A Hybrid Energy Efficient Protocol for Mobile Ad Hoc Networks

We proposed an energy conservation technique called Location BasedTopologyControl with Sleep Scheduling for ad hoc networks. It uses the feature of both topology control approach and power management approach. Like the topology control approach, it attempts to reduce the transmission power of a node, which is determined from its neighborhood location information. A node goes to sleep state based on the traffic condition as that of power management approach. In the proposed scheme, a node goes to sleep state only when its absence does not create local partition in its neighborhood.We preformed extensive simulation to compare the proposed schemewith existing ones. Simulation results show that the energy consumption is lower with increase in the network lifetime and higher throughput in the proposed scheme.


Introduction
Wireless ad hoc networks do not require any preestablished network infrastructure.They are more suitable for deployment in areas where a fixed backbone network infrastructure is inflexible and/or economically nonviable.Mobile ad hoc networks (MANETs) have variety of applications such as emergency communication services, military communication, and environmental monitoring.However, they suffer from many challenges such as unpredictable mobility, restricted battery power, limited bandwidth, multihop routing, and security.Efforts are being made to address the above issues.
As nodes in MANETs are battery operated, energy efficiency is important design criteria for the longevity of the network.If a node runs out of battery, its ability to route the network traffic gets affected which in turn adversely affects the network lifetime.Network lifetime of MANETs can be enhanced by either maximizing the battery power of nodes or minimizing the total power consumption in the network.Though a considerable progress has been made in the battery technologies in recent years, it is incomparable with the progress made in semiconductor technology yet.This difference has created a gap between the amount of energy needed to operate in a wireless environment and the battery capacity that powered the nodes.Hence, it necessitates the requirement of power conservation techniques to enhance the network lifetime.Such techniques can be applied at different layers of protocol stack.
Nodes in MANET usually transmit packets with maximum power.A packet transmitted with maximum power may reach the destination with lesser number of hops but can decrease the channel utilization and the remaining energy of the node to a greater extent.Energy saving can be done at the node level by adjusting the transmission power to a lower level [1][2][3][4].In recent years, many techniques have been proposed to conserve energy in MANETs.Topology control approach is one among them.The primary objective of topology control algorithms is to adjust the network topology by reducing the transmission power at node level and at the same time maintaining the network connectivity.In other words the objective of topology control approach is to remove the energy inefficient links at the node level by reducing the transmission power.The major design goal in most of the topology control protocols is to minimize the maximum power used by a node.Other design goals are to improve the network performance such as throughput, network lifetime by alleviating contention, and interference in the network.In this paper we have proposed an energy efficient technique, where nodes are put into sleep state depending on their connectivity information, and transmission power is determined from the location of next-hop node.The proposed scheme inherits the merit of both topology control approach and power management approach.A node in this scheme goes to sleep state only when its absence does not create local partition in its neighborhood.
The rest of the paper is organized as follows.In Section 2, few of the power control techniques are briefly discussed.Proposed technique is described in Section 3. In Section 4 simulation results are presented and conclusion is drawn in Section 5.

Related Work
Energy conservation strategies for MANET can be broadly classified into two types: (i) power management approach and (ii) topology control approach.In power management approach a node remains in one of the three possible states: (a) active: participating in the network traffic by sending and/or receiving packets, (b) idle: waiting for the traffic, and (c) sleep: switching off its radio transceiver for a particular period and wakeing up at the end of the period.Among the above three states, sleep state consumes lesser amount of energy.Therefore, power management based protocols put as many nodes as possible into sleep state to save energy.However, they are more prone to network disruption.This is because, as the nodes goes to sleep state, the connectivity may be lost.Few representatives of power management approach are discussed in [5][6][7][8][9].
Topology control approach conserves energy by adaptively adjusting the transmission power while maintaining the network connectivity.Most of the topology control protocols require information like location, direction, neighbor, and so forth, to construct the topology.Location information can be obtained by means of global positioning systems (GPS) or other positioning methods.The directional information can be obtained by using angle-of-arrival (AOA) technique.Location based techniques produce more accurate topology but are associated with higher hardware cost.In order to reduce the hardware cost some of the techniques assume that a subset of nodes are equipped with GPS while other nodes get their location information by exchanging message with GPS enabled nodes.Few topology control protocols are discussed below.
Topology optimization for different topologies and communication pattern is addressed by Santi [10].Protocols like Geographical Adaptive Fidelity (GAF) [11] and SPAN [12] save energy by maintaining a connected dominating set (CDS).GAF identifies the routing prospective nodes and redundant nodes.Redundant nodes are switched off to save energy.In SPAN, few nodes are selected as coordinator, which stay/awake continuously and perform multihop packet routing.Nodes not selected as coordinator remain in power save mode to conserve energy.SPAN saves energy by putting few nodes into sleep state, while communication takes place through coordinator.Bao and Garcia-Luna-Aceves [13] proposed a topology management scheme called Topology Management by Priority Ordering (TMPO) [13], which is based on CDS and minimum determining set (MDS).TMPO uses two-hop neighborhood information to determine CDS and MDS.
Sahoo et al. [14] proposed a distributed power control protocol that constructs a power saving tree without taking the nodes local information into account.In their proposed approach, network topology is maintained by controlling the transmission power.Topology based on neighborhood information is constructed in Adaptive Neighbor-based Topology Control (ANTC) proposed by Mir and Ko [15], where the transmission range is determined adaptively in order to maintain connectivity.Based on the local connectivity, each node selects a backbone that guarantees a hierarchical topology structure.In the scheme proposed by Sheu et al. [16] transmission power is calculated considering sender maximum power, receiver minimum power, and the signal strength of the received packet.Both LFTC and ANTC do not put the node into sleep state to save energy.Gui and Liu [17] proposed a technique to optimize the delay and energy.They modeled link delays as a function of signal to interference noise ratio of the receiving node and its packet forwarding time in the link.The sum of delay and energy consumption is considered as the weight of an edge, and their objective was to find the minimum weight sum of any edge.
A prediction based data reduction strategy for sensor network is proposed in [18].In this approach a hierarchical least mean square (HLMS) adaptive filter mechanism is used to maximize the lifetime of sensor nodes.Energy saving is achieved by reducing the actual data transmission between a source-sink pair.Both source and sink predict the value of sensed data; if the error is acceptable then sink can use predicted value.Otherwise the source will transmit the sensed data to sink.HLMC acheives better energy saving.However, in dynamic environment when link failure occurs due to node mobility its energy saving is a major concern.A tree based broadcast algorithm for wireless ad hoc network is proposed in [19].The protocol uses two-hop neighborhood information through the exchange of  message to construct broadcast tree.The node in the broadcast tree assigned channels in a time-oriented way such that the message forwarded in the broadcast tree is collision free.Simulation results suggest that the protocol achieves lower broadcast redundancy and higher reachability.
A distributed energy efficient multicast routing algorithm is proposed in [20].The protocol maximizes the lifetime of a source based multicast tree by considering both hop count and energy efficient metric.A weight is assigned to the cost metrics to assign the priority.This helps the protocol to use the cost metrics more efficiently.
A topology control technique  for ad hoc network is proposed in [21]. considers cooperative communication (CC) employing decode-and-forward approach.CC is used to reduce energy consumption in the network and also provides efficient route to the destination node.The authors claim that  improves the network connectivity and has lower energy consumptions compared to other protocols.X-LMST, an extension of local minimum spanning tree (LMST), is proposed in [22].Objective of X-MST is to build an energy efficient spanning tree to improve network lifetime.A cost function is proposed to measure the energy efficiency of a node.Network lifetime is enhanced by avoiding the transmission through energy critical nodes.
Two topology control techniques, node-to-cluster topology control (NCTC) and cluster-to-cluster topology control (CCTC), are proposed in [23].NCTC and CCTC define two different types of links.In both schemes, cooperative links are employed to connect the clusters obtained by the initial topology.Higher energy saving and connectivity are maintained by NCTC and CCTC considering transmitter and receiver cooperation.However, both are based on centralized approach.
The protocols discussed in this section do not put the node to sleep state to save energy.

Proposed Work
In this section, we proposed a power conservation technique for ad hoc network, called Location Based Topology Control with Sleep Scheduling (LBTC).The proposed technique takes into the account the merits of both topology control and power management approach.It uses variable transmission power, like the topology control approach.A sleep scheduling mechanism is introduced where nodes are put to sleep state like the power management approach.However, a node in the proposed scheme goes to sleep state only when it is satisfied that its absence will not create a local partition in its neighborhood [24].Section 3.1 describes the network model and notation used.The proposed scheme is presented in Section 3.2 and analyzed in Section 3.3.

Network Model and Notation.
Wireless ad hoc network is modeled as a graph  = (, ), where  represents the set of nodes and  represents the set of edges.Network consists of  number of heterogeneous nodes randomly deployed in the network.Each node has a unique identity (ID) and is equipped with omnidirectional antenna.It is assumed that nodes are location aware and can calculate their relative distance to their neighboring nodes.Let  max () be the maximum transmission power, let  min () be the minimum transmission power, and let   be the transmission power of a node  ∈ .Initially nodes transmit with maximum power  max .We assumed that transmission power () can be adjusted between the maximum and minimum value; that is,  min () ≤ () ≤  max ().Let  V be the minimum transmission power required to communicate between nodes  and V, which can be computed as  V =   + , where  is the Euclidean distance between  and V,  is the path loss exponent, where 2 ≤  ≤ 4, and  is a constant.Let  = (, ) be the initial topology of the network and let   = (,   ) be the topology, obtained when the transmission power control mechanism is applied at nodes.We have further assumed that links are symmetric and the power control technique is applied within the neighborhood of a node.

Neighbor Set. One-hop neighbor set of node 𝑢 denoted as 𝑁 1
is defined as the set of nodes that have a direct link to , when it transmits with power (),  min () ≤ () ≤  max ().
Two-hop neighbor set of node  denoted as  2  is defined as the set of nodes that have a direct link to the nodes in the set  1   .This is represented as The common node between  and V is denoted as  V .
A node is said to be a common node between  and V when it lies in the intersection area of nodes  and V.This is represented as where  1  and  1 V are the one-hop neighbor set of nodes  and V, respectively.

Location Based Topology Control with Sleep Scheduling (LBTC).
The proposed scheme operates in two phase.First phase is the link selection phase, while the second is the sleep scheduling phase.In the link selection phase a node determines its transmission power.In sleep scheduling phase a node decides whether to go to sleep state or not depending on the present traffic condition and neighborhood connectivity.A node goes to sleep state only when it satisfies that its neighbors are reachable from each other without its active participation.

Link Selection Phase.
In this phase a node  determines its transmission power that is enough to reach any of the nodes in the set  1  .Nodes periodically broadcast a  message with  max , which contains sender ID and location information of the sender.On receiving  message a node computes the transmission power required to transmit to the sender of the  message and updates its vicinity table which is maintained at each node.The structure of the vicinity table is as follows: SenID.

LinkType.
The meaning of each field in the vicinity table is explained as follows.SenID.It is identity of the node (Node ID), from which  message is received.
LocInfo.It is location information of the sender of  message.
DirCost.It is link cost from the node to the sender of the  message.
MinCost.It is minimum link cost between the current node and the sender.Current node is the node that is updating its vicinity table.Initially the value in this field is set to that of DirCost.This value is updated when there exists common node  between the current node and SenID such that transmission cost from the current node to SenID node through node  has lower total transmission cost than the DirCost.
ComNode.This field records the common node  through which there exists an energy efficient path between the current node and SenID.It is updated when there exists a common node  between  and V such that   +  V <  V .
LinkType.It indicates whether the link between the current node and SenID is direct (one-hop) or indirect (more than one-hop).For direct the entry is zero, else it is one.
Initially, the vicinity table is empty and is updated when a node receives a  message from its neighbors.To illustrate the updation of vicinity table we consider Figure 1.Let node  with its current location (91, 61) receive a  message (, (101, 61)) from node , where coordinate and , and  and , respectively.There can be more than one node within the transmission range of a pair of nodes.
Only that node is selected as the  through which the cost between the pair of nodes is minimum.For example, nodes , , , and  are within the transmission range of nodes  and .But node  is selected as the  between  and .After obtaining the , node  updates the LinkType, , and MinCost field in its vicinity table.The updated vicinity table is shown in Table 3.
From the table it is observed that the cost of transmitting from  to  through node  is 78, whereas the direct cost is 101.Similarly, the cost of transmitting from  to  through  is 80, whereas the direct cost is 137.
From the updated vicinity table, node  computes its transmission power for which it considers only those nodes where the LinkType field is set to zero.Node  considers nodes , , , and  as the LinkType field to these nodes which is set to zero.The transmission power of a node is the maximum value in the DirCost field of those nodes considered for computing transmission power.Node  determines its transmission power, which is the maximum value in the DirCost field of nodes , , , and ; that is, max (19,30,38,42) = 42.The resulting topology as seen by node  after the link selection phase is shown in Figure 2. It is observed that node  has lesser number of one-hop neighbors than previous as seen in Figure 1.

Sleep Scheduling Phase.
In this phase a node decides whether to enter into sleep state or not, depending on the traffic pattern and neighborhood connectivity information.A node remains in one of the following three states: (i) active, (ii) watch, and (iii) sleep.In active state nodes participate in data communication and periodically broadcast a  message.After the expiry of Hello message period,   , nodes enter into a watch state.In watch state, a node decides whether to go to active state or to sleep state.In active and watch state the radio transceiver of a node is turned on, whereas it is turned off in sleep state.A node in sleep state wakes up at the end of sleep time,   , and enters into watch state.The state transition diagram between states is shown in Figure 3.In  6) () ← 0 (7) procedure Local connectivity (8) for  ∈  1  do (9) for each  ∈  1  do (10) if  ∈  1  then (11) S e tC M [ ][] = CM[][] = TRUE ( 12) else (13) () = () ∪ {} (14) end if (15) end for (16) end for (17) for  ∈  the watch state, a node decides whether to go to active state or sleep state.If the node some pending traffic, it returns to active state; otherwise it executes a sleep eligibility algorithm, to check whether it can enter into the sleep state.
When a node goes to sleep state it may create a local partition, within its neighborhood.For example, a critical node on a path, when goes to sleep state, creates a local partition.This is because when a critical node goes to sleep state, all paths through that node are broken, and any ongoing traffic through that node gets disturbed.Therefore, before going to sleep state, a node checks whether its absence will create any local partition.In the watch state a node checks for the local partition.If the node has no traffic to participate and its absence does not create a local partition, then the node goes to sleep sate.A node in watch state, having no traffic to transmit, executes the sleep eligibility algorithm given as Algorithm 1.

Analysis.
In this subsection, we analyze the network connectivity in the proposed scheme.
Theorem 1.If two nodes are connected before the   phase, then they are also connected after the   phase.
Proof.Let  = (, ) be the network topology before the   phase and let   = (,  ) be the network topology after the   phase.We have to show that, for any , V ∈ , if there exists a path in , then there also exists a path from  to V in   .Since  is connected, for any , V ∈ , there exists a path from  to V in .Let the path be   → V, where  is the number of links in the path from  to V. We show by means of induction that there also exists a path from  to V; that is,    → V, with   being number of links in   , where   ≥ .
Let  = 1, which means that node V is within the transmission range of node  in .In   , V will be in either one-hop or two-hop neighbor of .Therefore, a path from  to V exists in   .
Let us assume that it is true for  = ; that is, there exists a path in  from  to V with  number of links.Therefore, there also exists a path from  to V in   , and the number of links in the path is greater than or equal to .
Let  =  + 1; then the path from  to V with  + 1 number of links in  is shown in Figure 4.
The path in Figure 4 can be interpreted as two subpaths one from  to V  with  number of links and the other from V  to V with single link in .From the induction hypothesis, we know that if there exists a path from  to V  in  with  links then there exists a path from  to V  in   .From the basis, we know that if there exists a path from V  to V with single link in  then there exists a path from V  to V in   .Hence there  exists a path from  to V in   .Therefore if  is connected then   is also connected.
In the sleep scheduling phase each node checks the local connectivity within its neighborhood.Partition in a network means global partition, which is not the same as that of local partition.In the process of maintaining local connectivity there always exists a node redundancy due to false alarm of network partition.Therefore, connectivity is always maintained in the proposed scheme.

Simulation and Comparison
We simulated the proposed technique using QualNet 4.5 [25] simulator to evaluate its performance.The parameters considered for simulation are shown in Table 4.For the comparison, we consider two topology control protocols, LFTC [16] and ANTC [15].Lifetime of  message is set to  sec and  message interval to  sec.The following metrics were considered for performance evaluation.
4.1.Throughput.We plot the throughput versus pause time, number of nodes, CBR connection, and packet size in Figures 5(a), 5(b), 5(c), and 5(d), respectively.From Figure 5, it is observed that a higher throughput is attainable in the proposed scheme.Higher throughput is attributed to the increase in longevity of the network due to proper adjustment of transmission power in the   phase and energy saving in the  ℎ phase.

Energy Consumption.
Energy consumption determines the effectiveness of energy saving scheme.We consider the energy model in [26] for measuring the energy consumption.The plot for energy consumption versus pause time, number of nodes, CBR connection, and packet size is shown in Figures 6(a   it is observed that LBTC has higher end-to-end delay as compared to LFTC and ANTC.This is due to increase in hop count as nodes transmit with lower power.This observation is consistent with the published report that the average end-to-end delay increases when the transmission power control mechanism is applied [27].

Conclusion
In this paper, we proposed a hybrid energy efficient protocol called LBTC for ad hoc network.The proposed protocol considers the merits of both topology control scheme and  power management scheme.It selects energy efficient links, and nodes which do not actively participate in communication are put to sleep state.LBTC is compared with two existing schemes and observed that it is more energy efficient and delivers higher throughput.However, the end-to-end delay is higher.This is because as the transmission power is controlled, packets take more number of hops to travel the destination.In future, we intend to reduce end-to-end delay with enhancing the network lifetime.

Figure 1 :
Figure 1: Nodes with location information.
), 6(b), 6(c), and 6(d), respectively.It is observed from Figure6that the proposed LBTC scheme has lower energy consumption.This is because LBTC selects energy efficient links and nodes are put to Energy consumption versus packet size

4. 3 .
Network Lifetime.The plot for network lifetime versus pause time, number of nodes, CBR connection, and packet size is shown in Figures 7(a), 7(b), 7(c), and 7(d), respectively.It is observed that LBTC gives a superior network lifetime because it is energy efficient.4.4.Delay.The plot for delay versus pause time, number of nodes, CBR connection, and packet size is shown in Figures 8(a), 8(b), 8(c), and 8(d), respectively.From Figure 8, End-to-end delay versus pause time End-to-end delay versus number of nodes End-to-end delay versus packet size

Table 1 :
Vicinity table (node ) after receiving message from .

Table 2 :
Vicinity table (node ) after receiving message from neighbors.Then, the vicinity table of node  is updated as shown in Table1.Node  computes the DirCost between itself and , which is computed to be 101, assuming  = 2 and  = 1.DirCost and MinCost field is set to 101 and the LinkType to zero.ComNode is set to null as no common node between  and  exists at this stage.Vicinity table of node  after receiving  message from all its neighbor is shown in Table2.After gathering information about its neighbor, node  determines whether there exists any  between itself and its neighbor.Nodes , , and  are the  between  and ,  Resulting topology of node  after link selection phase.
S Figure 3: State transition in LBTC.

Table 3 :
Vicinity table (node ) after determining the ComNode between itself and its neighbor.