IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July 2014, Pg. 369-374

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

A Novel Technique to Control Congestion in MANET using Knowledge Based Learning Kanav Chadha, Er. Parvinder Singh Department of ECE, RIEIT, Ropar, Punjab,India [email protected]

Abstract: In Mobile Ad hoc Networks (MANETs) obstruction occurs due to the packet loss and it can be successfully reduced by involving congestion control scheme which includes routing algorithm and a flow control at the network layer. In this paper, we are proposing a knowledge based technique to control congestion problem in which the path is established on the basis of minimum congestion counter. The mobile nodes can create the route from source to destination when they want .In AODV routing protocols has many shortcomings like congestion. Due to congestion performance of the network degrades. Many algorithms had been proposed to prevent this problem. By simulation results, we have shown that our proposed technique attains high delivery ratio and throughput with reduced delay when compared with the different existing technique. Keywords: MANET, Routing protocol, Congestion, AODV, minimum congestion counter.

1. Introduction Wireless network refers to the type of networks in which the communication between devices is implemented without use of wires. Radio waves and microwaves are used for communicating between devices in wireless networks. Both devices that are communicating to each other, these are lays within the radio range of each other. The IEEE standard for wireless network is 802.11. Wireless networks have many properties such as mobility, simplicity and very affordable and cost saving installation. Wireless networks can be classified into two types. These are Infrastructure network and Infrastructure-less or Ad-Hoc networks. Infrastructure network type of network has center controller that is Access Point (AP). All the wireless devices, that is communicate to each other through Access point and Access point is responsible for data routing. Access point is a fixed base station and all wireless devices that are communicating to each other are connected to access point. Mobile Ad hoc Network is a mobile multi-hop which is wireless distributed network and self organized in nature. The primary objective of routing protocol is to discover the route. In the routing protocol for MANET undertakes to setup and maintain routes between nodes.

Kanav Chadha, IJRIT

369

IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July 2014, Pg. 369-374

Fig. 1.1 diagram of MANET In MANET, constantly changing network topology causes link breakage and invalidation of end-to-end route. There is highly dynamic nature of wireless network imposes severe restrictions on routing protocols. One of the most important and a difficult mechanism to maintain in ad hoc networking is the routing mechanism. An ad hoc routing protocol is nothing but an agreement amongst nodes as to how they control routing packets amongst themselves.

Fig. 1.2 Routing Protocol The nodes in an ad hoc network discover routes as they do not have any prior knowledge about the network topology.

2. Congestion Control in MANET To maintain and allocate network resources effectively and fairly among a collection of users is a major issue. The resources shared typically are the bandwidth of the relations and the queues on the routers or switches. Packets are queued in these queues awaiting transmission. When too many packets are challenging for the similar link, the queue overflows and packets have to be dropped. When such drops become common events, the network is said to be congested [10]. In Ad-hoc networks, since there is no fixed infrastructure there are no separate network elements called routers and hence the mobile nodes themselves act as the routers (i.e. they are responsible for routing the packets). Congestion control methods [11] can be router centric or host/node centric. In existing congestion control methods, the source is informed about the congestion in the network so that either it may slow down the packet transmission rate or find an alternate route which may not necessarily be an optimal route. It must be pointed out that all the congestion control methods are able to inform the source about the congestion problem because they use Transmission Control Protocol. TCP maintains a new state variable for each connection, called Congestion Window [3], which is used by the source to limit how much data it is allowed to have in transit at a given time. The congestion window is congestion control‘s counterpart to flow control‘s advertised window. TCP is modified such Kanav Chadha, IJRIT

370

IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July 2014, Pg. 369-374

that the maximum number of bytes of unacknowledged data allowed is now the minimum of the congestion window and the advertised window.

3. Proposed Methodology The MANET is the mobile ad hoc networks which is the self configuring type of network. The self configuring means that any mobile nodes can join or leave the network when they want. The nodes are deployed in the network and path is established according to AODV protocol from source to destination. There are some nodes in the path having much movement than other nodes. Due to these nodes congestion problem occurs. So congestion is responsible for performance degradation and low reliability of the network. A novel technique is proposed to overcome problem of congestion in AODV. In present work to overcome congestion problem knowledge based learning will be used. In existing work path were established on the basis of minimum hop count and fresh sequence number. As we discussed earlier there is a problem of congestion in this path. Because there is no knowledge of congestion occur in advance. So to remove this problem a novel technique is proposed, in which path is established on the basis of minimum congestion counter. There are three conditions which will be followed for the establishment of the path. These are: 1. 2. 3.

Minimum Congestion counter Minimum Hop Count Fresh Sequence Number

Minimum Congestion counter has first priority as compare to other conditions. The path which have minimum congestion counter will be followed instead of maximum hop count and least sequence number Source send route request message to all the nodes. Destination sends route reply message to its previous node with percentage of congestion and so. At the end source receive route reply message with congestion counter. The path which has minimum congestion counter will be selected as final path. In this way with the help of knowledge based technique packet loss problem reduces.

4. Experimental Results

Fig 4.1: Packet Loss Kanav Chadha, IJRIT

371

IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July 2014, Pg. 369-374

The above graph is taken from the trace file of Network Simulator 2. It clearly shows the difference in packet loss between existing protocol i.e. “MOBILE AGENT BASED CONGESTION CONTROL USING AODV ROUTING PROTOCOL TECHNIQUE FOR MOBILE AD-HOC NETWORK” by Vishnu Kumar Sharma and Dr. Sarita Singh Bhadauria, AODV protocol and AODV protocol after applying knowledge based learning. Red lines shows old packet loss in MANET by using AODV protocol and green line shows new packet loss after applying the knowledge based learning. Also the blue line shows the packet loss in Agent based congestion control protocol (ABCC). As clearly shown in the graph the difference between the packet loss in ABCC protocol (1050000) and our protocol (50000) is notable i.e. (1000000). It shows that proposed methodology is better than existing one. Due to congestion packet loss problem occur in the existing work, to overcome this problem new scheme is proposed which gives better results than existing scheme.

Fig.4.2: Throughput In the above graph shown the throughput is compared of existing protocol (ABCC), AODV protocol and AODV protocol after applying knowledge based learning. Red lines shows old throughput of the network, green line shows new methodology throughput and the blue line shows the throughput of ABCC protocol. As clearly shown in the graph the throughput given by our improved protocol (370000) is much better than that provided by ABCC protocol (50000) and the difference between the two throughputs is notable (320000) . It shows that proposed methodology is better than existing one due to increase of the throughput of the network.

Kanav Chadha, IJRIT

372

IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July 2014, Pg. 369-374

Fig 4.3: Delay graph In the above graph shown the node to node delay is compared of existing protocol (ABCC), AODV protocol and AODV protocol after applying knowledge based learning. Green line shows new delay in nodes, red line shows old delay in nodes and blue line shows delay in ABCC protocol. It shows that new proposed scheme suffers less delay as compare to existing one.

5. Conclusion In this paper, we conclude that congestion is dangerous for the packet loss. Due to this packet loss may occur and delay increase. The main objective of the paper is to control congestion so that packet loss and throughput of the network increase. Experimental results show that proposed method is far better than existing method as it has less time delay and less packet loss as compare to the existing technique.

6. References 1.

HAO YANG, HAIYUN LUO, FAN YE, SONGWU LU, AND LIXIA ZHANG, “Security In Mobile Adhoc networks: challenges and Solution” UCLA”,COMPUTER SCIENCE DEPARTMENT 2004, IEEE

2.

E.A. Mary Anita, V. Vasudevan, “Black Hole Prevention in Multicasting Routing Protocols for Mobile Ad hoc Networks using Certificate Chaining”, IJCA, Volume 1, 2011

3.

Sreenivas B.C G.C. Bhanu Prakash K.V. Ramakrishnan, “L2DB-TCP: An adaptive congestion control technique for MANET based on link layer measurements”, IEEE, 2012

4.

Prof. S.A. Jain, Mr. Abhishek Bande, “An Improvement In Congestion Control Using Multipath Routing In Manet”, IJERA, 2012

5.

Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester, “An Overview of Mobile Ad Hoc Networks: Applications and Challenges” ,2005

Kanav Chadha, IJRIT

373

IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July 2014, Pg. 369-374

6.

Mohammad Amin Kheirandish Fard, Enchanching Congestion Control To Address Link Failure Loss Over Mobile Adhoc Network”, International Journal of Computer Networks & Communications (IJCNC) Vol.3, No.5, Sep 2011

7.

Vishnu Kumar Sharma and Dr. Sarita, “Agent based Congestion Control Performance in Mobile ad-hoc Network: A Survey paper “,(IJACSA) International Journal of Advanced Computer Science and Applications, Special Issue on Wireless & Mobile Networks, 2012

8.

Prof. S.A. Jain, Mr. Abhishek Bande, Mr. Gaurav Deshmukh, Mr. Yogesh Rade, Mr. Mahesh Sandhanshiv International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 ,Vol. 2, Issue 3, May-Jun 2012, pp. 509-514

9.

Yung Yi and Sanjay Shakkottai, “Hop-by-Hop Congestion Control Over a Wireless Multi-Hop Network”, IEEE/ACM Transactions on Networking, February 2007

10. S.Santhosh baboo and B.Narasimhan, “A Hop-by-Hop Congestion- Aware Routing Protocol for Heterogeneous Mobile Ad-hoc Networks”, International Journal of Computer Science and Information Security, 2009 11. Xiaoqin Chen, Haley M. Jones and A.D.S. Jayalath, “Congestion-Aware Routing Protocol for Mobile Ad Hoc Networks”, IEEE 66th Conference in Vehicular Technology, 2007. 12. Duc A. Tran and Harish Raghavendra, “Congestion Adaptive Routing in Mobile Ad Hoc Networks”, IEEE Transactions on Parallel and Distributed Systems, November 2006 13. Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester, “An Overview of Mobile Ad Hoc Networks: Applications and Challenges” ,2005

7. Authors Profile

Parvinder singh is working as associate professor in RIEIT,Railmajra. He has completed his MTech degree in from DAV, Jalandhar and completed B-Tech in 2005 with honours from RIEIT, Railmajra. He has more than 8 years of teaching experience.He has done his M-tech thesis in field of Wireless Personal Area Network Technology. He has also guided 5 m-tech thesis and 2 students of M-tech are under current supervision. He has published five papers in various reputed international journals and four papers in national conferences and he has also published one in IEEE conference.

Kanav Chadha Is pursuing M.Tech from rieit, Railmajra. His work of interest is in wireless technologies and different routing protocols in adhoc networks.

Kanav Chadha, IJRIT

374

A Novel Technique to Control Congestion in MANET using ... - IJRIT

IJRIT International Journal of Research in Information Technology, Volume 1, Issue .... Tech degree in from DAV, Jalandhar and completed B-Tech in 2005 with ...

911KB Sizes 1 Downloads 354 Views

Recommend Documents

A Novel Technique to Control Congestion in MANET using ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, ... topology. 2. Congestion Control in MANET. To maintain and allocate network .... Tech degree in from DAV, Jalandhar and completed B-Tech in 2005 with honours fro

A Novel Technique A Novel Technique for High ...
data or information within the cover media such that it does not draw the diligence of an unsanctioned persons. Before the wireless communication data security was found. Processing and transmission of multimedia content over insecure network gives s

A modified approach for aggregation technique in WSN - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 3, Issue 7, ... Wireless sensor network are used in many application such as military, ...

A modified approach for aggregation technique in WSN - IJRIT
In computer science and telecommunications, wireless sensor networks are an ... and conferences arranged each year. ... Figure 1: Types of grids (a) Triangular lattice (b) Square grid (c) Hexagonal grid ... Degree-degree Correlations”, in Proc.

Revisiting TCP Congestion Control in A Virtual Cluster ...
Cloud computing allows users to hire a cluster of VMs in an on-demand fashion. To improve the cost-effectiveness of their cloud platforms, cloud providers strive ...

On Detecting Packets Droppers in MANET: A Novel ... -
important network security requirements, namely the availability. In this paper we introduce a new low cost. Session-based Misbehaviour Detection Protocol.

On Detecting Packets Droppers in MANET: A Novel ... -
One of the commonest threats that mobile ad hoc ... which is called Mobile Ad hoc Network (MANET). It .... sending and the reception of packets, and accordingly.

Entropy Based QoS Routing Algorithm in MANET Using ...
A Mobile Ad Hoc Network (MANET) is a dynamic wireless network that can be formed without the need of any pre-existing infrastructure in which each node can ...

Entropy Based QoS Routing Algorithm in MANET Using ...
1Department of Information Technology, ABES Engineering College, Ghaziabad, .... 2.1.2 Divisive: This is a "top down" approach: all observations start in one ..... Conference on Nctworking , Sensing and Control (ICNSC06), Florida, USA, 23-.

File Sharing Algorithms File Sharing Algorithms over MANET ... - IJRIT
Establishing peer-to-peer (P2P) file sharing for mobile ad hoc networks ... methods, flooding-based methods, advertisement-based methods and social-based ... P2P over MANETs is the most popular used pattern of file sharing within MANETs. .... [10]. S

Enhanced Trust based security method for MANET - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 3, Issue 5, May 2015, Pg.466 -470 ... Pundalik Ranjolekar, Associate Professor.

Enhanced Trust based security method for MANET - IJRIT
Computer Science & Engineering, VTU Belgaum. KLE Dr. M. S. Sheshgiri College of Engineering & Technology, Belgaum, Karnataka, India .... rectangles drawn on top of lifelines to represent that processes are being performed in response to ...

Artificial Intelligence Based Robot Control Using Face and ... - IJRIT
Human-computer interaction (HCI) get up as a field from tangled origins in computer graphics, ... is a discipline concerned with the design, evaluation and implementation of interactive computing systems for ... method, or may not the best method in

Machine Learning In Chemoinformatics: A Novel Approach for ... - IJRIT
methods, high throughput docking, drug discovery, data analysis methods, etc[6] .... QSAR, protein-Ligand Models, Structure Based Models, Microarray Analysis,.

A Novel Efficient Technique for Traffic Grooming in ...
backbone networks. Two kinds of equipment are used at a node in WDM. SONET networks: Optical Add-Drop Multiplexer (OADM) and electronic Add-Drop ...

tcp congestion control pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. tcp congestion ...

Artificial Intelligence Based Robot Control Using Face and ... - IJRIT
artificial intelligence technique where robot control authentication process is done ... intelligence and face recognition system and hand gesture recognition and ...

Modified Bloom Filter for Efficient Congestion Control in Wireless ...
in access points of a Wireless Network based on DiffServ ... Bloom filters find application ..... between a customer and a service provider that specifies the.

Machine Learning In Chemoinformatics: A Novel Approach for ... - IJRIT
Keywords-chemoinformatics; drug discovery; machine learning techniques; ... methods, high throughput docking, drug discovery, data analysis methods, etc[6].

Congestion Control in Compartmental Network Systems
Email : (bastin, guffens)@auto.ucl.ac.be. Abstract. In many practical applications of control engineering, the dynamical system un- der consideration is described ...

File Sharing Algorithms File Sharing Algorithms over MANET ... - IJRIT
Establishing peer-to-peer (P2P) file sharing for mobile ad hoc networks ... methods, flooding-based methods, advertisement-based methods and social-based ... P2P over MANETs is the most popular used pattern of file sharing within MANETs. .... [10]. S

A New Technique to Control the Architecture of Neuronal Networks in ...
complex structure of these systems results in experimental limitations: ..... to prepare custom masks in the lab, especially if uncommon patterns need to be ... In this case, any desired pattern is first drawn using standard graphics software and ...

On Securing MANET Routing Protocol Against Control Packet Dropping
For ex- ample, simply by dropping RREQ (Route Request) packets a selfish ... This way, data packets will be sent only through .... special set we call a suspicious set. ... ios. The curves presented hereafter represent the averaged values for those c

A Novel Technique for Frequency Stabilising Laser Diodes
The method described in this paper is more robust and easier to set up. ..... When we call the centre frequency of the atomic transition νt and the laser frequency ...