GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS

Similar documents
Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis

Performance Analysis of MANET Using Efficient Power Aware Routing Protocol (EPAR)

Figure 1. Clustering in MANET.

Routing Protocols in MANET: Comparative Study

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

Chapter 7 CONCLUSION

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Energy Efficient EE-DSR Protocol for MANET

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Subject: Adhoc Networks

AN ANTENNA SELECTION FOR MANET NODES AND CLUSTER HEAD GATEWAY IN INTEGRATED MOBILE ADHOC NETWORK

Performance Analysis and Enhancement of Routing Protocol in Manet

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS

Performance Evaluation of Various Routing Protocols in MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

II. ROUTING CATEGORIES

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

A Stable TORA Based for Routing in Mobile Ad Ηoc Networks

Fig. 2: Architecture of sensor node

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Link Stability with Energy Aware Ad Hoc on Demand Multipath Routing Protocol in Mobile Ad Hoc Networks

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

A Survey - Energy Efficient Routing Protocols in MANET

Routing Protocols in MANETs

ABSTRACT I. INTRODUCTION. Rashmi Jatain Research Scholar, CSE Department, Maharishi Dayanand University, Rohtak, Haryana, India

SUMMERY, CONCLUSIONS AND FUTURE WORK

Power aware Multi-path Routing Protocol for MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Performance Evaluation of MANET through NS2 Simulation

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Survey on Multicast Routing Protocols in MANETs

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

Introduction to Mobile Ad hoc Networks (MANETs)

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Wireless Sensor Network Optimization using multiple Movable Sensors for Data Gathering

WSN Routing Protocols

COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

Comprehensive Study and Review Various Routing Protocols in MANET

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Energy Efficient Clustering Approach For Wireless Sensor Network

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network

Defending MANET against Blackhole Attackusing Modified AODV

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

A Review Paper on Secure Routing Technique for MANETs

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

ENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK

II. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid.

Keywords Minimum Spanning Tree, Mobile Adhoc Network (MANET), Multicast, Overhead, Scalability, Spanning Tree.

International Journal of Advance Research in Computer Science and Management Studies

Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes

Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network

Avoiding Blackhole Attacks Using CBDA Approach in MANETS

International Journal of Advance Research in Computer Science and Management Studies

Energy Consumption for Cluster Based Wireless Routing Protocols in Sensor Networks

A Review on Black Hole Attack in MANET

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET

The General Analysis of Proactive Protocols DSDV, FSR and WRP

A Novel Review on Routing Protocols in MANETs

High-Performance Multipath Routing Algorithm Using CPEGASIS Protocol in Wireless Sensor Cloud Environment

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Mobile Agent Driven Time Synchronized Energy Efficient WSN

IP Multicast Technology Overview

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

draft-ietf-magma-igmp-proxy-04.txt Brian Haberman, Caspian Networks Hal Sandick, Sheperd Middle School Expire: March, 2004 September, 2003

Implementation and Performance Evaluation of Three Routing Protocols for Mobile Ad Hoc Network Using Network Simulator

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)

CLASSIFICATION OF ROUTING Routing. Fig.1 Types of routing

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

High Efficient Broadcasting Protocols for Mobile ADHOC Network

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator

Keywords-MANETs, Multicast mode, Clustering, Inter-domain routing.

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

A Modified Algorithmic Approach of DSDV Routing Protocol for Wireless Ad Hoc Network

Transcription:

American Journal of Applied Sciences 11 (7): 1059-1064, 2014 ISSN: 1546-9239 2014 K.S. Kumar et al., This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license doi:10.3844/ajassp.2014.1059.1064 Published Online 11 (7) 2014 (http://www.thescipub.com/ajas.toc) GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS 1 Senthil Kumar, K., 2 S. Sasi Kumar and 3 C. Sugapriya 1 Department of Computer Science and Engineering, Bharath Niketan Engineering College, Tamilnadu-625536, India 2 Department of Computer Science and Engineering, R.M.D. Engineering College, Tamilnadu-601206, India 3 Department of Mathematics, R.M.K. Engineering College, Tamilnadu-601206, India Received 2014-01-15; Revised 2014-01-29; Accepted 2014-04-21 ABSTRACT In this study, we proposed an algorithm for Cluster Based Zone Allocation method (CBZA) for energy conservation and packet dropping in mobile ad hoc network. MANET is a self-organized, temporarily dynamic network and their nodes are mobile without using any infrastructure. However, secure communication occurs between group nodes based on cluster method. In multicast routing, group information is shared by a sender to multiple receivers through many paths which are coordinate with each other. In our method, a set of nodes are located into four regions and a Zone Leader (ZL) is allocated to every region in the network. While packet transmission takes place through the zone leader and this is the main process in group management. Finally, the performance of each region is calculated. Keywords: MANET, CBZA, Multicast Routing, Cluster 1. INTRODUCTION Generally, a new technology improvement is produced with some of the re Requirements such as: Reduction in size, low cost, consumes low power and distributed devices relatively for short or long distance communication. Wired networks are used for local processing or short distance communication and wireless networks are employed for long distance communication (Tseng et al., 2011; Mohseni et al., 2011). In order to provide such necessities, Mobile Ad hoc Networks are used for wireless communication which comprises of hundreds or thousands of mobile nodes that are autonomous and that has no physical infrastructure irrespective of geographical locations; so it provides service and access information other locations. MANETs are adaptive and self-organizing network (Taneja and Kush, 2010; Director, 2007; Bakht, 2011). While the nodes used in MANETs must be able to detect the presence of other devices to alleviate the necessary set up for communication. The adding and Correspondent Author: Senthil Kumar, K., Department of Computer Science and Engineering, Bharath Niketan Engineering College, Tamilnadu-625536, India removing devices cannot affect the network performance. It is a scalable network because it accommodates the addition of more nodes. By the way, it provides more flexibility. These are robust network since it has no centralized infrastructure and we can set up the network at any place regardless of time (Deng et al., 2002). In order to support group communication, multicast is one of the most effective method when compared to unicast that can preserve the bandwidth and energy predominately. However, the nodes used in MANETs are battery powered and consumes more power for data transmission. Mobile nodes are autonomous that are capable of operating for several years with the supply of battery power and the lifetime of the network can be defined as the operating time of the nodes without using any external interferences, like battery substitution (Almeroth, 2000). To sustain the network lifetime, it is necessary to concentrate on the energy consumption of the nodes and to reduce as much as possible. So, energy consumption is a major issue in such networks and this energy depends on the amount of collected data. Thus, communication 1059

becomes a vital task in MANETs. By considering the above reason, we contrived some algorithms for CBZA method to overcome such difficulties (Bhattacharyya, 2003). 2. RELATED WORK Group management plays a crucial role in wireless networks since it accomplished a special focus in success of the communication. There are numerous schemes are present and some of them are based on the traditional group management strategies. These strategies have several known limitations such as: It does not encounter any related issues along with group management and could not satisfy the essential requirements of MANETs. Moreover, it cannot maintain the energy resources in such operations (Cain et al., 2002; Deering et al., 1996). However it shows a poor performance in this circumstance. In multipath diversity routing, the delay is increased because it selects an alternate link when the current path is not sufficient to send packets. By the way, the packet loss or packet drop is also increased. When the delay and packet loss is increased, the overall network throughput or efficiency and communication overhead is decreased. Thus, it has low latency and poor network lifetime. In order to reduce the above limitations, we use an algorithm for Cluster Based Zone Allocation method (Deering et al., 1999). 3. OVERVIEW OF MDR AND CBZA In Multipath Diversity Routing (MDR), when the current path is failure it chooses the alternate link for packet transmission but in Cluster Based Zone Allocation method (CBZA), zones are formed and packet transmission over routing process. In MDR, packet loss is increased because of the link failure and packet delivery ratio is decreased. Then, end to end delay became very high. So, overall packet transmission time gets increased and overall network efficiency is reduced. In CBZA, when the zones are formed it splitted into four regions. The packet transmission takes place into the regions and when the transmission in first region is completed then only next region starts its transmission. Each region has a Cluster Head (CH) which controls the packet transmission and reception through it. If the packet is lost, we can easily identify the lost packet in this method. But in MDR, the detection of lost packet is somewhat critical process. CBZA has low packet loss when compared to MDR. So, the end to end delay and packet transmission time is reduced. By the way, we can increase the network throughput or efficiency. 4. ALGORITHM FOR CLUSTER BASED ZONE ALLOCATION MTHOD (CBZA) 1. Initialize the source model S ix 2. Collections of coordinator nodes CN i 3. Zones are formulated into four regions R g 4. Zone leader election Z L 5. Zone member Z M 6. R g < = Z L1 +Z L2 +Z L3 +Z L4 7. Step: 1 8. Zone leader election Z L1 process 9. Z M < = S ix +CN i 10. Z L < = Z M + Z Routing 11. For (N = 0; N<25; N++) 12. End process 13. Calculate Z L1 performance 14. Step: 2 15. Zone leader election Z L2 process 16. Z M < = S ix + CN i 17. Z L < = Z M + Z Routing 18. For (N = 0; N<25; N++) 19. End Process 20. Calculate Z L2 performance 21. Step: 3 22. Zone leader election Z L3 process 23. Z M <= S ix + CN i 24. Z L < = Z M + Z Routing 25. For (N = 0; N<25; N++) 26. End process 27. Calculate Z L3 performance 28. Step: 4 29. Zone leader election Z L4 process 30. Z M <= S ix + CN i 31. Z L < = Z M + Z Routing 32. For (N = 0; N<25; N++) 33. End process 34. Calculate Z L4 performance 35. Calculate overall network performance R g < = Z L1 +Z L2 +Z L3 +Z L4 End. Normally in network infrastructure, nodes are deployed and source and destinations are allocated. Then, a single node will act as a router or agent. In group management, set of nodes are initialized at particular region or four regions. Each region has a Zone Leader (ZL) and zone members. Zone leader election is conducted among the nodes in the zone and a particular node will elected as a zone leader depending on its energy level which is called threshold value. Except the zone leader other nodes will behave as neighbors or coordinators. 1060

In general case of network infrastructure requires nodes in which source and destinations are allocated. Then, a particular node will act as a router or agent. In group management, set of nodes are formatted at particular region or four regions. Each region has a Cluster Head (CH) and Cluster members. The election for allocating the cluster head at each region is conducted among the nodes at the cluster and a particular node will elected as a cluster head by considering its energy level which is called the value of threshold. Other than cluster head remaining nodes will be act as coordinators/neighbors. When the routing process takes place along the network, each cluster members are organized with each other then Postulation and Reaction process is executed by the coordinator nodes. Finally, cluster head will involve the packet transmission like entering and exceeding packets because these packets are passed through the CH. Then, the above process is repeated with above same procedure discussed in Fig. 1-3. Fig. 1. Cluster formation Fig. 3. Zone formation cluster allocation Table 1. Parameters comparision S. no Parameter MDR CBZA 1 Total no of nodes 20 100 2 Total no packets 1000 2500 3 Antenna type (BS) Omni directional Omni directional 4 Transmission mode Path selection process Region splitting 5 Bandwidth ratio 0.9e6 2e6 6 Data rate 0.96e6 2.0e6 7 Mobility Dynamic Dynamic 8 Density rate 0.2 0.5 In Table1 the network parameters and it existing and proposed components was discussed, Generally total number of nodes are used in MDR (20) and CBZA (100), Second stage total number of packet are travelling calculations in MDR and CBZA, Third one is coverage area was discussed using for unidirectional antenna which purpose of 360 degree coverage, Transmitting Mode is used in MDR (Path selection mode) and Cluster Based Zone splitting modes (CBZA), bandwidth and data rate was discussed, both protocol mobility was Movements based Such as dynamic mode. Finally density rate was calculated. When the routing process/packet transmission is commenced through the network, every zone members are coordinated with each other and Request/Response process is performed by coordinators. Finally, every packet transmission like entering and exceeding packets is operated by the zone leader because they are passed through it. Then, the above process is repeated as the same 5. RESULTS Fig. 2. Data exchange using routing process The Performance of the Enter network Comparison graph is show as Fig. 4-9. 1061

Fig. 4. Compare the performance between communication overhead Vs throughput Fig. 5. Compare the performance between scalability Vs PDR Fig. 6. Compare the performance between average time Vs delay 1062

Fig. 7. Compare the performance of MDR VS CBZA Fig. 8. Compare the performance of MDR VS CBZA For scalabilty Fig. 9. Compare the performance of MDR VS CBZA For scalabilty 1063

6. CONCLUSION Thus, we proposed an algorithm for Cluster Based Zone Allocation method (CBZA) and it is a group management process used in MANETs and multicast routing. In CBZA method, packet transmission occurs into the zones so that the packet loss or packet drop is reduced and network error can be easily identified. By splitting zones, the energy consumption and network traffic is reduced; the network lifetime is increased to reasonable times. When compared to MDR protocols this algorithm provides higher throughput and by the way overall network efficiency is increased. 7. REFERENCES Almeroth, K., 2000. The evolution of multicast: From the MBone to inter-domain multicast to Internet 2 deployment. IEEE Netw., 14: 10-20. DOI: 10.1109/65.819167 Bakht, H., 2011. Survey of routing protocols for mobile ad-hoc network. Int. J. Inform. Commun. Technol. Res., 3: 258-270. Bhattacharyya, S., 2003. An overview of Source-Specific Multicast (SSM). The Internet Society. Cain, B., S. Deering, I. Kouvelas, B. Fenner and A. Thyagarajan, 2002. Internet group management protocol, version 3. Int. Eng. Task Force, RFC 3376. Deering, S., D. Estrin, D. Farinacci, V. Jacobson and G. Liu et al., 1996. The PIM architecture for wide-area multicast routing. IEEE/ACM Trans. Netw., 4: 153-162. DOI: 10.1109/90.490743 Deering, S., W. Fenner and B. Haberman, 1999. Multicast Listener Discovery (MLD) for IPv6. Network Working Group. Deng, H., W. Li and D.P. Agrawal, 2002. routing security in wireless ad hoc networks. IEEE Commun. Mag., 40: 70-75. DOI: 10.1109/MCOM.2002.1039859 Director, G.B.E., 2007. Wireless ad hoc networks: Basic concepts. High Frequency Electronics. Mohseni, S., R. Hassan, A. Patel and R. Razali, 2011. Comparative review study of reactive and proactive routing protocols in MANETs. Proceedings of the 4th IEEE International Conference Digital Ecosystems Technologies, Apr. 13-16, IEEE Xplore Press, Dubai, pp: 304-309. DOI: 10.1109/DEST.2010.5610631 Taneja, S. and A. Kush, 2010. A survey of routing protocols in mobile ad-hoc networks. Int. J. Innovat., Manage. Technol., 3: 279-285. Tseng, F.H., L.D. Chou and H.C. Chao, 2011. A survey of black hole attacks in wireless mobile ad hoc networks. Human-Centric Comput. Inform. Sci., 1: 4-4. DOI: 10.1186/2192-1962-1-4 1064