ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

A Survey on Various Routing Protocols for Geographic Routing and Predicting Node Lifetime in MANET

S.Priyadarshini1, Prof.A.Alice Gavya2
  1. PG Scholar, Department of Computer Science and Engineering, Kalaignar Karunanidhi Institute of Technology Coimbatore, India
  2. Assistant Professor, Department of Information Technology, Kalaignar Karunanidhi Institute of Technology Coimbatore, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering

Abstract

Mobile Ad Hoc Networks is a self-configuring infrastructureless network of nodes connected through wireless link. Each node in the network can act as router as well as host. The data transfer from source to destination is performed by the intermediate nodes through the routing process. The routing table maintains a record of routes to various destinations in the network. Permanent topology could not be maintained as the nodes in MANET moves without giving any notice to its cooperative nodes and these changes may significantly reduce the performance of a routing protocol.Every node in the MANET is normally power-driven by batteries which have restricted energy reservoir. It becomes very challenging to restore or replace the battery life of nodes which involves in routing in such circumstances energy conservation is critical. So the lifetime and energy consumption of mobile nodes becomes a significant issue in transmission. Hence, a measurement study is performed on several routing protocols.

Keywords

Topology; Routing protocol; Geographic routing; Mobile Ad hoc Network (MANET)

INTRODUCTION

Mobile Ad Hoc network is a collection of mobile nodes which can communicate with each other forming an infrastructure less network. The communication between various nodes can be achieved using multi hop wireless links, since the base stations are absent. Nodes maintain routing information in the routing table for data forwarding.The mobile nodes can be turned on or off at any time without reporting other nodes as they move randomly. In order to preserve the routing information, the nodes need to track the topological changes that take place in the network. The applications of MANETs are military operations, emergency rescue operations, disaster recovery etc. Several protocols have been developed for MANETs such as (Destination Sequenced Distance Vector) DSDV, (Dynamic Source Routing) DSR, (Ad hoc On Demand Routing) AODV, (Optimized Link State Routing) OLSR, (Greedy Perimeter Stateless Routing) GPSR, (Location Aided Routing) LAR. This paper aims to discover the various energy efficient routing protocols like AODV and DSRfor evaluating energy with respect to network size considering the remaining battery power [1]. It also concentrates on the consumption of mobile node in the network in order toincrease the node life time.
The important features of MANET nodes are frequent link breakage and use of constraint resources like bandwidth, computing power, battery lifetime. Communication channel is highly insecure as it is wireless. Overhearing and concealing can be done easily. Routing protocols are highly sophisticated due to non-fixed topology and it is quite challenging to secure such protocols in the presence of hostile nodes. All nodes have similar features and capabilities forming a symmetric environment. The control and management of mobile ad hoc network is shared among the nodes that are involved in participation.
The two major routing approaches in MANET are topology based routing and position based routing.Topology-based routing protocols use link information in which the details about the paths is maintained and routes are established based on the link information in the network. Position based routing protocols or geographic routing approaches rely on physical location information of nodes. Thus, it is necessary for nodes to obtain their coordinates either by using a location servicesuch as GPS or other types of positioning services [15].

II. LITERATURE SURVEY

Data communication problems in Ad hoc networks includeRouting wheremessage is sent from a source to a destination.Broadcastingwhichfloods a message from a source to all other nodes in the network. Multicastinginwhich message from a source is sent to a set of appropriate destinations. In geocastingamessage is sent from a source to all nodes inside a geographic region, andLocation updatingmaintains accurate information about the location of other nodes [12]. The purpose of each protocol, in an ad-hoc network, is to find effective routes between two communicating nodes [11]. Various categories of protocols are reactive protocol, proactive protocol, flow oriented protocol, hierarchical protocol and hybrid protocol.
A. Reactive protocol
Reactive protocol also called as on demand routing protocol is based upon query–reply dialog and is used in most cases. Examples for reactive protocols are AODV, DSR, etc. It consumes more time to find routes and network obstruct can cause flooding.
1) Ad-hoc On-Demand Distance Vector Routing
AODV is an on demand routing protocol [10] which establishes routes and connection when needed to reduce traffic overhead. AODV is a combination of DSR and DSDV routing protocols. It derives the mechanism of route discovery and route maintenance from DSR protocol, along with the use of sequence number, hop by hop routing, and episodic beacons from DSDV. AODV maintains routing tables on the nodes as an alternative to header in the data packet. The source node initiates route discovery process by sending a route request(RREQ) to the neighbor nodes and an intermediate node sends route reply (RREP) if it knows a recent path than the one known by the sender node to the destination.
A destination sequence number indicates the recent path is as follows, a route request by sender node is given a higher sequence number and lower sequence number to node that does not know destination and cannot send RREP. Forward links are setup when these RREP moves back along the path of RREQ. So the routing table entries send the data packet and the route is not included in the packet header. Error message is passed when link fails and repeats the process.
2) Dynamic Source Routing
DSR is a reactive routing protocol designed for use in multi hop wireless Ad hoc networks. A node in the network finds the routes when needed and maintains the routing information in the routing table. In this protocol the mobile nodes need to maintain the route caches. The routes are stored in a route cache to reduce the number of control messages to be sent by updating the new routes. Route Discovery is a mechanism that obtains a route.
Route Maintenance is used to detect route if the network topology is altered. Initially when a node wants to communicate with another node, it issues a Route Request (RREQ) to all its neighbor nodes. Each node receiving the RREQ packets retransmits it unless it discovers the target node. The target node replies to the RREQ message with a route reply (RREP) packet. The RREP packet takes the traverse path back to the source node established by the RREQ packet. This route is kept in the source node cache for further communication. If a nodes link is broken the source node is informed by a route error (RERR) packet and is discarded from the route cache.
3) Location Aided Routing Like DSR, LAR is an on-demand source routing protocol similar to DSR. The main difference between LAR and DSR is that LAR sends location information in all packets to (hopefully) decrease the overhead of a future route discovery. In DSR if the neighbors of Source S do not have a route to Destination D then S floods the entire ad hoc network with a route request packet for D[14]. LAR uses location information for mobile nodes by the Global Positioning System (GPS)which knows the location to flood a route request packet for D in a forwarding zone instead of in the entire ad hoc network.
B. Proactive protocol
In proactive protocol all the nodes maintains the list of information about the next node through routing tables. The entire nodes constantly update their position in order to send the data packet from one node to the other node after mutual agreement. Hence the source node does not need route discovery to find a route to destination. Example for proactive protocol is DSDV. In case of failure it causes slow reaction and needs required amount of data for maintenance.
1) Destination Sequenced Distance Vector
Nodes maintain routing table which stores next hop, cost metric towards each destination, and a sequence number that is created by the destination. Each node increments and appends its sequence number when sending its local routing table, routes with greater sequence numbers are preferred. When a node decides that a route is broken, it increments the sequence number of the route.
2) Optimized Link State Routing
OLSR is a proactive routing protocol which uses hello and topology control messages to discover and broadcast link state information. Individual nodes use topology information to perform hop destinations. The main uses are energy saving, node interference reduction and network lifetime expansion. The administrator has some control and can change topology by modifying the parameters like state (active or stand by) of thenodes, role of the nodes and transmission power of nodes.
C. Flow-Oriented protocol
Flow-Oriented protocol finds routes on demand by following present flows. One option is to unicast successively when forwarding data while promoting a new link. Finding new routes without prior knowledge takes a long time and causes traffic to compensate for missing knowledge on routes.
D. Hierarchical protocol
The routing starts with proactively prospected routes and serves demand for additional routes on reactive flooding.
E. Hybrid protocol
Hybrid protocol is a combination of proactive and reactive routing and it is based upon distance vector protocol but contain many features and advantage of link state protocol. Hybrid protocol enhances interior gateway routing protocol. In this protocol controlling traffic depends on traffic volume
F. Greedy Perimeter Stateless Routing
GPSR uses packet destination and position of routers to make packet forwarding. It makes forwarding using routers through immediate neighbors in the network. GPSR is based on greedy and perimeter forwarding where all packet headers include a field indicating whether it uses greedy or perimeter mode.
1) Greedy Forwarding:
The greedy choice in selecting next hop of a packet is done if a node knows the radio neighbors position by geographic hops to reach destination. If there is only one route to a destination then the data packet moves temporarily farther in a geometric distance from destination. If there are no closer nodes, it uses Perimeter forwarding
2) Perimeter Forwarding
This method is used in regions where greedy forwarding is not feasible. It forwards the packets by constructing planar graph called Gabriel graph which is constructed using vertices and edges. The graph contains interior and exterior faces. Interior face is boundary close to graph while the Exterior face is boundary outside the graph [4].

III.GEOGRAPHIC ROUTING

Geographic routing is based on position of a location where source sends location message to destination rather than address of the network. For the forwarding strategy [5], the geographic routing maintains the position of final destination of packet and the position of a node’s neighbor.The previous can be obtained by querying a location service such as the Grid Location System (GLS) [6] or Quorum [7]. In GLS each node acts location server to track the node locations. It maintains tables which contain node ID and nodes geographic location.In latter, each node exchanges its own location information obtained by using GPS or the localization schemes [8] with its neighboring nodes. Hence every node builds a local map within its locality referred to as the local topology.

IV. NODE LIFETIME PREDICTION ALGORITHM

Most of the research work is based on node lifetime and history activities to improve the energy level of nodes which involves in routing. Operational lifetime is therefore defined as the time until the network partitioning occurs due to battery outage [9].
A)Active Mode (or Transmit Mode):This is the mode in which transmission and receiving takes place simultaneously using enormous amount of power.
B) Doze Mode (or Receive Mode):In this the CPU is capable of processing information and receiving message notifications from other nodes and listening to broadcasts is performed.
C) Sleep Mode (or Standby Mode):In this the CPU remains idle without performing any processing, where the remains in inactive state. Initially the energy of nodes is set to any random value. All the modes are set to a specific value. And if the node is within the particular range it is made to participate.
Chen [2] have proposed energy-efficient AODV for Low mobility Ad hoc Networks, in which the node energy consumption of the overall network is reduced by dynamically controlling the transmission power by utilizing a novel route cost metric.
Wattenhofer [3] have proposed Distributed Topology control for power efficient operation in multi hop wireless Ad Hoc networks can be controlled by varying the transmission power of each node. A distributed algorithm is proposed where each node makes local decisions about its transmission power and these local decisions collectively guarantee global connectivity.
If there are two nodes that have the same outstanding energy level, a node that is used in most of the data-forwarding paths consumes energy easily, and thus, it has a shorter lifetime compared to the remaining inactive node. The node lifetime relies on its current residual energy and its past activity solution that does not need to compute the predicted node lifetime from each data packet. An exponential weighted moving average method is used to calculate the energy drain rate evi.
Eirepresents the current outstanding energy of the node i, and eviis the rate of energy reduction. Ei is obtained online from a battery management instrument, and evi is the arithmetical value obtained from recent history.Evi nis the estimated energy drain rate in the nth period. The estimated energy drain rate in the nth period, and ev(n−1) is the estimated energy drain rate in the previous (n − 1)th period. αdenotes the coefficient that reveals the relation between evnandev(n−1), and it is a constant value using a range of (0, 1) [13]. Tnis the time in nth second.Ei nTis the energy in nth second at time T.
The node lifetime can be obtained at a time t as

V. CONCLUSION

The challenges and basic concepts behind various routing in MANETs are studied. The AODV protocol is better compared to other protocols since it establishes route only when needed and preserves lifetime of nodes.The applications are expected to expand in the future communication environments. The support for QoS based routing will be an important and desired factor. Several important research issues and open questions need to be addressed to facilitate QoS support in MANETs. Capability estimation, route discovery, route maintenance and possible path selection are studied. A study is also made on how to increase the lifetime of nodes in MANET for better forwarding.

References