Sie sind auf Seite 1von 31

INTRODUCTION

1.1. INTRODUCTION Our project is entitled as Randomized overhearing based Energy Efficient routing protocol for MANET. In this project we have aimed to create a new communication scheme for MANET which consumes energy in an efficient manner and to improve the packet delivery ratio by avoiding unconditional overhearing. In this we have proposed a new methodology called randomized overhearing and in this the nodes which are present in the specified transmission range from the source and destination only can be overheard. By this methodology only our proposed communication scheme consumes energy in an efficient manner.

1.2. INTRODUCTION TO MANET 1.2.1 SCOPE A MANET is an autonomous collection of mobile users (nodes that

communicate over relatively bandwidth-constrained wireless links. This can be a standard Wi-Fi connection, or another medium, such as a cellular or satellite transmission. The topology of a multi-hop wireless network is a set of communication links between node pairs used explicitly or implicitly by routing mechanisms. A topology can depend on uncontrollable factors such as node mobility, weather, interference, noise as well as controllable factors such as transmission power, directional antennas and multi-channel communications. Inappropriate topology can reduce the impact of network capacity by limiting spatial reuse of the communication channel and decrease network robustness. For example, if the topology is too sparse then the network can get partitioned. However, topology control can provide better control over network resources such as battery power and reduce redundancy in network communications. Centralized topology control algorithms rely on global topology information to make

topology adaptation decisions. Distributed topology control algorithms rely on partial link state information such as neighbor count to maintain network connectivity.

1.2.2 MANET Features MANET has the following features

1. Autonomous terminal In MANET, each mobile terminal is an autonomous node, which may function as both a host and a router. In other words, besides the basic processing ability as a host, the mobile nodes can also perform switching functions as a router. So usually endpoints and switches are indistinguishable in MANET.

2. Distributed operation Since there is no background network for the central control of the network operations, the control and management of the network is distributed among the terminals. The nodes involved in a MANET should collaborate amongst themselves and each node acts as a relay as needed, to implement functions e.g. security and routing.

3. Multi hop routing Basic types of ad hoc routing algorithms can be single-hop and multi hop, based on different link layer attributes and routing protocols. Single-hop MANET is simpler than multi hop in terms of structure and implementation, with the cost of lesser functionality and applicability. When delivering data packets from a source to its destination out of the direct wireless transmission range, the packets should be forwarded via one or more intermediate nodes.
3

4. Dynamic network topology Since the nodes are mobile, the network topology may change rapidly and unpredictably and the connectivity among the terminals may vary with time. MANET should adapt to the traffic and propagation conditions as well as the mobility patterns of the mobile network nodes. The mobile nodes in the network dynamically establish routing among themselves as they move about, forming their own network on the fly. Moreover, a user in the MANET may not only operate within the ad hoc network, but may require access to a public fixed network (e.g. Internet .

5. Fluctuating link capacity The nature of high bit-error rates of wireless connection might be more profound in a MANET. One end-to-end path can be shared by several sessions. The channel over which the terminals communicate is subject to noise, fading, and interference, and has less bandwidth than a wired network. In some scenarios, the path between any pair of users can traverse multiple wireless links and the link themselves can be heterogeneous.

6. Light-weight terminal In most cases, the MANET nodes are mobile devices with less CPU processing capability, small memory size, and low power storage. Such devices need optimized algorithms and mechanisms that implement the computing and communicating functions.

1.2.3 MANET STATUS Ad hoc networking is not a new concept. As a technology for dynamic wireless networks, it has been deployed in military since 1970s. Commercial interest in such networks has recently grown due to the advances in wireless communications. A new working group for MANET has been formed within the Internet Engineering Task Force (IETF , aiming to investigate and develop candidate standard Internet routing support for mobile, wireless IP autonomous segments and develop a framework for running IP based protocols in ad hoc networks. The recent IEEE standard 802.11 has increased the research interest in the field. Many international conferences and workshops have been held by e.g. IEEE and ACM. For instance, MobiHoc (The ACM Symposium on Mobile Ad Hoc Networking & Computing has been one of the most important conferences of ACM SIGMOBILE (Special Interest Group on Mobility of Systems, Users, Data and Computing . Research in the area of ad hoc networking is receiving more attention from academia, industry, and government. Since these networks pose many complex issues, there are many open problems for research and significant contributions.

1.2.4 MANET APPLICATIONS With the increase of portable devices as well as progress in wireless communication, ad hoc networking is gaining importance with the increasing number of widespread applications. Ad hoc networking can be applied anywhere where there is little or no communication infrastructure or the existing infrastructure is expensive or inconvenient to use. Ad hoc networking allows the devices to maintain connections to the network as well as easily adding and removing devices to and from the network. The set of applications for MANETs is diverse, ranging from large-scale, mobile, highly dynamic networks, to small, static networks that are constrained by power sources. Besides the legacy applications that move from traditional infrastructure
5

environment into the ad hoc context, a great deal of new services can and will be generated for the new environment.

Typical applications include

1. Military battlefield Military equipment now routinely contains some sort of computer equipment. Ad hoc networking would allow the military to take advantage of commonplace network technology to maintain an information network between the soldiers, vehicles, and military information head quarters. The basic techniques of ad hoc network came from this field. 2. Commercial sector Ad hoc can be used in emergency/rescue operations for disaster relief efforts, e.g. in fire, flood, or earthquake. Emergency rescue operations must take place where non-existing or damaged communications infrastructure and rapid deployment of a communication network is needed. Information is relayed from one rescue team member to another over a small handheld. Other commercial scenarios include e.g. ship-to-ship ad hoc mobile communication, law enforcement, etc. 3. Local level Ad hoc networks can autonomously link an instant and temporary multimedia network using notebook computers or palmtop computers to spread and share information among participants at a e.g. conference or classroom. Another appropriate local level application might be in home networks where devices can communicate directly to exchange information. Similarly in other civilian environments like taxicab, sports stadium, boat and small aircraft, mobile ad hoc communications will have many applications.

4. Personal Area Network (PAN) Short-range MANET can simplify the intercommunication between various mobile devices (such as a PDA, a laptop), and a cellular phone . Tedious wired cables are replaced with wireless connections. Such an ad hoc network can also extend the access to the Internet or other networks by mechanisms e.g. Wireless LAN (WLAN, GPRS, and UMTS). The PAN is potentially a promising application field of MANET in the future pervasive computing context.

1.2.5 MANET CHALLENGES Regardless of the attractive applications, the features of MANET introduce several challenges that must be studied carefully before a wide commercial deployment can be expected. These include 1. Routing Since the topology of the network is constantly changing, the issue of routing packets between any pair of nodes becomes a challenging task. Most protocols should be based on reactive routing instead of proactive. Multicast routing is another challenge because the multicast tree is no longer static due to the random movement of nodes within the network. Routes between nodes may potentially contain multiple hops, which is more complex than the single hop communication.

2. Security and Reliability In addition to the common vulnerabilities of wireless connection, an ad hoc network has its particular security problems due to e.g. nasty neighbor relaying packets. The feature of distributed operation requires different schemes of authentication and key management. Further, wireless link characteristics introduce also reliability problems, because of the limited wireless transmission range, the broadcast nature of the wireless medium (e.g. hidden terminal problem , mobilityinduced packet losses, and data transmission errors. 3. Quality of Service (QoS) Providing different quality of service levels in a constantly changing environment will be a challenge. The inherent stochastic feature of communications quality in a MANET makes it difficult to offer fixed guarantees on the services offered to a device. An adaptive QoS must be implemented over the traditional resource reservation to support the multimedia services. 4. Internetworking In addition to the communication within an ad hoc network, internetworking between MANET and fixed networks (mainly IP based is often expected in many cases. The coexistence of routing protocols in such a mobile device is a challenge for the harmonious mobility management. 5. Power Consumption For most of the light-weight mobile terminals, the communication-related functions should be optimized for lean power consumption. Conservation of power and power-aware routing must be taken into consideration. 1.3 DEVICES USED IN SETTING UP A MANET Wireless networks allow users to connect to the Internet and move the computer around the home without being tied down by wires. Having a wireless network is a nice luxury, but it must be setup properly. Certain devices must be installed on a wireless network for it to function properly. Although these devices are
8

needed, a wireless network does not cost much more than a wired network, since a wired network needs similar devices. MODEM The modem provides Internet access. A modem and broadband Internet connection is required if you want to be able to access the Internet. A modem is typically provided by your ISP (Internet Service Provider when you subscribe for broadband Internet, and is needed for both Cable and DSL Internet service. The modem allows your computer to communicate with the ISP's servers and transfer data back and forth. The modem connects to the phone or cable jack in the wall to receive the Internet data and also connects to the wireless router via an Ethernet cable. The Internet access is then distributed to computers on your network by the wireless router. WIRELESS ROUTER A router is needed to transmit a wireless signal. A wireless router is needed to broadcast a wireless signal and allow computers and other wireless devices on the network to communicate with each other. Rather than connecting to each computer with a cable, wireless routers communicate by transmitting and receiving wireless signals. The router should be placed in a location that will provide the best range and signal strength. Walls and metal objects will reduce the signal strength and create connectivity issues. It is important to install the wireless router properly and create a login password. If the router is not password protected, anyone who receives the signal will be able to access your network. WIRELESS ADAPTER A wireless adapter is needed for each computer. A wireless adapter allows the computer, or other device, to communicate with the wireless router and connect to the network. Every device that you want to have use the wireless network must have a wireless adapter installed. Many laptops come with wireless adapters already installed, but for those computers that don't have one, one must be purchased and
9

installed. There are different types of adapters that can be installed. USB adapters are small and are able to plug directly into the USB port on the outside of the computer. PCI adapters are larger and need to be installed directly to the motherboard inside of the computer's case.

10

LITERATURE SURVEY

11

2.1 LITERATURE SURVEY


Recently, a number of energy efficient routing protocols have been proposed and based on some of criteria to choose protocol such as mobility, energy, position, and the number of neighbors of a given node. These works present advantages but some drawbacks as a high computational overhead for both energy efficient routing protocol execution and update operations. We will give each of them a brief description as follows

2.1.1 Random Cast: an Energy-Efficient Communication Scheme for MANET The authors Sunho Lim and Chansu Yu presents a random cast an energy efficient routing protocol for MANET where they described as allowing no overhearing may critically deteriorate the performance of the underlying routing protocol, while unconditional overhearing may offset the advantage of using PSM. a new communication mechanism, called Random Cast, via which a sender can specify the desired level of overhearing, making a prudent balance between energy and routing performance. Main advantages of this paper are proposed method consumes less amount of energy only while comparing with DSRs Unconditional overhearing with the help of randomized overhearing. The limitation of the proposed method is it will be difficult to transmit the message if neighboring nodes fails

2.1.2 A Performance Comparison of Energy Consumption for MANET Routing Protocols The authors Juan Carlos Cano and Petro Manzoni presents A Performance Comparison of Energy Consumption for Mobile Ad Hoc Networks Routing Protocols where they described as comparison of the DSR, AODV, TORA and DSDV routing protocols with respect to energy consumption. Five parameters are selected mobile node number, mobile area, node mobility, actual traffic source and data traffic pattern.
12

Each parameter are varied and compared and the main advantage of the paper is used to find the energy consumption level between protocols. DSR and AODV has better energy consumption that DSDV and TORA, The limitation is the authors did not specify the energy consumption for protocols in longer routes.

2.1.3 Efficient energy management for MANET The authors M.Tamilarasi, S.Chandramathi and T.G. Palanivelu presents an Efficient energy management for MANET where they describe as While network size increases the efficiency of DSR protocol decreases to avoid it implementing overhead reduction and efficient energy management for DSR. The main advantage of this method is the proposed method saves energy up to 38% than other methodologies. The main limitation of this methodology is packet delivery ratio is low.

2.1.4 Energy efficient routing in Wireless sensor networks The authors of this paper are CurtSchurgers and Mani B.Srivastava presenting an energy efficient routing in wireless sensor networks where they describes as approach aggregates packet streams in a robust way, resulting in energy reductions of a factor 2 to 3. Second, a more uniform resource utilization can be obtained by shaping the traffic flow. The advantage is the proposed method increases the network lifetime up to 90% more than other methodologies. Limitation is it reduces route cache information due to lack of overhearing

13

METHODOLOGY AND SOLUTION

14

3. METHODOLOGY AND SOLUTION 3.1 PROBLEM DEFINITION

In unconditional overhearing the nodes are overhearing other nodes unnecessarily and it consumes more energy. Since it consumes more energy the packet delivery rate also reduces significantly. 3.2 PROPOSED WORK The main goal of this proposed methodology is to make the energy efficient routing protocol applicable in a MANET and to achieve an additional energy saving by identifying and eliminating unnecessary communication activities such as unconditional overhearing. More specifically, this proposed methodology has been motivated by the following two observations. First, a main trouble in integrating the DSR protocol comes from unnecessary or unintended overhearing. Overhearing improves the routing efficiency in DSR by eavesdropping other communications to gather route information but it spends a significant amount of energy. Second, it is important to note that most of network layer solutions developed for MANETs including DSR depend on broadcast flood of control packets. Unconditional forwarding of broadcast packets is wasteful and even harmful because it generates many redundant rebroadcasts. This methodology proposes a message overhearing and forwarding mechanism, called Random-Cast, which makes a judicious balance between energy and network performance. In Random Cast, a node may decide Not to overhear (a unicast message) and not to forward.

15

3.3 ALGORITHM FOR SETTING UP CONDITIONAL, UNCONDITIONAL AND NO OVERHEARING Random Cast at a node (MAC Address MA, overhearing probability PR and rebroadcast probability PF) Upon receiving an ATIM frame (receiver MAC Address DA, subtype ID) If (DA==BROADCAST) continue to wake up and receive; Else { If (DA==MA) continue to wake up and receive; Else if (ID==1001) continue to wake up and overhear; Else if (ID== 1101) If (rand (0, 1<=PR)) continue to wake up and overhear; Else switch to sleep; } Else switch to sleep; } Upon being ready to transmit a frame (receiver MAC address DA, overhearing/rebroadcast level OL requested by DSR/ARP If (DA==BROADCAST) if (OL==unconditional) send an ATIM; Else If (OL==randomized) If (rand (0, 1 <=PF )) send an ATIM; } } Else { Switch (OL) { Case: unconditional ID=1001; Case: randomized ID=1101; Case: no ID=1110;
16

} Send an ATIM with subtype ID; } 3.4 MODELLING We simulate our energy efficient routing protocol algorithm using the Randomcast mobility model. This mobility model represents the most randomized overhearing between the nodes the overhearing nodes are chosen by using the transmission range formula. FORMULA P = TRx U TRa /3.14*r*r Where, TRx and TRa represent the transmission area between node A and X. r represents the radius of the transmission range. (1)

17

MODEL DIAGRAM

FIGURE 3.5 MODEL DIAGRAM OF OVERHEARING a. No Over Hearing b. Unconditional Over c. Randomized Over Hearing

18

RESULTS AND ANALYSIS

19

4.1 SIMULATION USING NS2 The protocol is implemented using NS-2 simulator and the screenshots of some output have been displayed in this chapter. The basis of our protocol is energyefficient and it reduces unwanted overhearing, minimizes un wanted energy consumption and maximizes lifespan of mobile nodes in the system and achieves good end-to-end performance. We have simulated a system of 15 nodes using NS2 simulator. In this section, we present the performance of the proposed energy-efficient routing protocol simulated by NS2.We simulate a system of 15 nodes in a 700X600 area. And the simulation time is kept for 150 seconds. The maximum mobility of nodes is kept between 0 m/sec to 5 m/sec. Equal transmission range for all the nodes are taken between 25 to 30 grid units. In our simulation the initial energy value of nodes are kept as 100 and the energy consumption of every node is calculated for time interval of 10 seconds of time . Then the packet delivery rate have also noted for every 10 seconds of time and graph for energy consumption and packet delivery rate plotted. TABLE 4.1.1 SIMULATION DETAILS TABLE PARAMETERS Number Of nodes Size of the network Speed of the node Transmission Range Number of members Simulation Time VALUES 15
700X600 20m/s

360m Dynamically changed 120ms

The table 4.1.1 shows the simulation details of the project include no of nodes, network size, speed of the nodes and etc.

20

4.2 TRANSMISSION RANGE CALCULATIONS

FIGURE 4.2

figure 4.2 shows the snapshot of the nodes which are in the transmission range are identified based on the nodes distances from the source and destination the nodes which are having distances < 180 and >-180 from source and destination are selected for overhearing the source and destination.

21

4.3 INITIAL NODE POSITIONS IN UNCONDITIONAL OVERHEARING NS2

FIGURE 4.3

Figure 4.3 shows the snapshot which indicates the initial position of the nodes in the unconditional overhearing at the time 0 seconds. In this all of the nodes are at full energy level

22

4.4 FINAL NODE POSITION IN UNCONDITIONAL OVER HEARING

FIGURE 4.4

Figure 4.4 shows the snapshot which indicates the ending or finishing position of nodes after 120 seconds . In this 14 nodes have reached very dangerous energy position and stops packet delivery and one node is at dangerous state.

23

4.5 INITIAL NODE POSITION IN RANDOMIZED OVER HEARING

FIGURE 4.5 Figure 4.5 shows the snapshot which indicates the initial position of the nodes in the randomized overhearing at the time 0 seconds. In this all of the nodes are at full energy level.

24

4.6 FINAL NODE POSITION IN RANDOMIZED OVER HEARING

FIGURE 4.6 Figure 4.6 shows the snapshot which indicates the ending or finishing position of nodes after 120 seconds . In this 11 nodes are at full energy position, 2 nodes are in very dangerous energy position and 2 nodes are at dangerous energy position and it consumes very less energy than unconditional overhearing.

25

4.7. COMPARISON GRAPHS 4.7.1 PACKET DELIVERY RATE GRAPH


120

100

number of packets

80

60 Randomized overhearing unconditional overhearing 40

20

0
10 20 30 40 50 60 70 80 90 100 110 120 130 140 150 160 170 180

Time in sec

Graph-4.7.1 represents packet delivery rate in both unconditional and randomized overhearing and the unconditional overhearing packet delivery rate reaches 0 at time of 140 itself due to unwanted energy consumption and packet delivery ratio reaches 0 at 180th second in randomized overhearing by avoiding unwanted overhearing.

26

4.7.2 ENERGY CONSUMPTION GRAPH


800 700 600 500 400 Unconditional overhearing 300 200 100 0 63 70 95 97 100 105 110 Randomized overhearing

energy consumption in joules

time in seconds

Graph-4.7.2 represents the energy consumption in unconditional and randomized overhearing and for the time of 110 seconds unconditional overhearing has consumed 710 units of energy and randomized overhearing has consumed 420 units of energy only.

27

CONCLUSION

28

5. CONCLUSION A Randomized overhearing based energy efficient routing protocol for MANET is proposed in the dynamic network in order to reduce the un wanted energy consumption in the Dynamic Source Routing protocol due to the unconditional overhearing. In this proposed routing methodology the overhearing between nodes will be randomized by setting the transmission range for overhearing. The nodes which are in the transmission range only can overhear the source and destination in the network other nodes will be in the sleep state .Since the other nodes are in the sleep state they will consume very less amount of energy and the nodes which are going to transmit, receive and overhearing will be in active state. Those nodes which are in the active state only consume more amount of energy .In the DSR protocol due to the unconditional overhearing more amount of energy will be lost un necessarily. In our proposed methodology due to the randomized overhearing the consumption of energy will be saved up to 67% while comparing with DSR.

29

REFERENCES

30

6. REFERENCES 1. J.-H. Chang and L. Tassiulas, Energy Conserving Routing in Wireless AdHoc Networks, Proc. IEEE INFOCOM, pp. 22-3 , 2000. 2. B. Chen, K. Jamieson, R. Morris, and H. Balakrishnan, Span An EnergyEfficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks, Proc. ACM MobiCom,pp. 85-96, 2001. 3. J. Dorsey and D. Siewiorek, 802.11 Power Management Extensions to Monarch ns, Technical Report CMU-CS-04-183, School of Computer Science, Carnegie Mellon Univ., Dec. 2004. 4. J. Gomez, A.T. Campbell, N. Naghshineh, and C. Bisdikian, Conserving Transmission Power in Wireless Ad Hoc Networks,Proc. Ninth IEEE Intl Conf. Network Protocols (ICNP 01 , pp. 24-34,2001. 5. P. Kyasanur, R.R. Choudhury, and I. Gupta, Smart Gossip An Adaptive Gossip-Based Broadcasting Service for Sensor Net-works, Proc. Second IEEE Intl Conf. Mobile Ad Hoc and Sensor Systems (MASS 06) , pp. 91-100, 2006.

31

Das könnte Ihnen auch gefallen