SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013

Quadrant Based DIR in CWin Adaptation
Mechanism for Multihop Wireless Network
V.Karthikeyan1, V.J.Vijayalakshmi2, P.Jeyakumar3
1

Department of ECE, SVS College of Engineering, Coimbatore, India
Karthick77keyan@gmail.com

2

Department of EEE, Sri Krishna College of Engg & Tech., Coimbatore, India
Vijik810@gmail.com
3

Department of ECE Karpagam University, Coimbatore, India
Jeyak522@gmail.com

ABSTRACT
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of
contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the
nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless
channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM).
This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level.
So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as
a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and
also reduce the routing overheads, which eventually increases overall network throughput. This algorithm
limits the broadcast region to a quadrant where the source node and the destination nodes are located.
Implementation of the algorithm is done in Linux based NS-2 simulator.

Keywords
Multihop wireless network, CSMA/CA, Routing protocol, restricted flooding.

1. INTRODUCTION
Multihop wireless networks (MWN) are recently been used in a wide civilian use and military
applications. Main advantage is no need for pre-existing infrastructure. MWN consist of a number
of either stationary or mobile wireless stations, which serve as relays forwarding traffic from
other nodes and provide wide network connectivity. The main task is to maintain the network
throughput that depends on the achievable channel capacity at each link and power consumption
that depends on the type of routing metrics used in the network. In order to improve the end-toend throughput performance of IEEE 802.11 DCF, CWA mechanism [1] is used which adaptively
varies the size of the Contention Window (CW) depending on the traffic generated. The basic
access mechanism of the IEEE 802.11 DCF is carrier sense multiple access with collision
avoidance (CSMA/CA). The idea is to prevent collisions at the moment they are most likely to
occur, i.e. when the bus is released. All source nodes are forced to wait for a random number of
timeslots and then sense the medium again, before starting a transmission. If the medium is
sensed to be busy, the source node freezes its timer until it becomes free again. Thus, the chance
of two source node starting to send simultaneously is reduced. The main drawback of this
mechanism is that it utilizes the entire network and hence, power consumption is higher. So, to
fulfil the objective and to overcome the drawback, a cross layer between the network layer
routing protocol and the data link layer are done. That is restricted flooding algorithm called QDOI: 10.5121/ijci.2013.2404

27
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013

DIR [2] is cross layered with the CWA mechanism. Various routing metrics usually used are
shortest path, link stability and minimum number of hops towards the destination. Routing
protocols can be categorized into topology-based [3] and position-based protocols [4]. In the
former, on-demand or proactive flooding of route request (RREQ) are broadcast at each node to
all neighbours to detect routes. In position-based protocol, routing is optimized by making use of
location information through beaconing available at each node.
Position-based protocols are further categorized into greedy forwarding and restricted flooding
[4]. In greedy forwarding [5], based on location information of the destination node, source node
will select the node with the best progress towards the destination. The location information of
the destination will then be inserted in their data packet and unicast to the selected node. Upon
receiving the data packet, the selected node will then select the best node among its neighbours
and the process continues until the data packet reaches the destination. As the name implies, in
restricted flooding, nodes that are located nearer to the destination or in a forwarding zone, will
broadcast the packet. Distance and forwarding zone information are computed at the respective
nodes to determine their progress towards destination. These nodes will then broadcast the packet
and the process is repeated at each intermediate node until it reaches the destination.

2. PROBLEM STATEMENT
The nodes in the MWN that are with different traffic forwarding capability contend with each
other which has the same CWmin value. The node with the largest forwarding capability may
utilize the wireless medium aggressively and eventually causes the decrease in the end-to-end
throughput of the multihop path. Thus, the algorithm needs to differentiate the channel access
probability of each node by adjusting the CW size depending on the traffic forwarding capability.
This implies that none of the relay nodes forwards excessive packets to its corresponding receiver.
In summary, by differentiating the contention window size at each node, all the other nodes
except the source are able to increase the traffic forwarding capability, which results in a
significant increase in the end-to-end throughput.
In order to improve the throughput of MWN the following issues must be considered:
(i)
(ii)
(iii)

How to estimate the traffic forwarding capability at each node;
How to differentiate the contention window size depending on the traffic forwarding
capacity;
How to increase the end-to-end throughput by regulating the throughput of traffic relayed
at each hop in distributed and scalable manner.

As a result end-to-end throughput can be increased but CWA mechanism utilizes the entire
available network nodes to broadcast the data to the destination. CWAM uses greedy forwarding
technique, where the request is given to all the neighbouring nodes to establish the path.
Eventually this consumes more power. Since the network is a stand-alone device this operates on
batteries.

28
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013
Destination node

Source node

Fig. 1 Nodes participating in total flooding

Thus, for reducing the power consumption, the path in which the broadcast occurs must be
limited to a quadrant. Instead of utilizing all the nodes in the network, only the nodes in the
broadcast region have to involve in transmission. The mathematical computation of the

location information in the kernel environment will incur further processing delay in the
current node [6]. Hence, the delay needs to be reduced by inserting the location
information of the source node or the previous intermediate node in the data packet, and
so, periodic beaconing will be eliminated.

3. RELATED WORK
Related work falls into two broad categories: Tuning of back-off parameters and restricted
flooding.

3.1. Tuning of Back-off Parameters
In IEEE 802.11 DCF, the back-off parameters such as CWmin and CWmax are fixed. To analyse the
impact of the back-off parameters on network performance, Bianchi [8] derived a two
dimensional Markov chain model for the exponential backoff process. Using this model, it was
shown that the number of stations and the minimum CW size have significant impacts on the
overall performance of IEEE 802.11 DCF. Bianchi and Tinnirello [9] proposed how to estimate
the number of active stations using an extended Kalman filter in a WLAN. Tuning of the MAC
parameters can effectively improve the network performance when the number of active stations
is properly estimated. Cali [10] proposed a distributed algorithm called IEEE 802.11+, which
enables each node to estimate the number of contending nodes at any given time. They also
derived an analytical model which gives a theoretical maximum bound on the network capacity,
and tried to find the optimal CW value to achieve the theoretical throughput limit. Kwon [11]
proposed a Fast Collision Recovery (FCR) protocol, which is a contention-based protocol that
redistributes the back-off timer among all competing stations with an objective of reducing the
idle back-off time.

3.2. Restricted Flooding
Distance from the node to the destination is used to determine the nodes participation in the route
discovery process. Nodes that are further away from source will not participate. Relative
Neighbourhood Graph (RNG) [12], which together with local information of distance to
neighbours and distances between neighbours will minimize the total energy consumption.
29
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013

AODV protocol uses a reactive type of routing which utilizes maximum power at initial stage of
transmission. Location-based Geocasting and Forwarding (LGF) [13], calculates distances to all
nodes in the network and will compare the distance information of the source to the destination
extracted from the request packet to determine its participation. Angle Routing Protocol (ARP)
[14] uses the angle made from the straight line drawn from source to destination as the restricted
region whereby all nodes in this region will participate in the route discovery. However, DDB [15]
uses the location information of the destination node and also of the intermediate node which are
inserted in the request packet. With this additional information, an intermediate node can
calculate the estimated additional covered area that it would cover with its transmission which is
based on Dynamic Forwarding Delay (DFD). The concept of DFD is to determine when to
forward the packet and node with more area covered will be given a smaller delay to broadcast
and hence, will broadcast first. All the above protocols require computation of the distance and
angle at all intermediate nodes to determine the nodes that are located in the forwarding region.

4. CROSS LAYER FRAMEWORK
A cross layer is made between the data link layer and the network layer of the OSI model to
improve the performance of IEEE 802.11 DCF.

4.1.CWA Algorithm
In the CWA mechanism, the traffic forwarding capability αi is defined as the ratio of the rate of
incoming and outgoing traffic at a node :
Traffic forwarding capability ratio:

αi = iout/iin

)

(1)

where, iout - outgoing traffic at a node i
iin - incoming traffic at a node i
If a node can forward all the received packets to its neighbouring node without packet loss, then
αi is equal to one. On the other hand, if node receives a large number of packets but cannot
forward them at the same rate as it receives, and then αi is less than one. If node has the smallest
forwarding capability αi among the nodes on the multihop path, it may be a bottleneck relay node
of the path.
Contention window adaptation algorithm has the following step which is implemented across
the network.
Algorithm 1:
1: InPkts: the number of all the incoming packets at
particular time ( )
2: DstPkts: the number of outgoing packets whose
destination is itself.
3:

iin = InPkts – DstPkts

4:

OutPkts: the number of all the outgoing packets for

5: SrcPkts: the number of incoming packets whose source
is itself.
30
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013
6:

iout = OutPkts - SrcPkts

7:

if i out > iin then, iout ← iin

8:

CWmin ←CWmin +

9:

if CWmin > maxth then, CWmin ← maxth

. (iout – .iin )

10: else if CWmin < minth then, CWmin ← minth
Fig. 2 Steps in CWA Algorithm

Fig. 2 gives the steps involved in the CWA mechanism. Here, ‘inpkts’ denotes the incoming data
packets, ‘dstpkts’ denotes packets at the destination, and ‘outpkts denotes the outgoing data
packets and ‘srcpkts ’denotes the packets at the source.
On the line 7 in Algorithm 1, an upper
bound is placed on the rate of outgoing traffic. Even though there are no incoming packets, the
packets accumulated in the buffer can be transmitted. For a short time interval, the outgoing rate
could be higher than the incoming rate depending on the buffer size, and it may lead to a false
decision in updating CWmin in line 8. This is the reason that we limit the rate estimate of
outgoing traffic up to that of incoming traffic.
Third, if the traffic load is sufficiently low and does not incur any packet loss, CW min has the
tendency to be large with the use of the adaptation rule. For simulations and experiment, minth
and maxth of CWmin are set to 1 and 32, respectively. We set maxth of CWmin to 32 and set minth of
CWmin to 1.

4.2. Q-DIR algorithm
Q-DIR is a restricted routing protocol that concentrates on a specified zone using location
information provided by a location service as in fig. 3. In Q-DIR operation, the location
information of the source and destination nodes is piggy-backed in the route request (RREQ)
packet and then broadcasted.

Destination node

Source node

Fig. 3 Less participating nodes in Q-DIR algorithm

31
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013

Upon receiving the RREQ, intermediate nodes will compare using a simple mathematical
comparison based on the coordinates of source, destination and the current node that directs the
packet towards the destination as in Fig.4. This mathematical processing is done in the kernel
environment to reduce the routing overhead.
Algorithm 2:

1:

Divide the network area into four quadrants with
source as origin

2:

Quadrant of intermediate node compared to source
node.

3:

Quadrant of destination node compared to source
node.

4: If they lie in same quadrant, then forward the data
packets. Else drop the packets.
Fig. 4 Steps in Q-DIR algorithm

The decision to participate is in reactive manner. Once the decision to broadcast has been made,
the intermediate node will insert its location by replacing the source node coordinates and append
its address and sequence number at the end of the RREQ packet. It will then broadcast the packet.
The process will be repeated at each intermediate node until it reaches the destination. The
replacement of the source node location information with the intermediate node coordinates will
make the packet more directed towards the destination since the comparison now is based on the
previous node. Upon receiving the RREQ, destination node will send a route reply message
(RREP) back to source via the path taken to reach the destination that was appended in the RREQ
as it traverses across the network. There is no need for the route discovery to the source node.

4.3. Cross Layer Design
The network has the wide spread of nodes, where there may be many source nodes and
destination nodes involved in data transmission. This transmission is done via various
intermediate nodes. First step is to divide the broadcast region into four quadrants by keeping
source as the origin. Secondly, location of the destination in noted and broadcast region is limited
to that particular quadrant and is achieved using Q-DIR algorithm. Only the intermediate nodes in
that quadrant will be selected according to the algorithm 2 and remaining nodes will be rejected.
Similarly for all the source nodes same procedure is done. Third step is to apply CWA
mechanism to each of the nodes involved in broadcasting of data packets. This adaptively varies
the CW size depending on the incoming traffic. CWA mechanism is implemented in all the
forwarding nodes to avoid collision and packet drop.
The general procedure involved in the cross layer design between Q-DIR and CWA is listed in
the fig. 5.

32
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013

1: Place the nodes in a grid topology
2: Identify the source and destination node
3: With source as origin, divide the network into four
quadrant
4: Select the quadrant in which the destination node is
present
5: Apply the Algorithm 2 to the selected quadrant
6: After estimating broadcast route, apply Algorithm 1
to each forwarding node.
Fig. 5 Cross Layer Design Procedure

NETWORK LAYER
(Q-DIR)

DATA LINK LAYER
(CWAM)

PHYSICAL LAYER

Fig. 6 Cross Layer Framework

Q-DIR in network layer is used for routing which reduces the delay while transmission and CWA
mechanism in data link layer is used to adaptively vary the CW size and so it achieves a
maximum throughput. As shown in Fig.6, a cross layer between CWA mechanism of Data link
layer and Q-DIR of Network layer is implemented to enhance performance of IEEE 802.11 DCF.

5. SIMULATION RESULTS
Simulation of Q-DIR with CWAM is done in Network Simulator-2 (ns-2). Comparison is done
between the total flooding protocol (AODV) and restricted flooding protocol (Q-DIR with
CWAM). A network model of 49 nodes that forms a 7 by 7 grid model where the distance from
adjacent nodes are 30m. Based on this grid model, the density is 1 node per 661m2 and the data
rate is 2 Mbps. Simulation configuration parameters are given in the table I.

33
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013
TABLE I SIMULATION CONFIGURATION PARAMETERS

Configuration Parameters

Value

Max. No. Of hops between two nodes

10

Average one hop traversal time

60 ms

Route discovery time

5000 ms

Route delete time

25000 ms

Number of RREQ tries

3

Total traversal time

1200 ms

Various performance comparisons are made between the normal operation of the network under
normal AODV and the operation using the newly proposed algorithm that is cross layer of Q-DIR
with CWA mechanism.

Fig.7 Aggregate Throughput comparison

Aggregate throughput comparison is done between AODV and QDIR-CWA. In fig. 7, the
throughput achieved by QDIR-CWA is higher compared to the AODV. This is because CWA
mechanism adaptively adjusts the CW size depending on each node’s incoming traffic.

Fig. 8 Delay comparison

In the figure 8, delay obtained using QDIR-CWA mechanism is lower than that is obtained from
normal AODV. The reason is that QDIR eliminates the periodic beaconing and hence reduces the
routing overheads while transmission. So, delay is reduced in QDIR-CWA mechanism.
34
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013

Fig. 9 Packet Delivery Ratio

In the fig. 9, CWA mechanism achieves a higher delivery ratio because this algorithm aims to
avoid collision and packet drop. Hence, the data packets from the source are properly delivered to
the destination and achieve a higher packet delivery ratio than AODV.

Fig. 10 Energy Consumption comparison

In fig. 10, energy consumed by network using AODV protocol is higher than the energy
consumed by the network using QDIR-CWA. Since, QDIR-CWA restricts the broadcast region to
a particular zone; usage of energy by the remaining area is avoided. Hence, QDIR-CWA
consumes less energy which results in less power consumption.

Fig. 11 Routing Overhead comparison
35
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013

Fig. 11 shows that AODV exhibits more routing overheads because of the reason that it is a
reactive type of routing. The request to the nodes in the network is given in prior to transmission.
QDIR-CWA has a simple route calculation and the elimination of the periodic beaconing reduces
the routing overhead. Thus, from all the above factors it is known that QDIR-CWA mechanism
achieves better performance compared to AODV.

6. CONCLUSION
The Cross layer between the Q-DIR algorithm and CWA mechanism increases the overall
network performance. Q-DIR algorithm uses the location information of the source, destination
and the intermediate node to select the broadcast region. Nodes in the particular broadcast region
only will broadcast while other nodes will ignore the RREQ packet. CWA mechanism is applied
to each of the nodes in the broadcast region. CWA mechanism reduces the packet drop due to
collision, which improves the throughput and Q-DIR reduces the mathematical computation
complexity by eliminating the periodic beaconing. This achieves reduced delay and reduced
overhead. As a result, the overall network end-to-end throughput is achieved using CWAM
whereas reduced routing overheads and reduced power consumption is achieved using Q-DIR.
Therefore, the cross layer of Q-DIR and CWAM provides an increased network performance.

REFERENCES
[1]

[2]

[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]

Daewon Jung, Jaeseon Hwang, Hyuk Lim, Kyung-Joon Park, and Jennifer C.Hou, “Adaptive
Contention Control for Improving End-to-End Throughput Performance of Multihop Wireless
Networks”, IEEE Trans. on wireless comm. VOL 9, NO.2, Feb 2010.
L.A.Latiff, A.Ali, N.Fisal “Power Reduction Quadrant based Directional Routing protocol (Q-DIR) in
mobile Ad-Hoc network”, IEEE International Conf. on Telecomm. and Malaysia International Conf.
on Comm., 2007.
E.M Royer and C.K.Toh. “A Review of Current Routing Protocol for Ad-Hoc Mobile Wireless
Networks” IEEE Personal Comm. pp. 46-55.April 1999.
Stojmenovic, I. “Position-based Routing in Ad Hoc Networks” IEEE Comm Magazine. July
2002.40(7). 128-134.
Oh, H., Bahn, H. and Chae, K-J. “An EnergyEfficient Sensor Routing Scheme for Home Automation
Networks”. IEEE Trans. on Consumer Electronics, Vol.31 (3). August 2005.
Chakeres, I. D. and Royer, E.M. “AODV Routing Protocol Implementation Design” Proc.of 24th
WWAN 2004. 23-24 March 2004. Tokyo. 2004. 698-703.
Bianchi.G, “Performance analysis of the IEEE 802.11 distributed coordination function," IEEE J. Sel.
Areas Comm. (JSAC) 2003.
G. Bianchi and I. Tinnirello, “Kalman filter estimation of the number of competing terminals in an
IEEE 802.11 network," in Proc. IEEE INFOCOM, 2003.
Cali.F, Conti.M and Gregori.E, “Dynamic tuning of the IEEE the 802.11 protocol to achieve a
theoretical throughput limit," AIEEE/ACM Trans. Netw 2000.
Fanf.Y, Kwon.Y and Latchman.H “A novel MAC protocol with fast collision resolution for wireless
LANs," in Proc. IEEE INFOCOM 2003.
Cartigny, J., Simplot, D. and Stojemenovic, I. “Localized minimum-energy broadcasting in ad hoc
networks” INFOCOM 2003. pp. 2210 – 2217.
A.Ali, L.A.Latiff, Chia-Ching Ooi, and N.Fisal, “Location-based Geocasting and Forwarding (LGF)
Strategy in MANET” ICT 2005, Cape Town, South Africa, May 2005.
Kumar Banka, R. and Xue, G. “Angle routing protocol: location aided routing for mobile ad-hoc
networks using dynamic angle selection” MILCOM 2002 Proc. 7-10 Oct 2002. 1:501-506.
Heissenbuttel, M., Braun, T., Walchli, M. and Bernoulli, T. “Broadcasting in Wireless Multihop
Network with Dynamic Forwarding Delay Concept” Technical Report IAM-04-010. Institute of
Computer Science and Applied Maths. University of Berne, 2004.

36
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013

Authors
Prof.V.Karthikeyan has received his Bachelor’s Degree in Electronics and
Communication Engineering from PGP college of Engineering and Technology in 2003,
Namakkal, India, He received Masters Degree in Applied Electronics from KSR college
of Technology, Erode in 2006 He is currently working as Assistant Professor in SVS
College of Engineering and Technology, Coimbatore. She has about 8 years of Teaching
Experience
Prof.V.J.Vijayalakshmi has completed her Bachelor’s Degree in Electrical & Electronics
Engineering from Sri Ramakrishna Engineering College, Coimbatore, India. She
finished her Masters Degree in Power Systems Engineering from Anna University of
Technology, Coimbatore, She is currently working as Assistant Professor in Sri Krishna
College of Engineering and Technology, Coimbatore she has about 5 years of teaching
Experience.
Mr P.Jeyakumar Currently pursuing his Bachelor’s Degree in Electronics Engineering in
Karpagam University, Coimbatore, Tamil Nadu, India.

37

Weitere ähnliche Inhalte

Was ist angesagt?

Modulation aware connection admission control and uplink scheduling algorithm...
Modulation aware connection admission control and uplink scheduling algorithm...Modulation aware connection admission control and uplink scheduling algorithm...
Modulation aware connection admission control and uplink scheduling algorithm...ijwmn
 
Qo s oriented distributed routing protocols : anna university 2nd review ppt
Qo s   oriented  distributed routing  protocols : anna university 2nd review pptQo s   oriented  distributed routing  protocols : anna university 2nd review ppt
Qo s oriented distributed routing protocols : anna university 2nd review pptAAKASH S
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
 
Abstract
AbstractAbstract
AbstractAnand B
 
QOD routing protocols : phase 1 ppt
QOD routing  protocols : phase 1 pptQOD routing  protocols : phase 1 ppt
QOD routing protocols : phase 1 pptAAKASH S
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
 
Energy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networksEnergy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networkscsandit
 
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...IJCNCJournal
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
 
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS cscpconf
 
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...Editor IJCATR
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
 
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKSTOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKScaijjournal
 
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...Editor IJCATR
 
Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorIRJET Journal
 

Was ist angesagt? (18)

Modulation aware connection admission control and uplink scheduling algorithm...
Modulation aware connection admission control and uplink scheduling algorithm...Modulation aware connection admission control and uplink scheduling algorithm...
Modulation aware connection admission control and uplink scheduling algorithm...
 
218
218218
218
 
Qo s oriented distributed routing protocols : anna university 2nd review ppt
Qo s   oriented  distributed routing  protocols : anna university 2nd review pptQo s   oriented  distributed routing  protocols : anna university 2nd review ppt
Qo s oriented distributed routing protocols : anna university 2nd review ppt
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
 
Abstract
AbstractAbstract
Abstract
 
QOD routing protocols : phase 1 ppt
QOD routing  protocols : phase 1 pptQOD routing  protocols : phase 1 ppt
QOD routing protocols : phase 1 ppt
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
Energy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networksEnergy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networks
 
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
 
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKSTOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
 
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...
 
Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulator
 

Andere mochten auch

Vc4 nm73 equipo#6-presentacion
Vc4 nm73 equipo#6-presentacionVc4 nm73 equipo#6-presentacion
Vc4 nm73 equipo#6-presentacionSaMoCaFlo
 
ανακοίνωση
ανακοίνωσηανακοίνωση
ανακοίνωση4Gym Glyfadas
 
Greg Book cover Draft 3
Greg Book cover Draft 3Greg Book cover Draft 3
Greg Book cover Draft 3Toni N
 
πολυπολιτισμικοτητα 2
πολυπολιτισμικοτητα 2πολυπολιτισμικοτητα 2
πολυπολιτισμικοτητα 24Gym Glyfadas
 
Practica de observación de minerales
Practica de observación de mineralesPractica de observación de minerales
Practica de observación de mineralesMaggie Moran
 
Nhks1190206
Nhks1190206Nhks1190206
Nhks1190206s1190206
 
Atentie la pozitia de la birou
Atentie la pozitia de la birouAtentie la pozitia de la birou
Atentie la pozitia de la biroudigibrain
 
Mujeres en mexico flacso
Mujeres en mexico flacsoMujeres en mexico flacso
Mujeres en mexico flacsoLe Mays
 
πολυπολιτισμικοτητα 1
πολυπολιτισμικοτητα 1πολυπολιτισμικοτητα 1
πολυπολιτισμικοτητα 14Gym Glyfadas
 
Биокамины Decoflame, 2015 каталог (Fireplaces Decoflame, 2015)
Биокамины Decoflame, 2015 каталог (Fireplaces Decoflame, 2015)Биокамины Decoflame, 2015 каталог (Fireplaces Decoflame, 2015)
Биокамины Decoflame, 2015 каталог (Fireplaces Decoflame, 2015)Decoflame
 
Microtaller guìas de estudio
Microtaller guìas de estudioMicrotaller guìas de estudio
Microtaller guìas de estudioufa_sivec
 

Andere mochten auch (18)

Photos from the World Bank Group - OECD Meeting on making investment climate ...
Photos from the World Bank Group - OECD Meeting on making investment climate ...Photos from the World Bank Group - OECD Meeting on making investment climate ...
Photos from the World Bank Group - OECD Meeting on making investment climate ...
 
Vc4 nm73 equipo#6-presentacion
Vc4 nm73 equipo#6-presentacionVc4 nm73 equipo#6-presentacion
Vc4 nm73 equipo#6-presentacion
 
ανακοίνωση
ανακοίνωσηανακοίνωση
ανακοίνωση
 
Windows vs Linux
Windows vs LinuxWindows vs Linux
Windows vs Linux
 
Greg Book cover Draft 3
Greg Book cover Draft 3Greg Book cover Draft 3
Greg Book cover Draft 3
 
Rodeway inn clearfield
Rodeway inn clearfieldRodeway inn clearfield
Rodeway inn clearfield
 
πολυπολιτισμικοτητα 2
πολυπολιτισμικοτητα 2πολυπολιτισμικοτητα 2
πολυπολιτισμικοτητα 2
 
Practica de observación de minerales
Practica de observación de mineralesPractica de observación de minerales
Practica de observación de minerales
 
NZC - Ben Taube
NZC - Ben TaubeNZC - Ben Taube
NZC - Ben Taube
 
Nhks1190206
Nhks1190206Nhks1190206
Nhks1190206
 
Atentie la pozitia de la birou
Atentie la pozitia de la birouAtentie la pozitia de la birou
Atentie la pozitia de la birou
 
Mujeres en mexico flacso
Mujeres en mexico flacsoMujeres en mexico flacso
Mujeres en mexico flacso
 
πολυπολιτισμικοτητα 1
πολυπολιτισμικοτητα 1πολυπολιτισμικοτητα 1
πολυπολιτισμικοτητα 1
 
Биокамины Decoflame, 2015 каталог (Fireplaces Decoflame, 2015)
Биокамины Decoflame, 2015 каталог (Fireplaces Decoflame, 2015)Биокамины Decoflame, 2015 каталог (Fireplaces Decoflame, 2015)
Биокамины Decoflame, 2015 каталог (Fireplaces Decoflame, 2015)
 
Bullying
BullyingBullying
Bullying
 
Microtaller guìas de estudio
Microtaller guìas de estudioMicrotaller guìas de estudio
Microtaller guìas de estudio
 
Активные продажи в кризис
Активные продажи в кризисАктивные продажи в кризис
Активные продажи в кризис
 
barbituates
barbituatesbarbituates
barbituates
 

Ähnlich wie V.KARTHIKEYAN PUBLISHED ARTICLE AA

VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkIJCNCJournal
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKIJCNCJournal
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and linkIJCNCJournal
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
 
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONRASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONAIRCC Publishing Corporation
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...AIRCC Publishing Corporation
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...AIRCC Publishing Corporation
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
 
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...AIRCC Publishing Corporation
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
 
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSSNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSijwmn
 
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSSNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSijwmn
 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
 

Ähnlich wie V.KARTHIKEYAN PUBLISHED ARTICLE AA (20)

VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONRASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSSNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
 
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSSNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless Networks
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 

Mehr von KARTHIKEYAN V

V.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAAV.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAAKARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA..
V.KARTHIKEYAN PUBLISHED ARTICLE AA..V.KARTHIKEYAN PUBLISHED ARTICLE AA..
V.KARTHIKEYAN PUBLISHED ARTICLE AA..KARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AKARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AKARTHIKEYAN V
 
V.karthikeyan published article a..a
V.karthikeyan published article a..aV.karthikeyan published article a..a
V.karthikeyan published article a..aKARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE A..
V.KARTHIKEYAN PUBLISHED ARTICLE A..V.KARTHIKEYAN PUBLISHED ARTICLE A..
V.KARTHIKEYAN PUBLISHED ARTICLE A..KARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AKARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1KARTHIKEYAN V
 
V.karthikeyan published article
V.karthikeyan published articleV.karthikeyan published article
V.karthikeyan published articleKARTHIKEYAN V
 
V.karthikeyan published article1
V.karthikeyan published article1V.karthikeyan published article1
V.karthikeyan published article1KARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEKARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEKARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEKARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEKARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEKARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEKARTHIKEYAN V
 

Mehr von KARTHIKEYAN V (16)

V.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAAV.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAA
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA..
V.KARTHIKEYAN PUBLISHED ARTICLE AA..V.KARTHIKEYAN PUBLISHED ARTICLE AA..
V.KARTHIKEYAN PUBLISHED ARTICLE AA..
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
 
V.karthikeyan published article a..a
V.karthikeyan published article a..aV.karthikeyan published article a..a
V.karthikeyan published article a..a
 
V.KARTHIKEYAN PUBLISHED ARTICLE A..
V.KARTHIKEYAN PUBLISHED ARTICLE A..V.KARTHIKEYAN PUBLISHED ARTICLE A..
V.KARTHIKEYAN PUBLISHED ARTICLE A..
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE A
 
V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1
 
V.karthikeyan published article
V.karthikeyan published articleV.karthikeyan published article
V.karthikeyan published article
 
V.karthikeyan published article1
V.karthikeyan published article1V.karthikeyan published article1
V.karthikeyan published article1
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 

Kürzlich hochgeladen

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Kürzlich hochgeladen (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

V.KARTHIKEYAN PUBLISHED ARTICLE AA

  • 1. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013 Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network V.Karthikeyan1, V.J.Vijayalakshmi2, P.Jeyakumar3 1 Department of ECE, SVS College of Engineering, Coimbatore, India Karthick77keyan@gmail.com 2 Department of EEE, Sri Krishna College of Engg & Tech., Coimbatore, India Vijik810@gmail.com 3 Department of ECE Karpagam University, Coimbatore, India Jeyak522@gmail.com ABSTRACT In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator. Keywords Multihop wireless network, CSMA/CA, Routing protocol, restricted flooding. 1. INTRODUCTION Multihop wireless networks (MWN) are recently been used in a wide civilian use and military applications. Main advantage is no need for pre-existing infrastructure. MWN consist of a number of either stationary or mobile wireless stations, which serve as relays forwarding traffic from other nodes and provide wide network connectivity. The main task is to maintain the network throughput that depends on the achievable channel capacity at each link and power consumption that depends on the type of routing metrics used in the network. In order to improve the end-toend throughput performance of IEEE 802.11 DCF, CWA mechanism [1] is used which adaptively varies the size of the Contention Window (CW) depending on the traffic generated. The basic access mechanism of the IEEE 802.11 DCF is carrier sense multiple access with collision avoidance (CSMA/CA). The idea is to prevent collisions at the moment they are most likely to occur, i.e. when the bus is released. All source nodes are forced to wait for a random number of timeslots and then sense the medium again, before starting a transmission. If the medium is sensed to be busy, the source node freezes its timer until it becomes free again. Thus, the chance of two source node starting to send simultaneously is reduced. The main drawback of this mechanism is that it utilizes the entire network and hence, power consumption is higher. So, to fulfil the objective and to overcome the drawback, a cross layer between the network layer routing protocol and the data link layer are done. That is restricted flooding algorithm called QDOI: 10.5121/ijci.2013.2404 27
  • 2. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013 DIR [2] is cross layered with the CWA mechanism. Various routing metrics usually used are shortest path, link stability and minimum number of hops towards the destination. Routing protocols can be categorized into topology-based [3] and position-based protocols [4]. In the former, on-demand or proactive flooding of route request (RREQ) are broadcast at each node to all neighbours to detect routes. In position-based protocol, routing is optimized by making use of location information through beaconing available at each node. Position-based protocols are further categorized into greedy forwarding and restricted flooding [4]. In greedy forwarding [5], based on location information of the destination node, source node will select the node with the best progress towards the destination. The location information of the destination will then be inserted in their data packet and unicast to the selected node. Upon receiving the data packet, the selected node will then select the best node among its neighbours and the process continues until the data packet reaches the destination. As the name implies, in restricted flooding, nodes that are located nearer to the destination or in a forwarding zone, will broadcast the packet. Distance and forwarding zone information are computed at the respective nodes to determine their progress towards destination. These nodes will then broadcast the packet and the process is repeated at each intermediate node until it reaches the destination. 2. PROBLEM STATEMENT The nodes in the MWN that are with different traffic forwarding capability contend with each other which has the same CWmin value. The node with the largest forwarding capability may utilize the wireless medium aggressively and eventually causes the decrease in the end-to-end throughput of the multihop path. Thus, the algorithm needs to differentiate the channel access probability of each node by adjusting the CW size depending on the traffic forwarding capability. This implies that none of the relay nodes forwards excessive packets to its corresponding receiver. In summary, by differentiating the contention window size at each node, all the other nodes except the source are able to increase the traffic forwarding capability, which results in a significant increase in the end-to-end throughput. In order to improve the throughput of MWN the following issues must be considered: (i) (ii) (iii) How to estimate the traffic forwarding capability at each node; How to differentiate the contention window size depending on the traffic forwarding capacity; How to increase the end-to-end throughput by regulating the throughput of traffic relayed at each hop in distributed and scalable manner. As a result end-to-end throughput can be increased but CWA mechanism utilizes the entire available network nodes to broadcast the data to the destination. CWAM uses greedy forwarding technique, where the request is given to all the neighbouring nodes to establish the path. Eventually this consumes more power. Since the network is a stand-alone device this operates on batteries. 28
  • 3. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013 Destination node Source node Fig. 1 Nodes participating in total flooding Thus, for reducing the power consumption, the path in which the broadcast occurs must be limited to a quadrant. Instead of utilizing all the nodes in the network, only the nodes in the broadcast region have to involve in transmission. The mathematical computation of the location information in the kernel environment will incur further processing delay in the current node [6]. Hence, the delay needs to be reduced by inserting the location information of the source node or the previous intermediate node in the data packet, and so, periodic beaconing will be eliminated. 3. RELATED WORK Related work falls into two broad categories: Tuning of back-off parameters and restricted flooding. 3.1. Tuning of Back-off Parameters In IEEE 802.11 DCF, the back-off parameters such as CWmin and CWmax are fixed. To analyse the impact of the back-off parameters on network performance, Bianchi [8] derived a two dimensional Markov chain model for the exponential backoff process. Using this model, it was shown that the number of stations and the minimum CW size have significant impacts on the overall performance of IEEE 802.11 DCF. Bianchi and Tinnirello [9] proposed how to estimate the number of active stations using an extended Kalman filter in a WLAN. Tuning of the MAC parameters can effectively improve the network performance when the number of active stations is properly estimated. Cali [10] proposed a distributed algorithm called IEEE 802.11+, which enables each node to estimate the number of contending nodes at any given time. They also derived an analytical model which gives a theoretical maximum bound on the network capacity, and tried to find the optimal CW value to achieve the theoretical throughput limit. Kwon [11] proposed a Fast Collision Recovery (FCR) protocol, which is a contention-based protocol that redistributes the back-off timer among all competing stations with an objective of reducing the idle back-off time. 3.2. Restricted Flooding Distance from the node to the destination is used to determine the nodes participation in the route discovery process. Nodes that are further away from source will not participate. Relative Neighbourhood Graph (RNG) [12], which together with local information of distance to neighbours and distances between neighbours will minimize the total energy consumption. 29
  • 4. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013 AODV protocol uses a reactive type of routing which utilizes maximum power at initial stage of transmission. Location-based Geocasting and Forwarding (LGF) [13], calculates distances to all nodes in the network and will compare the distance information of the source to the destination extracted from the request packet to determine its participation. Angle Routing Protocol (ARP) [14] uses the angle made from the straight line drawn from source to destination as the restricted region whereby all nodes in this region will participate in the route discovery. However, DDB [15] uses the location information of the destination node and also of the intermediate node which are inserted in the request packet. With this additional information, an intermediate node can calculate the estimated additional covered area that it would cover with its transmission which is based on Dynamic Forwarding Delay (DFD). The concept of DFD is to determine when to forward the packet and node with more area covered will be given a smaller delay to broadcast and hence, will broadcast first. All the above protocols require computation of the distance and angle at all intermediate nodes to determine the nodes that are located in the forwarding region. 4. CROSS LAYER FRAMEWORK A cross layer is made between the data link layer and the network layer of the OSI model to improve the performance of IEEE 802.11 DCF. 4.1.CWA Algorithm In the CWA mechanism, the traffic forwarding capability αi is defined as the ratio of the rate of incoming and outgoing traffic at a node : Traffic forwarding capability ratio: αi = iout/iin ) (1) where, iout - outgoing traffic at a node i iin - incoming traffic at a node i If a node can forward all the received packets to its neighbouring node without packet loss, then αi is equal to one. On the other hand, if node receives a large number of packets but cannot forward them at the same rate as it receives, and then αi is less than one. If node has the smallest forwarding capability αi among the nodes on the multihop path, it may be a bottleneck relay node of the path. Contention window adaptation algorithm has the following step which is implemented across the network. Algorithm 1: 1: InPkts: the number of all the incoming packets at particular time ( ) 2: DstPkts: the number of outgoing packets whose destination is itself. 3: iin = InPkts – DstPkts 4: OutPkts: the number of all the outgoing packets for 5: SrcPkts: the number of incoming packets whose source is itself. 30
  • 5. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013 6: iout = OutPkts - SrcPkts 7: if i out > iin then, iout ← iin 8: CWmin ←CWmin + 9: if CWmin > maxth then, CWmin ← maxth . (iout – .iin ) 10: else if CWmin < minth then, CWmin ← minth Fig. 2 Steps in CWA Algorithm Fig. 2 gives the steps involved in the CWA mechanism. Here, ‘inpkts’ denotes the incoming data packets, ‘dstpkts’ denotes packets at the destination, and ‘outpkts denotes the outgoing data packets and ‘srcpkts ’denotes the packets at the source. On the line 7 in Algorithm 1, an upper bound is placed on the rate of outgoing traffic. Even though there are no incoming packets, the packets accumulated in the buffer can be transmitted. For a short time interval, the outgoing rate could be higher than the incoming rate depending on the buffer size, and it may lead to a false decision in updating CWmin in line 8. This is the reason that we limit the rate estimate of outgoing traffic up to that of incoming traffic. Third, if the traffic load is sufficiently low and does not incur any packet loss, CW min has the tendency to be large with the use of the adaptation rule. For simulations and experiment, minth and maxth of CWmin are set to 1 and 32, respectively. We set maxth of CWmin to 32 and set minth of CWmin to 1. 4.2. Q-DIR algorithm Q-DIR is a restricted routing protocol that concentrates on a specified zone using location information provided by a location service as in fig. 3. In Q-DIR operation, the location information of the source and destination nodes is piggy-backed in the route request (RREQ) packet and then broadcasted. Destination node Source node Fig. 3 Less participating nodes in Q-DIR algorithm 31
  • 6. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013 Upon receiving the RREQ, intermediate nodes will compare using a simple mathematical comparison based on the coordinates of source, destination and the current node that directs the packet towards the destination as in Fig.4. This mathematical processing is done in the kernel environment to reduce the routing overhead. Algorithm 2: 1: Divide the network area into four quadrants with source as origin 2: Quadrant of intermediate node compared to source node. 3: Quadrant of destination node compared to source node. 4: If they lie in same quadrant, then forward the data packets. Else drop the packets. Fig. 4 Steps in Q-DIR algorithm The decision to participate is in reactive manner. Once the decision to broadcast has been made, the intermediate node will insert its location by replacing the source node coordinates and append its address and sequence number at the end of the RREQ packet. It will then broadcast the packet. The process will be repeated at each intermediate node until it reaches the destination. The replacement of the source node location information with the intermediate node coordinates will make the packet more directed towards the destination since the comparison now is based on the previous node. Upon receiving the RREQ, destination node will send a route reply message (RREP) back to source via the path taken to reach the destination that was appended in the RREQ as it traverses across the network. There is no need for the route discovery to the source node. 4.3. Cross Layer Design The network has the wide spread of nodes, where there may be many source nodes and destination nodes involved in data transmission. This transmission is done via various intermediate nodes. First step is to divide the broadcast region into four quadrants by keeping source as the origin. Secondly, location of the destination in noted and broadcast region is limited to that particular quadrant and is achieved using Q-DIR algorithm. Only the intermediate nodes in that quadrant will be selected according to the algorithm 2 and remaining nodes will be rejected. Similarly for all the source nodes same procedure is done. Third step is to apply CWA mechanism to each of the nodes involved in broadcasting of data packets. This adaptively varies the CW size depending on the incoming traffic. CWA mechanism is implemented in all the forwarding nodes to avoid collision and packet drop. The general procedure involved in the cross layer design between Q-DIR and CWA is listed in the fig. 5. 32
  • 7. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013 1: Place the nodes in a grid topology 2: Identify the source and destination node 3: With source as origin, divide the network into four quadrant 4: Select the quadrant in which the destination node is present 5: Apply the Algorithm 2 to the selected quadrant 6: After estimating broadcast route, apply Algorithm 1 to each forwarding node. Fig. 5 Cross Layer Design Procedure NETWORK LAYER (Q-DIR) DATA LINK LAYER (CWAM) PHYSICAL LAYER Fig. 6 Cross Layer Framework Q-DIR in network layer is used for routing which reduces the delay while transmission and CWA mechanism in data link layer is used to adaptively vary the CW size and so it achieves a maximum throughput. As shown in Fig.6, a cross layer between CWA mechanism of Data link layer and Q-DIR of Network layer is implemented to enhance performance of IEEE 802.11 DCF. 5. SIMULATION RESULTS Simulation of Q-DIR with CWAM is done in Network Simulator-2 (ns-2). Comparison is done between the total flooding protocol (AODV) and restricted flooding protocol (Q-DIR with CWAM). A network model of 49 nodes that forms a 7 by 7 grid model where the distance from adjacent nodes are 30m. Based on this grid model, the density is 1 node per 661m2 and the data rate is 2 Mbps. Simulation configuration parameters are given in the table I. 33
  • 8. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013 TABLE I SIMULATION CONFIGURATION PARAMETERS Configuration Parameters Value Max. No. Of hops between two nodes 10 Average one hop traversal time 60 ms Route discovery time 5000 ms Route delete time 25000 ms Number of RREQ tries 3 Total traversal time 1200 ms Various performance comparisons are made between the normal operation of the network under normal AODV and the operation using the newly proposed algorithm that is cross layer of Q-DIR with CWA mechanism. Fig.7 Aggregate Throughput comparison Aggregate throughput comparison is done between AODV and QDIR-CWA. In fig. 7, the throughput achieved by QDIR-CWA is higher compared to the AODV. This is because CWA mechanism adaptively adjusts the CW size depending on each node’s incoming traffic. Fig. 8 Delay comparison In the figure 8, delay obtained using QDIR-CWA mechanism is lower than that is obtained from normal AODV. The reason is that QDIR eliminates the periodic beaconing and hence reduces the routing overheads while transmission. So, delay is reduced in QDIR-CWA mechanism. 34
  • 9. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013 Fig. 9 Packet Delivery Ratio In the fig. 9, CWA mechanism achieves a higher delivery ratio because this algorithm aims to avoid collision and packet drop. Hence, the data packets from the source are properly delivered to the destination and achieve a higher packet delivery ratio than AODV. Fig. 10 Energy Consumption comparison In fig. 10, energy consumed by network using AODV protocol is higher than the energy consumed by the network using QDIR-CWA. Since, QDIR-CWA restricts the broadcast region to a particular zone; usage of energy by the remaining area is avoided. Hence, QDIR-CWA consumes less energy which results in less power consumption. Fig. 11 Routing Overhead comparison 35
  • 10. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013 Fig. 11 shows that AODV exhibits more routing overheads because of the reason that it is a reactive type of routing. The request to the nodes in the network is given in prior to transmission. QDIR-CWA has a simple route calculation and the elimination of the periodic beaconing reduces the routing overhead. Thus, from all the above factors it is known that QDIR-CWA mechanism achieves better performance compared to AODV. 6. CONCLUSION The Cross layer between the Q-DIR algorithm and CWA mechanism increases the overall network performance. Q-DIR algorithm uses the location information of the source, destination and the intermediate node to select the broadcast region. Nodes in the particular broadcast region only will broadcast while other nodes will ignore the RREQ packet. CWA mechanism is applied to each of the nodes in the broadcast region. CWA mechanism reduces the packet drop due to collision, which improves the throughput and Q-DIR reduces the mathematical computation complexity by eliminating the periodic beaconing. This achieves reduced delay and reduced overhead. As a result, the overall network end-to-end throughput is achieved using CWAM whereas reduced routing overheads and reduced power consumption is achieved using Q-DIR. Therefore, the cross layer of Q-DIR and CWAM provides an increased network performance. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] Daewon Jung, Jaeseon Hwang, Hyuk Lim, Kyung-Joon Park, and Jennifer C.Hou, “Adaptive Contention Control for Improving End-to-End Throughput Performance of Multihop Wireless Networks”, IEEE Trans. on wireless comm. VOL 9, NO.2, Feb 2010. L.A.Latiff, A.Ali, N.Fisal “Power Reduction Quadrant based Directional Routing protocol (Q-DIR) in mobile Ad-Hoc network”, IEEE International Conf. on Telecomm. and Malaysia International Conf. on Comm., 2007. E.M Royer and C.K.Toh. “A Review of Current Routing Protocol for Ad-Hoc Mobile Wireless Networks” IEEE Personal Comm. pp. 46-55.April 1999. Stojmenovic, I. “Position-based Routing in Ad Hoc Networks” IEEE Comm Magazine. July 2002.40(7). 128-134. Oh, H., Bahn, H. and Chae, K-J. “An EnergyEfficient Sensor Routing Scheme for Home Automation Networks”. IEEE Trans. on Consumer Electronics, Vol.31 (3). August 2005. Chakeres, I. D. and Royer, E.M. “AODV Routing Protocol Implementation Design” Proc.of 24th WWAN 2004. 23-24 March 2004. Tokyo. 2004. 698-703. Bianchi.G, “Performance analysis of the IEEE 802.11 distributed coordination function," IEEE J. Sel. Areas Comm. (JSAC) 2003. G. Bianchi and I. Tinnirello, “Kalman filter estimation of the number of competing terminals in an IEEE 802.11 network," in Proc. IEEE INFOCOM, 2003. Cali.F, Conti.M and Gregori.E, “Dynamic tuning of the IEEE the 802.11 protocol to achieve a theoretical throughput limit," AIEEE/ACM Trans. Netw 2000. Fanf.Y, Kwon.Y and Latchman.H “A novel MAC protocol with fast collision resolution for wireless LANs," in Proc. IEEE INFOCOM 2003. Cartigny, J., Simplot, D. and Stojemenovic, I. “Localized minimum-energy broadcasting in ad hoc networks” INFOCOM 2003. pp. 2210 – 2217. A.Ali, L.A.Latiff, Chia-Ching Ooi, and N.Fisal, “Location-based Geocasting and Forwarding (LGF) Strategy in MANET” ICT 2005, Cape Town, South Africa, May 2005. Kumar Banka, R. and Xue, G. “Angle routing protocol: location aided routing for mobile ad-hoc networks using dynamic angle selection” MILCOM 2002 Proc. 7-10 Oct 2002. 1:501-506. Heissenbuttel, M., Braun, T., Walchli, M. and Bernoulli, T. “Broadcasting in Wireless Multihop Network with Dynamic Forwarding Delay Concept” Technical Report IAM-04-010. Institute of Computer Science and Applied Maths. University of Berne, 2004. 36
  • 11. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.4, August 2013 Authors Prof.V.Karthikeyan has received his Bachelor’s Degree in Electronics and Communication Engineering from PGP college of Engineering and Technology in 2003, Namakkal, India, He received Masters Degree in Applied Electronics from KSR college of Technology, Erode in 2006 He is currently working as Assistant Professor in SVS College of Engineering and Technology, Coimbatore. She has about 8 years of Teaching Experience Prof.V.J.Vijayalakshmi has completed her Bachelor’s Degree in Electrical & Electronics Engineering from Sri Ramakrishna Engineering College, Coimbatore, India. She finished her Masters Degree in Power Systems Engineering from Anna University of Technology, Coimbatore, She is currently working as Assistant Professor in Sri Krishna College of Engineering and Technology, Coimbatore she has about 5 years of teaching Experience. Mr P.Jeyakumar Currently pursuing his Bachelor’s Degree in Electronics Engineering in Karpagam University, Coimbatore, Tamil Nadu, India. 37