The advancement of science and technology had made mobile ad hoc network an important tool to access network of next generation. Recently, numerous multipath routing protocols for mobile ad hoc network are reported in literature. Each routing methods works based on their salient feature, but failed to control congestion, energy efficiency, overhead packets, signal stability during data transmission which leads to edge effect, signal decay and bottleneck situation of the bandwidth consumption. In this paper a novel approach havely Geographical Distance based Ad Hoc On-demand Distance Vector Routing (GD-AOMDV), which selects the path based on transmission distance value to limit and control the congestion and control overheads has been proposed. The salient feature of the proposed model is that it establishes a relationship between path distance and MANET design parameters
including transmission range, consumption of energy and bandwidth. The accuracy of the proposed scheme is
analyzed and validated with the experimental results in respect to various flow using NS2 simulations.
Performance Evaluation of Routing Protocols in University Networkijtsrd
In an enterprise network, multiple dynamic routing protocols are used for forwarding packets with the best routes. Therefore, performance of the network is based on routing protocols and the route redistribution is an important issue in an enterprise network that has been configured by multiple different routing protocols in its routers. So, aim of the system is to analyze the performance and comparison of different Interior Gateway routing protocols. Routing is depended on many parameters critical such as network convergence time, Ethernet delay, throughput, end to end delay, jitter, packet delivery, security and bandwidth, etc. In this paper, the analysis of characteristics and the performance of the different routing protocols as Routing Information Protocol RIP , Open Shortest Path First OSPF and Enhanced Interior Gateway Routing Protocol EIGRP are evaluated in a university network. The performance evaluation are based on end to end packet delay, network convergence time, packet delay variation and administrative distance, etc. The analysis focuses on the performance of the routing protocols with its routing table in a simulator. The Simulation software can be used to evaluate and compare the performance of the routing protocols. The simulator return the routing table for each node or router in the university network which would contain the best path to reach the remote destination on the metric chosen based on the routing protocol implemented. The simulation software give results used to evaluate the performance of routing protocols, the performance of different routing protocols will be compared, and to analyze the convergence time and administrative distance of routing protocols. Kyaw Zay Oo "Performance Evaluation of Routing Protocols in University Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26582.pdfPaper URL: https://www.ijtsrd.com/engineering/information-technology/26582/performance-evaluation-of-routing-protocols-in-university-network/kyaw-zay-oo
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
In recent years, limited resources of user products and energy-saving are recognized as the major challenges of Wireless Sensor Networks (WSNs). Clustering is a practical technique that can reduce all energy consumption and provide stability of workload that causes a larger difference in energy depletion among other nodes and cluster heads (CHs). In addition, clustering is the solution of energy-efficient for maximizing the network longevity and improvising energy efficiency. In this paper, a novel OCE-CHS (Optimized Cluster Establishment and Cluster-Head Selection) approach for sensor nodes is represented to improvise the packet success ratio and reduce the average energy-dissipation. The main contribution of this paper is categorized into two processes, first, the clustering algorithm is improvised that periodically chooses the optimal set of the CHs according to the speed of the average node and average-node energy. This is considerably distinguished from node-based clustering that utilizes a distributed clustering algorithm to choose CHs based on the speed of the current node and remaining node energy. Second, more than one factor is assumed for the detached node to join the optimal cluster. In the result section, we discuss our clustering protocols implementation of optimal CH-selection to evade the death of SNs, maximizing throughput, and further improvise the network lifetime by minimizing energy consumption.
In most efficient clustering technique for WSN has been proved as a congestion control and hierarchical
based cluster head selection process. The cluster head reduces the energy wastage and additionally that improves
the receiving of data and collection of data from their member sensor nodes. Also transmitting the collected data
to the base station (BS). In proposed method hybrid cluster based congestion aware (HCBCA) is mostly focused
on traffic that affects the continuous flow of data, Arrival of data from the source to destination delay time,
Avoid packet losses and energy consumption process. Mainly congestion happens in the intra cluster to do the
process of transmitting the destination of packets in many to one manner form sensor node to CH. The main
reason for occurrence of congestion is communication path, nodes energy level and nodes buffer size. When
these above it are successful done the congestion, does not exist or otherwise congestion will occur. The purpose
of WSN congestion control is to improve the packet delivery ratio and energy consumption.
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANETijsrd.com
It is a big challenge to develop routing protocol that can meet different application needs and optimize routing paths according to the topology change in mobile ad hoc networks. The existing work presented two self-adaptive on-demand geographic routing schemes to build efficient paths based on the needs of user applications and adapt to various scenarios for provide efficient and reliable routing. To overcome the impact due to inaccurate local topology knowledge, the topology information is updated at a node in the specific time periods. The on-demand routing mechanism reduces to control overhead made on geographic routing. The route optimization scheme adapts routing path according to the topology changes and actual data traffic requirements. Adaptive parameter setting scheme is introduced to allow each node to determine and adjust the protocol parameter values independently. However, existing work did not address resource parameters such as energy, bandwidth and data loss. The proposal presents and Integrated Resource Adaptive on Demand Geographic Routing (IRA-ODGR) for MANET. The node energy resource is optimized with path energy consumption rate and bandwidth utilization of the path is analysed. Loss rate is reduced in geographic routing with dynamic routes. The simulation conducted to demonstrate IRA-ODGR routing protocols.
Performance Evaluation of Routing Protocols in University Networkijtsrd
In an enterprise network, multiple dynamic routing protocols are used for forwarding packets with the best routes. Therefore, performance of the network is based on routing protocols and the route redistribution is an important issue in an enterprise network that has been configured by multiple different routing protocols in its routers. So, aim of the system is to analyze the performance and comparison of different Interior Gateway routing protocols. Routing is depended on many parameters critical such as network convergence time, Ethernet delay, throughput, end to end delay, jitter, packet delivery, security and bandwidth, etc. In this paper, the analysis of characteristics and the performance of the different routing protocols as Routing Information Protocol RIP , Open Shortest Path First OSPF and Enhanced Interior Gateway Routing Protocol EIGRP are evaluated in a university network. The performance evaluation are based on end to end packet delay, network convergence time, packet delay variation and administrative distance, etc. The analysis focuses on the performance of the routing protocols with its routing table in a simulator. The Simulation software can be used to evaluate and compare the performance of the routing protocols. The simulator return the routing table for each node or router in the university network which would contain the best path to reach the remote destination on the metric chosen based on the routing protocol implemented. The simulation software give results used to evaluate the performance of routing protocols, the performance of different routing protocols will be compared, and to analyze the convergence time and administrative distance of routing protocols. Kyaw Zay Oo "Performance Evaluation of Routing Protocols in University Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26582.pdfPaper URL: https://www.ijtsrd.com/engineering/information-technology/26582/performance-evaluation-of-routing-protocols-in-university-network/kyaw-zay-oo
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
In recent years, limited resources of user products and energy-saving are recognized as the major challenges of Wireless Sensor Networks (WSNs). Clustering is a practical technique that can reduce all energy consumption and provide stability of workload that causes a larger difference in energy depletion among other nodes and cluster heads (CHs). In addition, clustering is the solution of energy-efficient for maximizing the network longevity and improvising energy efficiency. In this paper, a novel OCE-CHS (Optimized Cluster Establishment and Cluster-Head Selection) approach for sensor nodes is represented to improvise the packet success ratio and reduce the average energy-dissipation. The main contribution of this paper is categorized into two processes, first, the clustering algorithm is improvised that periodically chooses the optimal set of the CHs according to the speed of the average node and average-node energy. This is considerably distinguished from node-based clustering that utilizes a distributed clustering algorithm to choose CHs based on the speed of the current node and remaining node energy. Second, more than one factor is assumed for the detached node to join the optimal cluster. In the result section, we discuss our clustering protocols implementation of optimal CH-selection to evade the death of SNs, maximizing throughput, and further improvise the network lifetime by minimizing energy consumption.
In most efficient clustering technique for WSN has been proved as a congestion control and hierarchical
based cluster head selection process. The cluster head reduces the energy wastage and additionally that improves
the receiving of data and collection of data from their member sensor nodes. Also transmitting the collected data
to the base station (BS). In proposed method hybrid cluster based congestion aware (HCBCA) is mostly focused
on traffic that affects the continuous flow of data, Arrival of data from the source to destination delay time,
Avoid packet losses and energy consumption process. Mainly congestion happens in the intra cluster to do the
process of transmitting the destination of packets in many to one manner form sensor node to CH. The main
reason for occurrence of congestion is communication path, nodes energy level and nodes buffer size. When
these above it are successful done the congestion, does not exist or otherwise congestion will occur. The purpose
of WSN congestion control is to improve the packet delivery ratio and energy consumption.
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANETijsrd.com
It is a big challenge to develop routing protocol that can meet different application needs and optimize routing paths according to the topology change in mobile ad hoc networks. The existing work presented two self-adaptive on-demand geographic routing schemes to build efficient paths based on the needs of user applications and adapt to various scenarios for provide efficient and reliable routing. To overcome the impact due to inaccurate local topology knowledge, the topology information is updated at a node in the specific time periods. The on-demand routing mechanism reduces to control overhead made on geographic routing. The route optimization scheme adapts routing path according to the topology changes and actual data traffic requirements. Adaptive parameter setting scheme is introduced to allow each node to determine and adjust the protocol parameter values independently. However, existing work did not address resource parameters such as energy, bandwidth and data loss. The proposal presents and Integrated Resource Adaptive on Demand Geographic Routing (IRA-ODGR) for MANET. The node energy resource is optimized with path energy consumption rate and bandwidth utilization of the path is analysed. Loss rate is reduced in geographic routing with dynamic routes. The simulation conducted to demonstrate IRA-ODGR routing protocols.
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
The broad significance of Wireless Sensor Networks is in most emergency and disaster rescue
domain. The routing process is the main challenges in the wireless sensor network due to lack of physical links.
The objective of routing is to find optimum path which is used to transferring packets from source node to
destination node. Routing should generate feasible routes between nodes and send traffic along the selected path
and also achieve high performance. This paper presents a nearest adjacent node scheme based on shortest path
routing algorithm. It is plays an important role in energy conservation. It finds the best location of nearest
adjacent nodes by involving the least number of nodes in transmission of data and set large number of nodes to
sleep in idle mode. Based on simulation result we shows the significant improvement in energy saving and
enhance the life of the network
ENERGY EFFICIENT DIRECTION BASED ROUTING PROTOCOL FOR WSNIAEME Publication
Energy consumption is one of the limitations in Wireless Sensor Networks (WSNs). The routing protocols are the hot areas to address quality-of-service (QoS) related issues viz. Energy consumption, network lifetime, network scalability and packet overhead. The key issue in WSN is that these networks suffer from the packet overhead, which is the core cause of more energy consumption and damage the QoS in sensor networks. In WSN, there are several routing protocols which are used to improve the performance of the network. Out of those protocols, Dynamic Source Routing (DSR) protocol is more appropriate in terms of small energy density, but sometimes when the mode of a node changes from active to sleep, the effectiveness decreases as the data packets needs to wait at the initial point where the packet has been sent and this increases the waiting time and end to end interruption of the packets which leads to increase in energy consumption. Our problem is to recognize the dead nodes and to choose another suitable path so that the data transmission becomes smoother and less energy gets preserved. In order to resolve these issues, we propose directional transmission-based energy aware routing protocol named as PDORP. The proposed protocol PDORP has the characteristics of both Power Efficient Gathering Sensor Information System (PEGASIS) and DSR routing protocols. In addition, hybridization of Genetic Algorithm (GA) and Bacterial Foraging Optimization (BFO) is applied to proposed routing protocol to identify energy efficient optimal paths. The performance analysis, comparison through a hybridization approach of the proposed routing protocol gives better result comprising less bit error rate, less delay, less energy ingesting and better throughput which leads to better QoS and prolong the lifetime
Handover Algorithm based VLP using Mobility Prediction Database for Vehicular...IJECEIAES
This paper proposes an improved handover algorithm method for vehicle location prediction (VLP-HA) using mobility prediction database. The main advantage of this method is the mobility prediction database is based on real traffic data traces. Furthermore, the proposed method has the ability to reduce handover decision time and solve resource allocation problem. The algorithm is simple and can be computed very rapidly; thus, its implementation for a high-speed vehicle is possible. To evaluate the effectiveness of the proposed method, QualNet simulation is carried out under different velocity scenarios. Its performance is compared with conventional handover method. The superiority of the proposed method over conventional handover method in deciding the best handover location and choosing candidate access points is highlighted by simulation. It was found that VLP-HA has clearly reduced handover delay by 45% compared to handover without VLP, give high accuracy, hence low complexity algorithm.
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Eswar Publications
Routing in mobile ad-hoc networks is an integral aspect of communication between devices. Routing is considered to
be a challenging task in MANETs due to the drastic and unpredictable changes in network topologies as a result of
the random and frequent movement of the nodes and due to the absence of any centralized control. Several routing protocols have been designed and developed to perform under various network environments. In this work a systematic simulation based performance study of the four prominent routing protocols: Ad hoc on Demand Multipath Routing Distance Vector (AOMDV), Dynamic Source Routing (DSR), Ad Hoc On Demand Distance Vector (AODV) and Temporarily Ordered Routing (TORA) protocols in the simulated networking environment under varying number of nodes in various scenarios is performed. These protocols use on-demand routing and have different protocol mechanisms leading to differences in performance. The performance is analyzed and evaluated based on end to end delay, packet delivery ratio, routing overheads and through-put done by varying network load, and the size of the network. Based on the observations, we make recommendations about the performance of the
protocols.
Energy balanced improved leach routing protocol for wireless sensor networkscsandit
A proper sensor node clustering is an effective topology control that can balance energy
consumption among sensor nodes and increase network scalability and life time. As the use of
wireless sensor networks (WSNs) has grown enormously, the need for energy-efficient routing
and data aggregation has also risen. LEACH
(
Low Energy Adaptive Cluster Hierarchy
)
is a
hierarchical clustering protocol that provides an elegant solution for such protocols. Random
clustering is the main deficiency of LEACH. In this paper an energy balanced clustering
approach is proposed, in which the K-mean clustering algorithm is applied. It is centralized
clustering algorithm that based on minimum energy clustering to form optimal clusters. For the
candidate nodes, the location and the residual energy are used as key parameters to select the
cluster head (CH). The method shows that the proposed approach outperforms LEACH in terms
of energy conservation and network life time prolonging.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
Clustering is an important research area for mobile ad hoc networks (MANETs) as it increases the capacity of network, reduces the routing overhead and makes the network more scalable in the presence of both high mobility and a large number of mobile nodes. Routing protocols based on flat topology are not scalable because of their built-in characteristics. However, clustering cause overhead which consumes considerable bandwidth, drain mobile nodes energy quickly, likely cause congestion, collision and data delay in larger networks. This paper uses an implementation of the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based routing protocol to examine the influence of clustering on the performance of mobile ad hoc networks. This paper evaluates channel utilization and control overhead as a function of number of nodes per sq. km to show the effect of clustering. Simulation results show that in high mobility scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
Battlefield theater applications require supporting large number of nodes. It can facilitate many multi-hop
paths between each source and destination pairs. For scalability, it is critical that for supporting network
centric applications with large set of nodes require hierarchical approach to designing networks. In this
research we consider using Mobile Ad Hoc Network (MANET) with multiple clusters. Each cluster
supports a few nodes with a cluster head. The intra-cluster connectivity amongst the nodes within the
cluster is supported by multi-hop connectivity to ensure handling mobility in such a way that no service
disruption can occur. The inter-cluster connectivity is also achieved by multi-hop connectivity. However,
for inter-cluster communications, only cluster heads are connected. The selection of intra-cluster
communications and inter-cluster communications allow scalability of the network to support multiservices
applications end-to-end with a desired Quality of Service (QoS). This paper proposes graph
theoretic approach to establish efficient connection between a source and a destination within each cluster
in intra-cluster network and between clusters in inter-cluster network. Graph theoretic approach
traditionally was applied networks where nodes are static or fixed. In this paper, we have applied the
graph theoretic routing to MANET where nodes are mobile. One of the important challenges in MANET is
to support an efficient routing algorithm for multi-hop communications across many nodes which are
dynamic in nature. However, dynamic behavior of the nodes requires greater understanding of the node
degree and mobility at each instance of time in order to maintain end-to-end QoS for multi-service
provisioning. This paper demonstrates graph theoretic approach produces an optimum multi-hop
connectivity path based on cumulative minimum degree that minimizes the contention and scheduling
delay end-to-end. It is applied to both intra-cluster communications as well as inter-cluster
communications. The performance shows that having a multi-hop connectivity for intra-cluster
communications is more power efficient compared to broadcast of information with maximum power
coverage. Each cluster performs similarly and the algorithm is also used for inter-cluster communications.
Our simulation results show that the proposed graph theoretic routing approach will reduce the overall
delay and improves the physical layer data frame transmission.
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. The primary goal of such an ad hoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols for mobile ad hoc networks– the Destination Sequenced Distance Vector (DSDV), the table- driven protocol and the Ad hoc On- Demand Distance Vector routing (AODV), an On –Demand protocol and evaluates both protocols based on packet delivery fraction, normalized routing load, average delay and throughput while varying number of nodes, speed and pause time.
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
One of the main challenges for researchers to build routing protocols is how to use energy efficiently to extend the lifespan of the whole wireless sensor networks (WSN) because sensor nodes have limited battery power resources. In this work, we propose a Sector Tree-Based clustering routing protocol (STB-EE) for Energy Efficiency to cope with this problem, where the entire network area is partitioned into dynamic sectors (clusters), which balance the number of alive nodes. The nodes in each sector only communicate with their nearest neighbour by constructing a minimum tree based on the Kruskal algorithm and using mixed distance from candidate node to base station (BS) and remaining energy of candidate nodes to determine which node will become the cluster head (CH) in each cluster? By calculating the duration of time in each round for suitability, STB-EE increases the number of data packets sent to the BS. Our simulation results show that the network lifespan using STB-EE can be improved by about 16% and 10% in comparison to power-efficient gathering in sensor information system (PEGASIS) and energy-efficient PEGASIS-based protocol (IEEPB), respectively.
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
The broad significance of Wireless Sensor Networks is in most emergency and disaster rescue
domain. The routing process is the main challenges in the wireless sensor network due to lack of physical links.
The objective of routing is to find optimum path which is used to transferring packets from source node to
destination node. Routing should generate feasible routes between nodes and send traffic along the selected path
and also achieve high performance. This paper presents a nearest adjacent node scheme based on shortest path
routing algorithm. It is plays an important role in energy conservation. It finds the best location of nearest
adjacent nodes by involving the least number of nodes in transmission of data and set large number of nodes to
sleep in idle mode. Based on simulation result we shows the significant improvement in energy saving and
enhance the life of the network
ENERGY EFFICIENT DIRECTION BASED ROUTING PROTOCOL FOR WSNIAEME Publication
Energy consumption is one of the limitations in Wireless Sensor Networks (WSNs). The routing protocols are the hot areas to address quality-of-service (QoS) related issues viz. Energy consumption, network lifetime, network scalability and packet overhead. The key issue in WSN is that these networks suffer from the packet overhead, which is the core cause of more energy consumption and damage the QoS in sensor networks. In WSN, there are several routing protocols which are used to improve the performance of the network. Out of those protocols, Dynamic Source Routing (DSR) protocol is more appropriate in terms of small energy density, but sometimes when the mode of a node changes from active to sleep, the effectiveness decreases as the data packets needs to wait at the initial point where the packet has been sent and this increases the waiting time and end to end interruption of the packets which leads to increase in energy consumption. Our problem is to recognize the dead nodes and to choose another suitable path so that the data transmission becomes smoother and less energy gets preserved. In order to resolve these issues, we propose directional transmission-based energy aware routing protocol named as PDORP. The proposed protocol PDORP has the characteristics of both Power Efficient Gathering Sensor Information System (PEGASIS) and DSR routing protocols. In addition, hybridization of Genetic Algorithm (GA) and Bacterial Foraging Optimization (BFO) is applied to proposed routing protocol to identify energy efficient optimal paths. The performance analysis, comparison through a hybridization approach of the proposed routing protocol gives better result comprising less bit error rate, less delay, less energy ingesting and better throughput which leads to better QoS and prolong the lifetime
Handover Algorithm based VLP using Mobility Prediction Database for Vehicular...IJECEIAES
This paper proposes an improved handover algorithm method for vehicle location prediction (VLP-HA) using mobility prediction database. The main advantage of this method is the mobility prediction database is based on real traffic data traces. Furthermore, the proposed method has the ability to reduce handover decision time and solve resource allocation problem. The algorithm is simple and can be computed very rapidly; thus, its implementation for a high-speed vehicle is possible. To evaluate the effectiveness of the proposed method, QualNet simulation is carried out under different velocity scenarios. Its performance is compared with conventional handover method. The superiority of the proposed method over conventional handover method in deciding the best handover location and choosing candidate access points is highlighted by simulation. It was found that VLP-HA has clearly reduced handover delay by 45% compared to handover without VLP, give high accuracy, hence low complexity algorithm.
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Eswar Publications
Routing in mobile ad-hoc networks is an integral aspect of communication between devices. Routing is considered to
be a challenging task in MANETs due to the drastic and unpredictable changes in network topologies as a result of
the random and frequent movement of the nodes and due to the absence of any centralized control. Several routing protocols have been designed and developed to perform under various network environments. In this work a systematic simulation based performance study of the four prominent routing protocols: Ad hoc on Demand Multipath Routing Distance Vector (AOMDV), Dynamic Source Routing (DSR), Ad Hoc On Demand Distance Vector (AODV) and Temporarily Ordered Routing (TORA) protocols in the simulated networking environment under varying number of nodes in various scenarios is performed. These protocols use on-demand routing and have different protocol mechanisms leading to differences in performance. The performance is analyzed and evaluated based on end to end delay, packet delivery ratio, routing overheads and through-put done by varying network load, and the size of the network. Based on the observations, we make recommendations about the performance of the
protocols.
Energy balanced improved leach routing protocol for wireless sensor networkscsandit
A proper sensor node clustering is an effective topology control that can balance energy
consumption among sensor nodes and increase network scalability and life time. As the use of
wireless sensor networks (WSNs) has grown enormously, the need for energy-efficient routing
and data aggregation has also risen. LEACH
(
Low Energy Adaptive Cluster Hierarchy
)
is a
hierarchical clustering protocol that provides an elegant solution for such protocols. Random
clustering is the main deficiency of LEACH. In this paper an energy balanced clustering
approach is proposed, in which the K-mean clustering algorithm is applied. It is centralized
clustering algorithm that based on minimum energy clustering to form optimal clusters. For the
candidate nodes, the location and the residual energy are used as key parameters to select the
cluster head (CH). The method shows that the proposed approach outperforms LEACH in terms
of energy conservation and network life time prolonging.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
Clustering is an important research area for mobile ad hoc networks (MANETs) as it increases the capacity of network, reduces the routing overhead and makes the network more scalable in the presence of both high mobility and a large number of mobile nodes. Routing protocols based on flat topology are not scalable because of their built-in characteristics. However, clustering cause overhead which consumes considerable bandwidth, drain mobile nodes energy quickly, likely cause congestion, collision and data delay in larger networks. This paper uses an implementation of the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based routing protocol to examine the influence of clustering on the performance of mobile ad hoc networks. This paper evaluates channel utilization and control overhead as a function of number of nodes per sq. km to show the effect of clustering. Simulation results show that in high mobility scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
Battlefield theater applications require supporting large number of nodes. It can facilitate many multi-hop
paths between each source and destination pairs. For scalability, it is critical that for supporting network
centric applications with large set of nodes require hierarchical approach to designing networks. In this
research we consider using Mobile Ad Hoc Network (MANET) with multiple clusters. Each cluster
supports a few nodes with a cluster head. The intra-cluster connectivity amongst the nodes within the
cluster is supported by multi-hop connectivity to ensure handling mobility in such a way that no service
disruption can occur. The inter-cluster connectivity is also achieved by multi-hop connectivity. However,
for inter-cluster communications, only cluster heads are connected. The selection of intra-cluster
communications and inter-cluster communications allow scalability of the network to support multiservices
applications end-to-end with a desired Quality of Service (QoS). This paper proposes graph
theoretic approach to establish efficient connection between a source and a destination within each cluster
in intra-cluster network and between clusters in inter-cluster network. Graph theoretic approach
traditionally was applied networks where nodes are static or fixed. In this paper, we have applied the
graph theoretic routing to MANET where nodes are mobile. One of the important challenges in MANET is
to support an efficient routing algorithm for multi-hop communications across many nodes which are
dynamic in nature. However, dynamic behavior of the nodes requires greater understanding of the node
degree and mobility at each instance of time in order to maintain end-to-end QoS for multi-service
provisioning. This paper demonstrates graph theoretic approach produces an optimum multi-hop
connectivity path based on cumulative minimum degree that minimizes the contention and scheduling
delay end-to-end. It is applied to both intra-cluster communications as well as inter-cluster
communications. The performance shows that having a multi-hop connectivity for intra-cluster
communications is more power efficient compared to broadcast of information with maximum power
coverage. Each cluster performs similarly and the algorithm is also used for inter-cluster communications.
Our simulation results show that the proposed graph theoretic routing approach will reduce the overall
delay and improves the physical layer data frame transmission.
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. The primary goal of such an ad hoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols for mobile ad hoc networks– the Destination Sequenced Distance Vector (DSDV), the table- driven protocol and the Ad hoc On- Demand Distance Vector routing (AODV), an On –Demand protocol and evaluates both protocols based on packet delivery fraction, normalized routing load, average delay and throughput while varying number of nodes, speed and pause time.
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
One of the main challenges for researchers to build routing protocols is how to use energy efficiently to extend the lifespan of the whole wireless sensor networks (WSN) because sensor nodes have limited battery power resources. In this work, we propose a Sector Tree-Based clustering routing protocol (STB-EE) for Energy Efficiency to cope with this problem, where the entire network area is partitioned into dynamic sectors (clusters), which balance the number of alive nodes. The nodes in each sector only communicate with their nearest neighbour by constructing a minimum tree based on the Kruskal algorithm and using mixed distance from candidate node to base station (BS) and remaining energy of candidate nodes to determine which node will become the cluster head (CH) in each cluster? By calculating the duration of time in each round for suitability, STB-EE increases the number of data packets sent to the BS. Our simulation results show that the network lifespan using STB-EE can be improved by about 16% and 10% in comparison to power-efficient gathering in sensor information system (PEGASIS) and energy-efficient PEGASIS-based protocol (IEEPB), respectively.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
Qo s oriented distributed routing protocols : anna university 2nd review pptAAKASH S
To find a QoS path between source and destination, Which satisfies
The QoS requirements for each admitted connection and
Optimizes the use of network resources
Quality encompasses the data loss, latency, jitter, efficient use of network resources,..
QoS mechanisms for unfairness: managing queuing behavior, shaping traffic, control admission, routing, …
Usually, a hybrid network has widespread base stations
The data transmission in hybrid networks has two features:
An AP can be a source or a destination to any mobile node
It allows a stream to have anycast transmission along multiple transmission paths to its destination through base stations
The number of transmission hops between a mobile node and an AP is small
It enables a source node to connect to an AP through an intermediate node
In this paper introduce the QoS-Oriented Distributed routing protocol(QOD)
This QOD protocol makes five contributions:
QoS-guaranteed neighbor selection algorithm
Distributed packet scheduling algorithm
Mobility-based segment resizing algorithm
Soft-deadline based forwarding scheduling algorithm
Data redundancy elimination based transmission
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
Abstract Mobile networks have received great deal of attention during last few decades due to their potential applications such as large scale, improved flexibility and reduced costs. This proposed work addresses two problems associated with mobile network such as method to reduce overhead between the nodes, and energy balanced routing of packets by Co-Operative opportunistic routing for cluster based communication. We propose a modified algorithm that uses On-Demand Opportunistic Group mobility based clustering (ODOGMBC) for forming the cluster and predicting the cluster mobility by neighbourhood update algorithm. Cluster formation involves election of a mobile node as Cluster head. Each cluster comprises of cluster head and non-cluster head node that forms a cluster dynamically. Each node in the network continuously finds it neighbour by communicating with them, and nodes have consistent updated routing information in route cache by neighbourhood update algorithm. In routing process packet forwarded by the source node is updated by intermediate forwarder if topology undergo changes. This opportunistic routing scheme provides responsive data transportation and managing the node effectively, even in heavily loaded environment. Thus, our proposed routing technique helps us to reduce overhead, increases efficiency and better control of path selection. Keywords- Clustering, Forwarder, MANET, Prediction, Reactive, opportunistic routing.
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc NetworkIJAAS Team
Congestion problem and packet delivery related issues in the vehicular ad hoc network environment is a widely researched problem in recent years. Many network designers utilize various algorithms for the design of ad hoc networks and compare their results with the existing approaches. The design of efficient network protocol is a major challenge in vehicular ad hoc network which utilizes the value of GPS and other parameters associated with the vehicles. In this paper GPSR protocol is improved and compared with the existing GPSR protocol and AODV protocol on the basis of various performance parameters like throughput of the network, delay and packet delivery ratio. The results also validate the performance of the proposed approach.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
A comparative study in wireless sensor networksijwmn
Sensor networks consist of a large number of small, low-powered wireless nodes with limited computation,
communication, and sensing abilities, in a battery-powered sensor network, energy and communication
bandwidth are a precious resources. Thus, there is a need to adapt the networking process to match the
application in order to minimize the resources consumed and extend the life of the network. In this paper,
we introduce a comparative study in different routing algorithms that propose vital solutions to the most
important issues that should be taken into account when designing wireless network which are reliability,
lifetime, communication bandwidth, transmission rand, and finally the limited energy issue, so we will
introduce their algorithms and discuss how did they propose to solve such of these challenges and finally
we will do some evaluation to each approach.
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...ijwmn
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths aid in the optimal traffic distribution and reliability in case of path breakages. Thus, to cater such problem, we present a node-disjoint multipath protocol. The metric used to select the paths takes into account the stability of the nodes and the corresponding links. The proposed technique is also illustrated with an example.
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...ijwmn
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths aid in the optimal traffic distribution and reliability in case of path breakages. Thus, to cater such problem, we present a node-disjoint multi path protocol. The metric used to select the paths takes into account the stability of the nodes and the corresponding links. The proposed technique is also illustrated with an example.
GPS Enabled Energy Efficient Routing for ManetCSCJournals
In this paper, we propose an energy aware reactive approach by introducing energy and distance based threshold criteria. Cross Layer interaction is exploited the performance of physical layer which leads to significant improvement in the energy efficiency of a network.
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Jitender Grover
A variety of protocols are used in ad hoc network but the most popular protocol one is Zone Routing Protocol (ZRP). ZRP is a hybrid routing protocol. Transmission power affects the design and performance of all the protocols in Mobile Ad hoc Networks (MANETs). Mobility of nodes and selection of Zone Size in ZRP are also the major issues. In this paper, the impact of Transmission Ranges and Scalability by varying Mobility rate along with Zone Radius on QoS based performance metrics has been analyzed. The environment has been simulated using NS2.33 Simulator. The objective of our work is to analyze that at what speed and by taking how much zone radius ZRP will be able to perform efficiently and effectively for Mobile Ad hoc Networks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET Journal
Ritu Parasher, Yogesh Rathi "A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Mobile ad-hoc network (MANET) is an autonomous wireless network, deploy without any fixed infrastructure and assistance of base stations. Each node in network shares wireless link for interconnections and not only operates as an end system, but also as a router to forward packets. Since the network nodes are mobile, can be move in any direction with varying paces that generate high dynamicity of network so the protocols that are developed for general ad hoc networks are unsuitable for such an environment. In addition, on-hand routing protocols performance decreases as size of network increased. In this context, to enhance the recitation of routing in MANETs, we propose a new approach in this paper, named Advanced Ad hoc On-Demand Distance Vector (A_AODV). It is a modified version of traditional AODV routing protocol, shrink the active path whenever optimal pathway is available and switches the traffic on it. Simulation studies are conducted using NS2 to prove that proposed approach enhance network performance when network size, load or the mobility increases
Packet Transfer Rate & Robust Throughput for Mobile Adhoc NetworkEswar Publications
An ad-hoc wireless network is highly different considering dynamic stochastic process of its underlying links, leads to link breaks during data transaction. Hence, to provide free flow data transaction, many routing algorithms have the property of link recovery and maintenance procedures to minimize the loss of data during transmission. However these routing method do not guarantee reliable data transmission in some special application conditions with wide requirements on Packet delivery ratio and link quality of the network. Routing is a critical issue in MANET and hence the focus of this paper is the performance analysis of different routing protocols used in the
wireless network. We evaluate the ability of a mobile ad hoc wireless network to distribute flows across robust routes by introducing the robust throughput measure as a performance metric. The utility gained by the delivery of flow messages is based on the level of interruption experienced by the underlying transaction. We describe the mathematical calculation of a network’s robust throughput measure, as well as its robust throughput capacity. We introduce the robust flow admission and routing algorithm (RFAR) to provide for the timely and robust transport of flow transactions across mobile ad hoc wireless systems.
Improved Power Aware Location Based RoutingIOSR Journals
Abstract : With rapid growth in wireless Ad Hoc networks, Quality of service factor has drawn a great attention of researchers. Whereas network topology of wireless networks constantly changes, resources like bandwidth and energy are also limited. As power is very important factor for the proper working of Ad Hoc networks, need of the time is to research about efficient utilization of power. In the paper, we improve LAR (Location-Aided Routing), one of the most famous location based routing methods, which uses GPS technique to get information about the location of mobile node. Our new protocol considers both areas of routing and power. At first, propose a more efficient routing method which finds more stable paths .Secondly, a power aware method is proposed to have a prior knowledge about the remaining battery backups of all the intermediate nodes so that the nodes with battery backups equal to or greater than the minimum threshold power are the part of path between source and destination. This work presents an efficient approach for providing QOS in power aware scenario. Keywords: Ad hoc networks, Average power, Expected Zone, Requested Zone, Threshold power
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...IJSRD
The Auction game based Adaptive Position Update strategy for geographic routing, which dynamically adjusts the frequency of position updates based on the mobility dynamics of the nodes and the forwarding patterns in the network. Adaptive position update is based on three simple principles: first principle is nodes whose movements are harder to predict update their positions more frequently (and vice versa), then the second principle is nodes closer to forwarding paths update their positions more frequently (and vice versa) and last principle is Forwarding nodes are selected based on distance and residual energy with bidding among the neighbors. Several experimental analyses, which is validated by NS2 simulations of a well-known geographic routing protocol, Greedy Perimeter Stateless Routing Protocol (GPSR), shows that game based Adaptive Position Update strategy for geographic routing can significantly improve the packet delivery ratio and improve the routing performance in terms of throughput in comparison with periodic beaconing and other recently proposed updating schemes. Finally give a better result in throughput and packet delivery ration by incurring a relatively smaller delay in delivering the packets. As the no. of nodes increases, this results in better packet delivery ratio of around 98%. The tradeoff between packet delivery ratio and Routing Over Head is slightly increased, The benefits of our work further confirmed by undertaking evaluations in realistic network scenarios, which account for localization error, realistic radio propagation, and sparse network.
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...IJSRD
The Auction game based Adaptive Position Update strategy for geographic routing, which dynamically adjusts the frequency of position updates based on the mobility dynamics of the nodes and the forwarding patterns in the network. Adaptive position update is based on three simple principles: first principle is nodes whose movements are harder to predict update their positions more frequently (and vice versa), then the second principle is nodes closer to forwarding paths update their positions more frequently (and vice versa) and last principle is Forwarding nodes are selected based on distance and residual energy with bidding among the neighbors. Several experimental analyses, which is validated by NS2 simulations of a well-known geographic routing protocol, Greedy Perimeter Stateless Routing Protocol (GPSR), shows that game based Adaptive Position Update strategy for geographic routing can significantly improve the packet delivery ratio and improve the routing performance in terms of throughput in comparison with periodic beaconing and other recently proposed updating schemes. Finally give a better result in throughput and packet delivery ration by incurring a relatively smaller delay in delivering the packets. As the no. of nodes increases, this results in better packet delivery ratio of around 98%. The tradeoff between packet delivery ratio and Routing Over Head is slightly increased, The benefits of our work further confirmed by undertaking evaluations in realistic network scenarios, which account for localization error, realistic radio propagation, and sparse network.
POSITION BASED ADAPTIVE ROUTING FOR VANETSIJCNCJournal
Routing plays a very significant role in multi hop data dissemination in Vehicular Ad-Hoc Networks
(VANETs). Wehave proposed a Position based Adaptive Routing (PAR) protocol which is scalable for different
network densities in VANETs. This scheme uses Preferred Group Broadcasting (PGB) for route discovery.
In this mode, after broadcasting the request for route discovery the source node starts listening to
the channel. If the packet is not further rebroadcasted by any neighbor in a set timeout, then it repeats the
broadcast. This process is repeated until the request reaches the destination. The destination keeps on accumulating
route requests coming from different paths until predefined time. It then chooses the least cost
path as route reply. It uses the set of traversed anchors for sending the unicast route reply to the source
node. PAR uses Advance Greedy Forwarding (AGF) for data forwarding and greedily forwards the data
packet to the next anchor towards destination node. It switches to carry and forward mode once it finds
partitions in the network. The intermediate vehicle buffers the packet until next junction and switches back
to position based scheme and greedily forwards to next node in range which is closest to the destination. To
have an end to end connectedpath, it uses guards to guard anchors tied to different junction and geographical
locations in the network. The algorithm is scalable and exploits advantages of existing techniques
already developed for specific scenarios in VANET. Results show that the service ratio and packet
delay of PAR are higher than its counterparts.
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...graphhoc
Energy consumption and delay incurred in packet delivery are the two important metrics for measuring the performance of geographic routing protocols for Wireless Adhoc and Sensor Networks (WASN). A protocol capable of ensuring both lesser energy consumption and experiencing lesser delay in packet delivery is thus suitable for networks which are delay sensitive and energy hungry at the same time. Thus a smart packet forwarding technique addressing both the issues is thus the one looked for by any geographic routing protocol. In the present paper we have proposed a Fermat point based forwarding technique which reduces the delay experienced during packet delivery as well as the energy consumed for transmission and reception of data packets.
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORKIJCNCJournal
Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV.
Similar to Location and Mobility Optimized On-demand Geographical Multipath Routing Protocol for MANET (20)
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
The cyber attacks have become most prevalent in the past few years. During this time, attackers have discovered new vulnerabilities to carry out malicious activities on the internet. Both the clients and the servers have been victimized by the attackers. Clickjacking is one of the attacks that have been adopted by the attackers to deceive the innocuous internet users to initiate some action. Clickjacking attack exploits one of the vulnerabilities existing in the web applications. This attack uses a technique that allows cross domain attacks with the help of userinitiated clicks and performs unintended actions. This paper traces out the vulnerabilities that make a website vulnerable to clickjacking attack and proposes a solution for the same.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Location and Mobility Optimized On-demand Geographical Multipath Routing Protocol for MANET
1. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2835-2848 (2016) ISSN: 0975-0290 2835
Location and Mobility Optimized On-demand
Geographical Multipath Routing Protocol for
MANET
M. Kokilamani1
Research scholar, Department of Computer science,
Government Arts College, Udumalpet-642126. Tamil Nadu, India.
Email:kokilam.udt@gmail.com
Dr. E. Karthikeyan2
Head & Assistant Professor, Department of Computer Science,
Government Arts College, Udumalpet-642126. Tamil Nadu, India.
Email:e_karthi@yahoo.com
----------------------------------------------------------------------ABSTRACT------------------------------------------------------------
The advancement of science and technology had made mobile ad hoc network an important tool to access network
of next generation. Recently, numerous multipath routing protocols for mobile ad hoc network are reported in
literature. Each routing methods works based on their salient feature, but failed to control congestion, energy
efficiency, overhead packets, signal stability during data transmission which leads to edge effect, signal decay and
bottleneck situation of the bandwidth consumption. In this paper a novel approach havely Geographical Distance
based Ad Hoc On-demand Distance Vector Routing (GD-AOMDV), which selects the path based on transmission
distance value to limit and control the congestion and control overheads has been proposed. The salient feature of
the proposed model is that it establishes a relationship between path distance and MANET design parameters
including transmission range, consumption of energy and bandwidth. The accuracy of the proposed scheme is
analyzed and validated with the experimental results in respect to various flow using NS2 simulations.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Jan 25, 2016 Date of Acceptance: Feb 18, 2016
--------------------------------------------------------------------------------------------------------------------------------------------------
I. Introduction:
Recent advances in wireless communication
technology pave way to significant attention to wireless
ad hoc and mobile networks. The unstable nature of
wireless communication and the lack of pre-defined
infrastructure, the routing protocols for Mobile Ad-hoc
Network (MANET)[1] [2] is a challenging issue.
Dynamicity results in additional energy expenditure,
increase in node failure affects the connectivity and
network lifetime. Numerous routing protocols have
been proposed to satisfy the demands of particular
networks and real applications. These protocols have
been designed for MANET to support various aspects
such as purpose, energy constraints, network lifetime,
degree of mobility, scalability, link reliability, node
prediction, identification, cross layer design,
communication, fault tolerance and maintenance needs.
To design an efficient routing protocol by considering
more factors implies high processing time, power
consumption, overheads, congestion and latency in
computing the route.
In general routing protocols are classified such
as proactive, reactive, hybrid and geographic based
routing etc. Pro-active routing is achieved by creating
list or tables with destinations and possible paths
towards the destinations. Periodically, these lists are
distributed to nodes in the entire network, updating the
link states. Through this mechanism, proactive routing
creates a lot of traffic, and consumes excess bandwidth
and a lot of power. Delay can also occur because of the
slow network reaction to node mobility. Reactive
routing can be a lower cost option than proactive
because it does not use periodic broadcasts and initiates
route discovery only when a message has to be sent,
thus traffic decreases and overhead is reduced.
However, using blind broadcasts (flooding and Route
Request) results in energy expenditure and high latency.
Scalability issues and network clogging can appear
because of flooding. Hybrid techniques of routing are
designed to combine the advantages in both reactive
and proactive, but in general their scalability can be a
problem.
Geographic routing [3] represents the
algorithmic process of determining the paths in which
to send traffic in a network, using position
information/geographic location only about source,
neighbors and destination. It is considered substantially
better from an energetic point of view due to the use of
solely local information in the routing process. As a
result of this very little routing information being
needed, no energy is spent on route discovery, queries
or replies, node memory requirements are decreased
and traffic overhead and computation time are
considerably reduced. Also, in this sense it is different
from source routing in which the sender makes some or
all the routing decisions by having mapped the network
and specifying in the packet header the hops that the
2. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2835-2848 (2016) ISSN: 0975-0290 2836
message has to go through. In geographic routing, the
process is localized and distributed so that all nodes
involved in the routing process contribute in making
routing decisions by using localization methods and
computing the best forwarding options. However,
each protocol has it strengths and weaknesses and all of
the geographic location-based protocols present a novel
idea or improve an old one.
In addition, routing protocols in mobile ad-hoc
networks face problems to work well due to frequent
varying network topology, not having predefined
infrastructure like routers, peer-to peer mode of
communication and restricted transmission
communication range. In recent developments of
routing protocols, geographic location-based routing
protocols [4] exhibit better scalability, performance and
robustness against frequently changing topology of the
networks. Geographic protocols are currently being
thoroughly studied due to their application potential in
networks with demanding requirements. Their main
characteristic is that they make use of location
information for routing decisions. It is an elegant way to
forward packets from source to destination in the
demanding environments without wasting network
resources or creating any impediment in the network
design. Therefore it is generally considered as an
attractive routing method for both wireless ad-hoc and
sensor networks.
In this paper, a novel approach has been
proposed by combining reactive and geographic routing
to make an efficient routing. Each node updates its own
position by the use of localization techniques and
forwards the data to all the nodes in the network at the
time of route discovery. The accuracy of nodes
information results that less overheads for path
prediction, maintenance, avoid congestion, queuing, and
consume less energy.
The remaining of the paper is organized as
follows. Followed by the simple introduction, Section II
briefs the related work done in this field and Section III
illustrates the proposed scheme. The results obtained
from the proposed scheme are discussed in Section IV.
Section V concludes the paper.
II. Related Works
Ko and Vaidya [5] presented Location-Aided
Routing (LAR) protocol which uses the location
information to identify the request zone and expected
zone. Request zone in this protocol is the rectangular
area including both senders as well as receivers. By
declining the search area, this protocol leads to the
decrease in routing overheads.
Zaruba, Chaluvadi and Suleman [6] proposed
Location Area Based Ad-hoc Routing (LABAR )
protocol. It requires only a subset of nodes to know
their exact location forming location areas around these
nodes. Nodes that are enabled with GPS equipment are
referred to as G-nodes. G-nodes are interconnected into
a virtual backbone structure to enable efficient
exchange of information for the mapping of IP
addresses to locations. This protocol is a combination of
proactive and reactive protocols, because a virtual
backbone structure is used to disseminate and update
location information between G-nodes, while user
packets are relayed using directional routing towards
the direction zone of the destination.
Karp and Kung [7] proposed Greedy Perimeter
Stateless Routing (GPSR) which uses the location of
node to forward the packets on the basis of distance.
The packets are forwarded on a greedy basis by
selecting the node closest to the destination. This
procedure continues until the destination is reached. In
some cases the best path may be through a node which
is farther in distance from the destination node. In such
scenario right hand rule is applied to forward around the
obstacle and resume the greedy forwarding as soon as
possible.
Tzay and Hsu [8] presented a location based
routing protocol called LARDAR. Firstly, it uses the
location information of destination node to predict a
smaller triangle or rectangle request zone that covers
the position of destination in the past. The lesser route
discovery space reduces the traffic of route request and
the probability of collision. Secondly, in order to adapt
the exactness of the estimated request zone, and reduce
the searching range, it applied a dynamic adaptation of
request zone technique to trigger intermediate nodes
using the location information of destination node to
redefine a more precise request zone. Finally, an
increasing exclusive search approach is used to redo
route discovery by a progressive increasing search angle
basis when route discovery failed.
Mohammad A. Mikki [9] introduced an
Energy Efficient Location Aided Routing (EELAR)
Protocol for MANETs that is based on the Location
Aided Routing (LAR). EELAR makes significant
reduction in the energy consumption of the mobile
nodes batteries by limiting the area of discovering a
new route to a smaller zone. Thus, control packet
overhead is considerably condensed. In EELAR the
wireless base station is used and the network's circular
area cantered at the base station is divided into six equal
sub-areas. At route discovery as an alternative of
flooding control packets to the whole network area, they
are swamped to only the sub-area of the destination
mobile node. The base station provisions locations of
the mobile nodes in a position table.
Karim El Defrawy and Gene TsudikIn [10]
addressed some interesting issues arising in suspicious
MANETs by designing an anonymous routing
framework (ALARM). It uses node’s current locations
to construct a secure MANET map. Based on the recent
map, every node can decide which other nodes it wants
to communicate with it. ALARM takes benefit of some
advanced cryptographic primitives to achieve node
verification, data integrity, anonymity and intractability
(tracking-resistance). It also offers opposition to certain
insider attacks.
3. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2835-2848 (2016) ISSN: 0975-0290 2837
Haiying Shen and Lianyu Zhao [11] proposed
an Anonymous Location-based Efficient Routing
protocol (ALERT) to offer high anonymity protection at
a low cost. ALERT dynamically partitions the network
field into zones and randomly chooses nodes in zones as
intermediate relay nodes, which structured a non-
traceable anonymous route. Furthermore, it hides the
data initiator/receiver among many initiators/receivers
to reinforce source and destination anonymity
protection. ALERT achieves better route anonymity
protection and lower cost compared to other anonymous
routing protocols. Also, ALERT achieves analogous
routing effectiveness to the GPSR geographical routing
protocol.
Mohammad Al-Rabayah and Robert Malaney
[12] introduced a new hybrid wireless routing protocol
specifically designed to address this issue. This protocol
combines features of reactive routing with location-
based geographic routing, in such a manner so as to
efficiently use all the location information available.
The protocol is designed to gracefully exit to reactive
routing as the location information degrades. Another
aspect of this protocol is that it can be spatially
dependent and different physical areas of the network
can be using quite different routing procedures at the
same epoch. This protocol can dramatically increase
scalability can be measured via the routing control
overhead.
Dan Luo and Jipeng Jhou [13] proposed an
improved Hybrid Location based routing protocol
approach combines geographic routing with topology
based routing protocol. It over comes the major
problems of reactive routing and the end-to-end delay is
reduced by this algorithm. In addition, the path length
performance of geographic routing is also improved.
This routing protocol outperforms the pure reactive
routing in terms of average delay and packet delivery
rate.
Lee, Yoo and Kim [14] proposed a mechanism
that considers not only the location of nodes but energy
consumption to solve the several problems in wireless
networks by improving LAR algorithm. This protocol
provides efficient routing by minimizing the flooding of
unnecessary control message, considering the limited
energy of a mobile node and using appropriate transfer
power to communicate. Proposed scheme can reduce
energy consumption and the average lifetime increases
12 percent than Location Aided Routing Protocol.
Shanshan, Yanliang, Yonghe, Mohan [15]
proposed LOOP (A Location Based Routing Scheme
for Opportunistic Networks), a new location based
routing scheme for opportunistic networks. By
forwarding messages to specified location instead of a
targeted node, LOOP can serve as the underlying
routing protocol for a plethora of pervasive
applications. This protocol effectively employs node’s
movement patterns that are learnt from mobility trace in
message forwarding. They evaluate the performance of
LOOP and compare with well known protocols
including Epidemic, Prophet and Bubble Rap. The
Proposed scheme is able to deliver messages at a high
ratio; drastically reduce network load and nodes’ buffer
occupation, especially when more messages are
involved in the network.
Prakash Raj, Selva Kumar, Lekha [16]
proposed protocol LBRP (Location-Based Routing
Protocol) for ad hoc networks based on location system
.The aim is extracting an optimum topology from the
dynamic and irregular topology of a mobile ad hoc
network to reach more quickly the destination applying
for routing. The method operates in a loop free manner.
Kim, Young-Song, Hwang [17] proposed the
location-based routing algorithm that is possible to have
a stable data transmission with less energy
consumption. The proposed technique does not ask for
the BS to be aware of locations of nodes and tries to
consume balanced distributed energy of all nodes
through the lifecycle of the network. It also operates
location-based routing algorithm which transmits
location information of node with cluster based to
widen extension and mobility and makes itself possible
to apply to the distributed environment network.
Haidar Safa, Hassan Artail and Diana Tabet
[18] proposed a novel cluster based trust-aware routing
protocol (CBTRP) for MANETs to protect forwarded
packets from intermediary malicious nodes. The
anticipated protocol organizes the network into one-hop
disjoint clusters then elect the most qualified and
trustworthy nodes to play the role of cluster-heads that
are responsible for handling all the routing activities.
The anticipated CBTRP continuously ensures the
trustworthiness of cluster-heads by replacing them as
soon as they become malicious and can dynamically
update the packet path to avoid malicious routes.
Putthiphong Kirdpipat and Sakchai
Thipchaksurat [19] presented the impact of mobility on
a scheme called Location-based Routing with Adaptive
Request Zone (LoRAReZ). In LoRAReZ, the size of
expected zone and request zone is set adaptively based
on the distance between the source node and destination
node. Proposed protocol evaluates the impact of
mobility on the performance of LoRAReZ in terms of
packet delivery fraction, routing overhead, end-to-end
delay, and throughput and power consumption by
comparing with those of the traditional Ad Hoc On-
Demand Distance Vector (AODV) and Modified Ad
Hoc On-Demand Distance Vector (M-AODV).
Juanfei Shi and Kai Liu [20] proposed A
power efficient location-based cooperative routing
algorithm (PLCR) to reduce the overall power for
routing in wireless networks. With hypothetical
analysis, by means of a cooperative relay, the likelihood
of successful packet reception can be enlarged, and the
overall power for routing can be condensed, given the
outage probability of the link controlled at a definite
objective level. The PLCR algorithm uses the location
information of nodes to select the finest next-hop node
and supportive node hop by hop with minimum power
so that the cooperative route with minimum overall
power from source to destination can be set up. PLCR
4. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2835-2848 (2016) ISSN: 0975-0290 2838
routing algorithm considerably reduces the overall
power in comparing to non-cooperative routing
algorithm.
S. Basagni et al. [21] proposes DREAM (A
Distance Routing Effect Algorithm for Mobility) which
maintains each node’s location information in routing
tables. Data packet is send by using this location
information. To maintain the location table accurately,
each node periodically broadcasts a control packet
containing its own coordinates maintain the location
table accurately; each node periodically broadcasts a
control packet containing its own co-ordinates.
III. Geographical Distance Based Ad Hoc On-
demand Multipath Distance Vector Routing
Protocol:
The path selection process for distribution of
packets along network path basically depends on the
number of hops from the source to destination. In this
paper, we present the concept of choosing the path
which is based on the geographical distance based
routing scheme called Geographical Distance Based
Ad Hoc On-demand Multipath distance Vector
Routing Protocol (GD-AOMDV) from the source to
destination. The proposed approach selects multiple
paths based on the transmission distance and choose
minimum transmission distance path for
communication. In Route Discovery phase, the RREQ
packet collect the distance information of all
intermediate nodes till it reaches the destination. Then
destination sorts all available paths with the
consideration of transmission distance value. The
reason for choosing the paths based on the geographical
distance is that to reduce end-to-end delay, congestion
and to reduce large queue of packets to move along the
shortest path traffic. Although this distance based path
selection scheme relate the concepts of energy
consumption and success ratio of packet transmission in
analysis part.
In general path selection is basically done by
selecting minimum number hops on the path (Shortest
path). Some times the selection of hops may be few but
the transmission distance is high. While selecting
shortest path the center of the network become more
congestion compared to the perimeter of the network
and leads to path breakage, packet loss, node over
usage. Another thing to be considered is that when
choosing shortest path, the hop is usually present at the
transmission edge because of which earlier outcome of
the hop from the transmission edge happens. So that
topology of the network changes dynamically. Even
though by using distance metric for path selection in the
proposed GD-AOMDV scheme, the number of hops
may increase the delivery of packet to the destination,
reduces delay and decrease energy consumption.
If paths are chosen based on the distance then
the number of hops within the network coverage is
high, so that if any moves out of the coverage an
alternate nearby hop takes the path and energy required
for transmission is also optimally maintained. Besides
the traffic outcome of the hop from the network
coverage is the most important thing to be considered
for selecting paths because the waiting time for the
packets along the path reduces considerably.
The distance between two nodes can be
determined by the Euclidean distance is as follows:
� = √(� − � ) + (� − � )
where Si and Sj are nodes to find the distance
D of the path Pi. To find distance of multiple path on the
network Pn is as follows:
� �
= ∑ (��)
�
From the above discovered paths our approach
selects the path that has the minimum transmission
distance, that is
�� − � ��� = (� �
)
While using this approach the power
consumption, signal strength and mobility are intently
achieved. We analyzed and evaluated the occasions
when a sender can use this mechanism to improve the
packet delivery and transmission bandwidth.
Analysis of signal strength, power consumption,
distance and mobility
Mobile nodes usually communicate with each
other using radio signals. If the transmission distance of
the routing path increased, the increased distance may
cause topology changes, signal problem and more
energy consumption to make difficult for routing
decision. To prevent this, the proposed novel route
selection policy Geographical Distance based Ad Hoc
On-demand Distance Vector Routing (GD-AOMDV)
selects the path based on transmission distance value to
consume less power, bandwidth and overheads. So we
analyze the relationship between power signal strength,
distance and power consumption. From Stojmenovic
and Lin [22], the relationship between power signal
strength and distance is shown as:
� = �
�
�� � �
Where λ is the wavelength, d is the distance
from the sending node to the receiving node, Sr is the
receiving power signal strength, St is the transmitting
power, n is the co-efficient of the power delay and is
bigger than 2 and gt , gr are the antenna parameter of the
sending/receiving node. So receiving signal strength is
as follows:
� = � ∗ � , � � =
�
�� � �
Based on the above equations, we can see that
when a signal received by a node decreases due to
mobility and transmission distance, the successful ratio
of the data transmission also decreases. In the
following, to obtain the relationships among the
transmission distance, received signal strength and
power consumption, we take into account the successful
ratio of data transmissions between nodes. To compute
the success ratio of data transmissions between two
- 3.1
- 3.2
- 3.3
- 3.4
- 3.5
5. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2835-2848 (2016) ISSN: 0975-0290 2839
nodes, we obtain its SNR (signal-to-noise ratio) from
the receiving power signal strength and environmental
noise No.
� � = �
�
= �
�
∗ �
Also each packet has its BER (Bit
Error Rate) from the SNR. So
� = √ � � = (√
�
�
)
When we obtain a BER of the received data
signal, from Proakis[23] we obtain the successful ratio
SR (Success Ratio) of data transmission as
= − , � = � � � � ∗ �
Where packet size is the size of a packet and p
is the error ratio of the received packets. This results
that the equation (3-1) and (3-3) shows when
transmission distance increases the success ratio of data
transmission decreases. We also analyze the power
consumption of transmitting data using a relay model.
Therefore the power consumption required to transmit a
packet from a sending node to a receiving node is in
direct ratio to n to the power of the distance. The
relationship between the power consumption and the
successful ratio for data transmission is shown here
= � + � ∗
�
Where PCtx and PCrx are the power consumed in
transmitting a packet and receiving a packet
respectively. SNR is the successful ratio for
transmitting a packet.
Figure-1. Three possible locations, P, N, and O of a neighbor for nodes S and D.
Figure 1 shows three ranges for a neighbouring node. A
neighbouring node can be inside the circle, outside the
circle or on the edge of the circle. The circle is formed
from the diameter of the line segment SD this is called
as transmission edge, where S is the sending node and
D is the receiving node. From the three ranges
mentioned above node S, node D, and a neighbouring
nodes P,N and O may form a right triangle, an obtuse
triangle, or an acute triangle. Based on Power
Consumption, if a neighbouring node is inside the circle
formed by the line segment SD, the power consumed in
transmitting data from node S to node D via the
neighbouring node is less than the power consumed in
transmitting data from node S to node D directly.
Finally, if a neighbouring node is outside the
circle, the power consumed in transmitting data from
node S to node D directly is more than the power
consumed in transmitting data with the help of the
neighbouring node. As a result, if a neighbouring node
is inside the circle, the power consumed in transmitting
a packet via the neighbouring node is less than the
power consumed in transmitting a packet directly. This
results that the nodes inside the transmission edge
consume less power than nodes on the transmission
edge. So to select minimum transmission distance path
between intermediate nodes consume less energy than
selecting shortest path (minimum no of hops) for data
transmission. It also prolong node, network lifetime and
cope up with topological changes.
IV. Illustration of the proposed scheme
Let us consider the following Figure-2 the
circles represents the wireless nodes and lines
represents the paths from source S to destination D. The
source node deliver the packets along the path based on
the transmission distance metric to destination. The
number of paths for the packets to travel from the S to
D are P1,P2,P3, P4, P5, P6 ,P7,P8,P9. The transmission
distance for all paths can be obtained by using the
equation (3.1) and (3.2). The proposed scheme selects
the minimum transmission distance path by using
equation (3-3).
S D
P
O
N
- 3.6
- 3.7
- 3.8
- 3.9
6. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2835-2848 (2016) ISSN: 0975-0290 2840
Figure-2: GD-AOMDV Route discovery process
The Table-1 shows each path with its hop count,
nodes position and total length of the path. Based on the
total length the paths are ordered by using equation
(3.3). The proposed scheme choose minimum distance
path P1 (20.86 m) with 6 hops as primary path for the
data transmission to control congestion and overheads.
By using general approach the shortest path is based on
number of hops, so P4(22.91 m) is primary path with 4
hops. While using the general approach the
transmission distance is increase, so it consume
additional energy power to transmit the data, also the
hops (P1,P2,P3,P4) are positioned near by the
transmission edge which moves out of the transmission
range due to mobility. It initiates route re-discovery and
additional overheads and processing cost, the signal
strength is also weak .It leads to congestion , energy
depletion and re-route discovery problem.
Paths & no
of hop
Nodes and their distance value (in meter)
Total
length
of the
path
P1- (6) M1(12,16.5),M2(15,17),M3(18,16),M4(21,14),M5(23.5,13.5),M6(26,14) 20.86
P2 - (11)
Z1(10,17.5),Z2(11.5,17.5),Z3(13,17.5),Z4(14.5,16.5),Z5(16,16),
Z6(18,15.5),Z7(19.5,15.5),Z8(21,13),Z9(23,14.5),Z10(25,14.5),Z11(27,14.3)
21.39
P3- (8)
T1(11,19),T2(13,19),T3(14.5,18),T4(17,18),T5(19,17),T6(21,16),
T7(23,15), T8(25,15),T9(27,14.5)
22.06
P4 - (9)
A1(11,18),A2(13,17),A3(15,16),A4(17,15.5),A5(19,14),A6(21,13),
A7(23,12.5),A8(25,13),A9(27,13.5)
22.91
P5 – (4) P1(12.5,16),P2(17,14.5),P3(20.5,11.5),P4(25,12) 22.96
P6 – (8)
B1(11.5,21.5),B2(15,21),B3(18,20.5),B4(19,20),B5(21,20),B6(23,19.5)
B7(25,18),B8(27,16)
23.46
P7- (7)
N1(11,20),N2(13.5,20),N3(16,20),N4(18,18),N5(22,18),N6(24,16),
N7(27,15)
23.46
P8- (5) K1(10,16),K2(14,13.5),K3(18,11),K4(22,12),K5(26.5,10.5) 25.76
P9 – (8)
Q1(8.5,17),Q2(10,14.5),Q3(11.5,12.5),Q4(14,12),Q5(16,10),Q6(19,9),
Q7(22,9),Q8(25.5,8.5)
29.26
Table-1: Paths and Total length obtained by GD-AOMDV approach.
7. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2835-2848 (2016) ISSN: 0975-0290 2841
But the proposed approach reduces the transmission
distance, less energy consumption for transmitting a
packet, the successful ratio of data is high due to the
mobility and topological changed, the signal strength is
also optimally managed and produce less overheads for
path selection process.
V. Simulation of the Proposed Scheme
We consider the AOMDV [24] protocol to
compare with the proposed GD-AOMDV and NS2
is used to simulate the results. The performance
metrics such as Average End-to-End Delay,
Minimum Energy consumption, Packet delivery
fraction, Packet loss Ratio, Routing Overheads and
Throughput are taken into account. The considered
simulation parameters are given in Table-2:
Table-2: Simulation Parameters for GD-AOMDV
Parameter Value
Simulator NS-2.34
Simulation time 100 seconds
Simulation Area 1520x1520 m2
Transmission Range 250 m
Packet Size 512 bytes
Traffic & Mobility model CBR/TCP
Traffic Rate 10 packets/second
Simulation Model Random Way Point
Pass Time 5 seconds
Number of nodes 100
Mobility Pattern 20,40,60,80,100
MAC Type 802.11 DCF
Channel Type Wireless Channel
Routing Protocols AOMDV, GD-AOMDV
Antenna Model Omni
Network Load 4 packets/sec.
Number of Connections 1, 5, 10, 20, 30, 40
Radio Propagation Model TwoWayGround
Idle Power 0.0001 W
Transmission Power 1.0 W
Receiving Power 1.0 W
Transition Power 0.002 W
Transition Time 0.005 Sec.
Initial Energy 100 Joules0
Interface Queue Length 50
Interface Queue Type DropTail/PriQueue
Speed 5 m/sec.
Frequency 2.4 GHz
Data Rate 11.4 Mbps
Carrier sensing range 500 m
Carrier receiving range 250 m
8. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2835-2848 (2016) ISSN: 0975-0290 2842
1) Average End-to-End Delay Analysis with Normal
AOMDV and GD-AOMDV
Average End-to-End Delay is represented by
the time it takes for successful packet transmission. It
includes all possible delays such as buffering during the
route discovery latency, queuing at the interface queue,
retransmission delay at the MAC, the propagation and
the transfer time is calculated as follows:
Average E − − E Delay =
∑ �I − �I
n
i=1
�
Where n is the number of data packets successfully
transmitted over the MANET, ' i ' is the unique packet
identifier, Ri is the time at which a packet with unique
identifier ' i ' is received and Si is the time at which a
packer with unique identifier ' i ' is sent
-5 00 5 1010 15 2020 25 3030 35 4040 45
0
2
4
6
8
10
12
14
Delay(in%)
No Of Connections
-AOMDV
-GD-AOMDV
Average End-to-End Delay of GD-AOMDV with AOMDV
Figure-3: Average End-to-End Delay of GD-
AOMDV with AOMDV
Here the average end-to-end delay for tested AOMDV
protocol increases when increasing the network flow
with various load, but in GD-AOMDV delay is
decreases with significant value in Table-2. Also
AOMDV selects shortest hop based path instead of GD-
AOMDV selects distance based path for data
transmission, so congestion and packet queue waiting
time are low. The proposed scheme show significant
improvements with mobility increases. In AOMDV
routing the performance of network degrades but
proposed GD-AOMDV scheme gives better
performance than previous approach. The Table-3 and
figure-3 illustrate an average delay time by each
protocol.
2) Minimum Energy consumption Analysis with
Normal AOMDV and GD-AOMDV:
In this analysis the energy
consumption for packet transmission (transmitting and
receiving) is taking into account. The Total energy
consumption is calculated as follows:
Table-3: Average End-to-End Delay
No of
connections
AOMDV
(in econds)
GD-AOMDV
(in seconds)
1 1.138 1.174
5 1.499 1.545
10 1.894 1.895
20 3.074 2.902
30 5.722 5.958
40 13.724 11.864
9. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2835-2848 (2016) ISSN: 0975-0290 2843
�otal E�ergy Co�su�ed = ∑ ��itial E�ergyi − �esidual E�ergyi
n
i=1
5 0 5 10 15 20 25 30 35 40 45
0
500
1000
1500
2000
2500
3000
3500
4000
4500
5000
5500
6000
6500
7000
7500
8000
8500
9000
9500
EnergyRequiredinJules
No of connections
AOMDV
GD-AOMDV
Total Energy Required for packet transmission of AOMDV with GD-AOMDV
Figure-4: Energy consumption of GD-AOMDV with
AOMDV
Here we consider node selection based on its location
information for route selection. Thus GD-AOMDV
balances the energy among all the nodes and prolongs
the individual node lifetime and hence the entire
network lifetime. Without considering the transmission
distance and energy cost for transmitting a packet to
that distance the AOMDV required more energy for
packet transmission during communication shown in
Table-4. Our scheme finds location aware path and
prolong energy of node shown with figure-4:
3) Packet Loss Ratio Delay Analysis with Normal
AOMDV and GD-AOMDV
The ratio of data packets not delivered to the destination
to those generated by the sources are calculated by
Packet �oss �atio =
�o of Data Packets �e�t − �o of Data Packets �eceived
�o of Data Packets �e�t
∗
Table-4: Minimum Energy consumption
No of
connections
AOMDV
(in Jules)
GD-AOMDV
(In Jules)
1 8860.36 8712.16
5 7995.51 7835.26
10 6411.57 6358.88
20 3971.42 3858.41
30 1452.64 1391.60
40 1168.67 1153.01
10. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2835-2848 (2016) ISSN: 0975-0290 2844
5 0 5 10 15 20 25 30 35 40 45
3
5
8
10
13
15
18
20
23
25
28
30
33
35
38
Percentageofdroppedpackets
No of connections
AOMDV
GD-AOMDV
Packet Loss Ratio of AOMDV with GD-AOMDV
Figure-5: Packet losses of EA-AOMDV with
AOMDV
The reasons for packet drops can be incorrect routing
information, mobility & power management. AOMDV
cannot maintain precise routes and drops, when
connections increased often. The usage of state routes
from its caches is the major reason for AOMDV packet
drops. In this graph the packet loss analysis has been
done in both the cases, normal AOMDV and GD-
AOMDV scheme. Here the packet loss is more in case
of normal AOMDV and it means that only the concept
of multipath routing does not provide the reliable packet
delivery but if we enhance the performance of
AOMDV by including the concept of transmission, it
extends network lifetime. In this technique the packet
loss has minimized. It means that there is a significant
difference in packet loss between normal AOMDV and
GD-AOMDV technique. The Table-5 and figure-5
illustrate that the number of packets dropped by each
protocol.
4) Packet Delivery Ratio Delay Analysis with
Normal AOMDV and GD-AOMDV
The ratio of data packets delivered to the destination to
those generated by the sources and is calculated as
follows:
Packet Delivery �atio =
�u�ber of Data Packets �eceived
�u�ber of Data Packets �e�t
∗
Table-5: Packet Loss Ratio
No of
connections
AOMDV
(in %)
GD-AOMDV
(in %)
1 12.290 6.017
5 12.684 12.267
10 15.899 12.600
20 20.604 20.516
30 29.233 28.604
40 34.489 33.112
11. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2835-2848 (2016) ISSN: 0975-0290 2845
5 0 5 10 15 20 25 30 35 40 45
63
65
68
70
73
75
78
80
83
85
88
90
93
95
98
Percentageofdeliveredpackets
No of connnections
AOMDV
GD-AOMDV
Packet Delivery Ratio of AOMDV with GD-AOMDV
Figure-6: Packet Delivery Ratio of GD-AOMDV with AOMDV
This is the performance analysis depending on the ratio
of packets in case of previous AOMDV and proposed
GD-AOMDV scheme. Here the packet delivery ratio of
proposed scheme is about 69% but in case of previous
normal AOMDV is about 65% that is lesser than
previous. In case of normal AOMDV the transmission
distance concept are not added it means the nodes notify
maximum packet drops, delay and degrade the
performance of the network. But in case of proposed
scheme each node that handles transmission distance in
good way and minimize energy consumption for
packet transmission, routing overhead and Delay. The
Table-6 and figure-6 shows packet delivery fraction of
GD-AOMDV and AOMDV.
5) Routing Overheads Delay Analysis with Normal
AOMDV and GD-AOMDV
The total number of control or routing packets
generated by routing protocol during simulation and is
obtained as follows:
�outi�g Overhead = �u�ber od ��� packets
Table-6 Packet Delivery Ratio
No of
connections
AOMDV
(in %)
GD-AOMDV
(in %)
1 87.710 93.983
5 87.316 87.733
10 84.101 87.400
20 79.396 79.484
30 70.767 71.396
40 65.511 69.888
12. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2835-2848 (2016) ISSN: 0975-0290 2846
5 0 5 10 15 20 25 30 35 40 45
63
65
68
70
73
75
78
80
83
85
88
90
PercentageofRoutingOverheadpackets
No of connections
AOMDV
GD-AOMDV
Routing Overheads of AOMDV with GD-AOMDV
Figure-7: Routing
Overheads of GD-AOMDV with AOMDV
The routing packets in network are required to
establish connection between sender and receiver and
the less number of routing packets shows the better
network performance. In this graph the performance of
proposed GD-AOMDV protocol is better as compared
to previous normal AOMDV routing protocol. Here in
case of proposed scheme about only 74 routing packets
are delivered in network but in case of previous normal
routing about 79 packets are delivered in network. In
AOMDV routing overheads are increased, due to the
signal decay or congestion of node and p1ath life time.
AOMDV path selection doesn’t care of transmission
distance metric for path selection. So it causes more
congestion and route rediscovery packets. The Table-7
and figure-7 compares the routing overhead of
AOMDV and GD-AOMDV. GD-AOMDV reduces
Routing Overhead in the way of selecting minimum
distance with increase in number of hops at the time of
Route Discovery.
6) Throughput Analysis with Normal AOMDV and
GD-AOMDV
Throughput is obtained by calculating how
many packets are received at the destination from the
source at a specified time interval (kbps).
�hroughput =
�u�ber of Bytes �eceived ∗ 8
�i�ulatio� �i�e ∗
kbps
Table-7: Routing Overheads
No of
connections
AOMDV
(no of packets)
GD-AOMDV
(no of packets)
1 88 76
5 77 72
10 70 68
20 67 65
30 77 76
40 79 74
13. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2835-2848 (2016) ISSN: 0975-0290 2847
5 0 5 10 15 20 25 30 35 40 45
25
0
25
50
75
100
125
150
175
200
225
250
275
300
PercentageofDeliveredPackets
No of connections
AOMDV
GD-AOMDV
Throughput Ratio of AOMDV with GD-AOMDV
Figure-8: Throughput of GD-AOMDV with
AOMDV
The Table-8 and figure-8 show throughput of
each protocol in packet delivery fraction. GD-AOMDV
protocol throughput becomes high when number of
connections increased. But AOMDV protocols
throughput becomes less when network flow increased
and selecting shortest paths, which leads congestion and
queue problem.
V. Conclusion
Even though many factors are to be considered
to improve the QoS aspect of MANET, routing is
standing front of all. Among the routing protocols,
recently geographical multipath routing protocols
attained very big attention among the research
communities. In this paper we proposed a novel scheme
called GD-AOMDV to improve the performance of the
AOMDV routing protocol. By considering transmission
distance metric for path selection to extend nodes
lifetime. From the simulated result it is found that the
proposed scheme give a better result than the existing
AOMDV with respect to Average End-to-End Delay
Minimum Energy Consumption, Packet delivery
fraction, Packet loss Ratio, Routing Overheads and
Throughput.
Acknowledgement
This work is supported by University Grants
Commission (UGC-MRP (F.No:41-614/ (2012) SR)
under the Major Research Project Scheme.
Reference:
1. S Corson and J Macker (1999) Mobile Ad
Hoc Networking (MANET): Routing
Protocol Performance Issues and Evaluation
Considerations. IETF WG Charter,
http://www.ietf.org/html.charaters/manet-
character.html
2. C Siva Ram Murthy and BS Manoj
(2004)AD Hoc Wireless Networks. Pearson
Education
3. L. Blazevic, S. Giordano, and J.-Y.
LeBoudec, “A Location Based Routing
Method for Mobile Ad Hoc Networks,”
IEEE Trans.Mobile Computing, vol. 4, no. 2,
pp. 97-110, 2005.
4. Y. Ko and N.H. Vaidya, “Location-Aided
Routing (LAR) in Mobile Ad Hoc
Networks,” ACM/Baltzer Wireless
Networks, vol. 6, no. 4,pp. 307-321, 2002.
5. Y.B. Ko and N. H. Vaidya, "Location-Aided
Routing in Mobile Ad Hoc-Scale for Ad Hoc
Networks," Proceedings of the second ACM
international symposium on Mobile ad hoc
networking & computing, Long Beach, CA,
USA, Wireless Networks (6)307–321, 2000.
6. Gergely V. Záruba, Vamsi K. Chaluvadi, and
Azeem M. Suleman, “LABAR: Location
Area Based Ad Hoc Routing for GPS-Scarce
Table 8: Throughput
No of
connections
AOMDV
( in %)
GD –AOMDV
( in %)
1 14.434 15.348
5 57.636 57.821
10 115.641 119.086
20 200.092 200.113
30 249.998 250.988
40 267.917 273.980
14. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2835-2848 (2016) ISSN: 0975-0290 2848
Wide-Area Ad Hoc Networks”IEEE;00,
2003,7-7669955-1-1889953;0-13.
7. B. Karp and H. Kung,. “GPSR: Greedy
Perimeter Stateless Routing for Wireless
Networks” in: Proceedings of ACM
MobiCom, pp. 243–254, 2000.
8. Tzay-Farn Shih and Hsu-Chun Yen,
“Location-aware routing protocol with
dynamic adaptation ofrequest zone for
mobile ad hoc networks”, Springer Wireless
Network,14:321–333,DOI 10.1007/s11276-
006-9955-y, 2008.
9. Mohammad A. Mikki, “Energy Efficient
Location Aided Routing Protocol for
Wireless MANETs” International Journal of
computer science and Information Security,
Vol. 4, No.1 & 2, pp 331-337, 2009.
10. Karim El Defrawy, Member, and Gene
Tsudik, Senior Member,“Privacy-Preserving
Location-Based On-Demand Routing in
MANETs” IEEE JOURNAL ON
SELECTED AREAS IN
COMMUNICATIONS, ( 29): 10,1926-1934,
2011.
11. Haiying Shen and Lianyu Zhao ALERT, “An
Anonymous LocationBased Efficient
Routing Protocol in MANETs”, IEEE
Transactions On Mobile Computing, (12)
6:1079-1093, 2013.
12. Mohammad Al-Rabayah, Robert Malaney,
“A New Hybrid Location-based Ad Hoc
Routing Protocol” IEEE Communications
Society subject matter experts for
publication, 978-1-4244-5638-3/10, 2010.
13. Dan Lue & Jipeng Jhou,."An Improved
Hybrid Location Based Routing Protocol For
Ad-H0c network" IEEE Network,978-1-
4244-6252, 2011.
14. Jangsu Lee, Seunghwan Y00, and Sungchun
Kim, “Energy aware Routing in Location
based Ad-hoc Networks”Proceedings of the
4th International Symposium
onCommunications, Control and Signal
Processing, ISCCSP, 978-1-4244-6287-2, 3-
5, Mar-2010.
15. Shanshan Lu, Yanliang Liu, Yonghe Liu and
Mohan Kumar, “A Location Based Routing
Scheme For Opportunistic Networks” IEEE
Netwok, 978-1-4673-2433, 2012.
16. George Dharma Prakash, Raj E., S. Selva
Kumar and R. Lekha,“LBRP:
GEOGRAPHIC ROUTING PROTOCOLS
FOR MANETs” IEEE-International
Conference on Recent Trends in Information
Technology, ICRTIT, 978-1-4577-0590,
2011.
17. Jin-I Kim, Jeong-Young Song, Yoon-cheol
Hwang, “Location-based Routing Algorithm
Using Clustering in the MANET” Future
Generation Communication and Networking
(FGCN), (2 ): 527 – 531,0-7695-3048-6 ,
2007.
18. Haidar Safa ,Hassan Artail and Diana Tabet,
“A cluster-based trustaware routing protocol
for mobile ad hoc networks” Springer
Science Business Media, LLC, 16:969–984,
DOI 10.1007/s11276-009-0182-1, 2010.
19. Thipchaksurat Sakachai and Putthiphong
Kirdpipat “Impact of Mobility on Location-
based Routing with Adaptive Request Zone
in Mobile Ad-hoc Networks” IEEE Network,
978-1-4673-2025 , 2012.
20. Juanfei Shi and Kai Liu, “Power-efficient
Location-based Cooperative Routing in
Wireless Networks” IEEE Network, 978-1-
4673-0199, pp. 1454-1458. 2012.
21. S. Basagni, I. Chlamtac, V.R. Syrotiuk, B.A.
Woodward, “A distance routing effect
algorithm for mobility (DREAM)” in:
Proceedings of the ACM MOBICOM, pp.
76–84, 1998.
22. Stojmenovic, I., Lin, X., “ Power aware
localized routing in wireless networks”,IEEE
Transactions on Parallel and Distributed
Systems , 12 (11), 1122–1133, 2001.
23. Proakis, J., Digital Communication, fourth
ed. McGraw Hill.2001
24. M. K. Marina and S. R. Das ,”Ad hoc On-
demand Multipath Distance Vector
Routing”. Proc. WCMC, pp. 969-988, 2006.