Energy Efficient Broadcasting Using Network Coding Aware Protocol in Wireless Ad hoc Network

Size: px
Start display at page:

Download "Energy Efficient Broadcasting Using Network Coding Aware Protocol in Wireless Ad hoc Network"

Transcription

1 Energy Efficient Broadcasting Using Network Coding Aware Protocol in Wireless Ad hoc Network 1 Shuai Wang 2 Athanasios Vasilakos 1 Hongbo Jiang 1 Xiaoqiang Ma 1 Wenyu Liu 1 Kai Peng 1 Bo Liu 1 Yan Dong 1 Huazhong University of Science and Technology, Wuhan , China 2 University of Western Macedonia, Greece {wangshuai87410, hongbojiang2004, mxqhust}@gmail.com, vasilako@ath.forthnet.gr, {liuwy, pkhust, liubo, dongyan}@hust.edu.cn Abstract Energy efficient broadcasting is of paramount importance for many broadcast applications in wireless ad hoc networks. With respects network coding, it has been proved that the energy gain is upper bounded by 3. However, the coding opportunity is often highly dependent on the established routing paths, resulting in that a lot of coding opportunities could be lost in practice. By combining network coding with the Connected Dominating Set (CDS)-based broadcasting, we take full use of network coding. The intuition behind our algorithm is to intersect information flows at nodes in CDS to increase the coding opportunities. We design a scheme, named NCDS, that uses Network Coding over Connected Dominating Set, to reduce energy consumption. Our experimental results show that NCDS provides up to 161% gains compared to blind flooding, and 37% gains compared to CDSbased broadcasting without network coding. I. INTRODUCTION Wireless ad hoc networks have been widely deployed as a means of data communication because of their flexible structures. Usually, they are utilized in dangerous scenarios like battle fields where it is costly or infeasible to replace the batteries of nodes. Meanwhile, wireless devices in wireless ad hoc networks have become smaller than ever before, which limits the size of nodes batteries. Therefore, energy efficiency has become a crucial factor in wireless ad hoc networks. Broadcasting is one of the most frequent events in wireless ad hoc networks for the dissemination of data and control messages in many applications. There has been an increasing focus on designing energy efficient broadcast algorithm to prolong the life span of wireless ad hoc networks [6], [7], [8]. Network coding, originally proposed by R. Ahlswede et al. in [1], is a great breakthrough in the area of information theory, and increasingly popular as a mechanism to increase the utilization of both wired and wireless networks. In wireless networks, COPE [2], one of the most practical network coding scheme, is first proposed by S. Katti et al. It exploits the physical-layer broadcast property of wireless channels and finds coding opportunities. By doing so, multiple packets can be coded together and then forwarded within a single transmission. As a result, it decreases the number of transmissions of wireless ad hoc networks. By assuming that each transmission carries the same size packet and the energy consumption is proportional to the number of transmissions, Liu et al. [3] proved that the energy gain is upper bounded by 3. N 1 P1 N 3 (a) P1 N 1 N 3 N 1 N N 1 3 N3 P1 N 5 N 5 N 6 N 6 (c) Fig. 1. (a) Chain Topology, (b) cannot form Chain Topology, (c) X Topology, and (d) cannot form X Topology The idea how network coding can decrease transmission times is illustrated in Figure 1. Figure 1(a) shows a basic coding topology, called Chain Topology [2]. Suppose that node N 1 has a packet for node N 3, and node N 3 has a packet for node N 1. Both of the two packets must be relayed by node. Without network coding, four transmissions are needed to achieve the message exchange. With network coding, however, three transmissions are sufficient to do this. After N 1 transmits and N 3 transmits, the intermediate node broadcasts a packet obtained by XOR-ing and. Then, node N 1 can decode packet by performing an XOR of packets and the XOR-ed packet it receives. Node N 3 can obtain packet using the same decoding mechanism. Here, no opportunistic listening [2] is required. Another typical coding scenario is called X topology [2], as shown in Figure 1(c). Node N 5, are within the transmission ranges of N 1, respectively. By opportunistic listening, node can overhear the transmission of ; node N 5 can overhear the transmission of. When receiving the XOR-ed packet P2, can decode packet by performing (P1 P2 ) and so does N 5. It only requires three transmissions compared with that of four transmissions without network coding. One problem here is that the coding opportunity is highly dependent on the established routes paths [5]. In practice, it is more severe when the established routes may not form the available coding topology including Chain Topology and X Topology (see Figure 1(b) and Figure 1(d)). In these cases, many coding opportunities are lost. In this paper, we strive to achieve the energy gain by network coding and provide an energy efficient broadcasting (b) (d)

2 in wireless ad hoc networks. We design a scheme, named NCDS, which uses network coding over connected dominating set, to reduce energy consumption. We consider CDS due to two reasons. On one hand, CDS is constructed for efficient broadcasting to avoid the broadcast storm problem [4] caused by simple blind flooding. With CDS-based broadcasting, only the nodes in CDS forward data to the entire network which decrease the transmissions for broadcasting dramatically. On the other hand, the infrastructure formed by CDS provides a common path for information flows and improves the opportunities of intersections of information flows suitably. This significantly increase the coding opportunities. We implement our algorithm with NS-2 and our experimental results show that NCDS provides up to 161% gains compared to blind flooding and 37% gains compared to CDS-based broadcasting. The rest of our paper is organized as follows. In Section II, we present the background on CDS-based broadcasting and our motivation for a network coding based protocol for broadcasting. Our scheme NCDS is presented in Section III. In Section IV, Experiment results and discussion are presented. Finally, Section V concludes the paper. II. BACKGROUND AND MOTIVATION In this section, we first describe the key idea of CDSbased broadcasting algorithm and the energy gain brought by CDS-based broadcasting compared with blind flooding. Then, we introduce the most practical network coding scheme - COPE and its coding opportunity lost problem. We highlight, through an example, the coding opportunity that can be increased greatly by applying network coding, to the CDS-based broadcasting. Very interestingly, CDS solves the coding opportunity lost problem by improving more coding opportunities because more information flows are intersected at nodes in CDS. Meanwhile, network coding makes the CDSbased broadcasting more efficient. It adds an extra network coding energy gain to the energy gain brought by CDS-based broadcasting compared with blind flooding. A. CDS-based Broadcasting For broadcasting, Minimum Connected Dominating Set (MCDS) [10] is considered to minimize broadcast transmissions. Let us consider a 16 node network shown in Figure 2. The minimum connected dominating set is {J, K, I, F, C}. Assume that node J is the broadcast source node. When node J transmits a packet, the packet reaches all neighbor nodes, O, M, H, D, E and K. Note that this transmission requires only one packet transmission. Node K, which belongs to MCDS, re-broadcasts the received packet to its neighbor nodes. This packet reaches nodes I and N. Node I re-broadcasts the packet since I is in MCDS. Then, node F forwards the packet and this packet reaches node P, I and C. Nodes P and I ignore the packet as they have already received the same packet from nodes I and K respectively. Finally, node C transmits the packet to its neighbors with one packet transmission. Because node J, K, I, F and C broadcast the packet to complete the broadcast task, the cost of MCDS-based broadcasting is only five transmissions. Finding a minimum connected dominating set (MCDS) in a network is an NP-complete problem. Some CDS approximation broadcast algorithms [6], [7], [8] are proposed. The key idea of these algorithms is similar as the example mentioned above - using only dominating nodes to forward the broadcast packet. Nodes that are not dominating nodes only receive the broadcast packet without forwarding it. Therefore, the number of redundant transmissions is reduced. H M D J O Fig. 2. E K P F A N I C G 16-node random topology B. Network Coding and Coding Opportunity Lost Problem While considering network coding algorithm, we should make sure that all next-hop nodes can decode their corresponding original packets. Consider k packets p 1, p 2,..., p k at a node that have distinct next-hop nodes n 1, n 2,..., n k respectively. This node can XOR the k packets together to form the coded packet p = (p 1,p 2,...,p k ) only if the nexthop node n i for each packet p i already has all k 1 packets p j for j i. Usually, we judge whether node n i owns all other packets by using these two rules: (1) Node n i is the previous-hop node of packet p j,or (2) Node n i overheard packet p j (opportunistic listening). However, network coding opportunity may not always occur. In the existing designed routing, it is possible that two flows which meet the coding rules don t intersect with each other, see Figure 1(b) and Figure 1(d). Our study is motivated by the observation of CDS-based broadcasting energy gain. Meanwhile, the backbone constructed by CDS provides a common path for information flows. Since many information flows of opposite direction often intersect at such backbone nodes, the coding opportunities will increase dramatically. As shown in Figure 2, we illustrate how network coding improves the CDS-based broadcasting. In this example, there are two broadcast sources, B and D. We construct a wireless backbone where the nodes J, K, I, F, C are selected as CDS, the paths of information flow for broadcasting are D J K I F C and B C F I K J. The CDS-based broadcast flows overlap at the common L B

3 nodes J, K, I, F and C, and then network coding can occur at these nodes. If the source nodes D (or E, H, M, O) and B (or A) keep broadcasting packets utilizing CDS-based broadcasting, network coding can be done continuously at the common nodes J, K, I, F and C. Note that the coding opportunity is increased dramatically at this condition and the benefits of network coding are fully exploited. Meanwhile, network coding makes the routing path constructed by CDS high efficient. Since the execution of network coding algorithm is independent of CDS-based broadcasting approach, we can get an extra network coding energy gain based on CDS-based broadcasting energy gain. Note that network coding can occur very often in broadcast session, especially in multiple source/multiple message broadcast application. Due to packets of any broadcast session will continuously pass through the backbone constructed by CDS, network coding can be done frequently at these nodes. C. Inner infrastructure network coding energy gain independent of MAC layer, we adopt an underneath MAC protocol through our algorithm. A. An Approximation algorithm to Minimum Connected Dominating Set Construction It is a well-known NP-complete problem to find a Minimum Connected Dominating Set. Thus, we utilize an approximation algorithm to determine the forward nodes for broadcasting. In earlier work [9], we proposed a backbone extraction scheme for large scale wireless network. Here, we construct the backbone of wireless ad hoc network by utilizing an Approximation algorithm to Minimum Connected Dominating Set (A-MCDS) - the nodes which have the maximum degree are chose as the dominating set. The description of our algorithm: Initially, all nodes are in state WAIT and their states will change to DOMINATEE, DOMINATOR, CONNECTOR when they receive the related message. See Figure 4. DOMINATOR P 3 A P 3 P 4 C P 4 B WAIT ACTIVE CONNECTOR DOMINATEE P 3 P 4 P 3 P 4 F G Fig. 4. Transformation diagram of node state Fig. 3. Inner Infrastructure Network Coding Energy Gain We can also get an inner infrastructure network coding energy gain for CDS-based broadcasting. Let us consider the example shown in Figure 3. It is a part of the 16-node network topology in Figure 2 - the dominator C and its dominatees A, B, F and G. In this example, dominator C broadcasts four packets to its four dominatees A, B, F and G. Assume that some of these packets have been received by its dominatees as shown in Figure 3 - i.e., dominatee A receives p 1, p 2 and p 3, dominatee B receives p 1, p 2 and p 4, dominatee F receives p 1, p 3 and p 4, and dominatee G receives p 2, p 3 and p 4. Note that each of the four packets is lost by some dominatee. Without network coding, the dominator has to transmit all the four lost packets. However, with network coding, it is sufficient to transmit one XORed packets. The dominator only needs to send p 1 p 2 p 3 p 4. Despite the fact that they lost different packets, all four dominatees can retrieve the four packets they needed by XORing the coded packet with the packets they have received. III. NCDS SCHEME DESCRIPTION In this section, we introduce our NCDS scheme, which consists of two phases. The first is to construct a Minimum Connected Dominating Set (MCDS) for broadcasting. As the construction of MCDS is NP-complete, an approximation algorithm to MCDS is given. The second is applying network coding to CDS-based broadcasting. Noting that NCDS is Step1: Learn one-hop neighbor information At first, each node in the network sends the HELLO message to its neighbors. Compared with the HELLO message in AODV [11], we add the degree information of the node. After collecting the messages from its neighbors, every node creates its neighbor list, containing the degree information of its neighbors. Step2: Find the DOMINATOR All nodes at this step are set in state WAIT initially. Select one node randomly and mark the node as DOMINATOR. This node sends DOMINATOR MESSAGE to its neighbor and its neighbors change their states to state DOMINATEE. Each node in state DOMINATEE sends DOMINATEE MESSAGE to its neighbors. If its neighbors are in state WAIT, then this node is marked state ACTIVE. Our algorithm then changes the node in state ACTIVE, whichever has the maximum degree, to state DOMINATOR, with their neighbors (in state WAIT) marked state DOMINATEE. Step3: Find the CONNECTOR We select the node in state DOMINATEE, in which neighbors have the maximum number of DOMINATOR, as the CONNECTOR. To make CDS more efficient for transmission, we add CONNECTOR for every two hop distance DOMINATOR after the former process. After all of the nodes are marked state DOMINATOR, DOMINATEE or CONNECTOR, the algorithm terminates. All the nodes in DOMINATOR or CONNECTOR form a connected dominating set.

4 Lemma 1: The resulting graph of DOMINATOR and CONNECTOR from A-MCDS algorithm is a CDS. (Proof is omitted) Lemma 2: The time complexity of A-MCDS algorithm is O(n), and the message complexity is also O(n), where n is the number of nodes. (Proof is omitted) B. Applying Network Coding to CDS-based Broadcasting In this section, we describe how to use network coding in CDS-based broadcast. Similar to COPE [2], our scheme inserts a coding layer between the IP and MAC layers which detects coding opportunities and performs encoding/decoding. Coding opportunity is often illustrated with several typical network topologies, such as the chain topology and X topology. The authors of COPE also provided the cross topology and wheel topology, where higher coding gains can be achieved. The later two scenarios do not occur as often as the the first two. With opportunistic listening or not, all these coding scenarios can be divided into two categories. Here, we mainly consider our NCDS scheme with opportunistic listening. When opportunistic listening is used, nodes in the network can overhear many packets and thus coding opportunity is improved. The corresponding packet processing algorithm is shown in Algorithm 1. Based on the neighborhood information, node u checks whether all its neighbors N(u) have already received the packet (line 1). If so, it does not forward the packet (line 2). Otherwise, node u checks whether packet p is a native one. In our algorithm, only the nodes in CDS forward packets or take the encoding procedure (line 5). For each node in CDS, it tries to see whether it can get any coding opportunities to encode the packet with the remaining packets in the output queue that it needs to forward (line 8). If yes, it will encode these packets together and send the coded packet in one transmission (line 10). If not, the node will buffer the packet for a time period T threshold (lines 12-13) and process it later. Note that it may create more coding opportunities. If the buffer time for packet p exceeds T threshold, node u sends the packet immediately (lines 15-16). Finally, if the received packet p is a coded one, we decode it before processing the packet (lines 21-22). When a forwarder (nodes in CDS) sends a coded packet to its neighbors, we should make sure that all its neighbors have overheard enough packets to decode the coded packet. We specify the Broadcast Coding Rule as follows: Definition 1: (Broadcast Coding Rule) Consider node u s neighbor N(u) and an encoded packet p = (p 1,p 2,...,p K ). All the neighbors have overheard K 1 packets among p i, i =1, 2,...,K; and thus they can decode the coded packet p. We desire to encode as many packets as possible. For simplicity, we use a greedy encoding algorithm shown in Algorithm 2: whenever having an opportunity to transmit, the node picks the first packet p in the output queue, checks whether the remaining packet q satisfies the broadcast coding Algorithm 1 ProcessPkt(p) 1: if All N(u) RecvP kt(p) then 2: return; 3: end if 4: if NativePkt(p) then 5: if {u} V CDS == then 6: return; 7: else 8: K = EncodeP kt(); 9: if K! =1then 10: SendCodedP kt(); 11: else 12: while BufferTime(p) <T threshold do 13: BufferPkt(p, T threshold ); 14: end while 15: if BufferTime(p) T threshold then 16: SendN ativep kt(p); 17: end if 18: end if 19: end if 20: else 21: for all q = DecodeP kt(p) do 22: P rocessp kt(q) 23: end for 24: end if rule and encodes as many packets as possible with the packet p (line 3-7). Normally the number of packets that can be encoded into a single packet is small (bounded by the node degree), the computational overhead is insignificant. Algorithm 2 EncodePkt() 1: Pick packet p at the head of the output queue 2: K =1 3: for all remaining packets q in the output queue do 4: if q satisf ies the Broadcast Coding Rule then 5: p = p q 6: K = K +1 7: continue 8: end if 9: end for 10: return (p, K) IV. PERFORMANCE EVALUATION In this section, we present the performance evaluation results from extensive simulation in ns-2.30 [12]. In our simulation experiment, we compare our NCDS scheme with (1) Blind Flooding; (2) the broadcast algorithm with network coding but not CDS ( NC + NON-CDS for short); (3) CDSbased Broadcasting. The network area is set to m 2 with nodes increasing from 50 to 100. Each node in the network has a constant transmission range of 300 m. The radio propagation model is the two-ray ground reflection

5 model and the radio model assumes a nominal bit rate of 2Mb/sec. The MAC layer scheme follows the IEEE MAC specification. The application traffic is CBR and all the application packets are of 256 bytes each. The broadcast sources are chosen randomly and we set a total of 20 broadcast sessions. The packet sending rate is 2 packets/sec. Two metrics are used: (1) energy gain, defined as the ratio of the total number of transmissions of blind flooding to the number of transmissions used by a considered broadcast scheme, and (2) number of coding operations, defined as the number of times that network coding occurs during the simulation. It is used to evaluate the increase of coding opportunities. The experiment results are the mean value of 10 rounds over different random topologies. Energy Gain Blind Flooding NC + NON CDS CDS based Broadcasting NCDS Number of nodes Fig. 5. Energy gain Consider the energy gain of the algorithms, as shown in Figure 5. As expected, NCDS outperforms the other three algorithms. Without considering coding opportunity lost problem, the energy gain of NC + NON-CDS algorithm is only 1.07, from which we can get that the benefits of network coding cannot be fully exploited as the theoretical analysis shows if we don t consider the coding opportunity lost problem. The energy gain for our NCDS algorithm can be as high as 2.61, which means blind flooding algorithm sends 161% more packets than NCDS. The energy gain of NCDS is composed by two parts - the CDS-based broadcasting energy gain which is about 1.91 and the energy gain brought by network coding which is about Number of Coding Operations NC + NON CDS NCDS Number of nodes Fig. 6. Number of coding operations We show that NCDS does provide more coding opportunities than using network coding on a plain network. Figure 6 shows the number of coding operations of the network coding without CDS scheme, labeled NC + NON-CDS in comparison with NCDS. On average, NCDS increases coding opportunities by about 106%, contributing to a greatly improved energy gain. V. CONCLUSION In this paper, we propose NCDS scheme with the goal of improving the energy gain for wireless ad hoc networks. To do so, our main idea is to apply network coding on CDSbased broadcasting. On one hand, CDS-based broadcasting is an energy efficient scheme itself and CDS can provide a common path for information flows which greatly increase the coding opportunity. On the other hand, network coding makes the transmissions of information flow on the path (provided by CDS) more efficient. Since the execution of network coding algorithm is independent with CDS-based broadcasting approach, we can get an extra network coding energy gain based on CDS-based broadcasting energy gain. To evaluate the performance of NCDS, we carried out a series of experiments in ns-2 and the results show that compared with Flooding, CDS-based broadcast, NCDS gains much higher energy gain by increasing the coding opportunities. ACKNOWLEDGMENT This work was supported in part through National Natural Science Foundation of China (No , No , No ), National Natural Science Foundation of China - Microsoft Research Asia (No ). REFERENCES [1] R. Ahlswede, N. Cai, S. Y. R. Li, and R. W. Yeung, Network information flow, IEEE Transactions on Information Theory, vol. 46, no. 4, pp , [2] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard and J. Crowcroft, XORs in the Air: Practical Wireless Network Coding, ACM SIGCOMM 2006, September [3] J. Liu, D. Goeckel, and D. Towsley, Bounds on the gain of network coding and broadcasting in wireless networks, in INFOCOM, [4] S. Ni, Y. Tseng, Y. Chen, and J. Sheu. The broadcast storm problem in a mobile ad hoc network, Proc. MOBICOM 99, pp , Aug [5] S. Sengupta, S. Rayanchu, and S. Banerjee, Network Coding-Aware Routing in Wireless Networks, IEEE/ACM Transactions on Networking, vol. 18, no. 4, pp , [6] H. Lim and C. Kim, Flooding in wireless ad hoc networks, Computer Communications Journal, [7] I. Stojmenovic, S. Seddigh, and J. Zunic, Dominating sets and neighbor elimination based broadcasting algorithms in wireless networks, IEEE Trans. Parallel and Distributed Systems, vol. 13, no. 1, Jan. 2002, [8] W. Lou and J.Wu, On reducing broadcast redundancy in ad hoc wireless networks, IEEE Transactions on Mobile Computing, [9] H. Jiang, W. Liu, D. Wang, T. Chen, X. Bai, X. Liu, Y. Wu, and W. Liu, CASE: Connectivity-Based Skeleton Extraction in Wireless Sensor Networks, Proc. IEEE INFOCOM, pp , Apr [10] T.W.Haynes et al., Funcamentals of Domination in Graphs, Marcel Dekker, Inc., A Sireis of Monographs and Text books, [11] C. Perkins, E. Belding-Royer, S. Das, and I. Chakeres, Ad-Hoc On- Demand Distance Vector Routing, in Proc. IEEE WMCSA 99, pp , [12] Network Simulator.

Network coding over connected dominating set: energy minimal broadcasting in wireless ad hoc networks

Network coding over connected dominating set: energy minimal broadcasting in wireless ad hoc networks DOI 10.1007/s11276-013-0648-z Network coding over connected dominating set: energy minimal broadcasting in wireless ad hoc networks Shuai Wang Chonggang Wang Kai eng Guang Tan Hongbo Jiang Yan Dong Ó Springer

More information

DCAR: Distributed Coding-Aware Routing in Wireless Networks

DCAR: Distributed Coding-Aware Routing in Wireless Networks : Distributed Coding-Aware Routing in Wireless Networks Jilin Le, John C.S. Lui Department of Computer Science and Engineering Chinese University of Hong Kong {jlle, cslui}@cse.cuhk.edu.hk Dah Ming Chiu

More information

Management Science Letters

Management Science Letters Management Science Letters 4 (2014) 2509 2516 Contents lists available at GrowingScience Management Science Letters homepage: www.growingscience.com/msl Delay-based network coding packet selection Rasoul

More information

XORs in the Air: Practical Wireless Network Coding

XORs in the Air: Practical Wireless Network Coding XORs in the Air: Practical Wireless Network Coding S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft MIT & University of Cambridge Can we use 3 transmissions to send traffic? 1 2 4 3 Can we

More information

On Reducing Broadcast Redundancy in Ad Hoc Wireless Networks

On Reducing Broadcast Redundancy in Ad Hoc Wireless Networks On Reducing Broadcast Redundancy in Ad Hoc Wireless Networks Wei Lou and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL Abstract Unlike in a wired network,

More information

Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding

Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding Khaldoun Al Agha LRI, Paris XI University, Orsay, France Email: alagha@lri.fr

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

Performance of New Broadcast Forwarding Criteria in MANET

Performance of New Broadcast Forwarding Criteria in MANET Performance of New Broadcast Forwarding Criteria in MANET Lijuan Zhu 1, Bu-Sung Lee 1, Boon-Chong Seet 2, Kai-Juan Wong 3, Genping Liu 1, Shell-Ying Huang 1, and Keok-Kee Lee 1 1 Centre for Multimedia

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 6 (Jul. - Aug. 2013), PP 01-09 A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile

More information

Queue Management for Network Coding in Ad Hoc Networks

Queue Management for Network Coding in Ad Hoc Networks 2012 Third International Conference on Intelligent Systems Modelling and Simulation Queue Management for Network Coding in Ad Hoc Networks S.E. Tan H.T. Yew M.S. Arifianto I. Saad K.T.K. Teo Modelling,

More information

AMoreEfficient COPE Architecture for Network Coding in Multihop Wireless Networks

AMoreEfficient COPE Architecture for Network Coding in Multihop Wireless Networks 766 IEICE TRANS. COMMUN., VOL.E92 B, NO.3 MARCH 2009 PAPER Special Section on Ad Hoc and Mesh Networking for Next Generation Access Systems AMoreEfficient COPE Architecture for Network Coding in Multihop

More information

CAR: Coding-Aware Opportunistic Routing in Wireless Mesh Networks

CAR: Coding-Aware Opportunistic Routing in Wireless Mesh Networks : Coding-Aware Opportunistic Routing in Wireless Mesh Networks Hongquan Liu and Yuantao Gu Received Jan., 3 Abstract An intermediate node in inter-flow network coding scheme, such as, needs to know exactly

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

Network Coding Via Opportunistic Forwarding in Wireless Mesh Networks

Network Coding Via Opportunistic Forwarding in Wireless Mesh Networks Network Coding Via Opportunistic Forwarding in Wireless Mesh Networks Jian Zhang ECE Department Rutgers University New Brunswick, U.S.A. jianz@caip.rutgers.edu Yuanzhu Peter Chen Department of Computer

More information

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS , pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,

More information

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks Yamin Li and Shietung Peng Department of Computer Science Hosei University Tokyo 18-858 Japan {yamin, speng}@k.hosei.ac.jp

More information

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network IEEE ICC 2016 - Wireless Communications Symposium Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network Stefan Achleitner, Thomas La Porta Computer Science and Engineering The Pennsylvania

More information

Ensuring Multi Messages Broadcasting in Mobile Ad Hoc Network using Network Coding Approach

Ensuring Multi Messages Broadcasting in Mobile Ad Hoc Network using Network Coding Approach Journal of Computer Science 8 (6): 920-929, 2012 ISSN 1549-3636 2012 Science Publications Ensuring Multi Messages Broadcasting in Mobile Ad Hoc Network using Network Coding Approach 1 Bavithiraja, S.V.M.G.

More information

An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks

An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks Xiuzhen Cheng, Min Ding Department of Computer Science The George Washington University Washington, DC 20052, USA {cheng,minding}@gwu.edu

More information

Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding

Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 0000; 00: 6 Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding Pouya Ostovari, Abdallah Khreishah,

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks Jing He, Shouling Ji, Mingyuan Yan, Yi Pan, and Yingshu Li Department of Computer Science Georgia State University,

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS

Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS Ms. Nutan Julka 1, Prof. Dr. J.W Bakal 2 1 Dept. of Computer Science, Pillais Institute of Information Technology,

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

NETWORK coding [1] [3] has attracted much interest in

NETWORK coding [1] [3] has attracted much interest in 1714 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 60, NO. 4, MAY 2011 Analysis of General Network Coding Conditions and Design of a Free-Ride-Oriented Routing Metric Bin Guo, Student Member, IEEE, Hongkun

More information

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts

More information

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343 Abstract

More information

Dropping The Transmission Rate Using Distributed Broadcasting Algorithm In Wireless Ad-hoc Network

Dropping The Transmission Rate Using Distributed Broadcasting Algorithm In Wireless Ad-hoc Network International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 3, Issue 10 (September 2012), PP. 108-113 Dropping The Transmission Rate Using Distributed

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks

An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang School of Electrical and Computer Engineering, Purdue University,

More information

MuCAR: A Greedy Multi-flow-based Coding-Aware Routing in Wireless Networks

MuCAR: A Greedy Multi-flow-based Coding-Aware Routing in Wireless Networks : A Greedy Multi-flow-based Coding-Aware Routing in Wireless Networks Jing Chen, Quan Yuan, Ruiying Du, and Jie Wu State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan,

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information

A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks

A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks Wei Lou and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343

More information

NECO: Network Coding Simulator

NECO: Network Coding Simulator NECO: Network Coding Simulator Diogo Ferreira 1, Luísa Lima 2, João Barros 1 1 Instituto de Telecomunicações Faculdade de Engenharia da Universidade do Porto 2 Instituto de Telecomunicações Faculdade de

More information

Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding

Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding Jörg Widmer, Christina Fragouli, and Jean-Yves Le oudec Ecole Polytechnique Fédérale de Lausanne (EPFL), CH-15

More information

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme Efficient Broadcast s To Reduce number of transmission Based on Probability Scheme S.Tharani, R.Santhosh Abstract Two main approaches to broadcast packets in wireless ad hoc networks are static and dynamic.

More information

Research on Transmission Based on Collaboration Coding in WSNs

Research on Transmission Based on Collaboration Coding in WSNs Research on Transmission Based on Collaboration Coding in WSNs LV Xiao-xing, ZHANG Bai-hai School of Automation Beijing Institute of Technology Beijing 8, China lvxx@mail.btvu.org Journal of Digital Information

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability

Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability Sivakumar.P, Sivaranjani.R, Srilakshmi.G, Subashini.R Abstract: Mobile ad hoc networks (MANET) have been proposed

More information

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based 1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

Cache Timeout Strategies for on-demand Routing in MANETs

Cache Timeout Strategies for on-demand Routing in MANETs 1 Cache Timeout Strategies for on-demand Routing in MANETs Sanlin Xu Kim Blackmore Haley Jones Department of Engineering, Australian National University, ACT 0200 {Sanlin.Xu, Kim.Blackmore, Haley.Jones}@anu.edu.au

More information

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Khaled M. Alzoubi Department of Computer Science Illinois Institute of Technology Chicago, IL 6066 alzoubi@cs.iit.edu Peng-Jun Wan Department

More information

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 191

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

REDUCING transmission redundancy is key to optimal

REDUCING transmission redundancy is key to optimal IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Coding Opportunity Aware Backbone Metrics for Broadcast in Wireless Networks Shuai Wang, Student Member, IEEE, Guang Tan, Member, IEEE, Yunhuai Liu,

More information

PRESENTED BY SARAH KWAN NETWORK CODING

PRESENTED BY SARAH KWAN NETWORK CODING PRESENTED BY SARAH KWAN NETWORK CODING NETWORK CODING PRESENTATION OUTLINE What is Network Coding? Motivation and Approach Network Coding with Lossless Networks Challenges in Developing Coding Algorithms

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

WITH the evolution and popularity of wireless devices,

WITH the evolution and popularity of wireless devices, Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication

More information

Network Coding Based Packets Queue Operation for Wireless Ad Hoc Networks

Network Coding Based Packets Queue Operation for Wireless Ad Hoc Networks Network Coding Based Packets Queue Operation for Wireless Ad Hoc Networks Shee Eng Tan, Zhan Wei Siew, Khairul Anuar Mohamad, Ismail Saad, Kenneth Tze Kin Teo Modelling, Simulation & Computing Laboratory,

More information

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu

More information

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm Journal of Computer Science 7 (1): 46-51, 2011 ISSN 1549-3636 2011 Science Publications Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

More information

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at Charlotte,

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks Bo Han and Weijia Jia Department of Computer Science, City University of Hong Kong 3 Tat Chee

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks AD: An Efficient Multihop roadcast Protocol ased on Asynchronous Duty-Cycling in Wireless Sensor Networks Yanjun Sun* Omer Gurewitz Shu Du Lei Tang* David. Johnson* *Rice University en Gurion University

More information

Energy Efficient Routing of Wireless Sensor Networks Using Virtual Backbone and life time Maximization of Nodes

Energy Efficient Routing of Wireless Sensor Networks Using Virtual Backbone and life time Maximization of Nodes Energy Efficient Routing of Wireless Sensor Networks Using Virtual Backbone and life time Maximization of Nodes Umesh B.N 1, Dr G Vasanth 2 and Dr Siddaraju 3 1 Research Scholar, 2 Professor & Head, Dept

More information

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse

More information

PiggyCode: a MAC layer network coding scheme to improve TCP performance over wireless networks

PiggyCode: a MAC layer network coding scheme to improve TCP performance over wireless networks PiggyCode: a MAC layer network coding scheme to improve TCP performance over wireless networks Luca Scalia, Fabio Soldo, Mario Gerla Dipartimento di Ingegneria Elettrica, Elettronica e delle Telecomunicazioni,

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Reliable video-streaming delivery in wireless access networks using Network Coding

Reliable video-streaming delivery in wireless access networks using Network Coding Reliable video-streaming delivery in wireless access networks using Network Coding MELISA JUNUZOVIĆ, KEMAL ALIČ, ALEŠ ŠVIGELJ Department of Communication Systems, Jozef Stefan Institute Jozef Stefan International

More information

Available online at ScienceDirect. Procedia Computer Science 46 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 46 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 1209 1215 International Conference on Information and Communication Technologies (ICICT 2014) Improving the

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai Department of Electrical and Computer Engineering North Dakota State University Fargo, ND 5805 Email: fdai@ece.ndsu.edu

More information

Joint Routing, Scheduling, and Network Coding for Wireless Multihop Networks

Joint Routing, Scheduling, and Network Coding for Wireless Multihop Networks 211 International Symposium of Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks Joint Routing, Scheduling, and Network Coding for Wireless Multihop Networks Samat Shabdanov, Catherine

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks

Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks Peng-Jun Wan Khaled M. Alzoubi Ophir Frieder Abstract Connected dominating set (CDS) has been proposed as virtual backbone

More information

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks A Simple Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks Chun-Su Park, You-Sun Kim, Kwang-Wook Lee, Seung-Kyun Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea

More information

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding v.vallinayagi research scholar, manonmanium university tirunelveli-11 Dr.G.M.Nasira Assistant professor dept of computer

More information

Performance of DSDV Protocol over Sensor Networks

Performance of DSDV Protocol over Sensor Networks Performance of DSDV Protocol over Sensor Networks Khushboo Tripathi, Tulika Agarwal and S. D. Dixit Department of Electronics and Communications University of Allahabad, Allahabad-211002, India Khushboo83@live.com

More information

Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast

Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast 2005 Conference on Information Sciences and Systems, The Johns Hopkins University, March 16 18, 2005 Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast Yunnan Wu

More information

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Vijay J Parmar Department of Computer Engineering,Sarvajanic College of Engineering and Technology Surat, Gujrat (India),E-mail

More information

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET 1 Prashant Dixit* Department of CSE FET, Manavrachna international institute of research

More information

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Competent Broadcasting in MANET

Competent Broadcasting in MANET Competent Broadcasting in MANET 1 Ms. K. Vijayalakshmi, 2 Mrs.S.Jeyanthi 1 M.E., Lecturer, CSE Dept., PSNA College of Engg. And Tech., Dindigul, Tamilnadu,India. 2 M.E., Lecturer, CSE Dept., PSNA College

More information

WIRELESS networks suffer from low throughput and

WIRELESS networks suffer from low throughput and IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 3, JUNE 2008 497 XORs in the Air: Practical Wireless Network Coding Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Médard, Senior Member,

More information

ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK

ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK Yousif Ali Saadi, Rosilah Hassan and Dahlila Putri Dahnil Network Communication Lab Research, Centre for Software Technology and Management

More information

Effects of MAC Approaches on Non-Monotonic Saturation with COPE - A Simple Case Study

Effects of MAC Approaches on Non-Monotonic Saturation with COPE - A Simple Case Study Effects of MAC Approaches on Non-Monotonic Saturation with COPE - A Simple Case Study Jason Cloud*, Linda Zeger, Muriel Médard* *Research Laboratory of Electronics, Massachusetts Institute of Technology,

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

An Iterative Greedy Approach Using Geographical Destination Routing In WSN

An Iterative Greedy Approach Using Geographical Destination Routing In WSN ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy

More information

Practical Network Coding in Sensor Networks: Quo Vadis?

Practical Network Coding in Sensor Networks: Quo Vadis? Practical Network Coding in Sensor Networks: Quo Vadis? Thiemo Voigt 1, Utz Roedig 2, Olaf Landsiedel 3,4, Kasun Samarasinghe 1, Mahesh Bogadi Shankar Prasad 1 1 Swedish Institute of Computer Science (SICS),

More information