SlideShare a Scribd company logo
Indonesian Journal of Electrical Engineering and Computer Science
Vol. 8, No. 3, December 2017, pp. 674 ~ 678
DOI: 10.11591/ijeecs.v8.i3.pp674-678  674
Received August 12, 2017; Revised October 29, 2017; Accepted November 18, 2017
Simulation Analysis for Consistent Path Identification
to Refine the Network Lifetime
G Vennila
Department Of Information Technology, AMET University, Chennai
Abstract
As the demand for Mobile Ad hoc Network (MANET) applications grows, so does their use of
many essential services where node consistent and stability of the communication paths are of great
importance. In this scheme, we propose Simulation Analysis for Consistent Path Identification to Refine the
Network Lifetime (CPIR). This technique offers more stable path and transmits the data through the
consistent nodes. This article is focused on protecting the route from the inconsistent node in mobile
communications to improve the network performance and reduce the energy consumption in the network.
The simulation results demonstrate that CPIR provided reduce the energy utilization and improved both
the longer lifetimes and increased number of packets delivered.
Keywords: Consistent Path, Energy, Lifetime, MANETs
Copyright © 2017Institute of Advanced Engineering and Science. All rights reserved.
1. Introduction
A MANET is a self-organized network with arbitrarily distributed nodes. MANET
applications are not limited to areas such as emergency and crisis management, local-level,
commercial and military battlefield applications [1]. Network users intended for Consistent
delivery of information. But a topological change in MANET leads to Path failure which degrades
the network performance. Routing in MANET has been a challenging task because of the high
degree of node mobility [2]. Using alternative path may resolve this problem. Multiple paths
between source and destination are determined by route discovery [3]. Routing protocol selects
an alternative path based on some metrics such as hop count, a speed of path, time to deliver
content, path reliability, and its bandwidth [4]. Routing protocols in conventional wired networks
use either distance vector or link state routing algorithms, both of which require periodic routing
advertisements to be broadcast by each router [5]. The Traditional shortest path algorithms
work correctly only when all nodes maintain routes to all destinations. However, in on-demand
routing protocols, a node need not maintain routes to all destinations [6].
In MANET single path routing may fail in most of the cases due to frequent node
mobility [7]. Consequently, Multipath routing scheme has been employed. Multiple paths
between the source node and the destination nodes could be found using Multipath routing
protocol and the Secure and Efficient Distance Effect Routing Algorithm for Mobility
(SE_DREAM) in MANETs [8]. These multiple paths make the transmission more consistent and
more efficient. In prevention of Co-operative Black Hole attack in Manet on DSR protocol using
Cryptographic Algorithm is presented in this research paper [9]. To transmit data only best path
is selected among the available paths based on some metric such as delay, bandwidth
availability, delivery ratio, route stability, etc. and the performance analysis of black hole attacks
in geographical routing MANET [10].
2. Related Works
Consistency Evaluation of Mobile Ad Hoc Network [1] considers different mobility
models along with the effect of different scenario metrics and different values of tuning
parameter. The mobility considerations have no significant impaction reliability as the same
results are obtained by just implicitly simulating the node locations. Considering no mobility
models reduces computational burden, some random variables involved making the algorithm
more efficient also reduced the number of random variables. However, this approach considers
IJEECS ISSN: 2502-4752 
Simulation Analysis for Consistent Path Identification to Refine … (G Vennila)
675
only uniform distribution.Bayesian model [2] is used to predict and classify the mobility of a node
in MANETs. The outcome of Bayesian Classifier will help a node control its broadcast process
by which a high mobility node or region is avoided to re-broadcast a request. Established routes
using the proposed model are more stable than routes determined by existing routing strategies.
This model is a distributed algorithm and independent of the mobility pattern. This model
improves the routing performance and reduces flooding problem in MANETs.
Energy Efficiency Optimization scheme [3] using the mixed integer nonlinear
programming (MINLP) formulation by jointly considering routing, traffic scheduling, and power
control. The branch and bound (BB) algorithm to efficiently solve this globally optimal problem.
The BBalgorithm include upper and lower bounding schemes and branching rule that are
designed using the characteristics of the non-convex MINLP problem. This scheme provides
valuable insights into not only the impact of routing strategy, transmission schedule, and power
control. Energy-aware architecture multi-rate protocol [4] investigated the possibility of reducing
energy consumption in 802.11 wireless networks.This scheme increases the network
performance and decreases both the power consumption and control overhead.
Mobility, Energy and Congestion Aware Routing (MECA) [5] to improve routing
performance for MANETs. In this model, a node monitors the mobility, energy consumption and
traffic congestion based on a multi-metric named AEC (constructed by Average Encounter Rate,
Energy Consumption Rate, and Congestion Factor) to choose the most stable, power-rich and
congestion-free path for routing. As a result, packet delivery ratio of the proposed model
improves almost 20% compared to that of original AODV protocol while the number of dead
nodes and routing overheads decreases significantly.
The consistent routing scheme proposed complete routing using offline prediction
algorithms is done. An augmented graph is created AGW (VA, EA) by adding landmarks into
every road segment. The Landmark ID can uniquely identify a vertex on graph AGW, and the
link is determined. The possibility of link duration is determined, and the duration prediction
table can be computed offline once a waypoint graph is given. The waypoint graph and the
analogous duration prediction table can be stored in every mobile node and used repeatedly.
However, more are required for the prediction accuracy, and this leads to increase the time of
computational complexity [6]. CHAMP uses cooperative packet caching and shortest multipath
routing to reduce packet loss due to frequent route failures. The nodes rely on data packet
acknowledgment to determine the link status and whenever the link declared "down" it indicates
the absence of acknowledgment and the packets cannot be routed successfully to the
destination. The alternative path is selected and forwards all affected packets through this
alternative route. If there is no alternative route present, then RERR message is generated and
sent to the base station with header information of all data packets. Every node in CHAMP
maintains a First-In First-Out (FIFO) data cache for storing forwarded packets for future use (6).
Neighbor Coverage Based Probabilistic Rebroadcast (NCPR) was proposed. This protocol
completely relies on preset variables, which are required to be set by the system administrator
based on the ad-hoc scenario. The routing overhead crisis caused by RREQ redundant packets
could be overcome by applying the NCPR protocol. Based on the self-punning scheme, the
number of redundant RREQ messages is reduced relying on all the nodes in the network.
Basically, due to multiple varieties in node deployment, this number is insufficient when the
network is congested [7].
3. Proposed Method
A MANETs consist of some mobile nodes connected by a set of links. In this scheme,
the source communicates the data to the destination through consistent nodes in MANETs. This
routing path provides better packet delivery in the networks.A source wants to transmit the data
to a destination it first checks the routing table.If the destination is obtained in the routing table,
the source node to establish the data transmission or it starts the Route Request (RREQ) to
discover a new route to reach the destination. The destination received the RREQ from the
source via intermediate hops then the destination sends the Route Reply (RREP) through the
source.Owing to the node mobility, breakage of the link may arise, also the node that finds such
an event issues RERR message to its neighbors to notice this breakage.In CPIR, the
intermediate node elected based on the node consistency and residual energy.
 ISSN: 2502-4752
IJEECS Vol. 8, No. 3, December 2017 : 674 – 678
676
In CPIR analyzes the node in the network using Node consistency measure. The period
of every node within communication range is stored in a routing table. It ensures the node
stability of node. Mean duration value provides the average amount of time that node spends in
our range. The consistency calculation depends on Ratio among Mean period of data
transmission rate.
The Node Consistency calculation is given below.
( )
( )
NC t
NodeConsistency NC
T
  (1)
If the node consistency is greater than the threshold that node is consistent. The threshold
value is 0.7
The Route stability is calculated given below.
( )
( )
RS t
RouteStability RS
n
  (2)
Where,
( )RS t  Period of node availability in communication range
T Time Request to transmit the data
n Number of nodes in data transmission path
Figure 1. Consistency based node selection in network
The figure 1 indicate that the first path from the source to the destination is not
reachable since the node is inconsistent and this node has dropped all packets. But the CPIR,
transmit the data through the consistent path. As a result, the source data reach the destination
via consistent nodes in a network.
Throughput: It is the average of successful messages delivered to the destination.The
average throughput is calculated using Equation (6).
0
( )*
1000
n
Pack Received n Pack Size
Throughput 

(6)
Un consistent
node
s
h
b
g
a
f
a
c
i
e
d
Shortest Path
Consistent Path
IJEECS ISSN: 2502-4752 
Simulation Analysis for Consistent Path Identification to Refine … (G Vennila)
677
Residual Energy: The amount of energy remaining in a node at the current instance of time is
called as residual energy. A measure of the residual energy gives the rate at which the network
operations consume energy.
4. Results and Discussion
Evaluation of the protocols NCPR andCPIR is achieved using simulations in the
network simulator. Such simulations use the standard parameters indicated in Table 1.
Performance evaluation of the NCPR, CPIRprotocols are provided by estimating the
Throughput, Residual Energy in the network.
Table 1. Simulation Parameters of CPIR
Parameter Value
Channel Type Wireless Channel
Antenna Type OmniAntenna
MAC type 802.11
Simulation Time 50 s
Number of nodes 50
Routing schemes NCPR, CPIR
Transmission range 250m
Traffic model CBR
Simulation Area 700x700
Mobility Model Random way point
Figure 2. Throughput
Figure 2 shows the performance of throughput of CPIR and NCPR protocols. The
throughput of NCPR is lesser than the CPIR. It represents the increase in efficiency of the CPIR
protocol in the network.
0
5000
10000
15000
20000
25000
0 10 20 30 40 50
NCPR
CPIR
Simulation Time (ms)
Throughput(bps)
 ISSN: 2502-4752
IJEECS Vol. 8, No. 3, December 2017 : 674 – 678
678
Figure 3. Residual Energy
Figure 3 shows the comparison of the residual energy of the CPIR and NCPR. The energy
consumption of CPIR is lower than NCPR, therefore, proposed scheme increase the network
lifetime.
5. Conclusion
We propose a new protocol that allows for the establishment of a stable and consistent
path in MANETs. In CPIR, the intermediate node selected based on the node consistency and
residual energy to improve the network performance. The consistent path selection enhances
the network lifetime and increases the network performance. The simulation analysis results
show that CPIRreduce energy consumption also increases the throughput.
References
[1] Padmavathy N & Chaturvedi SK. Reliability Evaluation of Mobile Ad Hoc Network: With and Without
Mobility Considerations. Procedia Computer Science. 2015; 46: 1126-1139.
[2] Son TT, Le Minh H, Sexton G, Aslam N & Ghassemlooy Z. Bayesian model for mobility prediction to
support Routing in Mobile Ad-Hoc Networks. In 2013 IEEE 24th International Symposium on
Personal Indoor and Mobile Radio Communications (PIMRC), IEEE. 2013: 3186-3190)
[3] Kuo WK & Chu SH. Energy efficiency optimization for mobile ad hoc networks. IEEE Access. 2016;
4: 928-940.
[4] Yahya A. Energy-aware architecture for multi-rate ad hoc networks. Egyptian Informatics
Journal. 2010; 11(1): 33-38.
[5] Tan, Hwee Xian, and W Seah. Dynamic topology control to reduce interference in MANETs.
In Proceedings of Second International Conference on Mobile Computing and Ubiquitous
Networking. 2005.
[6] As Gergely, Levente Buttyan, and Istvan Vajda. Provably secure on-demand source routing in mobile
ad hoc networks. IEEE Transactions on Mobile Computing. 2006; 5(11): 1533-1546.
[7] Ajmal, Ali Mohamed E, Shamala Subramaniam, Zuriati Ahmad Zukarnain, and Zarina Mohd Hanapi.
Neighbor-Based Dynamic Connectivity Factor Routing Protocol for Mobile Ad Hoc Network. IEEE
Access. 2016; 4: 8053-8064.
[8] Shanthi HJ and Anita EM. Secure and Efficient Distance Effect Routing Algorithm for Mobility
(SE_DREAM) in MANETs. In Proceedings of the 3rd International Symposium on Big Data and Cloud
Computing Challenges (ISBCC–16’), Springer International Publishing. 2016: 65-80.
[9] Vennila G, Arivazhagan D & Manickasankari N. Prevention of Co-operative Black Hole attack in
Manet on DSR protocol using Cryptographic Algorithm. International Journal of Engineering and
Technology (IJET). 2014; 6(5): 2401.
[10] Shanthi HJ & Anita EM. Performance analysis of black hole attacks in geographical routing MANET.
2014.
0
0,2
0,4
0,6
0,8
1
1,2
1 2 3 4 5 6
NCPR
CPIR
Simulation Time
ResidualEnergy(j)

More Related Content

What's hot (19)

PDF
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
IJCNCJournal
 
PDF
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
IJCI JOURNAL
 
PDF
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
IJCNCJournal
 
PDF
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
IJCNCJournal
 
PDF
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
IJAAS Team
 
PDF
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
IJCNCJournal
 
PDF
Novel Position Estimation using Differential Timing Information for Asynchron...
IJCNCJournal
 
PDF
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
IJCNCJournal
 
PDF
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
IJCNCJournal
 
PDF
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
IJORCS
 
PDF
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
IJCNCJournal
 
PDF
Modulation aware connection admission control and uplink scheduling algorithm...
ijwmn
 
PDF
A New Efficient Cache Replacement Strategy for Named Data Networking
IJCNCJournal
 
PDF
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...
ijwmn
 
PDF
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
IJECEIAES
 
PDF
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
ijwmn
 
PDF
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
inventionjournals
 
PDF
Performance improvement of vehicular delay tolerant networks using public tra...
ijmnct
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
IJCNCJournal
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
IJCI JOURNAL
 
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
IJCNCJournal
 
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
IJCNCJournal
 
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
IJAAS Team
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
IJCNCJournal
 
Novel Position Estimation using Differential Timing Information for Asynchron...
IJCNCJournal
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
IJCNCJournal
 
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
IJCNCJournal
 
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
IJORCS
 
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
IJCNCJournal
 
Modulation aware connection admission control and uplink scheduling algorithm...
ijwmn
 
A New Efficient Cache Replacement Strategy for Named Data Networking
IJCNCJournal
 
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...
ijwmn
 
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
IJECEIAES
 
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
ijwmn
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
inventionjournals
 
Performance improvement of vehicular delay tolerant networks using public tra...
ijmnct
 

Similar to 21 9149 simulation analysis for consistent path identification edit septian (20)

PDF
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
ijwmn
 
PDF
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
ijwmn
 
PDF
Efficient and stable route selection by using cross layer concept for highly...
Roopali Singh
 
PDF
V.KARTHIKEYAN PUBLISHED ARTICLE A
KARTHIKEYAN V
 
PDF
Improving the scalability by contact information compression in routing
ijitjournal
 
PPTX
Improve MANET network performance using ESPS approach
Surbhi Sharma
 
PDF
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
IJCERT
 
PDF
AN INTEGRATED SECURED ROUTING APPROACH FOR MANETS
IRJET Journal
 
PDF
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
IJCNCJournal
 
PDF
X04505122126
IJERA Editor
 
PDF
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
IRJET Journal
 
PDF
Route Stability in Mobile Ad-Hoc Networks
arpublication
 
PDF
Mobile ad hoc networks – dangling issues of optimal path strategy
Alexander Decker
 
PDF
A2546035115
Prafull Maktedar
 
PDF
A Survey On Secure Cooperative Bait Detection Approach For...
Jennifer Perry
 
PDF
A MIN-MAX SCHEDULING LOAD BALANCED APPROACH TO ENHANCE ENERGY EFFICIENCY AND ...
IJCNCJournal
 
PDF
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
IJCNCJournal
 
PDF
Ijcnc050203
IJCNCJournal
 
PDF
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...
IJCNCJournal
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
ijwmn
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
ijwmn
 
Efficient and stable route selection by using cross layer concept for highly...
Roopali Singh
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
KARTHIKEYAN V
 
Improving the scalability by contact information compression in routing
ijitjournal
 
Improve MANET network performance using ESPS approach
Surbhi Sharma
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
IJCERT
 
AN INTEGRATED SECURED ROUTING APPROACH FOR MANETS
IRJET Journal
 
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
IJCNCJournal
 
X04505122126
IJERA Editor
 
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
IRJET Journal
 
Route Stability in Mobile Ad-Hoc Networks
arpublication
 
Mobile ad hoc networks – dangling issues of optimal path strategy
Alexander Decker
 
A2546035115
Prafull Maktedar
 
A Survey On Secure Cooperative Bait Detection Approach For...
Jennifer Perry
 
A MIN-MAX SCHEDULING LOAD BALANCED APPROACH TO ENHANCE ENERGY EFFICIENCY AND ...
IJCNCJournal
 
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
IJCNCJournal
 
Ijcnc050203
IJCNCJournal
 
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...
IJCNCJournal
 
Ad

More from IAESIJEECS (20)

PDF
08 20314 electronic doorbell...
IAESIJEECS
 
PDF
07 20278 augmented reality...
IAESIJEECS
 
PDF
06 17443 an neuro fuzzy...
IAESIJEECS
 
PDF
05 20275 computational solution...
IAESIJEECS
 
PDF
04 20268 power loss reduction ...
IAESIJEECS
 
PDF
03 20237 arduino based gas-
IAESIJEECS
 
PDF
02 20274 improved ichi square...
IAESIJEECS
 
PDF
01 20264 diminution of real power...
IAESIJEECS
 
PDF
08 20272 academic insight on application
IAESIJEECS
 
PDF
07 20252 cloud computing survey
IAESIJEECS
 
PDF
06 20273 37746-1-ed
IAESIJEECS
 
PDF
05 20261 real power loss reduction
IAESIJEECS
 
PDF
04 20259 real power loss
IAESIJEECS
 
PDF
03 20270 true power loss reduction
IAESIJEECS
 
PDF
02 15034 neural network
IAESIJEECS
 
PDF
01 8445 speech enhancement
IAESIJEECS
 
PDF
08 17079 ijict
IAESIJEECS
 
PDF
07 20269 ijict
IAESIJEECS
 
PDF
06 10154 ijict
IAESIJEECS
 
PDF
05 20255 ijict
IAESIJEECS
 
08 20314 electronic doorbell...
IAESIJEECS
 
07 20278 augmented reality...
IAESIJEECS
 
06 17443 an neuro fuzzy...
IAESIJEECS
 
05 20275 computational solution...
IAESIJEECS
 
04 20268 power loss reduction ...
IAESIJEECS
 
03 20237 arduino based gas-
IAESIJEECS
 
02 20274 improved ichi square...
IAESIJEECS
 
01 20264 diminution of real power...
IAESIJEECS
 
08 20272 academic insight on application
IAESIJEECS
 
07 20252 cloud computing survey
IAESIJEECS
 
06 20273 37746-1-ed
IAESIJEECS
 
05 20261 real power loss reduction
IAESIJEECS
 
04 20259 real power loss
IAESIJEECS
 
03 20270 true power loss reduction
IAESIJEECS
 
02 15034 neural network
IAESIJEECS
 
01 8445 speech enhancement
IAESIJEECS
 
08 17079 ijict
IAESIJEECS
 
07 20269 ijict
IAESIJEECS
 
06 10154 ijict
IAESIJEECS
 
05 20255 ijict
IAESIJEECS
 
Ad

Recently uploaded (20)

PDF
Module - 5 Machine Learning-22ISE62.pdf
Dr. Shivashankar
 
PDF
Artificial Neural Network-Types,Perceptron,Problems
Sharmila Chidaravalli
 
PDF
Tesia Dobrydnia - An Avid Hiker And Backpacker
Tesia Dobrydnia
 
PDF
FSE-Journal-First-Automated code editing with search-generate-modify.pdf
cl144
 
PDF
輪読会資料_Miipher and Miipher2 .
NABLAS株式会社
 
PPTX
Work at Height training for workers .pptx
cecos12
 
PDF
lesson4-occupationalsafetyandhealthohsstandards-240812020130-1a7246d0.pdf
arvingallosa3
 
PPTX
Computer network Computer network Computer network Computer network
Shrikant317689
 
PPTX
ASBC application presentation template (ENG)_v3 (1).pptx
HassanMohammed730118
 
PDF
Python Mini Project: Command-Line Quiz Game for School/College Students
MPREETHI7
 
PDF
Clustering Algorithms - Kmeans,Min ALgorithm
Sharmila Chidaravalli
 
PDF
PROGRAMMING REQUESTS/RESPONSES WITH GREATFREE IN THE CLOUD ENVIRONMENT
samueljackson3773
 
PDF
Generative AI & Scientific Research : Catalyst for Innovation, Ethics & Impact
AlqualsaDIResearchGr
 
PDF
NFPA 10 - Estandar para extintores de incendios portatiles (ed.22 ENG).pdf
Oscar Orozco
 
PPT
FINAL plumbing code for board exam passer
MattKristopherDiaz
 
PDF
Plant Control_EST_85520-01_en_AllChanges_20220127.pdf
DarshanaChathuranga4
 
PPSX
OOPS Concepts in Python and Exception Handling
Dr. A. B. Shinde
 
DOCX
Engineering Geology Field Report to Malekhu .docx
justprashant567
 
PDF
June 2025 Top 10 Sites -Electrical and Electronics Engineering: An Internatio...
elelijjournal653
 
PPT
دراسة حاله لقرية تقع في جنوب غرب السودان
محمد قصص فتوتة
 
Module - 5 Machine Learning-22ISE62.pdf
Dr. Shivashankar
 
Artificial Neural Network-Types,Perceptron,Problems
Sharmila Chidaravalli
 
Tesia Dobrydnia - An Avid Hiker And Backpacker
Tesia Dobrydnia
 
FSE-Journal-First-Automated code editing with search-generate-modify.pdf
cl144
 
輪読会資料_Miipher and Miipher2 .
NABLAS株式会社
 
Work at Height training for workers .pptx
cecos12
 
lesson4-occupationalsafetyandhealthohsstandards-240812020130-1a7246d0.pdf
arvingallosa3
 
Computer network Computer network Computer network Computer network
Shrikant317689
 
ASBC application presentation template (ENG)_v3 (1).pptx
HassanMohammed730118
 
Python Mini Project: Command-Line Quiz Game for School/College Students
MPREETHI7
 
Clustering Algorithms - Kmeans,Min ALgorithm
Sharmila Chidaravalli
 
PROGRAMMING REQUESTS/RESPONSES WITH GREATFREE IN THE CLOUD ENVIRONMENT
samueljackson3773
 
Generative AI & Scientific Research : Catalyst for Innovation, Ethics & Impact
AlqualsaDIResearchGr
 
NFPA 10 - Estandar para extintores de incendios portatiles (ed.22 ENG).pdf
Oscar Orozco
 
FINAL plumbing code for board exam passer
MattKristopherDiaz
 
Plant Control_EST_85520-01_en_AllChanges_20220127.pdf
DarshanaChathuranga4
 
OOPS Concepts in Python and Exception Handling
Dr. A. B. Shinde
 
Engineering Geology Field Report to Malekhu .docx
justprashant567
 
June 2025 Top 10 Sites -Electrical and Electronics Engineering: An Internatio...
elelijjournal653
 
دراسة حاله لقرية تقع في جنوب غرب السودان
محمد قصص فتوتة
 

21 9149 simulation analysis for consistent path identification edit septian

  • 1. Indonesian Journal of Electrical Engineering and Computer Science Vol. 8, No. 3, December 2017, pp. 674 ~ 678 DOI: 10.11591/ijeecs.v8.i3.pp674-678  674 Received August 12, 2017; Revised October 29, 2017; Accepted November 18, 2017 Simulation Analysis for Consistent Path Identification to Refine the Network Lifetime G Vennila Department Of Information Technology, AMET University, Chennai Abstract As the demand for Mobile Ad hoc Network (MANET) applications grows, so does their use of many essential services where node consistent and stability of the communication paths are of great importance. In this scheme, we propose Simulation Analysis for Consistent Path Identification to Refine the Network Lifetime (CPIR). This technique offers more stable path and transmits the data through the consistent nodes. This article is focused on protecting the route from the inconsistent node in mobile communications to improve the network performance and reduce the energy consumption in the network. The simulation results demonstrate that CPIR provided reduce the energy utilization and improved both the longer lifetimes and increased number of packets delivered. Keywords: Consistent Path, Energy, Lifetime, MANETs Copyright © 2017Institute of Advanced Engineering and Science. All rights reserved. 1. Introduction A MANET is a self-organized network with arbitrarily distributed nodes. MANET applications are not limited to areas such as emergency and crisis management, local-level, commercial and military battlefield applications [1]. Network users intended for Consistent delivery of information. But a topological change in MANET leads to Path failure which degrades the network performance. Routing in MANET has been a challenging task because of the high degree of node mobility [2]. Using alternative path may resolve this problem. Multiple paths between source and destination are determined by route discovery [3]. Routing protocol selects an alternative path based on some metrics such as hop count, a speed of path, time to deliver content, path reliability, and its bandwidth [4]. Routing protocols in conventional wired networks use either distance vector or link state routing algorithms, both of which require periodic routing advertisements to be broadcast by each router [5]. The Traditional shortest path algorithms work correctly only when all nodes maintain routes to all destinations. However, in on-demand routing protocols, a node need not maintain routes to all destinations [6]. In MANET single path routing may fail in most of the cases due to frequent node mobility [7]. Consequently, Multipath routing scheme has been employed. Multiple paths between the source node and the destination nodes could be found using Multipath routing protocol and the Secure and Efficient Distance Effect Routing Algorithm for Mobility (SE_DREAM) in MANETs [8]. These multiple paths make the transmission more consistent and more efficient. In prevention of Co-operative Black Hole attack in Manet on DSR protocol using Cryptographic Algorithm is presented in this research paper [9]. To transmit data only best path is selected among the available paths based on some metric such as delay, bandwidth availability, delivery ratio, route stability, etc. and the performance analysis of black hole attacks in geographical routing MANET [10]. 2. Related Works Consistency Evaluation of Mobile Ad Hoc Network [1] considers different mobility models along with the effect of different scenario metrics and different values of tuning parameter. The mobility considerations have no significant impaction reliability as the same results are obtained by just implicitly simulating the node locations. Considering no mobility models reduces computational burden, some random variables involved making the algorithm more efficient also reduced the number of random variables. However, this approach considers
  • 2. IJEECS ISSN: 2502-4752  Simulation Analysis for Consistent Path Identification to Refine … (G Vennila) 675 only uniform distribution.Bayesian model [2] is used to predict and classify the mobility of a node in MANETs. The outcome of Bayesian Classifier will help a node control its broadcast process by which a high mobility node or region is avoided to re-broadcast a request. Established routes using the proposed model are more stable than routes determined by existing routing strategies. This model is a distributed algorithm and independent of the mobility pattern. This model improves the routing performance and reduces flooding problem in MANETs. Energy Efficiency Optimization scheme [3] using the mixed integer nonlinear programming (MINLP) formulation by jointly considering routing, traffic scheduling, and power control. The branch and bound (BB) algorithm to efficiently solve this globally optimal problem. The BBalgorithm include upper and lower bounding schemes and branching rule that are designed using the characteristics of the non-convex MINLP problem. This scheme provides valuable insights into not only the impact of routing strategy, transmission schedule, and power control. Energy-aware architecture multi-rate protocol [4] investigated the possibility of reducing energy consumption in 802.11 wireless networks.This scheme increases the network performance and decreases both the power consumption and control overhead. Mobility, Energy and Congestion Aware Routing (MECA) [5] to improve routing performance for MANETs. In this model, a node monitors the mobility, energy consumption and traffic congestion based on a multi-metric named AEC (constructed by Average Encounter Rate, Energy Consumption Rate, and Congestion Factor) to choose the most stable, power-rich and congestion-free path for routing. As a result, packet delivery ratio of the proposed model improves almost 20% compared to that of original AODV protocol while the number of dead nodes and routing overheads decreases significantly. The consistent routing scheme proposed complete routing using offline prediction algorithms is done. An augmented graph is created AGW (VA, EA) by adding landmarks into every road segment. The Landmark ID can uniquely identify a vertex on graph AGW, and the link is determined. The possibility of link duration is determined, and the duration prediction table can be computed offline once a waypoint graph is given. The waypoint graph and the analogous duration prediction table can be stored in every mobile node and used repeatedly. However, more are required for the prediction accuracy, and this leads to increase the time of computational complexity [6]. CHAMP uses cooperative packet caching and shortest multipath routing to reduce packet loss due to frequent route failures. The nodes rely on data packet acknowledgment to determine the link status and whenever the link declared "down" it indicates the absence of acknowledgment and the packets cannot be routed successfully to the destination. The alternative path is selected and forwards all affected packets through this alternative route. If there is no alternative route present, then RERR message is generated and sent to the base station with header information of all data packets. Every node in CHAMP maintains a First-In First-Out (FIFO) data cache for storing forwarded packets for future use (6). Neighbor Coverage Based Probabilistic Rebroadcast (NCPR) was proposed. This protocol completely relies on preset variables, which are required to be set by the system administrator based on the ad-hoc scenario. The routing overhead crisis caused by RREQ redundant packets could be overcome by applying the NCPR protocol. Based on the self-punning scheme, the number of redundant RREQ messages is reduced relying on all the nodes in the network. Basically, due to multiple varieties in node deployment, this number is insufficient when the network is congested [7]. 3. Proposed Method A MANETs consist of some mobile nodes connected by a set of links. In this scheme, the source communicates the data to the destination through consistent nodes in MANETs. This routing path provides better packet delivery in the networks.A source wants to transmit the data to a destination it first checks the routing table.If the destination is obtained in the routing table, the source node to establish the data transmission or it starts the Route Request (RREQ) to discover a new route to reach the destination. The destination received the RREQ from the source via intermediate hops then the destination sends the Route Reply (RREP) through the source.Owing to the node mobility, breakage of the link may arise, also the node that finds such an event issues RERR message to its neighbors to notice this breakage.In CPIR, the intermediate node elected based on the node consistency and residual energy.
  • 3.  ISSN: 2502-4752 IJEECS Vol. 8, No. 3, December 2017 : 674 – 678 676 In CPIR analyzes the node in the network using Node consistency measure. The period of every node within communication range is stored in a routing table. It ensures the node stability of node. Mean duration value provides the average amount of time that node spends in our range. The consistency calculation depends on Ratio among Mean period of data transmission rate. The Node Consistency calculation is given below. ( ) ( ) NC t NodeConsistency NC T   (1) If the node consistency is greater than the threshold that node is consistent. The threshold value is 0.7 The Route stability is calculated given below. ( ) ( ) RS t RouteStability RS n   (2) Where, ( )RS t  Period of node availability in communication range T Time Request to transmit the data n Number of nodes in data transmission path Figure 1. Consistency based node selection in network The figure 1 indicate that the first path from the source to the destination is not reachable since the node is inconsistent and this node has dropped all packets. But the CPIR, transmit the data through the consistent path. As a result, the source data reach the destination via consistent nodes in a network. Throughput: It is the average of successful messages delivered to the destination.The average throughput is calculated using Equation (6). 0 ( )* 1000 n Pack Received n Pack Size Throughput   (6) Un consistent node s h b g a f a c i e d Shortest Path Consistent Path
  • 4. IJEECS ISSN: 2502-4752  Simulation Analysis for Consistent Path Identification to Refine … (G Vennila) 677 Residual Energy: The amount of energy remaining in a node at the current instance of time is called as residual energy. A measure of the residual energy gives the rate at which the network operations consume energy. 4. Results and Discussion Evaluation of the protocols NCPR andCPIR is achieved using simulations in the network simulator. Such simulations use the standard parameters indicated in Table 1. Performance evaluation of the NCPR, CPIRprotocols are provided by estimating the Throughput, Residual Energy in the network. Table 1. Simulation Parameters of CPIR Parameter Value Channel Type Wireless Channel Antenna Type OmniAntenna MAC type 802.11 Simulation Time 50 s Number of nodes 50 Routing schemes NCPR, CPIR Transmission range 250m Traffic model CBR Simulation Area 700x700 Mobility Model Random way point Figure 2. Throughput Figure 2 shows the performance of throughput of CPIR and NCPR protocols. The throughput of NCPR is lesser than the CPIR. It represents the increase in efficiency of the CPIR protocol in the network. 0 5000 10000 15000 20000 25000 0 10 20 30 40 50 NCPR CPIR Simulation Time (ms) Throughput(bps)
  • 5.  ISSN: 2502-4752 IJEECS Vol. 8, No. 3, December 2017 : 674 – 678 678 Figure 3. Residual Energy Figure 3 shows the comparison of the residual energy of the CPIR and NCPR. The energy consumption of CPIR is lower than NCPR, therefore, proposed scheme increase the network lifetime. 5. Conclusion We propose a new protocol that allows for the establishment of a stable and consistent path in MANETs. In CPIR, the intermediate node selected based on the node consistency and residual energy to improve the network performance. The consistent path selection enhances the network lifetime and increases the network performance. The simulation analysis results show that CPIRreduce energy consumption also increases the throughput. References [1] Padmavathy N & Chaturvedi SK. Reliability Evaluation of Mobile Ad Hoc Network: With and Without Mobility Considerations. Procedia Computer Science. 2015; 46: 1126-1139. [2] Son TT, Le Minh H, Sexton G, Aslam N & Ghassemlooy Z. Bayesian model for mobility prediction to support Routing in Mobile Ad-Hoc Networks. In 2013 IEEE 24th International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), IEEE. 2013: 3186-3190) [3] Kuo WK & Chu SH. Energy efficiency optimization for mobile ad hoc networks. IEEE Access. 2016; 4: 928-940. [4] Yahya A. Energy-aware architecture for multi-rate ad hoc networks. Egyptian Informatics Journal. 2010; 11(1): 33-38. [5] Tan, Hwee Xian, and W Seah. Dynamic topology control to reduce interference in MANETs. In Proceedings of Second International Conference on Mobile Computing and Ubiquitous Networking. 2005. [6] As Gergely, Levente Buttyan, and Istvan Vajda. Provably secure on-demand source routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing. 2006; 5(11): 1533-1546. [7] Ajmal, Ali Mohamed E, Shamala Subramaniam, Zuriati Ahmad Zukarnain, and Zarina Mohd Hanapi. Neighbor-Based Dynamic Connectivity Factor Routing Protocol for Mobile Ad Hoc Network. IEEE Access. 2016; 4: 8053-8064. [8] Shanthi HJ and Anita EM. Secure and Efficient Distance Effect Routing Algorithm for Mobility (SE_DREAM) in MANETs. In Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC–16’), Springer International Publishing. 2016: 65-80. [9] Vennila G, Arivazhagan D & Manickasankari N. Prevention of Co-operative Black Hole attack in Manet on DSR protocol using Cryptographic Algorithm. International Journal of Engineering and Technology (IJET). 2014; 6(5): 2401. [10] Shanthi HJ & Anita EM. Performance analysis of black hole attacks in geographical routing MANET. 2014. 0 0,2 0,4 0,6 0,8 1 1,2 1 2 3 4 5 6 NCPR CPIR Simulation Time ResidualEnergy(j)