ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Performance Evaluation of Dynamic Networks Using EQOS Protocol

C.Chandralekha1, L.Priyadharshini2
  1. III- M.E, Dept of CSE, Karpagam University, Coimbatore, India
  2. Assistant Professor, Dept of CSE, Karpagam University, Coimbatore, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering

Abstract

A mobile ad-hoc network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless links. No base stations are supported in such an environment. Due to node mobility in MANETs, frequent link breakages may lead to frequent path failures and route discoveries. It increases the overhead of routing protocols which reduces the packet delivery ratio and also increases the end-to-end delay. Thus, reducing the routing end-to-end delay in route discovery is an essential problem. The conventional on demand routing protocols use flooding to discover a route. They broadcast a Route Request (RREQ) packet to the networks, and the broad casting induces excessive redundant retransmissions of RREQ packet. In this paper the EQOS protocol handles the routing issues for packets associated with mobile nodes. This paper focuses on this scheme by presenting the background of mobile ad hoc networks, ad-hoc robot wireless communications. This innovation can reduce delay in delivery of packets while maintaining a high quality of service.

Keywords

AdHoc Network, broadcast storm, MANET, AODV , RREQ

INTRODUCTION

Mobile Ad Hoc Networks (MANETs) consists of a collection of mobile nodes which are not bounded in any infrastructure. Nodes in MANET can communicate with each other and can move anywhere without restriction. This non-restricted mobility and easy deployment characteristics of MANETs make them very popular and highly suitable for emergencies, natural disaster and military operations. Efficient, dynamic routing is one of the key challenges in mobile ad hoc networks. It consist both mobile and stationary nodes which has low-power, densely distributed, energy constrained stationary sensors, which are able to form MAC level connections and Network level multi-hop routes at runtime .
MANETS rely on wireless transmission, a secured way of message transmission is important to protect the privacy of the data. An insecure ad-hoc network at the edge of communication infrastructure may potentially cause the entire network to become vulnerable to security breaches. There is no central administration to take care of detection and prevention of anomalies in Mobile ad hoc networks. Mobile devices identities or their intentions cannot be predetermined or verified. Therefore nodes have to cooperate for the integrity of the operation of the network. However, nodes may refuse to cooperate by not forwarding packets for others for selfish reasons and not want to exhaust their resources. Various other factors make the task of secure communication in ad hoc wireless networks difficult include the mobility of the nodes, a promiscuous mode of operation, limited processing power, and limited availability of resources such as battery power, bandwidth and memory. Therefore nodes have to cooperate for the integrity of the operation of the network. Nodes may refuse to cooperate by not forwarding packets for others for selfish reasons and not want to exhaust their resources.

RELATED WORK

In [1] authors used the performance analysis of an adaptive probabilistic counter-based scheme (or APCS for short) for broadcasting in mobile ad hoc networks that further mitigate the broadcast storm problem associated with flooding under increased node density and traffic rate. APCS adapts it RAD (random assessment delay) value to network congestion level and uses packet origination rate as an indicator of network congestion by keeping track of the number of packets received per second at each node.Simulation results reveal that this simple adaptation minimizes end-to-end delay and maximizes delivery ratio, and thus achieves superior performance in terms of saved rebroadcast, end-to-end delay and reachability over the other schemes. There are couple of areas worth investigating. One area in which we see the potential for even further improvement is to make the adaptation of the RAD value to other network parameters like number of neighbors, node speed and transmission range. Another area for future work is to explore further the performance of the scheme under combined network conditions (i.e. density, mobility and congestion together) . In [2] authors have demonstrated, through analyses and simulations, how serious broadcast storm problem could be. Several schemes, namely probabilistic, counter-based, distance-based, location-based, and cluster-based schemes, have been proposed to alleviate this problem. Simulation results based on different threshold values are presented to verify and compare the effectiveness of these schemes. The authors in [3] propose a probabilistic broadcasting based on coverage area and neighbor confirmation in mobile ad hoc networks the coverage area of a node to adjust the rebroadcast probability. If a mobile node is located in the area closer to sender, which means it has small additional coverage and rebroadcast from this node can reach less additional nodes, so its rebroadcast probability will be set lower. On the other hand, if a mobile node is located in the area far from sender, which means that the additional coverage from this node is large, its rebroadcast probability will be set higher. The coverage area can be estimated from the distance between sender and receiver and the distance can be estimated by signal strength or global positional system. Our approach combines the advantages of probabilistic and area based approach. Simulation results show that our approach can improve the average performance of broadcasting in various network scenarios. Our approach is simple and can be easily implemented in MANET. [4] Blind flooding is extensively use in ad hoc routing protocols for on-demand route discovery, where a mobile node blindly rebroadcasts received Route Request (RREQ) packets until a route to a particular destination is established.
This can potentially lead to high channel contention, causing redundant retransmissions and thus excessive packet collisions in the network. Such a phenomenon induces broadcast storm problem, which has been shown to greatly increase the network communication overhead and end-to-end delay. Authors show that the deleterious impact of such a problem can be reduced if measures are taken during the dissemination of RREQ packets .They propose a generic probabilistic method for route discovery, that is simple to implement and can significantly reduce the overhead associated with the dissemination of RREQs. The analysis reveals that equipping AODV with probabilistic route discovery can result in significant reduction of routing control overhead while achieving good throughput. In [5] authors present RBP, a very simple protocol that bolsters the reliability of broadcasting in such networks. This protocol requires only local information, and resides as a service between the MAC and network layer, taking information from both. RBP improves reliability while balancing energy efficiency. In [6] authors show that in a network with n randomly placed nodes, each node should be connected to _(log n) nearest neighbors. If each node is connected to less than 0.074 log n nearest neighbors then the network is asymptotically disconnected with probability one as n increases, while if each node is connected to more than 5.1774 log n nearest neighbors then the network is asymptotically connected with probability approaching one as n increases. It appears that the critical constant may be close to one, but that remains an open problem.
A. Description of the Proposed Algorithm:
image

PSEUDO CODE

Step 1 : S-> Computes an initial neighbor set {node(i),node(j),….node(N)}
Step 2 : RREQ -> S(id), N(S), Flag.
Step 3 : If node(i) receives a new RREQ from S then the node(i) covers that neighbors and also the Source’s neighbors.
CN{node(i)}= {node(j),etc}
[N(node(i)) INTERSECT N(S)]-{S}
Step 4 : It transmits the RREQ to the uncovered neighbors.
UN = N(node(i)),N(S)
RREQ -> UN
Step 5 : To set the Timer
If node(i) receives a duplicates RREQ from node(j) before Timer expires Then
Discard(RREQ(j))
Step 6 : Tpdr = RD/TD * 100 ;
Step 7 : Compute Rebroadcast Delay Ta[node(i)] = T(RD) - T(TD)
Step 8: End.

SIMULATION RESULTS

The simulation is conducted using the Network Simulator NS2. The simulation parameters are tabulated in Table 1 .
To implement the proposed mechanism the source code of AODV is enhanced in NS-2 . When a neighbor receives an RREQ packet, it could calculate the rebroadcast delay according to the neighbor list in the RREQ packet and its own neighbor list. The rebroadcast probability would be low when the number of neighbor nodes are high which means host is in dense area The probability would be high when the number of neighbor nodes are low which means host is in sparse area. We are considering the duplicate packet while transferring the RREQ. So we can avoid the overhead in rebroadcasting .
The simulation is done for the comparison of Delay for AODV and EQOS protocol whose result is shown in Figure 2.

CONCLUSION AND FUTURE WORK

A EQOS based protocol is a neighbor coverage to reduce the average end-to-end delay in MANETs. This protocol includes additional coverage ratio and connectivity factor. To dynamically calculate the rebroadcast delay, we determine the forwarding order and more effectively exploit the neighbor coverage knowledge. Simulation results show that the proposed protocol generates less rebroadcast traffic than the flooding and some other optimized scheme in literatures. Because of less redundant rebroadcast, the protocol mitigates the network collision and contention decrease the average end-to-end delay. The simulation results also show that protocol has good performance when the network is in high density or the traffic is in heavy load. This protocol can be enhanced so as to increase the Packet delivery ratio and reduce the overhead.
 

Tables at a glance

Table icon
Table 1
 

Figures at a glance

Figure 1 Figure 2
Figure 1 Figure 2
 

References