Article Preview
Top1. Introduction
In the past decade, there is rapid improvement in mobile computing technology, because it contains many facilities (Elmahdi et al., 2020). In an infrastructure-less wireless networks, there is the possibility to send the data or information directly to the user, it is known as mobile ad hoc network, or MANET (Abdel-Fattah et al., 2019). It has no static infrastructure to transform the data. Moreover, the Nodes range is distributed to other node, to make the communication directly (Dhindsa & Bhushan, 2020). Also in MANET the nodes are arranged in a dynamic manner (Mishra & Mittal, 2020). This kind of network model is utilized in many claims such as the Internet of Things (IoT), military (Shrestha, 2020), vehicle traffic system, etc. Owing to its extensive range of appliance, the MANETs have become a lively research theme. However, the restricted battery lifespan and the flexibility of the arrangement of the nodes became an important challenge (Dhage & Vemuru, 2018). Because in MANET the nodes are movable, based on that movement the topology is changed. Also, the nodes in the MANET framework are moving freely without any restriction (Arage & Satyanarayana, 2019).
In MANET the lifetime of node estimation is important metrics because of its moving behavior (Balu Narsimharao, 2018). Some researchers presented the work in the awareness of network or node lifetime by introducing the load balancing strategy (Jayanthi & Ali Hussain, 2018) but still, the suitable solution is not found. Because of freely moved nodes, each node has specific energy and speed to transfer the message (Rao et al., 2018).Furthermore, a faulty or energy drained node causes link failure it tends to data loss. Also, the malicious node makes the good node as a faulty node (Sunita, 2019). So detecting and preventing the attack is key metrics in mobile computing. In MANET, some specific features are enacting several challenges to network designs on entire frames of the protocol heap (Sultanuddin, 2019). Thus the physical section should deal with the rapid variations in connection features. Consequently, the media access control (MAC) layer permits fair channel entree to reduce data collisions or crashes, and also with exposed and hidden terminals (Rao, 2018). Then in the network layer, hubs want to cooperate to estimate the paths. Moreover, the transport layer section handles the delay features and packet loss (Sai Harika et al., 2019). Also, the layer of application concentrates on connection and disconnection process in the communication channel. To preserve the communication in MANET, proficient routing procedures are required to create communication routes between all nodes.
All hubs in the ad-hoc network support several ways of routing to transfer the data. For the selection of an optimal path, the node power accessing strategy is performed to maintain the communication channel without any interruption (Chavan & Srikanth, 2019). In recent, Some of the efficient strategies were developed like demand vector (Anand & Sasikala, 2019), dynamic routing (Babu, 2019), Busyness load balancing (Aouiz et al., 2019), etc., still preventing attack and providing better communication channels is a challengeable task. Thus an efficient protocol with load balancing can improve the communication channel of MANET. Moreover, all wireless movable nodes need a nonstop power preserving to guarantee node effectiveness and availability. The key contribution of this research work is summarized below,
- ●
Initially a novel TOREM protocol is developed
- ●
Source and destination nodes are specified
- ●
Base on the nodes energy the path is selected, if there is any less energy node then the protocol create reference node to avoid packet drop.
- ●
If the node suffers from data overhead then it equally shares the data to other node to reduce routing overhead.