Download Advances in Natural and Applied Sciences

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

RapidIO wikipedia , lookup

Distributed operating system wikipedia , lookup

Computer network wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

Backpressure routing wikipedia , lookup

Wake-on-LAN wikipedia , lookup

IEEE 1355 wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Deep packet inspection wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

CAN bus wikipedia , lookup

Airborne Networking wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Kademlia wikipedia , lookup

Routing wikipedia , lookup

Computer cluster wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
Advances in Natural and Applied Sciences, 9(7) June 2015, Pages: 57-62
AENSI Journals
Advances in Natural and Applied Sciences
ISSN:1995-0772 EISSN: 1998-1090
Journal home page: www.aensiweb.com/ANAS
Certain Investigations for Improving the Performance by Reducing Overheads during
Route Discovery in MANETs
1
1
2
S. Dinakar and 2Dr. J. Shanthini
Assistant Professor, Department of Computer Science and Engineering, SNS College of Technology, Coimbatore, TamilNadu, India.
Associate Professor, Department of Information Technology, SNS College of Technology, Coimbatore, TamilNadu, India.
ARTICLE INFO
Article history:
Received 12 March 2015
Accepted 28 April 2015
Available online 1 June 2015
Keywords:
Mobile Ad Hoc Networks, Link
Breakages,
Route
Discoveries,
Overhead, Rebroadcasts.
ABSTRACT
In mobile ad hoc networks multi-hop routing is performed in order to communicate the
packets from the source to destination. The nodes within these networks are dynamic
due which a frequent path change occurs which can cause frequent link breakages and
route discoveries. These route discoveries can introduce overhead in terms of
contention, collision and rebroadcasts which are non-negligible. The main focus of the
paper deals with reducing overheads for which a hexagonal based clustering is
proposed for avoiding frequent route discoveries and thus maximizing the lifetime of
the networks. Eventually it provides additional coverage area and so it reduces end –
end delays.
© 2015 AENSI Publisher All rights reserved.
To Cite This Article: S. Dinakar and Dr. J. Shanthini., Certain Investigations for Improving the Performance by Reducing Overheads
during Route Discovery in MANETs. Adv. in Nat. Appl. Sci., 9(7): 57-62, 2015
INTRODUCTION
The mobile ad hoc network consists of
autonomous
nodes
communicating
among
themselves. They do not require any fixed
infrastructure since, they are self – configuring
networks and does not require any central
administrator. Due to the unstable nature of nodes
challenges occur during routing a packet from source
to destination. As discussed previously the nodes are
not stable in nature so the path between the nodes
changes from time to time. For initiating a path to
transmit data it is essential to identify (or) establish a
path for transmission starting from the source to the
destination using route discovery process. The
mobile ad hoc network makes use of broadcasting for
route discovery process. It involves flooding a
message from one node to all other nodes within the
network. The broadcasting technique forms the
fundamental communication technique in MANETs.
The process for identifying a route involves
transmission of route request (RREQ) packets from
source to destination through every outgoing links
which is also known as blind flooding. The
transmitted RREQ packets are received by all the
surrounding nodes which try to find out whether
these packets are already contained (or) not. If the
packets are not contained already they are to be
retransmitted and this is performed till all the nodes
have received and transmitted the broadcast packets
at least once. The broadcasting can happen through
anyone of the below methods.
a) Spontaneous:
The broadcasting can be performed by a node at
any time. Due to this uninformed generation it
retards synchronization and no prior information
about the connectivity is known.
b) Unreliable:
The broadcasting employs transmission of
messages to all (or) some of the nodes within the
network. It does not provide any acknowledgement
due to,
 The host separates itself from the network.
 It causes repeated transmissions around the
sender.
 Many applications do not need 100%
broadcasting techniques.
The route discovery process using broadcasting
introduces redundant retransmissions while sending
route request packet. It due to the fact that the source
floods the route request blindly to all nodes when the
request are been made without knowing the actual
path to the destination. When a node decides to
rebroadcast a message to its neighbors where it
already holds that message introduces broadcast
storm problem.
Corresponding Author: S. Dinakar, Assistant Professor, Department of Computer Science and Engineering, SNS College
of Technology, Coimbatore, TamilNadu, India.
E-mail: [email protected].
58
S. Dinakar and Dr. J. Shanthini, 2015
Advances in Natural and Applied Sciences, 9(7) June 2015, Pages: 57-62
2.
Related Works:
The main aim was to reduce the number of
rebroadcasts of the route request packet (RREQ) and
to improve the performance during routing. The
dynamic nature of nodes in the mobile ad hoc
networks (MANET) causes frequent link breakages
thus leading to frequent path failures and route
discoveries and reduces packet delivery ratio and
increases the end – to – end delays. This creates
overhead in terms of contention, collision and
rebroadcasts during route discovery process which is
non negligible. The ultimate aim is to reduce the
overhead in route discovery process. The
broadcasting technique is used for route discovery
during which the mobile node blindly rebroadcasts
the first received route request packets without
knowing the route to the destination thus causing
broadcast storm problem.
2.1 Methodologies Used:
The neighbor knowledge based probabilistic
rebroadcast protocol was employed in order to
reduce the overhead during routing in mobile ad hoc
networks (MANETs). The neighbor knowledge
protocol is used along with proposed rebroadcast
delay and rebroadcast probability which determines
the packet forwarding order.
a) Rebroadcast Delay:
The nodes which have more common neighbor
with the previous node will have lower delay. During
packet transmission the common node will know this
fact first. These rebroadcast delay enables the
information, that these nodes have transmitted the
packets to more neighbors which forms the key to
success.
b) Rebroadcast Probability:
The scheme considers the uncovered neighbors
(UCN). When a node receives a route request packet
(RREQ) from its previous node it makes use of the
neighbor list in the RREQ packet. This is done to
estimate how many neighbors have not been covered
by the RREQ packet of the previous node. In that
case, the current node rebroadcasts the RREQ packet
so that it can reach more additional coverage nodes.
For calculating the rebroadcast probability each node
needs its 1 hop neighborhood information.
The scheme makes use of two factors described
below,
i)
Additional Coverage Area:
It is the ratio of the number of nodes that should
be covered during a single broadcast to the total
number of neighbors, and
ii) Connectivity Factor:
It represents the relationship between the
numbers of neighbor of a given node within the
network.
2.2 Routing Protocol:
The routing protocols like Ad Hoc On – demand
Distance Vector Routing (AODV) and Dynamic
Source Routing (DSR) were used since these
protocols are on – demand routing protocols. These
protocols improve the scalability of MANETs by
reducing the routing overheads during new route
requests.
3 Statement of Problem:
The existing system made use of 1 hop
neighborhood information in order to attain
additional coverage area. Here, the node verifies the
neighbors covered by using the neighbor list
maintained at the RREQ packet. In case, if there are
any uncovered neighbors the broadcasting is made
for attaining additional coverage area. The problem
here is that the scheme does not work well in all the
situations. This can also minimize the lifetime of the
network since the broadcasting to uncovered
neighbors can induce additional rebroadcasts thus
consuming battery power of the nodes.
4 Proposed System:
The main focus is to reduce the overhead caused
during route discovery process. The existing makes
use of probabilistic scheme which does not work
well in all situations. In order to overcome the
overhead area based clustering technique is used. In
this scheme the receiver should be present at the
sender’s transmission range thus increasing the
coverage area of the network and extending the
network lifetime. The below stated techniques and
methods used in area based rebroadcasts (Fig. 3).
4.1 Hexagonal Clustering:
The technique (Fig. 1) divides the network into
group of nodes which are closely located to each
other. Here, the hexagonal clustering is employed
since MANET possesses bandwidth constraints. The
bandwidth occupied by the entire system is Cb times
the bandwidth occupied by a single cell where, Cb
represents the bandwidth occupied by every single
cell. The cell follows an orthogonal structure since it
allows for frequency reuse and a single cell is
considered as cluster and any node within the cell is
able to communicate with other orthogonal
neighbors. Here, the clustering allows the node
within one cluster can cover one quarter of the
adjacent cluster thus providing additional coverage
area. This allows the node to obtain the information
about the nodes present inside the adjacent
orthogonal clusters. The sensing area of a cluster can
be determined using,
S  min  A T / 4
Where, Sa denotes the sensing area of a node
into the adjacent cluster. Ac denotes the adjacent
clusters. Tr represents the transmission range into the
adjacent cluster. The shortest between the nodes
a
c
r
59
S. Dinakar and Dr. J. Shanthini, 2015
Advances in Natural and Applied Sciences, 9(7) June 2015, Pages: 57-62
present at the boundary of sender transmission range
from source is,


i
S d  1   d  
  Sd  
Where Sd denotes shortest distance from source
S to the distance. Did denotes the shortest distance
from neighbor node i to the distance D. id / Sd
denotes the clones of next node.
Fig. 1: Hexagonal Clustering.
Pseudocode for Cluster Formation:
begin
Generate initial node population
Analyze Sa = min(Ac (Tr / 4))
Generate node with performance metrics
if i ε Sa


i
S d  1   d  
Sd  


Analyze
Assign node i as cluster head within the cell
Formulate nc
Update the chosen cluster head information into
source
end if
end
The clustering technique extends the network
lifetime. The technique eliminates the need to assign
random timers to reduce rebroadcasts. The technique
reduces the overhead caused due to contention,
collision and rebroadcasts.
4.2 Cluster Head Selection:
After the formation of clusters, each cluster
contains a set of independent nodes through which
the communication has to progress since the packet
should reach the destination. For which each cluster
Fig. 2: Cluster Head Formation.
chooses a cluster head (CH) (Fig. 2) which acts as a
coordinator within that structure and tries to
communicate with other cluster heads. The cluster
heads (CH) acts as a temporary base station within its
cluster and communicates with other clusters. The
selected cluster head should possess low mobility
and highest energy attribute. By this process the
communication between the clusters happen through
their respective cluster heads. This results in sending
and receiving of data through the cluster heads in
order to reach the destination. Each and every cluster
head maintains a table into which all the details of
neighbor cluster head information are stored. Within
every cluster only one node is chosen as head which
is present near to the boundary of every cluster and
thus it covers one quarter of the adjacent orthogonal
cells and this process continues for all the cluster
heads and thus provides additional coverage area.
The influence of the cluster head into adjacent
clusters makes it possible for the cluster to obtain
every information about the cluster head present in
the adjacent clusters and this information are made
during the failure of that cluster head for choosing a
new cluster head.
60
S. Dinakar and Dr. J. Shanthini, 2015
Advances in Natural and Applied Sciences, 9(7) June 2015, Pages: 57-62
Pseudocode for Cluster Head Selection:
begin
Generate initial node population
n clusters ni nodes (i = 1, 2, ….. , n)
if ni ε n
analyze the performance metrics
assign a node as head within the cell
else
report the cell as worst cell and discard it in
communication
Keep all the best solutions into the source
Rank the solutions and find the best
Update the chosen cluster head information into
adjacent cells cluster
end if
end
4.3 Message Acknowledgement:
After selection of cluster head as mentioned
above the remaining nodes are put in sleep state.
Before the actual packet transmission, the source
floods a HELLO message which will be received by
the cluster head. Those received HELLO message
will be forwarded to the adjacent cells cluster head
since its information will be contained into the
previous cluster head by using which the HELLO
message finds a path to reach the destination using
the cluster heads. After regular transmission of
HELLO messages through the cluster heads the path
to the destination is determined. Then the path
confirmation is send back to the source node again
through all these cluster heads called the
acknowledgement. This acknowledgement tries to
recover the cluster from flaws in order to transfer the
packet from the source to destination.
Pseudocode for Message Acknowledgement:
begin
ni choose ith node as cluster head
assign other subset of nodes to sleep state
while (path > 0)
HELLO message is transferred to all cluster heads
Acknowledgment is received
else
select another head from the table maintained at the
source
reconstruct connection between the heads to transfer
packets
end while
end
Fig. 3: Methodology.
4.4 Reassigning Cluster Head:
The nodes within the network dies after its
resources are exhausted. The cluster head dies after a
certain time or move away from its range due to its
mobility after some time. During which another node
is to be chosen as head within that structure in order
to continue communication. In case if there occurs a
flaw within any of the cluster head the
acknowledgement will not be received by the other
cluster head which retards further communication.
During which the cluster head present inside the cell
which is adjacent to the flawed cluster sends a
message to the source which assigns a new node as
cluster head. After which this information will be
stored into the adjacent cluster heads table and the
communication takes place.
4.5 Routing Protocol:
The technique makes use of proactive routing
protocol (i.e.) open link state routing protocol
(OLSR). These protocols require every node to
maintain updated information about the every other
node in the network. Here, only the cluster head
communicates in order to transfer a packet from
source to destination. When a source requests for
route, the RREQ packets are flooded into the
networks where these routing protocols after entering
into a cluster makes use of the cluster head and
delivers a HELLO message and upon accepting this
61
S. Dinakar and Dr. J. Shanthini, 2015
Advances in Natural and Applied Sciences, 9(7) June 2015, Pages: 57-62
message a LIVE message is sent back to the source
via the cluster heads and this is performed by all the
other cluster heads present inside the clusters. After
receiving the updated information from clusters a
path is chosen only by considering the cluster heads
and thus the other subset of nodes are in sleep state.
Here after the communication happens only between
cluster heads. The routing algorithm discards all
other links and it has a special ability to provide
route immediately on demand.
5. Performance Evaluation:
The evaluation of performance of the hexagonal
clustering was evaluated (table 1) by comparing it
with OLSR protocol using NS - 2 Simulator. The
data dissemination mechanism in MANETs makes
use of broadcasting. Here, the analysis is done for
route request in route discovery. For comparing the
routing performance of hexagonal clustering, is
analyzed for reducing the overhead of RREQ packet
during route discovery. The number of cluster heads
is randomly chosen based on the CBR connections
with a fixed packet rate and the number of nodes is
Fig 4.1 MAC Collision Rate
Fig. 4.3: End – End Delay
set to 30. It is possible to vary the number of nodes
form 30 to 250 in a fixed field to evaluate the impact
of different node density. Here, the CBR is set to 2
i.e. a source and destination. The performances of
routing protocols were evaluated using the following
metrics. Figure 4.1 represents the MAC collision rate
where the average numbers of packets are dropped as
a result of collision occurred at the MAC layer in per
second. Figure 4.2 represents the overhead caused
due to routing thus representing the ratio of the total
packet size of the control packets to the total packet
size of data packets delivered to the destinations.
Figure 4.3 depicts the packet delivery ratio which is
the ratio of the number of data packets successfully
received by the CBR destinations to the number of
data packets generated by the CBR sources. Figure
4.4 depicts average end – to – end delays which
represents the average delay of successfully
delivered CBR packets from source to destination
node. It comprises of all possible delays from the
CBR sources to destinations.
Fig. 4 Evaluating the Impact of Different Node
Density by Varying the Number of Nodes
Fig 4.2 Normalized Overhead
Fig. 4.4: Packet Delivery Ratio.
62
S. Dinakar and Dr. J. Shanthini, 2015
Advances in Natural and Applied Sciences, 9(7) June 2015, Pages: 57-62
Table 1: Simulation Parameters.
Simulation Parameter
Simulator
Topology Size
Number of Nodes
Transmission Range
Bandwidth
Interface Queue Length
Traffic Type
Number of CBR Connections
Packet Size
Packet Rate
6 Conclusion and Future Work:
The main focus of the paper is to reduce the
overhead caused due to broadcasting during route
discovery process. Instead of 1 hop neighborhood
information a clustering technique is utilized from
which a head is chosen to communicate the packet
from source to destination. The communication
happen only between the cluster heads which inhibits
the rebroadcasts to all other nodes within the clusters
since, they are put to sleep to maximize the network
lifetime thus increasing end – to – end delivery and
packet delivery ratio. The work can be extended by
considering the security factors. The networks are
vulnerable due to which malicious node can act as
trusted node and steal information from the source.
Distributed approaches can be employed for electing
cluster heads.
REFERENCES
Anju Gill, Chander Diwaker, Juky 2012,
Comparitive Analysis of Routing in MANET’,
International Journal of Advanced Research in
Computer Science and Software Engineering, 2(7).
Badarneh, S., Michel Kadoch, Multicast Routing
Protocols in Mobile Ad Hoc Networks: A
Comparative Survey and Taxonomy,EURASIP
Journal on Wireless Communications and
Networking volume, Article ID 764047,42 pages.
Bellur, B., R.G. Ogier, F.L. Templin, 2003.
Topology broadcast based on reverse-path
forwarding routing protocol (tbrpf), in: Internet
Draft, draft-ietf-manet-tbrpf-06.txt, work in progress.
Brad Williams, Tracy Camo, March 2002,
Comparison of Broadcasting Techniques for
MANET.
Chen, T.W., M. Gerla, 1998. Global state
routing: a new routing scheme for ad-hoc wireless
networks, in: Proceedings of the IEEE ICC.
Chen-Che
Huang,
Shou-Chih
Lo,
A
Comprehensive Survey of Multicast Routing
Protocols for MANET.
Das, S.K., B.S. Manoj and C.S.R. Murthy, 2002.
A Dynamic Core Based Multicast Routing Protocol
for Ad Hoc Wireless Networks, in Proc. ACM
MOBIHOC, pp: 24-35.
Deepa, S., Dr. D.M. Kadhar Nawaz, 2010. A
Study on the Behaviour of MANET Routing
Protocols with Varying Densisites and Dynamic
Value
Ns – 2 (v 2.30)
1000m x 1000 m
50, 100, 150, … 250
250m
2mbps
30
CBR
2,4,6,… 10
512 bytes
2 packets / sec
Mobility Patterns, IJCA Special Issue on “Mobile Ad
hoc Networks”, MANETs.
Dinakar, S., Dr. J. Shanthini, 2014. A Study on
Various Features of Multicast Routing Protocols in
Mobile Ad hoc Networks, International Journal of
Advanced Research in Computer Science and
Software Engineering, 4(7).
Dinakar, S., Dr. J. Shanthini, 2014. Study on
Broadcastin Techniques and Characteristics in
Mobile Ad Hoc Networks, International Journal of
Computer Science Engineering, 3(5).
Dinakar, S., Dr. J. Shanthini, 2014. Study on
Characteristics of Ad hoc Netwroks and TCP/IP
Mode, International Journal of Research in
Information Technology, 2(7).
Hui Zeng, Minming Li, Hai Lu, Xiaohua Jia,
Efficient Flooding in MANET.
Ji, L.S. and M.S. Corson, 2003. Explicit
Multicasting for Ad Hoc Networks”, Mobile
Networks and Applications, 8(5): 535-549.
Justin Lipman, Hai Liu, Ivan Stojmenovic,
Broadcast in Ad hoc Networks.
Kamal Kant, Lalit K. Awasti, Unicast and
Multicast Routing Protocols for MANETS: A
Comparitive Survey.
Lee, S.J., W. Su, J. Hsu, M. Gerla, R. Bagrodia,
2000. A Performance Comparison Study of Ad Hoc
Wireless Multicast Protocols, in Proc. IEEE
INFOCOM, 2: 565-574.
Mehran Abolhasan, Tadeusz Wysocki, Eryk
Dutkiewicz, 2004. A Review of Routing Protocols
for
Mobile
and
Ad
hoc
Networks,
www.elsevier.com/locate/adhoc networks.
Murthy, C.S.R. and B.S. Manoj, 2004. Ad Hoc
Wireless Networks: Architectures and Protocol”,
New Jersey: Prentice Hall.
Wu, X., H.R. Sadjadpour, J.J. Garcia-LunaAceves, 2007. Routing Overhead a Function of Node
Mobility: Modeling Framework and Implications on
Proactive Routing, Proc. Of IEEE MASS’07, pp: 1-9.
Yu-Chee Tseng, Sze-Yao Ni, Yuh-Shyan Chen,
Jang-Ping Sheu, 2002. The broadcast storm problem
in MANET, Wireless Networks, 8, Kluwer
Academic Publishers.