skip to main content
research-article

A Novel Approach for Efficient Packet Transmission in Volunteered Computing MANET

Published: 03 September 2021 Publication History

Abstract

A mobile ad hoc network (MANET) is summarized as a combination device that can move, synchronize and converse without any preceding management. Enhancing the lifetime energy is based on the status of the concerned channel. The node is accomplished of control the control messages. Due to unplanned methods of energy conservation, the node lifespan and quality of packet flow is defaced in the existing solution. It results in a network-to-node-energy trade-off, ensuing in a failure of the post-network. This failure results in reduced time-to-live and higher overhead. This paper discusses an effective buffer management mechanism, in addition to proposing a novel performance modeling in Volunteered Computing MANET and tactile internet Next, the best execution the nodes can accomplish under fractional data is completely portrayed for utilities for a general purpose. To associate the space between network efficiency and energy conservation based on the minimal overhead, this article proposes a switch state promoting mutual Optimized MAC protocol for conservation of a node's energy and the optimal use of available nodes before their energy drain. Simulation results are provided as proof of the proposed solution. The simulation results are compared with the existing system with performance measures of delay, throughput, energy consumption, and availability of the node.

References

[1]
K. Anish Pon Yamini, K. Suthendran, and T. Arivoli. 2019. Enhancement of energy efficiency using a transition state mac protocol for MANET. Computer Network 155 (2019), 110–118.
[2]
Normalia Samian and Winston Seah. 2017. Trust-based scheme for cheating and collusion detection in wireless multihop networks. In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. 205–214.
[3]
Normalia Samian, Zuriati Zukarnain, Winston K. G. Seah, Azizol Abdullah, and Zurina Mohd Hanapi. 2015. Cooperation stimulation mechanisms for wireless multihop networks: A survey. Journal of Network and Computer Applications 54 (2015), 88–106.
[4]
Dimitris E. Charilas, Konstantinos D. Georgilakis, and Athanasios D. Panagopoulos. 2012. ICARUS: hybrId inCentive mechAnism for coopeRation stimUlation in ad hoc networkS. Ad Hoc Networks 10 (2012), 976–989.
[5]
David P. Anderson. 2004. BOINC: A system for public-resource computing and storage. In Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing. IEEE, Los Alamitos, CA.
[6]
David P. Anderson, Jeff Cobb, Eric Korpela, Matt Lebofsky, and Dan Werthimer. 2002. SETI@ home: An experiment in public-resource computing. Communications of the ACM 45, 11 (2002), 56–61.
[7]
Li Gong. 2001. JXTA: A network programming environment. IEEE Internet Computing 5, 3 (2001), 88–95.
[8]
Gilles Fedak, C. Germain, V. Neri, and F. Capello. 2001. XtremWeb: A generic global computing system. In Proceedings of the 1st IEEE/ACM International Symposium on Cluster Computing and the Grid. IEEE, Los Alamitos, CA.
[9]
David P. Anderson. 2010. Volunteer computing: The ultimate cloud. XRDS: Crossroads. ACM Magazine for Students 16, 3 (2010), 7–10.
[10]
M. Krunz, A. Muqattash, and Sung-Ju Lee. 2004. Transmission power control in wireless ad hoc networks: Challenges, solutions and open issues. IEEE Network 18 (2004), 8–14.
[11]
Bassel Alawieh, Chadi Assi, and Wessam Ajib. 2007. A power control scheme for directional MAC protocols in MANET. In Proceedings of the IEEE Wireless Communications and Networking Conference. 258–263.
[12]
K. Sankar. 2012. Energy efficient routing protocols for wireless ad hoc networks—A survey. ICTACT Journal on Communication Technology 3 (2012), 542–547.
[13]
Sam Yongsheng. 2005. An Energy-Efficient MAC Protocol for Ad Hoc Networks. Master's Thesis. Department of Electrical and Computer Engineering, University of Victoria.
[14]
Xiaoqin Chen, Haley M. Jones, and Dhammika Jayalath. 2010. Channel-aware routing in MANETs with route handoff. IEEE Transactions on Mobile Computing 10 (2010), 108–121.
[15]
P. S. Patheja, Vaishali Tiwari, and Akhilesh A. Waoo. 2013. An adaptive MAC 802.11 protocol for MANET using exponential algorithm. International Journal of Computer Science and Information Technologies 4 (2013), 358–362.
[16]
Mian Tan, Tinghong Yang, Xing Chen, Gang Yang, Guoqing Zhu, Petter Holme, and Jing Zhao. 2018. A game-theoretic approach to optimize ad hoc networks inspired by small-world network topology. Physica A: Statistical Mechanics and Its Applications 494 (2018), 129–139.
[17]
S. Berri, V. Varma, S. Lasaulce, M. S. Radjef, and J. Daafouz. 2017. Studying node cooperation in reputation-based packet forwarding within mobile ad hoc networks. In Proceedings of the 3rd International Symposium on Ubiquitous Networking. 3–13.
[18]
Changbing Tang, Ang Li, and Xiang Li. 2014. When reputation enforces evolutionary cooperation in unreliable MANETs. IEEE Transactions on Cybernetics 45 (2014), 2190–2201.
[19]
Anthony Krzesinski. 2015. Promoting cooperation in mobile ad hoc networks. In Proceedings of the 25th International Telecommunication Networks and Applications Conference. 202–207.
[20]
Qichao Xu, Zhou Su, and Song Guo. 2016. A game theoretical incentive scheme for relay selection services in mobile social networks. IEEE Transactions on Vehicular Technology 65 (2016), 6692–6702.
[21]
Colin Funai, Cristiano Tapparello, He Ba, Bora Karaoglu, and Wendi Heinzelman. 2014. Extending volunteer computing through mobile ad hoc networking. In Proceedings of the 2014 IEEE Global Communications Conference. IEEE, Los Alamitos, CA.
[22]
Thomas G. Robertazzi. 1999. Computer Networks and Systems: Queueing Theory and Performance Evaluation. Springer, New York, NY.
[23]
Jia Liu, Yang Xu, Yulong Shen, Xiaohong Jiang, and Tarik Taleb. 2017. On performance modeling for MANETs under general limited buffer constraint. IEEE Transactions on Vehicular Technology 66 (2017), 9483–9497.
[24]
Hans Daduna. 2001. Queueing Networks with Discrete Time Scale: Explicit Expressions for the Steady State Behavior of Discrete Time Stochastic Networks. Springer-Verlag, Berlin, Germany.
[25]
Dommaraju Venkata Subbaraju, Karthik Nathani, Usman Tariq, Fadi Al-Turjman, Suresh Kallam, and Rizwan Patan. 2020. ECMCRR-MPDNL for cellular network traffic prediction with big data. IEEE Access 8 (2020), 113419–113428.
[26]
Soundararajan Rajasoundaran, Narayanasamy Palanisamy, Rizwan Patan, Gayathri Nagasubramanian, and Mohammed S. Khan. 2020. Secure and concealed watchdog selection scheme using masked distributed selection approach in wireless sensor networks. IET Communications 14, 6 (2020), 948–955.
[27]
Rathee Manisha, Sushil Kumar, Amir H. Gandomi, Kumar Dilip, Balamurugan Balusamy, and Rizwan Patan. 2019. Ant colony optimization based quality of service aware energy balancing secure routing algorithm for wireless sensor networks. IEEE Transactions on Engineering Management 68, 1 (2019), 170–182.
[28]
Shankar Achyut, Natarajan Jaisankar, Mohammad S. Khan, Rizwan Patan, and Balusamy Balamurugan. 2018. Hybrid model for security-aware cluster head selection in wireless sensor networks. IET Wireless Sensor Systems 9, 2 (2018), 68–76.

Cited By

View all
  • (2024)Enhancing IoT Security and Efficiency: Advanced Public Key Cryptographic Solutions for the Modern Era2024 4th International Conference on Technological Advancements in Computational Sciences (ICTACS)10.1109/ICTACS62700.2024.10841090(1740-1747)Online publication date: 13-Nov-2024
  • (2022)A Bio inspired optimization with Reliable QoS Routing through Efficient Packet Transmission in Mobile ad-hoc NetworkRenewable Energy Focus10.1016/j.ref.2022.03.00341(188-197)Online publication date: Jun-2022

Index Terms

  1. A Novel Approach for Efficient Packet Transmission in Volunteered Computing MANET

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Internet Technology
    ACM Transactions on Internet Technology  Volume 21, Issue 4
    November 2021
    520 pages
    ISSN:1533-5399
    EISSN:1557-6051
    DOI:10.1145/3472282
    • Editor:
    • Ling Lu
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 September 2021
    Accepted: 01 July 2020
    Revised: 01 June 2020
    Received: 01 February 2020
    Published in TOIT Volume 21, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. MANET
    2. OMAC protocol
    3. energy consumption
    4. volunteer computing

    Qualifiers

    • Research-article
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)12
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Enhancing IoT Security and Efficiency: Advanced Public Key Cryptographic Solutions for the Modern Era2024 4th International Conference on Technological Advancements in Computational Sciences (ICTACS)10.1109/ICTACS62700.2024.10841090(1740-1747)Online publication date: 13-Nov-2024
    • (2022)A Bio inspired optimization with Reliable QoS Routing through Efficient Packet Transmission in Mobile ad-hoc NetworkRenewable Energy Focus10.1016/j.ref.2022.03.00341(188-197)Online publication date: Jun-2022

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media