SlideShare a Scribd company logo
Indonesian Journal of Electrical Engineering and Computer Science
Vol. 8, No. 3, December 2017, pp. 674 ~ 678
DOI: 10.11591/ijeecs.v8.i3.pp674-678  674
Received August 12, 2017; Revised October 29, 2017; Accepted November 18, 2017
Simulation Analysis for Consistent Path Identification
to Refine the Network Lifetime
G Vennila
Department Of Information Technology, AMET University, Chennai
Abstract
As the demand for Mobile Ad hoc Network (MANET) applications grows, so does their use of
many essential services where node consistent and stability of the communication paths are of great
importance. In this scheme, we propose Simulation Analysis for Consistent Path Identification to Refine the
Network Lifetime (CPIR). This technique offers more stable path and transmits the data through the
consistent nodes. This article is focused on protecting the route from the inconsistent node in mobile
communications to improve the network performance and reduce the energy consumption in the network.
The simulation results demonstrate that CPIR provided reduce the energy utilization and improved both
the longer lifetimes and increased number of packets delivered.
Keywords: Consistent Path, Energy, Lifetime, MANETs
Copyright © 2017Institute of Advanced Engineering and Science. All rights reserved.
1. Introduction
A MANET is a self-organized network with arbitrarily distributed nodes. MANET
applications are not limited to areas such as emergency and crisis management, local-level,
commercial and military battlefield applications [1]. Network users intended for Consistent
delivery of information. But a topological change in MANET leads to Path failure which degrades
the network performance. Routing in MANET has been a challenging task because of the high
degree of node mobility [2]. Using alternative path may resolve this problem. Multiple paths
between source and destination are determined by route discovery [3]. Routing protocol selects
an alternative path based on some metrics such as hop count, a speed of path, time to deliver
content, path reliability, and its bandwidth [4]. Routing protocols in conventional wired networks
use either distance vector or link state routing algorithms, both of which require periodic routing
advertisements to be broadcast by each router [5]. The Traditional shortest path algorithms
work correctly only when all nodes maintain routes to all destinations. However, in on-demand
routing protocols, a node need not maintain routes to all destinations [6].
In MANET single path routing may fail in most of the cases due to frequent node
mobility [7]. Consequently, Multipath routing scheme has been employed. Multiple paths
between the source node and the destination nodes could be found using Multipath routing
protocol and the Secure and Efficient Distance Effect Routing Algorithm for Mobility
(SE_DREAM) in MANETs [8]. These multiple paths make the transmission more consistent and
more efficient. In prevention of Co-operative Black Hole attack in Manet on DSR protocol using
Cryptographic Algorithm is presented in this research paper [9]. To transmit data only best path
is selected among the available paths based on some metric such as delay, bandwidth
availability, delivery ratio, route stability, etc. and the performance analysis of black hole attacks
in geographical routing MANET [10].
2. Related Works
Consistency Evaluation of Mobile Ad Hoc Network [1] considers different mobility
models along with the effect of different scenario metrics and different values of tuning
parameter. The mobility considerations have no significant impaction reliability as the same
results are obtained by just implicitly simulating the node locations. Considering no mobility
models reduces computational burden, some random variables involved making the algorithm
more efficient also reduced the number of random variables. However, this approach considers
IJEECS ISSN: 2502-4752 
Simulation Analysis for Consistent Path Identification to Refine … (G Vennila)
675
only uniform distribution.Bayesian model [2] is used to predict and classify the mobility of a node
in MANETs. The outcome of Bayesian Classifier will help a node control its broadcast process
by which a high mobility node or region is avoided to re-broadcast a request. Established routes
using the proposed model are more stable than routes determined by existing routing strategies.
This model is a distributed algorithm and independent of the mobility pattern. This model
improves the routing performance and reduces flooding problem in MANETs.
Energy Efficiency Optimization scheme [3] using the mixed integer nonlinear
programming (MINLP) formulation by jointly considering routing, traffic scheduling, and power
control. The branch and bound (BB) algorithm to efficiently solve this globally optimal problem.
The BBalgorithm include upper and lower bounding schemes and branching rule that are
designed using the characteristics of the non-convex MINLP problem. This scheme provides
valuable insights into not only the impact of routing strategy, transmission schedule, and power
control. Energy-aware architecture multi-rate protocol [4] investigated the possibility of reducing
energy consumption in 802.11 wireless networks.This scheme increases the network
performance and decreases both the power consumption and control overhead.
Mobility, Energy and Congestion Aware Routing (MECA) [5] to improve routing
performance for MANETs. In this model, a node monitors the mobility, energy consumption and
traffic congestion based on a multi-metric named AEC (constructed by Average Encounter Rate,
Energy Consumption Rate, and Congestion Factor) to choose the most stable, power-rich and
congestion-free path for routing. As a result, packet delivery ratio of the proposed model
improves almost 20% compared to that of original AODV protocol while the number of dead
nodes and routing overheads decreases significantly.
The consistent routing scheme proposed complete routing using offline prediction
algorithms is done. An augmented graph is created AGW (VA, EA) by adding landmarks into
every road segment. The Landmark ID can uniquely identify a vertex on graph AGW, and the
link is determined. The possibility of link duration is determined, and the duration prediction
table can be computed offline once a waypoint graph is given. The waypoint graph and the
analogous duration prediction table can be stored in every mobile node and used repeatedly.
However, more are required for the prediction accuracy, and this leads to increase the time of
computational complexity [6]. CHAMP uses cooperative packet caching and shortest multipath
routing to reduce packet loss due to frequent route failures. The nodes rely on data packet
acknowledgment to determine the link status and whenever the link declared "down" it indicates
the absence of acknowledgment and the packets cannot be routed successfully to the
destination. The alternative path is selected and forwards all affected packets through this
alternative route. If there is no alternative route present, then RERR message is generated and
sent to the base station with header information of all data packets. Every node in CHAMP
maintains a First-In First-Out (FIFO) data cache for storing forwarded packets for future use (6).
Neighbor Coverage Based Probabilistic Rebroadcast (NCPR) was proposed. This protocol
completely relies on preset variables, which are required to be set by the system administrator
based on the ad-hoc scenario. The routing overhead crisis caused by RREQ redundant packets
could be overcome by applying the NCPR protocol. Based on the self-punning scheme, the
number of redundant RREQ messages is reduced relying on all the nodes in the network.
Basically, due to multiple varieties in node deployment, this number is insufficient when the
network is congested [7].
3. Proposed Method
A MANETs consist of some mobile nodes connected by a set of links. In this scheme,
the source communicates the data to the destination through consistent nodes in MANETs. This
routing path provides better packet delivery in the networks.A source wants to transmit the data
to a destination it first checks the routing table.If the destination is obtained in the routing table,
the source node to establish the data transmission or it starts the Route Request (RREQ) to
discover a new route to reach the destination. The destination received the RREQ from the
source via intermediate hops then the destination sends the Route Reply (RREP) through the
source.Owing to the node mobility, breakage of the link may arise, also the node that finds such
an event issues RERR message to its neighbors to notice this breakage.In CPIR, the
intermediate node elected based on the node consistency and residual energy.
 ISSN: 2502-4752
IJEECS Vol. 8, No. 3, December 2017 : 674 – 678
676
In CPIR analyzes the node in the network using Node consistency measure. The period
of every node within communication range is stored in a routing table. It ensures the node
stability of node. Mean duration value provides the average amount of time that node spends in
our range. The consistency calculation depends on Ratio among Mean period of data
transmission rate.
The Node Consistency calculation is given below.
( )
( )
NC t
NodeConsistency NC
T
  (1)
If the node consistency is greater than the threshold that node is consistent. The threshold
value is 0.7
The Route stability is calculated given below.
( )
( )
RS t
RouteStability RS
n
  (2)
Where,
( )RS t  Period of node availability in communication range
T Time Request to transmit the data
n Number of nodes in data transmission path
Figure 1. Consistency based node selection in network
The figure 1 indicate that the first path from the source to the destination is not
reachable since the node is inconsistent and this node has dropped all packets. But the CPIR,
transmit the data through the consistent path. As a result, the source data reach the destination
via consistent nodes in a network.
Throughput: It is the average of successful messages delivered to the destination.The
average throughput is calculated using Equation (6).
0
( )*
1000
n
Pack Received n Pack Size
Throughput 

(6)
Un consistent
node
s
h
b
g
a
f
a
c
i
e
d
Shortest Path
Consistent Path
IJEECS ISSN: 2502-4752 
Simulation Analysis for Consistent Path Identification to Refine … (G Vennila)
677
Residual Energy: The amount of energy remaining in a node at the current instance of time is
called as residual energy. A measure of the residual energy gives the rate at which the network
operations consume energy.
4. Results and Discussion
Evaluation of the protocols NCPR andCPIR is achieved using simulations in the
network simulator. Such simulations use the standard parameters indicated in Table 1.
Performance evaluation of the NCPR, CPIRprotocols are provided by estimating the
Throughput, Residual Energy in the network.
Table 1. Simulation Parameters of CPIR
Parameter Value
Channel Type Wireless Channel
Antenna Type OmniAntenna
MAC type 802.11
Simulation Time 50 s
Number of nodes 50
Routing schemes NCPR, CPIR
Transmission range 250m
Traffic model CBR
Simulation Area 700x700
Mobility Model Random way point
Figure 2. Throughput
Figure 2 shows the performance of throughput of CPIR and NCPR protocols. The
throughput of NCPR is lesser than the CPIR. It represents the increase in efficiency of the CPIR
protocol in the network.
0
5000
10000
15000
20000
25000
0 10 20 30 40 50
NCPR
CPIR
Simulation Time (ms)
Throughput(bps)
 ISSN: 2502-4752
IJEECS Vol. 8, No. 3, December 2017 : 674 – 678
678
Figure 3. Residual Energy
Figure 3 shows the comparison of the residual energy of the CPIR and NCPR. The energy
consumption of CPIR is lower than NCPR, therefore, proposed scheme increase the network
lifetime.
5. Conclusion
We propose a new protocol that allows for the establishment of a stable and consistent
path in MANETs. In CPIR, the intermediate node selected based on the node consistency and
residual energy to improve the network performance. The consistent path selection enhances
the network lifetime and increases the network performance. The simulation analysis results
show that CPIRreduce energy consumption also increases the throughput.
References
[1] Padmavathy N & Chaturvedi SK. Reliability Evaluation of Mobile Ad Hoc Network: With and Without
Mobility Considerations. Procedia Computer Science. 2015; 46: 1126-1139.
[2] Son TT, Le Minh H, Sexton G, Aslam N & Ghassemlooy Z. Bayesian model for mobility prediction to
support Routing in Mobile Ad-Hoc Networks. In 2013 IEEE 24th International Symposium on
Personal Indoor and Mobile Radio Communications (PIMRC), IEEE. 2013: 3186-3190)
[3] Kuo WK & Chu SH. Energy efficiency optimization for mobile ad hoc networks. IEEE Access. 2016;
4: 928-940.
[4] Yahya A. Energy-aware architecture for multi-rate ad hoc networks. Egyptian Informatics
Journal. 2010; 11(1): 33-38.
[5] Tan, Hwee Xian, and W Seah. Dynamic topology control to reduce interference in MANETs.
In Proceedings of Second International Conference on Mobile Computing and Ubiquitous
Networking. 2005.
[6] As Gergely, Levente Buttyan, and Istvan Vajda. Provably secure on-demand source routing in mobile
ad hoc networks. IEEE Transactions on Mobile Computing. 2006; 5(11): 1533-1546.
[7] Ajmal, Ali Mohamed E, Shamala Subramaniam, Zuriati Ahmad Zukarnain, and Zarina Mohd Hanapi.
Neighbor-Based Dynamic Connectivity Factor Routing Protocol for Mobile Ad Hoc Network. IEEE
Access. 2016; 4: 8053-8064.
[8] Shanthi HJ and Anita EM. Secure and Efficient Distance Effect Routing Algorithm for Mobility
(SE_DREAM) in MANETs. In Proceedings of the 3rd International Symposium on Big Data and Cloud
Computing Challenges (ISBCC–16’), Springer International Publishing. 2016: 65-80.
[9] Vennila G, Arivazhagan D & Manickasankari N. Prevention of Co-operative Black Hole attack in
Manet on DSR protocol using Cryptographic Algorithm. International Journal of Engineering and
Technology (IJET). 2014; 6(5): 2401.
[10] Shanthi HJ & Anita EM. Performance analysis of black hole attacks in geographical routing MANET.
2014.
0
0,2
0,4
0,6
0,8
1
1,2
1 2 3 4 5 6
NCPR
CPIR
Simulation Time
ResidualEnergy(j)

More Related Content

PDF
A novel routing technique for mobile ad hoc networks (manet)
PDF
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
PDF
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PDF
Position based Opportunistic routing in MANET
PDF
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
PDF
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
PDF
Fy3111571162
PDF
rupali published paper
A novel routing technique for mobile ad hoc networks (manet)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
Position based Opportunistic routing in MANET
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
Fy3111571162
rupali published paper

What's hot (19)

PDF
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
PDF
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
PDF
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
PDF
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
PDF
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
PDF
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
PDF
Novel Position Estimation using Differential Timing Information for Asynchron...
PDF
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
PDF
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
PDF
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
PDF
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
PDF
Modulation aware connection admission control and uplink scheduling algorithm...
PDF
A New Efficient Cache Replacement Strategy for Named Data Networking
PDF
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...
PDF
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
PDF
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
PDF
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
PDF
Performance improvement of vehicular delay tolerant networks using public tra...
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
Novel Position Estimation using Differential Timing Information for Asynchron...
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
Modulation aware connection admission control and uplink scheduling algorithm...
A New Efficient Cache Replacement Strategy for Named Data Networking
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Performance improvement of vehicular delay tolerant networks using public tra...
Ad

Similar to 21 9149 simulation analysis for consistent path identification edit septian (20)

PDF
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
PDF
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
PDF
Efficient and stable route selection by using cross layer concept for highly...
PDF
Improving the scalability by contact information compression in routing
PDF
V.KARTHIKEYAN PUBLISHED ARTICLE A
PPTX
Improve MANET network performance using ESPS approach
PDF
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
PDF
AN INTEGRATED SECURED ROUTING APPROACH FOR MANETS
PDF
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
PDF
X04505122126
PDF
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
PDF
Route Stability in Mobile Ad-Hoc Networks
PDF
Mobile ad hoc networks – dangling issues of optimal path strategy
PDF
A2546035115
PDF
A Survey On Secure Cooperative Bait Detection Approach For...
PDF
A MIN-MAX SCHEDULING LOAD BALANCED APPROACH TO ENHANCE ENERGY EFFICIENCY AND ...
PDF
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
PDF
Ijcnc050203
PDF
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Efficient and stable route selection by using cross layer concept for highly...
Improving the scalability by contact information compression in routing
V.KARTHIKEYAN PUBLISHED ARTICLE A
Improve MANET network performance using ESPS approach
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
AN INTEGRATED SECURED ROUTING APPROACH FOR MANETS
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
X04505122126
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Route Stability in Mobile Ad-Hoc Networks
Mobile ad hoc networks – dangling issues of optimal path strategy
A2546035115
A Survey On Secure Cooperative Bait Detection Approach For...
A MIN-MAX SCHEDULING LOAD BALANCED APPROACH TO ENHANCE ENERGY EFFICIENCY AND ...
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
Ijcnc050203
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...
Ad

More from IAESIJEECS (20)

PDF
08 20314 electronic doorbell...
PDF
07 20278 augmented reality...
PDF
06 17443 an neuro fuzzy...
PDF
05 20275 computational solution...
PDF
04 20268 power loss reduction ...
PDF
03 20237 arduino based gas-
PDF
02 20274 improved ichi square...
PDF
01 20264 diminution of real power...
PDF
08 20272 academic insight on application
PDF
07 20252 cloud computing survey
PDF
06 20273 37746-1-ed
PDF
05 20261 real power loss reduction
PDF
04 20259 real power loss
PDF
03 20270 true power loss reduction
PDF
02 15034 neural network
PDF
01 8445 speech enhancement
PDF
08 17079 ijict
PDF
07 20269 ijict
PDF
06 10154 ijict
PDF
05 20255 ijict
08 20314 electronic doorbell...
07 20278 augmented reality...
06 17443 an neuro fuzzy...
05 20275 computational solution...
04 20268 power loss reduction ...
03 20237 arduino based gas-
02 20274 improved ichi square...
01 20264 diminution of real power...
08 20272 academic insight on application
07 20252 cloud computing survey
06 20273 37746-1-ed
05 20261 real power loss reduction
04 20259 real power loss
03 20270 true power loss reduction
02 15034 neural network
01 8445 speech enhancement
08 17079 ijict
07 20269 ijict
06 10154 ijict
05 20255 ijict

Recently uploaded (20)

PPTX
Welding lecture in detail for understanding
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Digital Logic Computer Design lecture notes
PPTX
Construction Project Organization Group 2.pptx
PDF
PPT on Performance Review to get promotions
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPT
Project quality management in manufacturing
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Well-logging-methods_new................
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Lecture Notes Electrical Wiring System Components
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
Welding lecture in detail for understanding
UNIT 4 Total Quality Management .pptx
Foundation to blockchain - A guide to Blockchain Tech
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Digital Logic Computer Design lecture notes
Construction Project Organization Group 2.pptx
PPT on Performance Review to get promotions
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Project quality management in manufacturing
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
R24 SURVEYING LAB MANUAL for civil enggi
CYBER-CRIMES AND SECURITY A guide to understanding
Well-logging-methods_new................
Model Code of Practice - Construction Work - 21102022 .pdf
Lecture Notes Electrical Wiring System Components
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
bas. eng. economics group 4 presentation 1.pptx

21 9149 simulation analysis for consistent path identification edit septian

  • 1. Indonesian Journal of Electrical Engineering and Computer Science Vol. 8, No. 3, December 2017, pp. 674 ~ 678 DOI: 10.11591/ijeecs.v8.i3.pp674-678  674 Received August 12, 2017; Revised October 29, 2017; Accepted November 18, 2017 Simulation Analysis for Consistent Path Identification to Refine the Network Lifetime G Vennila Department Of Information Technology, AMET University, Chennai Abstract As the demand for Mobile Ad hoc Network (MANET) applications grows, so does their use of many essential services where node consistent and stability of the communication paths are of great importance. In this scheme, we propose Simulation Analysis for Consistent Path Identification to Refine the Network Lifetime (CPIR). This technique offers more stable path and transmits the data through the consistent nodes. This article is focused on protecting the route from the inconsistent node in mobile communications to improve the network performance and reduce the energy consumption in the network. The simulation results demonstrate that CPIR provided reduce the energy utilization and improved both the longer lifetimes and increased number of packets delivered. Keywords: Consistent Path, Energy, Lifetime, MANETs Copyright © 2017Institute of Advanced Engineering and Science. All rights reserved. 1. Introduction A MANET is a self-organized network with arbitrarily distributed nodes. MANET applications are not limited to areas such as emergency and crisis management, local-level, commercial and military battlefield applications [1]. Network users intended for Consistent delivery of information. But a topological change in MANET leads to Path failure which degrades the network performance. Routing in MANET has been a challenging task because of the high degree of node mobility [2]. Using alternative path may resolve this problem. Multiple paths between source and destination are determined by route discovery [3]. Routing protocol selects an alternative path based on some metrics such as hop count, a speed of path, time to deliver content, path reliability, and its bandwidth [4]. Routing protocols in conventional wired networks use either distance vector or link state routing algorithms, both of which require periodic routing advertisements to be broadcast by each router [5]. The Traditional shortest path algorithms work correctly only when all nodes maintain routes to all destinations. However, in on-demand routing protocols, a node need not maintain routes to all destinations [6]. In MANET single path routing may fail in most of the cases due to frequent node mobility [7]. Consequently, Multipath routing scheme has been employed. Multiple paths between the source node and the destination nodes could be found using Multipath routing protocol and the Secure and Efficient Distance Effect Routing Algorithm for Mobility (SE_DREAM) in MANETs [8]. These multiple paths make the transmission more consistent and more efficient. In prevention of Co-operative Black Hole attack in Manet on DSR protocol using Cryptographic Algorithm is presented in this research paper [9]. To transmit data only best path is selected among the available paths based on some metric such as delay, bandwidth availability, delivery ratio, route stability, etc. and the performance analysis of black hole attacks in geographical routing MANET [10]. 2. Related Works Consistency Evaluation of Mobile Ad Hoc Network [1] considers different mobility models along with the effect of different scenario metrics and different values of tuning parameter. The mobility considerations have no significant impaction reliability as the same results are obtained by just implicitly simulating the node locations. Considering no mobility models reduces computational burden, some random variables involved making the algorithm more efficient also reduced the number of random variables. However, this approach considers
  • 2. IJEECS ISSN: 2502-4752  Simulation Analysis for Consistent Path Identification to Refine … (G Vennila) 675 only uniform distribution.Bayesian model [2] is used to predict and classify the mobility of a node in MANETs. The outcome of Bayesian Classifier will help a node control its broadcast process by which a high mobility node or region is avoided to re-broadcast a request. Established routes using the proposed model are more stable than routes determined by existing routing strategies. This model is a distributed algorithm and independent of the mobility pattern. This model improves the routing performance and reduces flooding problem in MANETs. Energy Efficiency Optimization scheme [3] using the mixed integer nonlinear programming (MINLP) formulation by jointly considering routing, traffic scheduling, and power control. The branch and bound (BB) algorithm to efficiently solve this globally optimal problem. The BBalgorithm include upper and lower bounding schemes and branching rule that are designed using the characteristics of the non-convex MINLP problem. This scheme provides valuable insights into not only the impact of routing strategy, transmission schedule, and power control. Energy-aware architecture multi-rate protocol [4] investigated the possibility of reducing energy consumption in 802.11 wireless networks.This scheme increases the network performance and decreases both the power consumption and control overhead. Mobility, Energy and Congestion Aware Routing (MECA) [5] to improve routing performance for MANETs. In this model, a node monitors the mobility, energy consumption and traffic congestion based on a multi-metric named AEC (constructed by Average Encounter Rate, Energy Consumption Rate, and Congestion Factor) to choose the most stable, power-rich and congestion-free path for routing. As a result, packet delivery ratio of the proposed model improves almost 20% compared to that of original AODV protocol while the number of dead nodes and routing overheads decreases significantly. The consistent routing scheme proposed complete routing using offline prediction algorithms is done. An augmented graph is created AGW (VA, EA) by adding landmarks into every road segment. The Landmark ID can uniquely identify a vertex on graph AGW, and the link is determined. The possibility of link duration is determined, and the duration prediction table can be computed offline once a waypoint graph is given. The waypoint graph and the analogous duration prediction table can be stored in every mobile node and used repeatedly. However, more are required for the prediction accuracy, and this leads to increase the time of computational complexity [6]. CHAMP uses cooperative packet caching and shortest multipath routing to reduce packet loss due to frequent route failures. The nodes rely on data packet acknowledgment to determine the link status and whenever the link declared "down" it indicates the absence of acknowledgment and the packets cannot be routed successfully to the destination. The alternative path is selected and forwards all affected packets through this alternative route. If there is no alternative route present, then RERR message is generated and sent to the base station with header information of all data packets. Every node in CHAMP maintains a First-In First-Out (FIFO) data cache for storing forwarded packets for future use (6). Neighbor Coverage Based Probabilistic Rebroadcast (NCPR) was proposed. This protocol completely relies on preset variables, which are required to be set by the system administrator based on the ad-hoc scenario. The routing overhead crisis caused by RREQ redundant packets could be overcome by applying the NCPR protocol. Based on the self-punning scheme, the number of redundant RREQ messages is reduced relying on all the nodes in the network. Basically, due to multiple varieties in node deployment, this number is insufficient when the network is congested [7]. 3. Proposed Method A MANETs consist of some mobile nodes connected by a set of links. In this scheme, the source communicates the data to the destination through consistent nodes in MANETs. This routing path provides better packet delivery in the networks.A source wants to transmit the data to a destination it first checks the routing table.If the destination is obtained in the routing table, the source node to establish the data transmission or it starts the Route Request (RREQ) to discover a new route to reach the destination. The destination received the RREQ from the source via intermediate hops then the destination sends the Route Reply (RREP) through the source.Owing to the node mobility, breakage of the link may arise, also the node that finds such an event issues RERR message to its neighbors to notice this breakage.In CPIR, the intermediate node elected based on the node consistency and residual energy.
  • 3.  ISSN: 2502-4752 IJEECS Vol. 8, No. 3, December 2017 : 674 – 678 676 In CPIR analyzes the node in the network using Node consistency measure. The period of every node within communication range is stored in a routing table. It ensures the node stability of node. Mean duration value provides the average amount of time that node spends in our range. The consistency calculation depends on Ratio among Mean period of data transmission rate. The Node Consistency calculation is given below. ( ) ( ) NC t NodeConsistency NC T   (1) If the node consistency is greater than the threshold that node is consistent. The threshold value is 0.7 The Route stability is calculated given below. ( ) ( ) RS t RouteStability RS n   (2) Where, ( )RS t  Period of node availability in communication range T Time Request to transmit the data n Number of nodes in data transmission path Figure 1. Consistency based node selection in network The figure 1 indicate that the first path from the source to the destination is not reachable since the node is inconsistent and this node has dropped all packets. But the CPIR, transmit the data through the consistent path. As a result, the source data reach the destination via consistent nodes in a network. Throughput: It is the average of successful messages delivered to the destination.The average throughput is calculated using Equation (6). 0 ( )* 1000 n Pack Received n Pack Size Throughput   (6) Un consistent node s h b g a f a c i e d Shortest Path Consistent Path
  • 4. IJEECS ISSN: 2502-4752  Simulation Analysis for Consistent Path Identification to Refine … (G Vennila) 677 Residual Energy: The amount of energy remaining in a node at the current instance of time is called as residual energy. A measure of the residual energy gives the rate at which the network operations consume energy. 4. Results and Discussion Evaluation of the protocols NCPR andCPIR is achieved using simulations in the network simulator. Such simulations use the standard parameters indicated in Table 1. Performance evaluation of the NCPR, CPIRprotocols are provided by estimating the Throughput, Residual Energy in the network. Table 1. Simulation Parameters of CPIR Parameter Value Channel Type Wireless Channel Antenna Type OmniAntenna MAC type 802.11 Simulation Time 50 s Number of nodes 50 Routing schemes NCPR, CPIR Transmission range 250m Traffic model CBR Simulation Area 700x700 Mobility Model Random way point Figure 2. Throughput Figure 2 shows the performance of throughput of CPIR and NCPR protocols. The throughput of NCPR is lesser than the CPIR. It represents the increase in efficiency of the CPIR protocol in the network. 0 5000 10000 15000 20000 25000 0 10 20 30 40 50 NCPR CPIR Simulation Time (ms) Throughput(bps)
  • 5.  ISSN: 2502-4752 IJEECS Vol. 8, No. 3, December 2017 : 674 – 678 678 Figure 3. Residual Energy Figure 3 shows the comparison of the residual energy of the CPIR and NCPR. The energy consumption of CPIR is lower than NCPR, therefore, proposed scheme increase the network lifetime. 5. Conclusion We propose a new protocol that allows for the establishment of a stable and consistent path in MANETs. In CPIR, the intermediate node selected based on the node consistency and residual energy to improve the network performance. The consistent path selection enhances the network lifetime and increases the network performance. The simulation analysis results show that CPIRreduce energy consumption also increases the throughput. References [1] Padmavathy N & Chaturvedi SK. Reliability Evaluation of Mobile Ad Hoc Network: With and Without Mobility Considerations. Procedia Computer Science. 2015; 46: 1126-1139. [2] Son TT, Le Minh H, Sexton G, Aslam N & Ghassemlooy Z. Bayesian model for mobility prediction to support Routing in Mobile Ad-Hoc Networks. In 2013 IEEE 24th International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), IEEE. 2013: 3186-3190) [3] Kuo WK & Chu SH. Energy efficiency optimization for mobile ad hoc networks. IEEE Access. 2016; 4: 928-940. [4] Yahya A. Energy-aware architecture for multi-rate ad hoc networks. Egyptian Informatics Journal. 2010; 11(1): 33-38. [5] Tan, Hwee Xian, and W Seah. Dynamic topology control to reduce interference in MANETs. In Proceedings of Second International Conference on Mobile Computing and Ubiquitous Networking. 2005. [6] As Gergely, Levente Buttyan, and Istvan Vajda. Provably secure on-demand source routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing. 2006; 5(11): 1533-1546. [7] Ajmal, Ali Mohamed E, Shamala Subramaniam, Zuriati Ahmad Zukarnain, and Zarina Mohd Hanapi. Neighbor-Based Dynamic Connectivity Factor Routing Protocol for Mobile Ad Hoc Network. IEEE Access. 2016; 4: 8053-8064. [8] Shanthi HJ and Anita EM. Secure and Efficient Distance Effect Routing Algorithm for Mobility (SE_DREAM) in MANETs. In Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC–16’), Springer International Publishing. 2016: 65-80. [9] Vennila G, Arivazhagan D & Manickasankari N. Prevention of Co-operative Black Hole attack in Manet on DSR protocol using Cryptographic Algorithm. International Journal of Engineering and Technology (IJET). 2014; 6(5): 2401. [10] Shanthi HJ & Anita EM. Performance analysis of black hole attacks in geographical routing MANET. 2014. 0 0,2 0,4 0,6 0,8 1 1,2 1 2 3 4 5 6 NCPR CPIR Simulation Time ResidualEnergy(j)