support the energy-efficient routing, while the most of them are designed for static network. We method is effective in low traffic conditions, proposed an Energy efficient topology in Ad-hoc because the power consumption to keep nodes networks can be achieved mainly in two different .In awake dominates the power consumption in data the first method, network maintains a small number transfer. In the second method, topology is of nodes to form a connected backbone and the controlled by keeping lesser cost links in the remaining nodes sleep to conserve energy. The second network. This method is effective in high data method is achieved by power control technique. So, traffic because power consumption in data transfer we propose a Demand Based Energy efficient dominates the power required to keep nodes awake. Topology (DBET) to reduce the energy consumption We combine the advantages of these two for mobile ad hoc network, by dynamically adjusting the topology for various network traffic conditions. techniques to dynamically adjust network topology We have simulated our proposed protocol DBET by for various network traffic conditions. In this paper, using AODV as routing protocol in network simulator we present a demand based energy efficient ns2.34 and compared AOMDV The simulation studies topology (DBET) that dynamically adjust network revealed that the proposed scheme perform better in topology for various network traffic conditions. We terms of energy, delay, and delivery ratio. have simulated our proposed protocol DBET by using AODV [8] as routing protocol using network Index Term--Energy efficient topology, Routing, simulator ns2.34 [1] and compared with AOMDV MANET. The simulation studies revealed that the proposed scheme perform better in terms of energy, I. INTRODUCTION delay, and delivery ratio. In general network topology is controlled by keeping small number of Mobile Ad-hoc Networks(MANETS) are nodes awake as in the first technique. The proposed self-organizing, infrastructure-less multi-hop DBET keeps more number of nodes along the bulk wireless net-works, Such temporary networks can data transfer path to conserve energy by keeping be used in battle-fields, disaster areas, military low link cost as in the second technique. The rest of applications, mining operations and robot data the paper is organized as follows: the next section acquisition. Besides these characteristics they provides a brief review of related studies. The third present challenges like limited energy, dynamic section gives the design details of proposed DBET. topology, low bandwidth and security. The Integration issues of DBET with routing protocol is description of the arrangement of the MANETs, discussed in the forth section. Simulation results called topology, is usually temporary or along with discussions are provided in the section dynamically changed with time. Energy conserving 5. The last and final section concludes the paper is one of the challenges because of limited battery with same pointers to future research direction. resource. The techniques which are used to reduce the initial topology of network to save the energy AODV Routing Protocol and increase the lifetime of network, with the preservence of network connectivity, called The Ad-hoc On-Demand Distance Vector topology control techniques. Various techniques, (AODV) routing protocol is designed for use in ad- in network layer, are proposed in the literature to hoc mobile networks. AODV is a reactive protocol conserve energy. These techniques can be classfied the routes are created only when they are needed. It 95 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 uses traditional routing tables, one entry per made symmetric by removing asymmetric links destination, and sequence numbers to determine without impairing connectivity. whether routing information is up-to-date and to prevent routing loops. An important feature of A simple localized distributed topological AODV is the maintenance of time-based states in control algorithm (XTC) is proposed by each node: a routing entry not recently used is Wattenhpfer et al. Initially each node u computes a expired. In case of a route is broken the neighbours total order (<u) over all its neighbors in the can be notified. Route discovery is based on query network graph G with respect to decreasing link and reply cycles, and route information is stored in quality, such as signal attenuation, and packet all intermediate nodes along the route in the form arrival rate. Then, each node start exchanges the of route table entries. neighbor order information among all neighbors. AOMDV Routing Protocol At the later point, each node locally selects those neighboring nodes which will form its Ad-hoc On-demand Multipath Distance neighborhood in the resulting topology control Vector Routing (AOMDV) protocol is an extension graph, based on the previously exchanged neighbor to the AODV protocol for computing multiple order informations. It covers three main loop-free and link disjoint paths. The routing advantages: 1) It does not assume the network entries for each destination contain a list of the graph to be a Unit Disk Graph,2) it works on next-hops along with the corresponding hop counts. weighted network graphs, and 3) it does not require All the next hops have the same sequence number. availability of the node position information. This helps in keeping track of a route. For each Authors improved by adding node mobility and destination, a node maintains the advertised hop extended XTC for mobile network [7]. An energy count, which is defined as the maximum hop count efficient dynamic path is maintained to send data for all the paths, which is used for sending route from source to destination for MANET is proposed advertisements of the destination. Each duplicate in Sheu, Tu, and Hsu. Due to mobility existing route advertisement received by a node defines an paths may not be energy efficient. So, each node in alternate path to the destination. Loop freedom is a data path dynamically updates the path by assured for a node by accepting alternate paths to adjusting its transmission power. Each node in the destination if it has a less hop count than the networks determines its power for data advertised hop count for that destination. Because transmission and control packets transmission the maximum hop count is used, the advertised hop according to the received beacon messages from its count therefore does not change for the same neighbors. In dynamic path optimization technique sequence number. When a route advertisement is protocols dynamically select energy efficient path received for a destination with a greater sequence as per the requirement of dynamic topological number, the next-hop list and the advertised hop changes in the network [4]. count are reinitialized. Another class of topology control protocols based on the k-nearest neighbors graph II RELATED WORK (k-NNG). In k-NNG every node is connected to its We briefly describe various techniques k closest neighbors. The Local Information No related to our work topology control. Different Topology protocols (LINT) try to keep the number topologies have been proposed in the literature to of neighbors of a node within a low and high reduce the energy consumption. These methods can threshold centered around an optimal value. But the be clas-sified into centralized controlling and optimal value is not characterized. So the distributed computing methods. Ideally, for mobile estimation of the number of neighbors can be ad hoc network a topology should be computed and inaccurate and connectivity is not guaranteed. The maintained in distributed, asynchronous, and k-Neighbors (k-NEIGH) [2] protocol keeps the localized manner. Li and Wan [6] described a number of neighbors of a node equal to, or slightly distributed protocol to construct a minimum power below, a given value k. It connects each node with topology and developed an algorithm which k-closest neighbor, instant of require the directly find a path whose length is within a knowledge of all the neighbors. The constant factor of the shortest path. The length of communication graph that result is made symmetric the path is measured in term of energy by removing asymmetric edges, which has k-upper consumption. This proposed algorithm used only bound neighbors. A characterization of the critical local information. A topology based on minimum neighbor numbers is discussed by Xue and Kumar spanning tree, called localized minimum spanning Another way of reducing the power consumption is tree (LMST) was proposed by Li et al. [5]. It is a by using efficient energy path for transmitting localized distributed protocol with the following packets. These methods choose smaller edges in properties: (1) the protocol generates a strongly their path to reduce transmission energy. Minimum connected communication graph; (2) the degree of energy consumption per packet can be achieved by any node is at most six, and (3) the topology can be choosing the optimal energy consumed path from source to destination. However, this technique does 96 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 not take the nodes’ energy capacity into c i +f i As the values of 𝑐 𝑖 and fi increase, the stability consideration. So some nodes may exhaust their ni power since energy consumption is not fair among of the node decreases. the nodes in the network. There for the network • Utility factor (denoted by U): Nodes that have lift- time decrease. higher number of neighbors without an active neighbor are given more preference. This heuristic is derived from the fact that such nodes, if elected, can help a larger number of other nodes, which can III DEMANED BASED ENERGY then be put to sleep state. Thus, the utility factor Ui EFFICIENT TOPOLOGY n i −n a i of a node i is calculate as . ni In this section, we present a demand based energy efficient topology (DBET) for mobile ad • Energy factor (denoted by E): Nodes that have hoc network, which dynamically changes the higher amounts of percentage remaining power are topology according to the network traffic given more preference over others to be elected as requirements. Initially we compute a small set of active nodes. This introduces fairness in the nodes, which form a connected backbone, while the protocol by ensuring proper Let 𝐸0 𝑖 denote the other nodes are put off to conserve energy. This initial node’s energy and 𝐸 𝑡 𝑖 be the amount of connected backbone is used for routing the packets energy of a node at time t. So the energy factor 𝐸 𝑖 under low network load. When there is a bulk data 𝐸0 𝑖 +𝐸 𝑡 𝑖 of the node i is calculate as Thus, the above transfer between a pair of nodes, the topology 𝐸0 𝑖 dynamically changes along the path between these discussion suggests that the coordinator selection nodes by power control and route optimize factor for phase − I can be the sum of all these technique to minimize the power consumption. The factors proposed DBET can be divided into four phases. 𝑐 𝑖 +𝑓 𝑖 𝑛 𝑖 −𝑛 𝑎 𝑖 𝐸0 𝑖 −𝐸 𝑡 𝑖 The first phase selects a small set of nodes that 𝐶𝑖 = 𝑆 𝑖 + 𝑈𝑖 + 𝐸𝑖 = + + (1) constitutes an independent set of the network. The 𝑛𝑖 𝑛𝑖 𝐸0 𝑖 second phase is responsible for electing more nodes to ensure that the selected nodes form a connected Only nodes that do not have an active backbone. Remaining nodes go to sleep to conserve node in their neighbor-hood are allowed to energy. Active node withdraw process is participate in the election. Announcement implement in the third phase to remove redundant contention occurs when multiple nodes discover the nodes in each region. To improve the performance lack of an active node, and all decide to become along the high traffic path we use the route active nodes. We resolve the contention by optimization with power control technique in the delaying the announcement with randomized back fourth phase. In this technique, we change topology off delay, which is proportional to the extent to dynamically to connect more nodes, around the which the node satisfies the heuristics. The selected routing path to minimize the total power nodes forms an independent set of a connecting consumption. backbone of the network. Selected active nodes go back to sleep after they have used up a fixed A. Phase I: Independent set formation percentage of their power to ensure fairness and allow other nodes to become active. The first phase selects a minimal set of nodes that constitute a minimal independent set of a B. Phase II: Connecting the Independent Set connected backbone of the network. This selection is done in a distributed and localized manner using Nodes selected in the first phase are not neighbor information available with the network connected. This is because there is only one active layer. Let ni be the total number of nodes node in a given locality. In this phase more nodes surrounding a node i and let 𝑛 𝑎 𝑖 be the number of are elected to ensure that the selected nodes form a connected network. All nodes that have two or additional nodes among these neighbors, which are more active nodes as neighbors, which are not connected, if node i becomes a coordinator to the connected directly or through one or two active forward packets. The following heuristic is used in nodes, are eligible to become active in this phase. this phase: Preference is given to the nodes satisfying the • Stability factor (denoted by S): Nodes that are following criteria: relatively more stable as compared to the others in the localities are given more preference. The node’s  Nodes having higher amount of remaining stability is measured as the ratio of number of link energy. failures (fi ) and new connection established (ci ) per  Nodes having higher stability. This can be unit time to the total number of nodes surrounding measured similar to the one used in the that node (ni ). Therefore, stability of a node i is first phase. 97 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 𝑃𝑡  Nodes having more number of active The actual power 𝜉 𝑖,𝑗 = K +X, required 𝑃𝑟 nodes in the 1-hop neighborhood. for sending data from a node I to the node J at a The stability and energy factors of this phase distance d, where X represents the energy are very much similar with 1st phase. But the utility consumed by receiving node. factor is depends upon the 1st phase’s black active nodes. Let 𝑛 𝑏 𝑖 be the number of active nodes of the 1st phase in 1 − hop neighborhood of a node i. If nodes with high 𝑛 𝑏 𝑖 become the coordinators in this phase, fewer coordinators in total may be needed in order to make sure every node can talk to a coordinator. Thus a node with a high 𝑛 𝑏 𝑖 should volunteer more quickly than one with smaller Fig.1. Minimizing the transmission power. value. Thus, the coordinator selection factor for 2 𝑛𝑑 phase is the sum of all these factors The minimum required energy for the data transmission can be calculated as follow: each node 𝑐 𝑖 +𝑓 𝑖 𝑛 𝑖 −𝑛 𝑏 𝐸0 𝑖 −𝐸 𝑡 𝑖 𝐶 𝑖 =𝑆 𝑖 + 𝑈 𝑖 + 𝐸 𝑖 = + 𝑖 + (2) in the network has fixed default full transmission 𝑛𝑖 𝑛𝑖 𝐸0 𝑖 power 𝑃 𝑡 , when a node I receives control message from node J with power Pr it calculates the distance The contention if any is also resolved using the between nodes I and J then node I can find back off mechanism like in the first phase. minimum energy 𝑃 𝑡 (d) required for transmitting the data to node J. Let consider the nodes B and node C C. Phase III: Coordinator Withdraw which are in the transmission range of a node A as Every active node periodically checks if it shown in the Fig. 1. If 𝜉 𝐴,𝐵 + 𝜉 𝐵,𝐶 < 𝜉 𝐴,𝐶 then should go o sleep state or not. The need for a node sending data packet from node A to the node C via to be an active may also cease to exist due to the intermediate node B consume less energy. Our dynamics of the system. More explicitly, this may proposed DBET uses this power optimization happen due to one of the following reasons technique locally along the routing path to minimize the energy consumption during the .• If first phase active nodes may move transmission. Whenever a new node satisfies the into a region that already has another first phase above criteria it remains awake to participate in the active node so that the region now has more than high traffic flow path. Please note that a new node one first phase active nodes. These active nodes can come either a sleeping node wakes up near recognize this situation and one of them withdraws. high traffic flow path or awake node moves closer to high traffic flow path. • If the withdrawal of a first phase active node may mean that the second phase active nodes in the IV. INTEGRATING DBET WITH locality no longer serve their purpose and hence ROUTING PROTOCOL withdraw. The proposed DBET can be integrated In the above scenarios the respective active nodes with any routing protocol. In this section, we withdraw, as their need no longer exists. However, discuss the process of integration with AODV. In when an active node withdraws by virtue of our approach all control packets and data packets completion of its quota of time it needs to be awake are transmit on low traffic path with full until another node is elected in the locality. transmission power and data packets on high traffic path with minimum required energy. D. Phase IV: Local route customization with Power control technique Route discovery: Route discovery uses route cost in place of hop count as route metric. We use the The energy consumption per data packet notation 𝛿 𝐼,𝐽 denotes the cost of least cost path from form source to destination is high when each node the node I to the node J. When a source node S uses full transmission power. This can be reduced wants to find a route to a destination D, it by chooses a lower energy cost path. The minimum broadcasts the route request packet (RREQ) to its transmission power 𝑃 𝑡 (d) =a 𝑑 𝑘 +c is required to neighbors. The route request packet contains the send data to a node at a distance d, where 2 <k< 4 least route cost from source node S, which is and for some constants a and c. The receiving initially zero. An intermediate node J receiving the ℎ 2ℎ 2 𝑘 power 𝑃𝑟 =𝑃 𝑡 𝐺 𝑡 𝐺 𝑟 𝑡 4 𝑟 =𝑃 𝑡 4 by surface reflection route request packet from another intermediate 𝑑 𝑑 node I, it calculates the cost of the path form node model, where ℎ 𝑡 , 𝐺 𝑡 , ℎ 𝑟 , and 𝐺 𝑟 are respectively S to nodes J as 𝛿 𝑆,𝐽 + 𝜉 𝐼,𝐽 . The node J update its antenna height and gain of sending and receiving nodes [10]. routing table if the calculated cost is less than the cost in its routing table and forward the route 98 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 request packet to its neighbors with updated cost. End-to-end delay: The end-to-end delay is the In order to avoid another cost update, node J waits average time between data packets sent out from for the time (propositional to the cost to 𝛿 𝑆,𝐽 ) the sources and received at the destination. The Fig before forwarding. When a destination node D C shows the delay with respect to the time. DBET receives first route request packet (RREQ), it by AOMDV performance is better than AODV. calculates the route cost and update its routing This is because the low transmission power implies table. It waits for a fixed time interval to receive low queuing delay and reduced interference. more route request packets and find the least cost route among them. The node D unicast a route TABEL 1: Simulation Parameters reply packet (RREP) back to its neighbor from which it received the least cost route. The neighbor nodes unicast RREP towards the source node S. S.No Parameters Values 1 Simulation time 130 sec Local route customization: As we discussed earlier due to the dynamic nature of the network 2 Number of nodes 38 new node may come closer to existing path, which 3 Max node energy 1000J may reduce the existing route cost, if it participates in forwarding the data. 4 Energy 0-1000J Distribution 5 MAC IEEE802.11 6 Max Tx power 0.75W 7 Max Rx power 0.25W 8 Routing protocol AODV Fig. 2. Local path customization. 9 Propagation model Two ray ground 10 Node motion Random-motion Let consider the example network given in the Fig. 2(a) with the existing path cost from the 11 Area 1000x1000𝑚2 node I to the node J is 9 units. If a node is in data transmission path, it sends the <Source address, Destination address, Route cost from source to Packet delivery ratio: Packet delivery ratio is the itself> as a piggyback with periodic hello messages ratio of the data packets received at the destination in full transmission path. After receive the hello to the data packets sent out from the sources. The messages from the node I and the node C, along Fig D shows the overall delivery ratio with respect with piggyback information, node X calculate the to the time. As the time rate increases, the delivery link cost 𝜉 𝐼.𝑋 and 𝜉 𝐶,𝑋 and checks whether it can ratio always decreases. AOMDV performs better participate in the ongoing data transfer. The node X than AODV routing protocol. can participate in data forwarding, if it reduces the cost of the path from the node I to the node C. That VI. CONCLUSIONS is, if 𝜉 𝐼,𝑋 + 𝜉 𝐶,𝑋 < 𝛿 𝐼,𝐶 then the new node X participate in the routing by sending route update In this paper, we proposed a demand control message (RUP) to the node I and the node based energy efficient topology that dynamically C with route cost 𝛿 𝐼,𝐶 . When the node I and the adjusts its topology for various network traffic node C receive (RUP) messages and then update conditions. We have simulated our proposed their routing tables. protocol DBET by AOMDV and compared with AODV routing protocol. The simulation studies V. PERFORMANCE EVALUATION revealed that the proposed scheme perform better in terms of energy, delay, and delivery ratio. It We have evaluated the performance of would be interesting to investigate the use of DBET with AODV [8] as a routing protocol and directional antenna to further reduce the energy compared with AOMDV using the network consumption. simulator NS2.34. The simulation parameters are listed in the table I. Energy consumption: The energy consumed by DBET by using AOMDV is less when compare with AODV routing protocol. SIMULATION RESULTS 99 All Rights Reserved © 2012 IJARCET
  • 6. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Fig A: Omni antenna Fig C: delay (vs.) time Fig B: directional antenna Fig D: delivery ratio (vs.) time 100 All Rights Reserved © 2012 IJARCET
  • 7. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 REFERENCES T.Damodar Yadav, PG Student, [1] The network simulator - ns-2.33. Dept of ECE, SITAMS, Chittoor. http://www.isi.edu/nsnam/ns. He received B.Tech degree from [2] Douglas M. Blough, Mauro Leoncini, JNTU, Anantapur, doing his Giovanni Resta, and Paolo Santi. The k- research work in MANETS to receive M.Tech degree from neighbors approach to interference bounde JNTU, Anantapur, in communication systems. He d and symmetric topology control in ad presented various papers in national conferences hoc networks. IEEE Transactions on Mobile Computing, 5(9):1267–1282, K.M.Hemambaran, Assistant 2006. Professor, Dept of ECE, SITAMS, Chittoor. He had [3] Benjie Chen, Kyle Jamieson, Hari completed his MTech and Area Balakrishnan, and Robert Morris. Span: of Interest in Digital and An energy-efficient coordination algorithm Communication. He presented and published in various national for topology maintenance in ad hoc and international conferences and journals, and he wireless networks. ACM Wireless is a life time member of IETE / ISTE. Networks, 8:85–96, September 2001. [4] H. P. Gupta and S. V. Rao. Pclr: Power control-based locally customize routing for manet. In Proc. IEEE International Conference on RF and Signal Processing Systems, pages 632–637, 2010. [5] Charles E. Perkins and Elizabeth M. Royer. Ad-hoc on-demand distance vector routing. In WMCSA ’99: Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications, pages 90– 100, Washington, DC, USA, 1999. IEEE Computer Society. [6] N. Li, J.C. Hou, and L. Sha. Design and analysis of an mst-based topology control algorithm. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, pages 1702 – 1712, mar. 2003. [6] Xiang-Yang Li and Peng-Jun Wan. Constructing minimum energy mobile wireless networks. SIGMOBILE Mob. Comput. Commun. Rev., 5(4):55–67, 2001. [7]A. Naghshegar, A. Dana, A. Darehshoorzadeh, and K. Karimpoor. Topology control scheme in manets for aodv routing. In Information and Communication Technologies: From Theory to Applications, 2008. ICTTA 2008. 3rd International Conference on, pages 1 –6, 7-11 2008. 101 All Rights Reserved © 2012 IJARCET