SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Innovative Science and Modern Engineering (IJISME)
ISSN: 2319-6386, Volume-3 Issue-2, January 2015
31
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication Pvt. Ltd.
Abstract — In Mobile Ad hoc network (MANET) numerous
mobile sensor nodes are indiscriminately situated in given system.
The working of MANET is based upon collaboration of all nodes
for promoting data packets and consistent route detection. A
selfish node is a node who does not forward data packets to other
nodes. Instead it reserves its resources and energy. Selfish node
detection and elimination is an important concern issue. Energy is
one of the significant qualities of service constraint in MANET. In
this paper, we think about a range of means of growing reliability
of system with less energy usage. Here by altering packet size, we
evaluate packet Delivery Ratio, Packet loss Ratio as well as
throughput, control overheads and Energy Consumption of a
system.
Index Terms—Wireless Sensor Network; Reliability; Reporting
rate, Packet Delivery ratio; Energy.
I. INTRODUCTION
In Mobile Ad hoc network diverse group’s self-governing
mobile sensor nodes are present. In the absence of network
infrastructure they are connected with each other with a
communication links. As these nodes are organizing
themselves for efficient data communication they are
continuously moving which results in change in topology of
network. Mobile nodes are acts as routers and they forward
the data packets to the other nodes. So the routes between
nodes may potentially contain multiple hops. Due to node
mobility in MANET route may changes very frequently. As
mobile routers are connected with wireless link which form
random topology of a network. If MANET is tied with
Internet or any other private network then it is called as
Hybrid MANET [1].
MANET will provide full network flexibility which makes
it useful for natural disasters like tsunami, Earthquake; in
military applications, in extreme medical situations and so on
MANET has many advantages like low cost, Easy and speed
of deployment, flexible and minimizes dependency on
network infrastructure. There may be chance of node
misbehaving means a node is agree to join the route but it does
not forward the packet to next hop node. It is doing so because
it wants to conserve its energy or due to launch a denial of
service attack or may be overload of data packets. To
minimize this, we use a Watchdog Timer Approach.
Manuscript Received on January 2015.
Prof. D. V. Biradar, Department of Informational Technology, M. S.
Bidve Engineering College, SRTMU Nanded University, Latur, India.
Prof. Praful P. Maktedar, Department of Informational Technology, M.
S. Bidve Engineering College, SRTMU Nanded University, Latur, India.
In this approach, each node governs that whether a node is
forwarded a packet or not, in same way, each node try to
monitor its forwarded node for efficient data packet
transmission process. Path rater is run by each node. Each
node assign rating to its known node such that previously
unknown nodes are assigns as neutral nodes with rating 0.5.
The suspected misbehaving nodes are rated with negative
value while other nodes having positive rating between 0 to
0.8 value. Each node wills successfully forwarded data
packets must sent an acknowledgement to its previous node
[2]. In case of packet loss, node will send NACK means not
acknowledgement message to its previous node so that
retransmission of lost packet took placed. Fig.1 illustrate
Mobile Ad hoc network. It involves of 9 mobiles nodes. From
node A data transmission route is present to convey packets to
node C. All nodes are present in each other’s range.
Fig. 1- Mobile Ad hoc Network
All the nodes are symmetrical hence they communicate with
each other. Energy of sensor nodes is noteworthy aspect once
they scattered in particular network. It is not possible to afford
additional energy supply to sensor nodes. So we must
considerate energy usage of nodes by avoiding unnecessary
energy consumptions [3]. Energy is used for data
transmission as well as reception processes. Excess energy
usage will adversely influence on network lifetime. Buffer
scheduling, data transmission, dropping delay, are assured
surplus elements which side effect energy feedings.
II. LITERATURE SURVEY
X. Xiang et al [4] proposed that multicast is proficient
technique in group communication in MANET. But it is
problematic to advancing multicast packet and group
membership management since of dynamic topology. We
planned a novel Efficient Geographic Multicast Protocol
(EGMP). It is self-contained, unassuming, well-organized
protocol. EGMP practices virtual zone based structure that is
bidirectional trace is built to attain extra proficient
Investigation of Energy Consumption MANET
D. V. Biradar, Praful P. Maktedar
Investigation of Energy Consumption in MANET
32
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication Pvt. Ltd.
membership management and multicast distribution [5]. It
resourcefully diminishes overheads for route examining and
tree structure maintenance. As a replacement for addressing
only precise portion of problem, it comprises zone based
scheme to professionally switch group membership
management and competently trace locations of all group
members without resorting to external server location [6].
Zone is space somewhere mobile nodes are existent and
location derivation.
Robert J. Hall et al [7] projected that Geographic
addressing of packets (geoaddressing) is completed via
geocast protocol where nodes are selectively retransmit
packets founded on local decision Guidelines. It has 2 kinds
as a) Flooding Approach- It is generating high load so its
unsalable b) Scalable Approach- It has deficiency in adequate
intellect nearby essential directionality of packets movement
[8]. Hence we recommended “Center distance with priority
(CD-P)” It considerably develops scalability and Reliability
of a system. It is established upon three significant concepts as
first a node retransmits if it is closer to the center of geocast
region than all other duplicates it has perceived
communicated. Second it is attends to all other
retransmissions uninterruptedly former to its individual
retransmission & withdraws its own if it catches another node
transmits closer to the center first [9]. Third Scalability
depend on each node ranking its send queue to send soonest
to those packets that mark it post development near center of
geocast regions.
Zhenzhen Ye et al [10] estimated that. Each node
essentials to withstand its location information by Normally
updating its location information within its neighboring
region ,Which is called as ”Neighborhood Update(NV)”.And
Sometimes updating its information of location to definite
distributed location server in the N/W which is called
“Location Server Updates (LSU)”. The cost of operation in
Location updates is primary problematic so to sidestep this we
advance ”Markov Decision Process (MDP)” In which we first
explores NU & LSU properties with respect to location
impreciseness under the overall cast situations. As in MENET
all nodes are movable so we cannot expect precise locality of
any node within given space. MDP supports us to ensure this
[11].
III. PERFORMANCE ANALYSIS
We use Network Simulator (NS2) tool for simulation of nodes
present in a given network area. We take 50 nodes as one of
them is sink node. Reporting rate of packets is 10 packets per
second. We use random topology. IEEE 802.11 Medium
Access Control (MAC) protocol is used and Ad Hoc on
Demand Routing Protocol (AODV) routing protocol is used.
On the basis of this scenario we can draw the following
graphs.
Fig. 2- PDR in % as a function of Packet Size in bytes
Fig. 2 shows the graph of packet delivery ratio (PDR) in
percentage (%) as a function of packet size in bytes. At the
creation, when packet size is 50, PDR is high. But as packet
size increases; PDR decreases. Since due to rise in packet
size, congestion in given network may upturns so packets
does not catch an accurate path to reach to destination. Nodes
that are added in given network go in starvation mode. They
neither transmitting data packets nor receiving data packets
which results in decreasing PDR rate of a given network.
Fig. 3- PLR in % as a function of Packet Size in bytes
Fig. 3 indicate that the graph of packet loss ratio (PLR) in
percentage (%) as a function of packet size in bytes. At the
launch, when packet size is 50, PLR is low. But as the packet
size increases, PLR also increase for the reason that of
increase in packet size congestion occurred in network so that
nodes might not capable to reach to sink node. Each node
encloses huge expanse of information. So loss of any one data
packet will cause large information loss. Therefore, PLR
increases.
Fig. 4- Throughput in kbps as a function of Packet Size in
bytes
International Journal of Innovative Science and Modern Engineering (IJISME)
ISSN: 2319-6386, Volume-3 Issue-2, January 2015
33
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication Pvt. Ltd.
Fig. 4 shows the graph of Throughput in kbps as a function of
packet size in bytes. At commencement, when packet size is
50 then throughput is short. But as the packet size surges
throughput also upsurges since data packets may perhaps
develop a perfect track to reach to end.
Fig. 5- Control Overheads as a function of Packet Size in
bytes
Fig. 5 demonstrate that the graph of Control Overheads as a
function of packet size in bytes. At first, when packet size is
50 then Control Overheads is small. But as the packet size
further increases Control Overheads also increases because
with handshaking process the connection is established
between source node and sink node and data transmission
process is ongoing successfully.
Fig. 6- Average Energy in joule as a function of Packet
Size in bytes
Fig. 6 appearances the graph of Average Energy in joule as a
function of packet size in bytes. At the opening, when packet
size is 50 then Average Energy is high. But as the packet size
supplementary growths then Average Energy reduced
because primarily energy is used for handshaking process as
well as determining route for data transmission process.
IV. CONCLUSION
In this paper, subsequently investigation of five graphs we
accomplish that throughout the data transmission procedure
we illustrate precious fluctuations. From fig. 2 we had grasped
that as packet size of data upturns PDR rate is falls. Likewise
from fig. 3 notice that as packet size raises PLR rate growths.
From Fig. 4 we approximately note down that Throughput is
reliant on upon packet size of data. Fig. 5 shows that control
overheads are increases with increase in packet size. Fig.6
displays average energy consumption is reduced .It
contributes enhanced results to the user. Hence it is
demonstrate that packet size affects on number of packets
received at destination end through data transmission
procedure.
REFERENCES
[1] Richard j. La and Eunyoung Seo,” Expected Routing Overheads for
location service in MANET under flat geographic routing”, vol. 10,
issue 3, March 2011.
[2] Seungjin Park, Seong-Moo Yoo”An Efficient Reliable one- hop
broadcast in Mobile Ad hoc Networks”, vol. 11, April 2012, pp 19-28.
[3] Mario di Franceseo, Giuseppe Anastani, Marco County and Sajal K.
Das,”Reliability and Energy Efficiency in Wireless Sensor network”,
vol. 29, issue 8, Sept. 2011.
[4] X. Xiang, X. Wang, Y. yang,”Supporting Efficient and Scalable
Multicast for Mobile andAd hoc Networks”, vol. 10, No 5, April 2011.
[5] Lajos Hanzo, Rahim Tafazolli,”QoS aware Routing and Admission
Control in Shadow-Fading Environments for Multirate MANETs” in
IEEE journal, vol. 10, No. 5, May 2011.
[6] Yunhaui Liu, Yanmin Zhu, Lionel Mni and Guangtao Xue, “A
Relibility Oriented Transmission Services in Wireless Sensor network”
Journal IEEE transactions on parallel and Distributed Syatems, vol. 22,
issues 12, Dec. 2011, pp 2100-2107.
[7] Robert J.Hall,” An Improved Geocast for Mobile Ad hoc Networks”,
IEEE communication letters, vol. 10, No. 2, Feb. 2011.
[8] Shoubhik Mukhopadhyay, Debashis Panigrahi,”Model Based
Techniques for Data Reliability in Wireless Sensor Network”, vol. 8,
issues 4, April 2009.
[9] Shengbo Yang, Chai Kiat Yeo, Bu Sung Lee ,“Towards Reliable data
delivery for highly Dynamic Mobile Ad hoc Networks” Journal IEEE
transactions on parallel and Distributed Syatems, vol. 22, issues 12,
Dec. 2011, pp 2100-2107.
[10] Zhenzhen Ye ,AlhussionA.Abouzeid,” Optimal Stochastic Location
updates in mobile Ad Hoc Networks”, vol. 10, No. 5, May 2011.
[11] Hong Luo, Huadong Ma and Sajal K. Das,”Data Fusion with Desired
Reliability in Wireless Sensor networks”,vol. 22, March 2011.
Mr. D. V. Biradar, HOD, Information Technology
Department, M.S. Bidve Engineering College, holds
Bachelors and Masters Degree of Engineering in
Electronics from SRTMU, Nanded University, state
Maharashtra, country India in 2003 . Currently he is
doing his research work in Mobile Ad hoc Network and
Wireless Sensor Networks. His 23 years of teaching
experience is an asset to the organization. He is working as Associate
Professor in Department of IT, His expertise in the field of Wireless
computer Networks and Embedded system helps in guidance to the PG
students.
Mr. Praful P. Maktedar, Assistant Professor,
Information Technology Department, M.S. Bidve
Engineering College, holds Bachelor’s Degree of
Engineering in IT from SRTMU, Nanded University,
and Master’s Degree in IT from Pune University, state
Maharashtra, country India in 2015. Currently he is
doing his research work in Wireless Sensor Networks
and Network Security. He is working as Assistant Professor in Department
of IT.

More Related Content

What's hot

Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015parry prabhu
 
QoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networksQoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networksjournalBEEI
 
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...ijiert bestjournal
 
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...M H
 
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksIJTET Journal
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...IJCERT
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKijngnjournal
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
 
Priority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksPriority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksIJCNCJournal
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
 
MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingM H
 

What's hot (17)

Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015
 
QoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networksQoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networks
 
[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.
[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.
[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.
 
Ag26204209
Ag26204209Ag26204209
Ag26204209
 
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
 
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
 
Ttacca
TtaccaTtacca
Ttacca
 
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
 
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
Priority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksPriority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networks
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical Routing
 

Similar to B0781013215

Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...IAEME Publication
 
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...IAEME Publication
 
The detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksThe detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksiaemedu
 
The detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksThe detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksiaemedu
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET Journal
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksIAEME Publication
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksiaemedu
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSijircee
 
Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...IJERA Editor
 

Similar to B0781013215 (20)

i2ct_submission_105
i2ct_submission_105i2ct_submission_105
i2ct_submission_105
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
1. 8481 1-pb
1. 8481 1-pb1. 8481 1-pb
1. 8481 1-pb
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
 
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
 
The detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksThe detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networks
 
The detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksThe detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networks
 
Eh33798804
Eh33798804Eh33798804
Eh33798804
 
Eh33798804
Eh33798804Eh33798804
Eh33798804
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networks
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networks
 
E0942531
E0942531E0942531
E0942531
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
 
Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...
 

B0781013215

  • 1. International Journal of Innovative Science and Modern Engineering (IJISME) ISSN: 2319-6386, Volume-3 Issue-2, January 2015 31 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. Abstract — In Mobile Ad hoc network (MANET) numerous mobile sensor nodes are indiscriminately situated in given system. The working of MANET is based upon collaboration of all nodes for promoting data packets and consistent route detection. A selfish node is a node who does not forward data packets to other nodes. Instead it reserves its resources and energy. Selfish node detection and elimination is an important concern issue. Energy is one of the significant qualities of service constraint in MANET. In this paper, we think about a range of means of growing reliability of system with less energy usage. Here by altering packet size, we evaluate packet Delivery Ratio, Packet loss Ratio as well as throughput, control overheads and Energy Consumption of a system. Index Terms—Wireless Sensor Network; Reliability; Reporting rate, Packet Delivery ratio; Energy. I. INTRODUCTION In Mobile Ad hoc network diverse group’s self-governing mobile sensor nodes are present. In the absence of network infrastructure they are connected with each other with a communication links. As these nodes are organizing themselves for efficient data communication they are continuously moving which results in change in topology of network. Mobile nodes are acts as routers and they forward the data packets to the other nodes. So the routes between nodes may potentially contain multiple hops. Due to node mobility in MANET route may changes very frequently. As mobile routers are connected with wireless link which form random topology of a network. If MANET is tied with Internet or any other private network then it is called as Hybrid MANET [1]. MANET will provide full network flexibility which makes it useful for natural disasters like tsunami, Earthquake; in military applications, in extreme medical situations and so on MANET has many advantages like low cost, Easy and speed of deployment, flexible and minimizes dependency on network infrastructure. There may be chance of node misbehaving means a node is agree to join the route but it does not forward the packet to next hop node. It is doing so because it wants to conserve its energy or due to launch a denial of service attack or may be overload of data packets. To minimize this, we use a Watchdog Timer Approach. Manuscript Received on January 2015. Prof. D. V. Biradar, Department of Informational Technology, M. S. Bidve Engineering College, SRTMU Nanded University, Latur, India. Prof. Praful P. Maktedar, Department of Informational Technology, M. S. Bidve Engineering College, SRTMU Nanded University, Latur, India. In this approach, each node governs that whether a node is forwarded a packet or not, in same way, each node try to monitor its forwarded node for efficient data packet transmission process. Path rater is run by each node. Each node assign rating to its known node such that previously unknown nodes are assigns as neutral nodes with rating 0.5. The suspected misbehaving nodes are rated with negative value while other nodes having positive rating between 0 to 0.8 value. Each node wills successfully forwarded data packets must sent an acknowledgement to its previous node [2]. In case of packet loss, node will send NACK means not acknowledgement message to its previous node so that retransmission of lost packet took placed. Fig.1 illustrate Mobile Ad hoc network. It involves of 9 mobiles nodes. From node A data transmission route is present to convey packets to node C. All nodes are present in each other’s range. Fig. 1- Mobile Ad hoc Network All the nodes are symmetrical hence they communicate with each other. Energy of sensor nodes is noteworthy aspect once they scattered in particular network. It is not possible to afford additional energy supply to sensor nodes. So we must considerate energy usage of nodes by avoiding unnecessary energy consumptions [3]. Energy is used for data transmission as well as reception processes. Excess energy usage will adversely influence on network lifetime. Buffer scheduling, data transmission, dropping delay, are assured surplus elements which side effect energy feedings. II. LITERATURE SURVEY X. Xiang et al [4] proposed that multicast is proficient technique in group communication in MANET. But it is problematic to advancing multicast packet and group membership management since of dynamic topology. We planned a novel Efficient Geographic Multicast Protocol (EGMP). It is self-contained, unassuming, well-organized protocol. EGMP practices virtual zone based structure that is bidirectional trace is built to attain extra proficient Investigation of Energy Consumption MANET D. V. Biradar, Praful P. Maktedar
  • 2. Investigation of Energy Consumption in MANET 32 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. membership management and multicast distribution [5]. It resourcefully diminishes overheads for route examining and tree structure maintenance. As a replacement for addressing only precise portion of problem, it comprises zone based scheme to professionally switch group membership management and competently trace locations of all group members without resorting to external server location [6]. Zone is space somewhere mobile nodes are existent and location derivation. Robert J. Hall et al [7] projected that Geographic addressing of packets (geoaddressing) is completed via geocast protocol where nodes are selectively retransmit packets founded on local decision Guidelines. It has 2 kinds as a) Flooding Approach- It is generating high load so its unsalable b) Scalable Approach- It has deficiency in adequate intellect nearby essential directionality of packets movement [8]. Hence we recommended “Center distance with priority (CD-P)” It considerably develops scalability and Reliability of a system. It is established upon three significant concepts as first a node retransmits if it is closer to the center of geocast region than all other duplicates it has perceived communicated. Second it is attends to all other retransmissions uninterruptedly former to its individual retransmission & withdraws its own if it catches another node transmits closer to the center first [9]. Third Scalability depend on each node ranking its send queue to send soonest to those packets that mark it post development near center of geocast regions. Zhenzhen Ye et al [10] estimated that. Each node essentials to withstand its location information by Normally updating its location information within its neighboring region ,Which is called as ”Neighborhood Update(NV)”.And Sometimes updating its information of location to definite distributed location server in the N/W which is called “Location Server Updates (LSU)”. The cost of operation in Location updates is primary problematic so to sidestep this we advance ”Markov Decision Process (MDP)” In which we first explores NU & LSU properties with respect to location impreciseness under the overall cast situations. As in MENET all nodes are movable so we cannot expect precise locality of any node within given space. MDP supports us to ensure this [11]. III. PERFORMANCE ANALYSIS We use Network Simulator (NS2) tool for simulation of nodes present in a given network area. We take 50 nodes as one of them is sink node. Reporting rate of packets is 10 packets per second. We use random topology. IEEE 802.11 Medium Access Control (MAC) protocol is used and Ad Hoc on Demand Routing Protocol (AODV) routing protocol is used. On the basis of this scenario we can draw the following graphs. Fig. 2- PDR in % as a function of Packet Size in bytes Fig. 2 shows the graph of packet delivery ratio (PDR) in percentage (%) as a function of packet size in bytes. At the creation, when packet size is 50, PDR is high. But as packet size increases; PDR decreases. Since due to rise in packet size, congestion in given network may upturns so packets does not catch an accurate path to reach to destination. Nodes that are added in given network go in starvation mode. They neither transmitting data packets nor receiving data packets which results in decreasing PDR rate of a given network. Fig. 3- PLR in % as a function of Packet Size in bytes Fig. 3 indicate that the graph of packet loss ratio (PLR) in percentage (%) as a function of packet size in bytes. At the launch, when packet size is 50, PLR is low. But as the packet size increases, PLR also increase for the reason that of increase in packet size congestion occurred in network so that nodes might not capable to reach to sink node. Each node encloses huge expanse of information. So loss of any one data packet will cause large information loss. Therefore, PLR increases. Fig. 4- Throughput in kbps as a function of Packet Size in bytes
  • 3. International Journal of Innovative Science and Modern Engineering (IJISME) ISSN: 2319-6386, Volume-3 Issue-2, January 2015 33 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. Fig. 4 shows the graph of Throughput in kbps as a function of packet size in bytes. At commencement, when packet size is 50 then throughput is short. But as the packet size surges throughput also upsurges since data packets may perhaps develop a perfect track to reach to end. Fig. 5- Control Overheads as a function of Packet Size in bytes Fig. 5 demonstrate that the graph of Control Overheads as a function of packet size in bytes. At first, when packet size is 50 then Control Overheads is small. But as the packet size further increases Control Overheads also increases because with handshaking process the connection is established between source node and sink node and data transmission process is ongoing successfully. Fig. 6- Average Energy in joule as a function of Packet Size in bytes Fig. 6 appearances the graph of Average Energy in joule as a function of packet size in bytes. At the opening, when packet size is 50 then Average Energy is high. But as the packet size supplementary growths then Average Energy reduced because primarily energy is used for handshaking process as well as determining route for data transmission process. IV. CONCLUSION In this paper, subsequently investigation of five graphs we accomplish that throughout the data transmission procedure we illustrate precious fluctuations. From fig. 2 we had grasped that as packet size of data upturns PDR rate is falls. Likewise from fig. 3 notice that as packet size raises PLR rate growths. From Fig. 4 we approximately note down that Throughput is reliant on upon packet size of data. Fig. 5 shows that control overheads are increases with increase in packet size. Fig.6 displays average energy consumption is reduced .It contributes enhanced results to the user. Hence it is demonstrate that packet size affects on number of packets received at destination end through data transmission procedure. REFERENCES [1] Richard j. La and Eunyoung Seo,” Expected Routing Overheads for location service in MANET under flat geographic routing”, vol. 10, issue 3, March 2011. [2] Seungjin Park, Seong-Moo Yoo”An Efficient Reliable one- hop broadcast in Mobile Ad hoc Networks”, vol. 11, April 2012, pp 19-28. [3] Mario di Franceseo, Giuseppe Anastani, Marco County and Sajal K. Das,”Reliability and Energy Efficiency in Wireless Sensor network”, vol. 29, issue 8, Sept. 2011. [4] X. Xiang, X. Wang, Y. yang,”Supporting Efficient and Scalable Multicast for Mobile andAd hoc Networks”, vol. 10, No 5, April 2011. [5] Lajos Hanzo, Rahim Tafazolli,”QoS aware Routing and Admission Control in Shadow-Fading Environments for Multirate MANETs” in IEEE journal, vol. 10, No. 5, May 2011. [6] Yunhaui Liu, Yanmin Zhu, Lionel Mni and Guangtao Xue, “A Relibility Oriented Transmission Services in Wireless Sensor network” Journal IEEE transactions on parallel and Distributed Syatems, vol. 22, issues 12, Dec. 2011, pp 2100-2107. [7] Robert J.Hall,” An Improved Geocast for Mobile Ad hoc Networks”, IEEE communication letters, vol. 10, No. 2, Feb. 2011. [8] Shoubhik Mukhopadhyay, Debashis Panigrahi,”Model Based Techniques for Data Reliability in Wireless Sensor Network”, vol. 8, issues 4, April 2009. [9] Shengbo Yang, Chai Kiat Yeo, Bu Sung Lee ,“Towards Reliable data delivery for highly Dynamic Mobile Ad hoc Networks” Journal IEEE transactions on parallel and Distributed Syatems, vol. 22, issues 12, Dec. 2011, pp 2100-2107. [10] Zhenzhen Ye ,AlhussionA.Abouzeid,” Optimal Stochastic Location updates in mobile Ad Hoc Networks”, vol. 10, No. 5, May 2011. [11] Hong Luo, Huadong Ma and Sajal K. Das,”Data Fusion with Desired Reliability in Wireless Sensor networks”,vol. 22, March 2011. Mr. D. V. Biradar, HOD, Information Technology Department, M.S. Bidve Engineering College, holds Bachelors and Masters Degree of Engineering in Electronics from SRTMU, Nanded University, state Maharashtra, country India in 2003 . Currently he is doing his research work in Mobile Ad hoc Network and Wireless Sensor Networks. His 23 years of teaching experience is an asset to the organization. He is working as Associate Professor in Department of IT, His expertise in the field of Wireless computer Networks and Embedded system helps in guidance to the PG students. Mr. Praful P. Maktedar, Assistant Professor, Information Technology Department, M.S. Bidve Engineering College, holds Bachelor’s Degree of Engineering in IT from SRTMU, Nanded University, and Master’s Degree in IT from Pune University, state Maharashtra, country India in 2015. Currently he is doing his research work in Wireless Sensor Networks and Network Security. He is working as Assistant Professor in Department of IT.