skip to main content
research-article

A Novel Approach for Efficient Packet Transmission in Volunteered Computing MANET

Published:03 September 2021Publication History
Skip Abstract Section

Abstract

A mobile ad hoc network (MANET) is summarized as a combination device that can move, synchronize and converse without any preceding management. Enhancing the lifetime energy is based on the status of the concerned channel. The node is accomplished of control the control messages. Due to unplanned methods of energy conservation, the node lifespan and quality of packet flow is defaced in the existing solution. It results in a network-to-node-energy trade-off, ensuing in a failure of the post-network. This failure results in reduced time-to-live and higher overhead. This paper discusses an effective buffer management mechanism, in addition to proposing a novel performance modeling in Volunteered Computing MANET and tactile internet Next, the best execution the nodes can accomplish under fractional data is completely portrayed for utilities for a general purpose. To associate the space between network efficiency and energy conservation based on the minimal overhead, this article proposes a switch state promoting mutual Optimized MAC protocol for conservation of a node's energy and the optimal use of available nodes before their energy drain. Simulation results are provided as proof of the proposed solution. The simulation results are compared with the existing system with performance measures of delay, throughput, energy consumption, and availability of the node.

References

  1. K. Anish Pon Yamini, K. Suthendran, and T. Arivoli. 2019. Enhancement of energy efficiency using a transition state mac protocol for MANET. Computer Network 155 (2019), 110–118.Google ScholarGoogle ScholarCross RefCross Ref
  2. Normalia Samian and Winston Seah. 2017. Trust-based scheme for cheating and collusion detection in wireless multihop networks. In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. 205–214.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Normalia Samian, Zuriati Zukarnain, Winston K. G. Seah, Azizol Abdullah, and Zurina Mohd Hanapi. 2015. Cooperation stimulation mechanisms for wireless multihop networks: A survey. Journal of Network and Computer Applications 54 (2015), 88–106.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Dimitris E. Charilas, Konstantinos D. Georgilakis, and Athanasios D. Panagopoulos. 2012. ICARUS: hybrId inCentive mechAnism for coopeRation stimUlation in ad hoc networkS. Ad Hoc Networks 10 (2012), 976–989.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. David P. Anderson. 2004. BOINC: A system for public-resource computing and storage. In Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing. IEEE, Los Alamitos, CA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. David P. Anderson, Jeff Cobb, Eric Korpela, Matt Lebofsky, and Dan Werthimer. 2002. SETI@ home: An experiment in public-resource computing. Communications of the ACM 45, 11 (2002), 56–61.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Li Gong. 2001. JXTA: A network programming environment. IEEE Internet Computing 5, 3 (2001), 88–95.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Gilles Fedak, C. Germain, V. Neri, and F. Capello. 2001. XtremWeb: A generic global computing system. In Proceedings of the 1st IEEE/ACM International Symposium on Cluster Computing and the Grid. IEEE, Los Alamitos, CA.Google ScholarGoogle Scholar
  9. David P. Anderson. 2010. Volunteer computing: The ultimate cloud. XRDS: Crossroads. ACM Magazine for Students 16, 3 (2010), 7–10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Krunz, A. Muqattash, and Sung-Ju Lee. 2004. Transmission power control in wireless ad hoc networks: Challenges, solutions and open issues. IEEE Network 18 (2004), 8–14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Bassel Alawieh, Chadi Assi, and Wessam Ajib. 2007. A power control scheme for directional MAC protocols in MANET. In Proceedings of the IEEE Wireless Communications and Networking Conference. 258–263.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. K. Sankar. 2012. Energy efficient routing protocols for wireless ad hoc networks—A survey. ICTACT Journal on Communication Technology 3 (2012), 542–547.Google ScholarGoogle ScholarCross RefCross Ref
  13. Sam Yongsheng. 2005. An Energy-Efficient MAC Protocol for Ad Hoc Networks. Master's Thesis. Department of Electrical and Computer Engineering, University of Victoria.Google ScholarGoogle Scholar
  14. Xiaoqin Chen, Haley M. Jones, and Dhammika Jayalath. 2010. Channel-aware routing in MANETs with route handoff. IEEE Transactions on Mobile Computing 10 (2010), 108–121.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. S. Patheja, Vaishali Tiwari, and Akhilesh A. Waoo. 2013. An adaptive MAC 802.11 protocol for MANET using exponential algorithm. International Journal of Computer Science and Information Technologies 4 (2013), 358–362.Google ScholarGoogle Scholar
  16. Mian Tan, Tinghong Yang, Xing Chen, Gang Yang, Guoqing Zhu, Petter Holme, and Jing Zhao. 2018. A game-theoretic approach to optimize ad hoc networks inspired by small-world network topology. Physica A: Statistical Mechanics and Its Applications 494 (2018), 129–139.Google ScholarGoogle ScholarCross RefCross Ref
  17. S. Berri, V. Varma, S. Lasaulce, M. S. Radjef, and J. Daafouz. 2017. Studying node cooperation in reputation-based packet forwarding within mobile ad hoc networks. In Proceedings of the 3rd International Symposium on Ubiquitous Networking. 3–13.Google ScholarGoogle Scholar
  18. Changbing Tang, Ang Li, and Xiang Li. 2014. When reputation enforces evolutionary cooperation in unreliable MANETs. IEEE Transactions on Cybernetics 45 (2014), 2190–2201.Google ScholarGoogle ScholarCross RefCross Ref
  19. Anthony Krzesinski. 2015. Promoting cooperation in mobile ad hoc networks. In Proceedings of the 25th International Telecommunication Networks and Applications Conference. 202–207.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Qichao Xu, Zhou Su, and Song Guo. 2016. A game theoretical incentive scheme for relay selection services in mobile social networks. IEEE Transactions on Vehicular Technology 65 (2016), 6692–6702.Google ScholarGoogle ScholarCross RefCross Ref
  21. Colin Funai, Cristiano Tapparello, He Ba, Bora Karaoglu, and Wendi Heinzelman. 2014. Extending volunteer computing through mobile ad hoc networking. In Proceedings of the 2014 IEEE Global Communications Conference. IEEE, Los Alamitos, CA.Google ScholarGoogle ScholarCross RefCross Ref
  22. Thomas G. Robertazzi. 1999. Computer Networks and Systems: Queueing Theory and Performance Evaluation. Springer, New York, NY.Google ScholarGoogle ScholarCross RefCross Ref
  23. Jia Liu, Yang Xu, Yulong Shen, Xiaohong Jiang, and Tarik Taleb. 2017. On performance modeling for MANETs under general limited buffer constraint. IEEE Transactions on Vehicular Technology 66 (2017), 9483–9497.Google ScholarGoogle ScholarCross RefCross Ref
  24. Hans Daduna. 2001. Queueing Networks with Discrete Time Scale: Explicit Expressions for the Steady State Behavior of Discrete Time Stochastic Networks. Springer-Verlag, Berlin, Germany.Google ScholarGoogle Scholar
  25. Dommaraju Venkata Subbaraju, Karthik Nathani, Usman Tariq, Fadi Al-Turjman, Suresh Kallam, and Rizwan Patan. 2020. ECMCRR-MPDNL for cellular network traffic prediction with big data. IEEE Access 8 (2020), 113419–113428.Google ScholarGoogle ScholarCross RefCross Ref
  26. Soundararajan Rajasoundaran, Narayanasamy Palanisamy, Rizwan Patan, Gayathri Nagasubramanian, and Mohammed S. Khan. 2020. Secure and concealed watchdog selection scheme using masked distributed selection approach in wireless sensor networks. IET Communications 14, 6 (2020), 948–955.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Rathee Manisha, Sushil Kumar, Amir H. Gandomi, Kumar Dilip, Balamurugan Balusamy, and Rizwan Patan. 2019. Ant colony optimization based quality of service aware energy balancing secure routing algorithm for wireless sensor networks. IEEE Transactions on Engineering Management 68, 1 (2019), 170–182.Google ScholarGoogle Scholar
  28. Shankar Achyut, Natarajan Jaisankar, Mohammad S. Khan, Rizwan Patan, and Balusamy Balamurugan. 2018. Hybrid model for security-aware cluster head selection in wireless sensor networks. IET Wireless Sensor Systems 9, 2 (2018), 68–76.Google ScholarGoogle Scholar

Index Terms

  1. A Novel Approach for Efficient Packet Transmission in Volunteered Computing MANET

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Internet Technology
      ACM Transactions on Internet Technology  Volume 21, Issue 4
      November 2021
      520 pages
      ISSN:1533-5399
      EISSN:1557-6051
      DOI:10.1145/3472282
      • Editor:
      • Ling Lu
      Issue’s Table of Contents

      Copyright © 2021 Association for Computing Machinery.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 September 2021
      • Accepted: 1 July 2020
      • Revised: 1 June 2020
      • Received: 1 February 2020
      Published in toit Volume 21, Issue 4

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!