SlideShare a Scribd company logo
SUBMITTED BY:
Mona
[1]Shivashankar, Golla Varaprasad, Guruswaamy jayanthi-
Designing energy Routing Protocol with Power consumption
Optimization in MANET||IEEE Transaction on Emerging Topics
in Computing, pp,1-4,October 2013
 Study the mobile adhoc network.
 Study various power aware routing protocols
of Manet.
 Study Matlab.
 Implement routing protocols such as EPAR,
DSR,MTPR in Matlab.
 Study performance analysis of various
protocol based on parameters such as Packet
delivery ratio ,Delay, Throughput.
 Need: Access computing and communication services, on the
move
 Infrastructure-based Networks
◦ traditional cellular systems (base station infrastructure)
 Wireless LANs
◦ Infrared (IrDA) or radio links (Wavelan)
◦ very flexible within the reception area; ad-hoc networks possible
◦ low bandwidth compared to wired networks (1-1000 Mbit/s)
 Ad hoc Networks
◦ useful when infrastructure not available, impractical, or expensive
◦ military applications, rescue, home networking
4
 Two types of wireless networks:
◦ infrastructured network:
 base stations are the bridges
 a mobile host will communicate with the nearest base station
 handoff is taken when a host roams from one base to
another
◦ ad hoc network:
 infrastructureless: no fixed base stations
 without the assistance of base stations for communication
 Due to transmission range constraint,
 two MHs need multi-hop routing for communication
 quickly and unpredictably changing topology
Characteristics
◦ Energy constrained
nodes
◦ Bandwidth constrained
◦ Variable capacity
wireless links
◦ Dynamic topology
6
• Information exchange in a network of mobile and wireless
nodes without any infrastructural support.
• Such networks are often called ad hoc networks to
emphasize that they do not depend on infrastructural
support.
• A mobile ad-hoc network is a mobile, multi-hop wireless
network which is capable of autonomous operation.
• The purpose of an ad hoc network is to set up (possibly) a
short-lived network for a collection of nodes.
 Host movement frequent
 Topology change frequent
 No cellular infrastructure. Multi-hop wireless
links.
 Data must be routed via intermediate nodes.
7
A
B A
B
 Setting up of fixed access points and
backbone infrastructure is not always viable
◦ Infrastructure may not be present in a disaster area
or war zone
◦ Infrastructure may not be practical for short-range
radios; Bluetooth (range ~ 10m)
 Ad hoc networks:
◦ Do not need backbone infrastructure support
◦ Are easy to deploy
◦ Useful when infrastructure is absent, destroyed or
impractical
8
 No base station. No fixed infrastructure.
 Traditional fixed networks routing schemes are not effective.
◦ E.g. Link state and distance vector routing algorithms
 MANET nodes cooperate to provide routing service.
◦ A node communicates directly with nodes in wireless
range.
◦ For all other destinations, a dynamically determined multi-
hop route through other nodes.
◦ Rely on each other to forward packets to their destination.
9
 Personal area networking
◦ cell phone, laptop, ear phone, wrist watch
 Military environments
◦ soldiers, tanks, planes
 Civilian environments
◦ taxi cab network
◦ meeting rooms
◦ sports stadiums
◦ boats, small aircraft
 Emergency operations
◦ search-and-rescue
◦ policing and fire fighting
10
12
Ad hoc On-Demand Distance vector
 AODV is an improvement over DSDV, which
minimizes the number of required broadcasts by
creating routes on demand.
 Nodes that are not in a selected path do not
maintain routing information or participate in
routing table exchanges.
 A source node initiates a path discovery process to
locate the other intermediate nodes (and the
destination), by broadcasting a Route Request
(RREQ) packet to its neighbors.
13
Route Discovery in AODV Protocol
Source
Destination
1
3
2
5
7
4
6
8
(a) Propagation of Route Request (RREQ) Packet
Source
Destination
(b) Path Taken by the Route Reply (RREP) Packet
1
3
2
5
7
4
6
8
Hop1 Hop2 Hop3
14
Dynamic Source Routing
 The protocol consists of three major phases: Route
Discovery, Route Reply, Path Establishment.
 When a mobile node has a packet to send to some
destination, it first consults its route cache to check
whether it has a route to that destination.
 If it is an un-expired route, it will use this route.
 If the node does not have a route, it initiates route
discovery by broadcasting a Route Request packet.
 This Route Request contains the address of the
destination, along with the source address.
15
Dynamic Source Request (Cont’d)
 Each node receiving the packet checks to see whether it
has a route to the destination. If it does not, it adds its own
address to the route record of the packet and forwards it.
 A route reply is generated when the request reaches either
the destination itself or an intermediate node that contains
in its route cache an un-expired route to that destination.
 If the node generating the route reply is the destination, it
places the the route record contained in the route request
into the route reply.
B
A
S E
F
H
J
D
C
G
I
K
Z
Y
Represents a node that has received RREQ for D from S
M
N
L
B
A
S E
F
H
J
D
C
G
I
K
Represents transmission of RREQ
Z
Y
Broadcast transmission
M
N
L
[S]
[X,Y] Represents list of identifiers appended to RREQ
B
A
S E
F
H
J
D
C
G
I
K
Z
Y
M
N
L
[S,E]
[S,C]
B
A
S E
F
H
J
D
C
G
I
K
Z
Y
M
N
L
[S,C,G,K]
[S,E,F,J]
•Destination D on receiving the first RREQ,
sends a Route Reply (RREP)
•RREP is sent on a route obtained by
reversing the route appended to received
RREQ
•RREP includes the route from S to D on
which RREQ was received by node D
B
A
S E
F
H
J
D
C
G
I
K
Z
Y
M
N
L
RREP [S,E,F,J,D]
Represents RREP control message
B
A
S E
F
H
J
D
C
G
I
K
Z
Y
M
N
L
DATA [S,E,F,J,D]
Packet header size grows with route length



 Signal to Noise
Formula
 Formula to calculate the
total transmission
power for route L
 The desired route k
calculation
 Doesn’t give the
minimum number of
hops


 Using previous scheme,
maximize the life time of
each node and use the
battery fairly can’t be
achieve simultaneously
 Use battery capacity
instead of cost function
 Choose route with
minimum total
transmission power
among routes that have
nodes with sufficient
remaining battery capacity

More Related Content

What's hot

CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
Gaurav Dalvi
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
Varsha Anandani
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
NIIS Institute of Business Management, Bhubaneswar
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
Yoav Francis
 
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)
Senthil Kanth
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
shiujinghan
 
Manet
ManetManet
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Sushant Kushwaha
 
A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingA comparative study of reactive and proactive routing
A comparative study of reactive and proactive routing
Abhiram Subhagan
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
Zakaria Zubi
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOC
Amitoj Kaur
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc Networks
Kishan Patel
 
survey of manet protocols
survey of manet protocolssurvey of manet protocols
survey of manet protocols
IIIT Jaganathan
 
Secure Routing with AODV Protocol for MANET by Ashok Panwar
Secure Routing with AODV Protocol for MANET by Ashok PanwarSecure Routing with AODV Protocol for MANET by Ashok Panwar
Secure Routing with AODV Protocol for MANET by Ashok Panwar
Ashok Panwar
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
Darshan Rathi
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
Prafull Johri
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
Sohebuzzaman Khan
 
Mobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor NetworksMobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor Networks
Sushant Kushwaha
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
Narendra Singh Yadav
 

What's hot (20)

CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 
Manet
ManetManet
Manet
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
 
A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingA comparative study of reactive and proactive routing
A comparative study of reactive and proactive routing
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOC
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc Networks
 
survey of manet protocols
survey of manet protocolssurvey of manet protocols
survey of manet protocols
 
Secure Routing with AODV Protocol for MANET by Ashok Panwar
Secure Routing with AODV Protocol for MANET by Ashok PanwarSecure Routing with AODV Protocol for MANET by Ashok Panwar
Secure Routing with AODV Protocol for MANET by Ashok Panwar
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
 
Mobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor NetworksMobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor Networks
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
 

Similar to Mona

implementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolimplementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocol
Atul Atalkar
 
Manet By Vikas mainanwal
Manet By Vikas mainanwalManet By Vikas mainanwal
Manet By Vikas mainanwal
VIKASH MAINANWAL
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
sangusajjan
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
IOSR Journals
 
En33838844
En33838844En33838844
En33838844
IJERA Editor
 
En33838844
En33838844En33838844
En33838844
IJERA Editor
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptx
Sujit833143
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
ijceronline
 
Hd3312521256
Hd3312521256Hd3312521256
Hd3312521256
IJERA Editor
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
IJERA Editor
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
IJLT EMAS
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
ijsrd.com
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
shashi712
 
J0935461
J0935461J0935461
J0935461
IOSR Journals
 
G343741
G343741G343741
G343741
IJERA Editor
 
G343741
G343741G343741
G343741
IJERA Editor
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
Chandra Meena
 
Presentation MANETs.pptx
Presentation MANETs.pptxPresentation MANETs.pptx
Presentation MANETs.pptx
Sujit833143
 
Presentation MANETs.pptx
Presentation MANETs.pptxPresentation MANETs.pptx
Presentation MANETs.pptx
priyam219327
 
MANET.ppt
MANET.pptMANET.ppt

Similar to Mona (20)

implementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolimplementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocol
 
Manet By Vikas mainanwal
Manet By Vikas mainanwalManet By Vikas mainanwal
Manet By Vikas mainanwal
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
En33838844
En33838844En33838844
En33838844
 
En33838844
En33838844En33838844
En33838844
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptx
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
 
Hd3312521256
Hd3312521256Hd3312521256
Hd3312521256
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
J0935461
J0935461J0935461
J0935461
 
G343741
G343741G343741
G343741
 
G343741
G343741G343741
G343741
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Presentation MANETs.pptx
Presentation MANETs.pptxPresentation MANETs.pptx
Presentation MANETs.pptx
 
Presentation MANETs.pptx
Presentation MANETs.pptxPresentation MANETs.pptx
Presentation MANETs.pptx
 
MANET.ppt
MANET.pptMANET.ppt
MANET.ppt
 

Recently uploaded

Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 

Recently uploaded (20)

Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 

Mona

  • 2. [1]Shivashankar, Golla Varaprasad, Guruswaamy jayanthi- Designing energy Routing Protocol with Power consumption Optimization in MANET||IEEE Transaction on Emerging Topics in Computing, pp,1-4,October 2013
  • 3.  Study the mobile adhoc network.  Study various power aware routing protocols of Manet.  Study Matlab.  Implement routing protocols such as EPAR, DSR,MTPR in Matlab.  Study performance analysis of various protocol based on parameters such as Packet delivery ratio ,Delay, Throughput.
  • 4.  Need: Access computing and communication services, on the move  Infrastructure-based Networks ◦ traditional cellular systems (base station infrastructure)  Wireless LANs ◦ Infrared (IrDA) or radio links (Wavelan) ◦ very flexible within the reception area; ad-hoc networks possible ◦ low bandwidth compared to wired networks (1-1000 Mbit/s)  Ad hoc Networks ◦ useful when infrastructure not available, impractical, or expensive ◦ military applications, rescue, home networking 4
  • 5.  Two types of wireless networks: ◦ infrastructured network:  base stations are the bridges  a mobile host will communicate with the nearest base station  handoff is taken when a host roams from one base to another ◦ ad hoc network:  infrastructureless: no fixed base stations  without the assistance of base stations for communication  Due to transmission range constraint,  two MHs need multi-hop routing for communication  quickly and unpredictably changing topology
  • 6. Characteristics ◦ Energy constrained nodes ◦ Bandwidth constrained ◦ Variable capacity wireless links ◦ Dynamic topology 6 • Information exchange in a network of mobile and wireless nodes without any infrastructural support. • Such networks are often called ad hoc networks to emphasize that they do not depend on infrastructural support. • A mobile ad-hoc network is a mobile, multi-hop wireless network which is capable of autonomous operation. • The purpose of an ad hoc network is to set up (possibly) a short-lived network for a collection of nodes.
  • 7.  Host movement frequent  Topology change frequent  No cellular infrastructure. Multi-hop wireless links.  Data must be routed via intermediate nodes. 7 A B A B
  • 8.  Setting up of fixed access points and backbone infrastructure is not always viable ◦ Infrastructure may not be present in a disaster area or war zone ◦ Infrastructure may not be practical for short-range radios; Bluetooth (range ~ 10m)  Ad hoc networks: ◦ Do not need backbone infrastructure support ◦ Are easy to deploy ◦ Useful when infrastructure is absent, destroyed or impractical 8
  • 9.  No base station. No fixed infrastructure.  Traditional fixed networks routing schemes are not effective. ◦ E.g. Link state and distance vector routing algorithms  MANET nodes cooperate to provide routing service. ◦ A node communicates directly with nodes in wireless range. ◦ For all other destinations, a dynamically determined multi- hop route through other nodes. ◦ Rely on each other to forward packets to their destination. 9
  • 10.  Personal area networking ◦ cell phone, laptop, ear phone, wrist watch  Military environments ◦ soldiers, tanks, planes  Civilian environments ◦ taxi cab network ◦ meeting rooms ◦ sports stadiums ◦ boats, small aircraft  Emergency operations ◦ search-and-rescue ◦ policing and fire fighting 10
  • 11.
  • 12. 12 Ad hoc On-Demand Distance vector  AODV is an improvement over DSDV, which minimizes the number of required broadcasts by creating routes on demand.  Nodes that are not in a selected path do not maintain routing information or participate in routing table exchanges.  A source node initiates a path discovery process to locate the other intermediate nodes (and the destination), by broadcasting a Route Request (RREQ) packet to its neighbors.
  • 13. 13 Route Discovery in AODV Protocol Source Destination 1 3 2 5 7 4 6 8 (a) Propagation of Route Request (RREQ) Packet Source Destination (b) Path Taken by the Route Reply (RREP) Packet 1 3 2 5 7 4 6 8 Hop1 Hop2 Hop3
  • 14. 14 Dynamic Source Routing  The protocol consists of three major phases: Route Discovery, Route Reply, Path Establishment.  When a mobile node has a packet to send to some destination, it first consults its route cache to check whether it has a route to that destination.  If it is an un-expired route, it will use this route.  If the node does not have a route, it initiates route discovery by broadcasting a Route Request packet.  This Route Request contains the address of the destination, along with the source address.
  • 15. 15 Dynamic Source Request (Cont’d)  Each node receiving the packet checks to see whether it has a route to the destination. If it does not, it adds its own address to the route record of the packet and forwards it.  A route reply is generated when the request reaches either the destination itself or an intermediate node that contains in its route cache an un-expired route to that destination.  If the node generating the route reply is the destination, it places the the route record contained in the route request into the route reply.
  • 16. B A S E F H J D C G I K Z Y Represents a node that has received RREQ for D from S M N L
  • 17. B A S E F H J D C G I K Represents transmission of RREQ Z Y Broadcast transmission M N L [S] [X,Y] Represents list of identifiers appended to RREQ
  • 20. •Destination D on receiving the first RREQ, sends a Route Reply (RREP) •RREP is sent on a route obtained by reversing the route appended to received RREQ •RREP includes the route from S to D on which RREQ was received by node D
  • 22. B A S E F H J D C G I K Z Y M N L DATA [S,E,F,J,D] Packet header size grows with route length
  • 23.     Signal to Noise Formula  Formula to calculate the total transmission power for route L  The desired route k calculation  Doesn’t give the minimum number of hops
  • 24.    Using previous scheme, maximize the life time of each node and use the battery fairly can’t be achieve simultaneously  Use battery capacity instead of cost function  Choose route with minimum total transmission power among routes that have nodes with sufficient remaining battery capacity