12.07.2015 Views

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

92 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 2, NO. 2, MAY 2010source. These can be generalized <strong>in</strong>to a s<strong>in</strong>gle equationwith both the source and receiver mov<strong>in</strong>g as given below:⎡ v ⎤f = ⎢ − srr f e 1 ⎥(11)⎣ v + v sr ⎦Where v sr is the source to receiver velocity radialcomponent. Now s<strong>in</strong>ce the source nodes have equalpower so frequency <strong>of</strong> transmission will rema<strong>in</strong> same forall the nodes with<strong>in</strong> the vic<strong>in</strong>ity. From (11) above we getthe velocity <strong>of</strong> the neighbor<strong>in</strong>g nodes as⎡ f − f ⎤v = e rsr v⎢⎥(12)⎣ f r ⎦Now overall time period for which the l<strong>in</strong>k rema<strong>in</strong>sestablished will depend on the follow<strong>in</strong>g relationdT = (13)v srwhere T <strong>in</strong> (13) is def<strong>in</strong>ed as the time period for whichthe l<strong>in</strong>k with the neighbor<strong>in</strong>g node will rema<strong>in</strong>established. The time period depends on d because if thenode covers the maximum distance away from the othernode, then a small velocity <strong>of</strong> it <strong>in</strong> the opposite directionwill disconnect the l<strong>in</strong>k. The time T will be more if it isnegative as the velocity will be hav<strong>in</strong>g +ve or –ve signdepend<strong>in</strong>g upon the direction <strong>of</strong> motion.C. Signal QualityThe distance, and position plays an important role <strong>in</strong>f<strong>in</strong>d<strong>in</strong>g mobility and hence the l<strong>in</strong>k stability. However,the stability <strong>of</strong> the l<strong>in</strong>k also depends on the quality <strong>of</strong>signal as well. In Mobile Adhoc Networks (MANETs)the signal quality plays an important role <strong>in</strong> select<strong>in</strong>g theroute to the dest<strong>in</strong>ation. The parameters like distance andmobility proposed above effects the signal quality,however <strong>in</strong> spite <strong>of</strong> the feasible distance and mobilitythreshold values, the node may not receive from theneighbor<strong>in</strong>g node the good quality signal due to noisysurround<strong>in</strong>gs. When there is a signal transmission from anode with certa<strong>in</strong> power <strong>in</strong> the noisy environment, the Biterror rate <strong>of</strong> the signal <strong>in</strong>creases apart from the normalpath loss <strong>in</strong> the medium. The receiver on the basis <strong>of</strong> thereceiver sensitivity, and the threshold Signal to NoiseRatio (SNR), predicts the quality <strong>of</strong> signal. Overall it isthe Receiver signal strength <strong>in</strong>dicator (RSSI) whichprovides the details <strong>of</strong> the quality <strong>of</strong> signal received.RSSI which is basically a measurement <strong>of</strong> how well theradio is receiv<strong>in</strong>g or 'hear<strong>in</strong>g' data to determ<strong>in</strong>e thequality <strong>of</strong> signal received. It's typically measured <strong>in</strong> -dBm, which is the power ratio <strong>in</strong> decibel (dB) <strong>of</strong> themeasured power referenced to one milliwatt (mW).Normally <strong>in</strong> the real test<strong>in</strong>g environments the RSSI above-60 dB is considered the threshold required to performgood network<strong>in</strong>g functions and any value higher than thatis the stable value. We denote this value by .Therefore overall l<strong>in</strong>k stability which is denoted by L SSOshould satisfy L S , T and M RSSI the three importantparameters to determ<strong>in</strong>e the stability <strong>of</strong> the route.IV. ROUTINGThe above parameters calculated can be used to enhancethe rout<strong>in</strong>g procedures already available. To <strong>in</strong>coorporatethe changes, the nodes needs to be modified.Below are the node level modifications suggested whenthe node behaves as, the <strong>in</strong>termediate and the dest<strong>in</strong>ationnode.A. Intermediate node operationWhen the <strong>in</strong>termediate node receives the RREQ packetfrom the source or from any <strong>of</strong> its neighbors it providesthe additional <strong>in</strong>formation <strong>of</strong> the distance and thefrequency <strong>in</strong> the RREQ packet and forwards it to thedest<strong>in</strong>ation. The Algorithm 1 provides the operationaldetails to be performed at each <strong>in</strong>termediate node.Algorithm 1 Algorithm to be executed <strong>in</strong> the node1 Set , (m, n), M RSSISet k stable l<strong>in</strong>k time threshold2 Measure d3 if d < µ L s = 1 Goto xElse d > µ L s = 0 stop.3 x: calculate RSSI4 if RSSI < M RSSI goto 8 else5 calculate v sr5 if vsr -ve calculate TElse if +ve calculate T6 if T < k reject6 Else if T > k select and modify RREQ7 stopB. Dest<strong>in</strong>ation node operationThe dest<strong>in</strong>ation node on receiv<strong>in</strong>g RREQ packets fromthe several nodes sends the reply to the source byselect<strong>in</strong>g the best path on the basis <strong>of</strong> the T, M RSSI value.Algorithm 2 provides the process details <strong>of</strong> thedest<strong>in</strong>ation node when RREQ arrives from differentnodes <strong>of</strong> the dest<strong>in</strong>ation node.Algorithm 2 Process execution when RREQ arrives1 Analyze RREQ2 Extract, d, v sr M RSSI*3 Compared with d* and M RSSI with M RSSI * and v sr with v sr*4 if d > d* and M RSSI < M RSSI*and v sr > v sr*Reject RouteElse select RouteThe source node when send<strong>in</strong>g the RREQ packet,calculates before, the distance, mobility and SNR <strong>of</strong> theneighbor<strong>in</strong>g nodes. It then embeds the <strong>in</strong>formation <strong>in</strong> theRREQ packet and sends it to the dest<strong>in</strong>ation via. Nexthop neighbor.© 2010 ACADEMY PUBLISHER

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!