Effect of Cross Layer optimization of Traffic Management in Ad Hoc Mobile Network

4

Click here to load reader

Transcript of Effect of Cross Layer optimization of Traffic Management in Ad Hoc Mobile Network

Page 1: Effect of Cross Layer optimization of Traffic Management in Ad Hoc Mobile Network

Effect of Cross Layer optimization of TrafficManagement in Ad HOC Mobile Network

Anu ChaudharyDepartment of informationTechnologyAKJ Institute of Technology andManagement, GZB(INDIA)

K.K GautamDepartment of ComputerScience & Technology PhonicsGroup of Institutions, Roorkee(INDIA)

Nirbhay AhlawatDepartment of ComputerScience & TechnologyPhonics Group ofInstitutions, Roorkee(INDIA)

Abstract:- The optimal and distributed

provisioning of high through output in MobileAd Hoc Network (MANET) is a networkconsisting of a set of wireless mobile routers andCommunication with each other. The NetworkMobility(NEMO) for the traffic represents themoving behavior of directional antenna andmobile rooters. Use the Cross-layer protocol inad hoc wireless network we can drasticallyimprove the utilization through overlappingcommunication is the different direction for thetraffic. This paper highilight the chalenge to findout a route of effect the cross-layer protocol fortraffic-management in Ad Hoc wireless network.In present paper we propose mobility for trafficmamnement in Ad Hoc wireless network by useof theory of Cross-layer protocol.

Keywords:-Ad hoc Network, Cross-layer

protocol , Directional Antenna, Mobile Router,Network Mobility

Introduction:- AD HOC NETWORKS are

multiple wireless networks consisting of a largenumber of radio equipped nodes that may be assimple as autonomous sensors. These type ofnetwork are useful in any situation wheretemporary network connectivity is needed suchas in disaster relief. A mobile ad hoc network(MANET), is a network comprising wirelessmobile rooters (MRs) that communication witheach other without centralized control. The

dynamic of wireless ad hoc networks as aconsequence of mobility and disconnection ofmobile host. The MRs that are within eachother’s radio range can communication directly.Each mobile rooter’s acts as host in MANETenvironment. Mobile rooters are free to join orleave the network at any point of time.

Here we are working towards implementingwireless ad hoc community network(WACNEC) that was small, low cost directionalantenna, known as ESTAR (ElectronicallySteerable passive Array Radiator) antenna, witheach user terming [1,2].Due to unreliability ofwireless links, it has been of interest to study theimpact of physical-layer techniques on thedesign ,including medium accesscontrol(MAC),packet scheduling, power control,routing, transport protocol, and ultimately theQoS at the application level in the wirelessnetworks.

Mobility system define rooter, movementpatterns in ad hoc networks. Since MANETs arecurrently not deployed on are large scale anddue to inherent randomness of mobility modes,research in evaluating the performance ofrouting protocols on various system of mobility.In this paper the performance of MANET for theeffect of cross-layer protocol [3]. In[3],a cross-layer design approach is employed to improvethe performance of combined cooperativeschemes. The cross-layer information is minted

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 4, April 2014

50 http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 2: Effect of Cross Layer optimization of Traffic Management in Ad Hoc Mobile Network

in a separated data structure and is shared amonglayers.

Whatever may be routing scheme, they all relyon using Omni-directional antenna. The use ofdirectional antenna to find out a route and use itin database has not been explored properly. Herewe proposed Cross-layer protocol where eachnode keeps certain neighborhood informationdynamically through the Maintenance of anAngle – SINR Table.

For experimental purposes we have consideredA framework to evaluate the impact of differentmobility models on the performance of MANETrouting cross-layer protocol is provides in [4]various protocol independent matrices areprovided to capture interesting mobilitycharacteristics restrictions.

Mobility models:- The mobility model is

designed to described the movement pattern ofMobility models used in the simulation study ofMANET.: traces base model and synthetic basemodel [4]. The traces base model obtainsdetermistic data from the real system. Thismobility model is still in its early stage ofresearch, therefore it is not recommended to beused. The synthetic based model is theimaginative model that used statics. Themovement of each MN to its destination has apattern that can be described by a statisticalmodel that expresses the movement behavior inthe real environment.

The Framework:-

Angle – SINR Table :-

In order to make the directional routingeffective, a node should know how to set itstransmission direction effectively to transmit apacket to its neighbors. So each nodeperiodically collects its neighborhoodinformation and forms an Angle- SINR Table

(AST). Sinus m(t) (Signal – to – Interferenceand Noise Ratio) is a number associated witheach link 1u n, m, and is a measurable indicatorof the strength of radio connection from node nto node m at an angle u with respect to n and asperceived by m at any point of time t. AST ofnode n specifies the strength of radio connectionof its neighbors with respect to n at a particulardirection . Angle - SINR Table for node n time tis shown below (Table I) where we assume thatnodes I, j and k are the neighbors of n.

TABLE I. ANGLE – SINR TABLE (AST)FOR NODE n

AzimuthAngle

(degree)

SINR value as perceived by neighbors ofrooters n at different angle w.r.t rooters n

I j K

0 SINR0n,i(t) SINR0n,j(t) SINR0n,j(t)

30 SINR30n,i(t) SINR30n,j(t) SINR30n,j(t)

60 SINR60n,i(t) SINR60n,j(t) SINR60n,j(t)

… ….. ….. ….

330 SINR330n,i(t) SINR330n,j(t) SINR330n,j(t)

360 SINR360n,i(t) SINR360n,j(t) SINR360n,j(t)

In order to form AST, each node periodicallysends a directional request in the form of adirectional broadcast, sequentially in alldirection . in this work it has been done 30degree interval, covering the entire 360 degreespace sequentially. A node is i in theneighborhood of n will wait until it receives allthe request packets generated by n in alldirection in that occasion. In others word, node Iaccumulates the entire column of the AST of nfor node I, I accumulates the entire column ofthe AST of n for rooters i. Here, rooters i, afterreceiving the first request from n, has to wait a

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 4, April 2014

51 http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 3: Effect of Cross Layer optimization of Traffic Management in Ad Hoc Mobile Network

pre-specified amount of time to make sure thatthe directional broadcasts by n in all directionare over. Rooters I sends this information fromall the neighbors of n, the Angle-SINR Table ofn would be complete.

Omni transmission both transmission range andspatial reuse can be substantially enhance byhaving nodes concentrate transmitted energyonly towards their destination direction, therebyachieving higher signal to noise ratio.

When there is a need to utilize only thedirectional characteristic, the demands are moresince this is possible only when the rooterswhich wants to transmit and the rooters whichwants to receive are synchronized with theirrespective related modes(i.e.) one rooters is inthe transmit rooters and other is in the transmitmode and other is in the receive mode and arepointing towards each other as shown in figure1.

If x1 = 600, x2 = 1200, x3= 1800, x4 = 2400,

X5= 3000, x6 = 3600 then

Figure : Basic mechanism for receive Mode andtransmit Mode.

This is the most important task of any Cross-layer protocol for Mobile Network is to identifythe set of non – interfering transmissions is anarea and to coordinate the activities of thevarious senders. As we discussed above, thenotion of non- interfering transmissions depends

on the antenna orientations of the senders. Thus,an indoor directional Cross-layer protocol mustnot only identify the set of possible concurrenttransmissions but also determine theirorientations. Directional antenna has thepotential to provide the necessary interferencereduction by spatially confining transmission.

CROSS-LAYER PROTOCOL:

It is repeatedly argued that layered architectures arenot suitable for mobile networks. to illustrate thispoint ,researchers usually present what they callacross-layer design proposal .cross-layer designrefers to protocol design done by actively exploitingthe dependence between protocols gain .this is unlikelayering, where the protocols at the different layersare designs independently .Protocols can be designedby respecting the rules of the reference architecture.

In a layer architecture, this would meansdesigning protocols such that a higher-layer protocolonly makes use of the services at the sevice is beingprovide.

Physical cross-layer module:A key concept at the physical cross-layer is thecapacity of survivability region. which characterizesa tradeoff between achievable capacities at differentlinks for survivability.Consider a network with A, B and CL as the linkgain,power,noise,respectly. Denote Dl as theinterference coefficient from link k1 to the linkk2.assume that each node has a power boudget Xmax.thus the power control with a physical Cross-layermodule interference model may be formulated as

max ∑¥n

¥ is dual variable. ¥ play a key role in coordinatingthe survivability networking layer demand and layersupply.n-capacity region at the physical cross-layer

n=log (1+SINR) for every k2 ϵ E

SINR=AB/∑AB+CL for every L ϵ E

Because of interference, the power control problem isa non convex optimization proble that is presentphysical cross-layer module[9] capacityapproximitly.

x6 x1

x5 x2

x4 x 3

x6 x1

x5 x2

x4 x3

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 4, April 2014

52 http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 4: Effect of Cross Layer optimization of Traffic Management in Ad Hoc Mobile Network

CONCLUSION: - In this paper we use theCross-layer protocol and directional antenna tofind out a route optimization and we also presentthe effect of the Cross-layer protocol for trafficmanagement in Ad Hoc wireless network. Andwe propose a system of traffic management inAd Hoc wireless network by use of theory ofdirectional antenna.

Reference :-

[1] M. Kawai, M.Nozaki and K.Gyoda, “Awireless Ad Hoc Community Network withRecongfigurable Topology Architecture”,Proc.of the GLOBECOMM’98.1998.

[2]T. Ohira and K.Gyoda , “ElectronicallySteerable Passive Array Radiator(ESPAR),”Antennas for Law –cost AdaptiveBeam Forming”, IEEE International Conferenceon Phased Array System , dana Point , CA May2000.

[3] P.D.R.Vijakumar, T.Ravichandran “Cross-layer protocol Based Multimedia Transmissionusin cache in mobile Ad hoc Networks”international journal andCommunicationTechnoloy Research Volume2 No,5,May2012.

[4] Fan Bai, N Sadagopan and A Helmy , “IMPROTANT : a Framework to systematicallyanalyze the impact of mobility on performanceof Routing Protocol for AdHoc Neworks”, IEEE2003.

[5] S Gowrishanker, T G Basavaraju and SabirKumar Sarkar , “Effect of Random MobilityModels Pattern in Mobile Ad HocNetworks”Vol.7 No.6Junme 2007.

[6] B.S. Abdur Rahaman Crescent EngineeringCollege Vandalur , “Efficient Broadasting InManeats Using Directional Antennas”,Aug,2000.

[7] Markus Jordan Gerd Ascheid and HeinrichMeyr , “Performance Evaluation of

Opportunistic Beamforming with SINRPrediction for HSDPA”, NEW Jersy 1993.

[8] C.E. Perkins, E.M Royar & S Das, Ad HocOn Demand Distance Vector (AODV) Routing ,IETF International draft, draft – ietf – manet –aodv -08.txt, March2001.

[9] Rangarajan, H. and Garcia – nLuna –Aceves,JJ. 2005 ‘Making On-Demand RoutingProtocols Based on Destination SequenceNumbers Robust.’ 2005 IEEEInternational onCommunications (Icc 2005), vol.5 Pp. 3068-3072.

[10] Zhigue Ding and Kin K. Leung “Cross-layer Routing Optimization for WirelessNetworks with Cooperative Diversity 978-1-4244-2644-7/08©2008IEEE.Email{zhigue,ding,kin.leung}@imperial.ac.in

AUTHORS PROFILE

Authors Profile ..Anu Chaudhary is the Head of the Departmentin Inforation of Technoogy & Management, Gzb and completedhis PHD from Gurukul Kangari University,Haridwar (India).Prof Anu is basically working in the area of mobile network.

K K Gautam is a Director in

the Phonics Group of Institutions, Roorkee (India). Prof Gautamhas completed his PhD in Computer Engineering Department.He has a teaching experience of more than 20 years and also hasmany research paper in the field of network security andcurrently he is working in the area of mobile network andwireless network.

Nirbhay Ahlawat is the Astt.Prof. in thedepartment of Computer science in Phonics Group ofInstitutions,Roorkee and completed his M.tech From SubhartiUniversity,Meerut (India).He is also a research scholar and presentlyworking in the field of Network Security.

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 4, April 2014

53 http://sites.google.com/site/ijcsis/ ISSN 1947-5500