SlideShare a Scribd company logo
1 of 8
Download to read offline
Nabendu Chaki et al. (Eds.): NeTCoM 2010,CSCP 01, pp. 42–49, 2011.
© CS & IT-CSCP 2011 DOI : 10.5121/csit.2011.1104
EFFICIENT PACKET DELIVERY APPROACH FOR AD-
HOC WIRELESS NETWORKS
Sharvani G S1
, Dr. T.M.Rangaswamy2
,
RV College Of Engineering, Bangalore, India
sharvanim@yahoo.com, dr.tmrswamy@rediffmail.com
Abstract: A wireless ad-hoc network is a collection of nodes which are self-
configuring, connected by wireless links. The nodes are free to move randomly and
organize themselves arbitrarily; thus, the network's topology may change rapidly and
unpredictably. These kinds of networks are very flexible and they do not require any
existing infrastructure. Therefore, ad-hoc wireless networks are suitable for temporary
communication links. The biggest challenge in these kinds of networks is to find a path
between the communication end points of nodes that are mobile. Due to the limited
transmission range of wireless interfaces, the communication traffic has to be relayed
over several intermediate nodes to enable the communication between two nodes.
Therefore, these kinds of networks are also called multi-hop ad-hoc networks. The
proposed model is designed to improve the problems of real-time event-based
communication. It improves the packet delivery ratio by prior prediction and reduces
end-to-end packet delay. This in turn improves performance of the routing process
significantly and increases the Quality of Service (QoS).
Keywords: Ad-hoc Wireless Networks, QoS, Lagrange Interpolation, Power,
Predictive Preemptive approach
1. Introduction
Ad-hoc wireless networks comprise of sets of nodes connected by wireless links that form
arbitrary wireless network topologies without the use of any centralized access point. Ad-hoc
wireless networks are inherently self-creating, self-organizing and self-administering. The nodes
are free to move randomly and organize themselves arbitrarily. Thus the network's topology
may change rapidly and unpredictably. The biggest challenge in these kinds of networks is to
find a path between the communication end points of nodes that are mobile. Due to the limited
transmission range of wireless interfaces, the communication traffic has to be relayed over
several intermediate nodes to enable the communication between two nodes. Therefore, these
kinds of networks are also called multi-hop ad-hoc networks. Every node acts as both, a host
and as a router. Another limitation associated with wireless devices is the power constraint of
the nodes i.e. each node has only limited battery power which should be used judiciously for the
node to survive longer and to provide its services within the network.
Nodes cooperate with their neighbors to route data packets to their final destinations. As
intermediate nodes may fail, routes between sources and destinations need to be determined and
adjusted dynamically. Routing protocols for ad-hoc networks typically include mechanisms for
route discovery and route maintenance. The route discovery mechanism is invoked to determine
a route between a sender and a receiver. The performance of these protocols depends on the
route maintenance mechanism they use. Schemes that use Global Positioning System (GPS)
information for detecting and handling expected link failures early have been proposed [1].A
node on a route from a source to a destination may become unreachable from its predecessor
node because of node movement or node failure. In this paper, route maintenance is initiated
Computer Science & Information Technology (CS & IT) 43
when a link break is expected rather than waiting for the break to happen. The route
maintenance mechanism finds new valid routes as substitutes for broken active routes. Several
approaches to route maintenance have been proposed. In this paper, a predictive preemptive
local route repair strategy is used [2] [3] [4]. Its aim is to find an alternative path before the cost
of a link failure is incurred. A link is considered likely to break when the power of either of the
nodes that it connects is close to the minimum detectable power. Route repair (finding sub-path
to the destination) is the responsibility of a source node after receiving a warning about the
imminence of a link break on an active route to a destination.
Quality of Service (QoS) is the performance level of a service offered by the network to the
user. It is the collective set of service performance which determines the degree of satisfaction
of the user of the service.Providing QoS in MANETs is a challenging and difficult task where
nodes may leave or join the network and move around dynamically. Our approach aims to
improve the QoS by predicting a link failure before its occurrence thereby routing packets
through an alternative path.
Applications and Challenges
Commercial scenarios [5] for ad-hoc wireless networks include:
• Conferences/meetings/lectures
• Emergency services
• Law enforcements
Current challenges for ad-hoc wireless networks include:
• Multicast
• QoS support
• Power-aware routing
• Location-aided routing
2. Major Challenges in AD-Hoc Wireless Networks
Major challenges [6] in ad-hoc wireless networks are:
1. Mobility: One of the most important properties of ad-hoc wireless networks is the
mobility associated with the nodes. The mobility of nodes results in frequent path
breaks, packet collisions, transient loops, stale routing information and difficulty in
resource reservation.
2. Bandwidth constraint: Since the channel is shared by all nodes in the broadcast
region, the bandwidth available per wireless link depend on the number of nodes and
traffic they handle.
3. Error-prone and shared channel: The bit error rate (BER) in a wireless channel is
very high, compared to that in its wired counterparts.
4. Lack of centralized control: The major advantage of an ad-hoc network is that it can
be set up spontaneously without the need for centralized control. Routing and resource
management are done in a distributed manner in which all the nodes cooperate to enable
communication among them.
5. Resource constraints: The constraints on resources such as computing power, battery
power, and buffer storage also limit the capability of the network.
44 Computer Science & Information Technology (CS & IT)
3. Quality of Service (QoS)
Quality of Service (QoS) [6] is the performance level of a service offered by the network to the
user. The goal of QoS provisioning is to achieve a more deterministic network behavior, so that
information carried by the network can be better delivered and network resources can be better
utilized. QoS is the collective set of service performance which determines the degree of
satisfaction of the user of the service.
The dynamic nature of ad-hoc networks makes QoS a challenging and difficult task where
nodes may leave or join the network or move around anytime. To support QoS, the link state
information such as delay, bandwidth, cost, loss rate, and error rate in the network should be
available and manageable [7].
QoS parameters in ad-hoc wireless networks
A service can be characterized by a set of [6] measureable service requirements such as
bandwidth, delay, delay jitter, power etc… Military applications have stringent security
requirements while emergency operations should operate with minimal overhead.
4. Proposed Algorithm
Step1: Power of the node is computed using the following equation
Pb = P - k – n.x…………………Eqn (1)
Where Pb – Battery Power
P – Power as calculated by Lagrange’s equation
k – Constant factor for battery drain
n- No. of packets processed
x- Processing factor
Step2: When the power Pb of a node N is lower than the minimum acceptable power as shown
in Eqn (1), a warning message is first propagated to the predecessor node and in case the
predecessor node is unable to find an alternative path to the destination [8] [9] [10][11], then
the link failure warning message is further propagated to all upstream sources that make use of
this node. The routing table is also updated to notify the nodes in the network about the change
in the network topology that is expected to take place as a result of node failure.
Predict ()
{
If (Pb <= Min_Acc_Power) then
{
Send_ warning (predecessor node);
Segmentation_Of_Packets ();
Computer Science & Information Technology (CS & IT) 45
//transmit only the remaining data packets which had not been transmitted earlier
//through this route, prior to link failure, through an alternative route, to the
//destination
}
}
Step3: The predecessor of node N then initiates a local route repair procedure to find an
alternative path to the destination by consulting the updated routing table. The proposed
approach also accounts for the segmentation of packets.ie. the source sends only the remaining
data packets which had not been transmitted earlier through the path in which the link failure
had occurred thereby leading to its abandoning, through an alternative route, to the destination.
Step4: When the power of the node N becomes zero, then the node is removed from the network
and all links attached to it are broken.
5. Sequence of Activities
In the Predictive Preemptive Local Route Repair Strategy for improving QoS, we have proposed
the following sequence of steps that occur for the routing process as shown in Figure 1.
1. The user requests for the creation of a node in a specified cell of the pre-defined grid.
2. The deploy network option responds by asking the user for the (X, Y) location of the
center of the circular node.
3. The user then replies with the (X, Y) location and as a result, the deploy network
process successfully creates the node and assigns a node number to it.
4. In this way, the user can deploy several nodes in the network.
5. Upon the creation of every node, the node value is forwarded to the Routing process,
which in turn updates the routing table and checks for the presence of nodes which lie
within the range of a given node. This is the Route Discovery mechanism.
6. Every node has a pre-defined range, in which it can detect the presence of other
nodes. The following strategy is adopted when a node needs to find a path to an
unknown destination.
7. We adopt 4 techniques to determine the nodes which lie within the range of the
concerned node and can hence be detected by the concerned node,
i.) Check the range of the concerned node in clockwise direction.
ii.) Check the range of the concerned node in Anti- clockwise direction.
iii.) Check the range of the concerned node in down clockwise direction.
iv.) Check the range of the concerned node in down anti-clockwise direction.
8. This approach is particularly useful in determining the shortest path (minimum
number of hops) to the destination.
9. Next, the user requests for the transmission of data from the source to the
destination.
10. The Deploy network process responds, by asking the user for the source and
destination and in Turn, the user specifies the desired source and destination node.
46 Computer Science & Information Technology (CS & IT)
11. The Send Data Process as shown in Fig 2 then finds an optimal path (consisting of
least number of hops) between the source and destination by consulting the routing
table.
12. Next is the Route Maintenance and Route Failure Handling phase.
13. Link failure may occur due to the crashing of certain nodes because of the depletion
of their battery power. Such failures are handled by the route failure handling phase. On
reaching the source, route discovery phase is restarted.
14. We propose a predictive preemptive local route repair strategy to increase Quality of
Service (QoS) in the network. Its aim is to find an alternative path before the cost of a
link failure is incurred.
15. The power of the node is used to estimate when a link is expected to break. A link is
considered likely to break when the power of either of the nodes that it connects is close
to the minimum detectable power.
16. When the power of a node becomes lower than the minimum acceptable power, a
warning message is sent to the predecessor node which then attempts to find an
alternative path to the destination. This is the local route repair strategy adopted.
17. If a link should fail, the node whose power has decreased below the pre-defined
threshold power is simply removed from the routing table, the next-hop probabilities are
recomputed for the remaining set (ie. the routing table contents are updated) and the
remaining packets which were not transmitted earlier through the route which has failed
are sent through an alternative path.
18. If no nodes lie within the range of the source node or any of the intermediate nodes
to route packets, the packet is dropped.
19. Finally, data is successfully transmitted through the alternative path to the
destination.
Fig.1Structured Chart for Predictive Preemptive Local Route Repair Strategy
Computer Science & Information Technology (CS & IT) 47
6. Related Route Maintenance Mechanisms
Route failures have a significant negative impact on packet delivery. Packet dropping and
higher delays are the main consequences of route failures. The time elapsed between link break
detection and alternative path establishment can be high. Therefore, many studies have focused
on improving route repair.
In [2], Crisòstomo et al. propose a Preemptive Local Route Repair (PLRR) extension to AODV.
Nodes trigger the preemptive local route repair procedure when they predict that a link on the
route to a destination is about to break. All packets are modified so as to contain node positions
and motion information obtained using GPS receivers that nodes are equipped with. The
problems with this approach are the cost associated with using a GPS and the need for
synchronization between the internal clocks of nodes.
Cahill et al. [1] propose the use of node position and mobility information in the route discovery
mechanism of DSR. When multiple routes to a destination exist, route selection is based on
route stability and hop count. Moreover, nodes upstream of links that are predicted to break
carry out preemptive local repair. This proposal uses DSR caching. Therefore, it is not
applicable to AODV. Moreover, a GPS is used.
Fig 2 Send Data Flowchart
48 Computer Science & Information Technology (CS & IT)
In [12], Goff et al. propose a preemptive route maintenance extension to on-demand routing
protocols. Its aim is to find an alternative path before the cost of a link failure is incurred. The
received transmission power is used to estimate when a link is expected to break. A link is
considered likely to break when the power of the signal received over it is close to the minimum
detectable power. Route repair is the responsibility of a source node after receiving a warning
about the imminence of a link break on an active route to a destination. This mechanism has
been applied to DSR; AODV is also considered, but only superficially.
7. Scope and Motivation
Routing in wireless ad-hoc networks has always been a challenging task, mainly due to the high
degree of the dynamic nature involved in the network. The basic algorithms involve a lot of
overhead due to exchange of routing tables among the nodes and every node maintaining the
routing information about every other node. Predictive Preemptive Local Route Repair
algorithm was chosen to be implemented due to following reasons:
• The application is designed for best effort delivery of data (higher packet delivery
ratio).
• The aim of the application is to build an optimal path from the source to the destination
(based on least hop count) and maintain it.
• It results in minimum overhead as it does not propagate unnecessary warning messages
in the network to upstream nodes.
• It results in fewer broken active links due to prior prediction of link failure based on the
power calculation for each node.
• It results in lower end-to-end delay.
Conclusion
We have proposed a protocol with a prediction mechanism that anticipates link breaks, and
repairs them before they happen, thereby avoiding unnecessary warning messages and reducing
control overhead. We also provide for segmentation of data packets that need to be transmitted
from the source to the destination i.e. we transmit only the remaining data packets through an
alternative path to the destination which had not been transmitted earlier prior to link failure
through the failed route.
References
[1] Adrian J. Cahill, Phillip L. De Leon, Cormac J. Sreenan A., “Link cache extensions for
predictive routing and repair in ad hoc wireless Networks”, in Proceedings of the 4th IEEE
Conference on Mobile and Wireless Communication Networks (MWCN), Sep2002, pp. 43 – 52.
[2] Crisostomo, S. Sargento, S. Brandao, P. and Prior, R. (2004) ‘Improving AODV with
Preemptive Local Route Repair’. In proceeding of IEEE IWWAN. 31 May- 2 June
[3] William Su, Sung-ju Lee, Mario Gerla, “Mobility Prediction and Routing in Ad hoc Wireless
Networks”, International Journal of Network Management, Wiley & Sons, 2000.
[4] Abhilash P., Srinath Perur and Sridhar Iyer, “Router Handoff: An Approach for Preemptive Route
Repair in Mobile Ad Hoc Networks”, Proc. of High Performance Computing, 2002.
[5] Elizabeth M. Royer, Chai-Keong Toh A Review of Current Routing Protocols for Ad-Hoc Mobile
Wireless Networks, IEEE Personal Communications, April 1999
[6] C. Siva Ram Murthy & B.S. Manoj, “Ad Hoc Wireless Networks Architectures and Protocols”,
Pearson Education, 2nd
Edition, 2005
Computer Science & Information Technology (CS & IT) 49
[7] Mohammad Inayatullah, Sheeraz Ahmad, Abdus Salam, Optimized QOS Protocols for Small-Sized
Manets, IEEE-ICET 2006, 2nd
International Conference on Emerging Technologies, Peshawar,
Pakistan 13-14 November 2006
[8] Sofiane Boukli Hacene, Ahmed Lehireche, Ahmed Meddahi” Predictive Preemptive Ad Hoc On-
Demand Distance Vector Routing Evolutionary Engineering and Distributed Information
Systems Laboratory, EEDIS, Computer Science Department, Sidi Bel Abbes University, Algeria
[ 9] E. Belding-Royer, and C. Perkins, “Evolution and future directions of the ad hoc on-demand
distance-vector routing protocol”, Ad Hoc Networks Journal, Vol. 1 No. 1, July 2003, pp.
125–150
[10] Belding-Royer, C.Perkins,“ multicast Ad hoc On-Demand Distance Vector (AODV) Routing”,
draft-ietf-manet-aodv-13.txt, INTERNET DRAFT, 2003.
[11] Dhiraj Nitnaware, Ajay Verma”Energy Constraint Node Cache Based Routing Protocol For
Ad-Hoc Network,International Journal of Wireless and Mobile Networks, Vol2, No 1, Feb 2010
[12] T. Goff, N.A Ghazaleh, D. Phatak and R. Kahvecioglu., “Preemptive routing in ad hoc
Networks”, Journal of Parallel and Distributed Computing, 2003, pp. 123–140.

More Related Content

What's hot

DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
ijujournal
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
Saurabh Mishra
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
IJET - International Journal of Engineering and Techniques
 

What's hot (18)

A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
IRJET- Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
IRJET-  	  Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANETIRJET-  	  Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
IRJET- Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
 
A02100108
A02100108A02100108
A02100108
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
R045059297
R045059297R045059297
R045059297
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
 
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc NetworksLink Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...
 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
 
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
 
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
 

Similar to EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS

Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
IJCNCJournal
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by using
Iaetsd Iaetsd
 

Similar to EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS (20)

A survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsA survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane ts
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
 
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
 
Secured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolSecured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing Protocol
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
 
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSSNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
 
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSSNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by using
 

More from cscpconf

MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
cscpconf
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Recently uploaded

QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 

EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS

  • 1. Nabendu Chaki et al. (Eds.): NeTCoM 2010,CSCP 01, pp. 42–49, 2011. © CS & IT-CSCP 2011 DOI : 10.5121/csit.2011.1104 EFFICIENT PACKET DELIVERY APPROACH FOR AD- HOC WIRELESS NETWORKS Sharvani G S1 , Dr. T.M.Rangaswamy2 , RV College Of Engineering, Bangalore, India sharvanim@yahoo.com, dr.tmrswamy@rediffmail.com Abstract: A wireless ad-hoc network is a collection of nodes which are self- configuring, connected by wireless links. The nodes are free to move randomly and organize themselves arbitrarily; thus, the network's topology may change rapidly and unpredictably. These kinds of networks are very flexible and they do not require any existing infrastructure. Therefore, ad-hoc wireless networks are suitable for temporary communication links. The biggest challenge in these kinds of networks is to find a path between the communication end points of nodes that are mobile. Due to the limited transmission range of wireless interfaces, the communication traffic has to be relayed over several intermediate nodes to enable the communication between two nodes. Therefore, these kinds of networks are also called multi-hop ad-hoc networks. The proposed model is designed to improve the problems of real-time event-based communication. It improves the packet delivery ratio by prior prediction and reduces end-to-end packet delay. This in turn improves performance of the routing process significantly and increases the Quality of Service (QoS). Keywords: Ad-hoc Wireless Networks, QoS, Lagrange Interpolation, Power, Predictive Preemptive approach 1. Introduction Ad-hoc wireless networks comprise of sets of nodes connected by wireless links that form arbitrary wireless network topologies without the use of any centralized access point. Ad-hoc wireless networks are inherently self-creating, self-organizing and self-administering. The nodes are free to move randomly and organize themselves arbitrarily. Thus the network's topology may change rapidly and unpredictably. The biggest challenge in these kinds of networks is to find a path between the communication end points of nodes that are mobile. Due to the limited transmission range of wireless interfaces, the communication traffic has to be relayed over several intermediate nodes to enable the communication between two nodes. Therefore, these kinds of networks are also called multi-hop ad-hoc networks. Every node acts as both, a host and as a router. Another limitation associated with wireless devices is the power constraint of the nodes i.e. each node has only limited battery power which should be used judiciously for the node to survive longer and to provide its services within the network. Nodes cooperate with their neighbors to route data packets to their final destinations. As intermediate nodes may fail, routes between sources and destinations need to be determined and adjusted dynamically. Routing protocols for ad-hoc networks typically include mechanisms for route discovery and route maintenance. The route discovery mechanism is invoked to determine a route between a sender and a receiver. The performance of these protocols depends on the route maintenance mechanism they use. Schemes that use Global Positioning System (GPS) information for detecting and handling expected link failures early have been proposed [1].A node on a route from a source to a destination may become unreachable from its predecessor node because of node movement or node failure. In this paper, route maintenance is initiated
  • 2. Computer Science & Information Technology (CS & IT) 43 when a link break is expected rather than waiting for the break to happen. The route maintenance mechanism finds new valid routes as substitutes for broken active routes. Several approaches to route maintenance have been proposed. In this paper, a predictive preemptive local route repair strategy is used [2] [3] [4]. Its aim is to find an alternative path before the cost of a link failure is incurred. A link is considered likely to break when the power of either of the nodes that it connects is close to the minimum detectable power. Route repair (finding sub-path to the destination) is the responsibility of a source node after receiving a warning about the imminence of a link break on an active route to a destination. Quality of Service (QoS) is the performance level of a service offered by the network to the user. It is the collective set of service performance which determines the degree of satisfaction of the user of the service.Providing QoS in MANETs is a challenging and difficult task where nodes may leave or join the network and move around dynamically. Our approach aims to improve the QoS by predicting a link failure before its occurrence thereby routing packets through an alternative path. Applications and Challenges Commercial scenarios [5] for ad-hoc wireless networks include: • Conferences/meetings/lectures • Emergency services • Law enforcements Current challenges for ad-hoc wireless networks include: • Multicast • QoS support • Power-aware routing • Location-aided routing 2. Major Challenges in AD-Hoc Wireless Networks Major challenges [6] in ad-hoc wireless networks are: 1. Mobility: One of the most important properties of ad-hoc wireless networks is the mobility associated with the nodes. The mobility of nodes results in frequent path breaks, packet collisions, transient loops, stale routing information and difficulty in resource reservation. 2. Bandwidth constraint: Since the channel is shared by all nodes in the broadcast region, the bandwidth available per wireless link depend on the number of nodes and traffic they handle. 3. Error-prone and shared channel: The bit error rate (BER) in a wireless channel is very high, compared to that in its wired counterparts. 4. Lack of centralized control: The major advantage of an ad-hoc network is that it can be set up spontaneously without the need for centralized control. Routing and resource management are done in a distributed manner in which all the nodes cooperate to enable communication among them. 5. Resource constraints: The constraints on resources such as computing power, battery power, and buffer storage also limit the capability of the network.
  • 3. 44 Computer Science & Information Technology (CS & IT) 3. Quality of Service (QoS) Quality of Service (QoS) [6] is the performance level of a service offered by the network to the user. The goal of QoS provisioning is to achieve a more deterministic network behavior, so that information carried by the network can be better delivered and network resources can be better utilized. QoS is the collective set of service performance which determines the degree of satisfaction of the user of the service. The dynamic nature of ad-hoc networks makes QoS a challenging and difficult task where nodes may leave or join the network or move around anytime. To support QoS, the link state information such as delay, bandwidth, cost, loss rate, and error rate in the network should be available and manageable [7]. QoS parameters in ad-hoc wireless networks A service can be characterized by a set of [6] measureable service requirements such as bandwidth, delay, delay jitter, power etc… Military applications have stringent security requirements while emergency operations should operate with minimal overhead. 4. Proposed Algorithm Step1: Power of the node is computed using the following equation Pb = P - k – n.x…………………Eqn (1) Where Pb – Battery Power P – Power as calculated by Lagrange’s equation k – Constant factor for battery drain n- No. of packets processed x- Processing factor Step2: When the power Pb of a node N is lower than the minimum acceptable power as shown in Eqn (1), a warning message is first propagated to the predecessor node and in case the predecessor node is unable to find an alternative path to the destination [8] [9] [10][11], then the link failure warning message is further propagated to all upstream sources that make use of this node. The routing table is also updated to notify the nodes in the network about the change in the network topology that is expected to take place as a result of node failure. Predict () { If (Pb <= Min_Acc_Power) then { Send_ warning (predecessor node); Segmentation_Of_Packets ();
  • 4. Computer Science & Information Technology (CS & IT) 45 //transmit only the remaining data packets which had not been transmitted earlier //through this route, prior to link failure, through an alternative route, to the //destination } } Step3: The predecessor of node N then initiates a local route repair procedure to find an alternative path to the destination by consulting the updated routing table. The proposed approach also accounts for the segmentation of packets.ie. the source sends only the remaining data packets which had not been transmitted earlier through the path in which the link failure had occurred thereby leading to its abandoning, through an alternative route, to the destination. Step4: When the power of the node N becomes zero, then the node is removed from the network and all links attached to it are broken. 5. Sequence of Activities In the Predictive Preemptive Local Route Repair Strategy for improving QoS, we have proposed the following sequence of steps that occur for the routing process as shown in Figure 1. 1. The user requests for the creation of a node in a specified cell of the pre-defined grid. 2. The deploy network option responds by asking the user for the (X, Y) location of the center of the circular node. 3. The user then replies with the (X, Y) location and as a result, the deploy network process successfully creates the node and assigns a node number to it. 4. In this way, the user can deploy several nodes in the network. 5. Upon the creation of every node, the node value is forwarded to the Routing process, which in turn updates the routing table and checks for the presence of nodes which lie within the range of a given node. This is the Route Discovery mechanism. 6. Every node has a pre-defined range, in which it can detect the presence of other nodes. The following strategy is adopted when a node needs to find a path to an unknown destination. 7. We adopt 4 techniques to determine the nodes which lie within the range of the concerned node and can hence be detected by the concerned node, i.) Check the range of the concerned node in clockwise direction. ii.) Check the range of the concerned node in Anti- clockwise direction. iii.) Check the range of the concerned node in down clockwise direction. iv.) Check the range of the concerned node in down anti-clockwise direction. 8. This approach is particularly useful in determining the shortest path (minimum number of hops) to the destination. 9. Next, the user requests for the transmission of data from the source to the destination. 10. The Deploy network process responds, by asking the user for the source and destination and in Turn, the user specifies the desired source and destination node.
  • 5. 46 Computer Science & Information Technology (CS & IT) 11. The Send Data Process as shown in Fig 2 then finds an optimal path (consisting of least number of hops) between the source and destination by consulting the routing table. 12. Next is the Route Maintenance and Route Failure Handling phase. 13. Link failure may occur due to the crashing of certain nodes because of the depletion of their battery power. Such failures are handled by the route failure handling phase. On reaching the source, route discovery phase is restarted. 14. We propose a predictive preemptive local route repair strategy to increase Quality of Service (QoS) in the network. Its aim is to find an alternative path before the cost of a link failure is incurred. 15. The power of the node is used to estimate when a link is expected to break. A link is considered likely to break when the power of either of the nodes that it connects is close to the minimum detectable power. 16. When the power of a node becomes lower than the minimum acceptable power, a warning message is sent to the predecessor node which then attempts to find an alternative path to the destination. This is the local route repair strategy adopted. 17. If a link should fail, the node whose power has decreased below the pre-defined threshold power is simply removed from the routing table, the next-hop probabilities are recomputed for the remaining set (ie. the routing table contents are updated) and the remaining packets which were not transmitted earlier through the route which has failed are sent through an alternative path. 18. If no nodes lie within the range of the source node or any of the intermediate nodes to route packets, the packet is dropped. 19. Finally, data is successfully transmitted through the alternative path to the destination. Fig.1Structured Chart for Predictive Preemptive Local Route Repair Strategy
  • 6. Computer Science & Information Technology (CS & IT) 47 6. Related Route Maintenance Mechanisms Route failures have a significant negative impact on packet delivery. Packet dropping and higher delays are the main consequences of route failures. The time elapsed between link break detection and alternative path establishment can be high. Therefore, many studies have focused on improving route repair. In [2], Crisòstomo et al. propose a Preemptive Local Route Repair (PLRR) extension to AODV. Nodes trigger the preemptive local route repair procedure when they predict that a link on the route to a destination is about to break. All packets are modified so as to contain node positions and motion information obtained using GPS receivers that nodes are equipped with. The problems with this approach are the cost associated with using a GPS and the need for synchronization between the internal clocks of nodes. Cahill et al. [1] propose the use of node position and mobility information in the route discovery mechanism of DSR. When multiple routes to a destination exist, route selection is based on route stability and hop count. Moreover, nodes upstream of links that are predicted to break carry out preemptive local repair. This proposal uses DSR caching. Therefore, it is not applicable to AODV. Moreover, a GPS is used. Fig 2 Send Data Flowchart
  • 7. 48 Computer Science & Information Technology (CS & IT) In [12], Goff et al. propose a preemptive route maintenance extension to on-demand routing protocols. Its aim is to find an alternative path before the cost of a link failure is incurred. The received transmission power is used to estimate when a link is expected to break. A link is considered likely to break when the power of the signal received over it is close to the minimum detectable power. Route repair is the responsibility of a source node after receiving a warning about the imminence of a link break on an active route to a destination. This mechanism has been applied to DSR; AODV is also considered, but only superficially. 7. Scope and Motivation Routing in wireless ad-hoc networks has always been a challenging task, mainly due to the high degree of the dynamic nature involved in the network. The basic algorithms involve a lot of overhead due to exchange of routing tables among the nodes and every node maintaining the routing information about every other node. Predictive Preemptive Local Route Repair algorithm was chosen to be implemented due to following reasons: • The application is designed for best effort delivery of data (higher packet delivery ratio). • The aim of the application is to build an optimal path from the source to the destination (based on least hop count) and maintain it. • It results in minimum overhead as it does not propagate unnecessary warning messages in the network to upstream nodes. • It results in fewer broken active links due to prior prediction of link failure based on the power calculation for each node. • It results in lower end-to-end delay. Conclusion We have proposed a protocol with a prediction mechanism that anticipates link breaks, and repairs them before they happen, thereby avoiding unnecessary warning messages and reducing control overhead. We also provide for segmentation of data packets that need to be transmitted from the source to the destination i.e. we transmit only the remaining data packets through an alternative path to the destination which had not been transmitted earlier prior to link failure through the failed route. References [1] Adrian J. Cahill, Phillip L. De Leon, Cormac J. Sreenan A., “Link cache extensions for predictive routing and repair in ad hoc wireless Networks”, in Proceedings of the 4th IEEE Conference on Mobile and Wireless Communication Networks (MWCN), Sep2002, pp. 43 – 52. [2] Crisostomo, S. Sargento, S. Brandao, P. and Prior, R. (2004) ‘Improving AODV with Preemptive Local Route Repair’. In proceeding of IEEE IWWAN. 31 May- 2 June [3] William Su, Sung-ju Lee, Mario Gerla, “Mobility Prediction and Routing in Ad hoc Wireless Networks”, International Journal of Network Management, Wiley & Sons, 2000. [4] Abhilash P., Srinath Perur and Sridhar Iyer, “Router Handoff: An Approach for Preemptive Route Repair in Mobile Ad Hoc Networks”, Proc. of High Performance Computing, 2002. [5] Elizabeth M. Royer, Chai-Keong Toh A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks, IEEE Personal Communications, April 1999 [6] C. Siva Ram Murthy & B.S. Manoj, “Ad Hoc Wireless Networks Architectures and Protocols”, Pearson Education, 2nd Edition, 2005
  • 8. Computer Science & Information Technology (CS & IT) 49 [7] Mohammad Inayatullah, Sheeraz Ahmad, Abdus Salam, Optimized QOS Protocols for Small-Sized Manets, IEEE-ICET 2006, 2nd International Conference on Emerging Technologies, Peshawar, Pakistan 13-14 November 2006 [8] Sofiane Boukli Hacene, Ahmed Lehireche, Ahmed Meddahi” Predictive Preemptive Ad Hoc On- Demand Distance Vector Routing Evolutionary Engineering and Distributed Information Systems Laboratory, EEDIS, Computer Science Department, Sidi Bel Abbes University, Algeria [ 9] E. Belding-Royer, and C. Perkins, “Evolution and future directions of the ad hoc on-demand distance-vector routing protocol”, Ad Hoc Networks Journal, Vol. 1 No. 1, July 2003, pp. 125–150 [10] Belding-Royer, C.Perkins,“ multicast Ad hoc On-Demand Distance Vector (AODV) Routing”, draft-ietf-manet-aodv-13.txt, INTERNET DRAFT, 2003. [11] Dhiraj Nitnaware, Ajay Verma”Energy Constraint Node Cache Based Routing Protocol For Ad-Hoc Network,International Journal of Wireless and Mobile Networks, Vol2, No 1, Feb 2010 [12] T. Goff, N.A Ghazaleh, D. Phatak and R. Kahvecioglu., “Preemptive routing in ad hoc Networks”, Journal of Parallel and Distributed Computing, 2003, pp. 123–140.