SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303
IJTET©2015 83
Adaptive Position Based Location Updation for
Geographic Routing In MANETs
B.Neeththi aadithiya1
1
M.Kumarasamy College of engineering, ECE,
neethiece@email.com
P.T.Sivagurunathan2
2
M.Kumarasamy College of engineering, ECE,
Sivagurunathanpt.ece@mkce.ac.in
Abstract—Geographic routing also called as Geo routing is a routing principle which relies on the Geographic position information.
Geographic routing is the most commonly used routing for MANETs. In Geographic routing each node should be aware of its
neighbor’s location to maintain the local topology accuracy. Hence, each node should update its location information through a
message called beacon. Existing mechanisms invoke periodic beacon update scheme which consumes the network resources such as
energy and bandwidth specifically when the network traffic is high, it creates packet loss in the network and it leads to retransmission
of data packet causing additional delay and energy consumption. In this work, adaptive position update is proposed which dynamically
adjusts the beacon updation frequency according to the varying network conditions.APU makes use of mobility prediction rule and on
demand learning rule for beacon updation.
Index Terms— Geographic routing, beacon update, node mobility, Location information, and local topology.
——————————  ——————————
1 INTRODUCTION
DHOC networks consist of mobile or stationary node’s that
communicate over wireless links. There is neither fixed
infrastructure to support the communication nor any centralized
administration or standard support services. Node’s can self-organize
dynamically in an arbitrary and temporary manner, allowing people
and devices to seamlessly communicate in areas with no pre-existing
communication infrastructure; therefore, the node’s themselves act as
routers as well [1]. In addition, due to the limited transmission range
of wireless node’s, intermediate node’s may be required to
collaborate in forwarding a packet from source to destination.
Therefore, node’s beyond the direct wireless transmission range of
each other will be able to communicate via multihop routing. In fact,
dynamic topology changes are one of the characteristics of mobile ad
hoc networks where node’s move frequently. Therefore, we cannot
rely on conventional routing protocols designed for wired networks
for the purpose of routing in MANETs. That is why a variety of new
routing protocols for mobile ad hoc networks are researched and
designed.
There are different scenarios and environments where
MANETs is employed; some of them include: military battlefields,
disaster recovery and emergency rescue operations, Vehicular Ad
Hoc Networks (VANETs) and Aeronautical Networks. One way of
communication in such networks might seem to simply flood the
entire network. However, the fact that power and bandwidth are
scarce resources in such networks of low powered wireless devices
necessitates more efficient routing protocols.
Therefore, there are a number of routing protocols
proposed for MANETs, which can be categorized into two different
approaches: topology-based and position-based routing. Topology-
based routing protocols use information about the links. That is,
information about the paths is maintained and routes are established
based on the information of the links that exist in the network. These
protocols can be further divided into proactive, reactive and hybrid
approaches. Proactive protocols are more similar to the classical
routing strategies such as distance-vector routing. Proactive
protocols constantly discover routes and maintain them in routing
tables. Hello packets are exchanged periodically by which node’s get
informed of changes in the topology. This results in low route
discovery latencies at the cost of imposing high overhead due to
occupying the bandwidth for route maintenance.
On the other hand, reactive protocols discover and maintain
routes only if needed, which results in initial delays until the routes
are set up. However, the advantage of this type of routing is low
overhead in terms of processing and memory along with minimum
power consumption and lower bandwidth requirements. In case of
topology changes, which result in link failures, route error messages
are generated. Although this will be only done for the routes in use,
the problem of imposing traffic at times of topology changes is not
solved completely. Ad-Hoc On-Demand Distance Vector Routing
(AODV) and Dynamic Source Routing (DSR) are examples of
reactive protocols.
To provide more efficiency and scalability, a third group of
protocols was introduced as hybrid routing protocols, which is a
combination of both reactive and proactive approaches. However, the
above mentioned limitations are still in place. An example of a
hybrid routing protocol is Zone Routing Protocol (ZRP).
Position-based or Geographic routing approaches were
introduced to eliminate some of the limitations of the topology-based
protocols in MANETs. These routing protocols [2] rely on having
one piece of information and that is the node’s’ physical location
information. Thus, it is necessary for node’s to obtain their
coordinates either by using a location service such as GPS or other
types of positioning services .By employing position information,
Geographic routing protocols do not need to establish and maintain
routes, thereby eliminating routing table construction and
maintenance. Thus there arises a necessity that each node has to
updates their current position using beacon packets. The location
updation becomes more challenging, as the local topology in
A
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303
IJTET©2015 84
MANET changes dynamically. With the use of location information
for routing the need for routing table construction and maintenance
are eliminated. The forwarding of packet to destination is based on
location information and one hop neighbor. If there is no one hop
neighbor closer to the destination then forwarding strategy fails.
Recovery strategies are introduced to deal with such failures.
The positioning devices such as Global Positioning System
(GPS) and Grid Location Systems (GLS) are used in the
Geographical routing protocols to find the exact location of node’s.
GLS serve node’s with location information by splitting entire
network into small squares known as grids. A common beaconing
approach is proactive beaconing to maintain the location information
and local topology. The entire node’s in the network update the
location information to all other node’s using beacon packets. Thus
the proactive mechanisms results in higher overhead in highly
dynamic networks. If the node’s in the network move frequently then
their updates must be transferred to the neighbors. On the other hand
slow node’s need not update their location frequently. Thus there is
an increased necessity for different location updation schemes. This
survey provides an overview about the available location updation
schemes for position based routing.
2 CHALLENGES IN MANETS
2.1 Limited bandwidth:
Wireless link continue to have significantly lower capacity
than infrastructured networks. In addition, the realized throughput of
wireless communication after accounting for the effect of multiple
access, fading, noise, and interference conditions, etc., is often much
less than a radio’s maximum transmission rate.
2.2 Dynamic topology:
Dynamic topology membership may disturb the trust
relationship among node’s. The trust may also be disturbed if some
node’s are detected as compromised.
2.3 Routing Overhead:
In wireless adhoc networks, node’s often change their
location within network. So, some stale routes are generated in the
routing table which leads to unnecessary routing overhead.
2.4 Hidden terminal problem:
The hidden terminal problem refers to the collision of
packets at a receiving node due to the simultaneous transmission of
those node’s that are not within the direct transmission range of the
sender, but are within the transmission range of the receiver.
2.5 Packet losses due to transmission errors:
Ad hoc wireless networks experience a much higher packet
loss due to factors such as increased collisions due to the presence of
hidden terminals, presence of interference, uni-directional links, and
frequent path breaks due to mobility of node’s.
2.6 Mobility-induced route changes:
The network topology in an ad hoc wireless network is
highly dynamic due to the movement of node’s; hence an on-going
session suffers frequent path breaks. This situation often leads to
frequent route changes.
2.7 Battery constraints:
Devices used in these networks have restrictions on the
power source in order to maintain portability, size and weight of the
device.
2.8 Security threats:
The wireless mobile ad hoc nature of MANETs brings new
security challenges to the network design. As the wireless medium is
vulnerable to eavesdropping and ad hoc network functionality is
established through node cooperation, mobile ad hoc networks are
intrinsically exposed to numerous security attacks.
3 LITERATURE SURVEY
3.1 Quorum Based Systems:
In quorum systems, information updates are sent to a group
(quorum) of available node’s and information queries to another
quorum. Node’s at the intersection of quorum contain the updated
information.
The updation is done only when there is a link break. It
suffers due to the complex structure with high overhead and
difficulty in quorum construction.
3.2 Home Agent Based System:
In the home agent based location scheme, circular area is
selected as a home agent for each node and informs other node’s
about it. The node when moves the location updation is done.
The updation messages are transferred only to the node’s in
the home agent [3].The update may fail if home agent is
disconnected from the current node location. Such failure may be
reported back to the node, which will then choose a new home.
3.3 Periodic Beaconing
In the periodic beacon based location updation schemes the
beacon information about the node’s is transferred periodically [4].
The beacons in turn contain the location information of the particular
node at the particular instance of time and the last seen position and
also about the mobility nature with which it is moving.
The beacon update about a node, thus conveys the entire
location information about the node and thus routing of data is made
easier with the gained beacon update. Periodic beaconing is the
earliest and, most commonly used beacon updation scheme and it is
employed in the GPSR Geographical routing for MANETs. The
main advantage is the accurate local topology information and which
in turn increases the overhead.
3.4 Beaconless routing
Beaconless routing was introduced to reduce the drawbacks
of periodic beaconing. The periodic beaconing consumes more
bandwidth. As bandwidth is a scarce resource it has to be utilized
effectively. Thus, in the proposed [5] beaconless routing some
assumptions are made that each node is aware of its own position
with the help of the location servers.
The basic principle behind the scheme is that if a node wants to
transfer a packet to destination, first it finds the position of the
destination and it stores the information about the route and
Geographical coordinates in its packet header.
When a node on the route to destination receives a packet it
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303
IJTET©2015 85
has to replace the previous node position with its current position.
This scheme does not suit well for the highly dynamic network
conditions and it does not provide the accurate local topology
information. This reduces the use of scarce resources and also
reduces the interference with the regular data transmission.
3.5 Distance based beaconing
In the highly mobile and dynamic adhoc network
environment the periodic beaconing will result in the excessive
overhead [6]. Thus the alternative distance based beaconing was
proposed. Initially ,all the node’s will update its location and after
some time when the node moves away from the radio range of its
one hop neighbors it has to update.
The basic principle behind the scheme is that if a node
wants to transfer a packet to destination, first it finds the position of
the destination and it stores the information about the route and
Geographical coordinates in its packet header. When a node on the
route to destination receives a packet it has to replace the previous
node position with its current position. This reduces the use of scarce
resources and also reduces the interference with the regular data
transmission.
3.6 Speed based beaconing
Distance based beaconing applied in the Geographical
routing results in high overhead when the network is highly
dynamic. Thus the speed based beaconing was proposed [7].The
updation about the location information of a node is dependent on
the speed with which it travels.
A node determines its beacon interval from a predefined
range with a value chosen was inversely proportional to its speed.
The timeout is calculated to avoid outdated updation information.
The timeout interval for a neighbor is k times its beacon interval.
Every time when a beacon packet arrives, it checks for the timeout.
Thus, it avoids outdated routing. It also suffers from the same
disadvantage as distance based beaconing i.e., fast node’s are not
aware of the slow node’s existence.
3.7 Time based beaconing
In time based beaconing, every node updates its neighbor’s
information per T time unit. The unit time is the network parameter
and it is easy to determine under the dynamic network topology.
According to the on demand data transmission the beacon interval
time T is determined [8], [9]. There is need for a node that maintains
the local clocks to commence the beaconing.
The main benefit of this scheme is the minimum
computational cost. The main disadvantage in the time based
beaconing is that it incurs unnecessary beaconing per T time interval
under low mobility network. This kind of beaconing does not
consider the data communication delay, so; it is not suitable for delay
sensitive applications. In addition, it is easy to implement under
various MANET environments, but it results in unnecessary
signaling traffic degrades the routing performance.
3.8 Reactive beaconing
Reactive beaconing location updation is a on demand
beaconing scheme. In this scheme the beacon packets which convey
the location information is transferred only on request. The request
packets (REQ) are transmitted by a node if it needs to forward a
packet.
Data packet forwarding is accomplished with the request
packet and beacon packet exchange. This results in a certain amount
of delay for each transmission [10]. The major advantage of this
scheme is the accurate local topology.
4 COMPARATIVE STUDY
Table.1. Comparison table of updation schemes
Location
Updation
Schemes
Advantages Limitations
Periodic
updation
Accurate local
topology
information and
Loop free routing.
Increased overhead due to
periodic beaconing.
Periodic beaconing induces
frequent packet loss and
longer data delay in highly
dynamic network.
Distance
based
beacon
updation.
Memory is reduced
as the node
information is
removed when it
moves away say k
times ―d‖
Because of infrequent
updates fast node’s are not
aware of the slow node’s.
Slow node’s may have
many outdated neighbors
Speed
based
location
updation
Overcomes the
disadvantage of
distance based
beaconing-reduces
the no of outdated
neighbors for slow
mobility node’s.
Suffers same as distance
based beaconing –fast node
may not detect the slow node
existences.
Reactive
beaconing
Reduces the
communication cost
as it limits the rate
of beaconing.
It results in data packet loss.
Time
based
beacon
updation.
Minimum
computational cost
Not suitable for delay
sensitive applications.
Incurs unnecessary
beaconing per T time
interval under low mobility
network.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303
IJTET©2015 86
5 PROBLEM STATEMENT
Position information of the node’s is the primary
requirement in Geographic routing. Forwarding node’s are selected
among neighbors based on their location. Each node should be aware
of its neighbor’s location at the time of data transfer condition.
Hence, each node should update its’ location information through a
message called beacon. The common beaconing scheme design for
location updation to get the accurate local topology in MANETTs
requires to meet various mobility model scenarios and also should
offer the optimized beacon overhead which is more challenging,
since each node has its own mobility model .the general approach for
distributing the beacon packets which carry the location information
us the proactive beaconing and it induces high overhead even when
the traffic is not so high.
Whereas the decrease in beaconing interval will cause an
increase in the routing overhead which will provide better results for
fast moving node’s but not for the slow node’s. It is not possible to
decide the common beaconing interval for all the node’s as each
node employs different mobility models. Existing mechanisms
invoke periodic beacon update scheme which consumes the network
resources such as energy and bandwidth specifically when the
network traffic is high, it creates packet loss in the network leads to
retransmission of data packet causing additional delay and energy
consumption. It is necessary to regulate the frequency of each node’s
beacon update process. Thus, in order to provide efficient location
updation information to the neighbors the scheme which adapts to
the mobility dynamics of node has been proposed.
6 PROPOSED SYSTEM
The beacon contains the location information about the
neighboring node is stored at each node and which is used to
represent the neighbour list for the node. Thus beacons play an
important role in maintaining the accurate local topology. Thus
adaptive position update is proposed [11]. As the name implies the
beacon packets carrying the location information about the node’s
are updated adaptively according to the motion of node’s in the
network. The adaptive position update suits well for the dynamically
varying network.
The APU is based on the mobility dynamics of the node
and the node’s which moves frequently will update their location
information to through beacons frequently and the node’s which are
one hop neighbors to the forwarding path will update its beacons
with no cost of mobility prediction .the APU makes use of two
simple rules, namely mobility prediction and on demand learning
rule.
6.1 Mobility Prediction Rule
Mobility prediction rule adapts the beacon generation rate
according to the mobility dynamics of the node. The transmitted
beacons by the node’s contain the current location and velocity with
which it is travelling. Node’s estimate their positions periodically by
employing a simple mobility prediction. Prediction is based on
linear kinematics. The following Fig.1 illustrates the Mobility
Prediction of node i given the position and its velocity along the x
and y axes at time Tl , its neighbors can estimate the current position
of i, by using the following equations:
X p
i
= X l
i
+ (Tc-Tl) * V x
i
(1)
Y p
i
= Y l
i
+ (Tc-Tl) * V y
i
Fig.1. An example of mobility prediction.
Table.2. Notations for Mobility Prediction
Variables Definitions
X l
i
, Y l
i
The coordinate of node ―i‖ at
time Tl (included in the previous
beacon )
V x
i
, V y
i
The velocity of node ―i‖ along
the direction of the x and y axes
at time Tl (included in the
previous beacon)
Tl The time of the last beacon
broadcast
Tc The current time
X p
i
, Y p
i
The predicted position of node ―
i ― at the current time
The next beacon broadcast is triggered only when the
difference between the predicted location and the location obtained
by the GPS servers are greater than the certain threshold called
acceptable error range (AER). The MP rule, thus, tries to maximize
the effective duration of each beacon, by broadcasting a beacon only
when the predicted position information based on the previous
beacon becomes inaccurate. This in turn extends the effective
duration of the beacon for node’s that moves slowly, and results in a
reduced number of beacons. Further, highly mobile node’s can
broadcast frequent beacons to ensure that their neighbors are aware
of the rapidly changing topology. Node i, then computes the
deviation as follows
Di
devi = √ ((Xi
a – Xi
p) 2
+ (Yi
a - Yi
p) 2
) (2)
(Xp, Yp)
Vx
Vy(Xl, Yl)
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303
IJTET©2015 87
6.2 On Demand Learning Rule
Mobility prediction rule solely may not be sufficient to maintain
the accurate local topology information about the node’s in the
networks. Consider the example illustrated in the Fig.2. Where the
node A initially updates its beacons when it is at P1 and the node B
does not receives the beacon. Now the node A starts moving to the
location P2 with the constant velocity and the AER is sufficiently
large and the MP rule is never triggered. Thus the node’s A and B are
not aware of each other. This is not a problem when the node’s do
not involve in the data transmission ,but when the node’s involve in
data transfer, then the there is a problem with the accurate local
topology.
Fig. 2. An example illustrating a drawback of the MP rule.
Fig.3.An example illustrating the ODL rule
Hence there arises the a need to develop the rule to maintain the
accurate local topology information. This is what the on demand
learning rule aims to achieve. According to the ODL rule whenever
the node overhears the data transmission from the new neighbor,
which is not in its neighbor list it will transfer the beacon packet to
the node’s without the cost mobility prediction. The one hop
neighbors of a node which transfers data will operate in the
promiscuous mode and can overhear the data transferred.Fig.3
illustrates the network topology and The solid lines indicates the data
transmission between node A and P through B i.e., A-B-P. when the
node B receives the data node’s C and D can overhear the data and
checks whether a destination is within the radio range and if it is a
new neighbor adds it to the neighbor list and the node’s C and D
transfers the beacons to the P. Thus there occurs the new path A-C-P
and A-D-P which is expressed as dotted lines in Fig.2. The node E
and F does not overhears as their not the one hop neighbors of node
B.
7 SIMULATION RESULTS
The simulations were run with 48 node’s randomly
distributed in an area of 3000m×1500m. We chose a rectangular
network area to obtain a longer path. The movement of node’s
follows the improved random waypoint mobility model. The routing
protocol used is DSR.
7.1 Packet Delivery Ratio:
PDR is the proportion to the total amount of packets
reached the receiver and amount of packet sent by source. The high
mobility of node’s causes PDR to decrease. The following figure 4
shows the results obtained for PDR under varying mobility. It is
obvious that the PDR ratio increases with time and outperform the
existing approaches.
Fig.4. Packet Delivery Ratio
7.2 Energy Consumption:
The Energy Consumption depends on the amount of energy
consumed by the sensors for the data transmission over the network.
The following figure 5 shows that the energy consumed by each
node is less compared to periodic approach routing.
B
D
P
C
A
FE
B
A
P1
P2
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303
IJTET©2015 88
8 CONCLUSION AND FUTURE WORK
The designing of a routing protocol for mobile adhoc
network is a very challenging task, due to the dynamic topology and
its error prone shared radio channel .initially we discussed about the
challenges in MANETs which causes the designing a routing
protocol and its updation schemes typical .These factors have to be
considered while designing updation scheme for the Geographic
routing to yield the better performance .we then discussed about the
existing updation schemes and their drawbacks. As a solution to
these drawbacks adaptive position update has been proposed and its
features are explained in detail. Performance of the APU routing
scheme is evaluated using extensive NS-2 simulations for varying
node speeds and traffic load. Results indicate that the APU
routing scheme generates a less amount of beacon overhead as
other beaconing schemes, but achieve better packet delivery
ratios, less overhead and energy consumption. This detailed study
will enable us to develop a new hybrid updation scheme for
Geographic routing by combining the valuable and various features
from the available schemes that would help us to attain a very good
performance in a highly mobile network.
ACKNOWLEDGMENT
I would like to thank the authors, mentioned in the
references which are cited below for their valuable research works
which helped me to gain knowledge. And also I thank my guide for
his precious guidance.
REFERENCES
[1] M. Frodigh, P. Johansson, P. Larsson,―Wireless ad hoc
networking-The art of networking without a network‖, Ericsson
Review, Vol. No.4, pp. 248-263, 2000.
[2] Ivan Stojmenovic and University of Ottawa,―Position-Based
Routing in Ad Hoc Networks‖, IEEE Communications
Magazine,pp. 2-8, 2002.
[3] Ivan Stagmenovic, ―Home Agent Based Location Update and
Destination Search Schemes in Ad Hoc Networks‖, 1999.
[4] S. Lee, B. Bhattacharjee, and S. Banerjee, ―Efficient
Geographic routing in multihop wireless networks,‖ Proc. 6th
ACM international symposium on Mobile ad hoc networking
and computing - MobiHoc ’05, pp.230-241, 2005.
[5] M. Heissenbuttel, T. Braun, T. Bernoulli et al. ―BLR: Beacon-
Less Routing Algorithm for Mobile Ad-Hoc Networks‖, in
Computer Communications, vol,27, pp. 1076-1086, July 2004.
[6] J. Ho and I. F. Akyildiz, ―Mobile user location update and
paging under delay constraints,‖ ACM/Baltzer J. Wireless
Networks, Vol. 1, No. 4, pp. 413–425, 1995.
[7] Q. Chen, S. Kanhere, M. Hassan, and K.Lan, ―Adaptive
Position Update in Geographic Routing‖, IEEE International
Conference on Communications, pp. 4046–4051, 2006.
[8] G. Y. Lee and Y. Lee, ―Numerical analysis of optimum timer
value for timebased location registration scheme,‖ IEEE
Commun. Lett., Vol. 6, No. 10, pp. 431–433,2002.
[9] C. Rose, ―Minimizing the average cost of paging and
registration: A timer based method,‖ Wirel Netw, Vol. 2, No. 2,
pp. 109–116, 1996.
[10] X. Shi and K. Liu, ―A contention-based beaconless Geographic
routing protocol for mobile ad hoc networks‖, Third
International Conference on Communications and Networking,
pp. 840 – 843, 2008.
[11] Quanjun Chen, Salil S. Kanhere, and Mahbub ―Adaptive
Position Update for GeographicRouting in Mobile Ad Hoc
Networks‖, IEEE transactions on mobile computing, vol. 12, no.
3, march 2013.
[12] Goo Yeon Lee, Yong Lee, and Zygmunt J.Haas, ―Hybrid
Location-Update Scheme for Mobile Networks‖, IEEE
Transactions On Vehicular Technology, Vol. 58, No. 1, pp.338-
348, 2009.
[13] S. H. Shah and K. Nahrstedt, ―Predictive location-based QoS
routing in mobile ad hoc networks,‖ IEEE International
Conference on Communications, Vol.2, pp. 1022-1027, 2002.
[14] C. Chou, K. Ssu, and H. Jiau, ―Dynamic route maintenance for
Geographic forwarding in mobile ad hoc networks,‖ Computer
Networks, Vol. 52, No. 2, pp. 418–431, 2008.
[15] D. Son, A. Helmy, and B.Krishnamachari, ―The Effect of
Mobility-Induced Location Errors on Geographic Routing in
Mobile Ad Hoc and Sensor Networks: Analysis and
Improvement Using Mobility Prediction,‖ IEEE Trans. Mobile
Computing, Vol. 3, No. 3, pp. 233–245, 2004.

Más contenido relacionado

La actualidad más candente

IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET Journal
 
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANETIntegrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
ijsrd.com
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET Journal
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
ijwmn
 

La actualidad más candente (18)

Bf33335340
Bf33335340Bf33335340
Bf33335340
 
IRJET- Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
IRJET-  	  Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANETIRJET-  	  Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
IRJET- Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing Protocol
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
 
Position based Opportunistic routing in MANET
Position based Opportunistic routing in MANETPosition based Opportunistic routing in MANET
Position based Opportunistic routing in MANET
 
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of ManetsIRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANETIntegrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
 
Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network
Packet Transfer Rate & Robust Throughput for Mobile Adhoc NetworkPacket Transfer Rate & Robust Throughput for Mobile Adhoc Network
Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
Mane ts
Mane tsMane ts
Mane ts
 
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
 
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkLink Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
Route Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node ClusteringRoute Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node Clustering
 

Destacado

A Classification of Cancer Diagnostics based on Microarray Gene Expression Pr...
A Classification of Cancer Diagnostics based on Microarray Gene Expression Pr...A Classification of Cancer Diagnostics based on Microarray Gene Expression Pr...
A Classification of Cancer Diagnostics based on Microarray Gene Expression Pr...
IJTET Journal
 
Scene Text Detection of Curved Text Using Gradiant Vector Flow Method
Scene Text Detection of Curved Text Using Gradiant Vector Flow MethodScene Text Detection of Curved Text Using Gradiant Vector Flow Method
Scene Text Detection of Curved Text Using Gradiant Vector Flow Method
IJTET Journal
 
Medical Algorithm for Hepatitis-B Identification Using Photo therapy
Medical Algorithm for Hepatitis-B Identification Using Photo therapyMedical Algorithm for Hepatitis-B Identification Using Photo therapy
Medical Algorithm for Hepatitis-B Identification Using Photo therapy
IJTET Journal
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 
Enhancing the Privacy Protection of the User Personalized Web Search Using RDF
Enhancing the Privacy Protection of the User Personalized Web Search Using RDFEnhancing the Privacy Protection of the User Personalized Web Search Using RDF
Enhancing the Privacy Protection of the User Personalized Web Search Using RDF
IJTET Journal
 

Destacado (18)

Successful interference cancellation with Blind Equalization method for MC-CD...
Successful interference cancellation with Blind Equalization method for MC-CD...Successful interference cancellation with Blind Equalization method for MC-CD...
Successful interference cancellation with Blind Equalization method for MC-CD...
 
Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...
Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...
Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...
 
Analysis of leakage current calculation for nanoscale MOSFET and FinFET
Analysis of leakage current calculation for nanoscale MOSFET and FinFETAnalysis of leakage current calculation for nanoscale MOSFET and FinFET
Analysis of leakage current calculation for nanoscale MOSFET and FinFET
 
Weibull Distribution Based Channel Prototype For Decrease of Rain Attenuation...
Weibull Distribution Based Channel Prototype For Decrease of Rain Attenuation...Weibull Distribution Based Channel Prototype For Decrease of Rain Attenuation...
Weibull Distribution Based Channel Prototype For Decrease of Rain Attenuation...
 
A Classification of Cancer Diagnostics based on Microarray Gene Expression Pr...
A Classification of Cancer Diagnostics based on Microarray Gene Expression Pr...A Classification of Cancer Diagnostics based on Microarray Gene Expression Pr...
A Classification of Cancer Diagnostics based on Microarray Gene Expression Pr...
 
Scene Text Detection of Curved Text Using Gradiant Vector Flow Method
Scene Text Detection of Curved Text Using Gradiant Vector Flow MethodScene Text Detection of Curved Text Using Gradiant Vector Flow Method
Scene Text Detection of Curved Text Using Gradiant Vector Flow Method
 
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEMitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
 
Free-Space Optical Networking Using the Spectrum of Visible Light
Free-Space Optical Networking Using the Spectrum of Visible LightFree-Space Optical Networking Using the Spectrum of Visible Light
Free-Space Optical Networking Using the Spectrum of Visible Light
 
Medical Algorithm for Hepatitis-B Identification Using Photo therapy
Medical Algorithm for Hepatitis-B Identification Using Photo therapyMedical Algorithm for Hepatitis-B Identification Using Photo therapy
Medical Algorithm for Hepatitis-B Identification Using Photo therapy
 
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
 
Product Feature Ranking Based On Product Reviews by Users
Product Feature Ranking Based On Product Reviews by UsersProduct Feature Ranking Based On Product Reviews by Users
Product Feature Ranking Based On Product Reviews by Users
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
A Security and Privacy Measure for Encrypted Cloud Database
A Security and Privacy Measure for Encrypted Cloud DatabaseA Security and Privacy Measure for Encrypted Cloud Database
A Security and Privacy Measure for Encrypted Cloud Database
 
Authentication Using Hand Vein Pattern
Authentication Using Hand Vein PatternAuthentication Using Hand Vein Pattern
Authentication Using Hand Vein Pattern
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 
Enhancing the Privacy Protection of the User Personalized Web Search Using RDF
Enhancing the Privacy Protection of the User Personalized Web Search Using RDFEnhancing the Privacy Protection of the User Personalized Web Search Using RDF
Enhancing the Privacy Protection of the User Personalized Web Search Using RDF
 
Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...
Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...
Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...
 

Similar a ICICCE011

A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
ijasuc
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
ijasuc
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
ijasuc
 
Ijeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksIjeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networks
Kumar Goud
 

Similar a ICICCE011 (20)

E1073644
E1073644E1073644
E1073644
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
 
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
 
A0110104
A0110104A0110104
A0110104
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
Ijeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksIjeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networks
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...
 
Secured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolSecured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing Protocol
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 

Más de IJTET Journal

Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
IJTET Journal
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
IJTET Journal
 

Más de IJTET Journal (20)

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
 
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionEnhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
 

Último

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 

Último (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

ICICCE011

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303 IJTET©2015 83 Adaptive Position Based Location Updation for Geographic Routing In MANETs B.Neeththi aadithiya1 1 M.Kumarasamy College of engineering, ECE, neethiece@email.com P.T.Sivagurunathan2 2 M.Kumarasamy College of engineering, ECE, Sivagurunathanpt.ece@mkce.ac.in Abstract—Geographic routing also called as Geo routing is a routing principle which relies on the Geographic position information. Geographic routing is the most commonly used routing for MANETs. In Geographic routing each node should be aware of its neighbor’s location to maintain the local topology accuracy. Hence, each node should update its location information through a message called beacon. Existing mechanisms invoke periodic beacon update scheme which consumes the network resources such as energy and bandwidth specifically when the network traffic is high, it creates packet loss in the network and it leads to retransmission of data packet causing additional delay and energy consumption. In this work, adaptive position update is proposed which dynamically adjusts the beacon updation frequency according to the varying network conditions.APU makes use of mobility prediction rule and on demand learning rule for beacon updation. Index Terms— Geographic routing, beacon update, node mobility, Location information, and local topology. ——————————  —————————— 1 INTRODUCTION DHOC networks consist of mobile or stationary node’s that communicate over wireless links. There is neither fixed infrastructure to support the communication nor any centralized administration or standard support services. Node’s can self-organize dynamically in an arbitrary and temporary manner, allowing people and devices to seamlessly communicate in areas with no pre-existing communication infrastructure; therefore, the node’s themselves act as routers as well [1]. In addition, due to the limited transmission range of wireless node’s, intermediate node’s may be required to collaborate in forwarding a packet from source to destination. Therefore, node’s beyond the direct wireless transmission range of each other will be able to communicate via multihop routing. In fact, dynamic topology changes are one of the characteristics of mobile ad hoc networks where node’s move frequently. Therefore, we cannot rely on conventional routing protocols designed for wired networks for the purpose of routing in MANETs. That is why a variety of new routing protocols for mobile ad hoc networks are researched and designed. There are different scenarios and environments where MANETs is employed; some of them include: military battlefields, disaster recovery and emergency rescue operations, Vehicular Ad Hoc Networks (VANETs) and Aeronautical Networks. One way of communication in such networks might seem to simply flood the entire network. However, the fact that power and bandwidth are scarce resources in such networks of low powered wireless devices necessitates more efficient routing protocols. Therefore, there are a number of routing protocols proposed for MANETs, which can be categorized into two different approaches: topology-based and position-based routing. Topology- based routing protocols use information about the links. That is, information about the paths is maintained and routes are established based on the information of the links that exist in the network. These protocols can be further divided into proactive, reactive and hybrid approaches. Proactive protocols are more similar to the classical routing strategies such as distance-vector routing. Proactive protocols constantly discover routes and maintain them in routing tables. Hello packets are exchanged periodically by which node’s get informed of changes in the topology. This results in low route discovery latencies at the cost of imposing high overhead due to occupying the bandwidth for route maintenance. On the other hand, reactive protocols discover and maintain routes only if needed, which results in initial delays until the routes are set up. However, the advantage of this type of routing is low overhead in terms of processing and memory along with minimum power consumption and lower bandwidth requirements. In case of topology changes, which result in link failures, route error messages are generated. Although this will be only done for the routes in use, the problem of imposing traffic at times of topology changes is not solved completely. Ad-Hoc On-Demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) are examples of reactive protocols. To provide more efficiency and scalability, a third group of protocols was introduced as hybrid routing protocols, which is a combination of both reactive and proactive approaches. However, the above mentioned limitations are still in place. An example of a hybrid routing protocol is Zone Routing Protocol (ZRP). Position-based or Geographic routing approaches were introduced to eliminate some of the limitations of the topology-based protocols in MANETs. These routing protocols [2] rely on having one piece of information and that is the node’s’ physical location information. Thus, it is necessary for node’s to obtain their coordinates either by using a location service such as GPS or other types of positioning services .By employing position information, Geographic routing protocols do not need to establish and maintain routes, thereby eliminating routing table construction and maintenance. Thus there arises a necessity that each node has to updates their current position using beacon packets. The location updation becomes more challenging, as the local topology in A
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303 IJTET©2015 84 MANET changes dynamically. With the use of location information for routing the need for routing table construction and maintenance are eliminated. The forwarding of packet to destination is based on location information and one hop neighbor. If there is no one hop neighbor closer to the destination then forwarding strategy fails. Recovery strategies are introduced to deal with such failures. The positioning devices such as Global Positioning System (GPS) and Grid Location Systems (GLS) are used in the Geographical routing protocols to find the exact location of node’s. GLS serve node’s with location information by splitting entire network into small squares known as grids. A common beaconing approach is proactive beaconing to maintain the location information and local topology. The entire node’s in the network update the location information to all other node’s using beacon packets. Thus the proactive mechanisms results in higher overhead in highly dynamic networks. If the node’s in the network move frequently then their updates must be transferred to the neighbors. On the other hand slow node’s need not update their location frequently. Thus there is an increased necessity for different location updation schemes. This survey provides an overview about the available location updation schemes for position based routing. 2 CHALLENGES IN MANETS 2.1 Limited bandwidth: Wireless link continue to have significantly lower capacity than infrastructured networks. In addition, the realized throughput of wireless communication after accounting for the effect of multiple access, fading, noise, and interference conditions, etc., is often much less than a radio’s maximum transmission rate. 2.2 Dynamic topology: Dynamic topology membership may disturb the trust relationship among node’s. The trust may also be disturbed if some node’s are detected as compromised. 2.3 Routing Overhead: In wireless adhoc networks, node’s often change their location within network. So, some stale routes are generated in the routing table which leads to unnecessary routing overhead. 2.4 Hidden terminal problem: The hidden terminal problem refers to the collision of packets at a receiving node due to the simultaneous transmission of those node’s that are not within the direct transmission range of the sender, but are within the transmission range of the receiver. 2.5 Packet losses due to transmission errors: Ad hoc wireless networks experience a much higher packet loss due to factors such as increased collisions due to the presence of hidden terminals, presence of interference, uni-directional links, and frequent path breaks due to mobility of node’s. 2.6 Mobility-induced route changes: The network topology in an ad hoc wireless network is highly dynamic due to the movement of node’s; hence an on-going session suffers frequent path breaks. This situation often leads to frequent route changes. 2.7 Battery constraints: Devices used in these networks have restrictions on the power source in order to maintain portability, size and weight of the device. 2.8 Security threats: The wireless mobile ad hoc nature of MANETs brings new security challenges to the network design. As the wireless medium is vulnerable to eavesdropping and ad hoc network functionality is established through node cooperation, mobile ad hoc networks are intrinsically exposed to numerous security attacks. 3 LITERATURE SURVEY 3.1 Quorum Based Systems: In quorum systems, information updates are sent to a group (quorum) of available node’s and information queries to another quorum. Node’s at the intersection of quorum contain the updated information. The updation is done only when there is a link break. It suffers due to the complex structure with high overhead and difficulty in quorum construction. 3.2 Home Agent Based System: In the home agent based location scheme, circular area is selected as a home agent for each node and informs other node’s about it. The node when moves the location updation is done. The updation messages are transferred only to the node’s in the home agent [3].The update may fail if home agent is disconnected from the current node location. Such failure may be reported back to the node, which will then choose a new home. 3.3 Periodic Beaconing In the periodic beacon based location updation schemes the beacon information about the node’s is transferred periodically [4]. The beacons in turn contain the location information of the particular node at the particular instance of time and the last seen position and also about the mobility nature with which it is moving. The beacon update about a node, thus conveys the entire location information about the node and thus routing of data is made easier with the gained beacon update. Periodic beaconing is the earliest and, most commonly used beacon updation scheme and it is employed in the GPSR Geographical routing for MANETs. The main advantage is the accurate local topology information and which in turn increases the overhead. 3.4 Beaconless routing Beaconless routing was introduced to reduce the drawbacks of periodic beaconing. The periodic beaconing consumes more bandwidth. As bandwidth is a scarce resource it has to be utilized effectively. Thus, in the proposed [5] beaconless routing some assumptions are made that each node is aware of its own position with the help of the location servers. The basic principle behind the scheme is that if a node wants to transfer a packet to destination, first it finds the position of the destination and it stores the information about the route and Geographical coordinates in its packet header. When a node on the route to destination receives a packet it
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303 IJTET©2015 85 has to replace the previous node position with its current position. This scheme does not suit well for the highly dynamic network conditions and it does not provide the accurate local topology information. This reduces the use of scarce resources and also reduces the interference with the regular data transmission. 3.5 Distance based beaconing In the highly mobile and dynamic adhoc network environment the periodic beaconing will result in the excessive overhead [6]. Thus the alternative distance based beaconing was proposed. Initially ,all the node’s will update its location and after some time when the node moves away from the radio range of its one hop neighbors it has to update. The basic principle behind the scheme is that if a node wants to transfer a packet to destination, first it finds the position of the destination and it stores the information about the route and Geographical coordinates in its packet header. When a node on the route to destination receives a packet it has to replace the previous node position with its current position. This reduces the use of scarce resources and also reduces the interference with the regular data transmission. 3.6 Speed based beaconing Distance based beaconing applied in the Geographical routing results in high overhead when the network is highly dynamic. Thus the speed based beaconing was proposed [7].The updation about the location information of a node is dependent on the speed with which it travels. A node determines its beacon interval from a predefined range with a value chosen was inversely proportional to its speed. The timeout is calculated to avoid outdated updation information. The timeout interval for a neighbor is k times its beacon interval. Every time when a beacon packet arrives, it checks for the timeout. Thus, it avoids outdated routing. It also suffers from the same disadvantage as distance based beaconing i.e., fast node’s are not aware of the slow node’s existence. 3.7 Time based beaconing In time based beaconing, every node updates its neighbor’s information per T time unit. The unit time is the network parameter and it is easy to determine under the dynamic network topology. According to the on demand data transmission the beacon interval time T is determined [8], [9]. There is need for a node that maintains the local clocks to commence the beaconing. The main benefit of this scheme is the minimum computational cost. The main disadvantage in the time based beaconing is that it incurs unnecessary beaconing per T time interval under low mobility network. This kind of beaconing does not consider the data communication delay, so; it is not suitable for delay sensitive applications. In addition, it is easy to implement under various MANET environments, but it results in unnecessary signaling traffic degrades the routing performance. 3.8 Reactive beaconing Reactive beaconing location updation is a on demand beaconing scheme. In this scheme the beacon packets which convey the location information is transferred only on request. The request packets (REQ) are transmitted by a node if it needs to forward a packet. Data packet forwarding is accomplished with the request packet and beacon packet exchange. This results in a certain amount of delay for each transmission [10]. The major advantage of this scheme is the accurate local topology. 4 COMPARATIVE STUDY Table.1. Comparison table of updation schemes Location Updation Schemes Advantages Limitations Periodic updation Accurate local topology information and Loop free routing. Increased overhead due to periodic beaconing. Periodic beaconing induces frequent packet loss and longer data delay in highly dynamic network. Distance based beacon updation. Memory is reduced as the node information is removed when it moves away say k times ―d‖ Because of infrequent updates fast node’s are not aware of the slow node’s. Slow node’s may have many outdated neighbors Speed based location updation Overcomes the disadvantage of distance based beaconing-reduces the no of outdated neighbors for slow mobility node’s. Suffers same as distance based beaconing –fast node may not detect the slow node existences. Reactive beaconing Reduces the communication cost as it limits the rate of beaconing. It results in data packet loss. Time based beacon updation. Minimum computational cost Not suitable for delay sensitive applications. Incurs unnecessary beaconing per T time interval under low mobility network.
  • 4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303 IJTET©2015 86 5 PROBLEM STATEMENT Position information of the node’s is the primary requirement in Geographic routing. Forwarding node’s are selected among neighbors based on their location. Each node should be aware of its neighbor’s location at the time of data transfer condition. Hence, each node should update its’ location information through a message called beacon. The common beaconing scheme design for location updation to get the accurate local topology in MANETTs requires to meet various mobility model scenarios and also should offer the optimized beacon overhead which is more challenging, since each node has its own mobility model .the general approach for distributing the beacon packets which carry the location information us the proactive beaconing and it induces high overhead even when the traffic is not so high. Whereas the decrease in beaconing interval will cause an increase in the routing overhead which will provide better results for fast moving node’s but not for the slow node’s. It is not possible to decide the common beaconing interval for all the node’s as each node employs different mobility models. Existing mechanisms invoke periodic beacon update scheme which consumes the network resources such as energy and bandwidth specifically when the network traffic is high, it creates packet loss in the network leads to retransmission of data packet causing additional delay and energy consumption. It is necessary to regulate the frequency of each node’s beacon update process. Thus, in order to provide efficient location updation information to the neighbors the scheme which adapts to the mobility dynamics of node has been proposed. 6 PROPOSED SYSTEM The beacon contains the location information about the neighboring node is stored at each node and which is used to represent the neighbour list for the node. Thus beacons play an important role in maintaining the accurate local topology. Thus adaptive position update is proposed [11]. As the name implies the beacon packets carrying the location information about the node’s are updated adaptively according to the motion of node’s in the network. The adaptive position update suits well for the dynamically varying network. The APU is based on the mobility dynamics of the node and the node’s which moves frequently will update their location information to through beacons frequently and the node’s which are one hop neighbors to the forwarding path will update its beacons with no cost of mobility prediction .the APU makes use of two simple rules, namely mobility prediction and on demand learning rule. 6.1 Mobility Prediction Rule Mobility prediction rule adapts the beacon generation rate according to the mobility dynamics of the node. The transmitted beacons by the node’s contain the current location and velocity with which it is travelling. Node’s estimate their positions periodically by employing a simple mobility prediction. Prediction is based on linear kinematics. The following Fig.1 illustrates the Mobility Prediction of node i given the position and its velocity along the x and y axes at time Tl , its neighbors can estimate the current position of i, by using the following equations: X p i = X l i + (Tc-Tl) * V x i (1) Y p i = Y l i + (Tc-Tl) * V y i Fig.1. An example of mobility prediction. Table.2. Notations for Mobility Prediction Variables Definitions X l i , Y l i The coordinate of node ―i‖ at time Tl (included in the previous beacon ) V x i , V y i The velocity of node ―i‖ along the direction of the x and y axes at time Tl (included in the previous beacon) Tl The time of the last beacon broadcast Tc The current time X p i , Y p i The predicted position of node ― i ― at the current time The next beacon broadcast is triggered only when the difference between the predicted location and the location obtained by the GPS servers are greater than the certain threshold called acceptable error range (AER). The MP rule, thus, tries to maximize the effective duration of each beacon, by broadcasting a beacon only when the predicted position information based on the previous beacon becomes inaccurate. This in turn extends the effective duration of the beacon for node’s that moves slowly, and results in a reduced number of beacons. Further, highly mobile node’s can broadcast frequent beacons to ensure that their neighbors are aware of the rapidly changing topology. Node i, then computes the deviation as follows Di devi = √ ((Xi a – Xi p) 2 + (Yi a - Yi p) 2 ) (2) (Xp, Yp) Vx Vy(Xl, Yl)
  • 5. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303 IJTET©2015 87 6.2 On Demand Learning Rule Mobility prediction rule solely may not be sufficient to maintain the accurate local topology information about the node’s in the networks. Consider the example illustrated in the Fig.2. Where the node A initially updates its beacons when it is at P1 and the node B does not receives the beacon. Now the node A starts moving to the location P2 with the constant velocity and the AER is sufficiently large and the MP rule is never triggered. Thus the node’s A and B are not aware of each other. This is not a problem when the node’s do not involve in the data transmission ,but when the node’s involve in data transfer, then the there is a problem with the accurate local topology. Fig. 2. An example illustrating a drawback of the MP rule. Fig.3.An example illustrating the ODL rule Hence there arises the a need to develop the rule to maintain the accurate local topology information. This is what the on demand learning rule aims to achieve. According to the ODL rule whenever the node overhears the data transmission from the new neighbor, which is not in its neighbor list it will transfer the beacon packet to the node’s without the cost mobility prediction. The one hop neighbors of a node which transfers data will operate in the promiscuous mode and can overhear the data transferred.Fig.3 illustrates the network topology and The solid lines indicates the data transmission between node A and P through B i.e., A-B-P. when the node B receives the data node’s C and D can overhear the data and checks whether a destination is within the radio range and if it is a new neighbor adds it to the neighbor list and the node’s C and D transfers the beacons to the P. Thus there occurs the new path A-C-P and A-D-P which is expressed as dotted lines in Fig.2. The node E and F does not overhears as their not the one hop neighbors of node B. 7 SIMULATION RESULTS The simulations were run with 48 node’s randomly distributed in an area of 3000m×1500m. We chose a rectangular network area to obtain a longer path. The movement of node’s follows the improved random waypoint mobility model. The routing protocol used is DSR. 7.1 Packet Delivery Ratio: PDR is the proportion to the total amount of packets reached the receiver and amount of packet sent by source. The high mobility of node’s causes PDR to decrease. The following figure 4 shows the results obtained for PDR under varying mobility. It is obvious that the PDR ratio increases with time and outperform the existing approaches. Fig.4. Packet Delivery Ratio 7.2 Energy Consumption: The Energy Consumption depends on the amount of energy consumed by the sensors for the data transmission over the network. The following figure 5 shows that the energy consumed by each node is less compared to periodic approach routing. B D P C A FE B A P1 P2
  • 6. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 2 – FEBRUARY 2015 – ISSN: 2349 – 9303 IJTET©2015 88 8 CONCLUSION AND FUTURE WORK The designing of a routing protocol for mobile adhoc network is a very challenging task, due to the dynamic topology and its error prone shared radio channel .initially we discussed about the challenges in MANETs which causes the designing a routing protocol and its updation schemes typical .These factors have to be considered while designing updation scheme for the Geographic routing to yield the better performance .we then discussed about the existing updation schemes and their drawbacks. As a solution to these drawbacks adaptive position update has been proposed and its features are explained in detail. Performance of the APU routing scheme is evaluated using extensive NS-2 simulations for varying node speeds and traffic load. Results indicate that the APU routing scheme generates a less amount of beacon overhead as other beaconing schemes, but achieve better packet delivery ratios, less overhead and energy consumption. This detailed study will enable us to develop a new hybrid updation scheme for Geographic routing by combining the valuable and various features from the available schemes that would help us to attain a very good performance in a highly mobile network. ACKNOWLEDGMENT I would like to thank the authors, mentioned in the references which are cited below for their valuable research works which helped me to gain knowledge. And also I thank my guide for his precious guidance. REFERENCES [1] M. Frodigh, P. Johansson, P. Larsson,―Wireless ad hoc networking-The art of networking without a network‖, Ericsson Review, Vol. No.4, pp. 248-263, 2000. [2] Ivan Stojmenovic and University of Ottawa,―Position-Based Routing in Ad Hoc Networks‖, IEEE Communications Magazine,pp. 2-8, 2002. [3] Ivan Stagmenovic, ―Home Agent Based Location Update and Destination Search Schemes in Ad Hoc Networks‖, 1999. [4] S. Lee, B. Bhattacharjee, and S. Banerjee, ―Efficient Geographic routing in multihop wireless networks,‖ Proc. 6th ACM international symposium on Mobile ad hoc networking and computing - MobiHoc ’05, pp.230-241, 2005. [5] M. Heissenbuttel, T. Braun, T. Bernoulli et al. ―BLR: Beacon- Less Routing Algorithm for Mobile Ad-Hoc Networks‖, in Computer Communications, vol,27, pp. 1076-1086, July 2004. [6] J. Ho and I. F. Akyildiz, ―Mobile user location update and paging under delay constraints,‖ ACM/Baltzer J. Wireless Networks, Vol. 1, No. 4, pp. 413–425, 1995. [7] Q. Chen, S. Kanhere, M. Hassan, and K.Lan, ―Adaptive Position Update in Geographic Routing‖, IEEE International Conference on Communications, pp. 4046–4051, 2006. [8] G. Y. Lee and Y. Lee, ―Numerical analysis of optimum timer value for timebased location registration scheme,‖ IEEE Commun. Lett., Vol. 6, No. 10, pp. 431–433,2002. [9] C. Rose, ―Minimizing the average cost of paging and registration: A timer based method,‖ Wirel Netw, Vol. 2, No. 2, pp. 109–116, 1996. [10] X. Shi and K. Liu, ―A contention-based beaconless Geographic routing protocol for mobile ad hoc networks‖, Third International Conference on Communications and Networking, pp. 840 – 843, 2008. [11] Quanjun Chen, Salil S. Kanhere, and Mahbub ―Adaptive Position Update for GeographicRouting in Mobile Ad Hoc Networks‖, IEEE transactions on mobile computing, vol. 12, no. 3, march 2013. [12] Goo Yeon Lee, Yong Lee, and Zygmunt J.Haas, ―Hybrid Location-Update Scheme for Mobile Networks‖, IEEE Transactions On Vehicular Technology, Vol. 58, No. 1, pp.338- 348, 2009. [13] S. H. Shah and K. Nahrstedt, ―Predictive location-based QoS routing in mobile ad hoc networks,‖ IEEE International Conference on Communications, Vol.2, pp. 1022-1027, 2002. [14] C. Chou, K. Ssu, and H. Jiau, ―Dynamic route maintenance for Geographic forwarding in mobile ad hoc networks,‖ Computer Networks, Vol. 52, No. 2, pp. 418–431, 2008. [15] D. Son, A. Helmy, and B.Krishnamachari, ―The Effect of Mobility-Induced Location Errors on Geographic Routing in Mobile Ad Hoc and Sensor Networks: Analysis and Improvement Using Mobility Prediction,‖ IEEE Trans. Mobile Computing, Vol. 3, No. 3, pp. 233–245, 2004.