SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Ajay Shah, Hitesh Gupta, Mukesh Baghel / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 2, Issue4, July-August 2012, pp.1342-1346
 Energy-Efficient Routing Protocol For Mobile Ad Hoc Networks
                    Ajay Shah*, Hitesh Gupta**, Mukesh Baghel***
          *(Department of Computer Science, Patel College of Science & Technology, Bhopal, India
        ** (Department of Computer Science, Patel College of Science & Technology, Bhopal, India)
        *** (Department of Computer Science, Patel College of Science & Technology, Bhopal, India)



ABSTRACT
         Adhoc on demand distance vector routing          major classification of routing protocols based on the
protocol(AODV) is specially designed for mobile           network structure. Based on routing strategy, the
adhoc networks with reduced overhead using                routing protocols are grouped as Table-driven and
Expanding Ring Search technique. But energy               source initiated on-demand driven [3]. Table-driven
consumption should also be considered in MANET            protocols usually find routes constantly and maintain
due to battery constrain of the nodes. In this            in routing table for all source-destination pairs at the
paper, we choose an energy efficient route                expense of high routing overhead. On-demand
discovery process for AODV based on Expanding             protocols such as AODV and DSR [4] incur less
Ring Search(ERS). We want to saves energy of the          routing overhead by finding path between a
nodes to avoide the redundant rebroadcasting of           sourcedestination pair only when it is necessary.
the route request packets. The relaying status of         Compared to tabledriven protocols, on-demand
the node is decided based on the broadcasting of its      protocols utilize less bandwidth and energy
RREQ packets by its neighbors. And it helps in            consumption. Ad-Hoc On-Demand Distance Vector
reducing routing overhead incurred during the             Routing Protocol (AODV) [4] finds route between
route discovery process. Simulations are                  nodes only when it is necessary. It does not maintain
performed to study the performance of Energy              topology information about all other nodes in the
Efficient AODV (E2AODV) protocol using NS2,               network. In AODV, each time the node initiates the
the Network Simulator. This E2AODV reduces                route discovery for some destination using simple
energy consumption by 80-90% compared to                  flooding for broadcasting the Route Request (RREQ)
AODV. It also reduces routing overhead of around          across the network. Energy efficiency is an important
70-75% and there by reduces 65-70% collisions.            issue in MANETs where nodes rely on limited power
                                                          and computational resource, yet are required to
Keywords: Mobile Ad-hoc Networks, Ad-hoc On-              cooperate in all sorts of fundamental network
Demand Distance Vector Routing Protocol,                  activities including routing. So, to control the network
Expanding Ring Search, Energy Consumption.                wide broadcast of the RREQs, the source node uses
                                                          the Expanding Ring Search (ERS) technique[5],
I. INTRODUCTION                                           which allows a source to broadcast the RREQ of
          Networks are classified into two main types     increasingly larger areas of the network if a route to
based on connectivity, wired and wireless networks.       the destination is not found. Unfortunately, some
A wireless network provides flexibility over standard     nodes in ERS technique rebroadcast the RREQs
wired networks. Only with the help of wireless            unnecessarily. For extending the lifetime of the nodes
networks, the users can retrieve information and get      in MANET, many energy efficient protocols have
services even when they travel from place to place.       been designed. In this paper, we propose a simple but
The single-hop and multi-hop Mobile Ad-hoc                energy efficient design for AODV Routing Protocol
Networks (MANET) are the two major classifications        which makes some nodes silent without forwarding
of wireless networks. Base stations are used in single-   the redundant rebroadcasting of the RREQ packets
hop networks to accomplish communication between          which is not used by any other node in the network
nodes. MANETs [1] are infra structure-less, self          for finding routes. Using NS2, we evaluate the
organizing networks of mobile nodes without any           performance of our energy consumption design to
centralized administration like base stations. The        AODV, which is named as Energy Efficient AODV
communication between nodes is accomplished via           (E2AODV), in MANET. In the rest of the paper,
other nodes which are called intermediate or              Section II reviews the related work. The E2AODV, a
forwarding nodes. So there is a need of a routing         new energy efficient approach is described in Section
procedure between nodes. And hence the routing            III. The simulation model and result analysis are
protocol plays a major role in MANET.                     provided in Section IV. Finally in Section V, we
          The routing protocols in MANET are mainly       present our conclusions.
classified using their routing strategy and network
structure. [2]. Flat routing, hierarchical routing and
geographic position assisted routing are the three
                                                                                                 1342 | P a g e
Ajay Shah, Hitesh Gupta, Mukesh Baghel / International Journal of Engineering Research and
                   Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                        Vol. 2, Issue4, July-August 2012, pp.1342-1346
II. THROUGHPUT OF AODV ROUTING
  A. Overview
         The Ad Hoc on-demanded Distance Vector
(AODV) routing protocol is a method of routing
messages between mobile computers. It allows these
mobile computers, or nodes, to pass messages through
their neighbors to nodes with which they cannot
directly communicate. AODV does this by
discovering the routes along which messages can be
passed. AODV makes sure these routes do not contain
loops and tries to find the shortest route possible in
terms of hops. AODV is also able to handle changes
in routes and can create new routes if there is an error.

B. Algorithm
         The AODV protocol deals with a routing
table. Every node is associated with a routing table.
When a node knows a route to the destination, it sends
a route reply to the source node. Its entries are as
follows. Destination Address - Destination Sequence
Number – Next Hop Address - Lifetime (expiration or
deletion time of the route) - Hop Count (number of
hops to reach the destination). Nodes that can be
communicated with are directly considered to be
neighbors.

          A node keeps track of its neighbors by
listening for a „HELLO‟ message that each new node           SIMULATION SCENARIO
broadcast and nodes broadcast at set intervals. When                  Simple topology with 4 nodes is used. Each
one node (the originator) needs to send a message to         node is connected to other by wireless link. A simple
another node that is not its neighbor, it broadcasts a       MANET example script available in ns-2.30/tcl/ex is
Route Request (RREQ) message. The RREQ message               used as a base script. The node movement patterns are
contains the following information: the source, the          generated by giving commands as given in script. A
destination, the lifespan of the message and a               node is situated at random position at the start of
Sequence Number, which serve as a unique ID.                 simulation and moves toward random destination in
                                                             the script with random velocity as specified in
          When the originator node‟s neighbors               command. The traffic is generated manually using
receive the RREQ message they have two choices: if           commands in script. We have used ftp as TCP traffic.
they know a route to the destination or if they are the
destination they can send a Route Reply (RREP)
message back to originator, otherwise they will
rebroadcast the RREQ to their set of neighbors. The
message keeps getting re-broadcasted until its lifespan
is completed. If the originator does not receive a reply
in a set amount of time, it will rebroadcast the request
except that this time the RREQ message will have a
longer lifespan and a new ID number.

          All of the nodes use the Sequence Number
                                                                       We have established three TCP connections,
in the RREQ to insure that they do not re-broadcast a        tcp1, tcp2, and tcp3. We have configured Energy
RREQ. Sequence numbers allow nodes to compare                Model which is implemented in ns, is a node attribute.
how “fresh” their information on other nodes is.             The energy model represents level of energy in a
Every time a node sends out any type of message, it          mobile host[10]. The energy model in a node has an
increases its own Sequence number. Each node                 initial value which is the level of energy the node has
records the Sequence number of all the other nodes it
                                                             at the beginning of the simulation. This is known as
talks to. A higher Sequence numbers signifies a              initialEnergy_. It also has a given energy usage for
fresher route. In this way, it is possible for other nodes   every packet it transmits and receives. These are
to determine which one has more accurate                     called txPower_ and rxPower_. Timings for traffic are
information.                                                 given below.

                                                                                                   1343 | P a g e
Ajay Shah, Hitesh Gupta, Mukesh Baghel / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 2, Issue4, July-August 2012, pp.1342-1346
ftp1 – 1s to 38 s ftp2 – 1s to 38 s ftp3 – 1 s to 38 s   particular node address is same as the P-Addr in
Each and every node consumes energy in transmitting      RREQ, then the Relay value of that node will be set to
DATA packets, CONTROL packets and ACK                    1. It means that the node will participate in the search
packets.                                                 process of the destination. Else, the node will not
                                                         participate in the route discovery process.

III. E2AODV                                              TABLE II. FIELDS THAT ARE USED IN
          In the ERS, the source node will broadcast     RELAY FORWARD TABLE
the RREQ to its neighbors to find route. If the
neighbor nodes receive it for the first time, it will
relay the RREQ. Or else it will just drop the packet.
Hence there will be useful information regarding the               Initially it will be set to null. And when a
sender and last hop, dropping the duplicate packets      node receives a RREQ packet to process, the TTL
wastes the neighbor‟s information. Therefore we          value will be checked and the SD pair with the
propose a design which helps in utilizing the            processed relay and forward value as in Fig.4 will be
information before dropping the duplicate RREQ           stored in the table then only the node will forward the
packets to make decision about node‟s relay value.       RREQ. And when a node receives a RREQ, it will
This helps in making some nodes silent without           check in relay forward table to find out whether it is
forwarding the redundant rebroadcast of the RREQ         processed before or not. Then based on the Relay and
and thus reduces energy consumption for AODV             forward value, it will decide whether to relay the
routing protocol. This improved ERS scheme is            RREQ or to just drop the RREQ. The lifetime field is
named as E2AODV, Energy Efficient AODV. In               added so that of the particular entry will be deleted
E2AODV, the state of the node is determined as           after particular time i.e., it will be deleted when the
relaying or being silent by using the Relay Value of     RREP is received for that source destination or when
each node in the network. Initially the Relay and        there is any route n breakage during the forwarding of
Forward value of all the nodes is set to be 1, which     the RREP or data packets. Or the entry will be
means that it will relay the RREQ. It is shown in        automatically deleted by the MAC layer when the
Fig.2. And the Relay and Forward value will be           particular node is not participating in the forwarding
updated based on the TTL value and the P-Addr field      of the data. This has been identified when that
in the RREQ packet. The connectivity between nodes       particular node doesn‟t receive any RREP.
in Fig. 2 implies that it can be reachable in one hop
that is within the nodes transmission range. The Relay
value will be changed based on the information
provided in the duplicate RREQ packets. Generally in
the RREQ packets, other than the hop count, source
and the destination sequence number, there will be
three node address fields mentioned in it.




                                                         Figure 3. Final Relay and Forward value in E2AODV

                                                         IV. POWER CONTROL
                                                                  By default, the packets are transmitted with
Figure 2. Initial Relay and Forward Value in             maximum power, which represents a considerable
E2AODV                                                   loss on energy. The aim is to adapt the transmission
                                                         power levels on a perpacket basis for each neighbor.
TABLE I.        MODIFIED         RREQ      PACKET        The needed power level to reach a neighbor will be
FORMAT                                                   determined during the „HELLO‟ process. Instead of
                                                         sending one „HELLO‟ message, the node will
                                                         broadcast four „HELLO‟ messages with a power level
                                                         of 100%, 75%, 50%, and 25% respectively. When a
                                                         node receives a „HELLO‟ message, it starts a timer to
         When a node receives a RREQ with TTL            listen to the maximum messages it can. Once the
value as 0 or the duplicate RREQ, i.e. with the same     timer expired, it sends back to the initiator an
broadcast ID that has been processed before, it will     acknowledgement with the last power level it
check for the P-Addr field in the RREQ. If that

                                                                                                1344 | P a g e
Ajay Shah, Hitesh Gupta, Mukesh Baghel / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 2, Issue4, July-August 2012, pp.1342-1346
received. The nodes then update their routing table
with the power level required to communicate.




Figure 2 - The „HELLO‟ process                           A. Performance Metrics:
                                                                Three performance metrics are used to
         When a link breakage occurs, the sending      evaluate the protocol Variants.
node tries to send once more the packet with a power
level of 100%. If the packet is received and           1) Energy Consumption:
acknowledged by the destination, both the routing               Total energy consumed for transmitting and
tables are updated. Otherwise, the destination node    receiving
does not acknowledge the packet and the RERR           packets by all the nodes in the network.
process is start again.
                                                       2) Normalized Routing Load:
                                                                The ratio of the total number of packets
                                                       received at the destination to the total number of
                                                       RREQ packets transmitted by all the nodes in the
                                                       network.

                                                       3) Collisions:
                                                                The total number of collisions incurred at the
                                                       MAC layer during the transmission of data and
                                                       control packets is
                                                       considered.

                                                       B. Varying Node Mobility for Dense and Sparse
Figure 3 - The RERR process                            Network
                                                                Performance comparison of AODV and
          Given the same sequence number, the          E2AODV has been done for dense and sparse
traditional AODV routing protocol selects the route    networks such as 30 and 50 and 80 nodes respectively
with the fewer number of hops to the destination,      by varying the node speed from 0 m/s to 30 m/s.
without specifically accounting for the quality of
links. AODV is used for ad hoc networks to determine
the shortest routes in terms of hops that are not
representative of the energy spent.
          To improve the energy efficiency for the
AODV protocol, we will consider a metric that takes
into consideration the total amount of energy
necessary to reach the destination node, and the
battery level of intermediary nodes.

                                                       Fig. comparison of transmit energy for node 1 using
                                                       DSR and DSDV as a routing protocol

                                                               Energy consumption is generally high when
                                                       the number of nodes in the network is increased. But
                                                       by making some nodes silent, the E2AODV saves 80-
                                                       90% of energy when compared to AODV in dense

                                                                                             1345 | P a g e
Ajay Shah, Hitesh Gupta, Mukesh Baghel / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 2, Issue4, July-August 2012, pp.1342-1346
networks. And in sparse network, 70-75% less
consumption of energy in E2AODV when compared            [4]    C.E.Perkins,        “AdHoc       Networking”,
with AODV.                                                      Addison-Wesley Publication, Singapore,
                                                                2001.
Table 3. Energy Level For Routing Protocols              [5]    Woonkang Heo and Minseok Oh,
                                                                “Performance of Expanding Ring Search
                                                                Scheme in AODV Routing Algorithm”,
                                                                Second International Conference on Future
                                                                Generation Communication and Networking,
                                                                pp : 128-132, China, 2008.
                                                         [6]    D.N.Pham and H.Choo, “Energy Efficient
                                                                Ring Search for Route Discovery in
                                                                MANETs” ,IEEE International Conference
                                                                of Communication, Turkey, 2008.
                                                         [7]    D.N.Pham,V.D.Nguyen,                V.T.Pham,
                                                                N.T.Nguyen,         X.BacD,       T.D.Nguyen,
                                                                C.Kuperschmidt           and      T.Kaiser,“An
                                                                Expending Ring SearchAlgorithm For
                                                                Mobile Adhoc Networks”, International
                                                                Conference on Advanced Technologies for
                                                                communication,Vietnam, 2010
                                                         [8]    D. Johnson, D. Maltz, Y. Hu, “The Dynamic
                                                                Source Routing Protocol for Mobile Ad Hoc
                                                                Networks”, Internet Draft, July 2004,
                                                                Available:         http://www.ietf.org/internet-
                                                                drafts/draft-ietf-manet-dsr- 10.txt
                                                         [9]    C. E. PERKINS, P. BHAGWAT, “DSDV
                                                                (Highly Dynamic Destination-Sequenced
                                                                Distance Vector routing protocol) - Highly
                                                                Dynamic Destination- Sequenced Distance
                                                                Vector (DTDV) for Mobile Computers”,
                                                                Proc. of the SIGCOMM 1994 Conference on
V. Conclusion                                                   Communications Architectures, Protocols
          Energy consumption plays significant role in          and Applications, pp 234-244, Aug 1994.
network lifetime. So It is important to study how to     [10]   C. Perkins and E. Royer, “Ad Hoc On-
reduce the power consumption while at the same time             demand Distance Vector (AODV) Routing”,
fully-utilize the bandwidth resource. The traditional           Internet Draft, MANET working group,
AODV protocol was improved by introducing a                     draft-ietf-manet-aodv-05.txt, March 2000.
procedure to adapt the transmission power levels on a    [11]   V. Park and M. Corson, “Temporally-
per-packet basis for each neighbor as well as by                Ordered Routing Algorithm (TORA) Version
changing the hop-count metric for an energy aware               1 – Functional Specification”, Internet Draft,
metric. At the network layer, routes are determined in          MANET working group,draft-ietf-manet-
such a way as to minimize energy consumption, and               tora-spec-02.txt, October 1999.
to avoid the nodes with low battery. E2AODV              [12]   Goodman, D, Mandayam, N, “Power control
provides efficient energy consuming routing protocol            forwireless networks”, in Mobile Multimedia
with reduced routing overhead.                                  Communications, 1999 (MoMuC ‟99) IEEE
                                                                International Workshop on, pp 55-63, Nov.
                                                                1999.
REFERENCES
                                                         [13]   C. Comaniciu, H.V. Poor, “QoS Provisioning
                                                                forWireless Ad Hoc Data Networks”, Invited
  [1]   D.P.Agarwal and Q-A Zeng, Introduction to
                                                                paper - 42nd IEEE Conference on Decision
        Wireless and Mobile Systems, Brooks / Cole
                                                                and Control., December
        Pulishing, ISBN No. 0534-40851-6,436
        pages,2003.
  [2]   Padmini Misra, Routing Protocols for Ad
        HocbileWirelessNetworks,http://www.cse.w
        ustl.edu/~jain/cis788-99/ftp/adhoc_routing.
  [3]   Elizabeth M.Royer and C.K.Toh,“A Review
        of current Routing Protocol for Ad-Hoc
        Mobile Wireless Networks ”, 2003.

                                                                                               1346 | P a g e

Weitere ähnliche Inhalte

Was ist angesagt?

Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
A study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrA study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrIAEME Publication
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...eSAT Publishing House
 
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...IJERA Editor
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocolsmita gupta
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 

Was ist angesagt? (19)

Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Ab25144148
Ab25144148Ab25144148
Ab25144148
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
A study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrA study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsr
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 
Hj2413101315
Hj2413101315Hj2413101315
Hj2413101315
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...
 
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...
 
Research on performance of routing protocols in manet
Research on performance of routing protocols in manetResearch on performance of routing protocols in manet
Research on performance of routing protocols in manet
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocol
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
Br31467472
Br31467472Br31467472
Br31467472
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Hs2413641369
Hs2413641369Hs2413641369
Hs2413641369
 
Hd3312521256
Hd3312521256Hd3312521256
Hd3312521256
 

Andere mochten auch (20)

Hu2413771381
Hu2413771381Hu2413771381
Hu2413771381
 
Es24906911
Es24906911Es24906911
Es24906911
 
Gj2411521157
Gj2411521157Gj2411521157
Gj2411521157
 
Mb2420032007
Mb2420032007Mb2420032007
Mb2420032007
 
Fk2410001003
Fk2410001003Fk2410001003
Fk2410001003
 
J24077086
J24077086J24077086
J24077086
 
Hh2412981302
Hh2412981302Hh2412981302
Hh2412981302
 
Gv2412201226
Gv2412201226Gv2412201226
Gv2412201226
 
Gs2412041207
Gs2412041207Gs2412041207
Gs2412041207
 
H24051055
H24051055H24051055
H24051055
 
Fz2410881090
Fz2410881090Fz2410881090
Fz2410881090
 
He2412821285
He2412821285He2412821285
He2412821285
 
Fe24972976
Fe24972976Fe24972976
Fe24972976
 
Ia2414161420
Ia2414161420Ia2414161420
Ia2414161420
 
Gx2412321236
Gx2412321236Gx2412321236
Gx2412321236
 
Gn2411721180
Gn2411721180Gn2411721180
Gn2411721180
 
Torrox
TorroxTorrox
Torrox
 
CurriculumVitae
CurriculumVitae CurriculumVitae
CurriculumVitae
 
ACE-PT-Cert
ACE-PT-Cert ACE-PT-Cert
ACE-PT-Cert
 
1921 Pink Creme
1921 Pink Creme1921 Pink Creme
1921 Pink Creme
 

Ähnlich wie Ho2413421346

Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission usingeSAT Publishing House
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
 
Energy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc NetworksEnergy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc NetworksZac Darcy
 
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...IJEEE
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...eeiej_journal
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...ijrap
 
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...eeiej
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)IJMER
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewBRNSSPublicationHubI
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 

Ähnlich wie Ho2413421346 (20)

Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
 
B03406010
B03406010B03406010
B03406010
 
Energy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc NetworksEnergy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc Networks
 
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
 
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
 
En33838844
En33838844En33838844
En33838844
 
En33838844
En33838844En33838844
En33838844
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Az26337342
Az26337342Az26337342
Az26337342
 

Kürzlich hochgeladen

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Kürzlich hochgeladen (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Ho2413421346

  • 1. Ajay Shah, Hitesh Gupta, Mukesh Baghel / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1342-1346 Energy-Efficient Routing Protocol For Mobile Ad Hoc Networks Ajay Shah*, Hitesh Gupta**, Mukesh Baghel*** *(Department of Computer Science, Patel College of Science & Technology, Bhopal, India ** (Department of Computer Science, Patel College of Science & Technology, Bhopal, India) *** (Department of Computer Science, Patel College of Science & Technology, Bhopal, India) ABSTRACT Adhoc on demand distance vector routing major classification of routing protocols based on the protocol(AODV) is specially designed for mobile network structure. Based on routing strategy, the adhoc networks with reduced overhead using routing protocols are grouped as Table-driven and Expanding Ring Search technique. But energy source initiated on-demand driven [3]. Table-driven consumption should also be considered in MANET protocols usually find routes constantly and maintain due to battery constrain of the nodes. In this in routing table for all source-destination pairs at the paper, we choose an energy efficient route expense of high routing overhead. On-demand discovery process for AODV based on Expanding protocols such as AODV and DSR [4] incur less Ring Search(ERS). We want to saves energy of the routing overhead by finding path between a nodes to avoide the redundant rebroadcasting of sourcedestination pair only when it is necessary. the route request packets. The relaying status of Compared to tabledriven protocols, on-demand the node is decided based on the broadcasting of its protocols utilize less bandwidth and energy RREQ packets by its neighbors. And it helps in consumption. Ad-Hoc On-Demand Distance Vector reducing routing overhead incurred during the Routing Protocol (AODV) [4] finds route between route discovery process. Simulations are nodes only when it is necessary. It does not maintain performed to study the performance of Energy topology information about all other nodes in the Efficient AODV (E2AODV) protocol using NS2, network. In AODV, each time the node initiates the the Network Simulator. This E2AODV reduces route discovery for some destination using simple energy consumption by 80-90% compared to flooding for broadcasting the Route Request (RREQ) AODV. It also reduces routing overhead of around across the network. Energy efficiency is an important 70-75% and there by reduces 65-70% collisions. issue in MANETs where nodes rely on limited power and computational resource, yet are required to Keywords: Mobile Ad-hoc Networks, Ad-hoc On- cooperate in all sorts of fundamental network Demand Distance Vector Routing Protocol, activities including routing. So, to control the network Expanding Ring Search, Energy Consumption. wide broadcast of the RREQs, the source node uses the Expanding Ring Search (ERS) technique[5], I. INTRODUCTION which allows a source to broadcast the RREQ of Networks are classified into two main types increasingly larger areas of the network if a route to based on connectivity, wired and wireless networks. the destination is not found. Unfortunately, some A wireless network provides flexibility over standard nodes in ERS technique rebroadcast the RREQs wired networks. Only with the help of wireless unnecessarily. For extending the lifetime of the nodes networks, the users can retrieve information and get in MANET, many energy efficient protocols have services even when they travel from place to place. been designed. In this paper, we propose a simple but The single-hop and multi-hop Mobile Ad-hoc energy efficient design for AODV Routing Protocol Networks (MANET) are the two major classifications which makes some nodes silent without forwarding of wireless networks. Base stations are used in single- the redundant rebroadcasting of the RREQ packets hop networks to accomplish communication between which is not used by any other node in the network nodes. MANETs [1] are infra structure-less, self for finding routes. Using NS2, we evaluate the organizing networks of mobile nodes without any performance of our energy consumption design to centralized administration like base stations. The AODV, which is named as Energy Efficient AODV communication between nodes is accomplished via (E2AODV), in MANET. In the rest of the paper, other nodes which are called intermediate or Section II reviews the related work. The E2AODV, a forwarding nodes. So there is a need of a routing new energy efficient approach is described in Section procedure between nodes. And hence the routing III. The simulation model and result analysis are protocol plays a major role in MANET. provided in Section IV. Finally in Section V, we The routing protocols in MANET are mainly present our conclusions. classified using their routing strategy and network structure. [2]. Flat routing, hierarchical routing and geographic position assisted routing are the three 1342 | P a g e
  • 2. Ajay Shah, Hitesh Gupta, Mukesh Baghel / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1342-1346 II. THROUGHPUT OF AODV ROUTING A. Overview The Ad Hoc on-demanded Distance Vector (AODV) routing protocol is a method of routing messages between mobile computers. It allows these mobile computers, or nodes, to pass messages through their neighbors to nodes with which they cannot directly communicate. AODV does this by discovering the routes along which messages can be passed. AODV makes sure these routes do not contain loops and tries to find the shortest route possible in terms of hops. AODV is also able to handle changes in routes and can create new routes if there is an error. B. Algorithm The AODV protocol deals with a routing table. Every node is associated with a routing table. When a node knows a route to the destination, it sends a route reply to the source node. Its entries are as follows. Destination Address - Destination Sequence Number – Next Hop Address - Lifetime (expiration or deletion time of the route) - Hop Count (number of hops to reach the destination). Nodes that can be communicated with are directly considered to be neighbors. A node keeps track of its neighbors by listening for a „HELLO‟ message that each new node SIMULATION SCENARIO broadcast and nodes broadcast at set intervals. When Simple topology with 4 nodes is used. Each one node (the originator) needs to send a message to node is connected to other by wireless link. A simple another node that is not its neighbor, it broadcasts a MANET example script available in ns-2.30/tcl/ex is Route Request (RREQ) message. The RREQ message used as a base script. The node movement patterns are contains the following information: the source, the generated by giving commands as given in script. A destination, the lifespan of the message and a node is situated at random position at the start of Sequence Number, which serve as a unique ID. simulation and moves toward random destination in the script with random velocity as specified in When the originator node‟s neighbors command. The traffic is generated manually using receive the RREQ message they have two choices: if commands in script. We have used ftp as TCP traffic. they know a route to the destination or if they are the destination they can send a Route Reply (RREP) message back to originator, otherwise they will rebroadcast the RREQ to their set of neighbors. The message keeps getting re-broadcasted until its lifespan is completed. If the originator does not receive a reply in a set amount of time, it will rebroadcast the request except that this time the RREQ message will have a longer lifespan and a new ID number. All of the nodes use the Sequence Number We have established three TCP connections, in the RREQ to insure that they do not re-broadcast a tcp1, tcp2, and tcp3. We have configured Energy RREQ. Sequence numbers allow nodes to compare Model which is implemented in ns, is a node attribute. how “fresh” their information on other nodes is. The energy model represents level of energy in a Every time a node sends out any type of message, it mobile host[10]. The energy model in a node has an increases its own Sequence number. Each node initial value which is the level of energy the node has records the Sequence number of all the other nodes it at the beginning of the simulation. This is known as talks to. A higher Sequence numbers signifies a initialEnergy_. It also has a given energy usage for fresher route. In this way, it is possible for other nodes every packet it transmits and receives. These are to determine which one has more accurate called txPower_ and rxPower_. Timings for traffic are information. given below. 1343 | P a g e
  • 3. Ajay Shah, Hitesh Gupta, Mukesh Baghel / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1342-1346 ftp1 – 1s to 38 s ftp2 – 1s to 38 s ftp3 – 1 s to 38 s particular node address is same as the P-Addr in Each and every node consumes energy in transmitting RREQ, then the Relay value of that node will be set to DATA packets, CONTROL packets and ACK 1. It means that the node will participate in the search packets. process of the destination. Else, the node will not participate in the route discovery process. III. E2AODV TABLE II. FIELDS THAT ARE USED IN In the ERS, the source node will broadcast RELAY FORWARD TABLE the RREQ to its neighbors to find route. If the neighbor nodes receive it for the first time, it will relay the RREQ. Or else it will just drop the packet. Hence there will be useful information regarding the Initially it will be set to null. And when a sender and last hop, dropping the duplicate packets node receives a RREQ packet to process, the TTL wastes the neighbor‟s information. Therefore we value will be checked and the SD pair with the propose a design which helps in utilizing the processed relay and forward value as in Fig.4 will be information before dropping the duplicate RREQ stored in the table then only the node will forward the packets to make decision about node‟s relay value. RREQ. And when a node receives a RREQ, it will This helps in making some nodes silent without check in relay forward table to find out whether it is forwarding the redundant rebroadcast of the RREQ processed before or not. Then based on the Relay and and thus reduces energy consumption for AODV forward value, it will decide whether to relay the routing protocol. This improved ERS scheme is RREQ or to just drop the RREQ. The lifetime field is named as E2AODV, Energy Efficient AODV. In added so that of the particular entry will be deleted E2AODV, the state of the node is determined as after particular time i.e., it will be deleted when the relaying or being silent by using the Relay Value of RREP is received for that source destination or when each node in the network. Initially the Relay and there is any route n breakage during the forwarding of Forward value of all the nodes is set to be 1, which the RREP or data packets. Or the entry will be means that it will relay the RREQ. It is shown in automatically deleted by the MAC layer when the Fig.2. And the Relay and Forward value will be particular node is not participating in the forwarding updated based on the TTL value and the P-Addr field of the data. This has been identified when that in the RREQ packet. The connectivity between nodes particular node doesn‟t receive any RREP. in Fig. 2 implies that it can be reachable in one hop that is within the nodes transmission range. The Relay value will be changed based on the information provided in the duplicate RREQ packets. Generally in the RREQ packets, other than the hop count, source and the destination sequence number, there will be three node address fields mentioned in it. Figure 3. Final Relay and Forward value in E2AODV IV. POWER CONTROL By default, the packets are transmitted with Figure 2. Initial Relay and Forward Value in maximum power, which represents a considerable E2AODV loss on energy. The aim is to adapt the transmission power levels on a perpacket basis for each neighbor. TABLE I. MODIFIED RREQ PACKET The needed power level to reach a neighbor will be FORMAT determined during the „HELLO‟ process. Instead of sending one „HELLO‟ message, the node will broadcast four „HELLO‟ messages with a power level of 100%, 75%, 50%, and 25% respectively. When a node receives a „HELLO‟ message, it starts a timer to When a node receives a RREQ with TTL listen to the maximum messages it can. Once the value as 0 or the duplicate RREQ, i.e. with the same timer expired, it sends back to the initiator an broadcast ID that has been processed before, it will acknowledgement with the last power level it check for the P-Addr field in the RREQ. If that 1344 | P a g e
  • 4. Ajay Shah, Hitesh Gupta, Mukesh Baghel / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1342-1346 received. The nodes then update their routing table with the power level required to communicate. Figure 2 - The „HELLO‟ process A. Performance Metrics: Three performance metrics are used to When a link breakage occurs, the sending evaluate the protocol Variants. node tries to send once more the packet with a power level of 100%. If the packet is received and 1) Energy Consumption: acknowledged by the destination, both the routing Total energy consumed for transmitting and tables are updated. Otherwise, the destination node receiving does not acknowledge the packet and the RERR packets by all the nodes in the network. process is start again. 2) Normalized Routing Load: The ratio of the total number of packets received at the destination to the total number of RREQ packets transmitted by all the nodes in the network. 3) Collisions: The total number of collisions incurred at the MAC layer during the transmission of data and control packets is considered. B. Varying Node Mobility for Dense and Sparse Figure 3 - The RERR process Network Performance comparison of AODV and Given the same sequence number, the E2AODV has been done for dense and sparse traditional AODV routing protocol selects the route networks such as 30 and 50 and 80 nodes respectively with the fewer number of hops to the destination, by varying the node speed from 0 m/s to 30 m/s. without specifically accounting for the quality of links. AODV is used for ad hoc networks to determine the shortest routes in terms of hops that are not representative of the energy spent. To improve the energy efficiency for the AODV protocol, we will consider a metric that takes into consideration the total amount of energy necessary to reach the destination node, and the battery level of intermediary nodes. Fig. comparison of transmit energy for node 1 using DSR and DSDV as a routing protocol Energy consumption is generally high when the number of nodes in the network is increased. But by making some nodes silent, the E2AODV saves 80- 90% of energy when compared to AODV in dense 1345 | P a g e
  • 5. Ajay Shah, Hitesh Gupta, Mukesh Baghel / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1342-1346 networks. And in sparse network, 70-75% less consumption of energy in E2AODV when compared [4] C.E.Perkins, “AdHoc Networking”, with AODV. Addison-Wesley Publication, Singapore, 2001. Table 3. Energy Level For Routing Protocols [5] Woonkang Heo and Minseok Oh, “Performance of Expanding Ring Search Scheme in AODV Routing Algorithm”, Second International Conference on Future Generation Communication and Networking, pp : 128-132, China, 2008. [6] D.N.Pham and H.Choo, “Energy Efficient Ring Search for Route Discovery in MANETs” ,IEEE International Conference of Communication, Turkey, 2008. [7] D.N.Pham,V.D.Nguyen, V.T.Pham, N.T.Nguyen, X.BacD, T.D.Nguyen, C.Kuperschmidt and T.Kaiser,“An Expending Ring SearchAlgorithm For Mobile Adhoc Networks”, International Conference on Advanced Technologies for communication,Vietnam, 2010 [8] D. Johnson, D. Maltz, Y. Hu, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks”, Internet Draft, July 2004, Available: http://www.ietf.org/internet- drafts/draft-ietf-manet-dsr- 10.txt [9] C. E. PERKINS, P. BHAGWAT, “DSDV (Highly Dynamic Destination-Sequenced Distance Vector routing protocol) - Highly Dynamic Destination- Sequenced Distance Vector (DTDV) for Mobile Computers”, Proc. of the SIGCOMM 1994 Conference on V. Conclusion Communications Architectures, Protocols Energy consumption plays significant role in and Applications, pp 234-244, Aug 1994. network lifetime. So It is important to study how to [10] C. Perkins and E. Royer, “Ad Hoc On- reduce the power consumption while at the same time demand Distance Vector (AODV) Routing”, fully-utilize the bandwidth resource. The traditional Internet Draft, MANET working group, AODV protocol was improved by introducing a draft-ietf-manet-aodv-05.txt, March 2000. procedure to adapt the transmission power levels on a [11] V. Park and M. Corson, “Temporally- per-packet basis for each neighbor as well as by Ordered Routing Algorithm (TORA) Version changing the hop-count metric for an energy aware 1 – Functional Specification”, Internet Draft, metric. At the network layer, routes are determined in MANET working group,draft-ietf-manet- such a way as to minimize energy consumption, and tora-spec-02.txt, October 1999. to avoid the nodes with low battery. E2AODV [12] Goodman, D, Mandayam, N, “Power control provides efficient energy consuming routing protocol forwireless networks”, in Mobile Multimedia with reduced routing overhead. Communications, 1999 (MoMuC ‟99) IEEE International Workshop on, pp 55-63, Nov. 1999. REFERENCES [13] C. Comaniciu, H.V. Poor, “QoS Provisioning forWireless Ad Hoc Data Networks”, Invited [1] D.P.Agarwal and Q-A Zeng, Introduction to paper - 42nd IEEE Conference on Decision Wireless and Mobile Systems, Brooks / Cole and Control., December Pulishing, ISBN No. 0534-40851-6,436 pages,2003. [2] Padmini Misra, Routing Protocols for Ad HocbileWirelessNetworks,http://www.cse.w ustl.edu/~jain/cis788-99/ftp/adhoc_routing. [3] Elizabeth M.Royer and C.K.Toh,“A Review of current Routing Protocol for Ad-Hoc Mobile Wireless Networks ”, 2003. 1346 | P a g e