Sunteți pe pagina 1din 9

International Journal of Networks (IJN)

Vol. 1, Issue. 1, April 2015


ISSN (Online): 2454-1060

Cross- Layer based efficient data transmission in MANET


using Fuzzy Logic
1

Narayanan.S, 2 Rani Thottungal, 3 R.Aarthi, 4 M.Nija Priya, 5 M.Anu


Department of Information Technology,Valliammai Engineering College, Chennai, India.
2
Department Of EEE Kumaraguru College of EngIneering, Coimbatore, India
3,4,5
UG Scholar, Valliammai Engineering College, Chennai, India

AbstractIn mobile ad-hoc network, the performance depends


on the adaptability of the underlying routing protocol to current
network condition. The existing fuzzy based cross layer routing
protocol in which the parameters such as number of hops and
mobile speed for estimating link stability in the network has the
drawback of leading to overhead and dependency. In turn
leading to delay and inefficiency in data transmission. In order to
overcome these drawbacks, in this paper we propose fuzzy based
optimal path selection by considering the path stability, the
residual energy of the nodes and bandwidth as parameters at the
source node. The path stability is estimated based on available
battery power, distance and link quality. The residual energy is
estimated for the node at both the situations, when the node
receives and transmits the data packets. Following the path
selection, fuzzy based transmission rate adjustment of source is
calculated by considering end to end delay and packet loss ratio
as parameters at destination node. Also we propose a method to
draw a table, which includes energy efficiency in all combination
of transmission power and rate, is updated by each node.

The routing protocol for MANET could be broadly


classified into two major categories based on the method of
keeping the information about routes in the network.
They are:
Proactive Routing Protocol
Reactive Routing Protocol
I.3. A D-HOC ON DEMAND DIST ANCE VECT OR ROUT ING
PROT OCOL (AODV)
Ad-hoc On-demand Distance Vector (AODV) [2] routing
protocol is one of the MANET routing protocols which comes
classified under reactive protocol. It provides efficient route
establishment between nodes in a wireless network
communication between mobile nodes with minimal control
overhead and minimal route acquisition latency. The two main
operations taking place in AODV protocol are Route
discovery and Route maintenance.
I.4. FUZZY INFERENCE SYST EM

Index TermsAd-Hoc On Demand Distance Vector Routing


protocol (AODV), Fuzzy inference system, Cross-Layer design.

Fuzzy Inference System [3] is a system that uses fuzzy


logic to map a set of inputs to a set of outputs.
Fuzzy Logic was initiated to represent /manipulate data
possessing non-statistical uncertainties. Fuzzy logic is a multivalued logic which deals with reasoning that are approximate
rather than fixed and exact. Fuzzy logic variables may have
truth value that ranges on degree between 0 and 1. It has been
extended to handle the concept of partial truth and hence the
truth value ranges from completely true to completely false.
Fuzzy logic provides inference morphology and enables
approximate human reasoning capabilities to be applied to be
applied to knowledge based system.
The fuzzy logic provides mathematical strength to capture
the uncertainties associated with human cognitive process such
as thinking and reasoning

I. INT RODUCT ION


I .1. M OBILE A D-HOC NET WORK (MANET )

With the extensive growth of wireless handheld devices


and plummeting costs [1] has emerged as a major area of
research for both academics and the industrial sector. A
Mobile network is a set of mobile telecommunications, Mobile
Ad-hoc Network (MANET) of wireless mobile nodes which
are infrastructure-less network consisting of numbers of mobile
hosts communication with one another through multiple hop
wireless links. MANETs are self-organizing, self-configuring
and dynamic topology network making them convenient for
combat, medical and other emergency situations.
I.2. ROUT ING PROT OCOL

I.5. CROSS LAYER DESIGN

The MANETSs routing protocol finds routes between


nodes and then allows data packets to be forwarded through
other network nodes towards the final destination [2].

In Ad-Hoc network, each and every node communicates


with each other through the OSI layer. But the defect of this
reference protocol architecture is that adjacent layers only can
communicate with each other and every layer has its own

International Journal of Networks (IJN)


Vol. 1, Issue. 1, April 2015
ISSN (Online): 2454-1060
Reliability Value. Battery power and trust value of
individual nodes are used to find the reliable path. This
approach forms a reliable route for transmission thus
increasing network lifetime and decreasing number of packet
loss during transmission. This paper has considered trust value
of each node and energy capacity (Battery capacity) as fuzzy
parameters.
Cherine Fathy et al. [9] proposed a fuzzy based adaptive
cross layer routing protocol that enables each mobile node to
switch between reactive routing mode and proactive routing
mode depending on the current node status. Fuzzy -based
routing mode selector whose inputs are the number of link
breaks, the interface queue length and the type of application
for each node. The advantage of this protocol is improved
packet delivery ratio, route-discovery latency and average
discovery path length.
Masaki Bandai et al. [10] proposed a Medium Access
Control (MAC) protocol with transmission power and rate
control in multi-rate Ad-Hoc networks. This protocol realizes
high energy efficient data transmission. In the protocol, each
node prepares a table that includes energy efficiency in all
combinations of transmission power and rate. Exchanging of
control frames, looking up the transmission power and rate
table and relay transmission sequences are used arbitrarily. The
relay sequence is adopted instead of direct transmission when
relay transmission by intermediate node between sender and
receiver is more effective in terms of power consumption. The
advantage of this approach is that it can realize high energy
efficient data transmission via computer simulations.

information which cannot be accessed by other layers. Crosslayer design [4] is the protocol design which is mainly used to
remove the dependency between layers .Cross layer is the
interface that is used for sharing information between layers. It
is mainly used to enhance the performance of a system. In this
paper, we have used shared database design of the cross layer.
II. RELAT ED W ORK
Siddesh Gundagatti Karibasappa et al. [5] proposed neuro
fuzzy based routing protocol. They have utilized the soft
computing techniques such as Neural Nets, Fuzzy Logic and
genetic Algorithms to derive accurate routing information from
mobile Ad-Hoc networks to achieve this efficient protocol. To
solve the objective function and establish a route within the
shortest possible time the combination of these powerful
techniques are used. This protocol has used feed forward
artificial neural network to achieve best performance in
routing.
M.Niazi Torshiz et al. [6] proposed to incorporate the fuzzy
concept with AODV routing algorithm and have considered
power consumption. This fuzzy logic based routing algorithm
monitors the routes and tries to select the optimal route based
on minimum bandwidth and hop count of each route. It also
has tried to balance the traffic load inside the network so as to
increase the battery lifetime of the nodes and hence the overall
useful life of the ad hoc network. In this paper, the fuzzy input
variables are chosen to be minimum bandwidth, battery life
and hop-count.
Zuo Jing et al. [7] proposed a multi constrained QoS
routing protocol based on fuzzy logic. The protocol is service
aware and developed based on DSR. It has considered the QoS
requirements asked by different kinds of services and takes
different network state parameters as the constraint conditions.
They proposed new route informing mechanism to s upport
route update; and have adjusted the speed of packet in terms of
the output of fuzzy system; also they have optimized routing
algorithm for real time traffic to assure that data are always
transmitted through the route with the lowest delay. In this
proposal, the fuzzy system consists of three subsystems.
Therefore multiple metrics have been considered as fuzzy
inputs. The fuzzy inputs used are number of hops, bandwidth,
mobile speed and buffer occupancy rate.
Golnoosh Ghalavani et al. [8] proposed a reliable routing
protocol for MANET based on fuzzy logic. The proposed
work is known as RRAF and it finds reliable path for the
transmission of data. In their work, during route discovery,
node with maximum trust value and maximum energy
capacity is selected as a router based on a parameter called

III. FUZZY BASED CROSS LAYER ROUT ING AND T RANSMISSION


RAT E DET ERMINAT ION

In this paper, we propose cross layer based routing in


MANET using fuzzy logic. In this technique, two fuzzy
systems are used for efficient transmission. The fuzzy logic
system 1 (FLS1) is responsible for best path selection and the
fuzzy logic system 2 (FLS2) is responsible for transmission
rate determination. In FLS1, through the route discovery
mechanism the input parameters such as the path stability and
bandwidth are obtained at the source. These inputs are
fuzzified and the optimal path for data transmission is
identified. In FLS2, the end to end delay and packet loss ratio
are obtained as the input values at the destination. These inputs
are fuzzified and the state of the transmission rate is estimated.
Thus, this prevents the path from congestion.

International Journal of Networks (IJN)


Vol. 1, Issue. 1, April 2015
ISSN (Online): 2454-1060
III.1. EST IMAT ION OF MET RICS

Where,
Ptx = probability of successful packet delivery in forward
direction.
Prx = probability of successful acknowledgement packet
reception.
Distance
between the two nodes is calculated using the

III.1.1. EST IMAT ION OF BANDWIDT H


Any node that wants to transmit data should be aware of its
local bandwidth and its neighboring nodes information within
the inference range. The node pays attention to the channel and
estimates local bandwidth (BW L ) as the bandwidth is shared
among neighboring nodes. The ratio of idle and busy time
period for a predefined interval affects the local bandwidth
[11]:

following free space propagation model:


The proposed technique involves selection Brx =
(

(6)

Where = transmitter gain, = receiver gain, = system loss


and w = wavelength

BW l = C*(Ti /Ttp )
(1)
Where C= Channel capacity and Ti = Idle time period in the
predefined time period T tp.
The minimum bandwidth (BW mn ) of all the nodes within the
interference range is calculated as the result of prior collection
of neighboring node information. Thus, the difference between
BW mn and BW l gives the residual bandwidth (BW r) of the
node:
BW r = BW l - BW mn
(2)

III.1.3. EST IMAT ION OF RESIDUAL ENERGY


The energy consumption (Econ ) of a node after time (t) is
calculated by using the following equation:
Econ (t) = Ntx + C1 * Nrx + C2
(7)
Where,
Econ (t) = Energy consumed by a node after time (t).
Ntx = Number of packets transmitted by the node after time (t).
Nrx = Number of packets received by the node after time (t).
C1 and C2 = Constant factors having the value between 0 and 1.
The residual energy (Eres ) [13] of a node at time (t) is
calculated by using the following equation:
Eres = E - Econ (t)
(8)
Where E = initial energy of a node.

III.1.2. EST IMAT ION OF PAT H ST ABILIT Y


The path stability is estimated based on available battery
power, distance and link quality. These values are obtained
from the PHY and MAC layer dynamically [12]:

Path Stability (PS) =

(3)

III.1.4. EST IMAT ION OF END T O END DELAY


Where,
Available Battery Power (Bij ) is defined as the ratio of power
received at the node (Brx) to the power transmitted (Btx) by the
neighbor node.
Link Quality (Lij) is defined in terms of the expected
transmission time (ET).
The expected transmission time (ET) is defined as the
expected time to successfully transmit a data packet at the
MAC layer for a single link. ET can be obtained by adding all
the ET values of the individual links in the route:

The end to end delay consists of all possible delay such as


buffering caused during routing discovery latency, queuing at
the interface queue, retransmission delay at the MAC,
propagation and transmission time.
Thus, the end to end delay is defined as the time taken for
transmission of the data from source to destination [14] which
is given by the following equation:
Dee = (Trx Ttx)
(9)
Where Trx = reception time and Ttx = transmission time.
III.1.3. EST IMAT ION OF PACKET LOSS RAT IO

ET = EX * (z/ BW)
(4)
Where z = average size of a packet, BW = current link
bandwidth and EX =Expected transmission count metrics.
The expected transmission time (EX) is the measure of the
path and link quality. EX metric for a single is defined as
following equation:
EX =

The packet loss ratio can be defined as the number of data


packets that are not effectively transmitted to the destination
which is expressed in terms of dropped packets.
III.2. PROPOSED T ECHNIQUE
The proposed techniques involve the selection of optimal
routes and rate adjustment using the fuzzy logic system.
This is described in the following two phases of fuzzy logic
system:

(5)

International Journal of Networks (IJN)


Vol. 1, Issue. 1, April 2015
ISSN (Online): 2454-1060

bandwidth, path stability and residual energy. This


optimal path is used for data transmission.
10) The path that is available in the route cache is
considered for data transmission.

Fuzzy Logic System 1 (FLS1): Optimal Path


Selection.
Fuzzy Logic System 2 (FLS2): Optimal Rate
determination.
The fuzzy logic is chosen due to the following two reasons:
a) There is no clear boundary between normal and
abnormal events.
b) The fuzzy rules should level the normality and
abnormality separation.
The mechanism of the proposed technique is described in the
following section sequentially.

III.2.1.1. FUZZY LOGIC SYST EM 1 (FLS1)


The Fuzzy logic System 1 involves the selection of the
optimal path. The optimal path is selected by considering the
three inputs such as bandwidth, path stability and residual
energy. The three inputs are fuzzified to obtain the appropriate
optimal path.
Fuzzification:
It involves the fuzzification of the input variables - BW r, PS and
Eres . Crisp inputs are taken from these variables and these
inputs are given a degree to appropriate fuzzy sets. The
combination of BW r , PS and Eres are the crisp inputs. We
consider the three possibilities - high, medium and low for BW r,
PS and Eres .
The fig. 1, 2 and 3 shows the membership function for the
input and output variables. The triangulation function which is
widely used in real-time applications owing to their
computational efficiency and uncomplicated formulas are used.
In Table II, BW r, PS and Eres are given as input and the output
is the optimal path (OP) for data transmission. The fifteen
fuzzy sets are defined with the combination presented in Table
II.

III.2.1. A LGORIT HM FOR OPT IMAL PAT H SELECT ION


The steps involved in the selection of the optimal path are
as following:
1) When source (S) wants to transmit a data packet to
destination (D) , it verifies its route cache for path
availability:
If path exists
Then
Go to step10
Else
Go to step 2
End if
2) S broadcasts route request (RREQ) packet towards the
D through intermediate nodes (Ni).
3) Ni upon receiving the RREQ updates the route cache
(shown in Table 1) about the source, destination,
previous hop node, battery power, link quality and
available bandwidth.
4) Ni then either re-broadcasts the RREQ to its
neighbors or sends the route reply (RREP) if the node
is D. This process is repeated till RREQ reaches D.
5) When D receives RREQ, for the every received
RREQ the RREP packet is unicast in the reverse path
towards the source.
6) Every Ni that receives RREP updates its cache for the
next hop of the RREP and then unicasts this RREP in
the reverse-path using the earlier stored previous hop
node information.
7) Step 6 is being repeated until RREP reaches S.
8) S then computes bandwidth, path stability and
residual energy (Estimates in section III.1.1, III.1.2
and III.1.3) based on collected information from
RREP.
9) The values calculated in step8 by S are considered as
the inputs to the fuzzy logic system. Based on the
result, S selects an optimal path that has high

Fig.1. Member function of Bandwidth

International Journal of Networks (IJN)


Vol. 1, Issue. 1, April 2015
ISSN (Online): 2454-1060
Defuzzification:
It is the technique by which a crisp values are extracted
from a fuzzy set as a representation value is referred to as
defuzzification.
The centroid of area is taken into consideration for
defuzzification during fuzzy decision making process. The
following equation describes the defuzzifier method:
F_Cost = [

(zi )]

(10)

Where,
F_Cost = specify the degree of decision making.
zi = fuzzy rules and variables.

Fig.2. Member function for Path Stability

(zi ) = membership function.


As per the defuzzification method, the output of the fuzzy cost
function is modified to crisp value.
Thus, the optimal path chosen is used for data transmis sion
from source to destination.
III.2.1.2. FUZZY LOGIC SYST EM 2 (FLS2)
Source proceeds with the transmission of data to
destination through the selected optimal path (Described in
section III.2.1.1). At the receiver side at this moment, the
destination node computes the parameter such as end-to-end
delay (Dee) and packet loss ratio (PLR) (explained in section
III.1.4 and III.1.5). It applies the inputs to FLS2 in order to
estimate the state of transmission rate.
Fuzzification:
This involves fuzzification of input variables such as Dee and
PLR. Crisp inputs are taken from these variables and these
inputs are given a degree to appropriate fuzzy sets. The crisp
inputs are combination of Dee and PLR. We consider three
possibilities - high, medium, and low for Dee and PLR.
The Figs. 4, 5, and 6 shows the membership function for
the input and output variables. This utilizes the triangulation
functions as they are widely used in real-time applications
owing to their computational efficiency and uncomplicated
formulas.

Fig.3. Member function for Residual Energy


TABLE II
Fuzzy Rules (for FLS1)
S.No

Bandwidth

Path Stability

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15

Low
Low
Low
Low
Low
Low
Medium
Medium
Medium
Medium
High
High
High
High
High

Low
Medium
High
High
Medium
High
Low
Medium
High
High
Low
Medium
High
Medium
High

Residual
Energy
Low
Low
Low
High
Medium
Medium
Low
Medium
Medium
High
Low
Medium
Medium
High
High

O utput
Very Low
Low
Low
High
Medium
Medium
Low
Medium
Medium
High
Low
Medium
High
High
Very High

The Table II demonstrates the designed fuzzy inference


system.
It illustrates the function of the inference engine and method by
which the outputs of each rule are combined to generate the
fuzzy decision.
For example, let us consider Rule 15.
If BW r is high, PS is high and Eres is high,
Then
The path is highly optimal for data transmission
End if.

Fig.4. Member function of End to End delay

International Journal of Networks (IJN)


Vol. 1, Issue. 1, April 2015
ISSN (Online): 2454-1060
III.2.1.2. TRANSMISSION POWER AND T RANSMISSION RAT E
T ABLE

The Table IV includes the energy efficiency of all


combinations of transmission power and transmission rate.
This table consists of many columns like power (P), rate (R),
power gap () and energy ratio (). In this approach, the
number of neighbor nodes, (Request-to-send) RTS collision
probability and bit error rate has to be obtained very carefully.
By using the specification of the network card, the transmission
power and transmission rate table of the proposed protocol is
prepared. Hence there is no need to calculate any parameters
about network topology, traffic pattern and propagation.
TABLE IV
Transmission Power and Rate Table

Fig.5. Member function of Packet Loss Ratio

Fig.6. Member function for Transmission Rate


In Table III, Dee and PLR are given as inputs and the
output represents the transmission rate. The nine Fuzzy sets
are defined with the combinations presented in Table III.
TABLE III
Fuzzy Rules (for FLS2)
S.No.
1
2
3
4
5
6
7
8
9

End to End De lay


Low
Low
Low
Medium
Medium
Medium
High
High
High

Packet Loss Ratio


Low
Medium
High
Low
Medium
High
Low
Medium
High

O utput
Very High
High
Low
Medium
Medium
Low
Low
Low
High

Power
dBm

0
1
0
1
0
1
2
0
1
:
3

0
0
1
1
2
2
2
3
3
:
3

14.77
13.01
14.77
13.01
14.77
13.01
6.99
14.77
13.01
:
0

Rate
Req. Rx Pow.
Gap
Mb/s

1
1
2
2
5.5
5.5
1
11
11
:
11

dBm
0.00
1.78
3.00
4.76
5.00
6.76
7.78
9.00
10.76
:
23.77

Pow. Cons.
Ratio
(
)
1.000
0.844
0.508
0.429
0.195
0.164
0.611
0.105
0.089
:
0.058

Let P0, P1Pn-1 (P0 > P1 > >Pn-1) dBm be the levels of
transmission power available. The maximum transmission
power P0 is defined as base transmission power. Let m be the
levels of data rate available which are R0, R1Rn-1 (R0 < R1
< < Rn-1) Mbps. The lowest data rate R0 is defined as base
transmission rate. This energy efficiency ratio ( (Pi, Rj)) as
follows:
=

The Table III demonstrates the designed fuzzy inference


system.
For example
Let us consider Rule 9.
If Dee is high and PLR is high
Then
The state of transmission rate of the source is very low
End if.
Similar to section III.2.1.1, the obtained output value is
defuzzified. We can obtain the state of transmission rate as an
outcome of fuzzy decision. Thus the current transmission rate
of the source is adjusted by comparing the output of FLS2
with initial transmission rate of path. This prevents the
congestion.

(11)

Here E (Pi ,Rj ) is the energy consumption when transmission


power Pi and rate Rj are adapted.
The required power gap to receive a data (Pi,Rj) dBm is
defined as given below:
(Pi,Rj)= (Pi,Rj)- (P0 ,R0 )
(12)
Here
dBm is the required power to receive a data
(Pi,Rj) and (Pi,Rj) is calculated by the specification of
network card. The transmission power and rate table for Cisco
Aironet 350 is as given in the Table IV. The card has four level
of transmission power like P0 =14.77, P1 =13.01, P2=6.99 and
P3 =0 dBm. Also four level of transmission rate which are
R0 =1, R1 =2, R2 =5.5 and R3 =11 Mb/s. In Table IV, there are 16
combinations of transmission power and rate.

International Journal of Networks (IJN)


Vol. 1, Issue. 1, April 2015
ISSN (Online): 2454-1060
Example: If P0 =14.77 dBm and R3 =11 Mb/s are selected, then
the energy consumption is 0.105 times as that of the base
transmission power and rate. The required power at a receiver
is 9.00 dBm larger than that of base transmission power and
rate. The node will calculate the received power when the node
receives a control frame such as RTS.
Let p dBm be the received power of the RTS.
The power gap is given by p- (P0 , R0), hence the combination
satisfying (Pi,Rj) < p-(P0,R0) is selected from the table.
Fig.7. Rate vs. Delivery Ratio
IV. SIMULAT ION RESULT S
The Network Simulator (NS2) [15], is used to simulate the
proposed architecture. In the simulation, 150 mobile nodes
move in a 1000 * 1000 meter square region for 50 seconds of
simulation time. All the nodes are of the transmission range of
250 meters. The simulated traffic is constant bit rate (CBR).
The simulation setting and parameters are summarized in
the following Table V:
TABLE V
Simulation Parameters
Numbe r of node s
Are a Siz e
MAC
Transmission Range
Simulation Time
Traffic source
Packe t Siz e
Source s
Rate
Initial Ene rgy
Transmission Powe r
Re ce iving Powe r

Fig.8. Rate vs. Packet Drop

150
1000x1000
IEEE 802.11
250 meters
50 seconds
CBR
512
2,4,6,8 and 10
100,200,300,400 and 500 kb
9.1 Joules
0.660 W atts
0.395 W atts

Fig.9. Rate vs. Residual Energy


Fig.7. shows the delivery ratio of this protocol and EEMAC
techniques for different rate scenario. We can conclude that the
delivery ratio of our proposed approach has 27% of higher than
EEMAC approach.
Fig.8. shows the packet drop of the protocol and EEMAC
techniques for different rate scenario. We can conclude that the
drop of our proposed approach has 11% of less than EEMAC
approach.
Fig.9. shows the residual energy of this protocol and
EEMAC techniques for different rate scenario. We can
conclude that the drop of our proposed approach has 2% higher
than EEMAC approach.

IV.1. PERFORMANCE M ET RICS


The proposed routing technique is compared with the EEMAC technique [16].The performance is evaluated mainly
according the following metrics.
Packet Delivery Ratio: The ration between the
numbers of packets received to the number of
packets sent.
Packet Drop: The average number of packets
dropped during transmission.
Residual Energy: The amount of energy that
remains in the participant node.

B. Based on Flow:
In our second experiment, we vary the number of flows as
2,4,6,8 and 10.

IV.2. RESULT S
A. Based on Rate:
In our first experiment, we vary the transmission rate as
100, 200, 300, 400 and 500 kbs.

International Journal of Networks (IJN)


Vol. 1, Issue. 1, April 2015
ISSN (Online): 2454-1060
By simulation results, this path selected by this approach is
more stable and more energy efficient. Also through this way
the networks and nodes lifetime will be prolonged.

References
[1] Vahid Ayatollahi Tafti and Abolfazl Gandomi,
Performance of QoS Parameters in M ANET Application
Traffics in Large Scale Scenarios, World Academy of
Science, Engineering and Technology, 2010.
[2] Al-Sakib Khan Pathan and Choong Seon Hong, Routing
in M obile Ad Hoc Network, Guide to Wireless Ad Hoc
Network, 2009 edition.
[3] Serge Guillaume, Designing Fuzzy Inference Systems
from Data: An Interpretability Oriented-Review, IEEE
Transaction on Fuzzy Systems, Vol. 9, NO. 3, June 2001.
[4] Vineet Srivastava ans M ehul M otani, Cross-Layer Design:
A Survey and the Road Ahead, IEEE Communication
Magazine, December 2005.
[5] A. Siddesh Gundagatti Karibasappa and B.K.N.
M uralidhara, Neuro Fuzzy Based Routing Protocol for
M obile Ad-Hoc Networks, IEEE 6th International
Conference on Industrial and Information Systems, (IICSI
2011), 2011.
[6] M . Niazi Torshiz, H. Amintoosi and A. M ovaghar, A
Fuzzy Energy-based Extension to AODV Routing, IEEE
International Symposium on Telecommunications, 2008.
[7] Zuo Jing, Chi Xuefen, Lin Guan and Li Hongxia, Serviceaware M ulti-constrained Routing Protocol with QoS
Guarantee Based on Fuzzy Logic, IEEE 22nd
International conference on Advanced Information
Networking and Applications- Workshops , 2008.
[8] Golnoosh Ghalavand, Arash Dana, Azadeh Ghalavand and
M ahnaz Rezahosieni, Reliable routing algorithm based on
Fuzzy logic for Golnoosh M obile Adhoc Network, IEEE
3rd International Conference on Advanced Computer
Theory and Engineering (ICACTE), 2010.

Fig.10. Flows vs. Delivery Ratio

Fig.11. Flows vs. Packet drop

Fig.12. Flows vs. Residual Energy


Fig.10. shows the delivery ratio of this protocol and
EEMAC technique for different rate scenario. We can conclude
that the delivery ratio of our proposed approach has 15% of
higher than EEMA C approach.
Fig.11. shows the packet drop of this protocol and EEMAC
techniques for different rate scenario. We can conclude that the
drop of our proposed approach has 11% of less than EEMAC
approach.
Fig.12 shows the residual energy of this protocol and
EEMAC techniques for different rate scenario. We can
conclude that the residual energy of our proposed approach has
14% higher than EEMAC approach.

[9] Cherine Fathy, M.T. El-Haddi and M.A.El-Nasr,


Fuzzy-based Adaptive Cross Layer Routing Protocol for
Delay Sensitive Application in M ANET, IEEE
International Conference on Communications (ICC),
2012.
[10] Masaki Bandai, Satoshi M aeda, and Takashi Watanabe,
Energy Efficient M AC Protocol with Power and Rate
Control in M ulti-rate ad hoc networks, IEEE, 2008.
[11] M ohammed Saghir, Tat-Chee Wan, Rahmat Budiarto,
QoS M ulticast Routing Based on Bandwidth Estimation in
M obile Ad-Hoc Networks, Proceedings of the Int. Conf.
On Computer and Communication Engineering
(ICCCE),Vol. I, 9-11, 2006.
[12] G N V Prasad, V. Siva Parvathi, Dr.K.Nageswara Rao,
Link stability based multicast routing scheme inM ANET,
International Journal of Advanced Engineering Sciences
and Technologies (IJAEST), Vol No. 8, pp 169 176, Issue
No. 2, 2011.

V. CONCLUSION
In this paper, we have proposed a fuzzy based cross layer
routing in MANET in which the system comprises of two
fuzzy system namely fuzzy logic system 1 (FLS1) and fuzzy
logic system 2 (FLS2).

International Journal of Networks (IJN)


Vol. 1, Issue. 1, April 2015
ISSN (Online): 2454-1060
Probabilistic Broadcasting in M obile Ad Hoc Networks,
IEEE International Conference on Wireless Days (WD),
IFIP, pp-1-6, 2011.
[15] Network Simulator: http //www.isi.edu/nsnam/ns

[13] Partha Sarathi Banerjee, J. Paulchoudhury and S. R.


Bhadra Chaudhuri, Fuzzy M embership Function in a
Trust Based AODV for M ANET, I. J. Computer Network
and Information Security, 2013.
[14] Dimitrios Liarokapis and Ali Shahrabi, Fuzzy -based

S-ar putea să vă placă și