SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 5, Issue 11 (February 2013), PP. 68-73

       Clustering Approach in Route Selection Using Mobile
                 Agent in Mobile Ad-Hoc Network
                            Yashpal Singh1, Kamal Deep2, S.Niranjan3
                              1,2
                                Research Scholar, Mewar University, Rajasthan, India
  3
      Professor, Department of Computer Science & Engineering ,PDM School of Technology & Management ,
                                       Bahadurgarh, Jhajjar,Haryana,India


      Abstract:- Cluster-based mechanisms in ad hoc networks not only make a large network appear
      smaller, but more importantly. In our scheme, each MN is disseminated to predict its own mobility
      pattern, and this information is disseminated to its neighbors using a scalable clustering algorithm. The
      work proposes a prediction based Clustering Approach for Route Discovery Protocol (CARDP)using
      Mobile Agent in Mobile ad-hoc Network. This paper presents a scalable way to predict mobility, and
      thus availability of MNs which is achieved with the virtual cluster and it is named as (b,e,m) model.
      Here we compare our work with other three algorithms in term of cluster head stability. Our clustering
      algorithm enables adaptability, autonomy, economy, scalability and survivability requirements in
      managing ad hoc networks by adopting Mobile Agent–Based clustering Approach. In our result cluster
      stability is measured and improved using clustering

      Keywords:- Hierarchical clustering, Mobile Ad-hoc Network (MANET), mobile agent (MA), data
      gathering, PBNM (prediction based network management.

                                              I.    INTRODUCTION
         A mobile ad hoc network consists of a set of mobile hosts that form at temporary network without any
fixed infrastructure. The nodes operate both as hosts and routers. Due to mobility on nodes, the topology of
network may change rapidly and unexpectedly .Hence it is very important to find a route that can obtain highly
stable routing and transmission ratio. Ad hoc networks, where mobile nodes communicate via multi hop
wireless links, facilitate network connectivity without the aid of any pre-existing networking infrastructure.
Cluster-based wireless sensor network saves energy by Mobile Agent (MA) technology .It provides a new idea
for the key problem. Mobile Agent entities move in the network and alternate with environment independently
by taking executing codes, running state [1], processing results and visiting route and some other information
reducing the number of the nodes communicating with the base station. Cluster-based mechanisms in ad hoc
networks not only make a large network appear smaller, but more importantly, they make a highly dynamic
topology to appear less dynamic. MWSNs can be classified into a flat, two-tier or three-tier hierarchical
architecture [2]. Flat or level, network architecture contains a set of heterogeneous devices to communicate in ad
hoc mode. These devices are mobile or fixed, but to communicate within the same network. Two-level
architecture consists of a set of nodes in place and a set of mobile nodes.
         In the three-tier architecture, a set of fixed sensor nodes transmit data at a set of mobile devices, which
then transmits data to one set of access points In addition to normal network information, data related to nodes‟
location, velocity, mobility and available battery-power needs to be considered in the data-collection process,
while conserving the scarce wireless bandwidth and transmission power




                                    Fig 1 .Cluster based wireless sensor network. [2]
                                                           68
Clustering Approach in Route Selection Using Mobile Agent in Mobile Ad-Hoc Network


         In MANETs, the chances for different configuration changes to occur are very high, and any
management architecture should allow the management entities to detect and react to such changes in a flexible
way [1]. Most MANET routing protocols focus on finding feasible route path from source to destination node
with full utilization of network resources [4]. Mobility prediction has also been applied to determine the
duration of life time between two connected mobile nodes. Using this prediction mechanism the propose scheme
choose the most stable links in MANETs [3].

                                          II.     RELATED WORK
          The concept of clustering in MANETs is not new, there have been many algorithms that consider
different metrics and have different purposes in mind. However, almost none of them consider mode mobility as
a criterion in the clustering process effectively. As a result, they fail to guarantee a stable cluster formation[1].
          In a MANET that uses cluster-based services, network performance metrics such as throughput, delay
and effective management are tightly coupled with the frequency of cluster reorganization [3]. Therefore, stable
cluster formation inessential for better management and QoS support [3].The most popular clustering
approaches in the literature are the lowest identifier(Lowest-ID) and maximum-connectivity[5].With Lowest-ID
,CH moves into another region it may unnecessarily replace an existing CH, causing transient instability[4]. But
later MN movement and traffic characteristics, the criterion values are used in CH election process which results
in instability. This is the case in Lowest Distance Value (LDV) and Highest In-Cluster Traffic(ICT) approaches.
In [3], Chiang et al. have shown that the Lowest-ID algorithm performs better than the max connectivity
algorithm 3 in terms of stability of clusters (measured by the number of cluster head changes), and they have
proposed a small change in the Lowest-ID algorithm to improve performance; the improved version is referred
to as LCC which stands for “Least Cluster head Change”. In [6], bounding flooding was proposed to increase
the chance of finding feasible branches. In [7], a genetic algorithm was used to perform faster route discovery.
In [8], the adaptive QoS protocol was proposed based on the prediction of local performance. Thus, predicting
the mobility of nodes is an effective and feasible method. At present, the mobility prediction methods are
path availability models [11], prediction-based link availability estimation[12], link expiration time model
[13] and prediction strategy. Link expiration time model predicts link stability between two nodes
according to the node‟s information such as location, velocity, and direction etc with the aid of Global
Position System (GPS). The next section describes how (b, e, m)-model results in stable clustering, and enables
proactive management in our management architecture.[3]

                                         III.     PROPOSED WORK
3.1 Clustering in MANETs:-
          Clustering of nodes into groups results in simplification of addressing and management of the nodes
and also yields better performance. Lowest-ID clustering is one of the most popular clustering schemes used in
the oldas well as recent ad hoc networks literature. In each cluster, exactly one node, the one with the lowest ID
among its neighbors, becomes a cluster head, and maintains cluster memberships of other member nodes. A
cluster is identified by its cluster head‟s ID. In [15], an algorithm based on max-connectivity was also proposed,
but it performed much worse than the Lowest-ID algorithm in terms of stability of clusters. The cluster head
takes the responsibility of coordinating transmissions of packets and route discovery, and thus the network does
not have to depend on classic flooding for routing.

3.2 Agent Model in clustering:-
         Agents use their own knowledgebase to achieve the specified goals without disturbing the activities of
the host. The primary goal of an agent is to deliver information of one node to others in the network. Here, the
agents are used to find the multicast routes and to create the backbone for reliable multicasting. There are
various type of Agents[3]:
   Knowledge Base: The knowledgebase maintains a set of network state variables such as status of the
       node (cluster head, child, others) available power, bandwidth, number of movements
   Route Discovery Agent (RDA): It is a static agent that runs on nodes, creates agents and knowledge base,
       controls and coordinates the activities.
   Node Manager Agent (NMA): It maintains the multicast tree and provides group ID to allthe members of
       the packet-forwarding nodes
   Link Management Agent (LMA): When a node moves out of the communication range or
   dies, LMA initiate route error (RERR) message to the upstream node and again initiates
   the route request.


                                                         69
Clustering Approach in Route Selection Using Mobile Agent in Mobile Ad-Hoc Network




                                          Fig 2 Routing agent model

          The mobile agent which resides in the source node provides group ID and distributes multicast key to
all the group members

3.3(b, e, m)-Clustering Model:-
The (b,e,m)-Clustering Approach has the following necessary ingredients:
1) The concept of virtual clusters,
2) Mobility prediction model,
3) Clustering algorithm and protocol,
4) Management architecture,




                                      Fig 3 Steps of clustering Approach

3.3.1 The Concept of Virtual Cluster
         We introduced multiple virtual clusters, In order to make our mobility prediction, and our clustering
mechanism that is (b,e,m) approach [1]. For correct operation of the (b,e,m)-Approach , each MN is supposed
to have a complete picture of the locations of the centers of such virtual clusters (VCCs).If greater mobility
prediction accuracy is required, each virtual cluster can be further split into a number of equal tracking zones
(TZ) as shown in Fig. 4.These TZs are again circular in shape, and can handle the MNs.




                            Fig 4 Concept of Virtual Cluster and Tracking Zones[3]

         In Fig. 4 depicts a virtual cluster (big circle) that consists of seven TZs (smaller circular region).A
virtual cluster can contain any number (N) of such TZs depending on factors such as the mobility prediction
accuracy required and maximum control overhead that is allowable. However, „N‟ should satisfy the following
[3]:

                                                      70
Clustering Approach in Route Selection Using Mobile Agent in Mobile Ad-Hoc Network

                                       N = i2 + j2 + i*j, …………………(i)
         Where „i‟ and „j‟ are non –negative integers.ie. i=1 and j =2 then N = 7 Again each TZ has its own
unique tracking zone identifier(TZI), which can be determined given the location information. Similarly, each
MN is supposed to know all the tracking zones, and their corresponding identifiers within a particular virtual
cluster. However, in our initial work we consider only the inter-virtual cluster movement pattern of MNs, and
greater accuracy in this case is obtained by optimizing the value of virtual cluster radius (R).

3.3.2 Mobility Prediction Mechanism
          In mobile ad hoc network, the reliability of a path depends on the stability or availability of each link
of this path because of the dynamic topology changes frequently. According this approach the node
mobility is the main cause of uncertainty in N/ws, we design a mobility-prediction approach which is based on
the Ziv-Lempel algorithms for data compression technique [1][8][9]. It derives a prediction of user mobility
based on the accumulated behavior of a specific Mobile node. It is also confirm that the prediction is made
without complexity and waste of bandwidth and transmission power. In our approach, each Mobile node is
generating the strings of virtual cluster identifiers (VIDs) and maintaining its respective dictionary in its
memory [12].
          In addition to making predictions as to future movements of a particular Mobile node, our cluster
approach is used by each MN to predict its approximate residence-times of the virtual clusters. For this purpose,
each MN maintains its mobility database at a specific time in terms of a Mobility Trie[1][4]. This trie is a
probabilistic model corresponding to the dictionary of the LZ78 algorithm [9]. There are two important
parameters, interval time (Te)of updated events which are triggered on time-based updating Radius (Tr) of
virtual cluster. If „Te‟ is smaller then greater the accuracy of the residence-time, and also higher the tracking
overhead. Similarly, the smaller the Radius the better the prediction capability, but the higher the tracking
overhead. So for greater prediction accuracy ,Mobility Tries can be constructed with respect to tracking zones.
In this approach, the higher the number of TZs that a virtual cluster consists of, the greater the accuracy of the
residence-time.

3.3.3 Clustering Algorithm and Protocol of (b,e,m) model:-
           This clustering algorithm and protocol are mainly due to our mobility prediction model as explained in
[12].The Mobility Trie that each MN constructs plays an important role to bring in proactivness in our (b,e,m)-
clustering approach. Each MN „A‟ to determine its residence-time (tav) in virtual cluster „V‟ from its Mobility
Trie. The MN that has the highest Ω(from equ.[1]) can become the primary CH, and the MNs that have the
second and third highest values become assistant(secondary) CHs. To form clusters, CH should cover the whole
area of virtual cluster .So CH makes a k-hop cluster where value „k‟ is not necessarily Uniform However,
efforts have been made to limit the value of „k‟, as it is better if every MN is only a fewer hops for proper
management.
           Example of Virtual clustering is that we have four different packet types such as CALL,
CONNECT_CH,CONNECT_MN and TARGET have been defined for the operation of our clustering protocol.
Each cluster head broadcasts a CONNECT_CH packet periodically- every CH_CONNECT_INTERVAL –
within its virtual cluster and each cluster member uncast CONNECT_MN to its respective CH periodically -
Every MN_CONNECT _INTERVAL. On the other hand, if a new MN has not become a member in any
cluster, it has to uncast a CALL packet to its respective CHs. Since all mobile nodes except CHsuse unicating as
opposed to broadcasting, our clustering algorithm conserves the bandwidth and transmission power.[3]
           In addition to other information regarding each virtual cluster, each periodic CONNECT_CH carries
the neighbor-table which is a set of MNs in the cluster and their latest Ω values. From the neighbor-table of
CONNECT_CH, each MN that resides within the same virtual cluster constructs its own neighbor-table, and
hence becomes aware of its neighbors. If any member node has not received a CONNECT_CHpacket from any
CH during the last three consecutive CH_CONNECT _INTERVAL periods, Each node of a particular virtual
cluster has to broadcast its protocol packet in order for other neighbor nodes to know about its existence[3]. This
enables the MNs within the virtual cluster to select one as their CH in a distributed manner. These control
packets are relayed by intermediate MNs only with in the virtual cluster. This is to enable CHs to get the
topology information of adjacent clusters. Given that each CH knows the predicted residence-time of each MN
within its cluster, it deletes the entry associated with a particular MN exactly „t0‟(system parameter) seconds
after its residence-time expires. This effect will be reflected in every CONNECT _CH packet a CH broadcasts
periodically. Also after having become a member ofa cluster, each MN can dynamically increase its MN_
CONNECT _INTERVAL until the new CH election process is triggered. Second aspect of our protocol is that,
particular CH determine its successor and inform its members using TARGET packet .



                                                        71
Clustering Approach in Route Selection Using Mobile Agent in Mobile Ad-Hoc Network

3.3.4 Management Architecture:
           Network management is a process of controlling a complex data network in order to maximize
its efficiency and productivity. Generally it involves data collection, data processing, data analysis, and problem
fixing. However, this management related tasks have to be performed in an efficient and scalable way. The
clustering protocol is used to simplify the task of proper management in MANETs. [1].In case of
information collection and communication strategy, there are three types of network management
architectures: centralized, distributed, and hierarchical. In hierarchical model data collection is done by
intermediate levels of the hierarchy before forwarding it to upper layers of the hierarchy. Our (b,e,m)-
clustering approach facilitates this hierarchical management architecture that makes use of policy-based
management technique together with mobile agents forwarding it to upper layers of the hierarchy[8]. The
lowest level of this architecture consists of individual managed SNs. Several SNs are grouped into clusters
and managed by a cluster head (CH).




                                Fig 5 Hierarchical Management Architecture [2]

                       BS: Base Station,    SN: Sensor Network        CH: Cluster Head,

          The cluster should take an optimal size, and should be stable most of the time in order to
enable the efficient data collection. These cluster heads are autonomously elected through our (b,e,m)-
clustering algorithm. The network manager, serving as a top-level manager, regulates and distributes
high level management policies such as QoS parameters and management rules to a group of cluster heads.
In hierarchical management, each cluster head provides functionality that is transparent to its network
manager, and hence cluster heads are autonomous in this respect.
          In our approach it is assumed that all nodes have equal management software modules and states and
any node can become either cluster head or cluster member depending on clustering mechanism. Cluster head
itself manage entire ad hoc network. The reason why mobile agent technology is used here is that it can
dynamically deploy itself in an appropriate node and execute managerial. In our clustering algorithm, since each
cluster head knows the predicted lifetime of each of its members, the cluster heads and the mobile code that they
originate can perform managerial operations.
          Moreover, using Mobility Tries, the cluster head would know the predicted mobility patterns of
its member nodes. In case a node moves from one virtual cluster to another, its respective cluster head
knows this from the Mobility Trie of the former. Our (b,e,m)-algorithm enables proactive cluster head
election process, that leads to continuous management operation without any interruption . In our three-level
hierarchy, the network manager is responsible for the PBNM operations, and can function as a policy server or
policy decision point [7]. Mobile agent technology is used again in our approach for policy distribution,
provisioning, and even for policy monitoring. Our(b,e,m)-clustering model facilitates each node to know about
the availability pattern of neighboring nodes, and thus enables the PBNM to be aware of the possible network
resources through prediction. The network manager is elected exactly the same way as the cluster head is
elected. It responsible for a particular region, and might contain a number of virtual clusters under it.

                    IV.      INITIAL EVALUATION THROUGH SIMULATION
         The main aim of this research is to design and implement a novel routing scheme based on mobile
agent technology in wireless ad-hoc networks that will provide the following benefits. Maximize network
performance, scalability, provide end-to-end reliable communications and reduce possible delays, and minimize
losses. Our initial simulation work attempts to compare the performance of our clustering algorithm
with the Lowest-ID, maximum-connectivity (Max-Connect) and Lowest Distance Value(LDV) clustering
algorithms, We performed our simulations using the GloMo Sim simulation package in which we implemented
and compared the Lowest-ID, Max-Connect, LDV and our algorithm [12]. The cluster stability can be
measured by determining the number oftimes each MN either attempts to become a CH or gives up its role
as a CH. In Fig. 6 it is measured by determining the number of MNs that have attempted to become the
CH at least once in 50 time period . As can be seen, in all the other three algorithms the numbers tend
to increase linearly with the node degree. our model has only a few numbers of MNs that have attempted
to become the CH, and hence improves stability.
                                                        72
Clustering Approach in Route Selection Using Mobile Agent in Mobile Ad-Hoc Network

                                                                         Chart Title

                                                       200




                               attempts to be the CH
                                Number of MN's that
                                                       150                              lowest ID
                                                       100                              b,e,m-clustering

                                                       50                               LDVP

                                                         0                              Max connect

                                                             25   50   75 100 125 150


            Fig.6 Number of MNs that Attempted to become the CH as a function of Node Degree.

                                                             V.         CONCLUSIONS
          The main objective is to use mobile agent technology for route selection in ad-hoc networks with
purpose to improve over traditional schemes in terms of performance, scalability and stability of clusters. A new
clustering approach that makes use of intelligent mobility prediction and location information in new long-term
MANETs was proposed in this paper. [1]This clustering approach is to enable the development of an
automated, intelligent[3],efficient and robust management architecture. To facilitate this, we introduced the
virtual cluster concept. in the network management perspective, it results in the following uniquebenefit:
[4] We could predict a specific MN‟s future positions and continue managerial              operations     without
interruptions in a proactive way

                                                                   REFERENCES
[1].     S.Sivavakeesar, G.Pavlou, and Liotta, “Stable Clustering Through Mobility Prediction for Large-
         Scale Multihop Intelligent Ad Hoc Networks|”, IEEE WCNC 2004, in press.
[2].     Muhammad Arshad ,Nasrullah Armi, Nidal Kamel and N. M.Saad.“Mobile data collector based routing
         protocol for
[3].     wireless sensor networks”.Scientific Research and Essays Vol. 6(29), pp. 6162-6175, 30 November,
         2011.
[4].     G.Santhi and Alamelu Nachiappan ,”Adaptive QoS Multicast Routing with Mobility Prediction in
         MANET” ,Int.
[5].     Journal of Ad hoc, Sensor & Ubiquitous Computing, 2010,vol.1,No.3
[6].     Bita Safarzadeh, ShahramJamali, HamedAlimohammadi, “ A High Performance Scalable QoS Routing
         Protocol for Mobile Ad Hoc Network”, Int. J. Comp. Tech. Appl. ,vol 2 (2), 332-339.
[7].     P.Basu, N.Khan, F. Znati, “Mobility Based Metric for Clustering in Mobile Ad Hoc Networks”,
         Workshop on Distributed Computing System, 2001,pp.413-418.
[8].     Barolli L, Koyama A, Shiratori N, “ A QoS Routing Method for Ad-Hoc Networks Based on Genetic
         Algorithm”, In: Proceeding of the 14th international workshop ondatabase and expert system
         applications,2003, pp.175-179.
[9].     Du X,”QoS Routing Based on Multi-Class Nodes for Mobile Ad Hoc Networks”, Ad Hoc
         Network,2004,pp.241-254.
[10].    Sun H, Hughes HD, “Adaptive QoS Routing Based on Prediction of Local Performance in Ad Hoc
         Network”, In: Proceeding of IEEE conference on wireless communication and networking ,2003, pp.
         1191-1195
[11].    B.McDonald, and F.Znati, “A Mobility-Based Framework for AdaptiveClustering in Wireless Ad Hoc
         Networks”, IEEE Journal on SelectedAreas in Communications, vol. 17, August 1999, pp 1466 –
         1487.
[12].    XiangbinZhu,Wenjuan Zhang.“A MobileAgent-based Clustering Data FusionAlgorithm in
         WSN”,IJECE-2010.
[13].    McDonald et al., “Path availability model for wireless ad hoc networks” Proceeding of IEEE wireless
         communications, 1999, (WCNC ‟99).
[14].    Jiang Shengming et al., “A prediction based link availability estimation for mobile ad-hoc networks”
         IEEE Infocom, 2001.
[15].    SuW.Lee Sung-Ju et al., “ Mobility predictin and routing in ad-hoc wireless networks”» International
         Journal of Network Management, 2001.
[16].    C.-C. Chiang, H.-K. Wu, W. Liu, M. Gerla, “Routing in Clustered Multihop, Mobile Wireless
         Networks with Fading Channel,” Proceedings of SICON 1997.



                                                                             73

Weitere ähnliche Inhalte

Was ist angesagt?

Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...
M H
 
Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...
M H
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
M H
 
Paper id 21201414
Paper id 21201414Paper id 21201414
Paper id 21201414
IJRAT
 

Was ist angesagt? (20)

5113jgraph01
5113jgraph015113jgraph01
5113jgraph01
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
 
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing AlgorithmOpportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
 
Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...
 
Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...
 
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
 
Ant
AntAnt
Ant
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
 
Jz2417141717
Jz2417141717Jz2417141717
Jz2417141717
 
An Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksAn Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor Networks
 
Balancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networksBalancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networks
 
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh network
 
ant2
ant2ant2
ant2
 
Communication synchronization in cluster based wireless sensor network a re...
Communication synchronization in cluster based wireless sensor network   a re...Communication synchronization in cluster based wireless sensor network   a re...
Communication synchronization in cluster based wireless sensor network a re...
 
Simulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A SurveySimulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A Survey
 
Information Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and ApproachesInformation Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and Approaches
 
Paper id 21201414
Paper id 21201414Paper id 21201414
Paper id 21201414
 
Position based Opportunistic routing in MANET
Position based Opportunistic routing in MANETPosition based Opportunistic routing in MANET
Position based Opportunistic routing in MANET
 

Andere mochten auch

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 

Andere mochten auch (10)

Determination and comparison rate of expression markers of osteoblast derived...
Determination and comparison rate of expression markers of osteoblast derived...Determination and comparison rate of expression markers of osteoblast derived...
Determination and comparison rate of expression markers of osteoblast derived...
 
The Implementation Of Concept Main Map In Basic Calculation Of Engineering Su...
The Implementation Of Concept Main Map In Basic Calculation Of Engineering Su...The Implementation Of Concept Main Map In Basic Calculation Of Engineering Su...
The Implementation Of Concept Main Map In Basic Calculation Of Engineering Su...
 
A location comparison of three health care centers in Sfax-city
A location comparison of three health care centers in Sfax-cityA location comparison of three health care centers in Sfax-city
A location comparison of three health care centers in Sfax-city
 
A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmA New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher Algorithm
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A Review on Image Compression in Parallel using CUDA
A Review on Image Compression in Parallel using CUDAA Review on Image Compression in Parallel using CUDA
A Review on Image Compression in Parallel using CUDA
 
Contemporary Spread Spectrum Techniques: A Comparative Study
Contemporary Spread Spectrum Techniques: A Comparative StudyContemporary Spread Spectrum Techniques: A Comparative Study
Contemporary Spread Spectrum Techniques: A Comparative Study
 
Parallel Reaction Kinetic Modelling Of Biogas To Biomethanol With Zno/Sio2 Na...
Parallel Reaction Kinetic Modelling Of Biogas To Biomethanol With Zno/Sio2 Na...Parallel Reaction Kinetic Modelling Of Biogas To Biomethanol With Zno/Sio2 Na...
Parallel Reaction Kinetic Modelling Of Biogas To Biomethanol With Zno/Sio2 Na...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Enhancement of Power Quality Using the Combination of Thyristor-Controlled Re...
Enhancement of Power Quality Using the Combination of Thyristor-Controlled Re...Enhancement of Power Quality Using the Combination of Thyristor-Controlled Re...
Enhancement of Power Quality Using the Combination of Thyristor-Controlled Re...
 

Ähnlich wie Welcome to International Journal of Engineering Research and Development (IJERD)

Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
IJCSES Journal
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet
graphhoc
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
IJCNCJournal
 
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...
IJCNCJournal
 
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...
IJCNCJournal
 
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...
IJCNCJournal
 
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...
IJCNCJournal
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
KhushbooGupta145
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
eSAT Journals
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
graphhoc
 

Ähnlich wie Welcome to International Journal of Engineering Research and Development (IJERD) (20)

Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
 
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...
 
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...
 
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...
 
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networks
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
 
1. 8481 1-pb
1. 8481 1-pb1. 8481 1-pb
1. 8481 1-pb
 
2 sima singh-6-13
2 sima singh-6-132 sima singh-6-13
2 sima singh-6-13
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Ds35676681
Ds35676681Ds35676681
Ds35676681
 
Enhancenig OLSR routing protocol using K-means clustering in MANETs
Enhancenig OLSR routing protocol using K-means clustering  in MANETs Enhancenig OLSR routing protocol using K-means clustering  in MANETs
Enhancenig OLSR routing protocol using K-means clustering in MANETs
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
 
F017123439
F017123439F017123439
F017123439
 
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkA Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
 

Mehr von IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
IJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
IJERD Editor
 

Mehr von IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Welcome to International Journal of Engineering Research and Development (IJERD)

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 5, Issue 11 (February 2013), PP. 68-73 Clustering Approach in Route Selection Using Mobile Agent in Mobile Ad-Hoc Network Yashpal Singh1, Kamal Deep2, S.Niranjan3 1,2 Research Scholar, Mewar University, Rajasthan, India 3 Professor, Department of Computer Science & Engineering ,PDM School of Technology & Management , Bahadurgarh, Jhajjar,Haryana,India Abstract:- Cluster-based mechanisms in ad hoc networks not only make a large network appear smaller, but more importantly. In our scheme, each MN is disseminated to predict its own mobility pattern, and this information is disseminated to its neighbors using a scalable clustering algorithm. The work proposes a prediction based Clustering Approach for Route Discovery Protocol (CARDP)using Mobile Agent in Mobile ad-hoc Network. This paper presents a scalable way to predict mobility, and thus availability of MNs which is achieved with the virtual cluster and it is named as (b,e,m) model. Here we compare our work with other three algorithms in term of cluster head stability. Our clustering algorithm enables adaptability, autonomy, economy, scalability and survivability requirements in managing ad hoc networks by adopting Mobile Agent–Based clustering Approach. In our result cluster stability is measured and improved using clustering Keywords:- Hierarchical clustering, Mobile Ad-hoc Network (MANET), mobile agent (MA), data gathering, PBNM (prediction based network management. I. INTRODUCTION A mobile ad hoc network consists of a set of mobile hosts that form at temporary network without any fixed infrastructure. The nodes operate both as hosts and routers. Due to mobility on nodes, the topology of network may change rapidly and unexpectedly .Hence it is very important to find a route that can obtain highly stable routing and transmission ratio. Ad hoc networks, where mobile nodes communicate via multi hop wireless links, facilitate network connectivity without the aid of any pre-existing networking infrastructure. Cluster-based wireless sensor network saves energy by Mobile Agent (MA) technology .It provides a new idea for the key problem. Mobile Agent entities move in the network and alternate with environment independently by taking executing codes, running state [1], processing results and visiting route and some other information reducing the number of the nodes communicating with the base station. Cluster-based mechanisms in ad hoc networks not only make a large network appear smaller, but more importantly, they make a highly dynamic topology to appear less dynamic. MWSNs can be classified into a flat, two-tier or three-tier hierarchical architecture [2]. Flat or level, network architecture contains a set of heterogeneous devices to communicate in ad hoc mode. These devices are mobile or fixed, but to communicate within the same network. Two-level architecture consists of a set of nodes in place and a set of mobile nodes. In the three-tier architecture, a set of fixed sensor nodes transmit data at a set of mobile devices, which then transmits data to one set of access points In addition to normal network information, data related to nodes‟ location, velocity, mobility and available battery-power needs to be considered in the data-collection process, while conserving the scarce wireless bandwidth and transmission power Fig 1 .Cluster based wireless sensor network. [2] 68
  • 2. Clustering Approach in Route Selection Using Mobile Agent in Mobile Ad-Hoc Network In MANETs, the chances for different configuration changes to occur are very high, and any management architecture should allow the management entities to detect and react to such changes in a flexible way [1]. Most MANET routing protocols focus on finding feasible route path from source to destination node with full utilization of network resources [4]. Mobility prediction has also been applied to determine the duration of life time between two connected mobile nodes. Using this prediction mechanism the propose scheme choose the most stable links in MANETs [3]. II. RELATED WORK The concept of clustering in MANETs is not new, there have been many algorithms that consider different metrics and have different purposes in mind. However, almost none of them consider mode mobility as a criterion in the clustering process effectively. As a result, they fail to guarantee a stable cluster formation[1]. In a MANET that uses cluster-based services, network performance metrics such as throughput, delay and effective management are tightly coupled with the frequency of cluster reorganization [3]. Therefore, stable cluster formation inessential for better management and QoS support [3].The most popular clustering approaches in the literature are the lowest identifier(Lowest-ID) and maximum-connectivity[5].With Lowest-ID ,CH moves into another region it may unnecessarily replace an existing CH, causing transient instability[4]. But later MN movement and traffic characteristics, the criterion values are used in CH election process which results in instability. This is the case in Lowest Distance Value (LDV) and Highest In-Cluster Traffic(ICT) approaches. In [3], Chiang et al. have shown that the Lowest-ID algorithm performs better than the max connectivity algorithm 3 in terms of stability of clusters (measured by the number of cluster head changes), and they have proposed a small change in the Lowest-ID algorithm to improve performance; the improved version is referred to as LCC which stands for “Least Cluster head Change”. In [6], bounding flooding was proposed to increase the chance of finding feasible branches. In [7], a genetic algorithm was used to perform faster route discovery. In [8], the adaptive QoS protocol was proposed based on the prediction of local performance. Thus, predicting the mobility of nodes is an effective and feasible method. At present, the mobility prediction methods are path availability models [11], prediction-based link availability estimation[12], link expiration time model [13] and prediction strategy. Link expiration time model predicts link stability between two nodes according to the node‟s information such as location, velocity, and direction etc with the aid of Global Position System (GPS). The next section describes how (b, e, m)-model results in stable clustering, and enables proactive management in our management architecture.[3] III. PROPOSED WORK 3.1 Clustering in MANETs:- Clustering of nodes into groups results in simplification of addressing and management of the nodes and also yields better performance. Lowest-ID clustering is one of the most popular clustering schemes used in the oldas well as recent ad hoc networks literature. In each cluster, exactly one node, the one with the lowest ID among its neighbors, becomes a cluster head, and maintains cluster memberships of other member nodes. A cluster is identified by its cluster head‟s ID. In [15], an algorithm based on max-connectivity was also proposed, but it performed much worse than the Lowest-ID algorithm in terms of stability of clusters. The cluster head takes the responsibility of coordinating transmissions of packets and route discovery, and thus the network does not have to depend on classic flooding for routing. 3.2 Agent Model in clustering:- Agents use their own knowledgebase to achieve the specified goals without disturbing the activities of the host. The primary goal of an agent is to deliver information of one node to others in the network. Here, the agents are used to find the multicast routes and to create the backbone for reliable multicasting. There are various type of Agents[3]:  Knowledge Base: The knowledgebase maintains a set of network state variables such as status of the node (cluster head, child, others) available power, bandwidth, number of movements  Route Discovery Agent (RDA): It is a static agent that runs on nodes, creates agents and knowledge base, controls and coordinates the activities.  Node Manager Agent (NMA): It maintains the multicast tree and provides group ID to allthe members of the packet-forwarding nodes  Link Management Agent (LMA): When a node moves out of the communication range or  dies, LMA initiate route error (RERR) message to the upstream node and again initiates  the route request. 69
  • 3. Clustering Approach in Route Selection Using Mobile Agent in Mobile Ad-Hoc Network Fig 2 Routing agent model The mobile agent which resides in the source node provides group ID and distributes multicast key to all the group members 3.3(b, e, m)-Clustering Model:- The (b,e,m)-Clustering Approach has the following necessary ingredients: 1) The concept of virtual clusters, 2) Mobility prediction model, 3) Clustering algorithm and protocol, 4) Management architecture, Fig 3 Steps of clustering Approach 3.3.1 The Concept of Virtual Cluster We introduced multiple virtual clusters, In order to make our mobility prediction, and our clustering mechanism that is (b,e,m) approach [1]. For correct operation of the (b,e,m)-Approach , each MN is supposed to have a complete picture of the locations of the centers of such virtual clusters (VCCs).If greater mobility prediction accuracy is required, each virtual cluster can be further split into a number of equal tracking zones (TZ) as shown in Fig. 4.These TZs are again circular in shape, and can handle the MNs. Fig 4 Concept of Virtual Cluster and Tracking Zones[3] In Fig. 4 depicts a virtual cluster (big circle) that consists of seven TZs (smaller circular region).A virtual cluster can contain any number (N) of such TZs depending on factors such as the mobility prediction accuracy required and maximum control overhead that is allowable. However, „N‟ should satisfy the following [3]: 70
  • 4. Clustering Approach in Route Selection Using Mobile Agent in Mobile Ad-Hoc Network N = i2 + j2 + i*j, …………………(i) Where „i‟ and „j‟ are non –negative integers.ie. i=1 and j =2 then N = 7 Again each TZ has its own unique tracking zone identifier(TZI), which can be determined given the location information. Similarly, each MN is supposed to know all the tracking zones, and their corresponding identifiers within a particular virtual cluster. However, in our initial work we consider only the inter-virtual cluster movement pattern of MNs, and greater accuracy in this case is obtained by optimizing the value of virtual cluster radius (R). 3.3.2 Mobility Prediction Mechanism In mobile ad hoc network, the reliability of a path depends on the stability or availability of each link of this path because of the dynamic topology changes frequently. According this approach the node mobility is the main cause of uncertainty in N/ws, we design a mobility-prediction approach which is based on the Ziv-Lempel algorithms for data compression technique [1][8][9]. It derives a prediction of user mobility based on the accumulated behavior of a specific Mobile node. It is also confirm that the prediction is made without complexity and waste of bandwidth and transmission power. In our approach, each Mobile node is generating the strings of virtual cluster identifiers (VIDs) and maintaining its respective dictionary in its memory [12]. In addition to making predictions as to future movements of a particular Mobile node, our cluster approach is used by each MN to predict its approximate residence-times of the virtual clusters. For this purpose, each MN maintains its mobility database at a specific time in terms of a Mobility Trie[1][4]. This trie is a probabilistic model corresponding to the dictionary of the LZ78 algorithm [9]. There are two important parameters, interval time (Te)of updated events which are triggered on time-based updating Radius (Tr) of virtual cluster. If „Te‟ is smaller then greater the accuracy of the residence-time, and also higher the tracking overhead. Similarly, the smaller the Radius the better the prediction capability, but the higher the tracking overhead. So for greater prediction accuracy ,Mobility Tries can be constructed with respect to tracking zones. In this approach, the higher the number of TZs that a virtual cluster consists of, the greater the accuracy of the residence-time. 3.3.3 Clustering Algorithm and Protocol of (b,e,m) model:- This clustering algorithm and protocol are mainly due to our mobility prediction model as explained in [12].The Mobility Trie that each MN constructs plays an important role to bring in proactivness in our (b,e,m)- clustering approach. Each MN „A‟ to determine its residence-time (tav) in virtual cluster „V‟ from its Mobility Trie. The MN that has the highest Ω(from equ.[1]) can become the primary CH, and the MNs that have the second and third highest values become assistant(secondary) CHs. To form clusters, CH should cover the whole area of virtual cluster .So CH makes a k-hop cluster where value „k‟ is not necessarily Uniform However, efforts have been made to limit the value of „k‟, as it is better if every MN is only a fewer hops for proper management. Example of Virtual clustering is that we have four different packet types such as CALL, CONNECT_CH,CONNECT_MN and TARGET have been defined for the operation of our clustering protocol. Each cluster head broadcasts a CONNECT_CH packet periodically- every CH_CONNECT_INTERVAL – within its virtual cluster and each cluster member uncast CONNECT_MN to its respective CH periodically - Every MN_CONNECT _INTERVAL. On the other hand, if a new MN has not become a member in any cluster, it has to uncast a CALL packet to its respective CHs. Since all mobile nodes except CHsuse unicating as opposed to broadcasting, our clustering algorithm conserves the bandwidth and transmission power.[3] In addition to other information regarding each virtual cluster, each periodic CONNECT_CH carries the neighbor-table which is a set of MNs in the cluster and their latest Ω values. From the neighbor-table of CONNECT_CH, each MN that resides within the same virtual cluster constructs its own neighbor-table, and hence becomes aware of its neighbors. If any member node has not received a CONNECT_CHpacket from any CH during the last three consecutive CH_CONNECT _INTERVAL periods, Each node of a particular virtual cluster has to broadcast its protocol packet in order for other neighbor nodes to know about its existence[3]. This enables the MNs within the virtual cluster to select one as their CH in a distributed manner. These control packets are relayed by intermediate MNs only with in the virtual cluster. This is to enable CHs to get the topology information of adjacent clusters. Given that each CH knows the predicted residence-time of each MN within its cluster, it deletes the entry associated with a particular MN exactly „t0‟(system parameter) seconds after its residence-time expires. This effect will be reflected in every CONNECT _CH packet a CH broadcasts periodically. Also after having become a member ofa cluster, each MN can dynamically increase its MN_ CONNECT _INTERVAL until the new CH election process is triggered. Second aspect of our protocol is that, particular CH determine its successor and inform its members using TARGET packet . 71
  • 5. Clustering Approach in Route Selection Using Mobile Agent in Mobile Ad-Hoc Network 3.3.4 Management Architecture: Network management is a process of controlling a complex data network in order to maximize its efficiency and productivity. Generally it involves data collection, data processing, data analysis, and problem fixing. However, this management related tasks have to be performed in an efficient and scalable way. The clustering protocol is used to simplify the task of proper management in MANETs. [1].In case of information collection and communication strategy, there are three types of network management architectures: centralized, distributed, and hierarchical. In hierarchical model data collection is done by intermediate levels of the hierarchy before forwarding it to upper layers of the hierarchy. Our (b,e,m)- clustering approach facilitates this hierarchical management architecture that makes use of policy-based management technique together with mobile agents forwarding it to upper layers of the hierarchy[8]. The lowest level of this architecture consists of individual managed SNs. Several SNs are grouped into clusters and managed by a cluster head (CH). Fig 5 Hierarchical Management Architecture [2] BS: Base Station, SN: Sensor Network CH: Cluster Head, The cluster should take an optimal size, and should be stable most of the time in order to enable the efficient data collection. These cluster heads are autonomously elected through our (b,e,m)- clustering algorithm. The network manager, serving as a top-level manager, regulates and distributes high level management policies such as QoS parameters and management rules to a group of cluster heads. In hierarchical management, each cluster head provides functionality that is transparent to its network manager, and hence cluster heads are autonomous in this respect. In our approach it is assumed that all nodes have equal management software modules and states and any node can become either cluster head or cluster member depending on clustering mechanism. Cluster head itself manage entire ad hoc network. The reason why mobile agent technology is used here is that it can dynamically deploy itself in an appropriate node and execute managerial. In our clustering algorithm, since each cluster head knows the predicted lifetime of each of its members, the cluster heads and the mobile code that they originate can perform managerial operations. Moreover, using Mobility Tries, the cluster head would know the predicted mobility patterns of its member nodes. In case a node moves from one virtual cluster to another, its respective cluster head knows this from the Mobility Trie of the former. Our (b,e,m)-algorithm enables proactive cluster head election process, that leads to continuous management operation without any interruption . In our three-level hierarchy, the network manager is responsible for the PBNM operations, and can function as a policy server or policy decision point [7]. Mobile agent technology is used again in our approach for policy distribution, provisioning, and even for policy monitoring. Our(b,e,m)-clustering model facilitates each node to know about the availability pattern of neighboring nodes, and thus enables the PBNM to be aware of the possible network resources through prediction. The network manager is elected exactly the same way as the cluster head is elected. It responsible for a particular region, and might contain a number of virtual clusters under it. IV. INITIAL EVALUATION THROUGH SIMULATION The main aim of this research is to design and implement a novel routing scheme based on mobile agent technology in wireless ad-hoc networks that will provide the following benefits. Maximize network performance, scalability, provide end-to-end reliable communications and reduce possible delays, and minimize losses. Our initial simulation work attempts to compare the performance of our clustering algorithm with the Lowest-ID, maximum-connectivity (Max-Connect) and Lowest Distance Value(LDV) clustering algorithms, We performed our simulations using the GloMo Sim simulation package in which we implemented and compared the Lowest-ID, Max-Connect, LDV and our algorithm [12]. The cluster stability can be measured by determining the number oftimes each MN either attempts to become a CH or gives up its role as a CH. In Fig. 6 it is measured by determining the number of MNs that have attempted to become the CH at least once in 50 time period . As can be seen, in all the other three algorithms the numbers tend to increase linearly with the node degree. our model has only a few numbers of MNs that have attempted to become the CH, and hence improves stability. 72
  • 6. Clustering Approach in Route Selection Using Mobile Agent in Mobile Ad-Hoc Network Chart Title 200 attempts to be the CH Number of MN's that 150 lowest ID 100 b,e,m-clustering 50 LDVP 0 Max connect 25 50 75 100 125 150 Fig.6 Number of MNs that Attempted to become the CH as a function of Node Degree. V. CONCLUSIONS The main objective is to use mobile agent technology for route selection in ad-hoc networks with purpose to improve over traditional schemes in terms of performance, scalability and stability of clusters. A new clustering approach that makes use of intelligent mobility prediction and location information in new long-term MANETs was proposed in this paper. [1]This clustering approach is to enable the development of an automated, intelligent[3],efficient and robust management architecture. To facilitate this, we introduced the virtual cluster concept. in the network management perspective, it results in the following uniquebenefit: [4] We could predict a specific MN‟s future positions and continue managerial operations without interruptions in a proactive way REFERENCES [1]. S.Sivavakeesar, G.Pavlou, and Liotta, “Stable Clustering Through Mobility Prediction for Large- Scale Multihop Intelligent Ad Hoc Networks|”, IEEE WCNC 2004, in press. [2]. Muhammad Arshad ,Nasrullah Armi, Nidal Kamel and N. M.Saad.“Mobile data collector based routing protocol for [3]. wireless sensor networks”.Scientific Research and Essays Vol. 6(29), pp. 6162-6175, 30 November, 2011. [4]. G.Santhi and Alamelu Nachiappan ,”Adaptive QoS Multicast Routing with Mobility Prediction in MANET” ,Int. [5]. Journal of Ad hoc, Sensor & Ubiquitous Computing, 2010,vol.1,No.3 [6]. Bita Safarzadeh, ShahramJamali, HamedAlimohammadi, “ A High Performance Scalable QoS Routing Protocol for Mobile Ad Hoc Network”, Int. J. Comp. Tech. Appl. ,vol 2 (2), 332-339. [7]. P.Basu, N.Khan, F. Znati, “Mobility Based Metric for Clustering in Mobile Ad Hoc Networks”, Workshop on Distributed Computing System, 2001,pp.413-418. [8]. Barolli L, Koyama A, Shiratori N, “ A QoS Routing Method for Ad-Hoc Networks Based on Genetic Algorithm”, In: Proceeding of the 14th international workshop ondatabase and expert system applications,2003, pp.175-179. [9]. Du X,”QoS Routing Based on Multi-Class Nodes for Mobile Ad Hoc Networks”, Ad Hoc Network,2004,pp.241-254. [10]. Sun H, Hughes HD, “Adaptive QoS Routing Based on Prediction of Local Performance in Ad Hoc Network”, In: Proceeding of IEEE conference on wireless communication and networking ,2003, pp. 1191-1195 [11]. B.McDonald, and F.Znati, “A Mobility-Based Framework for AdaptiveClustering in Wireless Ad Hoc Networks”, IEEE Journal on SelectedAreas in Communications, vol. 17, August 1999, pp 1466 – 1487. [12]. XiangbinZhu,Wenjuan Zhang.“A MobileAgent-based Clustering Data FusionAlgorithm in WSN”,IJECE-2010. [13]. McDonald et al., “Path availability model for wireless ad hoc networks” Proceeding of IEEE wireless communications, 1999, (WCNC ‟99). [14]. Jiang Shengming et al., “A prediction based link availability estimation for mobile ad-hoc networks” IEEE Infocom, 2001. [15]. SuW.Lee Sung-Ju et al., “ Mobility predictin and routing in ad-hoc wireless networks”» International Journal of Network Management, 2001. [16]. C.-C. Chiang, H.-K. Wu, W. Liu, M. Gerla, “Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel,” Proceedings of SICON 1997. 73