Optimizing Transmission Power and Energy Efficient Routing Protocol in MANETs

被引:0
|
作者
L. Femila
M. Marsaline Beno
机构
[1] Bethlahem Institute of Engineering,Electronics and Communication Engineering
[2] St. Xavier’s Catholic College of Engineering,Electrical and Electronics Engineering
来源
关键词
CPLNC; CCSPR; COSPNCR; EPAR; MANET; Energy saving;
D O I
暂无
中图分类号
学科分类号
摘要
Energy is the important criterion for a decentralized network. By the cooperative physical layer network coding scheme, the requirement of energy transmission can be reduced. This could be implemented using two routing algorithms namely CCSPR and COSPNCR. An algorithm is constructed for reducing power consumption and rate control. In contradiction of the conventional power aware algorithms, an efficient power aware routing (EPAR) method is proposed which distinguishes the capability of nodes by its residual battery power, and through the expected energy that spent in reliably data packets forwarding on a specific link. To evaluate this, the data routing is performed with high mobility in dynamic environment. By using this algorithm, less cost path can be chosen and data rate can also be controlled. Thus energy consumption can be decreased and hence lifetime of a node can be improved. This approach first identifies the path having high lifetime and through that path, the communication will take place. This work consumes a lesser amount of energy for the routing, thus makes power efficient routing. Hence the throughput is increased and the power consumption is reduced. The conventional shortest path routing method on regular line and the grid line networks attains the gain of energy savings up to 45–75% correspondingly. By using EPAR algorithm, the energy consumption rate is minimized, so the network life time and the performance are improved. The energy consumption rate can be decreased to 80% by using EPAR approach in Mobile Ad hoc Networks.
引用
收藏
页码:1041 / 1056
页数:15
相关论文
共 50 条
  • [1] Optimizing Transmission Power and Energy Efficient Routing Protocol in MANETs
    Femila, L.
    Beno, M. Marsaline
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (03) : 1041 - 1056
  • [2] Energy efficient secured routing protocol for MANETs
    Singh, Tejpreet
    Singh, Jaswinder
    Sharma, Sandeep
    [J]. WIRELESS NETWORKS, 2017, 23 (04) : 1001 - 1009
  • [3] Energy efficient secured routing protocol for MANETs
    Tejpreet Singh
    Jaswinder Singh
    Sandeep Sharma
    [J]. Wireless Networks, 2017, 23 : 1001 - 1009
  • [4] Energy Efficient Integrated Routing Protocol for MANETs
    Kathiravan, K.
    Divya, V.
    Selvi, S. Thamarai
    [J]. 2009 FIFTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS, 2009, : 340 - +
  • [5] Efficient Power Aware Multipath Routing Protocol for MANETs
    Lutimath, Nagaraj M.
    Suresh, L.
    Naikodi, Chandrakant
    [J]. 2016 INTERNATIONAL CONFERENCE ON CIRCUITS, CONTROLS, COMMUNICATIONS AND COMPUTING (I4C), 2016,
  • [6] An Improved Energy Efficient AODV Routing Protocol for MANETs
    Patil, Annapurna P.
    Chandan, Varsha B.
    Aparna, S.
    Greeshma, R.
    Akshatha, H. P.
    [J]. 2014 ELEVENTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2014,
  • [7] Energy efficient zone based routing protocol for MANETs
    Basurra, Shadi S.
    De Vos, Marina
    Padget, Julian
    Ji, Yusheng
    Lewis, Tim
    Armour, Simon
    [J]. AD HOC NETWORKS, 2015, 25 : 16 - 37
  • [8] Energy Efficient Cluster Based Routing Protocol for MANETs
    Hosseini-Seno, Seyed-Amin
    Wan, Tat-Chee
    Budiarto, Rahmat
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS, 2009, : 435 - 439
  • [9] An error-aware and energy efficient routing protocol in MANETs
    Tan, Liansheng
    Yang, Peng
    Chan, Sammy
    [J]. PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 724 - +
  • [10] Energy Efficient Position Based Opportunistic Routing Protocol for MANETS
    Lakshmi, KommaReddy Dhana
    Ramesh, Raja
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (06): : 31 - 36