Elam Parithi
Elam Parithi
Elam Parithi
ISSN : 2347 - 9817 (Print) Vol. 2, Issue 3 (July - Sept. 2014) Computer Science & Technology (IJARCST 2014)
Keywords
MANET, Route, Reactive, CNRR, LSEA, Broadcast.
which means that broadcasting is inherent in their nature, and they as the most stable link; the second class of metrics concerns the
are mobile which means that they are continuously moving and selection of the youngest links, because they are considered more
require frequent route updates. The following sections describe resilient to breakage; the third criterion is based on the selection
the above-mentioned properties. of the link with the highest average residual lifetime value; the
fourth one makes selection of the link with the highest persistence
A. Mobility Induced error on Geography Routing in probability; finally, the fifth metric focuses on the connection
MANET failure probability. The latter approach has been shown to be
In Geographic routing, the packet forwarding technique was robust because it is based on the monitoring of the links lifetime
solely based on the location information of neighbors. Geographic of the mobile nodes in the wireless network, in the past and in the
routing in GPRS consists of two forwarding modes. i) Greedy present, to predict its behavior, in the future without considering
packet forwarding, ii) Perimeter forwarding. Initially the packet directly parameters depending by underlying mobility model
was forwarded by greed forwarding in which all the nodes were such as node speed or direction. End-to-end delay of a source
identified the location based on the neighbor nodes. The packet destination session is another considered performance metric,
forwarding mode has been changed in to perimeter forwarding particularly for real-time applications.
mode when the node was found out the maximum location Final
Stage. III. Existing Methodology & Proposed Scheme
In existing methodology, a fully distributed cooperative scheme
B. Routing Protocols for MANET using Mobility for NPV, which enables a source node, to discover and verify
Prediction the position of its communication neighbors. For clarity, here
In the MANET the nodes can construct a path in the network using we summarize the principles of route discovery and position
the routing capacity of the intermediate nodes. The communication verification process. A source node, S can initiate the protocol at
was established in wireless multi-hop fashion. In other words the any time instant, by triggering the 4-step message exchange process
communication is established in a wireless multi-hop fashion. [POLL, REPLY, REVEAL and REPORT], after completing the
The node can also have other characteristics such as small size message exchange process, source node S has derives distance range
and battery powered, making the node not only mobile but also of neighbor nodes to discover the shortest path to reach destination,
portable. As a result MANET can operate in places and situations after route discovery S runs several position verification tests in
where traditional networks cannot work properly, such us in order to classify each candidate neighbor as either VERIFIED,
disaster recovery areas, rural zones, and third world countries. FAULTY, UNVERFIABLE. Clearly , the verification tests aim at
avoiding false negatives(i.e..adversaries announcing fake positions
C. Energy Efficient Routing Protocols for MANET that are deemed verified) and false positives (i.e., correct nodes
Energy efficient Routing will be the most important Design in whose positions are deemed faulty),as well as at minimizing the
MANET. Since mobile nodes are powered by batteries with number of unverifiable nodes. We remark that our NPV scheme
limited capacity. Power failures of a mobile node not only affect does not target the creation of a consistent map of neighborhood
the node alone, it will affect the entire network life time. The relations throughout an ephemeral network: rather, it allows the
routing protocols were proposed in MANETs are table-driven verifier to independently classify its neighbors.
and on-demand driven routing. Routing in MANET includes new
generation of on demand routing schemes (AODV, DSR, TORA, A. Drawbacks of the Existing System
ABR etc). Proactive routing schemes (OSPF, RIP) compute global The network may contain few self nodes. These nodes will
routes in the background. The Benefit of proactive routing includes make of CPU power during the transmission from source node
low latency access, alternative paths for effective call acceptance to Destination.
control. These protocols concentrate on the energy properties The self node may consume the energy. This is not suitable for
scheme of applications. energy optimization.
Every node will know about the neighborhood node only, Route
D. Greedy Perimeter Stateless Routing for MANET looping can also occur while transmitting the longer packet. This
GPRS routing algorithm uses geography to achieve small per is not suitable for energy optimization.
node routing state, small routing protocol message capacity,
robust packet delivery etc. GPRS will use immediate neighbor B. Proposed Scheme
information in forwarding decisions. Routing protocol will relay Our proposed broadcast schemes use a novel neighborhood-based
on end to end state delivery path between a forwarding router and approach for dynamically selecting the group of nodes that forward
packets destination. the broadcast message. The source node selects a subset of its
1-hop neighbors for forwarding the broadcast packet, includes
E. Minimum Energy Mobile Wireless Networks their addresses in the packet header, and broadcasts the packet.
Position based algorithm is used to maintain the minimum energy A node that receives a broadcast packet is a forwarding node if
between the user. Each user will be denoted by nodes over two its address is included in the packet header. Otherwise, it drops
dimensional planes. Each mobile node has a portable transmission the packet. Forwarding nodes repeat the same process carried by
set, reception, processing capabilities. This distributed protocol the source.
will find the minimum power topology in the Ad hoc networks The two broadcast schemes we propose differ in the method used
for selecting forwarding nodes. In the first method, a number of
F. Stable Path Selection 1-hop neighbors that have the largest number of neighbors are
Five Different Metrics have been proposed for stable path selection. selected as forwarding nodes. In the second method, a subset of
The first technique is based on the local choice of the oldest link 1-hop neighbors that can reach all 2-hop neighbors forms the
forwarding group. The two schemes are respectively referred to if destination is in the neighborhood(nbr) vector
as the Broadcast-based CNRR Scheme, and the Broadcast-based { unicast RREQ to the neighbor;
Covering Neighbors Scheme. Below, they are described within exit(); }
the context of on-demand route discovery. In this case, the packet Choose a value in K such that (3 K 7)
being broadcast is the Route REQuest (RREQ) packet, and the if ((n/k) <= 1)
goal is finding a path to a destination node. { if (n/2 <= 1) {
When a RREQ packet reaches its destination node, the destination Choose the only neighbor to rebroadcast ;
sends a reply to the source of the request, and it does not forward Unblock the neighbor if it was previously blocked by other node
the packet. Information on neighbors that is used in the proposed in the network }}
schemes is obtained via HELLO messages that are exchanged Choose n/K farthest neighbors from nbr vector;
periodically, as in LSEA & AODV. Block the other neighbors from rebroadcasting;
PathDiscovery(); } }
Route Reply
If current node is the sender then
Create a chase packet
Broadcast the chase packet
Start transmitting the data
Else
Route the route reply message to the sender.
End if
1 if(node = = source)
then broadcast(RREQ) with routelist;
else if(received RREP)
then sort(routes);
using [link_Quality (strong),
Maximum(min_re_energy) and
minimum(delay)];
else rebroadcast(RREP);
endif //go to 2
2 if (node == intermediate node)
Fig. 3.1: Overall Scheme of the proposed system calculate remaining energy
calculate delay;
The PROPOSED FRAMEWORK algorithm (See Figure 1) update in routelist;
requires each node i to advertise its location (xi, yi, zi), rate of broadcast(RREQ) with Route_list;
energy consumption (MDR), and link stability index for each link endif //go to 3
outgoing by node i. We will insert the information mentioned 3 if (node == destination)
above in PROPOSED FRAMEWORK HELLO packet. Each node then stop broadcast(RREQ);
broadcasts HELLO packets to all its neighbors that are in its update as advertised_hop_count = 0;
communication range; each node in PROPOSED FRAMEWORK Calculate overall delay, link quality;
maintains the table of its direct neighbors. When a node receives Update route_list,
the HELLO packet, it updates the information of the neighbor, reply (RREP) with route_list;
if neighbor ID is already present in table or adds neighbor endif
information, if it is a new neighbor.
The data forwarding strategy of PROPOSED FRAMEWORK is The number of rebroadcasts is determined by the reachability
based on a greedy technique such as GPSR. However, differently parameter K which ranges between 3 and 7. The number of route
by GPSR, the next hop selection tries to minimize the joint energy requests to be rebroadcasted by each node to determine an optimal
stability metric. PROPOSED FRAMEWORK packet forwarding path depends on the chosen reachability parameter and the local
presents high scalability property because only the neighborhood density of the network. Selecting half of the neighbors from the
and destination knowledge are necessary for the greedy technique. neighborhood vector in a dense network establishes a shortest path
The flexibility of energy-stability-based greedy forwarding is between the source and the destination nodes reducing the control
offered through the capability to weight the stability and the energy overhead to half from the one that is actually required.
consumption on the basis of the interest of the application layer.
This means that if an application is more sensitive to the path IV. Performance Evaluation Of Proposed Scheme
stability and, consequently, the link stability, it is possible to give The proposed system is classified with energy metric evaluation
more importance to the si;j index. and link stability metric which considers mainly the power
dissipation factor that frequently alters with respect to the mobility
Route Request of the nodes in the simulation area. The system mainly uses greedy
Protocol PathDiscovery() approach where the data packets are forwarded based on the
{ while(1) heuristic nature of the energy factors considers. The architecture
{ for each chosen neighbor is quite flexible for usage of minimum energy consumption even
with highest mobility. Delay. In each simulation, we compare the performance of our
To compare the different routing protocols for MANETS there LSEA protocol with AODV protocol, which is well-known and
are a group of important parameters to take into account. These commonly used ad hoc on demand routing protocol.
parameters are common in the quantitative analysis but it is
necessary to know and to understand them to do a theoretical A. Total Overhead
study. In the next points some of the most representatives are The proposed mechanisms increase path stability because the
explained: returned path consists of those nodes with better link lifetimes
and high residual energy levels.
Throughput
Packets delivered per second (TCP traffic only). Examining
throughput, especially when it is considered relative to different
network scenarios, helps to determine how well the routing
protocols permit applications to optimize the use of the available
bandwidth.
Delay
It is End-to-end packet delay, from source to destination. The end-
to-end delay measures the delay a packet suffers after leaving the
sender and then arriving at the receiver application.
This includes delays due to route discovery, queuing at Internet
protocol (IP) and medium access control (MAC) layers, and C. Network Lifetime
propagation in the channel. The network lifetime increases with increases in the energy
threshold level in the case of the LSEA protocol. When the energy
Hop Count threshold is increased, any node can be prevented from forwarding
It represents the number of hops that a packet has taken before it the RREQ if its energy is below this level.
has been correctly delivered.
References
[1] Perkins, C.E. and Bhagwat, P. Highly Dynamic Destination-
Sequenced distance-vector routing (DSDV) for mobile
computers, ACMSIGCOMM Computer Communication
Review, vol. 24, no. 4, pp. 234-244, 1994.
[2] Qayyum, A., Jacquet, P. and Muhlethaler, P. Optimized
Link State Routing Protocol (OLSR), 2003.
[3] Ogier, R., Templin, F. and Lewis, M. (2004) Topology
dissemination based on reversepath forwarding (TBRPF),
2004.
[4] Das, S., Perkins, C. and Royer, E. Ad hoc on demand
distance vector (AODV) routing, Mobile Ad-hoc Network
(MANET) Working Group, IETF, 2002 .
[5] Johnson, D.B., Maltz, D.A. and Broch, J. DSR: The
dynamic source routing protocol for multi-hop wireless ad
hoc networks, Ad hoc networking, vol. 5, pp. 139-172,