22
99 CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING 5.1 INTRODUCTION Dynamic network topology and limited system resources characterize mobile ad hoc networking. Many routing protocols were proposed for routing in MANETs (Chakeres and Belding-Royer 2004; Jiang et al 1998). In MANETs, performance decreases when network’s size exceeds a certain threshold, resulting in many routing algorithms performing only when network’s size is small. To overcome bandwidth and battery power limitations and reduce routing overhead, it is mandatory to make network organization smaller and manageable (Garcia et al 2003). A clustering architecture provides MANET environments with three features: network scalability, fault tolerance and communication overhead reduction. Many clustering algorithms have geographical regions as clusters or form new ones unnecessarily. (Chiang et al 19997; Lin and Gerla 1997). An algorithm by Chatterjee et al (2000) creates necessary clusters without using routing protocol maintained information. It has been proved that cluster architecture ensures basic performance achievement in MANETs with many mobile terminals. A cluster structure provides at least three benefits, as an effective topology control measure. First, it facilitates spatial resources reuse to increase system capacity. With the non-overlapping multi-cluster structure, two clusters can use the same frequency/code set if they are not neighbours. Also, a cluster

CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

99

CHAPTER 5

AN AODV-BASED CLUSTERING APPROACH FOR

EFFICIENT ROUTING

5.1 INTRODUCTION

Dynamic network topology and limited system resources

characterize mobile ad hoc networking. Many routing protocols were

proposed for routing in MANETs (Chakeres and Belding-Royer 2004; Jiang

et al 1998). In MANETs, performance decreases when network’s size

exceeds a certain threshold, resulting in many routing algorithms performing

only when network’s size is small. To overcome bandwidth and battery power

limitations and reduce routing overhead, it is mandatory to make network

organization smaller and manageable (Garcia et al 2003).

A clustering architecture provides MANET environments with

three features: network scalability, fault tolerance and communication

overhead reduction. Many clustering algorithms have geographical regions as

clusters or form new ones unnecessarily. (Chiang et al 19997; Lin and Gerla

1997). An algorithm by Chatterjee et al (2000) creates necessary clusters

without using routing protocol maintained information.

It has been proved that cluster architecture ensures basic

performance achievement in MANETs with many mobile terminals. A cluster

structure provides at least three benefits, as an effective topology control

measure. First, it facilitates spatial resources reuse to increase system

capacity. With the non-overlapping multi-cluster structure, two clusters can

use the same frequency/code set if they are not neighbours. Also, a cluster

Page 2: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

100

coordinates transmission events better with a special mobile node, with a

cluster head, inside. This saves retransmission resources resulting in lower

transmission collisions. The second benefit is in routing, as a cluster head set

and cluster gateways normally are the virtual backbone for inter-cluster

routing which in turn restricts creation and spread of routing information.

Last, a cluster structure shrinks an ad hoc network and makes it more stable

with every mobile terminal. When a mobile node changes its cluster

attachment, the information is updated only in those nodes in corresponding

clusters. Thus, local changes do not need updation by the whole network as

this greatly reduces information stored by each mobile node.

5.2 CLUSTERING

Clustering technique is not a routing protocol; it aggregates nodes

into groups to ensure easier network management. An ad hoc network’s

cluster organization is impossible to be achieved in fixed infrastructure,

offline. Clustering scheme implementation ensures better protocol for Media

Access Control (MAC) through improvement of spatial reuse, throughput,

scalability and power consumption.

MANETs have multiple benefits from clustering. To begin with,

cluster structure ensures MANETs scalability and load balancing, increases

system capacity facilitating spatial resources reuse. In a multi cluster

structure, two non-overlapping clusters can have similar frequency if they are

not adjacent. It also elects a mobile host with special features called cluster

head for enhanced transmission activities coordination which in turn

alleviates collision of mobile nodes, saving both energy and resources.

Second, it limits creation and spreading routing information through

formation of a inter-cluster routing backbone consisting of cluster heads and

cluster gateways. Lastly, it provides a stable and smaller vision of ad hoc

network when a mobile node changes its attaching cluster so that the whole

Page 3: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

101

network need not be aware of local changes in a node set. Only mobile nodes

in a corresponding cluster reflect such changes. Hence each node stores and

processes a fraction of total network routing information saving resources.

Clustering aims to be connected and nodes play various roles in

clustering techniques. The three node types are defined as follows:

1. Ordinary nodes

2. Cluster head

3. Cluster gateways

5.2.1 Cost Involved with Clustering

Construction and maintenance of a cluster structure requires

additional cost compared to flat structure MANETs. Cost of clustering

analysis is carried out either quantitatively or qualitatively to outline both

clustering techniques benefits and drawbacks. Clustering associated cost is

explained below:

1. Due to Frequent network topology changes cluster relatedinformation varies drastically in a dynamically changingcluster structure. Transfer of message packets subsequentlyeats up massive bandwidth, depleting mobile nodes energyand further disabling upper layer applications that are unableto be implemented with meagre resources.

2. Re-clustering occurs in some clustering schemes due toabrupt local instance like mobile nodes moving to otherclusters or due to the demise of a mobile node or shuttingdown of cluster heads, resulting in other cluster heads re-election. This is re clustering ripple effect which stimulates are-clustering effect over the full network.

Page 4: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

102

3. Clustering stages are divided into two: cluster formation and

maintenance. The first stage assumes that mobile nodes are

static. Every mobile node obtains information from

neighbouring nodes in a specific period which might prove

impractical in a real time scenario.

5.3 CLUSTER MANAGEMENT

Clustering architecture provide network scalability, fault tolerance

resulting in increased use of network resources. It could be used for resource

management, routing and location management to lower communication and

computational overheads. This section discusses cluster formation and

maintenance.

5.3.1 Clustering Algorithm Design Goal

It is intended to integrate clustering with routing functions. The

design aims of the clustering scheme include:

An algorithm using a routing protocol’s control messages to

form clusters with limited overhead.

An algorithm operating in localized and distributed manners

and intertwining with nodes using only AODV.

The algorithm incurring limited cluster formation/

maintenance overhead and supporting formation of on-

demand clusters.

The algorithm minimizing network-wide flooding and being

scalable.

Page 5: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

103

The proposed scheme constructs/updates clustering architecture

when clusters alone service is required. The on-demand nature of AODV’s is

utilized for the scheme. Nodes participating in clustering are known from CHs

maintained topological information and individual nodes.

5.3.2 Cluster Formation

The aim of clustering is to ensure efficient use of network

resources, enhance availability, reduce overheads and give scalable

architecture (Jiang et al 1998; Garcai et al 2003). The clustering algorithm

choice affects clusters stability. The proposed work divides a network into

several two-hop clusters where in each cluster a node can play one of five

roles: cluster head, ordinary node, secondary cluster head, undecided node or

gateway. A gateway is a node that communicates directly with more than two

clusters.

A Cluster Head (CH) is elected in every cluster and it is responsible

for maintaining inter and intra-cluster communication. Every CH maintains

two tables in addition to a routing table, an intra-cluster node table and a k-

hop cluster table. The intra-cluster node table has the IDs of cluster nodes.

The k-hop table has the IDs of CHs of other clusters in a 2-hop neighborhood.

The CHs coordinate every cluster and store shared information. All nodes

regularly broadcast a hello message to ensure information about neighbors.

To reduce the periodic broadcasting overhead, new/undecided nodes learn of

their nearest CH on demand by forwarding a cluster head request packet. The

nodes act as either ordinary nodes or a gateway based on present location.

A Secondary Cluster Head (SCH) is also chosen to avoid the CH

from becoming into a bottleneck (Lu and Denko 2004). The SCH stores

backup routing and cluster information, with the role being rotated among

Page 6: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

104

ordinary nodes. This election needs no extra overheads as any node wishing

to serve as a SCH informs the CH and the latter informs cluster members.

5.3.3 Cluster Head Election

Many distributed algorithms were suggested for CH election in

MANETs. Chiang et al (1997) revealed that the Lowest ID (LID) algorithm

performed better than cluster head election algorithms based on Highest

Connectivity (HC). The proposals in Chatterjee et al (2000), Garcia et al

(2003) use varied criteria for CH election. As cluster heads are responsible for

maintenance and intra and inter-cluster communication, they were expected to

work for long durations when elected. Node mobility and link failure are the

chief reasons for cluster head re-election and changes in cluster membership.

Figure 5.1 Cluster head election

Denko (2003), proposed a mobility-based clustering algorithm

where a node is elected as CH only when the mobility index is below a

specific threshold. This index is computed based on cluster membership and

CH changes. When there is a tie, the lowest ID node is selected. In cluster

election algorithm, lowest ID clustering is first used to form clusters. Hence, a

node is elected CH when it has the lowest ID. This forms the initial node

configuration. Later, a node with a mobility index lower than its neighbors is

used as criteria. In Figure 5.1, every node broadcasts mobility information to

Node Gateway Cluster

Page 7: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

105

neighbors during a CH election. Once information is collected from neighbors

every node checks to see if it is the node with the lowest mobility index. Once

this is confirmed it becomes a CH itself and informs all neighbors. In this

study, the CH is selected based on the lowest ID and mobility index.

5.3.4 Cluster Maintenance

Cluster maintenance consists of two parts: intra-cluster and inter

cluster maintenance.

5.3.4.1 Intra-cluster maintenance

To keep the neighbor table and CH information updated, nodes

exchange hello messages at periodic intervals. A hello message has

information about a node’s ID and roles. If no hello message is received from

a neighbor during the ALLOW_HELLO_LOST interval, the neighbor is

thought lost and removed from the table. An ordinary node checks the

neighbor table to check whether the CH is still alive. When no CH is found to

exist, a new CH is elected in the neighborhood. Local maintenance is carried

out, when a CH fails.

5.3.4.2 Inter-cluster maintenance

Every cluster head has a k-hop cluster table, containing all network

k-hop CHs information. Each CH then informs neighboring CHs that it is

active by forwarding a HeadAlive message. For example, CH1 receives a

HeadAlive message from CH2. If CH1 discovers that CH2 exists in the CH

table, CH2’s expiration time is updated. Otherwise, a new CH entry for CH2

could be inserted and its expiration time would be set by improving CH

update time to the present. When no HeadAlive message is received from

cluster heads during a HEAD_UPDATE_INTERVAL interval, such a cluster

Page 8: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

106

is assumed to be unavailable. When no HeadAlive message is received during

ALLOW_HEADALIVE_LOST interval, then that CH is removed from the

CH table.

5.4 IMPLEMENTATION OF THE AODV CLUSTERING AND

ROUTING SCHEMES

A k-hop CH table maintains k-hop neighbor cluster information. In

this study k=2, where only two hop clusters are considered. The K-hop CH

table maintains fields such as CH ID, CH status, cluster size, CH expiration

time and number of times the hello message has been lost. The CH’s

expiration time is the current time plus the HeadAliveUpdate interval. A CH’s

status could be either “alive” or “not alive”. A CH’s status will be marked as

“not alive” when its HeadAlive message is not received by other CHs within

its expiration time. A CH entry will be removed from a k-hop CH table if the

number of times that the HeadAlive message has not been received exceeds

three. In the following section, the various data structure added to the AODV

to implement the proposed clustering architecture is presented.

5.4.1 Hello Message and Neighborhood Maintenance

Prior to a hello message being forwarded the sender node adds

status information to it. The hello message sender can be a CH, a gateway,

ordinary node or undecided node. The hello message’s extension includes the

following: source address, lifetime and current status.

A neighbor table stores the neighbor’s ID, expiration time, status

and the many times a hello message was lost. A node on receipt of a hello

message from neighbors, checks whether the neighbor is alive in the neighbor

table. If existence is confirmed, the neighbor’s expiration time is updated or

else a new entry is added. When a node has not received a hello message from

Page 9: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

107

another in three subsequent hello intervals, it is thought to be unconnected

and is removed from the neighbor table.

5.4.2 Cluster Management Module

The following three modules are used to implement an AODV

based clustering algorithm.

5.4.2.1 Cluster initialization module

A cluster formation module initializes clusters after initializing an

AODV. The module is invoked through the CLUSTER_FORM_PERIOD, a

predefined threshold. Before initialization, all nodes are set at status of

“undecided” and broadcast hello message to neighbors. When a node receives

all the hello messages from neighbors, it invokes a Cluster Head Election

module to elect a CH. This stage uses a LID clustering algorithm. The new

CH notifies neighbors and other CHs. The nodes on receipt of a CH existence

notification, changes its status to an ordinary node and forwards hello

messages to neighbors. When a node locates two different CHs in the

neighbor table, that node changes into a gateway. After the execution of a

cluster information module, all nodes belong to one cluster at least.

5.4.2.2 Cluster head election module

A node invokes a Cluster Head Election module to elect cluster

heads when there is no CH or when multiple CHs are in proximity to each

other. The procedure involves the following steps: A node checks whether it

has the lowest mobility index among non-gateway neighbors. When it has the

lowest mobility index, it declares itself as CH and notifies other nodes.

Otherwise, it changes its status to ordinary node.

Page 10: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

108

Figure 5.2(a) reveals the topology of a hypothetical clustered-

network at time t. In Figure 5.2(a), nodes 1, 3 and 6 are CHs. Nodes 8 and 9

are gateways while nodes 2, 4, 5 and 7 are ordinary nodes. Assuming that at

time t2 the network’s topology changes to Figure 5.2(b), where node 7 has

moved from its original cluster. When node 7 checks the neighbor table, it

cannot locate a cluster head. Thus node 7 uses the Cluster Head Election

module to elect a new CH and the result is shown in Figure 5.2(c), where

node 7 becomes a new CH and node 4 the new gateway.

Figure 5.2 Cluster re-election when no cluster exists in the neighbor table

(b)

1

28

6

59

3

4

7

1

28

6

59

3

4

7

1

28

6

5

9

3

4

7

Node

Gateway

Cluster Head(a)

(c)

Page 11: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

109

Figure 5.3 reveals a situation where many CHs exist in one cluster as shown

in (a). When the network’s topology changes from Figure 5.3(a) to Figure 5.3

(b) at time t2, nodes 6 and 7 exchange positions. Node 6 and node 3 find two

CHs among their neighbors, as shown in Figure 5.3 (b). Then both node 3 and

node 6 invoke the Cluster Head Election Module to select a new cluster head.

After cluster election, node 6 throws away its CH status and changes itself

into an ordinary node. Node 3 remains a CH. Again, the cluster with nodes 5,

7, 8 and 9 elect node 5 as the new CH. Network topology after the CH re-

election is seen in Figure 5.3(c).

Figure 5.3 Cluster re-election when more than one cluster head exists

Figure 5.3 reveals a situation where many CHs exist in one cluster

as shown in (a). When the network’s topology changes from Figure 5.3(a) to

1

28

6

59

3

4

7

NodeGatewayCluster Head

(a)

(c)

(b)

1

28

7

59

6

4

3

6

1

28

7

59

3

4

Page 12: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

110

Figure 5.3 (b) at time t2, nodes 6 and 7 exchange positions. Node 6 and node 3

find two CHs among their neighbors, as shown in Figure 5.3 (b). Then both

node 3 and node 6 invoke the Cluster Head Election Module to select a new

cluster head. After cluster election, node 6 throws away its CH status and

changes itself into an ordinary node. Node 3 remains a CH. Again, the cluster

with nodes 5, 7, 8 and 9 elect node 5 as the new CH. Network topology after

the CH re-election is seen in Figure 5.3(c).

5.4.2.3 Neighbor table purge module

As all nodes are mobile and network topology’s changes

frequently, network may be unstable. Clusters size and nodes status varies at

any time due to mobility. To ensure that the cluster information is fresh and

updated, the neighbor table is purged.

5.4.3 Cluster AODV Based Routing

The AODV protocol sends many packets in comparison to other

reactive protocols like DSR. So, when network’s size increases, node degree

also increases proportionately, leading to congestion in the network.

Clustering reduces this through localized route discovery and maintenance.

The suggested Cluster AODV scheme uses clustering architecture and AODV

functionalities for routing. This section discusses mechanisms used by

Cluster-AODV to lower routing overhead and allows scalability while

ensuring good packet delivery ratio.

5.4.3.1 Intra-cluster routing

Intra-cluster routing is routing within a cluster. Each node has routing

information on its cluster. When a node lacks a route to a destination that is in

the cluster it sends a Local Route Request (LRREQ). When route failures ensure

lack of reply to a RREP, local route maintenance is undertaken within a cluster.

Page 13: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

111

5.4.3.2 Inter-cluster routing

Inter-cluster routing is routing among clusters. The CH has a 2-hop

cluster topology also maintained in a SCH to minimize one point of failure.

When routes cannot be found in a cluster once a LRREQ message has been

issued, a CH uses a RREQ message to locate a destination via a gateway to 2-

hop neighbor clusters. To lower RREQ flooding packet overhead only

gateways and CHs forward the RREQ. Ordinary nodes are not involved in

RREQ packets in inter-cluster communication.

5.4.3.3 Route maintenance

Similar to route maintenance, cluster maintenance starts when a

route fails within a cluster and is re-constructed locally using LRREQ and

RREQ with 2-hop topology information. When LRREQ fails, an AODV

procedure is used and the usual RERR is forwarded to source nodes for route

reconstruction. The source node follows the same process to repair failed

routes, first locally and then others.

The processes involving a new node which joins and an existing

node leaving are carried out based on hello messages from AODV. When

CHs exchange neighborhood information with cluster members, a new node

close by can register with a CH by using a RREQ message. A node acts as

gateway when it registers with two CHs. When a node goes away from the

present CH, it switches its role to that of an ordinary node, a gateway or will

be undecided. It will be erased from the old CH and old members’ routing

entries are updated accordingly.

Page 14: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

112

5.5 SELFISH NODES

In ad hoc networks, nodes are classified as failed, co operative,

selfish and malicious nodes. A node can refrain from being active in a

network when moving out of transmission range or when it is switched off by

malfunctions. Failed nodes are unused during route discovery. Co-operative

nodes are active in the network and participate in route discovery and packet

forwarding. Selfish nodes actively involved in route discovery and actively

send/receive own packets. But they are liable to drop other nodes data packets

either fully or selectively to lower CPU processing to save battery power.

Such nodes affect network performance greatly. But malicious nodes are also

active in route discovery and could involve data packets transfer similar to

selfish or co-operative nodes. However they also launch attacks on networks

either to disrupt services or steal network data..

As mobile nodes are autonomous they join or leave the network

freely and so nodes are unable to work out an effective system to prevent

prospective malicious behavior from nodes it communicate with. This is

because nodes behavioral diversity. Further, because of ad hoc network

mobility a compromised node can and will frequently change attack target

and indulge in malicious behavior with various network node, thereby making

it difficult to track malicious behavior of a compromised node in a large ad

hoc networks. Hence, threats from compromised nodes with networks are

more dangerous than attacks from outsiders. Also such attacks are harder to

detect as they are from compromised nodes, which behave correctly prior to

being compromised.

An example of such threats is from potential Byzantine failures

seen in the routing protocol for MANET (Mishra et al 2004). Byzantine

failure occurs when nodes are compromised so that incorrect/malicious

behavior cannot be easily detected due to cooperation among compromised

nodes when they indulge in malicious behavior. Such nodes may behave well,

Page 15: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

113

but they may use flaws and inconsistencies in routing protocols to destroy

routing network fabric without detection, generate and advertise new routing

information containing nonexistent link, provide fake link state information and

even flood other nodes with routing traffic. Such malicious behaviors are liable to

be ignored by other nodes as compromised nodes cannot be recognized easily.

One of the misbehavior which the malicious node exhibit is

selfishness, wanting to preserve own resources while using the services of the

other nodes in network and consuming their resources. Performance of ad hoc

network protocol depends upon the cooperation of all the nodes in the

network. Nodes transfer traffic by route detection and packet forwarding. As

transferring traffic consumes energy, CPU time, memory and bandwidth,

selfish nodes deny packet forwarding to other nodes but use the network

resources to deliver its own data. Detection and exclusion mechanism is used

to prevent selfishness in ad hoc networks.

The selfish node saves its own resources as follow (Bruce 2000):

1. Not participating in routing: Selfish node do not relay the

routing data such as route requests and route replies. Set hop

limit or TTL value at the lowest in route request / reply.

Selfish nodes modify routing data to modify route request,

insert additional hops, declare own ID as external in source

route.

2. Stop participation in current route: Do not participate in

route request, create arbitrary RERR messages, not sending

ACK messages.

3. Stop relaying data packets: Drop data packets.

Page 16: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

114

5.6 EXPERIMENTAL SETUP

The OPNET simulation tool is used to evaluate performance.

Simulation parameters are the same as used in the previous chapter. Three

scenarios are studied in this investigation,

Nodes moving in constant speed

To replicate real time scenario, experiments with 8 nodes

moving at an average speed of 100 Kmph in a predefined

circular route 4 nodes moving at an average speed of 65

Kmph in a predefined straight route. Balance nodes moving

randomly about the network.

To replicate real time scenario, selfish nodes are included in

the network.

Simulations are run using Fuzzy AODV, Proposed Fuzzy Clustered

AODV and Proposed Fuzzy Clustered AODV with selfish nodes. The

proposed AODV Clustering approach is evaluated for packet delivery ratio

and end to end delay.

5.7 RESULTS AND DISCUSSION

The experiments were conducted based on the above simulation

parameters. Each data point in the graph represents an average of ten

simulation runs. Figure 5.4 shows the packet delivery ratio for Nodes moving

in constant speed. Figure 5.5 show the end-to-end delay in MANET.

Table 5.1 tabulates the same.

Page 17: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

115

Table 5.1 Packet delivery ratio and end-to-end delay for nodes moving

in constant speed.

NodeMobility

speed

Packet Delivery Ratio End to End Delay

FuzzyAODV

ProposedFuzzy

ClusteredAODV

FuzzyAODV

ProposedFuzzy

ClusteredAODV

10.8 Kmph 0.9732 0.9817 0.000985 0.00102

18 Kmph 0.89264 0.92264 0.001225 0.001017

36 Kmph 0.8712 0.8912 0.01138 0.009857

54 Kmph 0.8688 0.8417 0.01434 0.01658

72 Kmph 0.7215 0.6817 0.0315 0.03652

90 Kmph 0.6823 0.6412 0.0336 0.03876

Figure 5.4 Packet delivery ratio for nodes moving in constant speed

Page 18: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

116

Figure 5.5 End-to-end delay nodes moving in constant speed

From Figures 5.4 and 5.5, it is seen that when the nodes move in

constant speed, the proposed Fuzzy clustered AODV performance is similar

to Fuzzy AODV. In high speed, Fuzzy AODV performs better than the

proposed clustered AODV. The increase in end to end delay is however

negligible.

Table 5.2 and Figure 5.6 shows the packet delivery ratio for Nodes

moving in varying speed for Fuzzy AODV, Proposed Fuzzy Clustered AODV

and Proposed Fuzzy Clustered AODV with selfish nodes. Table 5.3 and

Figure 5.7 show the end-to-end delay in MANET.

Page 19: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

117

Table 5.2 Packet delivery ratio for nodes moving in varying speed

Timein sec

FuzzyAODV

ProposedFuzzy

ClusteredAODV

Proposed FuzzyClustered AODVwith selfish nodes

10 0.8488 0.869171 0.809755

20 0.849 0.863433 0.708236

30 0.8538 0.872157 0.695505

40 0.8714 0.892314 0.681783

50 0.8718 0.886621 0.753845

60 0.8501 0.868377 0.692491

70 0.8676 0.888422 0.67881

80 0.8694 0.88418 0.75177

90 0.8772 0.89606 0.758515

100 0.8786 0.899686 0.715708

110 0.8314 0.87432 0.7245

120 0.8577 0.876141 0.741653

130 0.8805 0.901632 0.761368

140 0.8857 0.900757 0.721491

150 0.8872 0.906275 0.694145

160 0.8974 0.918938 0.775982

170 0.8501 0.8978 0.735081

180 0.8731 0.891872 0.711227

190 0.8776 0.898662 0.686634

200 0.8642 0.878891 0.747274

Page 20: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

118

Figure 5.6 Packet delivery ratio for nodes moving in varying speed

From figure 5.7 it can be seen that end to end delay is high for malicious

nodes as newer routes need to be discovered due to the packet drop caused by

selfish nodes.

Figure 5.7 End-to-end delay for nodes moving in varying speed

Page 21: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

119

Table 5.3 End-to-end delay for nodes moving in varying speed

Time insec

Fuzzy AODVProposed Fuzzy

Clustered AODV

Proposed Fuzzy

Clustered AODV

with selfish nodes

10 0.0161472 0.015098 0.016704

20 0.0163216 0.015375 0.018182

30 0.0163312 0.017474 0.018716

40 0.0148704 0.013978 0.017458

50 0.0151184 0.014136 0.01614

60 0.0146256 0.013777 0.017755

70 0.0146848 0.015713 0.016829

80 0.0148096 0.013921 0.018867

90 0.0148368 0.013872 0.01678

100 0.0148704 0.014008 0.016566

110 0.0151184 0.016177 0.017326

120 0.0151888 0.014277 0.020869

130 0.0152432 0.014176 0.015617

140 0.0153632 0.014357 0.017115

150 0.01572 0.014808 0.018785

160 0.013224 0.01415 0.015525

170 0.0137216 0.012898 0.014881

180 0.0138304 0.012862 0.015407

190 0.0140928 0.01317 0.01615

200 0.0141872 0.013364 0.016656

Page 22: CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT …shodhganga.inflibnet.ac.in/bitstream/10603/24649/10/10_chapter5.pdf · AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT

120

From Figures 5.6 and 5.7, it is seen that the proposed Fuzzy Clustered AODV

performs better than Fuzzy AODV in terms of both packet delivery ratio and

end-to-end delay. It is also seen that the performance of the network

deteriorates considerably in the presence of selfish nodes.

5.8 CONCLUSIONS

This work presents an AODV-based clustering and routing scheme

for MANETs. The scheme is used for integrated routing and message delivery

in clustered networks. The proposed clustering architecture was evaluated

using simulation experiments. The simulation results show that the algorithm

builds stable clusters achieving better packet delivery ratio and end-to-end

delay. Further studies are required to address the deterioration in performance

due to the presence of selfish nodes.