3. Determination of route life time: It is essential to

advertisement
Improvised Routing Capability in Mobile Wireless
Ad-Hoc Networks
Saurav Ghosh & Shruthi P.C.
Dept of TCE, Dr. AIT, Bangalore, India
E-mail : sauravgsh16@gmail.com, pcshruti@gmail.com
Abstract – The following paper presents an algorithm that
includes mobility in the routing protocols which helps in
reducing the packet losses in mobile ad hoc networks
(MANETs). The route life time decreases as the degree of
mobility of the route increases. This decrease of the route
life time causes frequent link failure thus resulting in more
packet loss and low throughput. This requires
retransmission of packets which further overloads the
network and causes additional latency and packet loss. The
algorithm proposed in the following paper attempts to
estimate the number of packets that can traverse though
the route before it breaks because of mobility. The
simulation result shows that the packet delivery ratio can
be improved up.
I.
RLT and allows the protocol to send number of packets
that can traverse successfully to the desired destination
within the specified RLT period. This provision is thus
shown to be effective in improving the performance of
routing in MANETs.
II. LITERATURE SURVEY
A. An Upper Bound on Network Size in Mobile Ad Hoc
Networks: The paper proposes a model to compute an
upper bound for the maximum network size in mobile
ad-hoc networks. In MANETs, nodes are free to move
and organize without involving any infrastructure or
centralized administration. Due to the limited
transmission range of wireless radio transceivers, there
is a need for intermediate nodes, working as relays, to
establish a communication path between sourcedestination pairs in the network. The proposed algorithm
applies directly to reactive routing protocols.
INTRODUCTION
A Mobile Ad-hoc Network (MANET) consists of
a collection of mobile nodes connected by wireless
links. One of the major challenges in mobile ad hoc
networks (MANETs) is link failure due to the mobility.
Because nodes in a MANET act as routers for any
ongoing packet communication and have limited
transmission ranges, the communication links are
broken which causes packet loss to occur. This problem
gets amplified when the route consists several such
links. When links break down it causes a series of
undesirable events and outcomes. If the duration of
operability of the link can be predicted, then the routing
protocol can use this to an advantage. Every link can be
connected to for a limited amount of time, called link
life time (LLT), and the life time of a route, called route
life time (RLT). The RLT in turn depends of the LLT
which is taken to be the lowest LLT. The increase of the
degree of mobility causes the LLTs to decrease which
eventually causes the RTL to decrease. This causes the
increase of packet loss and low throughputs.
The protocols are composed of two main mechanisms:
a) Route Discovery is the mechanism by which a source
node S, attempting to send data packets to a destination
node D, discovers a route to node D.
b) Route Maintenance is the mechanism by which nodes
detect and locally repair any broken route that had been
initially discovered and established by the route
discovery mechanism.
Advantage:
This
algorithm
guarantees
the
communication path from source to destination in a
network by limiting the maximum route count to hopcount under the bound limit.
B. Mobility-Adaptive Protocols for Managing Large Ad
hoc Networks: The paper proposes a new protocol for
efficiently managing large ad hoc networks, i.e.,
networks in which all nodes can be mobile. Since nodes
in such networks are not necessarily equal in that they
Advantage: The algorithm presented utilizes
mobility to decrease the packet loss in the network.
Thus, the proposed algorithm makes an estimate of the
ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
99
International Journal on Advanced Computer Theory and Engineering (IJACTE)
may have different resources, not all of them should be
involved in basic network operations such as packet
forwarding, flooding, etc. In the proposed protocol, a
small subset of the network nodes is selected based on
their status and they are organized to form a backbone.
The protocol is thus named backbone-protocol or Bprotocol. Here each node is capable of monitoring a
given surrounding area (sensing), and coordinating with
the other nodes in the wireless network to achieve a
larger sensing task. Here rather than considering each
node in the network equally, an efficient management of
network resources can be obtained by deploying only a
subset of the network nodes. Only those nodes whose
local status allows them to guarantee reliable
communication among them, and with any other node,
will be selected to form a network dynamically
superimposed over the flat network.
more radio interference, channel contention, and energy
consumption, which may seriously degrade the
utilization of the network resources. Therefore, to
achieve the desired network performance, it is necessary
to investigate the property of node mobility and its
effect on topology dynamics of MANETs. The topology
dynamics is investigated by analyzing two key topology
metrics: expected link lifetime and expected link change
rate.
Advantage: The topology is based on the
assumption of smooth mobility model wherein the
mobile nodes smoothly change their velocity of
movement avoiding the random behavior of movement.
The expected link lifetime and expected link change
rate gives us the rate of change of links and the link’s
life time thus allowing the topology matrices to be
utilized to estimate network connectivity.
The proposed B-protocol comprises two major
tasks. B-nodes selection, to select the backbone nodes
(B-nodes).These nodes are in charge to “serve” all the
other non selected nodes (we term these nodes F-nodes,
i.e., nodes that belong to the flat network and not to the
B-network). B-links establishment, where backbone
links (B-links, i.e., links among the B-nodes) are
established so that the resulting B-network is always
connected.
D. Analyzing the Impact of Mobility in Ad hoc
Networks: The paper shows how the mobility of a node
impacts the ad hoc networks. Since not so many
MANETs have been deployed yet, most of the research
in this area is based on simulations. Among the
multitude of simulation parameters (traffic and
communication pattern, mobility model, propagation
model, etc.), the mobility model has a major impact on
the link and route lifetime distribution, and therefore
also on the protocol and application performance.
Hence, for an efficient design of MAC and network
protocols, one has to understand the impact of the node
mobility on the link and route lifetimes.
Advantage: The task of selecting the B-node is
performed at each node based on a node’s own weight.
The highest the weight of a node, the more suitable that
node is for being a B-node.
C. Analyzing Topology Dynamics in Ad hoc Networks
Using a Smooth Mobility Model: The topology
dynamics based on a smooth model is analyzed, because
it generates smooth nodal movements, has no speed
decay problem, and maintains a uniform spatial node
distribution. Two topology metrics are studied expected
link lifetime and expected link change rate by using a
distance transition probability matrix P, in which an
element represents the distance change between two
neighboring nodes. The existence of a link based on the
present distance between a pair of nodes and their
relative speed.
This paper studies and analyzes the impact of
human mobility on the link and route lifetime
distributions in a real MANET. The collected data from
this test network is used to analyze the impact of human
mobility on the link and route lifetimes. However, the
lifetime of links and routes is not only determined by
user mobility but also by different sources of failures
like packet collisions, or interference from any sender
emitting at the same frequency band. In the absence of
motion or location detection sensors, it is not directly
possible to distinguish with IEEE 802.11b hardware
between link failures due to human mobility or due to a
collision/interference failure.
In mobile ad hoc networks (MANETs), node
mobility induces the network topology to change
randomly and rapidly at unpredictable times which
cause the network topology to be vulnerable to frequent
link failure and network partitioning, thus could incur
substantial routing overhead, excessive transmission
delay and packet loss among mobile nodes. Hence, in
order to design mobility resilient MANET, a solution is
to enlarge the transmission range of the mobile wireless
devices for reducing the network topology change rate.
However, by this way, the mobile nodes would suffer
To solve this problem, a statistical framework is
developed which allows for analyzing the link and route
lifetimes while distinguishing between the two causes of
failures.
Errors and errors due to mobility, and determine the
distribution of each error type.
There are two statistical view points to look at link
and route lifetimes:
ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
100
International Journal on Advanced Computer Theory and Engineering (IJACTE)
a)
The total lifetime of a link or route describes the
time interval between the moment the link (or
route) appeared until it breaks.
because it retains no knowledge concerning its past
locations and speed values. The current speed and
direction of an MN is independent of its past speed and
direction. This characteristic can generate unrealistic
movements such as sudden stops and sharp turns
b) The residual lifetime represents the time interval
between a sample moment after the creation until
the link or path breaks
b) Random Waypoint Mobility Model: This model
includes pause times between changes in destination and
speed. An MN begins by staying in one location for a
certain period of time (i.e., a pause time). Once this time
expires, the MN chooses a random destination in the
simulation area and a speed that is uniformly distributed
between [minspeed, maxspeed]. Speed of the MN in the
figure is uniformly chosen between 0 and 10 m/s. The
movement pattern of an MN using the Random
Waypoint Mobility Model is similar to the Random
Walk Mobility Model if pause time is zero.
From an application or user perspective, it is more
interesting to look at the residual lifetime since
communication starts at arbitrary moments and not
necessarily when a new route becomes available.
General Framework for Residual Lifetimes: To
determine the impact of mobility, the possible failure
reasons are separated into two classes:
a) Failures which are due to node mobility and
b) Failures which are independent of node mobility like
collisions or interference.
c) Random Direction Mobility Model: This model forces
MNs to travel to the edge of the simulation area before
changing direction and speed. The Random Direction
Mobility Model was created to overcome density waves
in the average number of neighbors produced by the
Random Waypoint Mobility Model. A density wave is
the clustering of nodes in one part of the simulation
area. In the case of the Random Waypoint Mobility
Model, this clustering occurs near the center of the
simulation area. In the Random Waypoint Mobility
Model, the probability of an MN choosing a new
destination that is located in the center of the simulation
area, or a destination which requires travel through the
middle of the simulation area, is high. Thus, the MNs
appear to converge, disperse, and converge again
The corresponding failure probabilities are defined as
follows:
a) pn(t) = P[T < t]: The probability that the link between
two nodes breaks due to movement of one of the two
nodes.
b) pl(t) = P[T < t]: The probability that the link between
two nodes breaks due to disturbances from other
devices. They might be packet collisions from other
nodes competing for the wireless channel, or general
interference from other sources sending at the same
frequency.
With these two independent failure probabilities, the
formulation of the overall lifetime probability of a link
is possible.
d) A Boundless Simulation Area Mobility Model: A
model that converts a 2D rectangular simulation area
into a torus-shaped simulation area. In the Boundless
Simulation Area Mobility Model, a relationship between
the previous direction of travel and velocity of an MN
with its current direction of travel and velocity exists
[12]. A velocity vector v = (v;q) is used to describe an
MN’s velocity v as well as its direction q; the MN’s
position is represented as (x; y). Both the velocity vector
and the position are updated at every Dt time steps
according to the following formulas:
E. Special issue on mobile ad hoc networking;
Research, trends and applications: This paper is a
survey of mobility models that are used in the
simulations of ad hoc networks. Several mobility
models that represent mobile nodes whose movements
are independent of each other (i.e., entity mobility
models) and several mobility models that represent
mobile nodes whose movements are dependent on each
other (i.e., group mobility models) are described. The
goal of this paper is to present a number of mobility
models in order to offer researchers more informed
choices when they are deciding upon a mobility model
to use in their performance evaluations
v(t +Dt) = min[max(v(t)+Dv;0);Vmax];
q(t +Dt) = q(t)+Dq;
x(t +Dt) = x(t)+v(t) _ cosq(t);
y(t +Dt) = y(t)+v(t) _ sinq(t);
Seven different synthetic entity mobility models for ad
hoc networks are discussed:
where, Vmax is the maximum velocity, Dv is the change
in velocity which is uniformly distributed between [Amax *Dt; Amax *Dt], Amax is the maximum
acceleration of a given MN, Dq is the change in
direction which is uniformly distributed between [-a *
a) Random Walk Mobility Model (including its many
derivatives): It is a simple mobility model based on
random directions and speeds. The Random Walk
Mobility Model is a memory less mobility pattern
ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
101
International Journal on Advanced Computer Theory and Engineering (IJACTE)
Dt;a * Dt], and a is the maximum angular change in the
direction.
b) Mobility Algorithm: The algorithm solves the
mobility related routing problems in the following four
steps:
III. METHODOLOGY
1. Source estimates a minimum threshold link lifetime:
In any on-demand routing protocol, routes that are used
for sending data packets are discovered based on some
requirements (i.e., routing metrics). In the proposed
mobility scheme, the source uses a minimum threshold
link life time (TLLT) to discover more stable links and
routes. The source estimates TLLT based on the nature
of mobility. Unlike highway, random mobility scenario
prevails in urban area. Routes in a highway mobility
scenario are more stable compared to routes in a random
mobility scenario. Thus, TLLT can be set higher for
highways compared to a random mobility scenario.
TLLT in a random mobility scenario can be set higher
for low speeds compared to high speeds.
In order to reduce packet loss due to link failures,
mobility needs to be integrated in routing protocols.
This integration needs to be independent of routing
protocols to have an effective solution. The scheme is
based on an efficient use of the duration of connectivity
of two neighboring nodes in a route known as the link
life time (LLT).
The scheme makes use of the following methods in
order to implement the proposed methodology:
2. Using TLLT in route discovery process to detect
unstable routes: In case of any on-demand routing
protocol, whenever the source has a packet to send, it
searches a route in the route cache. If there is no route
available in the cache, the node sends a route discovery
packet to a desired destination. Here the source sends
TLLT in the route discovery packet.
Each node along the path toward the destination
calculates its own LLT with the previous node, and
compares the calculated LLT with the TLLT in the
packet. If the calculated LLT is greater than the TLLT
of the packet, this node becomes a part of the route.
3. Determination of route life time: It is essential to
estimate the duration “route life time (RLT)”. It is
defined as the duration of the liveliness of any route. All
the nodes in any route have their own LLTs, and the
node with the lowest LLT has higher probability of
breaking the route. So, the lowest LLT in any route is
the RLT. RLT is given by
RLTnet = RLT– troute.
4. Algorithm for reducing packet loss due to mobility
using RLT: The route discovery process with mobility
Figure: A scenario for calculating LLT
ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
102
International Journal on Advanced Computer Theory and Engineering (IJACTE)
assisted routing is explained in Step 3. Whenever there
is packet to send, the source finds a route from the route
cache, and sends an estimated number of packets that
the respective route is able to deliver before breaking.
Latency between source and destination, troute, is
important as well. That is needed to estimate the number
of packets that can be sent by the source to the
destination. Let us assume Nest be the estimated number
of packets to be sent through that route, and given by
b) AODV retains the desirable feature of DSR that
routes are maintained only between nodes which need to
communicate.
Nest = RLTnet/ troute .
2) The mobility of a ad-hoc network can be extended to
a large extent without causing much increase in latency
due to the retransmission of packets dropped.
V. APPLICATIONS
1) The proposed system can be used to reduce the data
lost due to unavoidable dropping of packets from the
network when nodes are mobile.
The selected route remains alive during RLT net, and
within this RLTnet, the source will be able to send
approximately Nest number of packets. If the source
sends more than Nest packets, the additional packets
have higher probability of getting lost. After finding
Nest, the packets are sent in order. If there are more
packets to be sent, the source finds an alternative route
from the route cache, and repeats the process for this
route by calculating its Nest. If there is no route
available in the route cache, the source starts the route
discovery process.
VI. CONCLUSION
This algorithm increases network throughput and
packet delivery rate. This algorithm applicable to any
on-demand routing protocol. The algorithm is
implemented in Ad hoc On-demand Distance vector
(AODV) protocol and in simulated in Network
Simulator-2.
VII. REFERENCES
Algorithm for routing integrated with mobility is shown
below:
IV. ENCHANCEMENTS
[1]
R.S. Chang, and W.W. Chen, “Mobility Assessment
On-Demand (MAOD) Routing Protocol for Mobile Ad
hoc Networks”, Journal of Wireless Communications
& Mobile Computing, Pages: 369 – 381, Vol. 4, Issue
4, Jun 2004, ISSN: 1530-8669.
[2]
M. Pascoe, J. Gomez, V. Rangel, and M. LopezGuerrero, “An Upper Bound on Network Size in
Mobile Ad Hoc Networks”, Proc. of IEEE
GLOBECOM, Pages 314-319, New Orleans, Nov
2008.
[3]
S. Basagni, D. Turgut, and S.K. Das, “MobilityAdaptive Protocols for Managing Large Ad hoc
Networks”, Proc. of IEEE International Conference on
Communications, Pages 1539-1543, Vol. 5, 2001.
[4]
M. Zhao, and W. Wang, “Analyzing Topology
Dynamics in Ad hoc Networks Using a Smooth
Mobility Model”, Proc. of IEEE WCNC, Pages 32793284, Kowloon, Hong Kong, Mar 2007.
[5]
D. B. Johnson, and D. A. Maltz, “Dynamic Source
Routing in Ad hoc Wireless Networks”, Mobile
Computing, Eds. Kluwer Academic Publishers, Pages
153-181, Vol. 353, 1996.
[6]
T. Camp, J. Boleng, and V. Davies. “A Survey of
Mobility Models for Ad Hoc Network Research”. In
Wireless Communications and Mobile Computing
(WCMC): Special issue on mobile ad hoc networking:
research, trends and applications, volume 2, pages
483–502, 2002.
[7]
V. Lenders, and J. Wagner, “Analyzing the Impact of
Mobility in Ad hoc Networks”, Proc. of REALMAN,
Pages 39-46, Florence, Italy, May 06.
Previous papers have used the Dynamic Source
Routing protocol in creating a solution for the problem
defined, whereas in this paper we have used the AODV
routing protocol.
Advantages of AODV
a) AODV attempts to improve on DSR by maintaining
routing tables at the nodes, so that data packets do not
have to contain routes.
ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
103
Download