Managing Mobile Wireless Ad Hoc Networks

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Chen W. et.al [23] presented a protocol for managing mobile wireless ad hoc networks. The protocol uses hierarchical clustering of nodes to reduce the number of messages exchanged between the manager and the agents (mobiles). Clustering also enables the network to keep track of mobiles as they roam. The ad hoc network management protocol (ANMP) is fully compatible with simple management protocol, version 3 (SNMPv3) and uses the same protocol data units (PDUs) for data collection. The protocol also implements sophisticated security mechanisms that can be fine-tuned to meet specific requirements. Finally, the researchers have implemented the protocol along with a graphical user interface that allows a manager to change the view or specify management parameters on the fly.

Kravets, R., & Krishnan, P., [24] presented the planning associated implementation of an innovative transport level protocol capable of considerably reducing the ability usage of the communication device. The protocol achieves power savings by selection selecting short periods of your time to suspend communications and finish off the communication device. It manages the vital task of queuing knowledge for future delivery during times of communication suspension, and decides once to restart communication. The researchers additionally addressed the trade-off between reducing power consumption and reducing delay for incoming knowledge. The researchers had given results from experiments exploitation their implementation of the protocol. These experiments live the energy consumption simulated communication patterns yet as three trace-based communication patterns and compare the results of various suspension ways. Their results shown up to 83% within the energy consumed by the communication.

Shen C., et.al [25] presented Ad hoc networks, where mobile nodes communicate via multihop wireless links, facilitated network connectivity without the aid of any preexisting networking infrastructure. The intrinsic attributes of ad hoc networks, such as dynamic network topology, limited battery power, constrained wireless bandwidth and quality, and large number of heterogeneous nodes, make network management significantly more challenging than stationary and wired networks. In particular, the conventional client/server-based manager/agent management paradigm falls short of addressing these issues. The researchers described the Guerrilla management architecture to facilitate adaptive and autonomous management of ad hoc networks. The management capability of Guerrilla is scalable to accommodate the sheer number and heterogeneity of nodes, autonomous and survivable to adapt to network dynamics, and economical to minimize management overhead.

Tamer A. et.al [26] introduced the notion of power management among the context of wireless ad-hoc networks. Additional specifically, the researchers investigated the results of victimization completely different transmit powers on the common power consumption and end-to-end network output during a wireless ad-hoc atmosphere. This power management approach would facilitate in reducing the system power consumption and therefore prolonging the battery lifetime of mobile nodes. What is more, it improves the end-to-end network output as compared to alternative ad-hoc networks during which all mobile nodes use a similar transmit power. The development is attributable to the action of an exchange between minimizing interference ranges, reduction within the average range of hops to achieve a destination, reducing the likelihood of getting isolated clusters, and reducing the common range of transmissions (including retransmissions attributable to collisions). The protocols would initial dynamically confirm associate degree optimum property vary wherever in they adapt their transmit powers thus on solely reach a set of the nodes within the network. The property would then be dynamically modified during a distributed manner thus on deliver the goods the close to optimum output. Minimum power routing is employed to any enhance performance. Simulation studies are administered so as to research these style approaches. It’s seen a network with such an influence managed theme would deliver the goods a stronger end-to-end output performance (about 10% improvement with a slotted acknowledgement raincoat protocol) associate degreed lower transmit power (about an 80%) than a network while not such a theme.

M. Stemm and R. H. Katz [27] introduced next generation hand-held devices should give seamless property whereas obeying demanding power and size constrains. During this paper the researchers examined this issue from the purpose of read of the Network Interface (NI). The researchers measured the ability usage of 2 PDAs, the Apple Newton Message pad and Sony Magic Link, and 4 NIs, the Metricom Ricochet Wireless modem, the AT & T Wavelan operative at 915 megahertz and a 2.4 GHz, and therefore the IBM Infrared Wireless computer network Adapter. These measurements clearly indicate that the ability drained by the network interface constitutes an oversized fraction of the entire power utilized by the PDA. The researchers then examined 2 categories of optimizations that may be wont to scale back network interface energy consumption on these devices: transport-level ways and application-level ways. Simulation experiments of transport-level ways show that the dominant value comes not from the quantity of packets sent or received by a specific transport protocol however the quantity of your time that the metallic element is in a full of life however idle state. Simulation experiments of application-level ways that significant energy savings is created with a minimum of user-visible latency.

Alaa.M and Marwan. M. Krunz [28] proposed a comprehensive solution for power control in mobile ad hoc networks (MANETs). Their resolution emphasizes the interaction between the Medium access control and network layers, whereby the Medium access control layer indirectly influences the choice of the next-hop by properly adjusting the ability of route request packets. This is done while maintaining network connectivity. Channel-gain information obtained mainly from overheard RTS and CTS packets is used to dynamically construct the network topology. Unlike the IEEE 802.11 approach and previously proposed schemes, theirs does not use the RTS/CTS packets to silence the neighboring nodes. Instead, collision avoidance information is inserted in the CTS packets and sent over an out-of-band control channel. This info is employed to dynamically bind the transmission power of probably meddling nodes within the neighborhood of a receiver. By properly estimating the desired transmission power for information packets, their protocol permits for interference-limited synchronal transmissions to require place within the neighborhood of a receiving node. Simulation results indicate that, compared to the IEEE 802.11 approach, the proposed protocol achieves a significant increase in the channel utilization and end-to-end network throughput and a significant decrease in the total energy consumption.

Alaa.M and Marwan.M. Krunz [29] presented transmission power control (TPC) has great potential to increase the throughput of a mobile ad hoc network (MANET). Existing TPC schemes achieve this goal by using additional hardware (e.g., multiple transceivers), by compromising the collision avoidance property of the channel access scheme, by creating impractical hypothesis on the operation of the Mac protocol, else through overlook the protection of link-layer recognition packets. In this paper, the researchers presented a novel power controlled MAC protocol called POWMAC, which enjoys the same single-channel, single-transceiver design of the IEEE 802.11 ad hoc MAC protocol but which achieves a significant throughput improvement over the 802.11 protocol. Instead of alternating between the transmission of control (RTS/CTS) and knowledge packets, as wiped out the 802.11 scheme, POWMAC uses associate access window (AW) to permit for a series of request-to-send/clear-to-send (RTS/CTS) exchanges to require place before many synchronal knowledge packet transmissions will start. The length of the AW is dynamically adjusted supported localized data to permit for multiple interference-limited synchronal transmissions to require place within the same neighborhood of a receiving terminal. Collision turning away data is inserted into the CTS packet and is employed to bound/ the transmission power of probably meddlesome terminals within the neighborhood of the receiver, instead of silencing such terminals.

Rong Zheng et.al [30] recognized that energy conservation usually comes at the cost of degraded performance such as longer delay and lower throughput in stand-alone systems and communication networks. However, there have been very few research efforts in quantifying such trade-offs. In this paper, the researchers developed analytical models to characterize the relationships among energy, delay and throughput for different power management policies in wireless communication. Based on the decision when to put nodes to low-power states, the researchers divided power management policies into two categories, i.e., 1) time-out driven and 2) polling-based. M/G/1/K queues with multiple vacations and an attention span are used to model time-out driven policies while transient analysis is applied to derive the state transition probability in polling-based systems. The researchers found that for time-out driven power management policies, the "optimal" policy exhibits a threshold structure, i.e., once the traffic load is below bound threshold, a node ought to switch to the low-power state whenever doable and invariably stay active otherwise. From their analysis, contrary to general beliefs, polling-based policies such as the IEEE 802.11 PSM are not energy efficient for light traffic load.

Zhao Guo-feng et.al [31] proposed the wireless ad hoc networks (WANET) are an open system that is constituted by fix or mobile nodes. In WANET, each node can be a router or a host. Considering that most nodes may use battery as its energy, it is necessary to improve on energy-saving method. Based on the MAODV protocol, the researchers bring forward a new method called PPEF that uses both hops and energy consumption level of each node together for multicast routing.

S.Vijayaragavan et.al [32] presented the Mobile Adhoc networks MANET’s square measure characterized by dynamic topology, restricted channel information measure and restricted power at the nodes. Due to these characteristics, ways connecting to the supply nodes with destinations might terribly unstable and go down at any time, creating communication over unintentional networks tough. Energy efficiency is a limiting factor in the successful deployment of MANETs, because nodes are expected to rely on portable, limited power sources. Moreover, energy conservation is extremely challenging in multi-hop environments, where the mobile nodes should also consume energy to route packets for other nodes and to guarantee the connectivity of the network. In this paper, the researchers proposed a Power-Aware Multiple Path Multicast Adhoc on Demand Distance Vector (PAMPMAODV) for MANETs. In order to utilize the battery effectively a different strategy has been proposed for route selection. The route selection process has been designed to select multiple routes based on hop count, end-to-end delay and residual battery capacity. The PAMP-MAODV protocol has been implemented using the group learning module of VCR and compared with MAODV and MP-MAODV routing protocols for parameters such as network traffic, the node speed, the network area, throughput, control overhead, number of receivers and SD of Battery Energy Used. It better resulted in load balancing, minimal power consumption, and minimal packet delays and prevents unnecessary control messages.

Resul Kara [33] proposed a power control method that provides long-lasting ad hoc networks that send packets to their destinations in the shortest time slice is proposed for ad hoc networks in this study. The main idea of the proposal relies on transmitting along the node in the possible nearest distance to transport the packet to its destination. Besides, it should be noted that the time it takes to reach the destination does not exceed some certain value. As can be seen from the simulation results, the proposed algorithm optimizes energy consumption of nodes and minimizes total energy consumption. Such a network lives longer than the others. The proposed algorithm consumes about 22% less energy for 50-noded network and 31% less for 100-noded network according to the results of the simulation. Also, it performs better for the networks with lots of nodes. This proposed algorithm gains much importance when the trend for increasing node densities in the new applications related to ad hoc and sensor networks is considered.

N. Bambos [34] introduced transmitter power control can be used to concurrently achieve several key objectives in wireless networking, including minimizing power consumption and prolonging the battery life of mobile nodes, mitigating interference and increasing the network capacity, and maintaining the required link QoS by adapting to node movements, fluctuating interference, channel impairments, and so on. Moreover, power control can be used as a vehicle for implementing on-line several basic network operations, including admission control, channel selection and switching, and handoff control. The researchers considered issues associated with the design of power-sensitive wireless network architectures, which utilize power efficiently in establishing user communication at required QoS levels. Their focus is mainly on the network layer and less on the physical one. Besides reviewing some of the developments in power control, the researchers also formulate some general associated concepts which have wide applicability to wireless network design. A synthesis of these concepts into a framework for power-sensitive network architectures is done, based on some key justifiable points. Various important relevant issues are highlighted and discussed, as well as several directions for further research in this area. Overall, a first step is taken toward the design of power-sensitive network architectures for next-generation wireless networks.

Jing Wu et.al [35] presented in large scale MANETs, center less clustering algorithms need to reduce topology and routing maintenance overheads by constructing a stable hierarchical topology. So attention should be focused on topology’s stability. At present, attentions are paid to the inner cluster topology’s stability, but the intercluster topology’s stability is neglected. Therefore, the researchers proposed a fully distributed clustering algorithm for MANETs in which both the inner cluster topology’s stability and the intercluster topology’s stability are concerned. The main objectives of this algorithm consist in stabilizing the topology as a long time as possible and in further reducing the topology and routing maintenance overheads. For a better comprehension of their algorithm, an explanatory example is given. To compare their algorithm to lowest ID based mobile clustering algorithm, a simulation is studied. The conclusion shows that: their algorithm is more favorable to the topology’s stability and reduces network overheads a lot, which improves the network performance.

S. Muthuramalingam et.al [36] reviewed the multi hop packet radio networks conjointly named mobile ad-hoc networks (MANETs) have a dynamic topology because of the quality of their nodes. A notable quantity of energy is employed on every occasion an indication is distributed and received by a mobile node. Several such signals and power square measure wasted to update the point info of the nodes in a very wireless state of affairs. More information measure is additionally wasted by causing management signals instead of exploitation it effectively for electronic communication. To attenuate this utilization, the researchers projected a changed formula that uses Weighted Clustering Algorithm (WCA) for cluster formation and quality Prediction for cluster maintenance. Clustering is a good technique for node management in a Mobile Adhoc network. Cluster formation involves election of a mobile node as Cluster head and it controls the opposite nodes within the freshly fashioned cluster. The connections between nodes and also the cluster head changes apace in a very mobile ad-hoc network. So cluster maintenance is additionally essential. Prediction of quality primarily based cluster maintenance involves the method of looking for succeeding position that a mobile node may take supported the previous locations it visited. During this paper the researchers projected to cut back the overhead in communication by predicting quality of node exploitation linear automotive vehicle regression and cluster formation.

M. Corson and A. Ephremides [37] presented a brand new distributed routing protocol for mobile, multihop, wireless networks. The protocol is one amongst a family of protocols that the researchers term "link reversal" algorithms. The protocol’s reaction is structured as a temporally-ordered sequence of distributive computations; every computation consisting of a sequence of directed link reversals. The protocol is extremely adaptive, economical and scalable; being best-suited to be used in massive, dense, mobile networks. In these networks, the protocol’s reaction to link failures usually involves solely a localized "single pass" of the distributed rule. This capability is exclusive among protocols that are stable within the face of network partitions, and ends up in the protocol’s high degree of adaptively. This fascinating behavior is achieved through the novel use of a "physical or logical clock" to ascertain the "temporal order" of topological modification events that is employed to structure (or order) the algorithm’s reaction to topological changes. The researcher’s mentioned the protocol because the Temporally-Ordered Routing Algorithm (TORA).

Ali Bokar et.al [38] described Battery energy limitation is one of the main challenges in the mobile ad hoc networks. Several hardware and software based techniques have been proposed in this field. Energy aware task scheduling is one of the software methods where the scheduling policy aims at optimizing the energy. Most of the previous work have achieved significant energy savings for individual mobile nodes but did not consider overall network lifetime and scalability. In this paper, the researchers proposed a scalable energy aware dynamic task allocation technique (SEADTA) for prolonging the network lifetime. In their model, the network lifetime is divided into many rounds. At the beginning of each round a new energy aware clustering algorithm is executed in order to arrange the network nodes in a parent-child structure. Based on the proposed technique, selected parents a reused in the remote allocation such that minimum residual energy is maximized at the end of each round. The results of their simulation showed that their proposed scheme makes a significant improvement in the network life time while simultaneously minimizing the energy consumption and time delay for each task.

Sucec.J. & Marsic.I. [39] Proposed numerous clustering algorithms have been proposed that can support routing in mobile ad hoc networks (MANET). However, there is very little formal analysis that considers the communication overhead incurred by these procedures. Further, there is no published investigation of the overhead associated with the recursive application of clustering algorithms to support hierarchical routing. This analysis provided a theoretical bound on the communication overhead incurred by a selected cluster algorithmic rule for stratified routing in mobile Ad-Hoc network. It’s incontestable that, given affordable assumptions, the typical cluster overhead generated per node per second is simply poly-logarithmic within the node count. To derive this result, novel techniques to assess cluster maintenance overhead are employed.

Yu .J.P. & Chong P.H.J [40] explored Clustering has provide a large scale MANET with hierarchical network structures to overcome the difficulties of critical scalability and message flooding that impair the function of flat structure of MANETs. It brings attention to significant elements regarding routing operations, network management, mobility management, quality of service support etc. This chapter, provided fundamental concepts and definitions about clustering, design objectives of clustering algorithms, the necessity to cluster in a large dynamic MANET and the contra-indications and network cost of clustering. Associated clustering algorithms were classified into categories based on their distinguishing features subsequently discussed in terms of objective, mechanism, performance, and application scenarios. So far, it's been incontestable that a cluster-based mobile Ad-Hoc network has varied vital problems to look at together with the steadiness of cluster structure, the management overhead of cluster construction and maintenance, the energy consumption of mobile nodes with completely different cluster-related standing, the traffic load distribution in clusters, and also the fairness of serving as cluster heads for a mobile node. Additionally, differing varieties of clustering schemes may have alternative focus and objectives. Regardless of the scheme or its specific objectives, clustering cost remains a major consideration in the performance evaluation and scalability improvement.

J. Broch et al. [41] presented the world of Ad-Hoc networking has been received increase attention among researchers in recent years, because the offered wireless networking and mobile computing hardware bases area unit currently capable of supporting the promise of this technology. Over the past few years, a range of latest routing protocols targeted specifically at the Ad-Hoc networking surroundings are projected, however very little performance data on every protocol and no elaborated performance comparison between the protocols has antecedently been offered. This paper makes contributions in 2 areas. First, the researchers represented their medications to the ns network machine to supply Associate in nursing correct simulation of the Mac and physical-layer behavior of the IEEE 802.11 wireless local area network standard, together with a wireless channel model. This new simulation setting provides a strong tool for evaluating Ad-Hoc networking protocols and alternative wireless protocols and function. Second, implementing this simulation setting, the researchers bestowed the results of an in depth packet-level simulation comparison four recent multi-hop wireless impromptu network routing protocols. These protocols, DSDV, TORA, DSR, and AODV, cowl a spread of style decisions, as well as periodic advertisements vs. on demand route discovery, use of feedback from the mackintosh layer to point a failure to forward a packet to successive hop, and hop-by-hop routing, supply routing. The researchers simulated every protocol in impromptu networks of fifty mobile nodes moving concerning and act with one another, and bestowed the results for a spread of node quality rates and movement speeds.

Each of the protocols studied performs well in some cases nevertheless has sure drawbacks in others. DSDV performs quite predictably, delivering just about all knowledge packets once node quality rate and movement speed are low, and failing to converge as node quality will increase. TORA, though the worst entertainer in their experiments in terms of routing packet overhead, still delivered 90% of the packets in situations with ten or twenty sources. At thirty sources, the network was unable to handle all of the traffic generated by the routing protocol and a significant fraction of information packets were born. The performance of DSR was excellent in the least quality rates and movement speeds, though its use of supply routing will increase the quantity of routing overhead bytes needed by the protocol. Finally, AODV performs virtually furthermore as DSR in the least quality rates and movement speeds and accomplishes its goal of eliminating supply routing overhead, however it still needs the transmission of the many routing overhead packets and at high rates of node quality is really dearer than DSR.

WANG Kun [42] presented a PAOD (power-aware on-demand routing protocol), these goal is exploit the system existence life of Mobile Ad-Hoc Network. In power-aware on-demand routing protocol, the resource has been capable to predict the traffic of the demand and request, furthermore every end each node on the route build power condition according to the probable traffic. Since as a node recognized not only for its physical residual power, apart from as well as the expected energy possibly to be consumed in the future, it will report its energy status more accurately. A new cost function is used in route selection, which takes both shortest-hop and maximum-lifetime into consideration. Some filter mechanisms are proposed based on an energy threshold function, which can remarkably reduce the overhead costs, and improve the performance of PAOD. A novel metric - the standard deviation of node energy is used in the simulation experiments to evaluate the balance of energy consumption in the candidate protocols. Simulation results show that, the energy consumption in PAOD is more balanced than in the common on-demand protocols, and PAOD is with much longer system lifetime, along with higher delivery rate than the common ones.

Chee-Wah Tan and Sanjay Kumar Bose [43] proposed A MANET has a wireless network set up "on the fly" without the need of any network infrastructure to be present. As such, the mobiles nodes in a very painter have to be compelled to double up like shift nodes used for information routing. These additional transmissions are often further the energy resource of mobile nodes these area units anyhow probable are often running on confined battery power. This paper recommended and investigated an energy-aware unintentional on-demand distance vector routing protocol (PAW-AODV) for economic power routing. PAW-AODV might use the restricted power resources with efficiency because it routes supported a power-based price operate. Both AODV and PAW-AODV are simulated in various mobile situations using QUALNET. They are also subjected to the various hop count limits that the data could traverse from source to destination. Their performances in the various scenarios are then compared to reflect the relative merits of each protocol.

M. Tamilarasi & T.G. Palanivelu [44] described Energy management born out of limited battery capacity of wireless nodes is a challenge to be tackled in MANETs. In this paper, a mechanism is proposed for MANETs using on-demand routing protocols in order to maximize the lifetime of the network. This mechanism integrates two different approaches namely the load balancing approach and the transmission power control approach. The mechanism applied on standard AODV resulted in EA_AODV. From simulation results it is learnt that the EA_AODV reduces on an average the energy consumption per node by 20%, the energy consumption per packet by 20% and increases the capacity by 5%. The price paid for the improvement in these performance parameters is the 5% increase in average end-to-end delay due to the inclusion of extra information in the packet header. Though, in this paper the energy aware mechanism is applied only on AODV, it could be applied for any on demand routing protocol to get energy efficiency with improved performance.

Vinay Rishiwall et.al [45] discovered a facilitate communication inside a mobile Ad-Hoc network, an economical routing protocol is required to get routers between mobile nodes. Power is one amongst the foremost necessary criterion for Adhoc networks as batteries offer restricted operating capability to the mobile nodes. Equipment failure of a mobile node not solely affects the node itself however additionally its ability to forward packets on behalf of others and thence affects the general network lifespan. Much research efforts have been devoted to develop energy aware routing protocols. In this paper the researchers proposed an efficient algorithm, which maximizes the network lifetime by minimizing the power consumption through the source to purpose route organized. As a case study proposed algorithm has been incorporated along with the route discovery procedure of AODV and by simulation it is observed that proposed algorithmpsilas performance is better as compared to AODV in terms of packet delivery ratio and network lifetime for different network scenarios.

Pinyi Ren et.al [46] presented a mobile ad-hoc network (MANET) is usually power constrained due to the limited battery energy on each node. For MANETS, energy efficiency is crucial for the design of new routing protocols. In this paper, a new energy-aware routing algorithm, called Energy Saving Ad-hoc On-demand Distance Vector (ESAODV) routing, is proposed. In the route discovery process of ESAODV, intermediate nodes estimate the current average energy of the network (CAEN) as a comparison threshold to determine how to respond to the received route request (RREQ) packets. After that, the effects of ESAODV on network performance are addressed. Analytical and simulation results show that the proposed ESAODV can effectively protect the energy-overused nodes and can greatly prolong the network lifetime.

P.Yuan and J.Zhang [47] introduced the multicast ad hoc on-demand distance vector (MAODV) protocol which is multicast operation of the ad hoc on-demand distance vector (AODV) routing protocol enables dynamic, self-starting, multihop routing between participating mobile nodes wishing to join or participate in a multicast group within an ad hoc network. By analyzing the operation mechanism of MAODV, this paper presents an energy constrained multicast routing protocol-ECMRP. By making proof of correctness and complexity analysis of ECMRP, this paper simulates the two routing protocols MAODV and ECMRP, the results show that ECMRP has a better delay than MAODV and a more balance in energy consumption. On the one hand, it saves the energy of the network system; on the other hand, it has a longer network lifetime than MAODV and successfully solves the inconsistent question of energy and delay.

Bing Li et.al [48] presented energy conservation is a critical issue in wireless ad hoc networks, as usually nodes are powered by batteries only. This paper proposes a cross-layer design of energy-aware multicast ad hoc on-demand distance vector (CEMAODV) routing protocol. At one hand it adopts cross-layer mechanism and energy-aware metric to modify AODV routing protocol to reduce the energy consumption of the route to construct a source-based tree. At the other hand the inherent broadcast property of wireless network is utilized to optimize the initial multicast tree by orienting a nodepsilas parent to another tree node and pruning some tree members if necessary. The result of the simulation shows that CEMAODV can outperform MAODV, reducing the consumed energy by about 70% and average delay to about half. And the performance is better when the multicast group is large in the network.

Y. Xu et.al [49] introduced a geographical adaptive fidelity (GAF) formula that reduces energy consumption in unintentional wireless networks. GAF conserves energy by characteristic nodes that are equivalent from a routing perspective so turning off supernumerary nodes, keeping a relentless level of routing fidelity. GAF moderates this policy victimization application- and system-level information; nodes that supply or sink knowledge stay on and intermediate nodes monitor and balance energy use. GAF is freelance of the underlying unintentional routing protocol; the researchers simulated GAF over unrestricted AODV and DSR. Analysis Associate in simulation studies of GAF show that it will consume 40% to 60% energy than an unrestricted unintentional routing protocol. Moreover, simulations of GAF counsel that network time period will increase proportionately to node density; in one example, a four-fold increase in node density results in network time period increase for three to six times (depending on the quality pattern). Additional typically, GAF is Associate in pattern of adaptive fidelity, a way projected for extending the time period of self-configuring systems by exploiting redundancy to conserve energy whereas maintaining application fidelity.

Jin LIAN [50] presented the ad hoc network is a non-infrastructure mobile network that consists of many mobile nodes. Since the nodes have mobility features in ad hoc network, the ability of communication between the nodes is limited by nodes power. The power consumption and bandwidth of each mobile node becomes an important issue and needs to be addressed. The paper discusses the energy efficient routing problem and an Energy-based QoS Routing Protocol in mobile Ad Hoc Network (EQRP). To reduce routing fracture caused by Energy depletion, EQRP selects the nodes that have the largest of the remaining energy in routing discovery and routing maintenance phases. The simulation results show that EQRP has a higher data delivery rate and reduce the number of routing reconstructions.

Alok Kumar Jagadev et.al [51] presented wide implementation of IEEE 802.11 based networks could lead to deployment of localized wireless data communication environments with a limited number of mobile hosts, called ad hoc networks. Implementation of a proper routing methodology in ad hoc networks makes it efficient in terms of performance. A wide spectrum of routing protocols has been contributed by several researchers. Real time applications have been most popular among the applications, run by ad hoc networks. Such applications strictly adhere to the Quality of Service (QoS) requirements such as overall throughput, end-to end delay and power level. Support of QoS requirements becomes more challenging due to dynamic nature of MANETs, where mobility of nodes results in frequent change in topology. QoS aware routing protocols can serve to the QoS support, which concentrate on determining a path between source and destination with the QoS requirements of the flow being satisfied. The researchers proposed a protocol, called Power and Delay aware Temporally Ordered Routing Algorithm (PDTORA), based on Temporally Ordered Routing Algorithm (TORA) Protocol, where verification of power and delay requirements is carried out with a query packet at each node along the path between source and destination.

J.-H. Chang, L. & Tassiulus [52] presented associated ad-hoc network of wireless static nodes is taken into account because it arises in an exceedingly chop-chop deployed, sensor-based, observance system. Info is generated in sure nodes and desires to achieve a group of selected entryway nodes. Every node could change its power at intervals an exact that determine the set of attainable one hop away neighbors. Traffic forwarding through multiple hops is utilized once the meant destination isn't at intervals immediate reach. The nodes have restricted initial amounts of energy that's consumed at totally different rates counting on the ability level and therefore the meant receiver. The researchers projected algorithms to pick the routes and therefore the corresponding power levels such the time till the batteries of the nodes drain-out is maximized. The algorithms square measure native and amenable to distributed implementation. Once there's one power level, matter is reduced to a most flow problem with node capacities and therefore the algorithms converge to the optimum resolution. Once there square measure multiple power levels then the possible period is near the optimum (that is computed by linear programming) most of the time. It seems that so as to maximize the period, the traffic ought to be routed such the energy consumption is balanced among the nodes in proportion to their energy reserves, rather than routing to attenuate absolutely the consumed power.

S. Benerjee & A. Misra [53] proposed Current algorithms for minimum-energy routing in wireless networks typically select minimum-cost multi-hop paths. In scenarios where the transmission power is fixed, each link has the same cost and the minimum-hop path is selected. In situations where the transmission power can be varied with the distance of the link, the link cost is higher for longer helps; the energy-aware routing algorithms select a path with a large number of small distance hops. In this paper, the researchers argued that such a formulation primarily based exclusively on the energy spent in an exceedingly single transmission is dishonest the correct metric ought to embrace the overall energy (including that gone for any retransmissions necessary) spent in faithfully delivering the packet to its final destination. The researchers firstly presented how link error rates affect this retransmission-aware metric, and how it leads to an efficient choice between a path with a large number of short-distance hops and another with a smaller number of large-distance hops. Such studies motivated the definition of a link cost that is a function of both the energy required for a single transmission attempt across the link and the link error rate. This cost function captures the cumulative energy expended in reliable data transfer, for both reliable and unreliable link layers. Finally, through detailed simulations, the researchers shown that their schemes can lead to up to 30-70% energy savings over best known current schemes, under realistic environments.

S. Doshi et.al [54] identified the required options of associate degree on-demand minimum energy routing protocol and suggests mechanisms for his or her implementation. The researchers highlighted the importance of economical caching techniques to store the minimum energy route data associate degreed propose the employment of an 'energy aware' link cache for storing this data. The researchers compared the performance of associate degree on-demand minimum energy routing protocol in terms of energy savings with associate degree existing on demand impromptu routing protocol via simulation. The researchers mentioned the implementation of Dynamic source Routing (DSR) protocol mistreatment the clicking standard router on a true life test-bed consisting of laptops and wireless LAN cards. Finally the researchers delineate the modifications the researchers have created to the DSR router to create it energy aware.

M. Rajesh Babu & S. Selvan [55] introduced in mobile Ad-Hoc networks, an attacker can easily disrupt the functioning of the network by attacking the underlying routing protocol. Hence, security in ad hoc networks is still a debatable area. In this research, the researchers have developed an Energy Efficient Secure Authenticated Routing Protocol (EESARP) for mobile adhoc networks which uses a lightweight, attack resistant authentication mechanism. Their protocol provides efficient security against route discovery attacks using hop-by-hop signatures. It quickly detects the malicious nodes, thus assisting the nodes to drop the invalid packets, earlier. It also uses an efficient node selection mechanism which maximizes network life time and minimizes delay. By detailed simulation studies, the researchers have shown that EESARP provides better packet delivery ratio with minimized energy.

Anuradha Banerjee & Dr. Paramartha Dutta [56] proposed a fuzzy controlled power aware routing protocol (FPRP) that is fully distributed and intelligent. It evaluates lifetime of a route based on the lifetime status of its routers. Lifetime status of routers is measured using a fuzzy controller named route decider. The fuzzy controller considers residual charge, rate of depletion, communication load and proximity of nodes. Simulation results establish that FPRP produces significant improvements than various other power-aware ad hoc network routing protocols even when the number of nodes is as high as 2000.

Niranjan Kumar Ray & Ashok Kumar Turuk [57] reviewed some of the recent work done in mobile ad hoc network considering energy as the key issue. It is found that most of the study discusses the energy issue at data link and network layer. The researchers discussed different energy efficient protocol based on power management, power control and topology control approach. The researchers suggested three energy efficient techniques for MANET point of view. Route request minimization technique can be done by implementing logical grouping; power control techniques reduce the transmission power of a node while topology control approach increases the network longevity by satisfying network constraints. The simulation results presented in section IV, suggests that multi-hop is ideal for energy point of view but the limitation is the increase chance of link failure.

Weifa Liang & Yuzhen Liu [58] proposed on-line disjoint path routing in energy-constrained ad hoc networks. The objective is to maximize the network capacity, i.e. maximize the number of messages routed successfully by the network without any knowledge of future disjoint path connection request arrivals and generation rates. Specifically, in this paper the researcher’s first presented two centralized on-line algorithms for the problem. One is based on maximizing local network lifetime, which aims to minimize the transmission energy consumption, under the constraint that the local network lifetime is no less than c times of the optimum after the realization of each disjoint path connection request, where c is constant with 0 < c 6 1. Another is based on the exponential function of energy utilization at nodes, and the competitive ratio of this latter algorithm is also analyzed if admission control mechanism is employed. The researchers then conduct extensive experiments by simulations to analyze the performance of the proposed algorithms, in terms of network capacity, network lifetime, and the transmission energy consumption for each disjoint path connection request. The experimental results show that the proposed algorithms outperform those existing algorithms that do not take into account the power load balancing at nodes in terms of maximizing the network capacity.

Weifa Liang & Xiaoxing Guo [59] has been presented new algorithms for online multicast routing in ad hoc networks where nodes are energy-constrained. The objective is to maximize the total amount of multicast message data routed successfully over the network without any knowledge of future multicast request arrivals and generation rates. Specifically, the researchers first proposed an online algorithm for the problem based on an exponential function of energy utilization at each node. The competitive ratio of the proposed algorithm is analyzed if admission control of multicast requests is permitted. The researchers then provide another online algorithm for the problem, which is based on minimizing transmission energy consumption for each multicast request and guaranteeing that the local network lifetime is no less than \gamma times of the optimum, where \gamma is constant with 0 < \gamma\leq 1. The researchers finally conducted extensive experiments by simulations to analyze the performance of the proposed algorithms, in terms of network capacity, network lifetime, and transmission energy consumption for each multicast request. The experimental results clearly indicate that, for online multicast routing in ad hoc wireless networks, the network capacity is proportional to the network lifetime if the transmission energy consumption for each multicast request is at the same time minimized. This is in contrast to the implication by Kar et al. that the network lifetime is proportional to the network capacity when they considered the online Unicast routing by devising an algorithm based on the exponential function of energy utilization at each node.

Hyang-Won Lee et.al [60] considered throughput-optimal power allocation in multi-hop wireless networks. The study of this drawback has been restricted owing to the non-convexity of the underlying optimization issues that prohibits Associate in economical resolution even in an exceedingly centralized setting. The researcher has been taken an organization approach to modify this problem. To the present finish, the researchers generalized the organization framework originally planned for input queued switches to Associate in SINR rate-based interference model. Further, the investigator developed distributed power allocation and comparison algorithms that satisfy these conditions, thereby achieving (almost) 100% throughputs. The investigator illustrated the performance of their planned power allocation resolution through numerical investigation and gift many extensions for the thought-about drawback.

Zhiqiong Jiang & Wei Guo [61] has introduced cooperative communication can be achieved spatial multiplicity during the supportive use of transmitter belonged to various wireless nodes. It is also believed to be an energy efficient communication means. In this paper, the researcher give a detailed analysis on the energy issues for a typical cooperative communication model in energy constrained wireless networks such as wireless sensor networks. The researcher found that by carefully adjusting the transmitting energy level of every cooperative node, the total energy consumption can be greatly reduced. The researcher find that the energy benefits of the cooperative communication are also closely related to some network parameters Cooperative communication can obtain spatial diversity during the cooperative utilize of antennas belong to various wireless nodes. It is also believed to be an energy efficient communication means. In this paper, the researcher give a detailed analysis on the energy issues for a typical cooperative communication model in energy constrained wireless networks such as wireless sensor networks. The researcher finds that by carefully adjusting the transmitting energy level of every cooperative node, the total energy consumption can be greatly reduced. The researcher find that the energy benefits of the cooperative communication are also closely related to some network parameters.

Li, P. & Guo, S. [62] presented fundamental problem in determining the multicast capacity in energy-constrained wireless networks with lossy transmission links. The multicast capacity in their paper is defined as the maximum number of packets that can be disseminated from the source and successfully received by all multicast destinations. To explore the expected multicast capacity, the researchers proposed a framework for the joint optimization of both dynamic power control and error control. In their framework, the lossy wireless transmission links are characterized by the Rayleigh fading model, which reveals the realistic relationship among link quality, transmission power and path attenuation. Under this model, the researcher exploit the reliability gain of random linear network coding, also referred to as intra-batch coding in this paper, by disseminating data in batches. To maximize multicast capacity, another type of network coding opportunities across batches, referred to as inter-batch coding, is also explored. Their analytical framework based on intra-batch and inter-batch network coding eventually leads to a linear programming (LP) formulation that is proved to obtain the optimal multicast capacity. To approach the theoretical results in practice, the researcher proposed an algorithm called DMCC that exploits the intra-batch and inter-batch coding via dynamically constructing bottleneck trees. Extensive simulations are conducted to show that its performance is very close to the optimal solution.

Wiczanowski, M et.al [63] considered the crucial problem of minimization of energy consumption in energy-constrained wireless networks with Poisson arrivals. The researcher proposed an energy control concept utilizing the nature of the Poisson process and the average knowledge of its parameters. Compared to the traditional energy control the proposed approach provides advantages in terms of delay. The researcher provided an extensive analysis of the underlying optimization problem in terms of solvability, convexity and implementation effort. This results in the characterization of numerous useful features and the exhibition of essential differences to the traditional energy control approach.

Xinbo Gao et.al [64] presented network scripted as a good strategy for up the performance of wireless networks. However, most existing work studied network writing supported fastened route. Meanwhile, owing to the limitation of the energy capability of wireless networks, prolonging the network period of time could be a crucial task. For this purpose, this paper introduced associate energy-efficient coding-aware routing (EECAR) mechanism, which combined network writing with energy potency. EECAR will observe potential writing opportunities beneath "two-hop" writing conditions and prolong the network period of time. Meanwhile, associate energy-efficient coding-aware metric, named EECAM, is conferred that detects writing opportunities inside two-hop neighbors and selects nodes with high remaining energy. Finally, the EECAR mechanism is enforced in ns-2. Simulation results demonstrated that the planned EECAR strategy achieves vital outturn gains and prolongs the network period of time.

Amis, A.D et.al [65] presented a commercial hoc network could also be logically portrayed as a collection of clusters. The cluster heads kind a d-hop dominating set. Every node is at the most d hops from a cluster head. Cluster heads kind a virtual backbone and should be wont to route packets for nodes in their cluster. Previous heuristics restricted themselves to 1-hop clusters. The researchers proved that the minimum d-hop dominating set downside is NP-complete. Then the researchers gift a heuristic to create d-clusters in an exceedingly wireless circumstantial network. Nodes area unit assumed to possess a non-deterministic quality pattern. Clusters area unit fashioned by dispersive node identities on the wireless links. Once the heuristic terminates, a node either becomes a cluster head, or is at the most d wireless hops removed from its cluster head. The worth of d could be a parameter of the heuristic. The heuristic is run either at regular intervals, or whenever the network configuration changes. One amongst the options of the heuristic is that it tends to re-elect existing cluster heads even once the network configuration changes. This helps to scale back the communication overheads throughout transition from previous cluster heads to new cluster heads. Also, there's an inclination to equally distribute the mobile nodes among the cluster heads, and evenly distribute the responsibility of acting as cluster heads among all nodes. Thus, the heuristic is truthful and stable. Simulation experiments demonstrated that the projected heuristic is healthier than the 2 earlier heuristics, particularly the LCA and degree-based solutions.

T.Camp, et.al [66] proposed within the performance analysis of a protocol for an advertisement hoc network, the protocol ought to be tested beneath realistic conditions together with, however not restricted to, a smart transmission vary, restricted buffer area for the storage of messages, representative knowledge traffic models, and realistic movements of the mobile users (i.e., a quality model). This paper may be a survey of quality models that square measure employed in the simulations of unintentional networks. The researchers described many quality models that represented mobile nodes whose movements square measure freelance of every different (i.e., entity quality models) and several other quality models that represent mobile nodes whose movements square measure obsessed on one another (i.e., cluster quality models). The goal of this paper is to contribute variety of quality models so as to supply researchers a lot of educated decisions once they have squared measure deciding upon a quality model to use in their performance evaluations. Lastly, the researchers presented simulation results that illustrated the importance of selecting a quality model within the simulation of an advertisement hoc network protocol. Specifically, the researchers illustrated however the performance results of an advertisement hoc network protocol drastically modification as a results of dynamical the quality model simulated.

A.Amis & R.Prakash [67] introduced Ad hoc networks consisted of a set of identical nodes that progress without restraint and in competition and communicate through additional node via wireless links. Such networks are rationally characterized same as a group of clusters by combination along nodes these square measure in shut proximity with each other. Cluster heads kind a virtual backbone and should be accustomed route packets for nodes in their cluster. Nodes square measure assumed to own non-deterministic quality pattern. Clusters square measure fashioned by disseminative node identities on the wireless links. Different heuristics employ different policies to elect cluster-heads. Several of these policies are biased in favor of some nodes. As a result, these nodes shoulder greater responsibility and may deplete their energy faster, causing them to drop out of the network. Consequently, there is a need for load-balancing among cluster heads to allow all nodes the opportunity to serve as a cluster head. The researchers propose a load balancing heuristic to extend the life of a cluster head to the maximum budget before allowing the cluster head to retire and give way to another node. This helps to evenly distribute the responsibility of acting as cluster heads among all nodes. Thus, the heuristic insures fairness and stability. Simulation experiments demonstrate that the proposed heuristic does provide longer cluster head durations than with no load-balancing.

S.Banerjee & S.Khuller [68] presented a cluster theme to make a hierarchic management structure for multi-hop wireless networks. A cluster is outlined as a set of vertices, whose iatrogenic graph is connected. Additionally, a cluster is needed to adapt sure constraints that square measure helpful for management and quantifiability of the hierarchy. Each of these constrained has not be met at the same time for general graphs, however the researchers shown however such a cluster are often obtained for wireless network topologies. Finally, the researchers presented AN economical distributed implementation of their cluster rule for a group of wireless nodes to make the set of desired clusters.

A.B.McDonald & T.Znati [69] presented a unique framework for dynamically organize mobile nodes in wireless unintentional networks into clusters during which the chance of path convenience will be delimited. The aim of the (alpha, t) cluster is to assist minimize the extensive effects of topological changes whereas reconciliation the necessity to support additional optimum routing. A quality model for unintentional networks is developed and is employed to derive expressions for the chance of path convenience as an operated of your time. It’s shown however this model provides the idea for dynamically grouping nodes into clusters victimization an economical distributed cluster formula. Since the factors for cluster organization depends directly upon path convenience, the structure of the cluster topology is adaptative with relevance node quality. Consequently, this framework supported an adaptive hybrid routing design which will be additional responsive and effective once quality rates area unit low and additional economical once quality rates area unit high.

S.Muthuramalingam and R.Rajaram [70] presented a novel algorithm for clustering of nodes by transmission range based clustering (TRBC).This algorithm does topology management by the usage of coverage area of each node and power management based on mean transmission power within the context of wireless ad-hoc networks. By reducing the transmission range of the nodes, energy consumed by each node is decreased and topology is formed. A new algorithm is formulated that helps in reducing the system power consumption and prolonging the battery life of mobile nodes. Formation of cluster and selection of optimal cluster head and thus forming the optimal cluster taking weighted metrics like battery life, distance, position and mobility is done based on the factors such as node density, coverage area, contention index, required and current node degree of the nodes in the clusters.

Preetee K. Karmore & Smita M. Nirkhi [71] proposed a MANET has no clear line of defense so, it's accessible to each legitimate network nodes and malicious nodes. A number of the nodes could also be stingy, for instance, by not forwarding the packets to the destination, thereby saving the battery power. Some others might act malicious by launching security attacks like region or hack the data. Ancient means of protective networks with firewalls and coding code isn't any longer ample. Therefore, intrusion detection system is needed that monitor the network, find malicious node and notifies alternative node within the network to avoid malicious node i. e. IDS detect malicious activities within the networks. The researchers have enforced k-means clump algorithmic rule of knowledge mining for economical detection of intrusions within the MANET traffic and conjointly generated region attacks within the network. In data processing, clump is that the most significant unattended learning method accustomed notice the structures or patterns in an exceedingly assortment of unlabeled knowledge. The researchers have used the K-means algorithmic rule to cluster and analyze the info during this paper. The simulation of the projected technique is performed in NS2 machine and also got the result.

Cynthia Jayapal and Sumathi Vembu [72] presented associate degree adjective service discovery protocol that enhances the performance of service discovery. The prevailing service discovery procedures, uses either centralized, distributed or hybrid architectures. This architecture use totally different strategies of service registration, advert, selection, discovery modes and state maintenance to boost the service discovery performance; however they use the traditional strategies for choosing a core node that aids altogether the service discovery phases. Their main focus is to use associate degree adjective core node election mechanism that changes whenever the load will increase and is additionally strong against network failures. This enhances the performance of discovery remaining to the reduction in frequent handoffs. The researchers used a distributed directory based mostly service discovery mechanism that operates in a very proactive mode with service advertisements to the core node and selects a supplier based each on distance and repair capability of the supplier. Their simulation results show that their adjective service discovery theme performs higher in terms of service discovery success quantitative relation, management message over head, discovery delay and therefore the range of hand offs, when put next to traditional schemes.

I-Shyan Hwang and Wen-Hsin Pang [73] presented an Energy efficient communication in mobile ad hoc networks (MANET) is a very stringent issue due to the power-constraint of battery in each mobile node. Therefore, designing a suitable energy efficient multicast routing protocol to conserve power as much as possible while still achieving good system performance is a challenge. In this research the researchers proposed an energy efficient clustering technique (EECT) for multicast routing protocol, which each node uses weight cost function based on the transmission power level, residual power and node speed to form cluster in the neighboring area and the node with the minimum weight value is selected as the clusterhead. The EECT can alleviate the energy consumption because the communication between clusterhead and member is adjustable with appropriate power level. The tree-based MAODV and the mesh-based ODMRP ad hoc multicast routing protocols are adapted to the EECT being executed on the each clusterhead. Simulation results demonstrate the adaptation of MAODV and ODMRP using EECT have better system performance than MAODV and ODMRP in terms of total energy consumption, mean end-to-end delay, and mean hop count, packet delivery ratio and percentage of alive nodes for different multicast group size and mobility.

Stefano Basagni et.al [74] presented work issues the comparative performance analysis of protocols for agglomeration and strength of formation in unexpected networks characterized by an outsized range of resource-constrained nodes. Typical samples of these networks square measure wireless sensing element networks. The DCA protocol represented those protocols whose backbone construction methodology relies on choosing nodes as cluster heads then connation them to create a connected backbone. The algorithmic rule planned by Shanghai dialect and Li has been chosen to exemplify those algorithms that build a connected backbone then prune away redundant nodes. Finally, the algorithmic rule by Wan et al. has been thought-about here for its additional theoretical properties of manufacturing a backbone with a relentless approximation issue, linear time quality and best message quality. So as to get a backbone moderately tiny at affordable price the researchers propose associate degree sweetening of the DCA algorithmic rule, termed DCA-S, which enriches the DCA backbone construction with a recently planned and resource effective scarification rule. DCA-S results in a strong backbone go on size thereto generated by the Wan et al. protocol while not considerably degrading the performance in terms of all the opposite relevant metrics.

I. Er and W. K. Seah [75] presented a mobility-based d-hop clump rule (MobDHop) that forms variable-diameter clusters supported node quality pattern in MANETs. The researchers introduced a brand new metric to live the variation of distance between nodes over time so as to estimate the relative quality of 2 nodes. The researchers conjointly calculable the steadiness of clusters supported relative quality of cluster members. In contrast to alternative clump algorithms, the diameter of clusters isn't restricted to 2 hops. Instead, the diameter of clusters is versatile and determined by the steadiness of clusters. Nodes that have similar moving pattern area unit sorted into one cluster. The simulation results presented that MobDHop has stable performance in indiscriminately generated eventualities. It forms lesser clusters than Lowest-ID and MOBIC rule within the same state of affairs. Finally, MobDHop is wont to give Associate in underlying stratified routing structure to deal with the quantifiability of routing protocol in substantial MANETs.

T. Ohta, S. Inoue, and Y. Kakuda [76] proposed clustering scheme for ad hoc networks is aimed at managing a number of mobile devices by utilizing hierarchical structure of the networks. In order to construct and maintain an effective hierarchical structure in ad hoc networks where mobile devices may move at high mobility, the following requirements must be satisfied. (1) The role of each mobile device for the hierarchical structure is adaptive to dynamic change of the topology of the ad hoc networks. The role of each mobile device should thus change autonomously based on the local information. (2) The overhead for management of the hierarchical structure is small. The number of mobile devices in each cluster should thus be almost equivalent. This paper proposed an adaptive multihop clustering design for extremely MANET. The results obtained by extensive simulation experiments show that the proposed scheme does not depend on mobility and node degree of mobile devices in the network, which satisfy the above requirements.

P. Basu, N. Khan, and T. D. C. Little [77] presented a completely unique relative quality metric for MANETs. It’s supported the quantitative relation of power levels as a result of serial receptions at every node from its neighbors. The researchers



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now