Power Aware Routing in Ad Hoc Wireless Networks

被引:0
|
作者
Rishiwal, Vinay [1 ]
Yadav, Mano [2 ]
Verma, S. [3 ]
Bajapai, S. K. [4 ]
机构
[1] MJP Rohilkhand Univ, Bareilly, UP, India
[2] ITS Engn Coll, Greater Noida, UP, India
[3] Indian Inst Informat Technl, Allahabad, UP, India
[4] IET, Lucknow, UP, India
来源
JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY | 2009年 / 9卷 / 02期
关键词
Power; Ad hoc networks; Routing protocols; Network Lifetime;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Development of the efficient power aware protocol is the need of today's adhoc networks. Although developing battery efficient systems that have low cost and complexity, remains a crucial issue. In order to facilitate communication within a mobile adhoc network, an efficient routing protocol is required to discover routes between mobile nodes. Power is one of the most important design criteria for adhoc networks as batteries provide limited working capacity to the mobile nodes. Power failure of a mobile node not only affects the node itself but also its ability to forward packets on behalf of others and hence affects the overall network lifetime. Much research efforts have been devoted to develop energy aware routing protocols. In this paper we propose an efficient algorithm, which maximizes the network lifetime by minimizing the power consumption during the source to destination route establishment. As a case study proposed algorithm has been incorporated along with the route discovery procedure of AODV and by simulation it is observed that proposed algorithm's per-formance is better as compare to AODV and DSR in terms of various energy related parameters like Total Energy Consumption, Average Energy Left Per Alive Node, Node Termination Rate, and Network Lifetime for different network scenarios.
引用
收藏
页码:101 / 109
页数:9
相关论文
共 50 条
  • [21] A joint scheduling, power control, and routing algorithm for ad hoc wireless networks
    Li, Yun
    Ephremides, Anthony
    AD HOC NETWORKS, 2007, 5 (07) : 959 - 973
  • [22] QoS-Aware Maximally Disjoint Routing in Power-Controlled Multihop CDMA Wireless Ad Hoc Networks
    Lijun Qian
    Dhadesugoor R. Vaman
    Ning Song
    EURASIP Journal on Wireless Communications and Networking, 2007
  • [23] An evolutionary approach to routing in wireless ad hoc networks
    Sreenivas, Hiranmayi
    Ali, HeshamH.
    IASTED International Conference on Wireless Networks and Emerging Technologies, 2005, : 57 - 64
  • [24] Power Aware and Secure Dynamic Source Routing Protocol in Mobile Ad Hoc Networks
    Miglani, Mohit
    Kukreja, Deepika
    Dhurandher, Sanjay Kumar
    Reddy, B. V. R.
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 45 - 56
  • [25] Anonymous routing for mobile wireless ad hoc networks
    Durresi, Arjan
    Paruchuri, Vamsi
    Durres, Mimoza
    Barolli, Leonard
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2007, 3 (01): : 105 - 117
  • [26] Link life based routing protocol for Ad Hoc wireless networks
    Manoj, BS
    Ananthapadmanabha, R
    Murthy, CSR
    TENTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2001, : 573 - 576
  • [27] Battery-aware routing in wireless ad hoc networks - Part I: Energy model
    Yang, YY
    Ma, C
    PERFORMANCE CHALLENGES FOR EFFICIENT NEXT GENERATION NETWORKS, VOLS 6A-6C, 2005, 6A-6C : 293 - 302
  • [28] Agent based power aware on demand distance vector routing protocol for wireless mobile ad hoc network
    Department of Information Technology, Sathyabama Institute of Science and Technology, Deemed University, Chennai 600 119, India
    Inf. Technol. J., 2006, 5 (944-950): : 944 - 950
  • [29] Reliable routing in wireless ad hoc networks: The virtual routing protocol
    Albini, Luiz Carlos P.
    Caruso, Antonio
    Chessa, Stefano
    Maestrini, Piero
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2006, 14 (03) : 335 - 358
  • [30] Energy-aware AODV Routing for Ad Hoc Networks
    Cao Jianglian
    Zhang Zhaoxiao
    Zeng Wenli
    Pei Tingrui
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 466 - 468