SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Dr. P.K.Suri, Satmeet Kaur / International Journal of Engineering Research and Applications
                   (IJERA)              ISSN: 2248-9622      www.ijera.com
                     Vol. 2, Issue 5, September- October 2012, pp.2076-2079
                Optimal DSR and Load Balancing in MANET
                                 Dr. P.K.Suri* Satmeet Kaur**
                               *(Dean and Professor, H.C.T.M, Kaithal, Haryana)
                                **(M.Tech Student, H.C.T.M, Kaithal, Haryana)


ABSTRACT
         MANET (Mobile Ad-hoc Network) is an              C. Commercial Activities: E-banking and e-
infra-structure less dynamic network in which                commerce, dynamic database access, mobile
each nodes are free to move anywhere any time                offices i.e business anywhere anytime make use
without any prior knowledge. As mobile                       of these networks.
communication is growing day by day, so it is             D. Home and Entertainment Facilities: In
very common for mobile nodes to be congested at              home/office networking, multi user gaming,
any time in the network. Our goal is to distribute           robotic pets, theme parks, wireless services
the load from over loaded nodes to under loaded              Manet helps a lot.
nodes in an optimal way. Also DSR algorithm for           E. Education: For setting of virtual classrooms,
routing is optimized using minimum CFD                       adhoc communication through meetings and
(Cumulative Forward Distance).                               lectures, online distance education and in setting
                                                             of university and college campuses Manets play
Keywords- Load Balancing, DSR, Forward                       an important role.
Distance (FD), Cumulative Forward Distance
(CFD).                                                    II. LITERATURE SURVEY
                                                                   MANET has a dynamic network topology,
I. INTRODUCTION                                           and constraint resources, such as bandwidth, buffer
         MANET (Mobile Ad hoc Network) is a               space, battery and transmission power and so on.
dynamic infra-structure-less network in which nodes       Distributing traffic fairly among the mobile hosts,
are free to move anywhere, anytime without any            based on measurement of path statistics, is beneficial
prior knowledge. Due to dynamic topology it is            in order to take full advantage of the limited
mandatory that each node has updated route table          resources and to use network resources better so that
having proper routes to other nodes. For this each        the congestion and end-to-end delay are minimized.
node has to communicate with other nodes time to
time. The main characteristics of MANET are:              Purpose of Load-Balancing Schemes
                                                          The overall purpose of various load-balancing
1.1 Dynamic Topology MANET is highly dynamic              schemes is to:
in nature i.e. nodes are free to move anywhere at any           Select non-congested paths or to
moment according to its transmission range.                         disseminate excessive load of a node to its
                                                                    neighbours.
1.2 Limited Bandwidth: In MANET radio band                      Balances energy consumption of the
will be limited and hence data rates are much lower                 network.
than a wired network. So the routing protocols must             Ensure efficiency and robustness.
optimally use the offered bandwidth to reduce                   Reduce end to end delay and number of
overhead.                                                           packet lost by queue overflow.
                                                                Enhance the utilization of resources.
1.3 Higher Packet loss: Due to unstable links,                  Improve the overall network performance
transmission errors there are more chances of packet                and reduce collision by load distribution.
loss in MANET which is not desirable.                      Alternate Path Routing [1] provides load
                                                          balancing by distributing the data traffic along set of
MANET APPLICATIONS MANET can be used in                   alternative paths. By using set of alternate paths,
any of the daily life application as described below:     APR also provide failure protection, i.e. if one path
A. Military Operations Manet is very useful in            fails to transfer the data, it can use another
    military operations for safety purposes, by           alternative paths. Due to Route coupling resulted
    wireless communication in sensitive regions. It       from geographic proximity of different candidate
    is also useful in automating battlefields through     paths between common endpoints (nodes) APR are
    sensor networks.                                      not fully utilized.
B. Emergency services- In emergency services
    like supporting hospital services, search and         Dynamic Load Aware Routing (DLAR) [2] makes
    rescue operations, disaster recovery and in help      use of number of packets buffered in the interface as
    lining these networks are very useful.                main route selection criteria. Source node floods the

                                                                                                2076 | P a g e
Dr. P.K.Suri, Satmeet Kaur / International Journal of Engineering Research and Applications
                   (IJERA)              ISSN: 2248-9622      www.ijera.com
                     Vol. 2, Issue 5, September- October 2012, pp.2076-2079
RREQ packet to its immediate neighboring nodes to          smaller than DP (i.e., DP’ < DP). Each node updates
discover a new route. When the intermediate nodes          the route entry only when the newly acquired path
along the path to destination receives RREQ for first      (P’) is shorter than the previous path (P) in hop
time, they make an entry for the <source,                  count, and DP’ is smaller than DP (i.e., DP’ <
destination> pair and also record the previous hop to      DP).D-LAOR does not allow the intermediate nodes
that entry (to proceed Backward Learning).Nodes            to generate a RREP packet to the source node to
then also attach their load information and broadcast      avoid the problem with stale path delay information.
the RREQ packet After receiving the first RREQ
packet, the destination waits for few amount of time       Workload-Based Adaptive Load Balancing
so that it can learn about all possible routes. In this    (WBALB) [6] protocol makes each node react to
protocol, intermediate nodes cannot send a RREPLY          RREQs according to a simple rule based on the local
back to the source.                                        information of the node and it runs on top of existing
                                                           routing protocols. This protocol is motivated by the
Load Sensitive Routing (LSR) protocol [3] is based         observation that ad hoc on-demand routing protocols
on the DSR protocol. This protocol utilizes network        flood route request (RREQ) messages to acquire
load information as the main path selection criterion.     routes, and only nodes that respond to those
It uses a re-direction method to find better paths         messages have a potential to serve as intermediate
effectively. The source node can quickly respond to        forwarding nodes. In other words, a node can
a call for connection without losing the chance to         completely be excluded from a path if the node
obtain the best path. Based on the initial status of an    drops the RREQ in a route discovery phase for the
active path, LSR can search for better paths               path.
dynamically if the active path becomes congested
during data transmission. In route discovery we use        Load Balanced Dynamic Source Routing
a redirection method similar to we developed in            (LBDSR) [7] Existing approaches try to improve the
Multi path routing to forward Route Reply (RREP)           performance of routing protocols with respect to
messages. This method can let the source node to           traffic balancing or energy consumption balancing.
obtain better path without any increase in flooding        In this paper author improve the well known
cost and waiting delay on the destination nodes. In        Dynamic Source Routing (DSR) protocol to the so
LSR, we adapt the active routes in a route in a            called Load Balanced DSR (LBDSR) protocol. We
different context, by using network load information.      modify the RREQ (Route Request) and RREP
When a used path becomes congested, LSR tries to           (Route Reply) messages in DSR in order to maintain
search for a lightweight path. The source node             the remaining energy of intermediate nodes which
continues to send data traffic along the congested         forward RREQ and RREP. Route structure, available
paths until a better path is found. Route adaptation       in the nodes cache, is modified so that the remaining
strategy is based on the initial status and current        energy of nodes can be calculated. LBDSR shows
status of an active path.                                  better traffic balancing and energy consumption
                                                           balancing, end-to-end delay and route reliability
Weighted Load Aware Routing (WLAR) [4]                     metrics than DSR.
protocol selects the route based on the information
from the neighbor nodes which are in the route to the      Distributed Load Balanced Routing (DLBR) [8] is
destination. In WLAR, a new term traffic load is           a new distributed load based routing algorithm
defined as the product of average queue size of the        intended for a variety of traffic classes to establish
interface at the node and the number of sharing            the best routing paths. The proposed algorithm
nodes which are declared to influence the                  calculates the cost metric on the basis of the load on
transmission of their neighbors. In WLAR, each             the links. The dynamic traffic can be classified as
node has to measure its average number of packets          multimedia and normal traffic. Multimedia traffic is
queued in its interface, and then have to check            considered as high priority and normal traffic as low
whether it is a sharing node to its neighbor or not. If    priority. The routing of high priority traffic is
it is a sharing node itself, it has to let its neighbors   performed over the lightly loaded links, in such a
know it. After each node gets its own average packet       manner that the links with lighter loads are chosen
queue size and the number of its sharing nodes, it         instead of links with heavier-loads. In addition, the
has to calculate its own total traffic load.               resources can be shared between the high priority
                                                           traffic’s path and low priority traffic. In the absence
Delay-based Load-Aware On-demand Routing                   of multimedia traffic, the lightly loaded path can be
(D-LAOR) [5] protocol that utilizes both the               utilized by normal traffic.
estimated total path delay and the hop count as the
route selection criterion. D-LAOR allows the               DLFR [9] this algorithm proposed a new routing
intermediate nodes to relay duplicate RREQ packets         protocol for estimating the shortest path in such open
if the new path (P’) to the source of RREQ is shorter      networks by introducing a statistical metric for “the
than the previous path (P) in hop count, and DP’ is        reliable routing path selection”. DLFR facilitated


                                                                                                 2077 | P a g e
Dr. P.K.Suri, Satmeet Kaur / International Journal of Engineering Research and Applications
                   (IJERA)              ISSN: 2248-9622      www.ijera.com
                     Vol. 2, Issue 5, September- October 2012, pp.2076-2079
statistical treatment of stochastic behavior of          node calculate its CFD by simply adding its FD with
unpredictable links between two random MDs in            previous link’s FD and save this into RREQ packet
MANET and then extends the concept to the entire         header. (When a packet is discarded by a node it is
open network. Time metric followed in DLFR is            sent to destination via other nodes which are lightly
forwarding time (FT) between a typical pair of MDs       loaded.)
in the multi-dimensional feature space and is a          Step 7. At destination node RREQ packets via
dissimilarity measure that takes into account            different intermediate nodes are received with their
correlation between FTs and normalizes each feature      respective path CFDs. These packets are sorted in
to zero mean and unit variance (Box-Muller               ascending order and path with minimum CFD is
Transformation).                                         replied back with RREPLY. Also 2 next minimum
                                                         CFD paths are stored in cache for recovering
III. PROPOSED ALGORITHM                                  through alternative paths in case of malicious
Step 1. For each node (mobile unit), generate            node.In this way we can chose an optimal path for
random arrival pattern and service pattern of packets    packet transmission with proper load balancing at
which are distributed according to Poisson and           each node. Also this algo helps to solve out the
negative exponential distribution.                       problem happened in case of malicious node as it
Step 2. Feed the generated pattern to each node’s        store alternative paths in cache for route recovery
queuing system, which helps in determining an            and hence save time by avoiding source- destination
important factor namely Queue length for each node.      route initialization again and again.
Step 3. Determine the probabilistic change in queue
length which helps to set Threshold value for load       IV. WORKING OF ALGORITHM
balancing or set threshold of each node using                     When we implement the proposed
  k                                                      algorithm on above network, let assume N1 as
Sum_qoc= ∑ avg_qoci                                      source node and N4 as destination node. Generate
                                i=1                      random FDs for all the paths in the network in Fig 1
                                                         and normalizes it by using Box- Muller
Step 4. For x=1 to n (for n links), for i=1 to k(for     Transformation method:-
each node pair(with given source node and                                   FD=s*σ+µ
destination node)) generate ks samples of stochastic      where σ and µ are Standard Deviation and mean
distance FD(forward Distance) for moving packets         and
between two immediate mobile nodes and                             s = sqrt (-2ln(r1) )cos(2pi*r2)
normalized it.                                           where (r1, r2) is a pair of random numbers in the
Step 5. Append a new field of FD in the header of        range (0, 1) and s is the desired sample from the
DSR RREQ packet. This new formatted packet is            standardized        normal       distribution.   For
flooded to next immediate nodes by source node           implementation of proposed work we have made use
initially.                                               of Java.
Step 6.Each node which receives RREQ packet with
FD field checks whether waiting queue has space to
accommodate it or not i.e. after adding this RREQ
whether Queuelen>= Threshold for mobile node, if
so it simply discard that RREQ packet; but if not




Fig 1: Network Example
         When RRREQ packet reach to neighbor            by calculating through its own + CFD of previous
nodes N2, N3, and N6, they further broadcast that       links. N4 sends RREPLY to each RREQ with their
packet to their neighbors and also update their CFDs    corresponding CFDs. Then N1 sends data packets

                                                                                             2078 | P a g e
Dr. P.K.Suri, Satmeet Kaur / International Journal of Engineering Research and Applications
                   (IJERA)              ISSN: 2248-9622      www.ijera.com
                     Vol. 2, Issue 5, September- October 2012, pp.2076-2079
through minimum CFD path which is here via N3                      In future researcher also try to implement
node. If this primary route fails then an alternative     this algorithm for other on-demand routing protocols
path having next minimum CFD which is via nodes           and their comparison as well. Also to apply security
N6 and N7 is used for sending data packets.               mechanism to convert plain text into cipher text at
                                                          intermediate nodes.
V. RESULTS
                                                          ACKNOWLEDGMENTS
                                                          Our thanks to the HCTM, Kaithal management for
                                                          development of this paper.

                                                          REFERENCES
                                                            [1]   Analysing the Manet Variations, Challenges,
                                                                  and protocol issues by G.S.Mamatha and Dr.
                                                                  S.C. Sharma in International Journal of
                                                                  Computer Science & Engineering Survey
                                                                  (IJCSES) Vol.1, No.1, August 2010
Fig 2: Probababilty of no. of packets Exceeding             [2]   S. J. Lee, M. Gerla, “Dynamic Load Aware
threshold value k                                                 Routing in Ad Hoc Networks”, Proc. ICC
                                                                  2001, Helinski, Finland, June 2001, pp.
                                                                  3206-3210.
                                                            [3]   K. Wu, J. Harms, “Load Sensitive Routing
                                                                  for Mobile Ad Hoc Networks”, Proc. IEEE
                                                                  ICCCN’01, Phoenix, AZ Oct. 2001, pp. 540-
                                                                  546.
                                                            [4]   Dae In Choi, Jin Woo Jung, K. Y. Kwon, D.
                                                                  Montgomery, and HyunKook Kahng,
 Fig 3: End to End Delay versus CFD                               “Design and Simulation Result of a
                                                                  Weighted Aware Routing(WLAR) Protocol
                                                                  in Mobile Ad Ho Network”LNCS 3391, pp.
                                                                  178-187, 2003.
                                                            [5]   J-H. Song, V. Wong, and V. Leung, “Load
                                                                  Aware On-Demand routing (LAOR)
                                                                  Protocol for Mobile Ad hoc Networks,” in
                                                                  Proceedings of IEEE Vehicular Technology
                                                                  Conference (VTCSpring), Jeju, Korea, April
                                                                  2003.
  Fig 4: Mean Delay of delayed packets vs Arrival           [6]   Y. J. Lee and G. F. Riley, “A Workload-
rates and service rates                                           Based Adaptive Load- Balancing Technique
From the graphs drawn above one can see that                      for Mobile Ad Hoc Networks”, IEEE
threshold can be set initially according to probability           Communication Society, WCNC 2005, pp.
distribution with increase in number of packets in                2002-2007.
queue. Also we can say that end to end delay can be         [7]   A Load Balanced Aware Routing Protocol
minimized by using optimal path of minimum CFD.                   For Wireless Ad Hoc Networks Vahid
Mean Delay of already delayed packets can also be                 Nazari Talooki, Jonathan Rodriguez, Rasool
minimized by varying the arrival rates and service                Sadeghi      IEEE     Conf.,   Asia-Pacific
rates for further better results in future.                       Conference on Communications, Busan,
                                                                  Korea, 2006
VI. CONCLUSION AND FUTURE WORK                              [8]   A Distributed Load Balanced Routing
As MANET is an adhoc network so it is not efficient               Protocol for Real-Time Traffic in Mobile
to use routing mechanism according to past                        Adhoc Networks P. Sivakumar and K. Durai
knowledge.This algorithm provides an efficient way                Swamy European Journal of Scientific
to tame stochastic nature of MANET in future and                  Research ISSN 1450-216X Vol.53 No.4
provide an optimal routing mechanism and sending                  (2011),    pp.626-636     ©   EuroJournals
data packets through minimum CFD path which                       Publishing, Inc. 2011
further enhance the throughput of any network. Also         [9]   DLFR: Taming stochastic behavior of Global
it avoid congestion in any network by applying                    Networks by P.K.Suri and Kavita Taneja in
threshold based load balancing. We can evaluate                   IJCSNS International Journal of Computer
performance of this algorithm for infinitely large                Science and Network Security, VOL.7
number of packets in any simulation based                         No.12, December 2007
environment.


                                                                                              2079 | P a g e

Weitere ähnliche Inhalte

Was ist angesagt?

MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
IOSR Journals
 
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
Iaetsd Iaetsd
 
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
IJEEE
 
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
IJASCSE
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...
IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...
IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...
International Journal of Technical Research & Application
 

Was ist angesagt? (14)

Be31390392
Be31390392Be31390392
Be31390392
 
Ab25144148
Ab25144148Ab25144148
Ab25144148
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocols
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
 
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
G343741
G343741G343741
G343741
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
 
ICICCE0367
ICICCE0367ICICCE0367
ICICCE0367
 
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 
IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...
IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...
IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...
 

Andere mochten auch

MP 635/13 - Cana de Açúcar
MP 635/13 - Cana de AçúcarMP 635/13 - Cana de Açúcar
MP 635/13 - Cana de Açúcar
Paulo Veras
 

Andere mochten auch (9)

Smart sync 2009
Smart sync 2009Smart sync 2009
Smart sync 2009
 
Amica
AmicaAmica
Amica
 
MP 635/13 - Cana de Açúcar
MP 635/13 - Cana de AçúcarMP 635/13 - Cana de Açúcar
MP 635/13 - Cana de Açúcar
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Ähnlich wie Ly2520762079

Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
idescitation
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
BRNSSPublicationHubI
 

Ähnlich wie Ly2520762079 (20)

Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
172 179
172 179172 179
172 179
 
Br31467472
Br31467472Br31467472
Br31467472
 
Hd3312521256
Hd3312521256Hd3312521256
Hd3312521256
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSSNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
 
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSSNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
A survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsA survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane ts
 
Improved Power Aware Location Based Routing
Improved Power Aware Location Based RoutingImproved Power Aware Location Based Routing
Improved Power Aware Location Based Routing
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
 
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
 
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Ly2520762079

  • 1. Dr. P.K.Suri, Satmeet Kaur / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.2076-2079 Optimal DSR and Load Balancing in MANET Dr. P.K.Suri* Satmeet Kaur** *(Dean and Professor, H.C.T.M, Kaithal, Haryana) **(M.Tech Student, H.C.T.M, Kaithal, Haryana) ABSTRACT MANET (Mobile Ad-hoc Network) is an C. Commercial Activities: E-banking and e- infra-structure less dynamic network in which commerce, dynamic database access, mobile each nodes are free to move anywhere any time offices i.e business anywhere anytime make use without any prior knowledge. As mobile of these networks. communication is growing day by day, so it is D. Home and Entertainment Facilities: In very common for mobile nodes to be congested at home/office networking, multi user gaming, any time in the network. Our goal is to distribute robotic pets, theme parks, wireless services the load from over loaded nodes to under loaded Manet helps a lot. nodes in an optimal way. Also DSR algorithm for E. Education: For setting of virtual classrooms, routing is optimized using minimum CFD adhoc communication through meetings and (Cumulative Forward Distance). lectures, online distance education and in setting of university and college campuses Manets play Keywords- Load Balancing, DSR, Forward an important role. Distance (FD), Cumulative Forward Distance (CFD). II. LITERATURE SURVEY MANET has a dynamic network topology, I. INTRODUCTION and constraint resources, such as bandwidth, buffer MANET (Mobile Ad hoc Network) is a space, battery and transmission power and so on. dynamic infra-structure-less network in which nodes Distributing traffic fairly among the mobile hosts, are free to move anywhere, anytime without any based on measurement of path statistics, is beneficial prior knowledge. Due to dynamic topology it is in order to take full advantage of the limited mandatory that each node has updated route table resources and to use network resources better so that having proper routes to other nodes. For this each the congestion and end-to-end delay are minimized. node has to communicate with other nodes time to time. The main characteristics of MANET are: Purpose of Load-Balancing Schemes The overall purpose of various load-balancing 1.1 Dynamic Topology MANET is highly dynamic schemes is to: in nature i.e. nodes are free to move anywhere at any  Select non-congested paths or to moment according to its transmission range. disseminate excessive load of a node to its neighbours. 1.2 Limited Bandwidth: In MANET radio band  Balances energy consumption of the will be limited and hence data rates are much lower network. than a wired network. So the routing protocols must  Ensure efficiency and robustness. optimally use the offered bandwidth to reduce  Reduce end to end delay and number of overhead. packet lost by queue overflow.  Enhance the utilization of resources. 1.3 Higher Packet loss: Due to unstable links,  Improve the overall network performance transmission errors there are more chances of packet and reduce collision by load distribution. loss in MANET which is not desirable. Alternate Path Routing [1] provides load balancing by distributing the data traffic along set of MANET APPLICATIONS MANET can be used in alternative paths. By using set of alternate paths, any of the daily life application as described below: APR also provide failure protection, i.e. if one path A. Military Operations Manet is very useful in fails to transfer the data, it can use another military operations for safety purposes, by alternative paths. Due to Route coupling resulted wireless communication in sensitive regions. It from geographic proximity of different candidate is also useful in automating battlefields through paths between common endpoints (nodes) APR are sensor networks. not fully utilized. B. Emergency services- In emergency services like supporting hospital services, search and Dynamic Load Aware Routing (DLAR) [2] makes rescue operations, disaster recovery and in help use of number of packets buffered in the interface as lining these networks are very useful. main route selection criteria. Source node floods the 2076 | P a g e
  • 2. Dr. P.K.Suri, Satmeet Kaur / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.2076-2079 RREQ packet to its immediate neighboring nodes to smaller than DP (i.e., DP’ < DP). Each node updates discover a new route. When the intermediate nodes the route entry only when the newly acquired path along the path to destination receives RREQ for first (P’) is shorter than the previous path (P) in hop time, they make an entry for the <source, count, and DP’ is smaller than DP (i.e., DP’ < destination> pair and also record the previous hop to DP).D-LAOR does not allow the intermediate nodes that entry (to proceed Backward Learning).Nodes to generate a RREP packet to the source node to then also attach their load information and broadcast avoid the problem with stale path delay information. the RREQ packet After receiving the first RREQ packet, the destination waits for few amount of time Workload-Based Adaptive Load Balancing so that it can learn about all possible routes. In this (WBALB) [6] protocol makes each node react to protocol, intermediate nodes cannot send a RREPLY RREQs according to a simple rule based on the local back to the source. information of the node and it runs on top of existing routing protocols. This protocol is motivated by the Load Sensitive Routing (LSR) protocol [3] is based observation that ad hoc on-demand routing protocols on the DSR protocol. This protocol utilizes network flood route request (RREQ) messages to acquire load information as the main path selection criterion. routes, and only nodes that respond to those It uses a re-direction method to find better paths messages have a potential to serve as intermediate effectively. The source node can quickly respond to forwarding nodes. In other words, a node can a call for connection without losing the chance to completely be excluded from a path if the node obtain the best path. Based on the initial status of an drops the RREQ in a route discovery phase for the active path, LSR can search for better paths path. dynamically if the active path becomes congested during data transmission. In route discovery we use Load Balanced Dynamic Source Routing a redirection method similar to we developed in (LBDSR) [7] Existing approaches try to improve the Multi path routing to forward Route Reply (RREP) performance of routing protocols with respect to messages. This method can let the source node to traffic balancing or energy consumption balancing. obtain better path without any increase in flooding In this paper author improve the well known cost and waiting delay on the destination nodes. In Dynamic Source Routing (DSR) protocol to the so LSR, we adapt the active routes in a route in a called Load Balanced DSR (LBDSR) protocol. We different context, by using network load information. modify the RREQ (Route Request) and RREP When a used path becomes congested, LSR tries to (Route Reply) messages in DSR in order to maintain search for a lightweight path. The source node the remaining energy of intermediate nodes which continues to send data traffic along the congested forward RREQ and RREP. Route structure, available paths until a better path is found. Route adaptation in the nodes cache, is modified so that the remaining strategy is based on the initial status and current energy of nodes can be calculated. LBDSR shows status of an active path. better traffic balancing and energy consumption balancing, end-to-end delay and route reliability Weighted Load Aware Routing (WLAR) [4] metrics than DSR. protocol selects the route based on the information from the neighbor nodes which are in the route to the Distributed Load Balanced Routing (DLBR) [8] is destination. In WLAR, a new term traffic load is a new distributed load based routing algorithm defined as the product of average queue size of the intended for a variety of traffic classes to establish interface at the node and the number of sharing the best routing paths. The proposed algorithm nodes which are declared to influence the calculates the cost metric on the basis of the load on transmission of their neighbors. In WLAR, each the links. The dynamic traffic can be classified as node has to measure its average number of packets multimedia and normal traffic. Multimedia traffic is queued in its interface, and then have to check considered as high priority and normal traffic as low whether it is a sharing node to its neighbor or not. If priority. The routing of high priority traffic is it is a sharing node itself, it has to let its neighbors performed over the lightly loaded links, in such a know it. After each node gets its own average packet manner that the links with lighter loads are chosen queue size and the number of its sharing nodes, it instead of links with heavier-loads. In addition, the has to calculate its own total traffic load. resources can be shared between the high priority traffic’s path and low priority traffic. In the absence Delay-based Load-Aware On-demand Routing of multimedia traffic, the lightly loaded path can be (D-LAOR) [5] protocol that utilizes both the utilized by normal traffic. estimated total path delay and the hop count as the route selection criterion. D-LAOR allows the DLFR [9] this algorithm proposed a new routing intermediate nodes to relay duplicate RREQ packets protocol for estimating the shortest path in such open if the new path (P’) to the source of RREQ is shorter networks by introducing a statistical metric for “the than the previous path (P) in hop count, and DP’ is reliable routing path selection”. DLFR facilitated 2077 | P a g e
  • 3. Dr. P.K.Suri, Satmeet Kaur / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.2076-2079 statistical treatment of stochastic behavior of node calculate its CFD by simply adding its FD with unpredictable links between two random MDs in previous link’s FD and save this into RREQ packet MANET and then extends the concept to the entire header. (When a packet is discarded by a node it is open network. Time metric followed in DLFR is sent to destination via other nodes which are lightly forwarding time (FT) between a typical pair of MDs loaded.) in the multi-dimensional feature space and is a Step 7. At destination node RREQ packets via dissimilarity measure that takes into account different intermediate nodes are received with their correlation between FTs and normalizes each feature respective path CFDs. These packets are sorted in to zero mean and unit variance (Box-Muller ascending order and path with minimum CFD is Transformation). replied back with RREPLY. Also 2 next minimum CFD paths are stored in cache for recovering III. PROPOSED ALGORITHM through alternative paths in case of malicious Step 1. For each node (mobile unit), generate node.In this way we can chose an optimal path for random arrival pattern and service pattern of packets packet transmission with proper load balancing at which are distributed according to Poisson and each node. Also this algo helps to solve out the negative exponential distribution. problem happened in case of malicious node as it Step 2. Feed the generated pattern to each node’s store alternative paths in cache for route recovery queuing system, which helps in determining an and hence save time by avoiding source- destination important factor namely Queue length for each node. route initialization again and again. Step 3. Determine the probabilistic change in queue length which helps to set Threshold value for load IV. WORKING OF ALGORITHM balancing or set threshold of each node using When we implement the proposed k algorithm on above network, let assume N1 as Sum_qoc= ∑ avg_qoci source node and N4 as destination node. Generate i=1 random FDs for all the paths in the network in Fig 1 and normalizes it by using Box- Muller Step 4. For x=1 to n (for n links), for i=1 to k(for Transformation method:- each node pair(with given source node and FD=s*σ+µ destination node)) generate ks samples of stochastic where σ and µ are Standard Deviation and mean distance FD(forward Distance) for moving packets and between two immediate mobile nodes and s = sqrt (-2ln(r1) )cos(2pi*r2) normalized it. where (r1, r2) is a pair of random numbers in the Step 5. Append a new field of FD in the header of range (0, 1) and s is the desired sample from the DSR RREQ packet. This new formatted packet is standardized normal distribution. For flooded to next immediate nodes by source node implementation of proposed work we have made use initially. of Java. Step 6.Each node which receives RREQ packet with FD field checks whether waiting queue has space to accommodate it or not i.e. after adding this RREQ whether Queuelen>= Threshold for mobile node, if so it simply discard that RREQ packet; but if not Fig 1: Network Example When RRREQ packet reach to neighbor by calculating through its own + CFD of previous nodes N2, N3, and N6, they further broadcast that links. N4 sends RREPLY to each RREQ with their packet to their neighbors and also update their CFDs corresponding CFDs. Then N1 sends data packets 2078 | P a g e
  • 4. Dr. P.K.Suri, Satmeet Kaur / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.2076-2079 through minimum CFD path which is here via N3 In future researcher also try to implement node. If this primary route fails then an alternative this algorithm for other on-demand routing protocols path having next minimum CFD which is via nodes and their comparison as well. Also to apply security N6 and N7 is used for sending data packets. mechanism to convert plain text into cipher text at intermediate nodes. V. RESULTS ACKNOWLEDGMENTS Our thanks to the HCTM, Kaithal management for development of this paper. REFERENCES [1] Analysing the Manet Variations, Challenges, and protocol issues by G.S.Mamatha and Dr. S.C. Sharma in International Journal of Computer Science & Engineering Survey (IJCSES) Vol.1, No.1, August 2010 Fig 2: Probababilty of no. of packets Exceeding [2] S. J. Lee, M. Gerla, “Dynamic Load Aware threshold value k Routing in Ad Hoc Networks”, Proc. ICC 2001, Helinski, Finland, June 2001, pp. 3206-3210. [3] K. Wu, J. Harms, “Load Sensitive Routing for Mobile Ad Hoc Networks”, Proc. IEEE ICCCN’01, Phoenix, AZ Oct. 2001, pp. 540- 546. [4] Dae In Choi, Jin Woo Jung, K. Y. Kwon, D. Montgomery, and HyunKook Kahng, Fig 3: End to End Delay versus CFD “Design and Simulation Result of a Weighted Aware Routing(WLAR) Protocol in Mobile Ad Ho Network”LNCS 3391, pp. 178-187, 2003. [5] J-H. Song, V. Wong, and V. Leung, “Load Aware On-Demand routing (LAOR) Protocol for Mobile Ad hoc Networks,” in Proceedings of IEEE Vehicular Technology Conference (VTCSpring), Jeju, Korea, April 2003. Fig 4: Mean Delay of delayed packets vs Arrival [6] Y. J. Lee and G. F. Riley, “A Workload- rates and service rates Based Adaptive Load- Balancing Technique From the graphs drawn above one can see that for Mobile Ad Hoc Networks”, IEEE threshold can be set initially according to probability Communication Society, WCNC 2005, pp. distribution with increase in number of packets in 2002-2007. queue. Also we can say that end to end delay can be [7] A Load Balanced Aware Routing Protocol minimized by using optimal path of minimum CFD. For Wireless Ad Hoc Networks Vahid Mean Delay of already delayed packets can also be Nazari Talooki, Jonathan Rodriguez, Rasool minimized by varying the arrival rates and service Sadeghi IEEE Conf., Asia-Pacific rates for further better results in future. Conference on Communications, Busan, Korea, 2006 VI. CONCLUSION AND FUTURE WORK [8] A Distributed Load Balanced Routing As MANET is an adhoc network so it is not efficient Protocol for Real-Time Traffic in Mobile to use routing mechanism according to past Adhoc Networks P. Sivakumar and K. Durai knowledge.This algorithm provides an efficient way Swamy European Journal of Scientific to tame stochastic nature of MANET in future and Research ISSN 1450-216X Vol.53 No.4 provide an optimal routing mechanism and sending (2011), pp.626-636 © EuroJournals data packets through minimum CFD path which Publishing, Inc. 2011 further enhance the throughput of any network. Also [9] DLFR: Taming stochastic behavior of Global it avoid congestion in any network by applying Networks by P.K.Suri and Kavita Taneja in threshold based load balancing. We can evaluate IJCSNS International Journal of Computer performance of this algorithm for infinitely large Science and Network Security, VOL.7 number of packets in any simulation based No.12, December 2007 environment. 2079 | P a g e