Académique Documents
Professionnel Documents
Culture Documents
(1)
be the route from source node V
i
to V
j
through intermediate
nodes V
k
,V
k+1
, etc. Let
ij
be the set of all possible alive
routes between V
i
and V
j
. The DPM sleeping schedule S
ij
for
the route is defined as
) ,.. , ,.. , (
1
1 1
up up
k
up
k
up
i
up
i ij
j
t t t t t S
(2)
Where
up
t is the earliest up time for node Vi. We define the
link uptime vector or L
ij
for the route
ij
R as
) ,.. , ,.. , (
1
1 1
uptime uptime
k
uptime
k
uptime
i
uptime
i ij
j
t t t t t L
(3)
Wheret
uptmc
is the uptime of the link (E
i
,E
i+1
) connecting
nodes V
i
and V
i+1
and is defined by average(t
up
,t
+1
up)
)since
uptime of a link is determined by how long
up
i
up
i
uptime
i
t t average t
1
, (
) (4)
The route R
ij
for route uptime factor RUF
ij
can be expressed
as the maximum of the link uptime vector L
ij
along the route
which shows how long the route will be alive before breaking
down due to the break in any of its constituent links:
) , , max(
ij
uptime
i i
uptime
i ij
L t V V t RUF
(5)
International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 7July 2013
ISSN: 2231-2803http://www.ijcttjournal.org Page 2051
Given the next earliest time to sleep t
i
off for each node
i
V
V, in the graph G(V,E), accumulate the set of all possible
routes
ij
between nodes V
i
and V
j
with the corresponding
route uptime factors RUF
ij
for each R
ij
ij
and then from all
available stable routes find the min-hop route R
ij
. If a
condition occurs that we have more than one route with the
same min-hop count then the route with maximum route
uptime factor is selected. Since this route has the highest
predicted lifetime. The route uptime factor contains the all
link uptime value between two nodes which satisfied the
transmission threshold value. The each node stores the link
uptime vector which contains the all stable link between two
nodes from source to destination.
III. PROPOSED WORK
Steps to identify the stable path in the proposed protocol
1. Source Node initiates the data transmission request.
2. Check for the destination node in route cache. If found
then forward the data packet to destination.
3. If destination node is not found in the route cache then
broadcast the route request packet to their neighbour node.
4. Calculate the link uptime value t
uptmc
between the node
V
i
to V
i+1
.
up
i
up
i
uptime
i
t t average t
1
, (
)
5. Ift
uptmc
>th (Threshold) then add in to the link uptime
vector and data packet is forwarded to the next node
) ,. , ,. , (
1
1 1
uptime uptime
k
uptime
k
uptime
i
uptime
i ij
j
t t t t t L
6.If the intermediate node receive more than two RREQ
packet thenIf I
k
uptmc
.previous RREQ >I
k
uptmc
.latest
RREQ then forward previous RREQ and discard latest
RREQ otherwise forward latest RREQ.
7. Repeat step 3 to step 6 till destination is found.
8. If destination found then store all route in to the routing
table in decreasing order of Route Uptime Factor
) , , max(
ij
uptime
i i
uptime
i ij
L t V V t RUF and send
RREP to the first entry of routing table.
Route discovery phase in Stable Route Aware Routing
When a source node needs to send a data packet to a target
node, it first searches its routing cache for any entry using the
target node address as the key. An entry in the routing cache
contains a list of stable routes to the target node. If an entry is
found in the cache table, then the source node selects a route
from the cache table, if no entry is found for the destination
node, then the source node initiates a route discovery for the
destination. The proposed protocol adds four new entry types
to the RREQ packet format of standard DSR
1. Link Uptime Vector (t
uptmc
;I (1,N-1)for the route,
2. Partial route R
ij
=(V
i
,V
i+1,.....
V
k ,.....................
V
j
,V
j+1)
3. Earliest Up-time of Last-upstream node (t
uptmc
)
4. Threshold value ( Th =t
data
transmission time of each data
packet ).
The protocol allows intermediate nodes to forward multiple
RREQ packet with the same <source address, request id>pair
if the data packets contain different source routes. During the
RREQ lookup at intermediate nodes, the 4-tuple <source
address, request id, address of last upstream node, partial route
length> is checked with each entry in the recently seen
requests list for possible match. If no match is found, then the
RREQ contains a distinct source route and is eligible to be
forwarded if the contained source route is predicted to be
stable.
If any intermediate node receives more than two RREQ
packets, it does not forward these all RREQ packet to their
neighbour node, the intermediate node performs the
comparison between the received RREQ and the previous
RREQ packet. If uptime of previous RREQ is greater than to
the received RREQ then discard the received RREQ and
forward the previous RREQ uptime. Fig1shows the route
discovery process; source node 1 broadcasts the RREQ packet
to their neighbour node and try to find the stable route from
source node 1 to destination node 6.
SRAR predicts the route stability using a link by link stability
prediction. Each intermediate node receives RREQ and
predicts the stability of the link between this node and the last
upstreamnode.
It is assumed that all the previous links in the source route are
stable; otherwise the RREQ packet would not have forwarded
by previous upstream nodes.
Thus the stability of the current link ensures the stability of
the entire source route. When intermediate node V
K+1
receive
RREQ itcalculates the uptime of the link between this node
and the last upstream node recorded in the RREQ and appends
it to the Link Uptime Vector in the RREQ. If the uptime is
less than Threshold, then the link will not be stable for the
entire period of exchanges of the RREQ, the following RREP
and then the data packet. Hence the RREQ is discarded by the
intermediate node.
In fig 1given example shows how the source node 1 broadcast
the route request packet (RREQ) to find the stable route for
transmitting the data packet to the destination node 6.
The RREQ packets contain the information of partial route
and link uptime vector for each route. The link uptime vector
stores the average value of link uptime of both nodes. In this
figure each node has an uptime value. In this example the
threshold value is 2, node 4 receives the two RREQ packets
from node 3 and 5 but .node 4 discard the RREQ of node 5
because the uptime value of node 5 is less then to the uptime
value of node 3 .
International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 7July 2013
ISSN: 2231-2803http://www.ijcttjournal.org Page 2052
Fig 1 Example of route discovery in SRAR
Flow chart of route discovery at Source node
Flow chart of route discovery at Intermediate node
Route reply phase in SRAR
When the RREQ reaches the target, the route found through
the route discovery phase is predicted to be stable.The target
node sends an RREP packet back to the source along the
reverse path recorded in the RREQ. In this proposed protocol
the destination node maintains a routing table. The destination
node store the stable routes in the routing table in decreasing
order of the Route Uptime Factor .In the route reply phase the
destination node only send the one RREP packet which
contain the first entry of the routing table Hence it leads to
reduce the total transmission time between source to
destination. Fig 2 shows the example ofroute reply
process .The proposed protocol adds three new entry types to
the standard DSR RREP packet format:
Looking route cache
Buffer
Packet
Route
Discovery
No
Accept
Request Id
Already
seen?
Uptime of
previous
RREQ>up
time of
Latest
REQ
Discard
Link
uptime
long
enough
for data
transmis
sion?
Append My
address ,link
uptime
Store<src,id,lasthope,ro
ute length>
Broadcast RREQ
Done
Send RREP
Myadd
ress
=target
?
Forward
latest RREQ
Forward
previous
RREQ
Yes
No
Yes
No
No
Yes
No
Yes
Write source route
in thepacket
header
Packet in
Buffer
Done
Route
Found?
No
Yes
Yes
No
International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 7July 2013
ISSN: 2231-2803http://www.ijcttjournal.org Page 2053
1. Source route ) , , (
1 ,.. ,.. 1
j j k i i
V V V V V Rij
2. Link uptime vector (t
uptmc
; i (1,.,N-1))
3. Earliest up time. The minimum of all the Link Uptime
Vector elements.
4. Estimated Transmission Time
Route selection phase at the destination node in SRAR
At the destination node the all stable route store in the routing
table in decreasing order of the Route Uptime Factor .In the
route reply phase the destination node only send the one
RREP packet which contain the first entry of the routing table
Hence it leads to reduce the total transmission time between
source to destination
Fig 2 Example of route reply in SRAR
This example is based on the process of route reply in the
proposed protocol. In the fig 2 the destination node receive the
two RREQ packet at the destination node the all route store in
the routing table .The route store in the decreasing order of
Route Uptime factor. The RUF of first route {1,2,5} is 8 and
RUF of route{1,3,4} is 6.5. Hence the destination node first
send reply packet (RREP) to the route {1,2,5}.
V. EXPERIMENTAL RESULTS
In order to validate the proposed protocol and show its
efficiency we present simulations using MATLAB.
MATLAB is a very popular network simulation tool.
It can be used for complicated graphics in two and three
dimensions.
Complicated algorithms involving matrices and vectors can
be coded easily.
Using MATLAB differential equations can be solved
easily.
For wide range of applications from science and
engineering it contains different tool boxes.
Simulation Setup
The simulated network area is 25pixelX25pixel with 10 to
25 nodes.
For each transmitting node network simulates a random
interval repeatedly. Each node is alive for the input Uptime
percentage of the simulated random interval and notifies the
routing module about its next earliest time to sleep each
time when it up.
Each simulation was run for 5 trials, with a full range of
uptime percentages from 0% to 100% with an interval of
10%. Each trial was run for 120seconds. Each transmitting
source node attempts to send one data packet to the sink
node.
In absence of significant communication nodes turn off their
network cards for power conservation, which leads to link
failures and low network connectivity.
Simulated network use the threshold value 0.6 for the each
link stability
The node transmission range is 6 meter
Results
We evaluate the performance of SRAR in terms metric as
follows:
In Fig 3 the graph measures the route discovery success rate
for both of the protocols. Route discovery success rate is
defined as the ratio of number of successful RREP packets
back to the number of RREQ packet send by the source
node.Results shows a significant increase in the performance
of SRAR over standard shortest path Routing. It is expected
because SRAR uses both the min-hop and stability metrics in
route discovery phase and finds more routes as the Uptime
percentage increases.
Fig 3Route discovery success rate
In Fig 4 the average number of routes per node has been found.
It shows how SRAR finds more routes per node with
increasing Uptime percentage.
.
0
20
40
60
80
100
0 20 40 60 80 100
R
o
u
t
e
D
i
s
c
o
v
e
r
y
S
u
c
c
e
s
s
R
a
t
e
(
i
n
%
)
Uptime(in%)
ROUTE DISCOVERY SUCCESS RATE
STABLE
ROUTE
AWARE
ROUTING
SHORTEST
PATH
ROUTING
International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 7July 2013
ISSN: 2231-2803http://www.ijcttjournal.org Page 2054
Fig 4 Number of routes per source nodes (uptime)
Fig 5Number of routes per source nodes (threshold)
Fig 5 shows how SRAR finds more routes per node with
increasing Threshold percentage.
VI. CONCLUSION
The proposed protocol Stable Route Aware Routing
introduces DPM awareness into the routing decisions and
finds multiple stable routes from source to destination..
SRAR is hard in sense that it may discard any RREQ which
it considers to be non-stable and as a result may lead to a
situation where the source node fails to discover any stable
path to the destination node. But it can provide a user-
specified data rate & enhanced end-to-end transport
performance. Best optimal path will be selected from the
received paths. SRAR has been compared to shortest path
routing which does not consider power-saving but optimizes
routing for shortest delay and the proposed protocol provides
a significant increase in successful packet transmissions with
comparable route establishment and maintenance overheads.
SRAR is aggressive in sense that it proactively discards any
RREQ which is predicts to be non-stable and thus might lead
to a scenario where the source node fails to find any stable
path to the sink node
VII. FUTURE WORK
Future works would study how SRAR performs with
respect to other protocol. Stability can be added to any
existing routing protocol. Concept of bandwidth can be
added to SRAR to make it more stable and avoid link
breakage.
Future work would also study the combination of other
metrics such as real-time or minimum-energy
communication and how to obtain a balance of these
multiple constraints to make the new protocol yield good
performance.
REFERENCES
[1] G.Vijaya Kumar, Y.VasudevaReddyr, Dr.M.Nagendra Current
Research Work on Routing Protocols for MANET: A Literature
Survey, International J ournal on Computer Science and Engineering,
Vol. 02 , pp. 706-713 , 2010.
[2] VinayKalkal, Sami Anand, Routing algorithm protocol integrating
power aware routing and shortest path for Mobile Ad hoc network,
International J ournal for Science and Emerging Technologies with
Latest Trends, Vol.5, pp.15-19, 2013.
[3] MortezaMaleki, KarthikDantu, and MassoudPedramPower-aware
Source Routing Protocol for Mobile Ad Hoc Networks , 2002.
[4] VeenaVenugopal, RadimBartos, Michael J . Carter and Sai S.
Mupparapu Improvement of Robustness for Ad Hoc Networks Through
Energy-Aware Routing, University of New Hampshire, 2003.
[5] C.-K. Toh, Maximum Battery Life Routing to Support Ubiquitous
Mobile Computing in Wireless Ad Hoc Networks, IEEE, pp.138-147,
2001.
[6] J . Monteiro, A. Goldman, A. Ferreira, Performance Evaluation of
Dynamic Networks using an Evolving Graph Combinatorial Model,
IEEE International Conference on Wire-less and Mobile Computing,
Networking and Communications, 2006.
[7] Carla F. Chiasserini, Ramesh R. Rao, A Distributed Power
Management Policy for Wireless Ad Hoc Networks, Proceedings of
IEEE Wireless Communication and Networking Conference, 2000
[8] S. Singh and C. S. Raghavendra, PAMAS-Power Aware Multi-Access
protocol with Signaling for Ad Hoc Networks ,ACM Commun. Rev.,
J uly 1998.
0
1
2
3
4
5
1
0
2
0
3
0
4
0
5
0
6
0
7
0
8
0
9
0
1
0
0
N
o
.
o
f
R
o
u
t
e
p
e
r
s
o
u
r
c
e
n
o
d
e
Uptime(in%)
No. of route per source node
Stable
Route
Aware
Routi
0
1
2
3
4
5
10 30 50 70 90
N
o
.
o
f
R
o
u
t
e
p
e
r
s
o
u
r
c
e
n
o
d
e
Threshold(in%)
No. of route per source node
Stable Route
Aware
Routing