SlideShare a Scribd company logo
1 of 11
Download to read offline
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012
DOI : 10.5121/ijans.2012.2402 17
PERFORMANCE ANALYSIS OF
IMPROVEDAUTONOMOUS POWER CONTROL
MAC PROTOCOL (IAPCMP) FOR MANETS
Sohan Kumar Yadav1
and D. K. Lobiyal2
1, 2
School of Computer & Systems Sciences, Jawaharlal Nehru University, New Delhi-67,
India
1
jsmsohan@gmail.com, 2
dkl@mail.jnu.ac.in
ABSTRACT
Power Control in Mobile Ad Hoc networks is a critical issue, since nodes are powered by batteries.The
main idea of power control schemes is to use different power levels for RTS/CTS and DATA/ACK. These
schemes may degrade network throughput and reduce energy efficiency of the network. In this paper we
have evaluated the performance of Improved Autonomous Power Control MAC Protocol (IAPCMP),that
allows nodes to dynamically adjust power levels for transmission of DATA/ACK according to the distance
between the transmitter and its neighbors.In IAPCMP power level for transmission of RTS/CTS is also
adjustable. This also used maximum power level for transmitting DATA/ACK periodically to make
neighboring nodes aware about ongoing transmission. The performance of IAPCMP is evaluated through
the metrics namely, packet delivery ratio and rate of energy efficiency.The simulation results show
significant improvement in protocol.
KEYWORDS
IEEE 802.11, Power Control, Energy Saving, Medium Access Control, Ad Hoc Network
1. INTRODUCTION
Mobile Ad Hoc Networks are multi-hop in nature and nodes are operated in distributed manner
without any centralized infrastructure. The topology of the network is dynamically changes due to
the nodes mobility. The nodes may join and leave the network frequently.The interests in such
networks are from their ability to provide temporary and instant wireless networking solutions,
where cellular infrastructures are not easily possible to establish [1, 13, 15].
The Authors [2, 3, 6, 10] have given various power control schemes, out of these some are
discussed here.In these schemes the power saving can be done in various ways.One way is to
make use of some power saving mechanism, which let a node stay in a sleep state by powering
off its wireless network interface, when no communication is required. Another alternative way is
to use power control mechanism, which can adjust transmitting power level to save energy.
In [4,14], Authors are interested in controlling transmit power level to reduce energy
consumption and to increase end-to-end delivery. It should be noted that in Mobile Ad Hoc
Networks transmitting power level control is important for two reasons. One reason is it affects
the traffic carrying capacity. And other is it also affects the spatial reuse i.e. simultaneous
transmission.Since Mobile Ad Hoc Networks are dynamic in nature, therefore, to design an
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012
18
efficient power control protocol for MAC is a challenging task. Various energy efficient MAC
schemes have been proposed for power control in the literature. However, very few schemes
conserve energy without degrading the performance of the networks. But most of the schemes
conserve energy by degrading throughput, delay or other metrics [11, 12].
We define some terms to make clear understanding on the protocol. So, here given the basic
definitions of transmission range, carrier sensing range, and carrier sensing zone [16,17].
Transmission Range– Nodes in transmission range are able to decode data packets correctly.
When two nodes transmit simultaneously, there are RTS/DATA transmission range of the sender
and CTS/ACK transmission range of the receivers.
Carrier Sensing Range– Nodes in a carrier sensing range can sense the sender’s transmission.
This is usually larger than the transmission range. It is generally two times larger than the
transmission range.
Carrier Sensing Zone – The area in which nodes can sense the incoming signals but cannot
decode it correctly, is called carrier sensing zone.
In MAC protocols collision may occurs, to explain collision we explain the term hidden terminal
and collision area as follows.
Collision Area- It is area in which hidden terminals are present. In the collision area, nodes are
neither in RTS/CTS transmission range, nor in DATA/ACK transmission range. But these may
inside the carrier sensing zone of the RTS or CTS. These may at beginning know the ongoing
transmission, but lose sense later. Some nodes in the collision areas may sense the transmission
for a while but they lost it eventually because of the power decrease (as happen in BASIC) or
because of the asymmetry of the link. As shown in figure 1. The shadow parts in figure 1 denote
the collision area, which are called left and right collision area. The transmitting nodes (such as a
node A) in the left collision area will possibly affect the DATA reception in node D, while the
node (as node F) in the right collision area may interfere with the ACK received by node C.
Hidden Terminal- A node is in the receiver’s carrier sensing zone, but is not in sender’s carrier
sensing zone or transmission range, and it may cause a collision to the reception of a DATA
packet at the receiver. As shown in figure 1, node F is the hidden terminal when node C transmits
RTS to node D. similarly, node A is the hidden terminal when node D transmits CTS to node C.
Figure 1 Hidden Terminal and Collision Area [17]
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012
19
In this paper we have evaluated the performances of Improved Autonomous Power Control MAC
Protocol (IAPCMP) that enhance energy efficiency and also improve the end-to-end delay.
The rest of this paper is organized as follows. Section 2 presents the work related to the area.
Section 3 deals a brief introduction of IAPCMP and its analysis with the other metrics. In section
4, we discussed simulation and performance analysis of IAPCMP. Section 5 concludes the works
and gave the possible future extension.
2. RELATED WORK
The IEEE 802.11 standards proposed for wireless LANs have been widely applied to ad hoc
wireless networks. The IEEE 802.11 specifies the parameters for both physical (PHY) and
medium access control (MAC) layer of a network. The MAC layer is the host for a set of
protocols, which are responsible for regulating the use of a shared medium. IEEE 802.11 is the
mostly used MAC protocol [5,7].
2.1. IEEE 802.11 MAC Protocol
IEEE 802.11 MAC protocol is a widely adopted one, in which the header of RTS (Request to
Send), CTS (Clear to Send), and DATA include time duration to indicate when ACK can be
received, that is, if a node can decode RTS, CTS or DATA correctly, it will know the on-going
transmission and can avoid collision at the very first stage.In this scheme, RTS/CTS are send by
using maximum transmit power level, and DATA/ACK are also send by maximum transmit
power level as specified in CTS, RTS respectively. Since here we use same power level for
RTS/CTS and DATA/ACK transmission, so it consumes more energy and also reduces the spatial
reuse [6, 8].
2.2.The BASIC Power Control MAC Protocol
The Basic Power Control MAC protocol uses different transmitting power levels in the handshake
RTS/CTS frames and DAT/ACK frames [4, 6]. When a node transmits the RTS/CTS, maximum
power is used to make all other nodes know the ongoing transmission; while a node transmits
DATA/ACK lower power should be used. Let desired
p be the power level for transmitting
DATA/ACK, and is given by

*
*
max
xthresh
r
desired R
p
p
p = (1)
Where xthresh
R is the minimum signal strength necessary to receive the signal, which is
determined by the physical characteristics of the node, and  is a constant.This protocol may
introduce more collisions. The more collisions means more retransmission, and then higher
throughput will be achieved by higher energyconsumption. This scheme will not beneficial for us
because we are interested in finding higher throughput in less energy consumption. However, if
mobility is present, the low power level transmission will also cause more retransmission, and
thus it will consume higher energy.
2.3. Autonomous Power Control MAC Protocol
This protocol can adjust the transmitting power level for DATA/ACK and RTS/CTS packets both
with respect to the current network situation [6]. This process of adjusting transmitting power
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012
20
level may result in different power levels used by different transmitters in the network. This may
cause excessive collision, and it is likely to impossible to calculate the optimal transmitting power
level according to the global network condition dynamically. A wireless channel uses shared
medium. Therefore excessive high power level causes interference. This reduces traffic carrying
capacity, and battery life of the network. However, if the mobility is present this protocol
degrades the network efficiency.
2.4. Improved Autonomous Power Control MAC Protocol
This protocol can adjust the transmitting power level for RTS/CTS and DATA/ACK packets as
done by Autonomous Power Control MAC protocol. Here Author [6,18], uses maximum power
level max
p for data transmission periodically instead of
ack
data
p when first data collision occurs.
The performance of this protocol evaluated in terms of throughput in mobile and static scenario.
Therefore,throughput is not sufficient to evaluate the performance of any protocol. So, we have
extends our evaluation of this protocol in terms of end-to-end delay and energy consumption.
3. PERFORMANCE ANALYSIS OF IAPCMP
In this section, we discuss the Improved APCMP for MANETs [18].This protocol (IAMPCP) is
considered as improved version of Autonomous power control MAC protocol [6].
In this work we perform the network analysis of IAPCMP in terms of delay ratio and rate of
energy efficiency. More the rate of energy efficiency means the protocol is more efficient.The
IAPCM protocol can adjust the transmitting power level for DATA/ACK packets as well as
RTS/CTS packets according to the network situation in order to reduce the energy consumption.
In IAPCMP transmitting power level for a local node group is adjusted in two ways. The first is
to follow an appropriate power level for transmitting DATA/ACK, depending on the average
distance from the transmitter to all current neighbors. The other is to adjust the power level for
transmitting next RTS/CTS to a value proportional to the DATA/ACK power level. Therefore,
the energy consumption can be lowered by collision avoidance.
In a MAC protocol, we know that the distance can be estimated by using the transmitting power
level at a transmitter and the actual received signal power level at a receiver. Therefore, a
bidirectional links between transmitter and receiver can be ensured, as long as the
transmitter/receiver transmits packets using some suitable power level, at which the
receiver/transmitter can receive the same signal power level. Using this estimated distance
information, the required power level can be calculated. Based on this consideration, in IAPCMP,
transmitting power for sending RTS/CTS packets is adjusted to a level just slightly higher than
that is required for transmitting DATA/ACK packets. We also increase the transmitting power
level for transmitting DATA/ACK periodically to overcome the hidden terminal problem. The
time period to increase the transmit power is considered less than the SIFS time. Further, to
ensure connectivity of the network, we increase transmitting power level gradually, if it is too low
to reach any other node n the network.
3.1. Calculating for Transmitting Power Levelin IAPCMP
In this protocolwe give the process by which the transmission power can be calculated which is
similar to the authors [6] idea. The only difference in my calculation is that we are taking 4
=
k .
In this the distance information is used to determine the transmitting power level. It is also
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012
21
assumed that the noise level at a receiver is less than the signal level. The signal attenuation is
given by

*
4
rec
cts
rts
p
p
d = (2)
Where,
cts
rts
p is transmitting power level for RTS/CTS packets, rec
p is the received signal
power level, and  is a constant dependent on the antenna gain, system loss and wavelength.
Here we set it to 1.
For a given transmitter, suppose that there are ( )
1
−
k mobile nodes as its neighboring nodes. Let
us consider a transmitter wants to send a data packet to another mobile node, say th
k node. It
firstly calculates the distance from the transmitter to the th
k node. The average estimated
distance from the transmitter to the th
k mobile nodes, is given by
∑
=
=
k
i
i
d
k
d
1
' 1
(3)
Where i
d is the estimated distance from the transmitter to the th
i neighboring node.
The power level for transmitting DATA/ACK packets from transmitter to the th
k node is
given by
xthresh
ack
data R
d
p *
4
'
= (4)
The estimated distance between transmitter and the th
k node is represented by k
d ,
and '
d is the average of estimated distance of all k neighboring nodes. If
'
d
dk > , transmitted
via its neighbors which transmitter cancels the transmission due to insufficient transmission
power level. The data packet has to be transmitted via its neighbors which are close to it.
The transmitting power level for the next RTS/CTS is calculated as follows

∗
=
ack
data
cts
rts p
p'
(5)
Where  is a parameter related to the network situation and here it is 1
>
 .
3.2. Transmission cycle for packets in IAPCMP
The transmission cycle of IAPCMP consists of five steps, which are as follows [18]:
Firstly, a transmitter sets the value of ( )
rtsT
cts
rts p
p and ackR
p , which is stored in the routing table
and in the RTS packet. Then the transmitter sends RTS packet using power level
cts
rts
p .
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012
22
The receiver receives RTS packet by power level rec
p and obtains the information about
cts
rts
p ,
ackR
p . With this information, it calculate the desired power level for DATA packets transmission
as follows
xthresh
rec
rtsT
dataT R
p
p
p ∗
= (6)
The receiver estimates distance from the current transmitter by using ackR
p with the estimated
distance, New power level
ack
data
p and
'
cts
rts
p for the receiver is calculated from the equation 4 and
5. The new value of
'
cts
rts
p is set as the new RTS/CTS for receiver. The receiver sends the values
of ( )
ctsR
cts
rts p
p and dataT
p in the CTS packet to the transmitter with the new power level
cts
rts
p .
Transmitting node receives the CTS packet by rec
p and obtains the information carried by it.
Using this information the desirable power level ackR
p for the receiver to transmit ACK packet is
given by
xthresh
rec
ctsR
ackR R
p
p
p ∗
= (7)
Then, transmitter calculates and saves the estimated distance to the current receiver r
d . The
average distance '
d to all the neighbors is calculated. Then it can calculate-
'
,
cts
rts
ack
data p
p , and
'
cts
rts
p
as new transmission power for RTS/CTS. For data transmission it use
ack
data
p .
If the transmitting node does not receive CTS packet after a timeout, it increases the power level
for transmitting RTS/CTS to the previous used value and send RTS again.
We use the maximum power level max
p for data transmission periodically instead of
ack
data
p
whenever first data collision occurs. The time for periodically use of max
p is set to less than
SIFS.After receiving the DATA packet, receiver send back ACK packet using the power level
ack
data
p . If the transmitter receives ACK before the timeout, transmission cycle is completed
successfully. Otherwise, the transmitter transmits the DATA packet again in a same way up to the
maximum retransmission limit.
4. PERFORMANCEEVALUATION
In this section, we evaluated the performance of the IAPCMP [18] with network simulator
GloMoSim [9] and compared with other power control MAC protocols.
4.1. Simulation Environment
We have considered varying node density i.e. 4, 8, 12, and 16 with and without mobility. Further
the other parameters used in simulation are listed in table 1. The career sensing range is 550 m.
and the highest power level at 24.5 dBm.
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012
23
Table 1. Simulator Parameters
Simulation Time 1000 second
Network Area 500 x500
Radio Transmission Range 250 m
Propagation model two-ray path loss
Bandwidth 2 Mbps
Node Placement Random
Mobility-Wp-pause 0.1 Millisecond
Mobility-Wp-Min-Speed 0 m/s
Mobility-Wp-Max-Speed 10 m/s
Noise Figure 4
Radio-Tx-Power 24.5 dBm
Radio-Antenna-Gain 0.0 dBm
Radio-Rx-Sensitivity -71.42 dBm
Mobility Model Random Way Point
Routing LAR1
Promiscuous-Mode No
4.2. Simulation Results
We used following metrics to evaluate the performance of the IAPCMP, APCMP, BPCMP, and
IEEE 802.11 protocols under both the mobile and static environment. In mobile condition the
maximum speed is considered 10 m/s.
Delivery Ratio: It is the total number of data packets successfully delivered out of the total
number of data packets sent. This shows an external measure of connectivity performance.
Delivery Ratio = Total number of packets deliver / Total number of packets sent
Rate of Energy Efficiency: It is the number of data bits delivered/joule energy consumed.
Higher the rate of energy efficiency means protocol more efficient.
Rate of Energy Efficiency = total number of data bits / total energy consumed (joule)
Figure 2 shows the delivery ratio for different network size of 4, 8, 12, and 16 nodes in a static
situation. Therefore, from results we conclude that the delivery ratio of IAPCMP is comparatively
better than other protocols i.e. BPCMP, APCMP, etc.
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012
24
Figure 2. Comparison of Delivery Ratio in Static Situation
Figure 3.Comparison of Energy Efficiency in Static Situation
0.93
0.94
0.95
0.96
0.97
0.98
0.99
1
1.01
0 4 8 12 16
Delivery
Ratio
Number of nodes
802.11 IAPCMP
APCMP BPCMP
0
10
20
30
40
50
60
70
80
90
100
110
0 4 8 12 16
Bits
per
joule
(×10000)
Number of nodes
IAPCMP APCMP
BPCMP 802.11
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012
25
Figure 4. Comparison of Delivery Ratio in Mobile Condition(max speed 10 m/s)
Figure 3 shows the rate of energy efficiency for different network size of 4, 8, 12, 16 nodes in
static situation. Therefore, from the figure 3 it is clear that IMPCMP is more energy efficient than
the BPCMP, APCMP, IEEE 802.11.
Figure 4 shows the delivery ratio of network in mobile environment with maximum moving
speed of a node is 10 m/s. Figure 4 tells that the IAPCMP performs better than BPCMP, and
other protocols.
Figure 5.Comparison of Energy Efficiency in Mobile Condition (max speed 10 m/s)
Figure 5 clearly shows that energy efficiency of proposed protocol in moble situation with
maximun moving speed of node (10 m/s) is better in comparision to APCMP, BPCMP, IEEE
802.11.
0.93
0.94
0.95
0.96
0.97
0.98
0.99
1
1.01
1.02
0 4 8 12 16
Delivery
Ratio
Number of nodes
802.11 IAPCMP
APCMP BPCMP
0
10
20
30
40
50
60
70
80
90
100
110
0 4 8 12 16
Bits
per
joule
(×1000)
Number of nodes
IAPCMP APCMP
BPCMP 802.11
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012
26
5. CONCLUSIONS
Mobile Ad Hoc Networks are powered by batteries and there is no centralized administration.
Therefore, to reduce overall energy consumption is vital for providing quality of service in
mobile ad hoc networks.Thus, to increase the network performance, improved autonomous power
control MAC protocolfor mobile ad hoc networks can adjust transmitting power level
automatically as well as periodically according to the network situation. It reduces collision
except first one. Therefore, this protocol saves energy without degrading data delivery ratio.It
also increases rate of energy efficiency. From the simulation results obtained, it is clear that
IAPCMP has better results than BPCMP, APCMP, and IEEE 802.11in terms of metrics end-to-
end delay and energy efficiency. It also serves the purpose of energy conservation through power
control, and decreases collision rate. IAPCMP does not degrade the network quality as generally
other protocols do while conserving energy. Therefore, from the simulation results it is shown
that IAPCMP yields significant improvement in power savingand delivery ratio of the network.
ACKNOWLEDGEMENTS
The work presented in this paper was supported by Council of Scientific & Industrial Research
(Human Resource Development Group), New Delhi, India.
REFERENCES
Authors
[1] Murthy, C. S. Ram&Manoj, B.S.,(2005) “Ad Hoc Networks: Architectures and Protocols”, Second
Edition, Pearson Education.
[2] Chang, C.Y. & Chang, H.R., (2007) “Power Control and fairness MAC mechanisms for 802.11
WLWNs”, Computer Communications 30, pp1527-1537.
[3] Jung, E.S. &Vaidya, N. H., (2005) “A Power Control MAC Protocol for Ad Hoc
Networks”,ACM/Kluwer journal on wireless networks (WINET), Vol. 11, pp55-56.
[4] Jung, E.S. &Vaidya, N.,(2002) “An Energy Efficient MAC Protocol for wireless LANs”,
Inproceedings of INFOCOM.
[5] F. Ye, S. Yi & B. Sikda., (2003) “Improving Spatial reuse of IEEE 802.11 based Ad Hoc Networks”,
Proc. IEEE GLOBECOM.
[6] Chen, H.H., Fan, Z. &Li, J., (2006) “Autonomous Power Control for MAC Protocol for Mobile Ad
Hoc Networks”,Hindwani Publishing Corporation, EURUSIP Journals on Wireless Communication
and Networking, Vol. 2006, Article ID 36040, pp 01-10.
[7] Gomez, J., Campbell, A.T., Naghshineh, M.&Bisdikian, C., (2001)“Conserving Transmission Power
in Wireless Ad Hoc Networks”, In ICNP 01.
[8] Monks, J.P., Ebert, J.P., Wolisz, A. &Hwu, W.M.W., (2001)“A Study of the Energy Saving and
Capacity Improvement Potential of Power Control in Multi-hop Wireless Networks”, In proceeding
of 26th Annual IEEE Conference on Local Computer Networks (LCN) and Workshop on Wireless
Local Networks (WLN), Tampa (FL), USA.
[9] Nuevo, J., (2004) A Comprehensible GloMoSim Tutorial.
[10] Xu, K., Gerla, M. &Bae, S., (2002)”How Effective is the IEEE 802.11 RTS/CTS Handshake in Ad
Hoc Networks?”, In Proceeding GLOBECOM 2002, Taipei.
[11] Qin, L. &Kunz, T., (2004)“Survey on Mobile Ad Hoc Network Routing Protocols and Cross-layer
Design”, Carleton University, Systems and Computer Engineering, In Technical Report SCE,pp04-
14.
[12] Krunz, M. & Muqattash, A., (2004)“Transmission Power Control in Wireless Ad Hoc Networks;
Challenges, solutions, and open issues”,The University of Arizona Sung-Ju Lee, Hewletl-Packard
Laboratories, IEEE Network.
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012
27
[13] Gupta, P. &Kumar, P.R., (2000)“The Capacity of Wireless Networks”, IEEE Transaction on
information theory, vol. 46 no. 2, pp388-404.
[14] Agarwal, S., Krishnamurthy, S., Katz, R.H. &Dao, S.K. (2001)“Distributed Power Control in Ad-hoc
wireless networks”, In PIMRC01.
[15] Kawadin, V. &Kumar, P.R., (2003)“Power Control and Clustering in Ad Hoc Networks”, Proc. Of
IEEE. INFOCOM, pp459-469.
[16] Varvariyos, Emmanouel A., Vasileios, G. & Nikolaos, K. (2009) “The slow start power control MAC
protocol for mobile ad hoc networks and its performance analysis”, Ad Hoc Networks 7, pp1136-
1149.
[17] Yan, Hairong., Li, J., Sun, G., Chen & Haiaso-Hwa (2006) “An optimistic power control MAC
protocol for mobile Ad Hoc Networks”, IEE ICC Proceedings, pp3615-3620.
[18] Yadav, SohanKumar&Lobiyal, D.K. (2012) “Improved Autonomous Power Control MAC Protocol
for MANETs”, In proceedings of Second International Conference on Advances in Computing and
Information Technology (ACITY), 13-15thJuly 2012 (Springer), pp 553-562.
Authors
Sohan Kumar Yadav
Received his Master of Technology in Computer Science from Jawaharlal Nehru
University, India in2010. Presently, he is aresearch scholar in Computer Science from
the School of Computer and Systems Sciences, Jawaharlal Nehru University, India.
His areas of research interest are Mobile Ad hoc Networks, operation research.
D. K. Lobiyal
Received his Bachelor of Technology in Computer Science from Lucknow University,
India, in 1988 and his Master of Technology and PhD both in Computer Science from
Jawaharlal Nehru University, New Delhi, India, 1991 and 1996, respectively. Presently,
he is an Associate Professor in the School of Computer and Systems Sciences,
Jawaharlal Nehru University, India. His areas of research interest are Mobile Ad hoc
Networks, Vehicular Ad Hoc Networks, Wireless Sensor Network and Video on
Demand.
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012
27
[13] Gupta, P. &Kumar, P.R., (2000)“The Capacity of Wireless Networks”, IEEE Transaction on
information theory, vol. 46 no. 2, pp388-404.
[14] Agarwal, S., Krishnamurthy, S., Katz, R.H. &Dao, S.K. (2001)“Distributed Power Control in Ad-hoc
wireless networks”, In PIMRC01.
[15] Kawadin, V. &Kumar, P.R., (2003)“Power Control and Clustering in Ad Hoc Networks”, Proc. Of
IEEE. INFOCOM, pp459-469.
[16] Varvariyos, Emmanouel A., Vasileios, G. & Nikolaos, K. (2009) “The slow start power control MAC
protocol for mobile ad hoc networks and its performance analysis”, Ad Hoc Networks 7, pp1136-
1149.
[17] Yan, Hairong., Li, J., Sun, G., Chen & Haiaso-Hwa (2006) “An optimistic power control MAC
protocol for mobile Ad Hoc Networks”, IEE ICC Proceedings, pp3615-3620.
[18] Yadav, SohanKumar&Lobiyal, D.K. (2012) “Improved Autonomous Power Control MAC Protocol
for MANETs”, In proceedings of Second International Conference on Advances in Computing and
Information Technology (ACITY), 13-15thJuly 2012 (Springer), pp 553-562.
Authors
Sohan Kumar Yadav
Received his Master of Technology in Computer Science from Jawaharlal Nehru
University, India in2010. Presently, he is aresearch scholar in Computer Science from
the School of Computer and Systems Sciences, Jawaharlal Nehru University, India.
His areas of research interest are Mobile Ad hoc Networks, operation research.
D. K. Lobiyal
Received his Bachelor of Technology in Computer Science from Lucknow University,
India, in 1988 and his Master of Technology and PhD both in Computer Science from
Jawaharlal Nehru University, New Delhi, India, 1991 and 1996, respectively. Presently,
he is an Associate Professor in the School of Computer and Systems Sciences,
Jawaharlal Nehru University, India. His areas of research interest are Mobile Ad hoc
Networks, Vehicular Ad Hoc Networks, Wireless Sensor Network and Video on
Demand.
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012
27
[13] Gupta, P. &Kumar, P.R., (2000)“The Capacity of Wireless Networks”, IEEE Transaction on
information theory, vol. 46 no. 2, pp388-404.
[14] Agarwal, S., Krishnamurthy, S., Katz, R.H. &Dao, S.K. (2001)“Distributed Power Control in Ad-hoc
wireless networks”, In PIMRC01.
[15] Kawadin, V. &Kumar, P.R., (2003)“Power Control and Clustering in Ad Hoc Networks”, Proc. Of
IEEE. INFOCOM, pp459-469.
[16] Varvariyos, Emmanouel A., Vasileios, G. & Nikolaos, K. (2009) “The slow start power control MAC
protocol for mobile ad hoc networks and its performance analysis”, Ad Hoc Networks 7, pp1136-
1149.
[17] Yan, Hairong., Li, J., Sun, G., Chen & Haiaso-Hwa (2006) “An optimistic power control MAC
protocol for mobile Ad Hoc Networks”, IEE ICC Proceedings, pp3615-3620.
[18] Yadav, SohanKumar&Lobiyal, D.K. (2012) “Improved Autonomous Power Control MAC Protocol
for MANETs”, In proceedings of Second International Conference on Advances in Computing and
Information Technology (ACITY), 13-15thJuly 2012 (Springer), pp 553-562.
Authors
Sohan Kumar Yadav
Received his Master of Technology in Computer Science from Jawaharlal Nehru
University, India in2010. Presently, he is aresearch scholar in Computer Science from
the School of Computer and Systems Sciences, Jawaharlal Nehru University, India.
His areas of research interest are Mobile Ad hoc Networks, operation research.
D. K. Lobiyal
Received his Bachelor of Technology in Computer Science from Lucknow University,
India, in 1988 and his Master of Technology and PhD both in Computer Science from
Jawaharlal Nehru University, New Delhi, India, 1991 and 1996, respectively. Presently,
he is an Associate Professor in the School of Computer and Systems Sciences,
Jawaharlal Nehru University, India. His areas of research interest are Mobile Ad hoc
Networks, Vehicular Ad Hoc Networks, Wireless Sensor Network and Video on
Demand.

More Related Content

Similar to Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCMP) for MANETS

Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and linkIJCNCJournal
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manetAlexander Decker
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manetAlexander Decker
 
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...ijmnct
 
A Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSNA Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSNIRJET Journal
 
Survey on scheduling and radio resources allocation in lte
Survey on scheduling and radio resources allocation in lteSurvey on scheduling and radio resources allocation in lte
Survey on scheduling and radio resources allocation in lteijngnjournal
 
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...IJECEIAES
 
An adaptive power controlled mac protocol for
An adaptive power controlled mac protocol forAn adaptive power controlled mac protocol for
An adaptive power controlled mac protocol forambitlick
 
Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...
Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...
Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...IRJET Journal
 
Vtc conf presentation - cdt website
Vtc conf presentation - cdt websiteVtc conf presentation - cdt website
Vtc conf presentation - cdt websiteimad Al-Samman
 
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...journalBEEI
 
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...IRJET Journal
 
Optimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVOptimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVTELKOMNIKA JOURNAL
 
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...IJECEIAES
 

Similar to Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCMP) for MANETS (20)

Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
Enhancing Power Unbiased Cooperative Media Access Control Protocol in ManetsEnhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
 
B04020812
B04020812B04020812
B04020812
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manet
 
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
 
A Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSNA Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSN
 
Survey on scheduling and radio resources allocation in lte
Survey on scheduling and radio resources allocation in lteSurvey on scheduling and radio resources allocation in lte
Survey on scheduling and radio resources allocation in lte
 
Fo2510211029
Fo2510211029Fo2510211029
Fo2510211029
 
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...
 
An adaptive power controlled mac protocol for
An adaptive power controlled mac protocol forAn adaptive power controlled mac protocol for
An adaptive power controlled mac protocol for
 
Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...
Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...
Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...
 
Vtc conf presentation - cdt website
Vtc conf presentation - cdt websiteVtc conf presentation - cdt website
Vtc conf presentation - cdt website
 
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
 
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
Optimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVOptimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADV
 
Lte
LteLte
Lte
 
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
 

More from pijans

Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Nodepijans
 
Path Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc NetworkPath Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc Networkpijans
 
Study of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh NetworkStudy of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh Networkpijans
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -pijans
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networkspijans
 
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance ComparisonWireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparisonpijans
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
 
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...pijans
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routingpijans
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETpijans
 
Manet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication PlatformManet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication Platformpijans
 
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...pijans
 
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXPuzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXpijans
 
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...pijans
 
PAPR, Spectral Efficiency, BER and SNR Analysis of OFDM: A Novel Partial Tran...
PAPR, Spectral Efficiency, BER and SNR Analysis of OFDM: A Novel Partial Tran...PAPR, Spectral Efficiency, BER and SNR Analysis of OFDM: A Novel Partial Tran...
PAPR, Spectral Efficiency, BER and SNR Analysis of OFDM: A Novel Partial Tran...pijans
 

More from pijans (20)

Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
 
Path Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc NetworkPath Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc Network
 
Study of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh NetworkStudy of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh Network
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networks
 
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance ComparisonWireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...
 
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routing
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANET
 
Manet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication PlatformManet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication Platform
 
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
 
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXPuzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
 
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
 
PAPR, Spectral Efficiency, BER and SNR Analysis of OFDM: A Novel Partial Tran...
PAPR, Spectral Efficiency, BER and SNR Analysis of OFDM: A Novel Partial Tran...PAPR, Spectral Efficiency, BER and SNR Analysis of OFDM: A Novel Partial Tran...
PAPR, Spectral Efficiency, BER and SNR Analysis of OFDM: A Novel Partial Tran...
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 

Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCMP) for MANETS

  • 1. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012 DOI : 10.5121/ijans.2012.2402 17 PERFORMANCE ANALYSIS OF IMPROVEDAUTONOMOUS POWER CONTROL MAC PROTOCOL (IAPCMP) FOR MANETS Sohan Kumar Yadav1 and D. K. Lobiyal2 1, 2 School of Computer & Systems Sciences, Jawaharlal Nehru University, New Delhi-67, India 1 jsmsohan@gmail.com, 2 dkl@mail.jnu.ac.in ABSTRACT Power Control in Mobile Ad Hoc networks is a critical issue, since nodes are powered by batteries.The main idea of power control schemes is to use different power levels for RTS/CTS and DATA/ACK. These schemes may degrade network throughput and reduce energy efficiency of the network. In this paper we have evaluated the performance of Improved Autonomous Power Control MAC Protocol (IAPCMP),that allows nodes to dynamically adjust power levels for transmission of DATA/ACK according to the distance between the transmitter and its neighbors.In IAPCMP power level for transmission of RTS/CTS is also adjustable. This also used maximum power level for transmitting DATA/ACK periodically to make neighboring nodes aware about ongoing transmission. The performance of IAPCMP is evaluated through the metrics namely, packet delivery ratio and rate of energy efficiency.The simulation results show significant improvement in protocol. KEYWORDS IEEE 802.11, Power Control, Energy Saving, Medium Access Control, Ad Hoc Network 1. INTRODUCTION Mobile Ad Hoc Networks are multi-hop in nature and nodes are operated in distributed manner without any centralized infrastructure. The topology of the network is dynamically changes due to the nodes mobility. The nodes may join and leave the network frequently.The interests in such networks are from their ability to provide temporary and instant wireless networking solutions, where cellular infrastructures are not easily possible to establish [1, 13, 15]. The Authors [2, 3, 6, 10] have given various power control schemes, out of these some are discussed here.In these schemes the power saving can be done in various ways.One way is to make use of some power saving mechanism, which let a node stay in a sleep state by powering off its wireless network interface, when no communication is required. Another alternative way is to use power control mechanism, which can adjust transmitting power level to save energy. In [4,14], Authors are interested in controlling transmit power level to reduce energy consumption and to increase end-to-end delivery. It should be noted that in Mobile Ad Hoc Networks transmitting power level control is important for two reasons. One reason is it affects the traffic carrying capacity. And other is it also affects the spatial reuse i.e. simultaneous transmission.Since Mobile Ad Hoc Networks are dynamic in nature, therefore, to design an
  • 2. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012 18 efficient power control protocol for MAC is a challenging task. Various energy efficient MAC schemes have been proposed for power control in the literature. However, very few schemes conserve energy without degrading the performance of the networks. But most of the schemes conserve energy by degrading throughput, delay or other metrics [11, 12]. We define some terms to make clear understanding on the protocol. So, here given the basic definitions of transmission range, carrier sensing range, and carrier sensing zone [16,17]. Transmission Range– Nodes in transmission range are able to decode data packets correctly. When two nodes transmit simultaneously, there are RTS/DATA transmission range of the sender and CTS/ACK transmission range of the receivers. Carrier Sensing Range– Nodes in a carrier sensing range can sense the sender’s transmission. This is usually larger than the transmission range. It is generally two times larger than the transmission range. Carrier Sensing Zone – The area in which nodes can sense the incoming signals but cannot decode it correctly, is called carrier sensing zone. In MAC protocols collision may occurs, to explain collision we explain the term hidden terminal and collision area as follows. Collision Area- It is area in which hidden terminals are present. In the collision area, nodes are neither in RTS/CTS transmission range, nor in DATA/ACK transmission range. But these may inside the carrier sensing zone of the RTS or CTS. These may at beginning know the ongoing transmission, but lose sense later. Some nodes in the collision areas may sense the transmission for a while but they lost it eventually because of the power decrease (as happen in BASIC) or because of the asymmetry of the link. As shown in figure 1. The shadow parts in figure 1 denote the collision area, which are called left and right collision area. The transmitting nodes (such as a node A) in the left collision area will possibly affect the DATA reception in node D, while the node (as node F) in the right collision area may interfere with the ACK received by node C. Hidden Terminal- A node is in the receiver’s carrier sensing zone, but is not in sender’s carrier sensing zone or transmission range, and it may cause a collision to the reception of a DATA packet at the receiver. As shown in figure 1, node F is the hidden terminal when node C transmits RTS to node D. similarly, node A is the hidden terminal when node D transmits CTS to node C. Figure 1 Hidden Terminal and Collision Area [17]
  • 3. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012 19 In this paper we have evaluated the performances of Improved Autonomous Power Control MAC Protocol (IAPCMP) that enhance energy efficiency and also improve the end-to-end delay. The rest of this paper is organized as follows. Section 2 presents the work related to the area. Section 3 deals a brief introduction of IAPCMP and its analysis with the other metrics. In section 4, we discussed simulation and performance analysis of IAPCMP. Section 5 concludes the works and gave the possible future extension. 2. RELATED WORK The IEEE 802.11 standards proposed for wireless LANs have been widely applied to ad hoc wireless networks. The IEEE 802.11 specifies the parameters for both physical (PHY) and medium access control (MAC) layer of a network. The MAC layer is the host for a set of protocols, which are responsible for regulating the use of a shared medium. IEEE 802.11 is the mostly used MAC protocol [5,7]. 2.1. IEEE 802.11 MAC Protocol IEEE 802.11 MAC protocol is a widely adopted one, in which the header of RTS (Request to Send), CTS (Clear to Send), and DATA include time duration to indicate when ACK can be received, that is, if a node can decode RTS, CTS or DATA correctly, it will know the on-going transmission and can avoid collision at the very first stage.In this scheme, RTS/CTS are send by using maximum transmit power level, and DATA/ACK are also send by maximum transmit power level as specified in CTS, RTS respectively. Since here we use same power level for RTS/CTS and DATA/ACK transmission, so it consumes more energy and also reduces the spatial reuse [6, 8]. 2.2.The BASIC Power Control MAC Protocol The Basic Power Control MAC protocol uses different transmitting power levels in the handshake RTS/CTS frames and DAT/ACK frames [4, 6]. When a node transmits the RTS/CTS, maximum power is used to make all other nodes know the ongoing transmission; while a node transmits DATA/ACK lower power should be used. Let desired p be the power level for transmitting DATA/ACK, and is given by  * * max xthresh r desired R p p p = (1) Where xthresh R is the minimum signal strength necessary to receive the signal, which is determined by the physical characteristics of the node, and  is a constant.This protocol may introduce more collisions. The more collisions means more retransmission, and then higher throughput will be achieved by higher energyconsumption. This scheme will not beneficial for us because we are interested in finding higher throughput in less energy consumption. However, if mobility is present, the low power level transmission will also cause more retransmission, and thus it will consume higher energy. 2.3. Autonomous Power Control MAC Protocol This protocol can adjust the transmitting power level for DATA/ACK and RTS/CTS packets both with respect to the current network situation [6]. This process of adjusting transmitting power
  • 4. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012 20 level may result in different power levels used by different transmitters in the network. This may cause excessive collision, and it is likely to impossible to calculate the optimal transmitting power level according to the global network condition dynamically. A wireless channel uses shared medium. Therefore excessive high power level causes interference. This reduces traffic carrying capacity, and battery life of the network. However, if the mobility is present this protocol degrades the network efficiency. 2.4. Improved Autonomous Power Control MAC Protocol This protocol can adjust the transmitting power level for RTS/CTS and DATA/ACK packets as done by Autonomous Power Control MAC protocol. Here Author [6,18], uses maximum power level max p for data transmission periodically instead of ack data p when first data collision occurs. The performance of this protocol evaluated in terms of throughput in mobile and static scenario. Therefore,throughput is not sufficient to evaluate the performance of any protocol. So, we have extends our evaluation of this protocol in terms of end-to-end delay and energy consumption. 3. PERFORMANCE ANALYSIS OF IAPCMP In this section, we discuss the Improved APCMP for MANETs [18].This protocol (IAMPCP) is considered as improved version of Autonomous power control MAC protocol [6]. In this work we perform the network analysis of IAPCMP in terms of delay ratio and rate of energy efficiency. More the rate of energy efficiency means the protocol is more efficient.The IAPCM protocol can adjust the transmitting power level for DATA/ACK packets as well as RTS/CTS packets according to the network situation in order to reduce the energy consumption. In IAPCMP transmitting power level for a local node group is adjusted in two ways. The first is to follow an appropriate power level for transmitting DATA/ACK, depending on the average distance from the transmitter to all current neighbors. The other is to adjust the power level for transmitting next RTS/CTS to a value proportional to the DATA/ACK power level. Therefore, the energy consumption can be lowered by collision avoidance. In a MAC protocol, we know that the distance can be estimated by using the transmitting power level at a transmitter and the actual received signal power level at a receiver. Therefore, a bidirectional links between transmitter and receiver can be ensured, as long as the transmitter/receiver transmits packets using some suitable power level, at which the receiver/transmitter can receive the same signal power level. Using this estimated distance information, the required power level can be calculated. Based on this consideration, in IAPCMP, transmitting power for sending RTS/CTS packets is adjusted to a level just slightly higher than that is required for transmitting DATA/ACK packets. We also increase the transmitting power level for transmitting DATA/ACK periodically to overcome the hidden terminal problem. The time period to increase the transmit power is considered less than the SIFS time. Further, to ensure connectivity of the network, we increase transmitting power level gradually, if it is too low to reach any other node n the network. 3.1. Calculating for Transmitting Power Levelin IAPCMP In this protocolwe give the process by which the transmission power can be calculated which is similar to the authors [6] idea. The only difference in my calculation is that we are taking 4 = k . In this the distance information is used to determine the transmitting power level. It is also
  • 5. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012 21 assumed that the noise level at a receiver is less than the signal level. The signal attenuation is given by  * 4 rec cts rts p p d = (2) Where, cts rts p is transmitting power level for RTS/CTS packets, rec p is the received signal power level, and  is a constant dependent on the antenna gain, system loss and wavelength. Here we set it to 1. For a given transmitter, suppose that there are ( ) 1 − k mobile nodes as its neighboring nodes. Let us consider a transmitter wants to send a data packet to another mobile node, say th k node. It firstly calculates the distance from the transmitter to the th k node. The average estimated distance from the transmitter to the th k mobile nodes, is given by ∑ = = k i i d k d 1 ' 1 (3) Where i d is the estimated distance from the transmitter to the th i neighboring node. The power level for transmitting DATA/ACK packets from transmitter to the th k node is given by xthresh ack data R d p * 4 ' = (4) The estimated distance between transmitter and the th k node is represented by k d , and ' d is the average of estimated distance of all k neighboring nodes. If ' d dk > , transmitted via its neighbors which transmitter cancels the transmission due to insufficient transmission power level. The data packet has to be transmitted via its neighbors which are close to it. The transmitting power level for the next RTS/CTS is calculated as follows  ∗ = ack data cts rts p p' (5) Where  is a parameter related to the network situation and here it is 1 >  . 3.2. Transmission cycle for packets in IAPCMP The transmission cycle of IAPCMP consists of five steps, which are as follows [18]: Firstly, a transmitter sets the value of ( ) rtsT cts rts p p and ackR p , which is stored in the routing table and in the RTS packet. Then the transmitter sends RTS packet using power level cts rts p .
  • 6. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012 22 The receiver receives RTS packet by power level rec p and obtains the information about cts rts p , ackR p . With this information, it calculate the desired power level for DATA packets transmission as follows xthresh rec rtsT dataT R p p p ∗ = (6) The receiver estimates distance from the current transmitter by using ackR p with the estimated distance, New power level ack data p and ' cts rts p for the receiver is calculated from the equation 4 and 5. The new value of ' cts rts p is set as the new RTS/CTS for receiver. The receiver sends the values of ( ) ctsR cts rts p p and dataT p in the CTS packet to the transmitter with the new power level cts rts p . Transmitting node receives the CTS packet by rec p and obtains the information carried by it. Using this information the desirable power level ackR p for the receiver to transmit ACK packet is given by xthresh rec ctsR ackR R p p p ∗ = (7) Then, transmitter calculates and saves the estimated distance to the current receiver r d . The average distance ' d to all the neighbors is calculated. Then it can calculate- ' , cts rts ack data p p , and ' cts rts p as new transmission power for RTS/CTS. For data transmission it use ack data p . If the transmitting node does not receive CTS packet after a timeout, it increases the power level for transmitting RTS/CTS to the previous used value and send RTS again. We use the maximum power level max p for data transmission periodically instead of ack data p whenever first data collision occurs. The time for periodically use of max p is set to less than SIFS.After receiving the DATA packet, receiver send back ACK packet using the power level ack data p . If the transmitter receives ACK before the timeout, transmission cycle is completed successfully. Otherwise, the transmitter transmits the DATA packet again in a same way up to the maximum retransmission limit. 4. PERFORMANCEEVALUATION In this section, we evaluated the performance of the IAPCMP [18] with network simulator GloMoSim [9] and compared with other power control MAC protocols. 4.1. Simulation Environment We have considered varying node density i.e. 4, 8, 12, and 16 with and without mobility. Further the other parameters used in simulation are listed in table 1. The career sensing range is 550 m. and the highest power level at 24.5 dBm.
  • 7. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012 23 Table 1. Simulator Parameters Simulation Time 1000 second Network Area 500 x500 Radio Transmission Range 250 m Propagation model two-ray path loss Bandwidth 2 Mbps Node Placement Random Mobility-Wp-pause 0.1 Millisecond Mobility-Wp-Min-Speed 0 m/s Mobility-Wp-Max-Speed 10 m/s Noise Figure 4 Radio-Tx-Power 24.5 dBm Radio-Antenna-Gain 0.0 dBm Radio-Rx-Sensitivity -71.42 dBm Mobility Model Random Way Point Routing LAR1 Promiscuous-Mode No 4.2. Simulation Results We used following metrics to evaluate the performance of the IAPCMP, APCMP, BPCMP, and IEEE 802.11 protocols under both the mobile and static environment. In mobile condition the maximum speed is considered 10 m/s. Delivery Ratio: It is the total number of data packets successfully delivered out of the total number of data packets sent. This shows an external measure of connectivity performance. Delivery Ratio = Total number of packets deliver / Total number of packets sent Rate of Energy Efficiency: It is the number of data bits delivered/joule energy consumed. Higher the rate of energy efficiency means protocol more efficient. Rate of Energy Efficiency = total number of data bits / total energy consumed (joule) Figure 2 shows the delivery ratio for different network size of 4, 8, 12, and 16 nodes in a static situation. Therefore, from results we conclude that the delivery ratio of IAPCMP is comparatively better than other protocols i.e. BPCMP, APCMP, etc.
  • 8. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012 24 Figure 2. Comparison of Delivery Ratio in Static Situation Figure 3.Comparison of Energy Efficiency in Static Situation 0.93 0.94 0.95 0.96 0.97 0.98 0.99 1 1.01 0 4 8 12 16 Delivery Ratio Number of nodes 802.11 IAPCMP APCMP BPCMP 0 10 20 30 40 50 60 70 80 90 100 110 0 4 8 12 16 Bits per joule (×10000) Number of nodes IAPCMP APCMP BPCMP 802.11
  • 9. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012 25 Figure 4. Comparison of Delivery Ratio in Mobile Condition(max speed 10 m/s) Figure 3 shows the rate of energy efficiency for different network size of 4, 8, 12, 16 nodes in static situation. Therefore, from the figure 3 it is clear that IMPCMP is more energy efficient than the BPCMP, APCMP, IEEE 802.11. Figure 4 shows the delivery ratio of network in mobile environment with maximum moving speed of a node is 10 m/s. Figure 4 tells that the IAPCMP performs better than BPCMP, and other protocols. Figure 5.Comparison of Energy Efficiency in Mobile Condition (max speed 10 m/s) Figure 5 clearly shows that energy efficiency of proposed protocol in moble situation with maximun moving speed of node (10 m/s) is better in comparision to APCMP, BPCMP, IEEE 802.11. 0.93 0.94 0.95 0.96 0.97 0.98 0.99 1 1.01 1.02 0 4 8 12 16 Delivery Ratio Number of nodes 802.11 IAPCMP APCMP BPCMP 0 10 20 30 40 50 60 70 80 90 100 110 0 4 8 12 16 Bits per joule (×1000) Number of nodes IAPCMP APCMP BPCMP 802.11
  • 10. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012 26 5. CONCLUSIONS Mobile Ad Hoc Networks are powered by batteries and there is no centralized administration. Therefore, to reduce overall energy consumption is vital for providing quality of service in mobile ad hoc networks.Thus, to increase the network performance, improved autonomous power control MAC protocolfor mobile ad hoc networks can adjust transmitting power level automatically as well as periodically according to the network situation. It reduces collision except first one. Therefore, this protocol saves energy without degrading data delivery ratio.It also increases rate of energy efficiency. From the simulation results obtained, it is clear that IAPCMP has better results than BPCMP, APCMP, and IEEE 802.11in terms of metrics end-to- end delay and energy efficiency. It also serves the purpose of energy conservation through power control, and decreases collision rate. IAPCMP does not degrade the network quality as generally other protocols do while conserving energy. Therefore, from the simulation results it is shown that IAPCMP yields significant improvement in power savingand delivery ratio of the network. ACKNOWLEDGEMENTS The work presented in this paper was supported by Council of Scientific & Industrial Research (Human Resource Development Group), New Delhi, India. REFERENCES Authors [1] Murthy, C. S. Ram&Manoj, B.S.,(2005) “Ad Hoc Networks: Architectures and Protocols”, Second Edition, Pearson Education. [2] Chang, C.Y. & Chang, H.R., (2007) “Power Control and fairness MAC mechanisms for 802.11 WLWNs”, Computer Communications 30, pp1527-1537. [3] Jung, E.S. &Vaidya, N. H., (2005) “A Power Control MAC Protocol for Ad Hoc Networks”,ACM/Kluwer journal on wireless networks (WINET), Vol. 11, pp55-56. [4] Jung, E.S. &Vaidya, N.,(2002) “An Energy Efficient MAC Protocol for wireless LANs”, Inproceedings of INFOCOM. [5] F. Ye, S. Yi & B. Sikda., (2003) “Improving Spatial reuse of IEEE 802.11 based Ad Hoc Networks”, Proc. IEEE GLOBECOM. [6] Chen, H.H., Fan, Z. &Li, J., (2006) “Autonomous Power Control for MAC Protocol for Mobile Ad Hoc Networks”,Hindwani Publishing Corporation, EURUSIP Journals on Wireless Communication and Networking, Vol. 2006, Article ID 36040, pp 01-10. [7] Gomez, J., Campbell, A.T., Naghshineh, M.&Bisdikian, C., (2001)“Conserving Transmission Power in Wireless Ad Hoc Networks”, In ICNP 01. [8] Monks, J.P., Ebert, J.P., Wolisz, A. &Hwu, W.M.W., (2001)“A Study of the Energy Saving and Capacity Improvement Potential of Power Control in Multi-hop Wireless Networks”, In proceeding of 26th Annual IEEE Conference on Local Computer Networks (LCN) and Workshop on Wireless Local Networks (WLN), Tampa (FL), USA. [9] Nuevo, J., (2004) A Comprehensible GloMoSim Tutorial. [10] Xu, K., Gerla, M. &Bae, S., (2002)”How Effective is the IEEE 802.11 RTS/CTS Handshake in Ad Hoc Networks?”, In Proceeding GLOBECOM 2002, Taipei. [11] Qin, L. &Kunz, T., (2004)“Survey on Mobile Ad Hoc Network Routing Protocols and Cross-layer Design”, Carleton University, Systems and Computer Engineering, In Technical Report SCE,pp04- 14. [12] Krunz, M. & Muqattash, A., (2004)“Transmission Power Control in Wireless Ad Hoc Networks; Challenges, solutions, and open issues”,The University of Arizona Sung-Ju Lee, Hewletl-Packard Laboratories, IEEE Network.
  • 11. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012 27 [13] Gupta, P. &Kumar, P.R., (2000)“The Capacity of Wireless Networks”, IEEE Transaction on information theory, vol. 46 no. 2, pp388-404. [14] Agarwal, S., Krishnamurthy, S., Katz, R.H. &Dao, S.K. (2001)“Distributed Power Control in Ad-hoc wireless networks”, In PIMRC01. [15] Kawadin, V. &Kumar, P.R., (2003)“Power Control and Clustering in Ad Hoc Networks”, Proc. Of IEEE. INFOCOM, pp459-469. [16] Varvariyos, Emmanouel A., Vasileios, G. & Nikolaos, K. (2009) “The slow start power control MAC protocol for mobile ad hoc networks and its performance analysis”, Ad Hoc Networks 7, pp1136- 1149. [17] Yan, Hairong., Li, J., Sun, G., Chen & Haiaso-Hwa (2006) “An optimistic power control MAC protocol for mobile Ad Hoc Networks”, IEE ICC Proceedings, pp3615-3620. [18] Yadav, SohanKumar&Lobiyal, D.K. (2012) “Improved Autonomous Power Control MAC Protocol for MANETs”, In proceedings of Second International Conference on Advances in Computing and Information Technology (ACITY), 13-15thJuly 2012 (Springer), pp 553-562. Authors Sohan Kumar Yadav Received his Master of Technology in Computer Science from Jawaharlal Nehru University, India in2010. Presently, he is aresearch scholar in Computer Science from the School of Computer and Systems Sciences, Jawaharlal Nehru University, India. His areas of research interest are Mobile Ad hoc Networks, operation research. D. K. Lobiyal Received his Bachelor of Technology in Computer Science from Lucknow University, India, in 1988 and his Master of Technology and PhD both in Computer Science from Jawaharlal Nehru University, New Delhi, India, 1991 and 1996, respectively. Presently, he is an Associate Professor in the School of Computer and Systems Sciences, Jawaharlal Nehru University, India. His areas of research interest are Mobile Ad hoc Networks, Vehicular Ad Hoc Networks, Wireless Sensor Network and Video on Demand. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012 27 [13] Gupta, P. &Kumar, P.R., (2000)“The Capacity of Wireless Networks”, IEEE Transaction on information theory, vol. 46 no. 2, pp388-404. [14] Agarwal, S., Krishnamurthy, S., Katz, R.H. &Dao, S.K. (2001)“Distributed Power Control in Ad-hoc wireless networks”, In PIMRC01. [15] Kawadin, V. &Kumar, P.R., (2003)“Power Control and Clustering in Ad Hoc Networks”, Proc. Of IEEE. INFOCOM, pp459-469. [16] Varvariyos, Emmanouel A., Vasileios, G. & Nikolaos, K. (2009) “The slow start power control MAC protocol for mobile ad hoc networks and its performance analysis”, Ad Hoc Networks 7, pp1136- 1149. [17] Yan, Hairong., Li, J., Sun, G., Chen & Haiaso-Hwa (2006) “An optimistic power control MAC protocol for mobile Ad Hoc Networks”, IEE ICC Proceedings, pp3615-3620. [18] Yadav, SohanKumar&Lobiyal, D.K. (2012) “Improved Autonomous Power Control MAC Protocol for MANETs”, In proceedings of Second International Conference on Advances in Computing and Information Technology (ACITY), 13-15thJuly 2012 (Springer), pp 553-562. Authors Sohan Kumar Yadav Received his Master of Technology in Computer Science from Jawaharlal Nehru University, India in2010. Presently, he is aresearch scholar in Computer Science from the School of Computer and Systems Sciences, Jawaharlal Nehru University, India. His areas of research interest are Mobile Ad hoc Networks, operation research. D. K. Lobiyal Received his Bachelor of Technology in Computer Science from Lucknow University, India, in 1988 and his Master of Technology and PhD both in Computer Science from Jawaharlal Nehru University, New Delhi, India, 1991 and 1996, respectively. Presently, he is an Associate Professor in the School of Computer and Systems Sciences, Jawaharlal Nehru University, India. His areas of research interest are Mobile Ad hoc Networks, Vehicular Ad Hoc Networks, Wireless Sensor Network and Video on Demand. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012 27 [13] Gupta, P. &Kumar, P.R., (2000)“The Capacity of Wireless Networks”, IEEE Transaction on information theory, vol. 46 no. 2, pp388-404. [14] Agarwal, S., Krishnamurthy, S., Katz, R.H. &Dao, S.K. (2001)“Distributed Power Control in Ad-hoc wireless networks”, In PIMRC01. [15] Kawadin, V. &Kumar, P.R., (2003)“Power Control and Clustering in Ad Hoc Networks”, Proc. Of IEEE. INFOCOM, pp459-469. [16] Varvariyos, Emmanouel A., Vasileios, G. & Nikolaos, K. (2009) “The slow start power control MAC protocol for mobile ad hoc networks and its performance analysis”, Ad Hoc Networks 7, pp1136- 1149. [17] Yan, Hairong., Li, J., Sun, G., Chen & Haiaso-Hwa (2006) “An optimistic power control MAC protocol for mobile Ad Hoc Networks”, IEE ICC Proceedings, pp3615-3620. [18] Yadav, SohanKumar&Lobiyal, D.K. (2012) “Improved Autonomous Power Control MAC Protocol for MANETs”, In proceedings of Second International Conference on Advances in Computing and Information Technology (ACITY), 13-15thJuly 2012 (Springer), pp 553-562. Authors Sohan Kumar Yadav Received his Master of Technology in Computer Science from Jawaharlal Nehru University, India in2010. Presently, he is aresearch scholar in Computer Science from the School of Computer and Systems Sciences, Jawaharlal Nehru University, India. His areas of research interest are Mobile Ad hoc Networks, operation research. D. K. Lobiyal Received his Bachelor of Technology in Computer Science from Lucknow University, India, in 1988 and his Master of Technology and PhD both in Computer Science from Jawaharlal Nehru University, New Delhi, India, 1991 and 1996, respectively. Presently, he is an Associate Professor in the School of Computer and Systems Sciences, Jawaharlal Nehru University, India. His areas of research interest are Mobile Ad hoc Networks, Vehicular Ad Hoc Networks, Wireless Sensor Network and Video on Demand.