SlideShare a Scribd company logo
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
464
ROUTING MANAGEMENT FOR MOBILE AD-HOC NETWORKS
Poonam Pahuja1
and Dr. Tarun Shrimali2
1
Research Scholar, Mewar University, Chittorgarh India
2
Research Supervisor, Mewar University, Chittorgarh India
ABSTRACT
A mobile ad hoc network (MANETs) is a collection of distributed nodes which
communicate using multi-hop wireless links with frequent node mobility. The frequent
mobility of nodes leads network partition and futile communication. To alleviate various
network connectivity and routing issues, we have proposed Cluster Based Distributed
Spanning Tree (CBDST) interconnection would be the better solution. CBDST structure is
organized into a hierarchy of groups. The nodes are put together in groups and groups are
gathered in groups of higher level, recursively. This organization, built on top of routing
tables allows the instantaneous creation of spanning trees rooted by any nodes and keeps the
load balanced between the nodes.
.
KEYWORDS: CBDST, MANET, Cluster Head, Mobile Node, NS-2
1. INTRODUCTION
A Mobile Ad-Hoc Network (MANET) is an autonomous collection of distributed
mobile users. Every host in a MANET works as a source and a sink, and also relays packets
for other hosts and is thus a router as well. This type of network can be used in fire, safety,
rescue, disaster recovery operations, conference and campus settings, car networks, personal
area networking, etc. MANETs have similar characteristics to other wireless communication
networks, which are mainly attributed to the wireless channel’s properties.
2. CLUSTER BASED DISTRIBUTED SPANNING TREE (CBDST)
CBDST structure is organized into a hierarchy of groups. The nodes are put together
in groups and groups are gathered in groups of higher level, recursively. This organization,
built on top of routing tables allows the instantaneous creation of spanning trees rooted by
any nodes and keeps the load balanced between the nodes.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING
& TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 3, May-June (2013), pp. 464-468
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
465
2.1 Formation of Cluster
Initially each node is assigned a unique ID value. It broadcasts its ID value to its
neighbors and builds its neighborhood table. Each node calculates its own weight based on
the following factors:
i) Node connectivity: The number of nodes that can communicate directly with the given node
i.e. that are in its transmission range.
ii) Battery Power: The power currently left in each node. The energy is consumed by sending
and receiving of messages.
iii) Mobility: Running average of speed of each node. If mobility is less, the node is more
suitable to become cluster head CH.
iv) Distance: Sum of distance of the node from all its neighbors.
Each node broadcasts a beacon message to notify its presence to the neighbors. A
beacon message contains the state of the node. Each node builds its neighbor list based on the
beacon messages received. The cluster-heads election is based on the weight values of the
nodes and the node having the lowest weight is chosen as CH. Each node computes its weight
value based on the following algorithm:
2.2 Node Weight Computational Algorithm
Step 1: The coefficients used in weight calculation are assumed the following values w1=0.7,
w2=0.2, w3=0.05, w4=0.05; The sum of these co-efficient is 1.This is actually used to
normalize the factors such as spreading degree, distance with its neighbors, mobility of the
node, and power consumed used in the calculation of weight of a node. The factors node
connectivity and distance with its neighbors are given more importance and assumed higher
co-efficient values 0.7 and 0.2 respectively
Step 2: Compute the difference between the optimal cluster’s size ‘α’ and the real number of
neighbors ‘R (V)’as node connectivity ,nc= 1-(| α -R (V)| / α)
Step 3: For every node the sum of the distances, Dv, with all its neighbors is calculated.
Dv= Σdist(v,v’) where v’ €N(v)
Step 4: Calculate the average speed for every node until the current time T. This gives the
measure of the mobility Mv based on the X co-ordinate and Y co-ordinate i.e. position of the
node v at all previous time instance t.
Step 5: Determine how much battery power has been consumed as Pv. This is assumed to be
more for a Cluster-Head when compared to an ordinary node. Because Cluster-Head has
taken care of all the members of the cluster by continuously sending the signal.
Step 6: The weight Wv for each node is calculated based on
Wν = (w1× nc) + (w2× Dν ) + (w3×Mν ) + (w4× Pν )
Where nc is the node connectivity, Dv is the distance with its neighbors, Mv is the mobility
of the node, and power consumed is represented by, Pv
Step 7: The node with the smallest Wv is elected as a cluster-head. All the neighbors of the
chosen cluster-head are no more allowed to participate in the election procedure.
Step 8: All the above steps are repeated for remaining nodes which is not yet elected as a
cluster-head or assigned to a cluster.
2.3 Cluster Maintenance
The second phase is the clustering maintenance. There are defined two distinct types
of operations for cluster maintenance: the battery power threshold property and the node
movement to the outside of its cluster boundary.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
466
2.3.1 Node Movements
The node movements can be in the form of node joining or node leaving a cluster.
These operations will have only local effects on the clustered topology if the moving node is
a MN node. If the leaving node is CH node, the cluster reorganization has to be performed for
the nodes in the cluster by evoking the clustering algorithm.
Step1: Broadcast a beacon signal to all its neighbor nodes in the transmission range;
Process the signals received from the neighbor nodes in the network and form the connection
matrix, A;
Step2: Calculate the Degree R (U) using A, Spreading degree, ∆sp, Sum of the distances, Du,
with all its neighbors, Average speed, Mu, Amount of battery power that has been consumed,
Pu, and Weight of node U as Wu;
Step3: If(A Cluster head already exist in the neighborhood)
Send request to join the Cluster;
Else
Form a new cluster and declare itself as the cluster-head;
2.3.2 Battery Power Threshold
The battery power of the nodes participating in the Clustering changes continuously.
The Cluster-Heads Power decreases more rapidly when compared to the Cluster Members.
When the Cluster-Heads Battery Power falls below a threshold then the node is no longer
able to perform its activates and a New Head from the members available need to be chosen.
Step1: Verify the threshold on the Cluster -Head’s Battery power;
If (Battery power < Threshold)
Cluster-Head sends a LIFE_DOWN message to all its Neighbors;
All the Member nodes participate in the Re-Election Procedure using
Modified Weighted Clustering Algorithm and the Node with least weight is
selected as the New Cluster-Head;
Else
Re-election is not needed;
3. RESULTS AND DISCUSSION
The mobile network model assumed in this project consists of random number of
mobile nodes with each node having fixed energy and random mobility. Further each node
starts with some energy and its energy decreases each time it passes a message. A node fails
if its whole energy has been consumed. A failed node is represented as a black node. The
measured performance of the proposed algorithm was compared with AODV using NS2
simulation tool.
3.1 Packet Delivery Ratio (PDR)
The Packet Delivery ratio is based on the number of packets delivered and number of
packets sent. Higher the pause time better is the performance of the Cluster. The CBDST
technique approaches a ratio of one or 100% delivery as the network becomes more static in
figure 1. Only under dynamic conditions the packets collide or the packets are lost. As the
pause time increases the static nature is enhanced. CBDST also delivered good PDR against
the scalability.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
467
3.2 Connectivity
The connectivity of nodes gives path for data packets to be forwarded without loss
and comparison results are shown in the above graph. NS2 simulation with varying node
count ranging from 10 to 100 is used to study the percentage of connectivity in wireless
environment. Maximum possible connectivity is 100% where each node is connected with
every other node. CBDST perform well over AODV while increasing number of nodes and
pause time as shown in figure 2. CBDST has good scalability and robustness.
4. CONCLUSION
We have proposed new routing management for better connectivity, network lifetime,
less energy consumption and equally load balancing of the cluster head by re-elected the
cluster head after a threshold. The CBDST perform well over AODV for packet delivery
ratio and scalability
0
0.2
0.4
0.6
0.8
1
1.2
50
150
250
350
450
Pause Time in Sec
PacketDeliveryRatio
AODV
CBDST
0.86
0.88
0.9
0.92
0.94
0.96
0.98
1
50
150
250
350
450
Pause Time in sec
connectivityrate(%)
AODV
CBDST
0
0.2
0.4
0.6
0.8
1
1.2
10
30
50
70
90
Number of Mobile Nodes
PacketDeliveryRatio
AODV
CBDST
0
0.2
0.4
0.6
0.8
1
1.2
10
30
50
70
90
Number of Mobile Nodes
Cnnectivityratein(%)
AODV
CBDST
Fig 1. Packet Delivery Ratio Fig 2. Route Connectivity
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
468
REFERENCES
[1] S. Lee, J. Hsu, R. Hayashida, M. Gerla, and R. Bagrodia, “Selecting a Routing
Strategy for Your Ad hoc Network,” Special issue on Advances in Computer
Communications and Networks: Algorithms and Applications, vol. 26, no. 7, pp. 723-
733, May 2003.
[2] C. Perkins, E. Belding-Royer, and S. Das, “Ad Hoc On Demand Distance Vector
(AODV) Yu .J.P. & Chong
[3] P.H.J. (2005).A Survey of Clustering Schemes for Mobile Ad Hoc Networks. IEEE
communications Surveys and Tutorials, Vol. 7, No. 1, pp. 32-48. Routing,” IETF
RFC3561, July 2003.
[4] Yu .J.P. & Chong P.H.J. (2005).A Survey of Clustering Schemes for Mobile Ad Hoc
Networks. IEEE Communications Surveys and Tutorials, Vol. 7, No. 1, pp. 32-48.
[5] Deniz Cokuslu Kayhan Erciyes and Orhan Dagdeviren A Dominating Set Based
Clustering Algorithm for Mobile Ad hoc Networks, Springer Computational Science –
ICCS (2006).
[6] P. Victer Paul, T. Vengattaraman, P. Dhavachelvan & R. Baskaran, Improved Data
Cache Scheme Using Distributed Spanning Tree in Mobile Adhoc Network,
International Journal of Computer Science & CommunicationVol. 1, No. 2, July-
December (2010).
[7] M. Ahmed, S. Yousef and Sattar J Aboud, “Bidirectional Search Routing Protocol for
Mobile Ad Hoc Networks”, International Journal of Computer Engineering &
Technology (IJCET), Volume 4, Issue 1, 2013, pp. 229 - 243, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375.
[8] V. Bapuji, R. Naveen Kumar, Dr. A. Govardhan and Prof. S.S.V.N. Sarma,
“Maximizing Lifespan of Mobile Ad Hoc Networks with Qos Provision Routing
Protocol”, International Journal of Computer Engineering & Technology (IJCET),
Volume 3, Issue 2, 2012, pp. 150 - 156, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.

More Related Content

PDF
A survey on weighted clustering techniques in manets
PDF
ENERGY EFFICIENCY IN AD HOC NETWORKS
PDF
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
PDF
Mobile ad hoc networks and its clustering scheme
PDF
Communication synchronization in cluster based wireless sensor network a re...
PDF
Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for He...
PDF
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Sns
PDF
Virtual backbone trees for most minimal
A survey on weighted clustering techniques in manets
ENERGY EFFICIENCY IN AD HOC NETWORKS
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Mobile ad hoc networks and its clustering scheme
Communication synchronization in cluster based wireless sensor network a re...
Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for He...
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Sns
Virtual backbone trees for most minimal

What's hot (16)

PDF
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
PDF
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
PDF
I04503075078
PDF
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
PDF
On improvement of performance for transport protocol using sectoring sche
PDF
Edd clustering algorithm for
PDF
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
PDF
Maximizing Network Lifetime by Using Smart Cluster Head Selection
PDF
Assignment of cells to switches using firefly algorithm
PDF
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
PDF
Sector based multicast routing algorithm for mobile ad hoc networks
PDF
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
PDF
Quality of service improved in WSNs using Improved Efficient Quality of Servi...
PDF
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
PDF
34 9141 it ns2-tentative route selection approach for edit septian
PDF
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
I04503075078
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
On improvement of performance for transport protocol using sectoring sche
Edd clustering algorithm for
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
Maximizing Network Lifetime by Using Smart Cluster Head Selection
Assignment of cells to switches using firefly algorithm
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Sector based multicast routing algorithm for mobile ad hoc networks
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Quality of service improved in WSNs using Improved Efficient Quality of Servi...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
34 9141 it ns2-tentative route selection approach for edit septian
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
Ad

Viewers also liked (9)

PDF
Investigation on halftoning methods in digital printing technology
PDF
A fast fpga based architecture for measuring the distance between
PDF
Effect of coarse aggregate characteristics on strength properties of high
PDF
Behavioral and performance analysis model for malware detection techniques
PDF
A methodology for model driven multiplatform mobile application development
PDF
Design and implementation of variable range energy aware dynamic source routi...
PDF
Performance analysis is basis on color based image retrieval technique
PDF
Novel image fusion techniques using global and local kekre wavelet transforms
PDF
Experimental investigation of laminar mixed convection heat transfer
Investigation on halftoning methods in digital printing technology
A fast fpga based architecture for measuring the distance between
Effect of coarse aggregate characteristics on strength properties of high
Behavioral and performance analysis model for malware detection techniques
A methodology for model driven multiplatform mobile application development
Design and implementation of variable range energy aware dynamic source routi...
Performance analysis is basis on color based image retrieval technique
Novel image fusion techniques using global and local kekre wavelet transforms
Experimental investigation of laminar mixed convection heat transfer
Ad

Similar to Routing management for mobile ad hoc networks (20)

PDF
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
PDF
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
PDF
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
PDF
F0963440
PDF
D031202018023
PDF
Implementation and analysis of multiple criteria decision routing algorithm f...
PDF
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
PDF
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
PDF
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
PDF
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
PDF
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
PDF
Constructing Minimum Connected Dominating Set in Mobile Ad Hoc Networks
PDF
20320130406029
PDF
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
PDF
Greedy Cluster Based Routing for Wireless Sensor Networks
PDF
Greedy Cluster Based Routing for Wireless Sensor Networks
PDF
1909 1913
PDF
1909 1913
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
La3518941898
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
F0963440
D031202018023
Implementation and analysis of multiple criteria decision routing algorithm f...
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
Constructing Minimum Connected Dominating Set in Mobile Ad Hoc Networks
20320130406029
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
Greedy Cluster Based Routing for Wireless Sensor Networks
Greedy Cluster Based Routing for Wireless Sensor Networks
1909 1913
1909 1913
International Journal of Engineering Research and Development (IJERD)
La3518941898

More from IAEME Publication (20)

PDF
IAEME_Publication_Call_for_Paper_September_2022.pdf
PDF
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
PDF
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
PDF
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
PDF
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
PDF
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
PDF
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
PDF
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
PDF
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
PDF
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
PDF
GANDHI ON NON-VIOLENT POLICE
PDF
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
PDF
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
PDF
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
PDF
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
PDF
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
PDF
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
PDF
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
PDF
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
PDF
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation theory and applications.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Encapsulation_ Review paper, used for researhc scholars
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
KodekX | Application Modernization Development
PPTX
Big Data Technologies - Introduction.pptx
PDF
Machine learning based COVID-19 study performance prediction
20250228 LYD VKU AI Blended-Learning.pptx
Network Security Unit 5.pdf for BCA BBA.
Mobile App Security Testing_ A Comprehensive Guide.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectral efficient network and resource selection model in 5G networks
Encapsulation theory and applications.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Encapsulation_ Review paper, used for researhc scholars
The AUB Centre for AI in Media Proposal.docx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
MIND Revenue Release Quarter 2 2025 Press Release
KodekX | Application Modernization Development
Big Data Technologies - Introduction.pptx
Machine learning based COVID-19 study performance prediction

Routing management for mobile ad hoc networks

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 464 ROUTING MANAGEMENT FOR MOBILE AD-HOC NETWORKS Poonam Pahuja1 and Dr. Tarun Shrimali2 1 Research Scholar, Mewar University, Chittorgarh India 2 Research Supervisor, Mewar University, Chittorgarh India ABSTRACT A mobile ad hoc network (MANETs) is a collection of distributed nodes which communicate using multi-hop wireless links with frequent node mobility. The frequent mobility of nodes leads network partition and futile communication. To alleviate various network connectivity and routing issues, we have proposed Cluster Based Distributed Spanning Tree (CBDST) interconnection would be the better solution. CBDST structure is organized into a hierarchy of groups. The nodes are put together in groups and groups are gathered in groups of higher level, recursively. This organization, built on top of routing tables allows the instantaneous creation of spanning trees rooted by any nodes and keeps the load balanced between the nodes. . KEYWORDS: CBDST, MANET, Cluster Head, Mobile Node, NS-2 1. INTRODUCTION A Mobile Ad-Hoc Network (MANET) is an autonomous collection of distributed mobile users. Every host in a MANET works as a source and a sink, and also relays packets for other hosts and is thus a router as well. This type of network can be used in fire, safety, rescue, disaster recovery operations, conference and campus settings, car networks, personal area networking, etc. MANETs have similar characteristics to other wireless communication networks, which are mainly attributed to the wireless channel’s properties. 2. CLUSTER BASED DISTRIBUTED SPANNING TREE (CBDST) CBDST structure is organized into a hierarchy of groups. The nodes are put together in groups and groups are gathered in groups of higher level, recursively. This organization, built on top of routing tables allows the instantaneous creation of spanning trees rooted by any nodes and keeps the load balanced between the nodes. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 3, May-June (2013), pp. 464-468 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 465 2.1 Formation of Cluster Initially each node is assigned a unique ID value. It broadcasts its ID value to its neighbors and builds its neighborhood table. Each node calculates its own weight based on the following factors: i) Node connectivity: The number of nodes that can communicate directly with the given node i.e. that are in its transmission range. ii) Battery Power: The power currently left in each node. The energy is consumed by sending and receiving of messages. iii) Mobility: Running average of speed of each node. If mobility is less, the node is more suitable to become cluster head CH. iv) Distance: Sum of distance of the node from all its neighbors. Each node broadcasts a beacon message to notify its presence to the neighbors. A beacon message contains the state of the node. Each node builds its neighbor list based on the beacon messages received. The cluster-heads election is based on the weight values of the nodes and the node having the lowest weight is chosen as CH. Each node computes its weight value based on the following algorithm: 2.2 Node Weight Computational Algorithm Step 1: The coefficients used in weight calculation are assumed the following values w1=0.7, w2=0.2, w3=0.05, w4=0.05; The sum of these co-efficient is 1.This is actually used to normalize the factors such as spreading degree, distance with its neighbors, mobility of the node, and power consumed used in the calculation of weight of a node. The factors node connectivity and distance with its neighbors are given more importance and assumed higher co-efficient values 0.7 and 0.2 respectively Step 2: Compute the difference between the optimal cluster’s size ‘α’ and the real number of neighbors ‘R (V)’as node connectivity ,nc= 1-(| α -R (V)| / α) Step 3: For every node the sum of the distances, Dv, with all its neighbors is calculated. Dv= Σdist(v,v’) where v’ €N(v) Step 4: Calculate the average speed for every node until the current time T. This gives the measure of the mobility Mv based on the X co-ordinate and Y co-ordinate i.e. position of the node v at all previous time instance t. Step 5: Determine how much battery power has been consumed as Pv. This is assumed to be more for a Cluster-Head when compared to an ordinary node. Because Cluster-Head has taken care of all the members of the cluster by continuously sending the signal. Step 6: The weight Wv for each node is calculated based on Wν = (w1× nc) + (w2× Dν ) + (w3×Mν ) + (w4× Pν ) Where nc is the node connectivity, Dv is the distance with its neighbors, Mv is the mobility of the node, and power consumed is represented by, Pv Step 7: The node with the smallest Wv is elected as a cluster-head. All the neighbors of the chosen cluster-head are no more allowed to participate in the election procedure. Step 8: All the above steps are repeated for remaining nodes which is not yet elected as a cluster-head or assigned to a cluster. 2.3 Cluster Maintenance The second phase is the clustering maintenance. There are defined two distinct types of operations for cluster maintenance: the battery power threshold property and the node movement to the outside of its cluster boundary.
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 466 2.3.1 Node Movements The node movements can be in the form of node joining or node leaving a cluster. These operations will have only local effects on the clustered topology if the moving node is a MN node. If the leaving node is CH node, the cluster reorganization has to be performed for the nodes in the cluster by evoking the clustering algorithm. Step1: Broadcast a beacon signal to all its neighbor nodes in the transmission range; Process the signals received from the neighbor nodes in the network and form the connection matrix, A; Step2: Calculate the Degree R (U) using A, Spreading degree, ∆sp, Sum of the distances, Du, with all its neighbors, Average speed, Mu, Amount of battery power that has been consumed, Pu, and Weight of node U as Wu; Step3: If(A Cluster head already exist in the neighborhood) Send request to join the Cluster; Else Form a new cluster and declare itself as the cluster-head; 2.3.2 Battery Power Threshold The battery power of the nodes participating in the Clustering changes continuously. The Cluster-Heads Power decreases more rapidly when compared to the Cluster Members. When the Cluster-Heads Battery Power falls below a threshold then the node is no longer able to perform its activates and a New Head from the members available need to be chosen. Step1: Verify the threshold on the Cluster -Head’s Battery power; If (Battery power < Threshold) Cluster-Head sends a LIFE_DOWN message to all its Neighbors; All the Member nodes participate in the Re-Election Procedure using Modified Weighted Clustering Algorithm and the Node with least weight is selected as the New Cluster-Head; Else Re-election is not needed; 3. RESULTS AND DISCUSSION The mobile network model assumed in this project consists of random number of mobile nodes with each node having fixed energy and random mobility. Further each node starts with some energy and its energy decreases each time it passes a message. A node fails if its whole energy has been consumed. A failed node is represented as a black node. The measured performance of the proposed algorithm was compared with AODV using NS2 simulation tool. 3.1 Packet Delivery Ratio (PDR) The Packet Delivery ratio is based on the number of packets delivered and number of packets sent. Higher the pause time better is the performance of the Cluster. The CBDST technique approaches a ratio of one or 100% delivery as the network becomes more static in figure 1. Only under dynamic conditions the packets collide or the packets are lost. As the pause time increases the static nature is enhanced. CBDST also delivered good PDR against the scalability.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 467 3.2 Connectivity The connectivity of nodes gives path for data packets to be forwarded without loss and comparison results are shown in the above graph. NS2 simulation with varying node count ranging from 10 to 100 is used to study the percentage of connectivity in wireless environment. Maximum possible connectivity is 100% where each node is connected with every other node. CBDST perform well over AODV while increasing number of nodes and pause time as shown in figure 2. CBDST has good scalability and robustness. 4. CONCLUSION We have proposed new routing management for better connectivity, network lifetime, less energy consumption and equally load balancing of the cluster head by re-elected the cluster head after a threshold. The CBDST perform well over AODV for packet delivery ratio and scalability 0 0.2 0.4 0.6 0.8 1 1.2 50 150 250 350 450 Pause Time in Sec PacketDeliveryRatio AODV CBDST 0.86 0.88 0.9 0.92 0.94 0.96 0.98 1 50 150 250 350 450 Pause Time in sec connectivityrate(%) AODV CBDST 0 0.2 0.4 0.6 0.8 1 1.2 10 30 50 70 90 Number of Mobile Nodes PacketDeliveryRatio AODV CBDST 0 0.2 0.4 0.6 0.8 1 1.2 10 30 50 70 90 Number of Mobile Nodes Cnnectivityratein(%) AODV CBDST Fig 1. Packet Delivery Ratio Fig 2. Route Connectivity
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 468 REFERENCES [1] S. Lee, J. Hsu, R. Hayashida, M. Gerla, and R. Bagrodia, “Selecting a Routing Strategy for Your Ad hoc Network,” Special issue on Advances in Computer Communications and Networks: Algorithms and Applications, vol. 26, no. 7, pp. 723- 733, May 2003. [2] C. Perkins, E. Belding-Royer, and S. Das, “Ad Hoc On Demand Distance Vector (AODV) Yu .J.P. & Chong [3] P.H.J. (2005).A Survey of Clustering Schemes for Mobile Ad Hoc Networks. IEEE communications Surveys and Tutorials, Vol. 7, No. 1, pp. 32-48. Routing,” IETF RFC3561, July 2003. [4] Yu .J.P. & Chong P.H.J. (2005).A Survey of Clustering Schemes for Mobile Ad Hoc Networks. IEEE Communications Surveys and Tutorials, Vol. 7, No. 1, pp. 32-48. [5] Deniz Cokuslu Kayhan Erciyes and Orhan Dagdeviren A Dominating Set Based Clustering Algorithm for Mobile Ad hoc Networks, Springer Computational Science – ICCS (2006). [6] P. Victer Paul, T. Vengattaraman, P. Dhavachelvan & R. Baskaran, Improved Data Cache Scheme Using Distributed Spanning Tree in Mobile Adhoc Network, International Journal of Computer Science & CommunicationVol. 1, No. 2, July- December (2010). [7] M. Ahmed, S. Yousef and Sattar J Aboud, “Bidirectional Search Routing Protocol for Mobile Ad Hoc Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 229 - 243, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [8] V. Bapuji, R. Naveen Kumar, Dr. A. Govardhan and Prof. S.S.V.N. Sarma, “Maximizing Lifespan of Mobile Ad Hoc Networks with Qos Provision Routing Protocol”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 150 - 156, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.