Академический Документы
Профессиональный Документы
Культура Документы
Abstract—MANETS are a kind of Wireless ad hoc network that association again among the portable hosts in that transmission
usually has a routable networking environment on top of a Link territory.
Layer ad hoc network. MANETs consist of a peer-to-peer, self- Multicasting has the property of sending a solitary bundle to
forming, self-healing network. This, in turn, increases the different receipients. Spatial reuse has all that much aided in the data
importance of bandwidth efficiency while maintaining tight transfer capacity effectiveness and the enery level of battery fueled
requirements on energy consumption delay and jitter. hubs. Vitality obliged operation is the place every one of the hubs in
Coordinated channel access protocols are in general not as well the ad hoc system take a shot at the batteries. The network is
suited for non-uniform load distributions as uncoordinated designed in such a way to optimize the energy consumption of the
channel access protocols due to the lack of on-demand dynamic mobile nodes. If the source and destination nodes are not in range and
channel allocation mechanisms that exist in infrastructure based lost the association between them then the communication is rebuilt
coordinated protocols. In this paper, we present a Balanced with the other nodes and creates a optimum path of communication
Clustering in Mobile Ad Hoc Networks Using Extended and with the connected nodes. This referred to as multi-hop
Weekly Connected Dominated Sets that are applicable to cluster communication.
based MANETs to address this problem. We present protocols In multi-hop communication all the nodes act as both router and
that utilize these mechanisms to improve performance in terms of as a host simultaneously. Multi-hop communication works with the
throughput, energy consumption and inter-packet delay help of proposed algorithm named as EWCDS.
variation Balanced cluster group creation and delay and packet Multi-hop communication works on the concept of Route
are overcome by proposed algorithm also network lifetime is Clustering. Route cluster node can receive data from any number of
prolonged by sustaining the energy level of nodes by Extended sensor nodes. If a node is present in two different cluster groups then
and Weakly Connected Dominating Sets. Balanced clustering it will not be elected as a cluster node. On the other hand, the node
prevents data collisions. Previously single hop communication which is between two hop communications will be elected as cluster
was possible but with the help of proposed algorithm two-hop head and cluster member respectively.
communication is also made possible. Therefore the link becomes Hence the number of cluster members and cluster groups can be
asynchronous so that which enables multiple transactions at a reduced. This creates the environment for balanced clustering and
time, multiple transmissions is possible with limited number of leads to reduction in packet loss. This proposed algorithm helps in
clusters called balanced clustering. handling non-uniform load distribution. Synchronous communication
means a single hop communication which is handled by Cluster Head
Keywords—MANETs, route cluster, extended and weakly communication. Two hop communication leads to asynchronous
connected dominating sets, energy level, cluster head. communication which helps in managing non uniform load
distribution along with efficient use of battery and prolonged network
I. INTRODUCTION life time.
Cooperative communication is the basis for all types mobile II. RELATED WORK
networks as the network and nodes present are mobile. Group Here, provided with reviews on CDS and WCDS in literature
communication is the main factor in MANETs as many applications form along with area based algorithms in ad hoc networks. MCDS for
use this concept. Due to the increase in the number of users, there is a ad hoc networks is also proposed in this paper. To achieve constant
huge demand in the applications that is supported in this network approximation ratio, developed a scheme with performance ratio and
type. This is the reason for the increase in the bandwidth of message complexity of the number of nodes in the network.
MANETs.
MANET is made up of mobile hosts which use the wireless A. Area –Based Algorithms
communication devices. Because of the show way of the remote In the vocabulary of ad hoc networks, area is also called as zones.
correspondence all the versatile hosts gets the transmission. Say if A zone-based Hierarchical Link State( HLS) routing protocol was
any 2 hosts are out of the transmission ranges in the adhoc system, proposed. Absence of cluster head because of non-overlapping zones.
the other versatile hosts forward the messages and fabricate the It composed of local node and global zone levels.
978-1-5090-2552-7
International Conference On Information Communication And Embedded System (ICICES 2016)
B. Area Algorithm for WCDS Formation number of nodes which have same characterisitcs and also belong to
The zonal algorithm is a localized algorithm. If the size control single area. This group of single nodes forms the network. There are
parameter x is smaller then the size of WCDS is larger. Whereas if x many clusters form one base station. In such scenarios LEACH
becomes larger then the algorithm produces a smaller WCDS. Hence protocl os used and the result will be clusters with similar
it not a localized algorithm always and can lead to larger message characteristics and then the network is formed
overhead. Though the AWF algorithm is localized, the WCDS
produced are not very attractive .The main motto of this paper is to
propose a message efficient localized algorithm which can result in
smaller WCDS.
C. Route Exploration
Route discovery is the process of selecting the route for the
Fig. 3.1: System Architecture destination.RREQ and RREP is used to select the route. In this
method RREQ sets the broadcast of the message which is called as
A. Cluster Categorization route request.
Cluster formation is simply the process of grouing the nodes in to
a single group which is named as clsuter.The cluster can have n
978-1-5090-2552-7
International Conference On Information Communication And Embedded System (ICICES 2016)
Once the destination is distinguished, the destination sends the This can be declared as most ideal if NP6 Dtime(nO(log log ) and
unicast RREP to locate the base DS and CDS in the same way. This the processors are adhereing to the polynomial-time calculation.
is for the most part used to recognize the best way. Now, lets demonstrate the generally accepted methods for
overwhelming sets which can prove the above mentioned properties.
If any two contiguous nodes in the system have low extended
dominators with a separation of 0(logn), this is called as low
extended property (Lets consider S- ruling set, dominator of vertex u
-any V2 S, if and only if the separtion between u and v is at most
one.) similarly let consider the time limits to be ideal, and the low
extended property which is the neighbour hus have their dominators
with a sepration of 0(logn) in the system. (Lets consider S-
commanding set, dominator of vertex u- any v2 S, if and only if the
separation between u and v is at most 1)
V. PERFORMANCE EVALUATION
To compare and study, considering ns-2 simulations of all the
protocols. The system model is discussed below. Green color lines
represent the existing system and the red color line represents the
proposed system.
978-1-5090-2552-7
International Conference On Information Communication And Embedded System (ICICES 2016)
REFERENCES
978-1-5090-2552-7
International Conference On Information Communication And Embedded System (ICICES 2016)
MUTHUKUMARASAMY.S is a PhD
scholar in Department of Computer Science
and Engineering at Anna University. He
received his M.E. degree in 2011 at Sri
Krishna Engineering college and B.E. degree
in 2005 at E.G.S Pillay Engineering College.
His area of interest includes Mobile Computin,
Wireless Sensor Networks,Information
Security.
THANIGAIVELU.K is a Professor in
Department of ECE at S.A.Engineering
College. He completed his PhD in
Information Communication and
Engineering at Anna University and
completed M.Tech in Laser & Optical
Engineering in 1999 at Anna University
and B,.tech in Electronics in 1995 at
Madras University. His areas of interests
include Antennas, Wireless Sensor
Networks, Network Security, Grid
Computing
978-1-5090-2552-7