Improving the Battery Performance of Ad-Hoc Routing Protocols

Size: px
Start display at page:

Download "Improving the Battery Performance of Ad-Hoc Routing Protocols"

Transcription

1 Improving the Battery Performance of Ad-Hoc Routing Protocols Q. Qi and C. Chakrabarti Department of Electrical Engineering Arizona State University Tempe, AZ {qi, Abstract In ad-hoc networks formed by battery powered nodes, the network lifetime can be significantly enhanced by incorporateing the battery properties in the routing protocol. In this paper, we propose such a routing mechanism BCRM, that enhances the network lifetime by letting some of the nodes recover part of their lost charge. This is done by putting the selected set of nodes to sleep. We integrate BCRM into wellknown on-demand protocols such as DSR, MBCR and MMBCR, and evaluate their performance. Simulation results show that BCRM based protocols can improve network lifetime significantly with slight degradation in throughput. I. INTRODUCTION The mobile nodes in an ad-hoc network, shut down when the battery is fully discharged, causing the network performance to be severely affected. Maximizing the on-time of the battery is one of the most important metrics in the design of these systems. Ad-hoc networks today use minimization of energy consumption as the primary metric for routing. However, the assumption that minimizing energy leads to maximizing node lifetime is not necessarily true since the node lifetime depends on the traffic as well as its residual battery capacity. In the recent past, there have been a few ad-hoc network routing protocols designed with network lifetime in mind. In [1], several protocols (MBCR, MMBCR and CMMBCR) have been designed that use battery capacity metric to evenly distribute power consumption in the network while minimizing overall transmission power. A power-aware maintenance protocol based on CMMBCR is presented in [2]. To conserve energy, [3] and [4] show different ways to put nodes into sleep without disrupting existing network. The protocols in [5], [6], [7], use route selection criteria that are based on the energy drain rate and predicted route lifetime. The lifetimeaware multicast (LMT) protocol in [8] maximizes the network lifetime by minimize the variance of the remaining energy of all nodes in a network. In this paper, we propose a new battery aware routing mechanism (BCRM) that exploits the capability of a battery powered node to recover part of its lost charge. BCRM puts selected nodes of the network to sleep for time t seconds every time its charge drops by c % and it would like to recover r% of the recoverable charge. We have implemented BCRM in DSR and distributive versions of MBCR and MMBCR. Through simulation, we demonstrate that m route j m,n route j p,q p Fig. 1. Upper Network a Lower Network Example of an Ad-hoc Network BCRM can improve existing protocols by prolonging the nodes life time significantly. BCRM causes only a mild degradation in the network throughput. The network lifetime and throughput of BCRM based systems can be adjusted by choosing of c, t and r judiciously. The rest of the paper is organized as follows. Section II briefly describes the analytical battery model and communication node energy model. Section III elaborates on the proposed protocols, namely, BCRM, DSRWR, DMBCRWR and DMMBCRWR. Finally, section IV presents the simulation results and performance comparisons. A. Motivation II. PRELIMINARIES In wireless communications, the path loss between two nodes is inversely proportional to the n th power of their distance (usually n is 2 or 4). Energy aware routing protocols, such as the Minimum Total Transmission Power Routing (MTPR) [1] make use of this metric. However the MTPR routing protocol does not provide the best battery performance for the network. Consider the small ad-hoc network shown in Figure 1. The routes with MTPR are j m,n and j p,q for source-destination pair (m, n) and (p, q). Note that both routes share node a. Assuming no link breakage and connections between (m, n) and (p, q) persisting for large payloads, node a will use more energy than any other node due to heavier traffic. Consequently, node a will shut down earlier due to charge depletion causing the network to be partitioned. However if node a is allowed to q n

2 rest for some time during which it recovers part of its lost charge, the network lifetime can be enhanced. In fact, proper insertion of rest time for selected nodes in an ad-hoc network can delay network partitioning without significantly degrading overall network performance, as will be demonstrated in the rest of the paper. B. Battery Model The high-level Li-ion battery model in [9] provides an accurate relationship between the current load, discharge time and the charge consumed due to the discharge. If the load profile over time T can be broken into N piece-wise constant currents I k, k N, from time t k to t k+1 of duration k = t k+1 t k, then the charge consumed C is given by Tdis (s) (b) Fig. 2. Battery Discharge Properties. (a) Discharge time T dis and (b) Normalized recoverable charge (in percentage) RC as a function of c. (a) RC (%) N N C = I k k +2 I k ( k=1 k=1 m=1 e β2 m 2 (T t k k ) e β2 m 2 (T t k ) β 2 m 2 ) (1) where β is a measure of the battery non-linearity. A battery with large β is more linear, and approaches an ideal power supply. The Li-ion battery used in Compaq Itsy computer is characterized by β 2 =.637 min 1, and is used in the simulations in this paper. An analysis of equation (1) shows that the first term corresponds to the amount of charge that is irreversibly spent, and the second term corresponds to the amount of charge that can potentially be recovered if the battery is allowed to rest. We refer to the second term as the recoverable charge, RC. The longer the sleep period, the larger is the amount of recovered charge. If the sleep period is infinite, then all of the recoverable charge can actually be recovered. We next present the effect of recovery on the battery performance. The following definitions are in order. 1) α: the initial state of charge (SOC) of a node s battery. 2) T dis : the time between two sleep periods. 3) RC : RC normalized by α. 4) c : the charge consumption C during T dis normalized by α, referred to as normalized charge consumption. 5) t: sleep period or charge recovery time. 6) r: the percentage of charge recovered with respect to RC in time t, referred to as recovery ratio. Figure 2 describes the discharge characteristics of a battery with an initial α = ma-min for a load of 2 ma. Figure 2 illustrates the relationship between c and T dis, and c and RC, where both c and RC are expressed in %. In curve (a), we see that as c increases linearly, the discharge time T dis increases exponentially. In curve (b), we see that as c increases linearly, the recoverable charge RC approaches a fixed upper limit, which is 36.2% of α. Both the non-linear trends in curves (a) and (b) are due to the continuous recovery effect experienced by the battery during active discharge. For large T dis, the rate of change of RC decreases as time progresses. Therefore, the difference of absolute recoverable charge RC is large for c. t (sec) Fig r (%) Recovery Time for Different Recovery Conditions Figure 3 demonstrates the relationship between t, c and r for the same setup (α = ma-min, and I = 2 ma). From this figure, we see that the battery recovery has the following properties. Property 1: For a fixed c, the recovery time t increases exponentially with r. The relationship between r and t for different values of c can be characterized by equations (obtained by curve fitting), such as the ones listed below. t =.9 e (12.1 r) , for c = % t = 12.3 e (5. r) +.74, for c = % Property 2: For a fixed recovery ratio r, the recovery time t varies mildly for different normalized charge consumption c. The relationship between c and t for different r can be characterized by equations (obtained by curve fitting). t = e ( 3.14 c ) , for r = % t = e ( 4.89 c ) + 929, for r = 8% C. Power Consumption Model The low power protocols described in earlier section treat each individual node as an ideal device which only consumes energy when transmitting and receiving packets. In reality,

3 Power Idle with Comm Idle Device Fig. 4. Active Power Consumption Model a wireless node has three sources of energy consumption machine-specific, device-specific and communication-specific [], as shown in Figure 4. Machine-specific energy consumption involves components besides the network interface device, such as CPU, hard disk, etc. The wireless network interface consumes device-specific energy when a node s wireless function is activated. The communication-specific energy is consumed by a node during active communication. According to measured values of a 2 Mbps Lucent Wavelan card [11], a node consumes 14 ma current in sleep mode, 178 ma in idle mode, 24 ma in receiving mode and 28 ma in transmit mode. It takes ms transition time from sleep to active mode and vice versa, and the energy consumed during the transition time is negligible. For low traffic environment, communication-specific energy is certainly not dominant. In this paper, we focus on charge drain due to device-specific operations. III. BATTERY AWARE ROUTING ALGORITHMS In this section, we first review an on-demand protocol DSR [12] in subsection III-A. We then introduce distributive versions of MBCR (DMBCR) and MMBCR (DMMBCR) built using DSR s routing discovery and maintenance mechanisms in subsection III-B and III-C. Finally, we present the battery aware protocol (BCRM) in subsection III-D and incorporate it into DSR, DMBCR and DMMBCR. A. DSR Protocol This is an on-demand protocol, where a source node uses scouting packets to discover routes to a destination node. The source node has the complete hop-by-hop information for established routes. This is stored in a routing cache table. The header of a data packet also contains the hop-by-hop information from a source node to a destination node. 1) Routing Discovery: During the route discovery process, a source node s floods the network with route request (RREQ) packets. A unique sequence number is generated for each request. Every time a RREQ gets forwarded, it records the forwarding node address and builds up the path traversed across the network. Each RREQ can only be forwarded a maximum number of times before being discarded. A route reply (RREP) is generated and routed back to source s, when either the RREQ packet reaches destination d or any intermediate node n that has a valid route to d. In a bidirectional link environment, a RREP can route itself back to s by traversing the links in RREQ backward. In case of unidirectional environment, a RREP piggybacks on the reverse RREQ packet initiated by the replying node to source node s. 2) Route Maintenance: When any link on an active route is broken, the source node s is notified through a route error (RERR) packet by the broken link s upstream node. As the RERR traverses towards s, forwarding nodes remove the broken route from their routing cache table. In case node s requires to send a packet to d again, node s has to initiate route discovery. To avoid excessive control overhead, DSR aggressively uses route caching through utilizing salvaging, gratuitous route repair, and promiscuous listening [12]. B. DMBCR Protocol The Minimum Battery Cost Routing (MBCR) is designed to maximize the total remaining battery capacity from source node s to destination node d [1]. If the remaining battery capacity of node i is denoted as c i, then MBCR uses the battery cost function, shown in equation (2), to measure the willingness of a node to forward or transmit packets. f i (c i ) = 1 c i (2) Let R j be the cost of route j between a source destination pair (s, d), with D j nodes and let R i be the route with the largest total remaining battery capacity among the candidate routes A. The R j and R i are calculated by R j = D j 1 i= f i (c i ) (3) R i = max{r j j A} (4) In order to implement MBCR in an ad-hoc environment, additional routing discovery and maintenance mechanisms are required. 1) Route Discovery: The proposed distributive MBCR protocol (DMBCR) implements the DSR routing mechanism in MBCR. Basically, a source node s floods the network with RREQ packets during route discovery. The intermediate nodes along forwarding links of a RREQ packet calculate and update routing cost R j using equation (3). Unlike DSR, in DMBCR, when destination d receives a RREQ packet, it does not immediately send a RREP packet back to source s. Instead, node d collects several RREP packets within a short period τ and uses equation (4) to choose the replying route i. When an intermediate node n receives a RREQ packet, it extracts the request sequence number, the destination address, routing cost R j, and the hop-by-hop forwarding links from the packet header, and saves them in a request cache. Node n updates the RREQ packet using equation (3). Node n then starts a timer τ j for routing request j. For any subsequent RREQ packets, node n performs the following operations: If both the request sequence number and the destination address match, node n checks for routing loop in the packet s forwarding links. In case node n already appears in the forward links, the request packet is discarded. Otherwise, node n checks for routing cost.

4 If the routing cost, R j, of the subsequent RREQ packet is larger than the cached R j, node n updates and forwards the new RREQ. Once timer τ j expires, node n stops forwarding associated RREQ packets and purges corresponding routing request from its cache. The τ j variable determines the number of entries in set A that will be entertained to determine route j. Thus large τ j usually results in better route choice but longer route request period and longer delay between route request and route reply. The range of a route request period is well defined in [12] and τ j is set to be % of a source node s route request period in our simulation. 2) Route Maintenance: DMBCR requires route maintenance either when existing routes are broken due to link failures, or when battery charge information of existing routes becomes stale. In case of link failure, the broken link s immediate upstream node n simply sends a RERR packet back to the corresponding source nodes. Once node s receives the RERR packet, it initiates a new RREQ to destination d, and the old route is purged from its routing table. Nodes on stale routes may experience excessive traffic, which leads to earlier battery depletion, and network partitioning. So periodical route request is used by source nodes to refresh battery information and discover better routes. Too many requests create excessive flooding and reduces overall battery capacity of the network. Conversely, too few requests result in stale routes not promptly purged. In our simulation, the route refresh interval is set to 6 seconds based on results in [5]. Note that periodic route rediscovery only applies to active routes; inactive routes are simply purged using DSR s maintenance mechanism. C. DMMBCR Protocol The MBCR protocol in [1] makes decisions based on the total battery capacity of a route. However, a route having maximum total remain battery capacity may include a node with little remaining battery capacity. The Min-Max Battery Cost Routing (MMBCR) accounts for such cases by defining the cost of route j (R j ) to be a function of the lowest remaining battery capacity of all nodes in route j. R j = max i j f i(c i ) (5) R i, the route between source destination pair (s, d), is then obtained using equation (4). Note that R i now represents the route with largest remaining battery capacity among all minimum battery capacity routes in set A. Next we describe the distributive version of MMBCR or DMMBCR. 1) Route Discovery: The route discovery process for DMMBCR is very similar to DMBCR. A source node s floods the network with RREQ packets when it has no known cache route for an destination d. Initially, source node s sets the route cost R j to zero. When an intermediate node n receives a RREQ packet, it compares its own f n (c n ) with the R j value in the RREQ header. Node n then updates R j using equation (5). Once destination node d receives the first RREQ packet originating from source node s, node d starts a timer with expiration period τ j. Destination d chooses the corresponding route after timer expires using equation (4), and sends a RREP packet traversing back to source node s. For duplicated RREQ packets, the intermediate node n only forwards the ones that satisfy the inequality condition. R j < f n (c n ) (6) In DMMBCR, an intermediate node n also uses the same method as in DMBCR to prevent routing loops. Node n forwards and updates qualified duplicating RREQ packets for a period of τ j, starting from receiving the first RREQ packet. The size of set A is constrained by time τ j, which is set to % of a source node s route request period as in DMBCR. 2) Route Maintenance: The routing maintenance mechanism of DMMBCR is the same as in DMBCR. DMMBCR has less nodes involved in a route discovery process than DMMBCR due to the inequality condition (6). Therefore, DMMBCR has smaller control overhead than DMBCR in both route discovery and route maintenance. D. Battery Charge Recovery Mechanism Battery Charge Recovery Mechanism (BCRM) helps nodes recover part of the lost charge by going into sleep mode. BCRM can be incorporated into any on-demand protocol. To implement BCRM, a node has to keep track of its charge consumption. When the charge in a node drops by c, it goes into sleep mode for a period t seconds in order to recovery r% of RC. 1) Recovery Time and Recoverable Charge Trade-off: The recovery ratio r and the normalized charge consumption c together decide a node s recovery period t (see Figure 3). The amount of absolute charge recovered (Q rc ) after a recovery period can be easily calculated from either r and RC or α and RC for a given c. If r and c are chosen to be very small, the recovery time t will be small. In such cases, nodes will go in and come out of sleep mode frequently, resulting in unstable routes and reducing over all network stability. If r is small and c is large, Q rc of a node will be disproportionately small compared to the amount of charge consumed (C) during T dis. In addition, the route repair overhead will cause additional charge consumption in the active nodes. Consequently, critical nodes are likely to experience few recovery opportunities before running out of charge. If r is large and c is small, even though a node recovers a higher percentage of RC, Q rc will still remain small due to small C. Meanwhile, large r means longer recovery time t. The active nodes might go into the sleep state before sleeping nodes wake up. This results in less active nodes in the network, which significantly hampers network connectivity. In case both r and c are large, C and Q rc will both be large. As curve (b) in Figure 2 suggests, the rate of increase of RC is significantly less for high C (than for low C). This means there is little difference in the value of Q rc for r above

5 6%. Critical nodes can maybe recover only once before they run out of charge. 2) BCRM Route Repair: When a node goes into sleep, it disrupts the active routes of which it is a part. A route repair mechanism is thus necessary to minimize the adverse effect. The procedure is listed below. Before a node goes into sleep, it informs all immediate neighbors about its recovery period t using special one hop sleep alarm (SA) packet. Once a neighboring node m receives a SA packet, m repairs any route with link j m,n in its active route cache. Node m repairs routes by performing salvaging operation. It also informs affected source nodes about the changes using sleep route repair (SRR) packets. Once a source node receives a SRR packet, it chooses to use salvaged route or re-initiate routing request. 3) Integrating BCRM into Existing Protocols: We have integrated BCRM into DSR, DMBCR and DMMBCR. The modified protocols are referred to as DSRWR, DMBCRWR and DMMBCRWR. The changes to original protocols are described below. Integrating BCRM into DSR is straight forward. We choose local repair option when a source node receives SRR packet, because DSR already performs network wide flooding during routing request. Local repair reduces control overhead and results in less charge consumption for the entire network. Integrating BCRM into DMBCR and DMMBCR is slightly more involved. Instead of periodically initiating route requests to avoid stale routes, source nodes use SRR packet generated by BCRM to aperiodically update battery capacity information in both DMBCR and DMMBCR. The frequency of active routes updates is controlled by c and the SOC of the weakest node. IV. SIMULATION RESULTS All routing protocols are analyzed using GloMoSim 2. simulator [13]. The simulation network consists of 64 nodes confined in a 8 8m 2 area. Mobility is not considered. The transmission range of each node is 2 meters, and the transmission power for each node is fixed. We assume that a node consumes ma in transmit mode, 2 ma in receiving/idle mode and ma in sleep mode. The battery parameters of each node are α = ma-min, and β 2 =.637 min 1. The channel capacity is 2 Mb/s is the MAC layer protocol and an abstract radio model is used to represent the physical layer. Nodes are randomly placed in each trial. There are 8 random connections established at any given time. Each connection uses constant bit rate (CBR) traffic, at 4 packets/second with a packet size of 24 bytes. The average life time of a CBR connection is 6 seconds. For every setup configuration, 2 trials are run, and all results are averaged values. The total simulation time is 6 seconds. We use the network lifetime and throughput to evaluate the protocols. The network lifetime is usually defined by the time taken for the first node in the network to die, or the time taken for all nodes in the network to die, or the time taken for K Throughput (bits/s) Network Lifetime (sec) x (a) Network Lifetime 2 2 r (%) (b) Network Throughput 7 6 r (%) Fig. 5. DMBCRWR performance results (a) Network lifetime (b) Network throughput for different values of normalized charge consumption c and recovery ratio r nodes to die. We adopt the time taken for 2 nodes to die as the network lifetime. The throughput is calculated by taking the average number of packets received by each node. We have set up the simulation environment so that majority of nodes will deplete at the end of the simulation time (6 seconds). In order to understand the effectiveness of BCRM, we first investigate the performance of DMBCRWR under parameter constraints r, c and t in subsection IV-A. We then to compare protocols with and without BCRM in subsection IV-B. A. Performance of BCRM 1) Impact on network lifetime: We see that the network lifetime increases as r increases for fixed c. For instance, when c = % and r = %, the network lifetime is 3376 seconds, while when c = % and r = %, the network lifetime is 5878 seconds. This trend is in accordance with Property 1 (see section II- B). Since larger r means longer recovery time, more nodes are in the sleep state and the number of active nodes participating in the network decreases. This ensures that all nodes get plenty of rest and last longer, thereby extending the network lifetime. The results are illustrated in Figure 5(a). We only show the results for r < 6%, since for r > 6%, there are less than 2 dead nodes at the end of the simulation. 2) Impact on network throughput: Next we study the effect of c and r on the network throughput. For small c and r, the throughput is small due to frequent route repair overhead. On the other hand, for large c and small r, too little time is spent in the sleep mode, and very little charge is recovered. For small c and large r, too many nodes stay in sleep mode for exceeding amount of time and the amount of absolute charge recovered is small. All aforementioned combination 8 9

6 of c and r result in reduced network connectivity, which decreases throughput. Figure 5(b) shows that for fixed c, as r increases from % to 9%, the network life time first increases and then decreases. For example, for c = %, the throughput is bits/s for r = %, peaks at bits/s for r = %, and drops to bits/s for r = 9%. The reason for this trend is that for small r, Q rc is small, compared to the charge consumed for the route repair. This reduces average node charge capacity and degrades the network lifetime performance. As r increases, the sleep period t increases and Q rc becomes more than the amount of charge consumed in route repair. Therefore, the network lifetime increases. But for large r, the sleep period t becomes very long and the number of nodes in the sleep mode increases. A consequence of this is that the remaining active nodes are busier, consume c % of their total charge faster and also enter the sleep mode. This reduces total number of active nodes in the network and thus the network connectivity. B. Cross Protocol Comparison We compare the performance of protocols with and without BCRM. For the protocols with BCRM, the normalized charge consumption c is set to % and the charge recovery ratio r is set to %. The results are shown in Figure 6. It is apparent that protocols integrated with BCRM perform better than the original ones by providing charge recovery for nodes with higher traffic. For instance, in DSR the 2th node dies 1574 seconds earlier than DSRWR; the 2th node in DMBCR dies 1225 seconds earlier than in DMBCRWR; the 2th node in DMMBCR dies 1162 seconds earlier than in DMMBCRWR. Thus for protocols that already have good battery-efficient routing mechanisms, such as DMBCR and DMMBCR, the improvement through incorporating BCRM is smaller. Protocols with BCRM has slightly less average throughput than protocols without BCRM. Average throughput for DSWR is 5.26% less than DSR; average throughput for DMBCRWR is 5.15% less than DMBCR; and average throughput for DMMBCRWR is 3.74% less than DMMBCR. The reason is that BCRM incurs extra routing repair overhead and reduces the average number of active nodes in the early part of the simulation. However, protocols with BCRM delay the network partition and have better throughput in the later part of the simulation. Thus on average, the difference in the throughput with and without BCRM is small. V. CONCLUSION In this paper, we have presented a battery aware routing mechanism(bcrm) for ad-hoc networks. BCRM is based on putting selected nodes of the network to sleep so that they can recover part of the spent charge. We have studied the effect of normalized charge consumption, sleep time, recovery ratio and throughput on the network lifetime. We have incorporated BCRM into several on-demand routing protocols such as DSR, MBCR and MMBCR. Simulation results show that BCRM Time (sec) Number of Dead Nodes DMMBCRWR DMBCRWR DSRWR DMMBCR DMBCR DSR Fig. 6. Cross Protocol Network Lifetime Comparison for c = % and r = % based protocols can improve network lifetime significantly at the expense of slight degradation in throughput. Acknowledgement: This work was supported in part by an NSF-ITR EEC REFERENCES [1] C.-K. Toh, Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks, IEEE Communications Magazine, vol. 39, no. 6, pp , June 21. [2] D.-K. Kim, J. Park, C.-K. Toh, and Y.-H. Choi, Power-aware route maintenance protocol for mobile ad hoc networks, in Proc. IEEE th International Conference on Telecommunications (ICT 3), vol. 1, 23 Feb.-1 March 23, pp [3] C. Srisathapornphat and C.-C. Shen, Coordinated power conservation for ad hoc networks, in Proc. IEEE International Conference on Communications (ICC 2), vol. 5, April-2 May, pp [4], Ant-based energy conservation for ad hoc networks, in Proc. The 12th International Conference on Computer Communications and Networks (ICCCN 3), Oct. 23, pp [5] D.-K. Kim, J. Garcia-Luna-Aceves, K. Obraczka, J.-C. Cano, and P. Manzoni, Routing mechanisms for mobile ad hoc networks based on the energy drain rate, IEEE Transactions on Mobile Computing, vol. 2, no. 2, pp , April 23. [6] M. Maleki, K. Dantu, and M. Pedram, Lifetime prediction routing in mobile ad hoc networks, in Proc. IEEE Wireless Communications and Networking (WCNC 3), vol. 2, March 23, pp [7] S.-M. Senouci and G. Pujolle, Energy efficient routing in wireless ad hoc networks, in Proc. IEEE International Conference on Communications (ICC 4), vol. 7, June 24, pp [8] M. Maleki and M. Pedram, Lifetime-aware multicast routing in wireless ad hoc networks, in Proc. IEEE Wireless Communications and Networking Conference (WCNC 4), vol. 3, March 24, pp [9] D. Rakhmatov, S. Vrudhula, and D. Wallach, A model for battery lifetime analysis for organizing applications on a pocket computer, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 11, no. 6, pp. 19, Dec. 23. [] R. Kravets, K. Schwan, and K. Calvert, Power-aware communication for mobile computers, in Mobile Multimedia Communications, (MoMuC 99), Nov. 1999, pp [11] M. Feeney, L.M.; Nilsson, Investigating the energy consumption of a wireless network interface in an ad hoc networking environment, in Proc. IEEE INFOCOM 21 (Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies), vol. 3, April 21, pp [12] D. Johnson, D. Maltz, and Y.-C. Hu, The dynamic source routing protocol for mobile ad hoc networks (DSR), in Internet Draft, draftietf-manet-dsr-.txt. IETF MANET Working Group, July 24, work in progress. [13] L. Bajaj, M. Takai, and R. Ahuja. Glomosim: A scalable network simulation environment. [Online]. Available: projects/glomosim/

Evaluation of Power Aware Routing Protocols Mohammad Mahmud. Wireless Networks Professor: Dr. Lijun Qian

Evaluation of Power Aware Routing Protocols Mohammad Mahmud. Wireless Networks Professor: Dr. Lijun Qian Evaluation of Power Aware Routing Protocols Mohammad Mahmud Wireless Networks Professor: Dr. Lijun Qian Power Aware Routing In a typical network, the route of a packet will be determined by calculating

More information

PERFORMANCE ANALYSIS OF POWER-AWARE ROUTE SELECTION PROTOCOLS IN MOBILE AD HOC NETWORKS

PERFORMANCE ANALYSIS OF POWER-AWARE ROUTE SELECTION PROTOCOLS IN MOBILE AD HOC NETWORKS PERFORMANCE ANALYSIS OF POWER-AWARE ROUTE SELECTION PROTOCOLS IN MOBILE AD HOC NETWORKS DONGKYUN KIM, J.J. GARCIA-LUNA-ACEVES AND KATIA OBRACZKA Computer Engineering Department University of California

More information

Mitigating Superfluous Flooding of Control Packets MANET

Mitigating Superfluous Flooding of Control Packets MANET Mitigating Superfluous Flooding of Control Packets MANET B.Shanmugha Priya 1 PG Student, Department of Computer Science, Park College of Engineering and Technology, Kaniyur, Coimbatore, India 1 Abstract:

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Dynamic Route Switching Protocol in Mobile Ad Hoc Networks

Dynamic Route Switching Protocol in Mobile Ad Hoc Networks Dynamic Route Switching Protocol in Mobile Ad Hoc Networks Abstract Due to limited bandwidth, how to decrease routing overhead is an important issue in mobile ad hoc networks. Several multipath routing

More information

Computer and Information Science February, 2010

Computer and Information Science February, 2010 Improvement in Network Lifetime for On-Demand Routing in Mobile Ad hoc Networks Using either On-Demand Recharging or Transmission Power Control or Both Natarajan Meghanathan (Corresponding Author) Department

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

Energy-Aware Algorithms for AODV in Ad Hoc Networks

Energy-Aware Algorithms for AODV in Ad Hoc Networks Energy-Aware Algorithms for AODV in Ad Hoc Networks Xiangpeng Jing and Myung J. Lee Department of Electrical Engineering Graduate Center and City College of City University of New York New York, NY 10031,

More information

IN a mobile ad hoc network, nodes move arbitrarily.

IN a mobile ad hoc network, nodes move arbitrarily. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR

Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on Mr. Nirav Bhatt, Dr. Dhaval Kathiriya Reaserch Scholar, School of Computer Science, RK University, Rajkot Director IT,

More information

I. INTRODUCTION. S Sivabalan. S Sathish. K Thangavel

I. INTRODUCTION. S Sivabalan. S Sathish. K Thangavel Analysis of Path selection policy of the Routing Protocols using Energy Efficient Metrics for Mobile Ad-Hoc Networks S Sivabalan Department of Computer Science Periyar University Salem,TamilNadu, India

More information

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS May Cho Aye and Aye Moe Aung Faculty of Information and Communication Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Energy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks

Energy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks Energy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks Baisakh Department of Computer Science and Engineering, Jaypee University of Engineering and Technology, Guna, Madhya Pradesh, India

More information

ESAR: An Energy Saving Ad Hoc Routing Algorithm for MANET

ESAR: An Energy Saving Ad Hoc Routing Algorithm for MANET : An Energy Saving Ad Hoc Routing Algorithm for MANET Utkarsh 1, Mukesh Mishra 2 and Suchismita Chinara 3 Department of Computer Science and Engineering, National Institute of Technology Rourkela, Rourkela,

More information

Performance Analysis of Three Routing Protocols for Varying MANET Size

Performance Analysis of Three Routing Protocols for Varying MANET Size Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Performance Analysis of Three Routing Protocols for Varying MANET Size N Vetrivelan,

More information

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Highly Effective and Efficient Route Discovery & Maintenance in DSR A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Dynamic AODV Backup Routing in Dense Mobile Ad-Hoc Networks *

Dynamic AODV Backup Routing in Dense Mobile Ad-Hoc Networks * Dynamic AODV Backup Routing in Dense Mobile Ad-Hoc Networks * Wen-Tsuen Chen and Wei-Ting Lee Department of Computer Science, National Tsing Hua University, Hsin-Chu, Taiwan 300, ROC Tel:+886-3-5742896

More information

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,

More information

A Review of Power Aware Routing in Wireless Ad-hoc Networks

A Review of Power Aware Routing in Wireless Ad-hoc Networks Varaprasad.Ummadi et al IJCSET August 2013 Vol 3, Issue 8, 279-283 A Review of Power Aware Routing in Wireless Ad-hoc Networks Varaprasad.Ummadi, Dr Syed Umar, V N Satya Sai Anil Kumar Pilaka Department

More information

Assistant Professor & Head. Keywords- MANETs, Routing Protocol, Energy Consumption, protocol stack, mobile nodes.

Assistant Professor & Head. Keywords- MANETs, Routing Protocol, Energy Consumption, protocol stack, mobile nodes. Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Improving Packet

More information

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at Charlotte,

More information

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis American Journal of Applied Sciences, 10 (4): 361-366, 2013 ISSN: 1546-9239 2013 Sreedhar and Venkatesh, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent W. S. Wong and Victor C. M. Leung Department of Electrical and Computer Engineering The University of British

More information

Study on Energy Conservation in MANET

Study on Energy Conservation in MANET 78 JOURNAL OF NETWORKS, VOL. 5, NO. 6, JUNE 21 Study on Energy Conservation in MANET Yu Wang School of Computer Science, Chongqing University of Arts and Science, Chongqing, China Email: cqwu29718@163.com

More information

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA) 103 6. Node Disjoint Split Multipath Protocol for Unified Multicasting through Announcements (NDSM-PUMA) 6.1 Introduction It has been demonstrated in chapter 3 that the performance evaluation of the PUMA

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information

II. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid.

II. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid. A COMPLETE STUDY ON POWER AWARE ROUTING PROTOCOL FOR MOBILE ADHOC NETWORK A. Kumaravel 1, Dr. M.Chandrasekaran 2 1 (Electronics and Communication Engineering, Paavai Engineering College,India) 2 (Electronics

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

Cache Timeout Strategies for on-demand Routing in MANETs

Cache Timeout Strategies for on-demand Routing in MANETs 1 Cache Timeout Strategies for on-demand Routing in MANETs Sanlin Xu Kim Blackmore Haley Jones Department of Engineering, Australian National University, ACT 0200 {Sanlin.Xu, Kim.Blackmore, Haley.Jones}@anu.edu.au

More information

Performance of Route Caching Strategies in Dynamic Source Routing

Performance of Route Caching Strategies in Dynamic Source Routing Performance of Route Caching Strategies in Dynamic Source Routing Mahesh K. Marina Samir R. Das Department of Electrical & Computer Engineering and Computer Science University of Cincinnati Cincinnati,

More information

Energy Efficient Routing Protocols in Mobile Ad hoc Network based on AODV Protocol

Energy Efficient Routing Protocols in Mobile Ad hoc Network based on AODV Protocol Energy Efficient Routing Protocols in Mobile Ad hoc Network based on AODV Protocol Ravneet Kaur M.Tech Scholar, Computer Science & Engineering (CSE), Lovely Professional University, India. ABSTRACT A Mobile

More information

Performance Evaluation of AODV, DSR, DYMO & ZRP in Cost 231 Walfisch-Ikegami Path Loss Propagation Model

Performance Evaluation of AODV, DSR, DYMO & ZRP in Cost 231 Walfisch-Ikegami Path Loss Propagation Model Page 2 Oeconomics of Knowledge, Volume 3, Issue 3, 3Q, Summer 2011 Performance Evaluation of AODV, DSR, DYMO & ZRP in Cost 231 Walfisch-Ikegami Path Loss Propagation Model Rachit JAIN Department of Electronics

More information

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks Won-Ik Kim Radio Performance Analysis Section Electronics & Telecommunications Research Institute 161 Kajong-dong,

More information

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

An Enhanced Cross-Layer Protocol for Energy Efficiency in Wireless Sensor Networks

An Enhanced Cross-Layer Protocol for Energy Efficiency in Wireless Sensor Networks 2009 Third International Conference on Sensor Technologies and Applications An Enhanced Cross-Layer Protocol for Energy Efficiency in Wireless Sensor Networks Jaehyun Kim Dept. of Electrical & Electronic

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

CS551 Ad-hoc Routing

CS551 Ad-hoc Routing CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 6 (Jul. - Aug. 2013), PP 01-09 A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile

More information

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 57 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (2015 ) 890 897 2015 International Conference on Recent Trends in Computing (ICRTC 2015) Performance Analysis of Efficient

More information

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu

More information

Recent Researches in Communications, Information Science and Education

Recent Researches in Communications, Information Science and Education AODV Based Multi-path Local Repairing Scheme for Mobile Ad Hoc Networks Eman Shaaban, PhD Computer Systems Dept. Faculty of computer and information science Ain-Shams university, Cairo, Egypt Eman.shaaban@cis.asu.edu.eg

More information

An Extended AODV Protocol for Multipath Routing in MANETs

An Extended AODV Protocol for Multipath Routing in MANETs IACSIT International Journal of Engineering and Technology, Vol.2, No.4, August 21 An Extended Protocol for Multipath Routing in MANETs N.Jaisankar 1 and R.Saravanan 2 Abstract Mobile ad hoc networks (MANETs)

More information

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Masaru Yoshimachi and Yoshifumi Manabe movement of the devices. Thus the routing protocols for MANET need

More information

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

DYNAMIC ROUTES THROUGH VIRTUAL PATHS ROUTING FOR AD HOC NETWORKS

DYNAMIC ROUTES THROUGH VIRTUAL PATHS ROUTING FOR AD HOC NETWORKS DYNAMIC ROUTES THROUGH VIRTUAL PATHS ROUTING FOR AD HOC NETWORKS Abdulrahman H. Altalhi Computer Science Department University of New Orleans New Orleans, LA, 70148 USA Golden G. Richard, III Abstract

More information

EPARGA: A Resourceful Power Aware Routing Protocol for MANETs

EPARGA: A Resourceful Power Aware Routing Protocol for MANETs EPARGA: A Resourceful Power Aware Routing Protocol for MANETs Shipra Suman, Er. Aditi Agrawal, Prof. A.K. Jaiswal Abstract A Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts which

More information

Impact of Hello Interval on Performance of AODV Protocol

Impact of Hello Interval on Performance of AODV Protocol Impact of Hello Interval on Performance of AODV Nisha Bhanushali Priyanka Thakkar Prasanna Shete ABSTRACT The multi-hop ad hoc networks are self organizing networks with dynamic topology. The reactive

More information

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network 1 Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network Nilima Walde, Assistant Professor, Department of Information Technology, Army Institute of Technology, Pune, India Dhananjay

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara

More information

Prediction of Route and Node Lifetime Based on Dynamic Nature Routing in MANET

Prediction of Route and Node Lifetime Based on Dynamic Nature Routing in MANET Prediction of Route and Node Lifetime Based on Dynamic Nature Routing in MANET Pavithra.R 1, Pavithra.V 2, Santhosh.A.K 3, Natraj.N.A 4 UG Scholar, Department of ECE, United Institute of Technology, Tamilnadu,

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. Mobile Ad Hoc Networks: Routing TOPIC 8 UCS-805 MOBILE COMPUTING Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Mobile Ad Hoc Networks (MANET) Introduction

More information

A Novel Method for Power Consumption Optimization In Manet

A Novel Method for Power Consumption Optimization In Manet American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-6, Issue-7, pp-323-328 www.ajer.org Research Paper Open Access A Novel Method for Power Consumption Optimization

More information

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Comparison of DSDV, AODV, DSR, Routing protocols

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Mobile Ad-Hoc Networks & Routing Algorithms

Mobile Ad-Hoc Networks & Routing Algorithms Mobile Ad-Hoc Networks & Routing Algorithms EMMANOUIL G. SPANAKIS, PhD. spanakis@csd.uoc.gr COLLABORATING RESEARCHER, COMPUTATIONAL BIOMEDICINE LABORATORY, FORTH-ICS VISITING LECTURER, COMPUTER SCIENCE

More information

Preemptive Multicast Routing in Mobile Ad-hoc Networks

Preemptive Multicast Routing in Mobile Ad-hoc Networks Preemptive Multicast Routing in Mobile Ad-hoc Networks Uyen Trang Nguyen and Xing Xiong Department of Computer Science and Engineering York University, Toronto, Ontario Canada, M3J 1P3 Email: {utn, xing}@cs.yorku.ca

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

Power aware Multi-path Routing Protocol for MANETS

Power aware Multi-path Routing Protocol for MANETS Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile

More information

Keywords: AODV, MANET, WRP

Keywords: AODV, MANET, WRP Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)

More information

A Power-Aware Routing Protocol Using Multi-Route Transmission for Mobile Ad Hoc Networks

A Power-Aware Routing Protocol Using Multi-Route Transmission for Mobile Ad Hoc Networks A Power-Aware Routing Protocol Using Multi-Route Transmission for Mobile Ad Hoc Networks Kuang-Han Fei, Sheng-Yan Chuang, and Sheng-De Wang National Taiwan University Department of Electrical Engineering

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Collision Free and Energy Efficient MAC protocol for Wireless Networks

Collision Free and Energy Efficient MAC protocol for Wireless Networks 110 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 Collision Free and Energy Efficient MAC protocol for Wireless Networks Muhammad Ali Malik, Dongha Shin

More information

Mitigating Routing Misbehavior in Mobile Ad Hoc Networks

Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Mitigating Routing Misbehavior in Mobile Ad Hoc Networks S. Marti, T. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in The 6th ACM International Conference on Mobile

More information

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks 1 Ravindra.E, 2 Pooja Agraharkar Asst Prof, Dept. of Electronics & Communication Engg, Mtech Student, Dept. of Electronics & Communication

More information

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI 1 Yongxian SONG, 2 Rongbiao ZHANG and Fuhuan

More information

Speed Performance of Intelligent Ant Sense Routing Protocol for Mobile Ad-Hoc Personal Area Network

Speed Performance of Intelligent Ant Sense Routing Protocol for Mobile Ad-Hoc Personal Area Network International Journal of Computer Science and Telecommunications [Volume 4, Issue 10, October 2013] 41 ISSN 2047-3338 Speed Performance of Intelligent Ant Sense Routing Protocol for Mobile Ad-Hoc Personal

More information

Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks Λ

Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks Λ Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks Λ Samir R. Das Dept. of ECECS University of Cincinnati Cincinnati, OH 4522 Elizabeth M. Royer Dept. of ECE University of California,

More information

Performance Analysis of Various Routing Protocols for Motorway Surveillance System Cameras Network

Performance Analysis of Various Routing Protocols for Motorway Surveillance System Cameras Network www.ijcsi.org 7 Performance Analysis of Various Routing Protocols for Motorway Surveillance System Cameras Network L. A. Hassnawi 1, R.B Ahmad 2, Abid Yahya 3, S. A. Aljunid 4, M. Elshaikh 5 School of

More information

Energy Efficient EE-DSR Protocol for MANET

Energy Efficient EE-DSR Protocol for MANET Energy Efficient EE- Protocol for MANET 1 Mr. Prakash Patel, 2 Ms. Tarulata Chauhan 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 prakashpmp1990@gmail.com, 2 taruchauhan114@gmail.com

More information

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Volume 2 No. 1 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Volume 2 No. 1 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. The Beaconless Node Velocity-based Stable Path Routing Protocol for Unicasting and Multicasting in Mobile Ad hoc Networks Natarajan Meghanathan Jackson State University, Jackson, MS 39217, USA natarajan.meghanathan@jsums.edu

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Routing in Variable Topology Networks

Routing in Variable Topology Networks Routing in Variable Topology Networks Dr. Alhussein Abouzeid Electrical, Computer and Systems Engineering (ECSE) Rensselaer Polytechnic Institute Variable Topology Networks P2P networks for distributed

More information

Location Prediction Based Routing Protocol for Mobile Ad hoc Networks

Location Prediction Based Routing Protocol for Mobile Ad hoc Networks Location Prediction Based Routing Protocol for Mobile Ad hoc Networks Natarajan Meghanathan Department of Computer Science Jackson State University Jackson, MS 39217, USA Email: nmeghanathan@jsums.edu

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

Control Traffic Analysis of On-Demand Routing Protocol. in Mobile Ad-hoc Networks

Control Traffic Analysis of On-Demand Routing Protocol. in Mobile Ad-hoc Networks Second International Conference on Networking and Distributed Computing Control Traffic Analysis of On-Demand Routing Protocol in Mobile Ad-hoc Networks Zhilin Zhang School of Computer Science & Technology

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

Designing Energy Routing Protocol with Power Consumption Optimization in MANET

Designing Energy Routing Protocol with Power Consumption Optimization in MANET Designing Energy Routing Protocol with Power Consumption Optimization in MANET Shivashankar 1,+, Suresh H.N 2, *, Varaprasad Golla 3, /, Jayanthi G 1, - 1 Dr. Ambedkar Institute of Technology, Bangalore

More information