covid
Buscar en
Journal of Applied Research and Technology. JART
Toda la web
Inicio Journal of Applied Research and Technology. JART An Energy-efficient Routing Protocol for MANETs: a Particle Swarm Optimization A...
Información de la revista
Vol. 11. Núm. 6.
Páginas 803-812 (diciembre 2013)
Compartir
Compartir
Descargar PDF
Más opciones de artículo
Visitas
4032
Vol. 11. Núm. 6.
Páginas 803-812 (diciembre 2013)
Open Access
An Energy-efficient Routing Protocol for MANETs: a Particle Swarm Optimization Approach
Visitas
4032
Shahram Jamali1, Leila Rezaei2, Sajjad Jahanbakhsh Gudakahriz3
1 Computer Engineering Department, University of Mohaghegh Ardabili, Ardabil, Iran
2 Department of Computer Engineering, Zanjan Branch, Islamic Azad University, Zanjan, Iran
3 Department of Computer Engineering, Germi Branch, Islamic Azad University, Germi, Iran
Este artículo ha recibido

Under a Creative Commons license
Información del artículo
Resumen
Texto completo
Bibliografía
Descargar PDF
Estadísticas
Figuras (12)
Mostrar másMostrar menos
Abstract

Mobile ad hoc networks (MANETs) are infrastructure-free networks created by wireless mobile devices with restricted battery life. This limited battery capacity in MANETs makes it necessary to consider the energy-awareness feature in their design. Since routing protocols have central role in MANETs, their energy-awareness increases network life time by efficiently using of the available limited energy. TORA is one of these routing protocols that offer high degree of scalability. This paper employs the Binary Particle Swarm Optimization algorithm (BPSO) to add the energy-awareness feature to the TORA routing protocol. The proposed protocol considers routes length in its route selection process and also includes routes energy level in its calculations. It formulates the routing issue as an optimization problem and then employs BPSO to choose a route that maximizes a weighted function of the route length and the route energy level. Extensive simulations in ns-2 simulator environment show that the proposed routing protocol, called BPSO-TORA, prolongs the network lifetime remarkably and outperforms TORA in terms of network life time, system life time and total delivered data.

Keywords:
MANET
PSO
BPSO
TORA
BPSO-TORA
Routing
Texto completo
1Introduction

A MANET is an autonomous collection of nodes mobile users that offers infrastructure-free architecture for communication over a shared wireless medium [1, 2]. MANET nodes have limited processing speed and power, battery, storage, and communication capabilities. One of the most challenging issues in MANETs is their routing algorithms [3, 4 and 5]. Routing protocols for ad hoc networks can be divided into two categories based on when and how the routes are discovered: proactive (table-driven) [6, 7] and the reactive (on-demand) [8, 9]. For the table-driven routing protocols, consistent and up-to-date routing information are maintained at each mobile host. Hence, for the table-driven protocols each mobile host maintains one or more tables containing routing information to every other mobile host in the network. When a network topology changes, the mobile hosts propagate the updated messages throughout the network in order to maintain the routing information about the whole network.

These routing protocols differ in the method by which the topology information is distributed across the network and in the number of routing-related tables. An example of table-driven ad hoc routing protocols is the Destination-Sequenced Distance-Vector (DSDV) routing algorithm [10]. In contrast to the table-driven routing protocols, the reactive routing protocols don't maintain all up-to-date routes at every mobile host. Instead, the routes are created whenever they are required. When a source host wants to send a datagram to a destination, it invokes the route discovery mechanism to find the path. An example is the Ad hoc On-demand Distance Vector Routing (AODV) [11], which is an improvement of the DSDV algorithm. AODV minimizes the number of broadcasts by creating routes on-demand as opposed to the DSDV which maintains a list of all the routes. The Dynamic Source Routing protocol (DSR) [12] and Temporally Ordered Routing Algorithm (TORA) [13] are other on-demand routing protocols.

Much attention has been attracted, due to the limited battery capacity in MANETs energy-aware routing in recent years. Energy-aware routing is an effective solution to prolong the lifetime of energy-constrained nodes in mobile ad hoc networks [14, 15, 16]. As generalized in [17], there are generally two categories of energy-aware routing concepts: Minimum Energy (ME) routing that selects the route with least total energy consumption for packet transmission, and max-min routing that selects the route which bottleneck residual node energy is the maximum. This paper focuses on TORA algorithm which is a highly adaptive, efficient and scalable distributed source-initiated on-demand routing algorithm and tries to make it an energy-efficient routing protocol. To this end the BPSO algorithm is employed to design a TORA-based energy aware routing protocol following the max-min idea.

The rest of this paper is organized as follows. In section 2, TORA routing protocol is described. Preliminaries including Particle Swarm Optimization are given in section 3. The proposed energy-aware routing protocol (BPSO-TORA) is presented in section 4 and its performance is evaluated in section 5 through an extensive simulative study. Finally the paper is concluded in section 6.

2TORA Routing protocol

TORA [13] is a highly adaptive distributed routing algorithm that is well-suited for use in mobile ad hoc networks. In TORA, each node has five kinds of information: Hi, Ni, HNi, j, RRi and LSi,j. Hi = (τi, oidi, ri, δi, i) is related with each node i ∈ N (N is the set of nodes in network). In this ordered quintuple τi, is logical time of a link failure, oidi is the ID of originator node, ri is a bit used to divide each of the unique reference into two unique sub-levels, δi is a propagation ordering parameter and i is the unique ID of the node. At first the height of each node in the network other than the destination node is set to NULL, Hi =(-, -, -, -, i). The height of the destination node is always ZERO, Hdid = (0,0,0,0, did), that did is the ID of destination node. Ni is the set neighbors of node i. HNi,j is a height array for each neighbor j∈Ni. RRi is a route-required flag (RRi) which is initially unset. LSi,j is a link-state array with an entry for each link (i,j)∈L, where j∈Ni. The state of the links is determined by the heights Hi and HNi,j. Each link is directed from the higher node to the lower node. If a neighbor j is higher than node i, the link called upstream (UP). If a neighbor j is lower than node i, the link called downstream (DN). If the neighbors height entry, HNi,j, is NULL, the link is distinct undirected (UN).

TORA can be divided into three phase: creating routes, maintaining routes and erasing routes. Details of these phases are brought from [2] as follow.

2.1Creating Routes

This phase requires use of the QRY packets and UPD packets. A QRY packet consists of an ID of destination (did), which distinct the destination node that algorithm is running. An UPD packet consists of a did, and the height of the node i which is broadcasting the packet, Hi. When a node that has undirected links and its route required flag is 0, need a route to the destination node, it broadcasts a QRY packet and set its route-required flag with 1. When a node i receives a QRY packet, it operates as follows: (a) if it has no downstream links and its route required flag is 0, it re-broadcasts the QRY packet and sets its route-required flag with 1. (b) If it has no downstream links and its route-required flag is set with 1, it rejects the QRY packet. (c) If it has at least one downstream link and its height is NULL, this node sets its height to Hi = (τj, oidj, rj, δj + 1, i), that HNi,j = (τj, oidj, rj, δj, j) is the minimum height of its non-NULL neighbors, then broadcasts an UPD packet. (d) If it has at least one downstream link and its height is non-NULL, it first compares the time the last UPD packet was broadcast to the time the link over which the QRY packet was received became active. If an UPD packet has been broadcast since the link became active, it rejects the QRY packet; otherwise, it broadcasts an UPD packet. If a node has the route-required flag with 1 when a new link is established, it broadcasts a QRY packet.

When a node i receive an UPD packet from a neighbor jNi, node i first updates the entry HNi,j with the height contained in the received UPD packet and then operate as follows. (a) If the route required flag is set with 1, node i sets its height to Hi = (τj, oidj, rj, δj + 1, i) that j is its non-NULL neighbor and height of is minimum in between neighbor nodes, then updates all the entries in its link-state array LS, un-sets the route-required flag and then broadcasts an UPD packet which contains its new height. (b) If the route-required flag is 0, node i simply updates the entry LSi,j in its link-state array.

2.2Maintaining Routes

Maintaining routes is only performed for nodes that their height is non-NULL. Furthermore, any neighbor's height which is NULL is not used for the computations. A node i is said to have no downstream links if Hi is lower than HNi,j for all non-NULL neighbors j ∈ Ni. This will result in one of five possible actions depending on the state of the node and the preceding event. Each node (other than the destination) that has no downstream links modifies its height, Hi = (τi, oidi, ri, δi, i), as follows.

Case 1: Node i has no downstream links due to a link failure. In this case:

(τi, oidi, ri) = (t,i,0) where t is the time of the failure and (δi, i) = (0, i).

Case 2: Node i has no downstream links due to a link reversal following reception of an UPD packet and the ordered sets (τj, oidj, rj) are not equal for all j∈Ni. In this case:

Case 3: Node i has no downstream links due to a link reversal following reception of an UPD packet and the ordered sets (τj, oidj, r)j are equal with rj = 0 for all j∈Ni. In this case:

Case 4: Node i has no downstream links due to a link reversal following reception of an UPD packet, the ordered sets (τj, oidj, rj) are equal with rj = 1 for all j∈Ni and oidj = i. In this case:

Case 5: Node i has no downstream links due to a link reversal following reception of an UPD packet, the ordered (τj, oidj, r)j are equal with rj = 1 for all j∈Ni and oidji. In this case:

2.3Erasing Routes

If case 4 of maintaining routes phase are detected, node i sets its height and the height entry for each neighbor j∈Ni to NULL unless the destination is a neighbor, in which case the corresponding height entry is set to ZERO, updates all the entries in its link-state array LS, and broadcast a CLR packet. The CLR packet containing of a did and the reflected level of node i, (τi, oidi). When a node i receives a CLR packet from a neighbor j∈Ni it perform as below. (a) If the reference level in the CLR packet matches the reference level of node i, it sets its height and the height entry for each neighbor j∈Ni to NULL unless the destination is a neighbor, in which case the corresponding height entry is set to ZERO, updates all the entries in its link-state array LS and broadcasts a CLR packet. (b) If the reference level in the CLR packet does not match the reference level of node i, it sets the height entry for each neighbor j∈Ni to NULL and updates the matching link-state array entries. Thus the height of each node in the part of the network which was partitioned is set to NULL and all invalid routes are erased. If (b) causes node i to lose its last downstream link, it perform as in case 1 of maintaining routes.

By using these three phases, TORA discover and modify routes between source and destination nodes. Fig. 1 shows the routes creating process in TORA. When routes created, each node has the height structure. Also each node has an array that keeps information of neighbors. In this way, in each node we have situation of node and neighbors.

Figure 1.

Routes creating process in TORA

(0.05MB).
3Particle Swarm Optimization

Particle Swarm Optimization is a search algorithm that has been inspired from bird flocking and fish schooling. This population based algorithm has been designed and introduced by Kennedy and Eberhart [14] in 1995. The basic PSO has found many successful applications in a number of problems including standard function optimization problems [15, 16], solving permutation problems [17] and training multi-layer neural networks [18]. Some applications of PSO are given in [19, 20 and 21]. The PSO algorithm contains a swarm of particles in which each particle indicates a potential solution. The particles fly through a multidimensional search space in which the position of each particle is adjusted according to its own experience and the experience of its neighbors. PSO system combines local search methods (through self experience) with global search methods (through neighboring experience), attempting to balance exploration and exploitation. As in evolutionary computation paradigms, the concept of fitness is employed and candidate solutions to the problem are termed particles, each of which adjusts its flying based on the flying experiences of both itself and its companion. PSO is an approach to problems whose solutions can be represented as a point in an n-dimensional solution space. A number of particles are randomly set into motion through this space. During each iteration they observe the fitness of themselves and their neighbors and emulate successful neighbors (those whose current position represents a better solution to the problem than theirs) by moving towards them. The position and velocity of particle i at iteration k can be respectively expressed by notations (1)–(2).

Particle i keeps track of its coordinates in the solution space which are associated with the best solution that has achieved so far by that particle. This value is called local best Lbesti. Another best value that is tracked by the PSO is the best value obtained so far by any particle in the neighborhood of that particle. This value is called global best Gbest The basic concept of PSO lies in accelerating each particle toward its local best and the global best locations. Various schemes for grouping particles into competing, semi- independent flocks can be used, or all the particles can belong to a single global flock. This extremely simple approach has been surprisingly effective across a variety of problem domains. The velocity and position of particle i at iteration k+1 can be calculated according to the following equations:

Where w is the inertia weight, c1 and c2 are constants which determine the influence of the local best position Lbesti(k) and the global best position Gbest(k). Parameters r1 and r2 are random numbers uniformly distributed within [0,1].

3.1Binary Particle Swarm Optimization (BPSO)

In 1997 the binary version of this algorithm was presented by Kennedy and Eberhart [6] for discrete optimization problems. In this method, each particle has a position in a D-dimensional space and each element of a particle position can take the binary value of 0 or 1 in which 1 means “included” and 0 means “not included”. The major difference between binary PSO with continuous version is that velocities are defined in terms of probabilities. Using this definition a velocity must be restricted within the range [0,1]. So a map is introduced to map all real valued numbers of velocity to the range [0,1] [4]. The normalization function used typically is a sigmoid function as:

Where the value of rand() drawn from U(0,1) and the function S(v) is a sigmoid limiting transformation. At the beginning of the algorithm, a number of particles and their velocity vectors are generated randomly. Then in some iteration the algorithm aims at obtaining the optimal or near-optimal solutions based on its predefined fitness function. The velocity vector is updated in each time step using two best positions, Lbest and Gbest, and then the position of the particles is updated using velocity vectors.

4Particle Structure of the Routing Protocol

Although TORA can typically provide multiple routes for any source/destination pair, it always selects a route with fewer hops. Obviously this puts the shorter routes under a heavy load and hence their energy depletes earlier than others. The result is a decreased network life time and consequently a reduced network throughput [22, 23]. To solve this problem a routing protocol is developed that not only considers routes length in its calculations, but also includes routes' energy level in its decisions. The goal is to select a route that in one hand has a short length and on the other hand has a high energy level. This route is not necessarily the shortest one, since the shortest route may has a lower energy level. It is in fact one of the short routes that has a relatively high energy level. To find such a route a multiple objective BPSO algorithm is used. To BPSO-based formulation of the routing problem, two important questions are needed to be answered: (1) Which parameter is considered as the particle position? (2) How the objective function is defined?

Position of particles

One of the key issues in designing a successful PSO algorithm is the representation step which aims at finding an appropriate mapping between problem solution and PSO particle. It is assumed, that each node that forwards packets is equipped with a BPSO algorithm. A representation, in which solutions are encoded in a 1×n vector, called position vector, in which n is the number of neighbor nodes of the current node is used. The position matrix of each particle has the two following properties:

1) All the elements of the vector have either the value of 0 or 1. In other words if Xk is the position vector of kth node, then:

In each vector only one element is 1 and others are 0. If Xk(i)=1 then the ith neighbor node will be chosen as next hop of the route. Figure 2 shows a solution representation in a node with 5 neighbors in which node 3 is the selected as the next hop to forward packets.

Figure 2.

Position Vector

(0.02MB).
Fitness evaluation

In this paper length and energy are used to evaluate the fitness of possible routes, each one getting started from one of neighbor nodes. The fitness value of node k, in case of choosing neighbor node i as the next node of the route, can be given using equation (7).

Where energyi, refers to the bottleneck node energy level of possible route i, max_energy is the highest bottleneck node energy level among all possible routes starting from the current node, hopcounti, is the number of hops from neighbor node i to the destination, max_hopcount is the maximum hopcount among the neighbor nodes and finally w1 and w2 are weighting factors for route energy and route length respectively.

Particles Velocity, Lbest and Gbest

Velocity of each particle is considered as a 1×n vector whose elements are in range [-Vmax, Vmax].Lbest and Gbest are 1×n vectors the same as position vectors. Lbestk represents the best position that kth particle has visited since the first time step and Gbestk represents the best position which kth particle has visited from the beginning of the algorithm. For updating Lbest and Gbest in time step, if fitness value of current position is greater than Lbest or Gbest, then they are replaced with the current position.

Particle Updating. First updating of the particles is explained. Equation (9) is used for updating the velocity vector and then Equation (10) for position matrix of each particle. Note that since the network nodes don't distribute routing information among each other, hence any node can only find Lbest and ignores Gbest:

In equation (9)Vkt(i) is ithe element of the kth node's velocity in tth time step of the algorithm and Xkt(i) denotes the ith element of the kth node's position vector in tth time step. Equation (10) means that in each column of position matrix, value 1 is assigned to the element whose corresponding element in velocity vector has the maximum value. If in a velocity vector there is more than one element with maximum value, then one of these elements is selected randomly and 1 is assigned to its corresponding element in the position vector.

The algorithm of BPSO-TORA algorithm can be stated as Fig. 3. This algorithm is run by each node on the route from the source node to the destination.

Figure 3.

BPSO-TORA Algorithm

(0.17MB).
5Simulation Results

Now, the proposed algorithm is examined through its implementation in ns-2 [24] environment. This implementation is run by making some modifications over TORA module of ns-2 simulator and then it is evaluated based on the following simulation setup:

  • Network space: 1000m×1000m

  • Simulation time: 500 second

  • Traffic model: CBR

  • Primary energy of each node: 25j

  • Packet size: 512 bytes

  • Mobility model: random way point

  • Medium access protocol: IEEE 802.11

  • Speed of mobile nodes: 0–20m/s

In order to study BPSO-TORA's performance in different operational conditions three different scenarios are considered. In these scenarios BPSO-TORA and TORA are evaluated for wide ranges of “number of nodes”, “nodes' pose time” and “traffic rate”. In each scenario the proposed algorithm is compared with TORA in terms of three basic performance metrics, namely, network life time, system life time and total delivered data [25, 26]. The network lifetime: it is defined as the time when first node of the network finishes its own battery for the first time. The system lifetime: it is defined as the time when 20% of nodes finish their own battery. The total delivered data: it is defined as the total number of data packets that is delivered during of system lifetime.

Scenario 1: Impact of number of nodes on BPSO-TORA's performance

In this scenario BPSO-TORA and TORA are simulated under different numbers of nodes to study how these algorithms are affected by the number of nodes. To this end nodes' pause time are fixed at 10 seconds, nodes' sending rate at 10 packets per second and the network simulation is repeated for different numbers of nodes i.e. 10, 20, 30, 40 and 50 nodes. Simulation results are shown in Figs. 4–6. Fig. 4 shows how the total delivered data of these protocols changes as the number of nodes increases. It is observed that the total delivered data of BPSO-TORA is considerably higher than TORA algorithm. On the other hand Figs. 5–6 show that the network life time and system life time of BPSO-TORA are considerably higher than of TORA. This improved performance of BPSO-TORA has roots in this fact that BPSO-TORA includes nodes' energy level in the route selection process. According to equation (8) since BPSO-TORA considers both the route length and the route energy level in its decisions, it doesn't select the route with lower energy level and hence the network life time increases. Obviously this increased network life time leads to improved packet delivery rate.

Figure 4.

Total delivered data versus number of nodes

(0.06MB).
Figure 5.

Network life time versus number of nodes

(0.06MB).
Figure 6.

System life time versus number of nodes

(0.07MB).
Scenario 2: Impact of pause time on BPSO- TORA's performance

In this scenario BPSO-TORA and TORA are simulated under different pause times to study how these algorithms are affected by it. To this end nodes' count are fixed at 25, nodes' sending rate at 10 packets per second and the network simulation is repeated for different pause times i.e. : 0, 10, 20, 30 and 40 seconds. Simulation results are shown in Figs. 7–9. Fig. 7 shows how the total delivered data of these protocols changes as the nodes' pause time changes. According to this figure it is observed that the total delivered data of BPSO-TORA is considerably higher than TORA algorithm. On the other hand Figs. 8–9 show that the network life time and system life time of BPSO-TORA are considerably higher than of TORA for different values of pause time. The reason of this improved performance can be found taking into account the equation (8) according to which BPSO-TORA considers both the route length and the route energy level in its decisions. It selects a route that not only has shorter length but also has an acceptable energy level. This leads to balanced distribution of the network traffic among different routes that causes in turn to an increased network life time. Obviously when the network life time increases more packets can be sent through it and hence the packet delivery rate will be increased.

Figure 7.

Total delivered data versus pause time

(0.08MB).
Figure 8.

Network life time versus pause time

(0.06MB).
Figure 9.

System life time versus pause time

(0.08MB).
Scenario 3: Impact of traffic rate on BPSO-TORA's performance

In this scenario how the proposed algorithm behaves under different amount of the network load is studied. For this purpose 3 different levels of traffic rates are considered for each node i.e. Low (5 packets per second), Medium (10 packets per second), High (15packets per second) and then behavior of TORA and BPSO-TORA is examined under each one of these traffic intensity. The simulation results are shown Figs. 10–12. Same as previous scenarios, in this scenario BPSO-TORA outperforms TORA in terms of packet delivery rate, network life time and system life time. As discussed above the reason for this improved performance is behind the fitness function of (8).

Figure 10.

Total delivered data versus traffic rate

(0.07MB).
Figure 11.

Network life time versus traffic rate

(0.07MB).
Figure 12.

System life time versus traffic rate

(0.08MB).

From these simulations it is concluded that BPSO-TORA has better performance in comparison with TORA algorithm. Better performance of BPSO-TORA is due to this fact that it uses those routes that have higher level of energy and short length. This leads to balanced consumption of energy in various routes and nodes; hence BPSO-TORA experiences less route breakages and achieves better performanc

6Conclusion

In this paper BPSO-TORA, a novel energy-aware routing protocol for mobile ad hoc networks has been presented. It redefines the routing algorithm as an optimization problem and then employs BPSO algorithm to solve it. The main feature of BPSO-TORA is that it distributes load among routes considering energy of routes. This causes the load to be distributed uniformly among routes and leads to long life of network. The simulation results indicated that the total delivered data, network life time and system life time in BPSO-TORA are remarkably better than TORA routing protocol.

References
[1]
S. Basagni, M. Cont, S. Giordano, I. Stojmenovic.
Mobile ad hoc networking.
JISR, (2004), pp. 201-207
[2]
Y. Jiazi, A. Asmaa, D. Sylvain, P. Benoît.
Multipath optimized link state routing for mobile ad hoc networks.
Ad Hoc Networks, 9 (2011), pp. 28-47
[3]
M. Abolhasan, T. Wysocki, E. Dutkiewicz.
A review of routing protocols for mobile ad hoc networks.
Ad Hoc Networks, 2 (2004), pp. 1-22
[4]
M. Tarique, K. Tepe, S. Adibi, Sh. Erfani.
Survey of multipath routing protocols for mobile ad hoc networks.
Journal of Network and Computer Applications, 32 (2009), pp. 1125-1143
[5]
A. Boukerche, B. Turgut, N. Aydin, M. Ahmad, L. Bülüni, D. Turgut.
Routing protocols in ad hoc networks: A survey.
Computer Networks, 55 (2011), pp. 3032-3080
[6]
C.C. Chiang, H.K. Wu, W. Liu, M. Gerla.
routing in clustered multi-hop mobile wireless with fading channel.
Proceedings of IEEE SICON, (1997), pp. 197-211
[7]
S. Murthy, J.J. Garcia-Luna-Aceves.
An efficient routing protocol for wireless networks.
ACM Mobile Networks and Application Journal, (1996), pp. 183-197
[8]
Y. Ko, N.H. Vaidya.
Location-aided routing (LAR) in mobile ad hoc networks.
In: Proceedings of ACM MOBICOM1998dddd, (1998), pp. 66-75
[9]
S.Y. Wang, J.Y Liu, C.C. Huang, M.Y. Kao, Y.H. Li.
Signal strength-based routing protocol for mobile ad hoc networks.
In: Proceedings of 19th International Conference on Advanced Information Networking and Applications, (2005), pp. 17-20
[10]
C.E. Perkins, P. Bhagwat.
Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers.
Proceedings of the ACM Special Interest Group on Data Communications (SIGCOMM), (1994), pp. 234-244
[11]
C.E. Perkins, E.M. Royer, S.R. Das.
Ad hoc on-demand distance vector (AODV) routing.
IETF Mobile Ad Hoc Networks Working Group, (2003), pp. 205-212
[12]
D.B. Johnson, Y-C Hu, D.A. Maltz.
The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4.
RFC, 4728 (2007), pp. 87-96
[13]
V.D. Park, M.S. Corson.
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks.
INFOCOM, (1997), pp. 52-59
[14]
S. Misraa, S.K. Dhurandherb, M.S. Obaidatc, P. Guptab, K. Vermab, P. Narulab.
An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks.
The Journal of Systems and Software, 83 (2010), pp. 2188-2199
[15]
Zh. Guo, S. Malakooti, S. Sheikh, C. Al-Najjar, M. Lehman, B. Malakooti.
Energy aware proactive optimized link state routing in mobile ad-hoc networks.
Applied Mathematical Modelling, 35 (2011), pp. 4715-4729
[16]
J. Vazifehdan, R. Venkatesha Prasad, E. Onur, I. Niemegeers.
Energy-aware routing algorithms for wireless ad hoc networks with heterogeneous power supplies.
Computer Networks, 55 (2011), pp. 3256-3274
[17]
L. Lin, N.B. Shroff, R. Srikant.
Asymptotically optimal energy-aware routing for multihop wireless networks with renewable energy sources.
IEEE/ACM Trans. Network, 15 (2007), pp. 1021-1034
[18]
R. Eberhart, J. Kennedy.
A New Optimizer Using Particle Swarm Theory.
Proceeding of the Sixth International Symposium on Micro Machine and Human Science, (1995), pp. 39-43
[19]
H. Rezazadeh, M. Ghazanfari, S.J. Sadjadi, B. Aryanezhad Mir, A. Makui.
Linear programming embedded particle swarm optimization for solving an extended model of dynamic virtual cellular manufacturing systems.
Journal of Applied Research and Technology, 7 (2009), pp. 83-108
[20]
Gerardo A. Laguna Sánchez*, Mauricio Olguín Carbajal, Nareli Cruz Cortés, Ricardo Barrón Fernández, Jesús A. Álvarez Cedillo.
Comparative Study of Parallel Variants for a Particle Swarm Optimization Algorithm Implemented on a Multithreading GPU.
Journal of Applied Research and Technology, 7 (2009), pp. 292-309
[21]
P. Moallem, N. Razmjooy.
Optimal Threshold Computing in Automatic Image Thresholding using Adaptive Particle Swarm Optimization.
Journal of Applied Research and Technology, 10 (2012), pp. 703-712
[22]
F. Yu, Y. Li, F. Fang, Q. Chen.
A New TORA-based Energy Aware Routing Protocol in Mobile Ad Hoc Networks.
ijcsrt, (2007), pp. 98-103
[23]
Sh. Jamali, S. Jahanbakhsh.
BA-TORA: a Multipath Routing Protocol for MANETs by Inspiration from Bee and Ant Colonies.
Electrical Review, (2011), pp. 183-187
[24]
NS-2, “The Network Simulator”, http://www.isi.edu /nsnam/ns/.
[25]
W. Minqiang and Z. Bsoyu, “A New DSR-Based Routing Protocol with Energy-Aware in Ad Hoc Networks”, Journal of Nanjing University of Posts and Telecommunications, 2005.
[26]
Q. Li, J. Aslam, D. Rus.
Online Power-aware Routing in Wireless Ad-Hoc Networks.
Proceedings of MOBICOM, (2001), pp. 134-142
[27]
D.B Johnson, D.A Maltz.
Dynamic source routing in ad hoc wireless networks.
Mobile Computing, (1996), pp. 89-96
Copyright © 2013. Universidad Nacional Autónoma de México
Descargar PDF
Opciones de artículo