SlideShare a Scribd company logo
1 of 7
Download to read offline
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY,
VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303
IJTET©2015 75
Energy Saving DSR and Probabilistic
Rebroadcast Mechanism are used to Increase
Routing Performance in MANET
A.Kayalvizhi1
1
SVS College of Engineering, Computer Science and
Engineering
akayalvizhi174@gmail.com
R.Karthik2
2
SVS College of Engineering, Computer Science and
Engineering
karthikofficialsvs@gmail.com
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile
ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries.
The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective
data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it
has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level
of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR
and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source
Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of
mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic
rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing
overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network
simulator.
Index Terms—Mobile ad hoc networks, Energy Saving Dynamic Source Routing, probabilistic rebroadcast, routing
overhead.
——————————  ——————————
1 INTRODUCTION
mobile ad hoc network (MANET) is a self
organizing network, it comprising a set of wireless
mobile nodes that move around freely and can able
to communicate among themselves using wireless
radios, there is no any centralized administration. In ad
hoc networks all nodes are mobile and can be connected
dynamically in an arbitrary manner and each node can
act as sender, receiver and router at the same time.
These nodes can be dynamically self-organized into
arbitrary topology networks without a fixed
infrastructure. Ad hoc routing protocols can be
classified into three main categories based on the
number of senders and receivers in group computing
environment: Unicast, Multicast and Broadcast routing
protocols. In unicast routing the communication is
simply one-to-one that is a separate transmission stream
from source to destination for each recipient. Multicast
communications are both one-to-many and many-to
many traffic pattern i.e. to transmit a single message to a
selective group of recipients where as in broadcast
routing communications is one-to-all traffic pattern. It is
a basic mode of operation in wireless medium that
provides important control and route establishment
functionality for a number of on demand unicast and
multicast protocols. When designing broadcast protocols
for ad hoc networks, developers seek to reduce the
overhead such as collision and retransmission, while
reaching all the network nodes. One of the fundamental
challenges of MANETs is the design of dynamic routing
protocols with good performance and less overhead with
maximize network lifetime. Many routing protocols,
such as Ad hoc On-demand Distance Vector Routing
(AODV) and Dynamic Source Routing (DSR), have
been proposed for MANETs. The above two protocols
are Ad-hoc on demand routing protocols, and they could
increase the scalability of MANETs by limiting the
routing overhead when a new route is requested. Node
mobility in MANETs, frequent link breakages results to
frequent path failures and packet collision, which could
increase the overhead of routing protocols and reduce
the packet delivery ratio and increasing the end-to-end
delay. Reducing the routing overhead in route discovery
is an essential problem. In a route discovery,
broadcasting is a fundamental and effective data
dissemination mechanism, where a mobile node can
A
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY,
VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303
IJTET©2015 76
rebroadcasts the first received route request packets
unless it has a route to the destination, and thus it causes
the broadcasting problem in the network. The
conventional on-demand routing protocols use the
simple flooding to discover a route. They broadcast a
Route REQuest (RREQ) packet to the networks, and the
broadcasting induces increased redundant
retransmissions of RREQ packet and causes the
broadcast storming problem, it results to a considerable
number of packet collisions and congestion, especially
in dense networks. Some methods and mechanisms have
been proposed to optimize the broadcast problem in
MANETs in the past few years. By categorized
broadcasting protocols into five classes: ―simple
flooding method, probabilistic rebroadcast-based
methods, coverage area-based methods, neighbor
knowledge methods, and Energy consideration routing‖.
In the simple flooding method, the initializing node i.e.
source node first broadcast a packet to all neighbors by
consider each node energy level. It is forwarded by
every neighbor in the network exactly once until all
reachable network nodes have received that packet.
Though simple flooding method ensures the complete
coverage, it has the largest forward node set and may
cause broadcast storm problem in the network.
Probabilistic rebroadcast and neighbor coverage based
methods are proposed to solve the broadcast storm
problem. They showed that an increase in the number of
nodes in a static network will degrade the performance
of the probability-based and area-based methods.
Energy efficiency routing is of paramount significance
for MANETs design since the mobile nodes in such
networks are typically run by a battery power. Minimum
Power or Power failure of a mobile node does not only
affect the node itself but also its ability to forward
packets on behalf of others and thus the overall network
lifetime. For this reason, many research efforts have
been devoted to prolong the mobile node battery
capacity at different aspects. Energy considerable
routing is based on each nodes energy capability at the
time of route request. For limiting the number of
rebroadcasts can effectively optimize the routing, and
neighbor knowledge methods perform better than the
area-based ones and the probability-based ones, then
propose an Energy considerable routing with neighbor
coverage based probabilistic rebroadcast. Therefore1. in
order to send a RREQ by considering the energy level of
each neighboring node. 2. in order to effectively exploit
the neighbor coverage knowledge, need a novel
rebroadcast delay to determine the rebroadcast order,
and then can obtain a more accurate coverage ratio. 3.
in order to keep the network connectivity and reduce the
redundant retransmissions, need a metric named
connectivity factor to determine how many neighbors
should receive the RREQ packet. After that, by consider
the both additional coverage ratio and the connectivity
factor, originate a probabilistic rebroadcast, can be used
to reduce the number of rebroadcasts of the RREQ
packet, it can improve the routing performance.
The remainder of this paper is as follows.
Section II describes related work on routing protocol in
MANETs. Section III describes the design and
formulation details of our proposed routing scheme.
Section IV The computer simulation, related experiment
settings, and comparisons between DSR and existing.
Section V concludes this paper.
2 RELATED WORKS
Ad hoc routing algorithms broadly can be
categorized into proactive and reactive. The reactive
routing algorithms originate to find out the suitable
route when a route is needed or requested. The Proactive
routing algorithms exchange each node routing
information periodically and generates the routing table
in advance of route request from source. These kinds of
protocols select the routes based on the metrics of
minimum hop count. Broadcasting is an effective
mechanism for route maintenance and discovery, but the
routing overhead associated with the broadcasting can
be quite large, especially in high dynamic networks.
Routing protocols are proposed for Ad hoc networks
and their classification of these schemes according to
the routing strategy (i.e., table driven and on-demand).
Table-driven routing protocols, such as DSDV and
OLSR, attempt to maintain consistent and up-to-date
routing information from each node to every other node
in the network. Each mobile node is required to
periodically discover and maintain routes to every
possible destination in the network. In the reactive
routing protocols are, such as AODV and DSR, routes
are discovered only when they are needed. Each node
maintains a route for a perfect route of source to
destination pair without the use of periodic routing table
exchanges or full network topological view.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY,
VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303
IJTET©2015 77
TABLE 1
COMPARISON TABLE
Sr.
No.
AODV DSR DSDV
1 It is
Reactive
Protocol
It is
Reactive
Protocol
It is Proactive Protocol
2 It has
low end
to end
delay
It has
low end
to end
delay.
It has high for pause
time 0 but it starts
decreasing as
time increases
3 It
performs
better for
larger
number
of nodes
It
performs
better
for
larger
number
of
nodes
It performs better for
few
number of nodes
4 It
delivers
virtually
all
packets
at low
mobility
It is very
good at
all
mobility
rates.
It performs almost as
DSR, but requires
transmission overheads
of many packets.
5 For real
time
traffic
AODV is
preferred.
For real
time
traffic
DSR is
not
preferred
For real time traffic
DSDV is not preferred
Dynamic Probabilistic Route Discovery (DPR)
scheme based on neighbor coverage knowledge. This
approach, each node consider the forwarding probability
according to the number of its neighbors and the set of
neighbors which are covered by the before or previous
broadcasting. This scheme only considers the coverage
ratio by the prefix node, and it cannot consider the
neighbors receiving the duplicate RREQ packet.
3 PROPOSED SYSTEM
On demand and Proactive protocols select the
routes based on the metrics of minimum hop count.
Energy efficiency routing is of paramount significance
for MANETs design since the mobile nodes in such
networks are typically battery has been powered. More
Power consumption or failure of a mobile node does not
only affect the node itself but also its ability to forward
packets on behalf of others and thus it can affect
overall network lifetime. Consider these reasons, many
research efforts have been devoted to prolong the
mobile node battery capacity at different aspects.
Fig 1. Architecture diagram
3.1 ENERGY SAVING DYNAMIC SOURCE
ROUTING
Include communication energy consumption and
Non communication energy consumption. Design and
manufacturing of less energy consume components of
mobile nodes are to reduce non communication energy
consumed. In the communication energy is consumed in
either inactive state of communication or active
communication states. The energy consumption of
active communication is more significant than the others
for high traffic environment. Energy efficient routing
protocols are designed to formulate energy efficient
active communications. Energy efficient in the active
communications increase the network life time. The life
time of the network is defined as the time when a node
runs out of its own battery power for the first time. The
energy efficient routing protocols should consider the
power consumption from the viewpoints of both the
network and the node.
 Transmission power control approach
 Load distribution approach.
 sleep/power-down mode
A. Transmission Mode
A node is said in transmission mode when it
sends data packet to other nodes in network. Those
nodes need energy to transfer data packet, this kind of
energy is called Transmission Energy  xT of that
nodes. Transmission energy can be depended on the size
of each data packet (in Bits). The transmission energy is
given by:
  6
10*2/*330 lengthx PT 
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY,
VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303
IJTET©2015 78
And
txT TTP 
Where xT is refer as Transmission Energy, TP is refer
as Transmission Power, tT is time taken to transmit
data packet and lengthP is length of data packet in Bits.
B. Reception Mode
When a node receives a data packet from other
nodes then it said to be in Reception Mode and the
energy taken to receive packet is called Reception
Energy  xR . Then Reception Energy can be given as:
  6
10*2/*230 lengthx PR 
And rxR TRP 
Where xR is a Reception Energy, RP is a Reception
Power, rT is a time taken to receive data packet and
lengthP is length of data packet in Bits.
C. Idle Mode
In this mode generally the node is neither
transmitting nor receiving any data packets. But this
mode consumes power because the nodes have to listen
to the wireless medium continuously in order to detect a
packet that it should receive so that the node can then
switch into receive mode from idle mode. Despite the
fact that while in idle mode the node does not actually
handle data communication operations it was found that
the wireless interface consumes a considerable amount
of energy. Then power consumed in Idle Mode is:
RI PP 
Where IP is power consumed in Idle Mode and RP is
power consumed in Reception Mode.
D. Overhearing Mode
When a node receives data packets that are not
destined for it, then it said to be in overhearing mode
and it may consume energy used in the receiving mode.
Unnecessarily receiving those packets will cause energy
consumption. Then power consumption in this
overhearing mode is:
Rover PP 
Where overP is power consumed in Overhearing Mode
and RP is power consumed in Reception Mode
 The Source node consider as S wants to send
data to the destination node D, it will first send
REQ message to all its neighbor nodes.
 When neighbor nodes receive REQ message
they will check their Route Cache, if this
packet’s ID is already in their Route Cache
then packet will be discarded.
 Otherwise, node will calculate its power by
using:
overmthrtxnew PPPPPP 
and send this value as a route reply to source.
 Source node will calculate the mean value of
all the values of newP of all the nodes and
send a RREQ message to the node whose
newP value is nearest to the mean value.
 When the node receives a RREQ message it
will send REQ message to its own neighbors
and this process will be continued till the
destination node reaches.
 When destination node will receive the RREQ
message it will send the RREP message back
with the same route.
 RREP process is same as in the traditional
protocol DSR
3.2 NEIGHBOR COVERAGE KNOWLEDGE-
BASED PROBABILISTIC REBROADCAST
MECHANISM
In this section, calculate the rebroadcast delay
and rebroadcast probability of the proposed system. Use
the upstream coverage ratio of an RREQ packet
received from the previous node to calculate the
rebroadcast delay, and then use the additional coverage
ratio of the RREQ packet and the connectivity factor to
calculate the rebroadcast probability, which requires that
each node needed their one hop neighborhood
information.
A. Uncovered Neighbors Set and Rebroadcast
Delay
When node in receives an RREQ packet
from its previous node s , it can use the neighbor list in
the RREQ packet to estimate how many its neighbors
have not been covered by the RREQ packet from s . If
node in has more neighbors uncovered by the RREQ
packet from s , which means that if node in
rebroadcasts the RREQ packet, the RREQuest packet
can reach more number of additional neighbor nodes.
To quantify this, define the UnCovered Neighbors set
 inU of node in as follows:
          ssNnNnNnU iii 
where  sN and  inN are the neighbors
sets of node s and in , respectively. s is the node
which sends an RREQ packet to node in . In order to
sufficiently exploit the neighbor knowledge and avoid
collisions and congestion, each node in the network
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY,
VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303
IJTET©2015 79
should set a rebroadcast delay. When a neighbor node
receives a RREQ packet from its source, it could
calculate the rebroadcast delay according to the
neighbor list in the RREQ packet and its own neighbor
list. The rebroadcast delay  id nT of node in is
defined as follows:
 
   
 sN
nNsN
nT
i
ip

1
 ipd nTMaxDelayT 
Where  ip nT is the delay ratio of node in ,
and MaxDelay is a small constant delay. | . | is the
number of elements in a set. The above rebroadcast
delay is defined with the following reasons: initially, the
delay time is used to determine the node transmission
order. When node s sends an RREQ packet, all its
neighbors in , i = 1, 2 . . .  sN receive and process
the RREQ packet. Assume that node kn has the largest
number of common neighbors with node s , according
to the above formula, node kn has the lowest delay.
The objective of this rebroadcast delay is not to
rebroadcast the RREQ packet to more nodes, but to
broadcast the neighbor coverage knowledge more
quickly. If node in receives a duplicate RREQ packet
from its neighbor jn , it knows that how many its
neighbors have been covered by the RREQ packet from
jn . Thus, UCN set according to the neighbor list in the
RREQ packet from jn . Then, the  inU can be
adjusted as follows:
        jiii nNnUnUnU 
After adjusting the  inU , the RREQ packet received
from jn can be removed. When the time of the
rebroadcast delay of node in expires, the node obtains
the final UCN set. Note that, if a node does not sense
any duplicate RREQ packets from its neighborhood, its
uncovered neighbor set does not changed, which is the
initial UCN set. Define the additional coverage ratio
  ia nR of node in as :
 
 
 i
i
ia
nN
nU
nR 
This metric indicates the ratio of the number of nodes
that are additionally covered by this rebroadcast to the
total number of neighbors of node in . aR becomes
bigger, more nodes will be covered by this rebroadcast,
and several nodes need to receive and each node process
the RREQ packet, and then the rebroadcast probability
can set to be higher. If each node connects to more than
5:1774 log n of its coverage neighbors, then the
rebroadcast probability of the selected network be in
connected is approaching 1 as n increases, where n is
the total number of nodes in the network. Then, use
5.1774 log n as the connectivity metric of the network.
Assume the ratio of the number of nodes that need to
receive the RREQ packet to the total number of
neighbors of node in is  ic nF . In order to keep the
probability of network connectivity approaching 1, a
heuristic formula:
 inN .  ic nF 5.1774 log n. Then, define the
minimum  ic nF as,
 
 i
c
ic
nN
N
nF 
where cN = 5.1774 log n, and n is the number of nodes
in the network. From ,observe that when  inN is
greater than cN ,  ic nF is less than 1. That means
node in is in the dense area of the network, then only
part of neighbors of node in forwarded the RREQ
packet could keep the network connectivity. And when
 inN is less than cN ,  ic nF is greater than 1.
That means node in is in the sparse area of the
network, then node in should forward the RREQ
packet in order to approach network connectivity.
Combining the additional coverage ratio and
connectivity factor, obtain the rebroadcast probability
 ire nP of node in :
     iaicire nRnFnP 
where, if the  ire np is greater than 1, set the
 ire nP to 1. Note that the calculated rebroadcast
probability  ire nP may be greater than 1, but it does
not impact the behavior of the protocol. It just shows
that the local density of the node is so low that the node
must forward the RREQ packet. Then, node in need to
rebroadcast the RREQ packet received from s with
probability  ire nP .
4 SIMULATION RESULTS
The simulation work for the proposed Technique
MESDSR is done in NS-2. The simulation result shows
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY,
VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303
IJTET©2015 80
that he proposed method is more efficient than the
existing method.
4.1 Throughput
Network throughput is the average rate of
successful message delivery over a communication
channel.
Fig 1. Throughput vs. Number of Nodes
4.2 Packet Delivery Fraction
Packet Delivery Fraction is the ratio of number of
data packets successfully delivered to the destination.
The figure 8 shows the better performance of MESDSR
as compare to DSR. ESDSR provides considerable
improvement of PDF.
Fig 2. Packet Delivery Fraction vs. Nodes
4.3 Average Energy consumption
Average energy consumption is the ratio of total
energy consumed by all the nodes in the network by
the number of nodes. The figure 9 shows the graph of
average energy consumption vs. number of nodes and
the nodes in MESDSR will consume less energy as
compare to the nodes in DSR.
Fig 3 Average Energy Consumption vs. Number of
Nodes
5 CONCLUSION
In this paper, proposed an ESDSR and probabilistic
rebroadcast mechanism based on neighbor coverage to
reduce the routing overhead and increase network
lifetime in MANETs. This neighbor coverage
knowledge includes additional coverage ratio and
connectivity factor. Proposed a new scheme to
dynamically calculate the rebroadcast delay, which is
used to determine the forwarding order and more
effectively exploit the neighbor coverage knowledge.
Simulation results show that the proposed system
generates the increasing throughput, PDR and reduce in
End to End delay. Because of less redundant
rebroadcast, the proposed mechanism mitigates the
network collision and contention, so as to increase the
packet delivery ratio and decrease the average end-to-
end delay. The simulation results also show that the
proposed has good performance when the network is in
high density or the traffic is in heavy load.
REFERENCES
[1] T. Clausen and P. Jacquet, ―Optimized Link
State Routing Protocol (OLSR),‖ RFC 3626,
Oct.2003.
[2] C. E. Perkins and P. Bhagwat, ―Highly
dynamic Destination-Sequenced Distance
Vector Routing (DSDV) for mobile
computers,‖ Comput Commun. Rev., vol. 24,
pp. 234–244, Oct. 1994.
[3] C. E. Perkins and E. M. Royer, ―Ad hoc On-
Demand Distance Vector (AODV) routing,‖
RFC 3561, Jul. 2003.
[4] D. B. Johnson, Y.-C. Hu, and D. A. Maltz,
―On The Dynamic Source Routing Protocol
(DSR) for mobile ad hoc networks for IPv4,‖
RFC 4728,Feb. 2007.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY,
VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303
IJTET©2015 81
[5] Chlamtac, M. Conti, and J.-N. Liu, ―Mobile ad
hoc networking: Imperatives and challenges,‖
AdHoc Netw., vol. 1, no. 1, pp. 13–64, Jul.
2003.
[6] Z. Wang, Y. Chen, and C. Li, ―CORMAN: A
novel cooperative opportunistic routing
scheme in mobile ad hoc networks,‖ IEEE J.
Sel. Areas Commun., vol. 30, no. 2, pp. 289–
296, Feb. 2012.
[7] S.Y. Ni, Y.C. Tseng, Y.S. Chen, and J.P.
Sheu,―The Broadcast Storm Problem in a
Mobile Ad Hoc Network,‖ Proc.ACM/IEEE
MobiCom, pp. 151-162, 1999.
[8] J. Kim, Q. Zhang, and D.P. Agrawal,
―Probabilistic Broadcasting Based on
Coverage Area and Neighbor Confirmation in
Mobile Ad Hoc Networks,‖ Proc. IEEE
GlobeCom, 2004.
[9] Chansu Yu, Ben Lee Hee and Yong Youn,
―Energy Efficient Routing Protocols for
Mobile Ad hoc Networks‖, June 4, 2007.

More Related Content

What's hot

Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksEditor IJCATR
 
muti path encrypted data security architecture for mobile adhoc networks
muti path encrypted data security architecture for mobile adhoc networksmuti path encrypted data security architecture for mobile adhoc networks
muti path encrypted data security architecture for mobile adhoc networksPraveen Yadav
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...eSAT Journals
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
Secure routing and data transmission in mobile
Secure routing and data transmission in mobileSecure routing and data transmission in mobile
Secure routing and data transmission in mobileIJCNCJournal
 
COMPARATIVE STUDY OF IP TRACEBACK TECHNIQUES
COMPARATIVE STUDY OF IP TRACEBACK TECHNIQUESCOMPARATIVE STUDY OF IP TRACEBACK TECHNIQUES
COMPARATIVE STUDY OF IP TRACEBACK TECHNIQUESJournal For Research
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
 
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLINGAN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLINGSreelekshmi S
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attackseSAT Publishing House
 
Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packeteSAT Publishing House
 
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...eSAT Journals
 
Csit54201
Csit54201Csit54201
Csit54201csandit
 
SECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSSECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSAnkur Singhal
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black holeijasa
 
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsPrevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsIOSR Journals
 

What's hot (19)

Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
 
muti path encrypted data security architecture for mobile adhoc networks
muti path encrypted data security architecture for mobile adhoc networksmuti path encrypted data security architecture for mobile adhoc networks
muti path encrypted data security architecture for mobile adhoc networks
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Secure routing and data transmission in mobile
Secure routing and data transmission in mobileSecure routing and data transmission in mobile
Secure routing and data transmission in mobile
 
COMPARATIVE STUDY OF IP TRACEBACK TECHNIQUES
COMPARATIVE STUDY OF IP TRACEBACK TECHNIQUESCOMPARATIVE STUDY OF IP TRACEBACK TECHNIQUES
COMPARATIVE STUDY OF IP TRACEBACK TECHNIQUES
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLINGAN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packet
 
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Csit54201
Csit54201Csit54201
Csit54201
 
Ez33917920
Ez33917920Ez33917920
Ez33917920
 
SECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSSECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETS
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsPrevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
 

Similar to Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increase Routing Performance in MANET

A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET Journal
 
A survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsA survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsIAEME Publication
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksIJTET Journal
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...ijwmn
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...ijwmn
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorIRJET Journal
 
rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 

Similar to Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increase Routing Performance in MANET (20)

A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
 
A survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsA survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane ts
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
E1073644
E1073644E1073644
E1073644
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulator
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 

More from IJTET Journal

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityIJTET Journal
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiIJTET Journal
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesIJTET Journal
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterIJTET Journal
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
 

More from IJTET Journal (20)

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
 

Recently uploaded

Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 

Recently uploaded (20)

Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 

Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increase Routing Performance in MANET

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY, VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303 IJTET©2015 75 Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increase Routing Performance in MANET A.Kayalvizhi1 1 SVS College of Engineering, Computer Science and Engineering akayalvizhi174@gmail.com R.Karthik2 2 SVS College of Engineering, Computer Science and Engineering karthikofficialsvs@gmail.com Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator. Index Terms—Mobile ad hoc networks, Energy Saving Dynamic Source Routing, probabilistic rebroadcast, routing overhead. ——————————  —————————— 1 INTRODUCTION mobile ad hoc network (MANET) is a self organizing network, it comprising a set of wireless mobile nodes that move around freely and can able to communicate among themselves using wireless radios, there is no any centralized administration. In ad hoc networks all nodes are mobile and can be connected dynamically in an arbitrary manner and each node can act as sender, receiver and router at the same time. These nodes can be dynamically self-organized into arbitrary topology networks without a fixed infrastructure. Ad hoc routing protocols can be classified into three main categories based on the number of senders and receivers in group computing environment: Unicast, Multicast and Broadcast routing protocols. In unicast routing the communication is simply one-to-one that is a separate transmission stream from source to destination for each recipient. Multicast communications are both one-to-many and many-to many traffic pattern i.e. to transmit a single message to a selective group of recipients where as in broadcast routing communications is one-to-all traffic pattern. It is a basic mode of operation in wireless medium that provides important control and route establishment functionality for a number of on demand unicast and multicast protocols. When designing broadcast protocols for ad hoc networks, developers seek to reduce the overhead such as collision and retransmission, while reaching all the network nodes. One of the fundamental challenges of MANETs is the design of dynamic routing protocols with good performance and less overhead with maximize network lifetime. Many routing protocols, such as Ad hoc On-demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR), have been proposed for MANETs. The above two protocols are Ad-hoc on demand routing protocols, and they could increase the scalability of MANETs by limiting the routing overhead when a new route is requested. Node mobility in MANETs, frequent link breakages results to frequent path failures and packet collision, which could increase the overhead of routing protocols and reduce the packet delivery ratio and increasing the end-to-end delay. Reducing the routing overhead in route discovery is an essential problem. In a route discovery, broadcasting is a fundamental and effective data dissemination mechanism, where a mobile node can A
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY, VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303 IJTET©2015 76 rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcasting problem in the network. The conventional on-demand routing protocols use the simple flooding to discover a route. They broadcast a Route REQuest (RREQ) packet to the networks, and the broadcasting induces increased redundant retransmissions of RREQ packet and causes the broadcast storming problem, it results to a considerable number of packet collisions and congestion, especially in dense networks. Some methods and mechanisms have been proposed to optimize the broadcast problem in MANETs in the past few years. By categorized broadcasting protocols into five classes: ―simple flooding method, probabilistic rebroadcast-based methods, coverage area-based methods, neighbor knowledge methods, and Energy consideration routing‖. In the simple flooding method, the initializing node i.e. source node first broadcast a packet to all neighbors by consider each node energy level. It is forwarded by every neighbor in the network exactly once until all reachable network nodes have received that packet. Though simple flooding method ensures the complete coverage, it has the largest forward node set and may cause broadcast storm problem in the network. Probabilistic rebroadcast and neighbor coverage based methods are proposed to solve the broadcast storm problem. They showed that an increase in the number of nodes in a static network will degrade the performance of the probability-based and area-based methods. Energy efficiency routing is of paramount significance for MANETs design since the mobile nodes in such networks are typically run by a battery power. Minimum Power or Power failure of a mobile node does not only affect the node itself but also its ability to forward packets on behalf of others and thus the overall network lifetime. For this reason, many research efforts have been devoted to prolong the mobile node battery capacity at different aspects. Energy considerable routing is based on each nodes energy capability at the time of route request. For limiting the number of rebroadcasts can effectively optimize the routing, and neighbor knowledge methods perform better than the area-based ones and the probability-based ones, then propose an Energy considerable routing with neighbor coverage based probabilistic rebroadcast. Therefore1. in order to send a RREQ by considering the energy level of each neighboring node. 2. in order to effectively exploit the neighbor coverage knowledge, need a novel rebroadcast delay to determine the rebroadcast order, and then can obtain a more accurate coverage ratio. 3. in order to keep the network connectivity and reduce the redundant retransmissions, need a metric named connectivity factor to determine how many neighbors should receive the RREQ packet. After that, by consider the both additional coverage ratio and the connectivity factor, originate a probabilistic rebroadcast, can be used to reduce the number of rebroadcasts of the RREQ packet, it can improve the routing performance. The remainder of this paper is as follows. Section II describes related work on routing protocol in MANETs. Section III describes the design and formulation details of our proposed routing scheme. Section IV The computer simulation, related experiment settings, and comparisons between DSR and existing. Section V concludes this paper. 2 RELATED WORKS Ad hoc routing algorithms broadly can be categorized into proactive and reactive. The reactive routing algorithms originate to find out the suitable route when a route is needed or requested. The Proactive routing algorithms exchange each node routing information periodically and generates the routing table in advance of route request from source. These kinds of protocols select the routes based on the metrics of minimum hop count. Broadcasting is an effective mechanism for route maintenance and discovery, but the routing overhead associated with the broadcasting can be quite large, especially in high dynamic networks. Routing protocols are proposed for Ad hoc networks and their classification of these schemes according to the routing strategy (i.e., table driven and on-demand). Table-driven routing protocols, such as DSDV and OLSR, attempt to maintain consistent and up-to-date routing information from each node to every other node in the network. Each mobile node is required to periodically discover and maintain routes to every possible destination in the network. In the reactive routing protocols are, such as AODV and DSR, routes are discovered only when they are needed. Each node maintains a route for a perfect route of source to destination pair without the use of periodic routing table exchanges or full network topological view.
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY, VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303 IJTET©2015 77 TABLE 1 COMPARISON TABLE Sr. No. AODV DSR DSDV 1 It is Reactive Protocol It is Reactive Protocol It is Proactive Protocol 2 It has low end to end delay It has low end to end delay. It has high for pause time 0 but it starts decreasing as time increases 3 It performs better for larger number of nodes It performs better for larger number of nodes It performs better for few number of nodes 4 It delivers virtually all packets at low mobility It is very good at all mobility rates. It performs almost as DSR, but requires transmission overheads of many packets. 5 For real time traffic AODV is preferred. For real time traffic DSR is not preferred For real time traffic DSDV is not preferred Dynamic Probabilistic Route Discovery (DPR) scheme based on neighbor coverage knowledge. This approach, each node consider the forwarding probability according to the number of its neighbors and the set of neighbors which are covered by the before or previous broadcasting. This scheme only considers the coverage ratio by the prefix node, and it cannot consider the neighbors receiving the duplicate RREQ packet. 3 PROPOSED SYSTEM On demand and Proactive protocols select the routes based on the metrics of minimum hop count. Energy efficiency routing is of paramount significance for MANETs design since the mobile nodes in such networks are typically battery has been powered. More Power consumption or failure of a mobile node does not only affect the node itself but also its ability to forward packets on behalf of others and thus it can affect overall network lifetime. Consider these reasons, many research efforts have been devoted to prolong the mobile node battery capacity at different aspects. Fig 1. Architecture diagram 3.1 ENERGY SAVING DYNAMIC SOURCE ROUTING Include communication energy consumption and Non communication energy consumption. Design and manufacturing of less energy consume components of mobile nodes are to reduce non communication energy consumed. In the communication energy is consumed in either inactive state of communication or active communication states. The energy consumption of active communication is more significant than the others for high traffic environment. Energy efficient routing protocols are designed to formulate energy efficient active communications. Energy efficient in the active communications increase the network life time. The life time of the network is defined as the time when a node runs out of its own battery power for the first time. The energy efficient routing protocols should consider the power consumption from the viewpoints of both the network and the node.  Transmission power control approach  Load distribution approach.  sleep/power-down mode A. Transmission Mode A node is said in transmission mode when it sends data packet to other nodes in network. Those nodes need energy to transfer data packet, this kind of energy is called Transmission Energy  xT of that nodes. Transmission energy can be depended on the size of each data packet (in Bits). The transmission energy is given by:   6 10*2/*330 lengthx PT 
  • 4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY, VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303 IJTET©2015 78 And txT TTP  Where xT is refer as Transmission Energy, TP is refer as Transmission Power, tT is time taken to transmit data packet and lengthP is length of data packet in Bits. B. Reception Mode When a node receives a data packet from other nodes then it said to be in Reception Mode and the energy taken to receive packet is called Reception Energy  xR . Then Reception Energy can be given as:   6 10*2/*230 lengthx PR  And rxR TRP  Where xR is a Reception Energy, RP is a Reception Power, rT is a time taken to receive data packet and lengthP is length of data packet in Bits. C. Idle Mode In this mode generally the node is neither transmitting nor receiving any data packets. But this mode consumes power because the nodes have to listen to the wireless medium continuously in order to detect a packet that it should receive so that the node can then switch into receive mode from idle mode. Despite the fact that while in idle mode the node does not actually handle data communication operations it was found that the wireless interface consumes a considerable amount of energy. Then power consumed in Idle Mode is: RI PP  Where IP is power consumed in Idle Mode and RP is power consumed in Reception Mode. D. Overhearing Mode When a node receives data packets that are not destined for it, then it said to be in overhearing mode and it may consume energy used in the receiving mode. Unnecessarily receiving those packets will cause energy consumption. Then power consumption in this overhearing mode is: Rover PP  Where overP is power consumed in Overhearing Mode and RP is power consumed in Reception Mode  The Source node consider as S wants to send data to the destination node D, it will first send REQ message to all its neighbor nodes.  When neighbor nodes receive REQ message they will check their Route Cache, if this packet’s ID is already in their Route Cache then packet will be discarded.  Otherwise, node will calculate its power by using: overmthrtxnew PPPPPP  and send this value as a route reply to source.  Source node will calculate the mean value of all the values of newP of all the nodes and send a RREQ message to the node whose newP value is nearest to the mean value.  When the node receives a RREQ message it will send REQ message to its own neighbors and this process will be continued till the destination node reaches.  When destination node will receive the RREQ message it will send the RREP message back with the same route.  RREP process is same as in the traditional protocol DSR 3.2 NEIGHBOR COVERAGE KNOWLEDGE- BASED PROBABILISTIC REBROADCAST MECHANISM In this section, calculate the rebroadcast delay and rebroadcast probability of the proposed system. Use the upstream coverage ratio of an RREQ packet received from the previous node to calculate the rebroadcast delay, and then use the additional coverage ratio of the RREQ packet and the connectivity factor to calculate the rebroadcast probability, which requires that each node needed their one hop neighborhood information. A. Uncovered Neighbors Set and Rebroadcast Delay When node in receives an RREQ packet from its previous node s , it can use the neighbor list in the RREQ packet to estimate how many its neighbors have not been covered by the RREQ packet from s . If node in has more neighbors uncovered by the RREQ packet from s , which means that if node in rebroadcasts the RREQ packet, the RREQuest packet can reach more number of additional neighbor nodes. To quantify this, define the UnCovered Neighbors set  inU of node in as follows:           ssNnNnNnU iii  where  sN and  inN are the neighbors sets of node s and in , respectively. s is the node which sends an RREQ packet to node in . In order to sufficiently exploit the neighbor knowledge and avoid collisions and congestion, each node in the network
  • 5. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY, VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303 IJTET©2015 79 should set a rebroadcast delay. When a neighbor node receives a RREQ packet from its source, it could calculate the rebroadcast delay according to the neighbor list in the RREQ packet and its own neighbor list. The rebroadcast delay  id nT of node in is defined as follows:        sN nNsN nT i ip  1  ipd nTMaxDelayT  Where  ip nT is the delay ratio of node in , and MaxDelay is a small constant delay. | . | is the number of elements in a set. The above rebroadcast delay is defined with the following reasons: initially, the delay time is used to determine the node transmission order. When node s sends an RREQ packet, all its neighbors in , i = 1, 2 . . .  sN receive and process the RREQ packet. Assume that node kn has the largest number of common neighbors with node s , according to the above formula, node kn has the lowest delay. The objective of this rebroadcast delay is not to rebroadcast the RREQ packet to more nodes, but to broadcast the neighbor coverage knowledge more quickly. If node in receives a duplicate RREQ packet from its neighbor jn , it knows that how many its neighbors have been covered by the RREQ packet from jn . Thus, UCN set according to the neighbor list in the RREQ packet from jn . Then, the  inU can be adjusted as follows:         jiii nNnUnUnU  After adjusting the  inU , the RREQ packet received from jn can be removed. When the time of the rebroadcast delay of node in expires, the node obtains the final UCN set. Note that, if a node does not sense any duplicate RREQ packets from its neighborhood, its uncovered neighbor set does not changed, which is the initial UCN set. Define the additional coverage ratio   ia nR of node in as :      i i ia nN nU nR  This metric indicates the ratio of the number of nodes that are additionally covered by this rebroadcast to the total number of neighbors of node in . aR becomes bigger, more nodes will be covered by this rebroadcast, and several nodes need to receive and each node process the RREQ packet, and then the rebroadcast probability can set to be higher. If each node connects to more than 5:1774 log n of its coverage neighbors, then the rebroadcast probability of the selected network be in connected is approaching 1 as n increases, where n is the total number of nodes in the network. Then, use 5.1774 log n as the connectivity metric of the network. Assume the ratio of the number of nodes that need to receive the RREQ packet to the total number of neighbors of node in is  ic nF . In order to keep the probability of network connectivity approaching 1, a heuristic formula:  inN .  ic nF 5.1774 log n. Then, define the minimum  ic nF as,    i c ic nN N nF  where cN = 5.1774 log n, and n is the number of nodes in the network. From ,observe that when  inN is greater than cN ,  ic nF is less than 1. That means node in is in the dense area of the network, then only part of neighbors of node in forwarded the RREQ packet could keep the network connectivity. And when  inN is less than cN ,  ic nF is greater than 1. That means node in is in the sparse area of the network, then node in should forward the RREQ packet in order to approach network connectivity. Combining the additional coverage ratio and connectivity factor, obtain the rebroadcast probability  ire nP of node in :      iaicire nRnFnP  where, if the  ire np is greater than 1, set the  ire nP to 1. Note that the calculated rebroadcast probability  ire nP may be greater than 1, but it does not impact the behavior of the protocol. It just shows that the local density of the node is so low that the node must forward the RREQ packet. Then, node in need to rebroadcast the RREQ packet received from s with probability  ire nP . 4 SIMULATION RESULTS The simulation work for the proposed Technique MESDSR is done in NS-2. The simulation result shows
  • 6. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY, VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303 IJTET©2015 80 that he proposed method is more efficient than the existing method. 4.1 Throughput Network throughput is the average rate of successful message delivery over a communication channel. Fig 1. Throughput vs. Number of Nodes 4.2 Packet Delivery Fraction Packet Delivery Fraction is the ratio of number of data packets successfully delivered to the destination. The figure 8 shows the better performance of MESDSR as compare to DSR. ESDSR provides considerable improvement of PDF. Fig 2. Packet Delivery Fraction vs. Nodes 4.3 Average Energy consumption Average energy consumption is the ratio of total energy consumed by all the nodes in the network by the number of nodes. The figure 9 shows the graph of average energy consumption vs. number of nodes and the nodes in MESDSR will consume less energy as compare to the nodes in DSR. Fig 3 Average Energy Consumption vs. Number of Nodes 5 CONCLUSION In this paper, proposed an ESDSR and probabilistic rebroadcast mechanism based on neighbor coverage to reduce the routing overhead and increase network lifetime in MANETs. This neighbor coverage knowledge includes additional coverage ratio and connectivity factor. Proposed a new scheme to dynamically calculate the rebroadcast delay, which is used to determine the forwarding order and more effectively exploit the neighbor coverage knowledge. Simulation results show that the proposed system generates the increasing throughput, PDR and reduce in End to End delay. Because of less redundant rebroadcast, the proposed mechanism mitigates the network collision and contention, so as to increase the packet delivery ratio and decrease the average end-to- end delay. The simulation results also show that the proposed has good performance when the network is in high density or the traffic is in heavy load. REFERENCES [1] T. Clausen and P. Jacquet, ―Optimized Link State Routing Protocol (OLSR),‖ RFC 3626, Oct.2003. [2] C. E. Perkins and P. Bhagwat, ―Highly dynamic Destination-Sequenced Distance Vector Routing (DSDV) for mobile computers,‖ Comput Commun. Rev., vol. 24, pp. 234–244, Oct. 1994. [3] C. E. Perkins and E. M. Royer, ―Ad hoc On- Demand Distance Vector (AODV) routing,‖ RFC 3561, Jul. 2003. [4] D. B. Johnson, Y.-C. Hu, and D. A. Maltz, ―On The Dynamic Source Routing Protocol (DSR) for mobile ad hoc networks for IPv4,‖ RFC 4728,Feb. 2007.
  • 7. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY, VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303 IJTET©2015 81 [5] Chlamtac, M. Conti, and J.-N. Liu, ―Mobile ad hoc networking: Imperatives and challenges,‖ AdHoc Netw., vol. 1, no. 1, pp. 13–64, Jul. 2003. [6] Z. Wang, Y. Chen, and C. Li, ―CORMAN: A novel cooperative opportunistic routing scheme in mobile ad hoc networks,‖ IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 289– 296, Feb. 2012. [7] S.Y. Ni, Y.C. Tseng, Y.S. Chen, and J.P. Sheu,―The Broadcast Storm Problem in a Mobile Ad Hoc Network,‖ Proc.ACM/IEEE MobiCom, pp. 151-162, 1999. [8] J. Kim, Q. Zhang, and D.P. Agrawal, ―Probabilistic Broadcasting Based on Coverage Area and Neighbor Confirmation in Mobile Ad Hoc Networks,‖ Proc. IEEE GlobeCom, 2004. [9] Chansu Yu, Ben Lee Hee and Yong Youn, ―Energy Efficient Routing Protocols for Mobile Ad hoc Networks‖, June 4, 2007.