SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Anusha M M, Prof. Padmanayana / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.777-780
777 | P a g e
Stateless Multicasting In Ad-Hoc Networks Guided By Motion
Estimation
Anusha M M (M.Tech)1
, Assoc. Prof. Padmanayana2
1, 2
(Department of Computer Science, Srinivas Institute of Technology, Mangalore, India
Abstract
Multicast routing protocols typically rely
on the a priori creation of a multicast tree (or
mesh), which requires the individual nodes to
maintain state information. In sensor networks
where traffic is bursty, with long periods of
silence between the bursts of data, this multicast
state maintenance adds a large amount of
overhead for no benefit to the application. Thus,
Chen-Hsiang Feng et al. have developed a
stateless receiver-based multicast protocol that
simply uses a list of the multicast members (e.g.,
sinks), embedded in packet headers, to enable
receivers to decide the best way to forward the
multicast traffic. This protocol, called
RBMulticast (Receiver-Based Multicast), exploits
the knowledge of the geographic locations of the
nodes to remove the need for costly state
maintenance (e.g., tree/mesh/neighbor table
maintenance), making it ideally suited for sensor
network multicast applications. But the problem
in this approach is that to know geographic
locations of all nodes at particular node frequent
beacons must be sent by all nodes. Through these
beacons, each node knows about the geographic
locations of all other nodes. But if the node speed
is high & nodes moves great distance in the
beacon interval RBMulticast will fail. Routing
will get longer hops & packet delivery ratio will
drop. To solve this problem, we propose motion
estimation & RBMulticast guided by location
learnt using motion estimation.
Keywords : Ad-Hoc, MANET, multicast routing
protocols, RBMulticast, stateless.
I. INTRODUCTION
Communication in sensor networks is
hindered by the limited energy capacity of the
individual sensor nodes. Consequently, reducing the
total number of packets transmitted throughout the
network is essential for power conservation. For
sensor networks with multiple sink nodes, multicast
routing is an ideal approach to manage and reduce
network traffic. Reducing the number of packets
transmitted when multicasting data requires both
shorter routing paths from the multicast source to
the multicast members, as well as improved
efficiency in terms of the total number of links the
packets traverse to get to all the multicast members,
i.e., the packet should be split off to different
routing branches only when necessary. Shorter
routing paths lead to reduced packet delay, and
improved efficiency leads to a reduction in the
energy consumption from transmitting fewer
packets. These two properties are usually
contradictory to each other, and algorithms must
make a trade-off to best fit their requirements. In the
paper [1], author develop a novel multicast protocol
called RBMulticast (Receiver-Based Multicast).
RBMulticast is a completely stateless multicast
protocol, using only location information with no
tree creation or maintenance or even neighbor table
maintenance, which makes it ideally suited for
sensor networks. Packet routing and splitting
packets into multiple routes relies solely on the
location information of each multicast member,
which is assumed to be known.
RBMulticast is a receiver-based protocol
(as with the ExOR protocol [12]), which means that
a sender can transmit packets
without specifying the next hop node, because the
potential receivers of this packet make the decision
of whether or not to forward this packet in a
distributed manner. This approach for transmitting
packets means that routing is a result of the joint
decisions of all participating nodes. Therefore, no
routing tables are required within the sender node,
as potential receivers decide on a valid route.
RBMulticast was motivated by the cross-
layer protocol XLM [2], which is a receiver-based
unicast protocol designed for WSNs. As in XLM,
RBMulticast assumes a MAC protocol whereby
receivers contend for channel access based on their
assessed contribution towards forwarding the
packet. Nodes with more energy and better links and
nodes that make the most forward progress to the
destination will contend earlier and hence have a
higher chance to become the next hop node.
The solution works fine with good packet
delivery ratio as long the nodes moves slowly &
does not have big variation in between two
consequent beacon intervals. As the nodes move
faster in the beacon intervals, then position
information on which routing is based is erroneous
& false routing path is created. Due to this false
routing path delay increases & also packet delivery
ratio fails. Motivated by this fact, we propose a
effective solution for this problem.
Anusha M M, Prof. Padmanayana / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.777-780
778 | P a g e
II. Related Work
Existing multicast protocols for WSNs and
mobile ad hoc networks (MANETs) generally use a
tree to connect the multicast members. For example,
the Takahashi-Matsuyama heuristic can be used to
incrementally build a Steiner tree for
multicast routing [3]. Additionally, multicast
algorithms rely on routing tables maintained at
intermediate nodes for building and maintaining the
multicast tree [4].
Due to the specificities of WSNs, knowing
sensor nodes locations is a reasonable assumption.
In the location-based approach to multicast routing,
nodes obtain location information by default as an
application requirement (e.g., a home fire alarm
would know where it is located) or as provided by a
system module (e.g., GPS or a location-finding
service). If location information is known, multicast
routing is possible based solely on location
information without building any external tree
structure. For example, PBM [5] weights the
number of next hop neighbor nodes and total
geographic distance from the current node to all
destination nodes and compares this to a predefined
threshold to decide whether or not the packet should
be split. Geocast [6] delivers multicast packets by
restricted flooding. Nodes forward multicast packets
only if they are in the Forwarding Zone calculated at
run time from global knowledge of location
information.
RBMulticast differs from these approaches
in that it is completely stateless and hence no costly
state maintenance is required. PBM [5] uses a
similar idea of stateless multicast but requires
information about neighbor nodes. RBMulticast
further eliminates the requirement of knowing a
node’s neighbors by using a receiver-based
mechanism, and only the
location of the nodes is needed for multicast packet
routing. Additionally, RBMulticast includes a list of
the multicast members in the packet header, which
prevents the overhead of building and maintaining a
multicast tree at intermediate sensor nodes, because
all the necessary information for routing the packet
is included within the packet header. We believe
that RBMulticast requires the least state of any
multicast routing protocol and is thus ideally suited
for WSNs Receiver-based communication is a
different way of thinking about protocol design in
that decisions are not required to be made at the
sender side but instead are made at the receiver side.
For example, a source node in ExOR [1] broadcasts
packets that include a potential forwarders’ list
inside the header, and these potential forwarders
will contend to forward the packet through the use
of different back-off times, which depend on the
network distance to the destination. A source node
in XLM [2] broadcasts packets with the
destination’s geographic location in the header, and
every receiver contends to forward the packet
through the use of different back-off times, which
depend on the geographic distance to the
destination. In other words, in receiver-based
routing, decision-making is deferred to the possible
receivers, who make decisions in a distributed
manner.
Receiver-based routing is different from
“On-demand” or “Reactive” routing in that reactive
routing calculates a route at the time a packet is sent
down to the MAC layer. For example, AODV [7]
begins transmission by first sending a
“RouteRequest” to create temporary routes among
intermediate nodes and then transmits data packets
through this route. The ability to transmit data
without requiring a route to be formed is enabled via
extra knowledge in the MAC layer and join
decisions of sensor nodes. For example, nodes could
be assigned an ID in a structured manner and hence
next hop nodes are implied in the destination
address itself. In this case, packets are broadcast by
the MAC layer, and only potential next-hop nodes
relay it to the destination. As another example,
nodes may have statistics (e.g., energy, channel
quality) that could assist in making forwarding
decisions. A source node can send an RTS packet,
enabling potential receivers to contend for the
ability to forward the packet, with the receiver node
that has the best route being the first to return a CTS
to receive this packet.
We simulated the use of RBMulticast
under different network densities for large-scale
WSNs.There are a total of either 50, 150 or 300
nodes randomly distributed throughout the
simulation area. The source node is located at the
bottom left corner (0,0), and the multicast receiver
nodes are scattered over the boundary of the region.
We set the nodes movement as 30m/sec & set the
beacon interval as 5 sec.
From this we see the delay is in order of
seconds even for a network of 50 nodes. This
becomes the objective for the paper to reduce this
delay.
Anusha M M, Prof. Padmanayana / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.777-780
779 | P a g e
III. PROPOSED SOLUTION
As we analyze the RBMulticast protocol,
the delay is caused due to inaccurate position
information available at nodes. The inaccurate
information is more as the node speed increases.
In most MANET networks, the nodes don’t
do random movement they follow a pattern in the
movement. The pattern is either directional, circular
etc. If node initial position & its pattern of
movement is known well in advance at each node,
then the position of a node at particular time can be
easily estimated. This position information is then
used by the RBMulticast protocol to do region based
routing.
The protocol works as follows. During the
system initialization time, each node will broadcast
information of its current position & its pattern of
movement to all other nodes. After broadcasting this
information each node must wait for configurable
time period T before starting the movement.
If the node wants to change the pattern of
movement, it must stop its movement & broadcast
the change request to all nodes. It must wait for time
T before starting the movement. The time T is
expected time that broadcast reaches all the nodes.
Each node caches the position & pattern of
movement in its memory.
Whenever the nodes receives RBMulticast
receive packet, it has to first find the estimated
movement of the targets in the receive packet.
The estimation must be done using the
position & pattern of movement. The pattern is
nothing but a combination of speed & direction.
Say initial position of node is (100,100) in a total
plane of 1000 x 1000.
If it moves in direction of 45 degree at speed of 10
m/ sec , then the new position at any point of time
can be estimated using trigonometric formula
Y(t) = y(0) * tan 45 + t * 10;
X(t) = x(0) * tan 45 + t * 10;
Using the information of estimated position, the
RBMulticast Send procedure will split targets to
region & forward multicast packets.
IV. PERFORMANCE ANALYSIS
We implemented the RBMulticast and the
proposed estimation method to reduce delay &
increase packet delivery ratio using JProwler
simulator. We simulated for different speed of 10 to
50 for a network of 100 nodes. For each node
density we measure the average packet delay &
packet delivery ratio with RB Multicast and
proposed extension to RBMulticast.
The packet delivery ratio drops faster in
RBMulticast compared to our approach as speed of
movement of node increases.
The delay increases faster in RBMulticast compared
to our approach as the speed of movement increases.
V. CONCLUSION AND
ENHANCEMENTS
In this paper, we improved the
RBMulticast by adding motion estimation to learn
the position of nodes with our proposed solution.
Though simulation we proved that out approach
reduces the delay & also increases the packet
delivery ratio. In future we plan to do a detailed
analysis for different patterns of movement to arrive
at the estimation method for finding the position of
nodes.
REFERENCES
[1] S. Biswas and R. Morris, “Opportunistic
routing in multi-hop wireless networks,”
SIGCOMM Computer Communications
Review, vol. 34, no. 1,pp. 69–74, 2004.
Anusha M M, Prof. Padmanayana / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.777-780
780 | P a g e
[2] I. Akyildiz, M. Vuran, and O. Akan, “A
cross-layer protocol for Wireless sensor
networks,” in Proc. of CISS 2006, March
2006.
[3] K. Chen and K. Nahrstedt, “Effective
location-guided tree construction
algorithms for small group multicast in
manet,” INFOCOM. Twenty-First Annual
Joint Conference of the IEEE Computer
and Communications Societies.
Proceedings. IEEE, vol. 3, pp. 1180–1189,
2002.
[4] A. Okura, T. Ihara, and A. Miura, “Bam:
branch aggregation multicast for wireless
sensor networks,” Mobile Adhoc and
Sensor Systems Conference, 2005. IEEE
International Conference on, pp. 10 pp.–,
Nov. 2005.
[5] M. M. andand Holger Fuler, J. Widmer,
and T. Lang, “Positionbased multicast
routing for mobile ad-hoc networks,”
SIGMOBILE Mob.Comput. Commun. Rev.,
vol. 7, no. 3, pp. 53–55, 2003.
[6] Y.-B. Ko and N. H. Vaidya, “Geocasting in
mobile ad hoc networks: Location-based
multicast algorithms,” wmcsa, vol. 0, p.
101, 1999.
[7] “Ad-hoc on-demand distance vector
routing,” Mobile Computing Systems
and Applications, 1999. Proceedings.
WMCSA. Second IEEE Workshop on, pp.
90–100, 1999.
[8] B. Karp and H. T. Kung, “GPSR: greedy
perimeter stateless routing for wireless
networks,” in MobiCom ’00: Proceedings
of the 6th annual international conference
on Mobile computing and networking. New
York, NY, USA: ACM, 2000, pp. 243–
254.
[9] V. D. Park and M. S. Corson, “A highly
adaptive distributed routing algorithm for
mobile wireless networks,” infocom, vol.
00, p. 1405, 1997.
[10] “UPS: Unified Protocol Stack for Wireless
Sensor Networks,” under submission.
[11] H. Chen and Y. Li, “Performance model of
ieee 802.11 dcf with variable packet
length,” Communications Letters, IEEE,
vol. 8, no. 3, pp. 186.
[12] Chen-Hsiang Feng, Yuqun Zhang, Ilker
Demirkol, Wendi B. Heinzelman,
“Stateless Multicast Protocol”, IEEE
Transactions on Mobile Computing, Vol.
11, No.2, February 2012.

Weitere ähnliche Inhalte

Was ist angesagt?

An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...IAEME Publication
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Eswar Publications
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...ijasuc
 
Supporting efficient and scalable multicasting
Supporting efficient and scalable multicastingSupporting efficient and scalable multicasting
Supporting efficient and scalable multicastingingenioustech
 
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...ijasuc
 
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]ingenioustech
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksJPINFOTECH JAYAPRAKASH
 
Caching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkCaching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkAcel-Omeran
 
Analysis of Selfish behavior in energy consumption model based Multihop cellu...
Analysis of Selfish behavior in energy consumption model based Multihop cellu...Analysis of Selfish behavior in energy consumption model based Multihop cellu...
Analysis of Selfish behavior in energy consumption model based Multihop cellu...ijsrd.com
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
 
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop routing in wireless mesh networ...
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop routing in wireless mesh networ...IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop routing in wireless mesh networ...
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop routing in wireless mesh networ...IEEEGLOBALSOFTSTUDENTPROJECTS
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsNarendra Singh Yadav
 
Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...ijfcstjournal
 

Was ist angesagt? (18)

An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
 
Supporting efficient and scalable multicasting
Supporting efficient and scalable multicastingSupporting efficient and scalable multicasting
Supporting efficient and scalable multicasting
 
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
 
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
 
Position based Opportunistic routing in MANET
Position based Opportunistic routing in MANETPosition based Opportunistic routing in MANET
Position based Opportunistic routing in MANET
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networks
 
IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...
IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...
IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...
 
Caching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkCaching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc network
 
[IJCT-V3I2P22] Authors: Shraddha Dabhade, Shilpa Verma
[IJCT-V3I2P22] Authors: Shraddha Dabhade, Shilpa Verma[IJCT-V3I2P22] Authors: Shraddha Dabhade, Shilpa Verma
[IJCT-V3I2P22] Authors: Shraddha Dabhade, Shilpa Verma
 
Analysis of Selfish behavior in energy consumption model based Multihop cellu...
Analysis of Selfish behavior in energy consumption model based Multihop cellu...Analysis of Selfish behavior in energy consumption model based Multihop cellu...
Analysis of Selfish behavior in energy consumption model based Multihop cellu...
 
G343741
G343741G343741
G343741
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop routing in wireless mesh networ...
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop routing in wireless mesh networ...IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop routing in wireless mesh networ...
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop routing in wireless mesh networ...
 
E42062126
E42062126E42062126
E42062126
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 
Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...
 

Andere mochten auch

Andere mochten auch (8)

Perdida espacios naturales abat luna
Perdida espacios naturales  abat   lunaPerdida espacios naturales  abat   luna
Perdida espacios naturales abat luna
 
Tanto los alcoholes como los fenoles y los
Tanto los alcoholes como los fenoles y losTanto los alcoholes como los fenoles y los
Tanto los alcoholes como los fenoles y los
 
Análisis estadístico de mapas sociales del área urbana de Cali. Fase 1 de la ...
Análisis estadístico de mapas sociales del área urbana de Cali. Fase 1 de la ...Análisis estadístico de mapas sociales del área urbana de Cali. Fase 1 de la ...
Análisis estadístico de mapas sociales del área urbana de Cali. Fase 1 de la ...
 
Creatividad
CreatividadCreatividad
Creatividad
 
Basilea i,ii y iii2
Basilea i,ii y iii2Basilea i,ii y iii2
Basilea i,ii y iii2
 
Lecture Slides 11 05 08
Lecture Slides 11 05 08Lecture Slides 11 05 08
Lecture Slides 11 05 08
 
Consanguineidad ( miguel)
Consanguineidad ( miguel)Consanguineidad ( miguel)
Consanguineidad ( miguel)
 
Exposicion de administracion
Exposicion de administracionExposicion de administracion
Exposicion de administracion
 

Ähnlich wie Eb34777780

International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)inventionjournals
 
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networksijwmn
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSA STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSpharmaindexing
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...IJCERT
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
 
Secured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolSecured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolAhmad Sharifi
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET Journal
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
 
A comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETsA comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETsIOSR Journals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
 

Ähnlich wie Eb34777780 (20)

International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)
 
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
 
Ha3512291233
Ha3512291233Ha3512291233
Ha3512291233
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSA STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
IJET-V2I6P5
IJET-V2I6P5IJET-V2I6P5
IJET-V2I6P5
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
 
Secured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolSecured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing Protocol
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
A comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETsA comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETs
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
 

Kürzlich hochgeladen

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Kürzlich hochgeladen (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Eb34777780

  • 1. Anusha M M, Prof. Padmanayana / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.777-780 777 | P a g e Stateless Multicasting In Ad-Hoc Networks Guided By Motion Estimation Anusha M M (M.Tech)1 , Assoc. Prof. Padmanayana2 1, 2 (Department of Computer Science, Srinivas Institute of Technology, Mangalore, India Abstract Multicast routing protocols typically rely on the a priori creation of a multicast tree (or mesh), which requires the individual nodes to maintain state information. In sensor networks where traffic is bursty, with long periods of silence between the bursts of data, this multicast state maintenance adds a large amount of overhead for no benefit to the application. Thus, Chen-Hsiang Feng et al. have developed a stateless receiver-based multicast protocol that simply uses a list of the multicast members (e.g., sinks), embedded in packet headers, to enable receivers to decide the best way to forward the multicast traffic. This protocol, called RBMulticast (Receiver-Based Multicast), exploits the knowledge of the geographic locations of the nodes to remove the need for costly state maintenance (e.g., tree/mesh/neighbor table maintenance), making it ideally suited for sensor network multicast applications. But the problem in this approach is that to know geographic locations of all nodes at particular node frequent beacons must be sent by all nodes. Through these beacons, each node knows about the geographic locations of all other nodes. But if the node speed is high & nodes moves great distance in the beacon interval RBMulticast will fail. Routing will get longer hops & packet delivery ratio will drop. To solve this problem, we propose motion estimation & RBMulticast guided by location learnt using motion estimation. Keywords : Ad-Hoc, MANET, multicast routing protocols, RBMulticast, stateless. I. INTRODUCTION Communication in sensor networks is hindered by the limited energy capacity of the individual sensor nodes. Consequently, reducing the total number of packets transmitted throughout the network is essential for power conservation. For sensor networks with multiple sink nodes, multicast routing is an ideal approach to manage and reduce network traffic. Reducing the number of packets transmitted when multicasting data requires both shorter routing paths from the multicast source to the multicast members, as well as improved efficiency in terms of the total number of links the packets traverse to get to all the multicast members, i.e., the packet should be split off to different routing branches only when necessary. Shorter routing paths lead to reduced packet delay, and improved efficiency leads to a reduction in the energy consumption from transmitting fewer packets. These two properties are usually contradictory to each other, and algorithms must make a trade-off to best fit their requirements. In the paper [1], author develop a novel multicast protocol called RBMulticast (Receiver-Based Multicast). RBMulticast is a completely stateless multicast protocol, using only location information with no tree creation or maintenance or even neighbor table maintenance, which makes it ideally suited for sensor networks. Packet routing and splitting packets into multiple routes relies solely on the location information of each multicast member, which is assumed to be known. RBMulticast is a receiver-based protocol (as with the ExOR protocol [12]), which means that a sender can transmit packets without specifying the next hop node, because the potential receivers of this packet make the decision of whether or not to forward this packet in a distributed manner. This approach for transmitting packets means that routing is a result of the joint decisions of all participating nodes. Therefore, no routing tables are required within the sender node, as potential receivers decide on a valid route. RBMulticast was motivated by the cross- layer protocol XLM [2], which is a receiver-based unicast protocol designed for WSNs. As in XLM, RBMulticast assumes a MAC protocol whereby receivers contend for channel access based on their assessed contribution towards forwarding the packet. Nodes with more energy and better links and nodes that make the most forward progress to the destination will contend earlier and hence have a higher chance to become the next hop node. The solution works fine with good packet delivery ratio as long the nodes moves slowly & does not have big variation in between two consequent beacon intervals. As the nodes move faster in the beacon intervals, then position information on which routing is based is erroneous & false routing path is created. Due to this false routing path delay increases & also packet delivery ratio fails. Motivated by this fact, we propose a effective solution for this problem.
  • 2. Anusha M M, Prof. Padmanayana / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.777-780 778 | P a g e II. Related Work Existing multicast protocols for WSNs and mobile ad hoc networks (MANETs) generally use a tree to connect the multicast members. For example, the Takahashi-Matsuyama heuristic can be used to incrementally build a Steiner tree for multicast routing [3]. Additionally, multicast algorithms rely on routing tables maintained at intermediate nodes for building and maintaining the multicast tree [4]. Due to the specificities of WSNs, knowing sensor nodes locations is a reasonable assumption. In the location-based approach to multicast routing, nodes obtain location information by default as an application requirement (e.g., a home fire alarm would know where it is located) or as provided by a system module (e.g., GPS or a location-finding service). If location information is known, multicast routing is possible based solely on location information without building any external tree structure. For example, PBM [5] weights the number of next hop neighbor nodes and total geographic distance from the current node to all destination nodes and compares this to a predefined threshold to decide whether or not the packet should be split. Geocast [6] delivers multicast packets by restricted flooding. Nodes forward multicast packets only if they are in the Forwarding Zone calculated at run time from global knowledge of location information. RBMulticast differs from these approaches in that it is completely stateless and hence no costly state maintenance is required. PBM [5] uses a similar idea of stateless multicast but requires information about neighbor nodes. RBMulticast further eliminates the requirement of knowing a node’s neighbors by using a receiver-based mechanism, and only the location of the nodes is needed for multicast packet routing. Additionally, RBMulticast includes a list of the multicast members in the packet header, which prevents the overhead of building and maintaining a multicast tree at intermediate sensor nodes, because all the necessary information for routing the packet is included within the packet header. We believe that RBMulticast requires the least state of any multicast routing protocol and is thus ideally suited for WSNs Receiver-based communication is a different way of thinking about protocol design in that decisions are not required to be made at the sender side but instead are made at the receiver side. For example, a source node in ExOR [1] broadcasts packets that include a potential forwarders’ list inside the header, and these potential forwarders will contend to forward the packet through the use of different back-off times, which depend on the network distance to the destination. A source node in XLM [2] broadcasts packets with the destination’s geographic location in the header, and every receiver contends to forward the packet through the use of different back-off times, which depend on the geographic distance to the destination. In other words, in receiver-based routing, decision-making is deferred to the possible receivers, who make decisions in a distributed manner. Receiver-based routing is different from “On-demand” or “Reactive” routing in that reactive routing calculates a route at the time a packet is sent down to the MAC layer. For example, AODV [7] begins transmission by first sending a “RouteRequest” to create temporary routes among intermediate nodes and then transmits data packets through this route. The ability to transmit data without requiring a route to be formed is enabled via extra knowledge in the MAC layer and join decisions of sensor nodes. For example, nodes could be assigned an ID in a structured manner and hence next hop nodes are implied in the destination address itself. In this case, packets are broadcast by the MAC layer, and only potential next-hop nodes relay it to the destination. As another example, nodes may have statistics (e.g., energy, channel quality) that could assist in making forwarding decisions. A source node can send an RTS packet, enabling potential receivers to contend for the ability to forward the packet, with the receiver node that has the best route being the first to return a CTS to receive this packet. We simulated the use of RBMulticast under different network densities for large-scale WSNs.There are a total of either 50, 150 or 300 nodes randomly distributed throughout the simulation area. The source node is located at the bottom left corner (0,0), and the multicast receiver nodes are scattered over the boundary of the region. We set the nodes movement as 30m/sec & set the beacon interval as 5 sec. From this we see the delay is in order of seconds even for a network of 50 nodes. This becomes the objective for the paper to reduce this delay.
  • 3. Anusha M M, Prof. Padmanayana / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.777-780 779 | P a g e III. PROPOSED SOLUTION As we analyze the RBMulticast protocol, the delay is caused due to inaccurate position information available at nodes. The inaccurate information is more as the node speed increases. In most MANET networks, the nodes don’t do random movement they follow a pattern in the movement. The pattern is either directional, circular etc. If node initial position & its pattern of movement is known well in advance at each node, then the position of a node at particular time can be easily estimated. This position information is then used by the RBMulticast protocol to do region based routing. The protocol works as follows. During the system initialization time, each node will broadcast information of its current position & its pattern of movement to all other nodes. After broadcasting this information each node must wait for configurable time period T before starting the movement. If the node wants to change the pattern of movement, it must stop its movement & broadcast the change request to all nodes. It must wait for time T before starting the movement. The time T is expected time that broadcast reaches all the nodes. Each node caches the position & pattern of movement in its memory. Whenever the nodes receives RBMulticast receive packet, it has to first find the estimated movement of the targets in the receive packet. The estimation must be done using the position & pattern of movement. The pattern is nothing but a combination of speed & direction. Say initial position of node is (100,100) in a total plane of 1000 x 1000. If it moves in direction of 45 degree at speed of 10 m/ sec , then the new position at any point of time can be estimated using trigonometric formula Y(t) = y(0) * tan 45 + t * 10; X(t) = x(0) * tan 45 + t * 10; Using the information of estimated position, the RBMulticast Send procedure will split targets to region & forward multicast packets. IV. PERFORMANCE ANALYSIS We implemented the RBMulticast and the proposed estimation method to reduce delay & increase packet delivery ratio using JProwler simulator. We simulated for different speed of 10 to 50 for a network of 100 nodes. For each node density we measure the average packet delay & packet delivery ratio with RB Multicast and proposed extension to RBMulticast. The packet delivery ratio drops faster in RBMulticast compared to our approach as speed of movement of node increases. The delay increases faster in RBMulticast compared to our approach as the speed of movement increases. V. CONCLUSION AND ENHANCEMENTS In this paper, we improved the RBMulticast by adding motion estimation to learn the position of nodes with our proposed solution. Though simulation we proved that out approach reduces the delay & also increases the packet delivery ratio. In future we plan to do a detailed analysis for different patterns of movement to arrive at the estimation method for finding the position of nodes. REFERENCES [1] S. Biswas and R. Morris, “Opportunistic routing in multi-hop wireless networks,” SIGCOMM Computer Communications Review, vol. 34, no. 1,pp. 69–74, 2004.
  • 4. Anusha M M, Prof. Padmanayana / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.777-780 780 | P a g e [2] I. Akyildiz, M. Vuran, and O. Akan, “A cross-layer protocol for Wireless sensor networks,” in Proc. of CISS 2006, March 2006. [3] K. Chen and K. Nahrstedt, “Effective location-guided tree construction algorithms for small group multicast in manet,” INFOCOM. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 3, pp. 1180–1189, 2002. [4] A. Okura, T. Ihara, and A. Miura, “Bam: branch aggregation multicast for wireless sensor networks,” Mobile Adhoc and Sensor Systems Conference, 2005. IEEE International Conference on, pp. 10 pp.–, Nov. 2005. [5] M. M. andand Holger Fuler, J. Widmer, and T. Lang, “Positionbased multicast routing for mobile ad-hoc networks,” SIGMOBILE Mob.Comput. Commun. Rev., vol. 7, no. 3, pp. 53–55, 2003. [6] Y.-B. Ko and N. H. Vaidya, “Geocasting in mobile ad hoc networks: Location-based multicast algorithms,” wmcsa, vol. 0, p. 101, 1999. [7] “Ad-hoc on-demand distance vector routing,” Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA. Second IEEE Workshop on, pp. 90–100, 1999. [8] B. Karp and H. T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” in MobiCom ’00: Proceedings of the 6th annual international conference on Mobile computing and networking. New York, NY, USA: ACM, 2000, pp. 243– 254. [9] V. D. Park and M. S. Corson, “A highly adaptive distributed routing algorithm for mobile wireless networks,” infocom, vol. 00, p. 1405, 1997. [10] “UPS: Unified Protocol Stack for Wireless Sensor Networks,” under submission. [11] H. Chen and Y. Li, “Performance model of ieee 802.11 dcf with variable packet length,” Communications Letters, IEEE, vol. 8, no. 3, pp. 186. [12] Chen-Hsiang Feng, Yuqun Zhang, Ilker Demirkol, Wendi B. Heinzelman, “Stateless Multicast Protocol”, IEEE Transactions on Mobile Computing, Vol. 11, No.2, February 2012.