Documente Academic
Documente Profesional
Documente Cultură
cross layer one that allows concurrent transmissions to take In this paper we start by looking at the power management
place in the same vicinity and simultaneously conserves schemes used in ad-hoc networks in section II. We then
energy. present our cross layer design in section III. Simulation
setup in section IV is followed by results and analysis in the
Ad-hoc networks could be broadly classified into three Vth section. We conclude this paper in the VIth section
topologies namely, spare, dense and cluster form. Since the followed by the references in the VIIth section.
MAC and Network layers play an important role in
conserving power and increasing the system throughput, it 2. Previous Work
is essential to have a cross layer design that can support
different topologies. The MAC layer in a system controls The research community has done a lot of work to suggest
how and when a node accesses the medium. This also potential ways of power control in ad-hoc networks. In [1]
includes the transmission power used for communication. If Rong Zheng and Robin Kravets proposed an on demand
a transmitting node is aware of the ideal SINR value at the power management scheme for ad-hoc networks. It is an
receiver, it can adjust its transmitting power such that only extensible on-demand power management framework for
required amount of power is used for communication. In ad-hoc networks that adapts to traffic load. Nodes maintain
doing so not only does the transmitter save power (compared soft-state timers that determine power management
to transmitting at full power) but also interferes with lesser transitions. By monitoring routing control messages and
nodes (as increased power would mean increased range). In data transmission, these timers are set and refreshed on-
case of sparse network, we introduce the “locally aware” demand. Nodes that are not involved in data delivery may
power management protocol in which a receiver can inform go to sleep as supported by the MAC protocol. This soft
its transmitter of the minimum required SINR (to be able to state is aggregated across multiple flows and its
decode the signal) so that the transmitter can adjust its maintenance requires no additional out-of-band messages.
transmitting power accordingly. In a dense topology a The implementation is a prototype of the framework in the
receiver may face interference from more nodes than in a NS-2 simulator that uses the IEEE 802.11 MAC protocol.
sparse topology. We propose the “globally aware” protocol Simulation studies using this scheme with the Dynamic
here. In such a case it is essential that the receiver transmits Source Routing protocol show a reduction in energy
its minimum required SINR value in all the directions. This consumption near 50% when compared to a network
will ensure that all the transmitters in this receiver’s without power management under both long-lived CBR
neighborhood will control their power such that they do not traffic and on-off traffic loads, with comparable throughput
interfere with this receiver anymore but can still carry on and latency. Preliminary results also show that it
with their own communications. Both the sparse and the outperforms existing routing backbone election approaches.
dense topology designs are supported by a power aware In [2] Zongpeng Li and Baochun Li present a probabilistic
routing protocol at the Network layer. Since a sensor power management scheme for ad-hoc networks. It
network is a network in which nodes gather relevant data introduces Odds, an integrated set of energy-efficient and
about an activity and send it to an actor node which fully distributed algorithms for power management in
processes the data further; it is important that efficient wireless ad-hoc networks. Odds is built on the observation
routing is performed from the sensor nodes to the actor that explicit and periodic re-computation of the backbone
nodes. Cluster topologies are very common in ad-hoc topology is costly with respect to its additional bandwidth
sensor networks to record signals of interest at certain places overhead, especially when nodes are densely populated or
only. Fig. 1 shows the difference between a homogeneous highly mobile. Building on a fully probabilistic approach,
and non-homogeneous spatial distribution of nodes. We Odds seek to make a minimum overhead, perfectly
study the changes in power consumed and throughput when balanced, and fully localized decision on each node with
all cluster nodes transmit at the same power to when there is respect to when and how long it needs to enter standby
power control. Power control is implemented by making mode to conserve energy. Such a decision does not rely on
sure that each cluster uses its own power level such that it periodic message broadcasts in the local neighborhood, so
does not interfere with other cluster nodes. This simple cross that Odds are scalable as node density increases. Detailed
layer design helps prolong the network lifetime and also mathematical analysis, discussions and simulation results
shows increase in throughput. have shown that Odds are indeed able to achieve our
objectives while operating in a wide range of density and
traffic loads. Power control schemes using purely directional
transmission and reception have not been researched in
detail. Exploiting the advantages of directional antennas
[13, 14, 15, 20] shows considerable improvement in the
overall network performance.
system power consumption and thereby prolongs the battery control when nodes are non-homogeneously dispersed in
life of mobile nodes. Furthermore, the invention improves space. In such situations, one seeks to employ per packet
the end-to-end network throughput as compared to other ad- power control depending on the source and destination of
hoc networks in which all mobile nodes use the same the packet. This gives rise to a joint problem which involves
transmit power. The improvement is due to the achievement not only power control but also clustering. Three solutions
of a tradeoff between minimizing interference ranges, for joint clustering and power control are presented. The
reduction in the average number of hops to reach a first protocol, CLUSTERPOW, aims to increase the network
destination, reducing the probability of having isolated capacity by increasing spatial reuse. The second, Tunnelled
clusters, and reducing the average number of transmissions CLUSTERPOW, allows a finer optimization by using
including retransmissions due to collisions. The present encapsulation. The last, MINPOW, whose basic idea is not
invention provides a network with better end-to-end new, provides an optimal routing solution with respect to
throughput performance and lowers the transmit power. [6] the total power consumed in communication. The
and [8] also talk about transmission power control. contribution includes a clean implementation of MINPOW
at the network layer without any physical layer support. All
Topology control [4], [9] schemes have also been proposed. three protocols ensure that packets ultimately reach their
In [4] authors present Span, a power saving technique for intended destinations.
multi-hop ad-hoc wireless networks that reduces energy Power aware routing protocols such as Power Aware AODV
consumption without significantly diminishing the capacity [10] also contribute to conserving the network power.
or connectivity of the network. Span builds on the Changes have been suggested to the NS2 routing structure
observation that when a region of a shared-channel wireless to accommodate for a power aware routing protocol that is
network has a sufficient density of nodes, only a small aimed at increasing the network lifetime. [17, 18, 19] also
number of them need be on at any time to forward traffic for propose energy efficient schemes for wireless networks.
active connections. Span is a distributed, randomized
algorithm where nodes make local decisions on whether to 3. Proposed Scheme
sleep, or to join a forwarding backbone as a coordinator.
Each node bases its decision on an estimate of how many of 3.1 Power Control: The MAC Perspective
its neighbors will benefit from it being awake and the
amount of energy available to it. Authors use a randomized In this paper we propose a cross layer design in which the
algorithm where coordinators rotate with time, MAC layer and the Network layer functions can be modified
demonstrating how localized node decisions lead to a to achieve lesser power consumption and increase
connected, capacity-preserving global topology. throughput. The system mimics the 802.11 standard and
Improvement in system lifetime due to Span increases as the uses directional antennas at the physical layer. Since
ratio of idle-to-sleep energy consumption increases, and different situations demand different control mechanisms,
increases as the density of the network increases. the solutions in this paper are aimed at the three most
Simulations show that with a practical energy model, system common topologies in wireless ad-hoc networks, namely
lifetime of an 802.11 network in power saving mode with sparse, dense and cluster forms. A power controlled MAC
Span is a factor of two better than without. Span integrates protocol decides the power level for transmission for a
nicely with 802.11. When run in conjunction with the particular node. It is the power used to access the channel
802.11 power saving mode, Span improves communication and also to carry on subsequent transmissions. Researchers
latency, capacity, and system lifetime. A cone-based solution have used different metrics to determine the optimum
that guarantees network connectivity was proposed in [9]. transmission power; the SINR of the receiving node being
Each node i gradually increases its transmission power until the most popular [add ref]. We assume that there is a
it finds at least one neighbor in every cone of angle. Node i mechanism like GPS that enables the nodes to be aware of
starts the algorithm by broadcasting a “Hello” message at the network topology. This enables the receivers to calculate
low transmission power and collecting replies. It gradually the SINR level based on the number of transmitters and
increases the transmission power to discover more neighbors their distance from this receiver. Not only does this prolong
and continuously caches the direction in which replies are network lifetime but also allows more nodes to communicate
received. It then checks whether each cone of angle contains at the same time. In the proposed protocols the collision
a node. The protocol assumes the availability of directional avoidance information does not prevent interfering nodes
information (angle-of-arrival), which requires extra from accessing the channel. Instead, it bounds the
hardware. This scheme does not seem to work for transmission powers of future packets generated by these
directional antennas [16] as most of the replies would be lost nodes. This is unlike the RTS/CTS packets used in the
depending on where the source’s antenna is pointing. Some 802.11 scheme.
researchers proposed the use of a synchronized global
signaling channel to build a global network topology To understand what this collision avoidance information is
database, where each node communicates only with its and how nodes can make use of it, consider the transmission
nearest N neighbors (N is a design parameter). This of a packet from some node i to some node j. Let SINR (i,j)
approach, however, requires a signaling channel in which be the SINR at node j for the desired signal from node i.
each node is assigned a dedicated slot. Then,
A scheme based on clustering [5] in ad-hoc networks was
also presented. This paper discusses the problem of power
(IJCNS) International Journal of Computer and Network Security, 23
Vol. 2, No. 6, June 2010
manages to preserve network lifetime with the same 5. Results and Analysis
throughput efficiency.
We start this section by testing our protocol and studying the
4. Simulation Setup behavior of the network in different situations. We obtained
data by varying different parameters like the CBR rate and
Table 1 lists the parameters and their respective values that changing the number of nodes in a network. The CBR rate
have been used in the simulations. We simulate the three corresponds to how fast the packets are being generated and
topologies in NS2 on a Unix platform. The codes have been transmitted from the transmitter. Controlling this parameter
written in Tcl. In the next section we evaluate the means controlling the network load. Since a given network
performance of the cross layer design. We perform has only limited bandwidth, by increasing the CBR, the
simulations to obtain the network throughput and the throughput should first increase as more and more packets
average consumption of power in the network using our are sent successfully over the network. As the bandwidth is
design. The packet size is 512 bytes unless specified constrained in a network, on increasing the CBR rate
otherwise. Each flow in the network transmits CBR traffic. further, collisions occur, packets get dropped and
We do not consider mobility in our simulations. For the throughput decreases. So the network behaves best for a
radio propagation model, the two ray path loss model is particular CBR for a given scenario. This claim is validated
used. NS2 uses the 802.11 model for wireless networks. The by Fig. 4, 5 and 6. It is clear that the throughput in all the
power consumption has been calculated by considering the three types of networks increases as the CBR rate is
power used for transmission only, taking into consideration increased, but starts to decrease and attains a steady state
the number of directional antennas used. Perl language has when the rate is increased further. When the available
been used to calculate values from the trace files. The power bandwidth of a network is fixed and the number of nodes is
consumed for receiving and carrier sensing have not been varied, the affect is very similar to changing the CBR. With
calculated. For our simulations, we consider a mobile ad-hoc a constant CBR, when nodes are added to a particular
network in a square area of dimensions 500m X 500m. network, they increase the throughput of the network as
more packets are sent over the medium. It is noticed that
Table 1: Parameters and their values used in simulations when too many nodes start talking in the same space,
collisions occur and the throughput decreases. From Fig. 7,
TOPOLOGY PARAMETER VALUE 8 and 9 we can see that as we increase the number of nodes
in the three cases, the throughput increases to a maximum
Sparse Network Number of nodes 8 value. When a high number of nodes are present is any
Size of network 500 X 500 network, the value of throughput is much low. For Fig. 7, 8
Simulation time 500 secs and 9 the number of nodes in each network is specified in
Packet size 512 bytes Table I. The CBR rate for the sparse network is 20 Kbps and
Bandwidth 1Mb for the dense and cluster network is 40 Kbps. These tests
Traffic Type CBR show that even after making changes to the MAC, Network
Pmax 100mW and Physical Layer of the network, it has good behavior.
MinRecvPwr 1mW
Dense Network Number of nodes 30 It should be noted that in Fig. 7, when there are 18 nodes in
Size of network 500 X 500 the network, the throughput is very low. This is attributed to
Simulation time 500 secs the fact that the cross-layer design for the sparse network is
not effective when a large number of nodes are present. This
Packet size 512 bytes
is the point where we switch from the Locally Aware
Bandwidth 2Mb
Scheme to the Globally Aware Scheme and we say our
Traffic Type CBR
network is no longer sparse. Using the Globally Aware
Pmax 100mW Scheme helps more nodes in the network be aware of the
MinRecvPwr 1mW SINR values at the receivers and they can then adjust their
Cluster form Number of nodes 16 transmission power accordingly. Different networks may
Size of network 500 X 500 have a different value for number of nodes in sparse and
Simulation time 500 secs dense network.
Packet size 512 bytes
Bandwidth 2Mb
Traffic Type CBR
Pmax 100mW
MinRecvPwr 1mW
26 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 6, June 2010
Figure 10. Throughput comparison between the three Figure 12. Comparison in power consumed in different
topologies when using a omni directional antenna and a topologies when using a omni directional antenna to using a
directional antenna with our power scheme implemented. directional antenna with power control.
Fig. 11 shows that implementing the power control design Fig. 13 shows the difference in power consumed in case of
increases the throughput by nearly 6% (in the cluster form the three topologies when using a regular directional
case) when compared to a directional antenna without power antenna to when a directional antenna with power control is
control. This is attributed to the fact that reducing the used. Controlling the transmission power shows a lower
transmission power allowed for more node pairs to value of consumed power as compared to a network when
communicate and thus more packets were transmitted all the nodes are transmitting at the maximum power. The
successfully. The dense network and the cluster form simulations show that reducing the transmission power of
topologies also show better performance once the cross layer the nodes did not affect the throughput of the system
design in used. negatively and also helped in conserving the overall network
power. Throughout the simulation, the receiver keeps the
transmitter aware of the ideal transmitting power by sending
its SINR value to the transmitter. The network without
28 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 6, June 2010
[5] Vikas Kawadia and P. R. Kumar, “Power Control and Authors Profile
Clustering in Ad-hoc Networks”, INFOCOM 2003.
[6] El-Osery, A.I. Baird, D. Bruder, S, “Transmission Mahasweta Sarkar joined the department
power management in ad-hoc networks: issues and of Electrical and Computer Engineering at
advantages”, In Proceedings of the IEEE Networking, San Diego State University as an Assistant
Sensing and Control, 2005. Professor in August 2006, after receiving
[7] Marwan Krunz and Alaa Muqattash, “Transmission her Ph.D. from UCSD in December 2005.
She received her Bachelor’s degree in
Power Control in Wireless Ad-hoc Networks:
Computer Science (Suma Cum Laude)
Challenges, Solutions, and Open Issues”, Network, from San Diego State University, San
IEEE Sept-Oct 2004. Diego in June, 2000. Prior to joining
[8] Matthias Rosenschon1, Markus Heurung1, Joachim SDSU, she worked as a Research Scientist
Habermann, “New Implementations into Simulation at SPAWAR Systems Center, Point Loma, San Diego. Her
Software NS-2 for Routing in Wireless Ad-Hoc research interests include protocol designs, flow control,
Networks”, 2004. scheduling and power management issues in Wireless Local Area
[9] http://www.isi.edu/nsnam/ns/tutorial/ Networks.
[10] Asis Nasipuri, Kai Li and Uma Reddy Sappidi, “Power
Consumption and Throughput in Mobile Ad-hoc Ankur Gupta is currently a graduate
research student under Dr. Mahasweta
Networks using Directional Antennas”, In
Sarkar at San Diego State University, San
Preceedings of the Eleventh International Diego. He received his Bachelor’s degree in
Conference, Computer Communications and Electronics Engineering in June 2001 from
Networks, 2002. Pune University, India. His research
[11] Thanasis Korakis, Gentian Jakllari and Leandros interest includes analysing and studying the
Tassiulas, “A MAC protocol for full explotiation of effect of power management protocols in
Directional Antennas in Ad-hoc Wireless Networks”, wireless devices that emply directional
MobiHoc, June 1-3, 2003, Annapolis, Maryland, antennas.
USA.
[12] ANSI/IEEE Std 802.11, “Wireless LAN Medium
Access Control (MAC) and Physical Layer (PHY)
specifications”, 1999.
[13] Z. Huang, Z. Zhang, and B. Ryu, "Power control for
directional antenna-based mobile ad-hoc networks",
in Proc., Intl. Conf on Wireless Comm. and Mobile
Computing, pp. 917-922, 2006.
[14] Ram Ramanathan, "On the performance of ad-hoc
networks with beamforming antennas", Proc. Of
MobiHoc '200 1, pages 95-105, October 2001.
[15] B. Alawieh, C. Assi, W. Ajib, "A Power Control
Scheme for Directional MAC Protocols in MANET",
IEEE Conf, WCNC2007, pp.258-263, 2007.
[16] Nader S. Fahmy, Terence D. Todd, and Vytas Kezys,
"Ad-hoc Networks with Smart Antennas Using IEEE
802.11-Based Protocols", In Proceedings of IEEE
International Conference on Communications (ICC),
April 2002.
[17] P. Karn., “MACA -A New Channel Access Method for
Packet Radio”, in Proc. 9th ARRL Computer
Networking Conference, 1990.
[18] E.-S. Jung and N. Vaidya, “A power control MAC
protocol for ad-hoc networks”, In 8th ACM Int. Conf
on Mobile Çomputing and Networking
(MobiCom02), pages 36-47, Atlanta, GA, September
2002.
[19] J.-P. Ebert, B. Stremmel, E. Wiederhold, and A.
Wolisz, “An Energy-efficient Power Control
Approach for WLANs”, Journal of Communications
and Networks (JCN), 2(3): 197-206, September 2000.
[20] Mineo Takai, Jay Martin, Aifeng Ren, and Rajive
Bagrodia, "Directional virtua1 carrier sensing for
directiona1 antennas in mobile ad-hoc networks",
MOBIHOC'02, June 2002.