Energy Efficient Broadcasting Using Network Coding Aware Protocol in Wireless Ad hoc Network
|
|
- Victor Dixon
- 5 years ago
- Views:
Transcription
1 Energy Efficient Broadcasting Using Network Coding Aware Protocol in Wireless Ad hoc Network 1 Shuai Wang 2 Athanasios Vasilakos 1 Hongbo Jiang 1 Xiaoqiang Ma 1 Wenyu Liu 1 Kai Peng 1 Bo Liu 1 Yan Dong 1 Huazhong University of Science and Technology, Wuhan , China 2 University of Western Macedonia, Greece {wangshuai87410, hongbojiang2004, mxqhust}@gmail.com, vasilako@ath.forthnet.gr, {liuwy, pkhust, liubo, dongyan}@hust.edu.cn Abstract Energy efficient broadcasting is of paramount importance for many broadcast applications in wireless ad hoc networks. With respects network coding, it has been proved that the energy gain is upper bounded by 3. However, the coding opportunity is often highly dependent on the established routing paths, resulting in that a lot of coding opportunities could be lost in practice. By combining network coding with the Connected Dominating Set (CDS)-based broadcasting, we take full use of network coding. The intuition behind our algorithm is to intersect information flows at nodes in CDS to increase the coding opportunities. We design a scheme, named NCDS, that uses Network Coding over Connected Dominating Set, to reduce energy consumption. Our experimental results show that NCDS provides up to 161% gains compared to blind flooding, and 37% gains compared to CDSbased broadcasting without network coding. I. INTRODUCTION Wireless ad hoc networks have been widely deployed as a means of data communication because of their flexible structures. Usually, they are utilized in dangerous scenarios like battle fields where it is costly or infeasible to replace the batteries of nodes. Meanwhile, wireless devices in wireless ad hoc networks have become smaller than ever before, which limits the size of nodes batteries. Therefore, energy efficiency has become a crucial factor in wireless ad hoc networks. Broadcasting is one of the most frequent events in wireless ad hoc networks for the dissemination of data and control messages in many applications. There has been an increasing focus on designing energy efficient broadcast algorithm to prolong the life span of wireless ad hoc networks [6], [7], [8]. Network coding, originally proposed by R. Ahlswede et al. in [1], is a great breakthrough in the area of information theory, and increasingly popular as a mechanism to increase the utilization of both wired and wireless networks. In wireless networks, COPE [2], one of the most practical network coding scheme, is first proposed by S. Katti et al. It exploits the physical-layer broadcast property of wireless channels and finds coding opportunities. By doing so, multiple packets can be coded together and then forwarded within a single transmission. As a result, it decreases the number of transmissions of wireless ad hoc networks. By assuming that each transmission carries the same size packet and the energy consumption is proportional to the number of transmissions, Liu et al. [3] proved that the energy gain is upper bounded by 3. N 1 P1 N 3 (a) P1 N 1 N 3 N 1 N N 1 3 N3 P1 N 5 N 5 N 6 N 6 (c) Fig. 1. (a) Chain Topology, (b) cannot form Chain Topology, (c) X Topology, and (d) cannot form X Topology The idea how network coding can decrease transmission times is illustrated in Figure 1. Figure 1(a) shows a basic coding topology, called Chain Topology [2]. Suppose that node N 1 has a packet for node N 3, and node N 3 has a packet for node N 1. Both of the two packets must be relayed by node. Without network coding, four transmissions are needed to achieve the message exchange. With network coding, however, three transmissions are sufficient to do this. After N 1 transmits and N 3 transmits, the intermediate node broadcasts a packet obtained by XOR-ing and. Then, node N 1 can decode packet by performing an XOR of packets and the XOR-ed packet it receives. Node N 3 can obtain packet using the same decoding mechanism. Here, no opportunistic listening [2] is required. Another typical coding scenario is called X topology [2], as shown in Figure 1(c). Node N 5, are within the transmission ranges of N 1, respectively. By opportunistic listening, node can overhear the transmission of ; node N 5 can overhear the transmission of. When receiving the XOR-ed packet P2, can decode packet by performing (P1 P2 ) and so does N 5. It only requires three transmissions compared with that of four transmissions without network coding. One problem here is that the coding opportunity is highly dependent on the established routes paths [5]. In practice, it is more severe when the established routes may not form the available coding topology including Chain Topology and X Topology (see Figure 1(b) and Figure 1(d)). In these cases, many coding opportunities are lost. In this paper, we strive to achieve the energy gain by network coding and provide an energy efficient broadcasting (b) (d)
2 in wireless ad hoc networks. We design a scheme, named NCDS, which uses network coding over connected dominating set, to reduce energy consumption. We consider CDS due to two reasons. On one hand, CDS is constructed for efficient broadcasting to avoid the broadcast storm problem [4] caused by simple blind flooding. With CDS-based broadcasting, only the nodes in CDS forward data to the entire network which decrease the transmissions for broadcasting dramatically. On the other hand, the infrastructure formed by CDS provides a common path for information flows and improves the opportunities of intersections of information flows suitably. This significantly increase the coding opportunities. We implement our algorithm with NS-2 and our experimental results show that NCDS provides up to 161% gains compared to blind flooding and 37% gains compared to CDS-based broadcasting. The rest of our paper is organized as follows. In Section II, we present the background on CDS-based broadcasting and our motivation for a network coding based protocol for broadcasting. Our scheme NCDS is presented in Section III. In Section IV, Experiment results and discussion are presented. Finally, Section V concludes the paper. II. BACKGROUND AND MOTIVATION In this section, we first describe the key idea of CDSbased broadcasting algorithm and the energy gain brought by CDS-based broadcasting compared with blind flooding. Then, we introduce the most practical network coding scheme - COPE and its coding opportunity lost problem. We highlight, through an example, the coding opportunity that can be increased greatly by applying network coding, to the CDS-based broadcasting. Very interestingly, CDS solves the coding opportunity lost problem by improving more coding opportunities because more information flows are intersected at nodes in CDS. Meanwhile, network coding makes the CDSbased broadcasting more efficient. It adds an extra network coding energy gain to the energy gain brought by CDS-based broadcasting compared with blind flooding. A. CDS-based Broadcasting For broadcasting, Minimum Connected Dominating Set (MCDS) [10] is considered to minimize broadcast transmissions. Let us consider a 16 node network shown in Figure 2. The minimum connected dominating set is {J, K, I, F, C}. Assume that node J is the broadcast source node. When node J transmits a packet, the packet reaches all neighbor nodes, O, M, H, D, E and K. Note that this transmission requires only one packet transmission. Node K, which belongs to MCDS, re-broadcasts the received packet to its neighbor nodes. This packet reaches nodes I and N. Node I re-broadcasts the packet since I is in MCDS. Then, node F forwards the packet and this packet reaches node P, I and C. Nodes P and I ignore the packet as they have already received the same packet from nodes I and K respectively. Finally, node C transmits the packet to its neighbors with one packet transmission. Because node J, K, I, F and C broadcast the packet to complete the broadcast task, the cost of MCDS-based broadcasting is only five transmissions. Finding a minimum connected dominating set (MCDS) in a network is an NP-complete problem. Some CDS approximation broadcast algorithms [6], [7], [8] are proposed. The key idea of these algorithms is similar as the example mentioned above - using only dominating nodes to forward the broadcast packet. Nodes that are not dominating nodes only receive the broadcast packet without forwarding it. Therefore, the number of redundant transmissions is reduced. H M D J O Fig. 2. E K P F A N I C G 16-node random topology B. Network Coding and Coding Opportunity Lost Problem While considering network coding algorithm, we should make sure that all next-hop nodes can decode their corresponding original packets. Consider k packets p 1, p 2,..., p k at a node that have distinct next-hop nodes n 1, n 2,..., n k respectively. This node can XOR the k packets together to form the coded packet p = (p 1,p 2,...,p k ) only if the nexthop node n i for each packet p i already has all k 1 packets p j for j i. Usually, we judge whether node n i owns all other packets by using these two rules: (1) Node n i is the previous-hop node of packet p j,or (2) Node n i overheard packet p j (opportunistic listening). However, network coding opportunity may not always occur. In the existing designed routing, it is possible that two flows which meet the coding rules don t intersect with each other, see Figure 1(b) and Figure 1(d). Our study is motivated by the observation of CDS-based broadcasting energy gain. Meanwhile, the backbone constructed by CDS provides a common path for information flows. Since many information flows of opposite direction often intersect at such backbone nodes, the coding opportunities will increase dramatically. As shown in Figure 2, we illustrate how network coding improves the CDS-based broadcasting. In this example, there are two broadcast sources, B and D. We construct a wireless backbone where the nodes J, K, I, F, C are selected as CDS, the paths of information flow for broadcasting are D J K I F C and B C F I K J. The CDS-based broadcast flows overlap at the common L B
3 nodes J, K, I, F and C, and then network coding can occur at these nodes. If the source nodes D (or E, H, M, O) and B (or A) keep broadcasting packets utilizing CDS-based broadcasting, network coding can be done continuously at the common nodes J, K, I, F and C. Note that the coding opportunity is increased dramatically at this condition and the benefits of network coding are fully exploited. Meanwhile, network coding makes the routing path constructed by CDS high efficient. Since the execution of network coding algorithm is independent of CDS-based broadcasting approach, we can get an extra network coding energy gain based on CDS-based broadcasting energy gain. Note that network coding can occur very often in broadcast session, especially in multiple source/multiple message broadcast application. Due to packets of any broadcast session will continuously pass through the backbone constructed by CDS, network coding can be done frequently at these nodes. C. Inner infrastructure network coding energy gain independent of MAC layer, we adopt an underneath MAC protocol through our algorithm. A. An Approximation algorithm to Minimum Connected Dominating Set Construction It is a well-known NP-complete problem to find a Minimum Connected Dominating Set. Thus, we utilize an approximation algorithm to determine the forward nodes for broadcasting. In earlier work [9], we proposed a backbone extraction scheme for large scale wireless network. Here, we construct the backbone of wireless ad hoc network by utilizing an Approximation algorithm to Minimum Connected Dominating Set (A-MCDS) - the nodes which have the maximum degree are chose as the dominating set. The description of our algorithm: Initially, all nodes are in state WAIT and their states will change to DOMINATEE, DOMINATOR, CONNECTOR when they receive the related message. See Figure 4. DOMINATOR P 3 A P 3 P 4 C P 4 B WAIT ACTIVE CONNECTOR DOMINATEE P 3 P 4 P 3 P 4 F G Fig. 4. Transformation diagram of node state Fig. 3. Inner Infrastructure Network Coding Energy Gain We can also get an inner infrastructure network coding energy gain for CDS-based broadcasting. Let us consider the example shown in Figure 3. It is a part of the 16-node network topology in Figure 2 - the dominator C and its dominatees A, B, F and G. In this example, dominator C broadcasts four packets to its four dominatees A, B, F and G. Assume that some of these packets have been received by its dominatees as shown in Figure 3 - i.e., dominatee A receives p 1, p 2 and p 3, dominatee B receives p 1, p 2 and p 4, dominatee F receives p 1, p 3 and p 4, and dominatee G receives p 2, p 3 and p 4. Note that each of the four packets is lost by some dominatee. Without network coding, the dominator has to transmit all the four lost packets. However, with network coding, it is sufficient to transmit one XORed packets. The dominator only needs to send p 1 p 2 p 3 p 4. Despite the fact that they lost different packets, all four dominatees can retrieve the four packets they needed by XORing the coded packet with the packets they have received. III. NCDS SCHEME DESCRIPTION In this section, we introduce our NCDS scheme, which consists of two phases. The first is to construct a Minimum Connected Dominating Set (MCDS) for broadcasting. As the construction of MCDS is NP-complete, an approximation algorithm to MCDS is given. The second is applying network coding to CDS-based broadcasting. Noting that NCDS is Step1: Learn one-hop neighbor information At first, each node in the network sends the HELLO message to its neighbors. Compared with the HELLO message in AODV [11], we add the degree information of the node. After collecting the messages from its neighbors, every node creates its neighbor list, containing the degree information of its neighbors. Step2: Find the DOMINATOR All nodes at this step are set in state WAIT initially. Select one node randomly and mark the node as DOMINATOR. This node sends DOMINATOR MESSAGE to its neighbor and its neighbors change their states to state DOMINATEE. Each node in state DOMINATEE sends DOMINATEE MESSAGE to its neighbors. If its neighbors are in state WAIT, then this node is marked state ACTIVE. Our algorithm then changes the node in state ACTIVE, whichever has the maximum degree, to state DOMINATOR, with their neighbors (in state WAIT) marked state DOMINATEE. Step3: Find the CONNECTOR We select the node in state DOMINATEE, in which neighbors have the maximum number of DOMINATOR, as the CONNECTOR. To make CDS more efficient for transmission, we add CONNECTOR for every two hop distance DOMINATOR after the former process. After all of the nodes are marked state DOMINATOR, DOMINATEE or CONNECTOR, the algorithm terminates. All the nodes in DOMINATOR or CONNECTOR form a connected dominating set.
4 Lemma 1: The resulting graph of DOMINATOR and CONNECTOR from A-MCDS algorithm is a CDS. (Proof is omitted) Lemma 2: The time complexity of A-MCDS algorithm is O(n), and the message complexity is also O(n), where n is the number of nodes. (Proof is omitted) B. Applying Network Coding to CDS-based Broadcasting In this section, we describe how to use network coding in CDS-based broadcast. Similar to COPE [2], our scheme inserts a coding layer between the IP and MAC layers which detects coding opportunities and performs encoding/decoding. Coding opportunity is often illustrated with several typical network topologies, such as the chain topology and X topology. The authors of COPE also provided the cross topology and wheel topology, where higher coding gains can be achieved. The later two scenarios do not occur as often as the the first two. With opportunistic listening or not, all these coding scenarios can be divided into two categories. Here, we mainly consider our NCDS scheme with opportunistic listening. When opportunistic listening is used, nodes in the network can overhear many packets and thus coding opportunity is improved. The corresponding packet processing algorithm is shown in Algorithm 1. Based on the neighborhood information, node u checks whether all its neighbors N(u) have already received the packet (line 1). If so, it does not forward the packet (line 2). Otherwise, node u checks whether packet p is a native one. In our algorithm, only the nodes in CDS forward packets or take the encoding procedure (line 5). For each node in CDS, it tries to see whether it can get any coding opportunities to encode the packet with the remaining packets in the output queue that it needs to forward (line 8). If yes, it will encode these packets together and send the coded packet in one transmission (line 10). If not, the node will buffer the packet for a time period T threshold (lines 12-13) and process it later. Note that it may create more coding opportunities. If the buffer time for packet p exceeds T threshold, node u sends the packet immediately (lines 15-16). Finally, if the received packet p is a coded one, we decode it before processing the packet (lines 21-22). When a forwarder (nodes in CDS) sends a coded packet to its neighbors, we should make sure that all its neighbors have overheard enough packets to decode the coded packet. We specify the Broadcast Coding Rule as follows: Definition 1: (Broadcast Coding Rule) Consider node u s neighbor N(u) and an encoded packet p = (p 1,p 2,...,p K ). All the neighbors have overheard K 1 packets among p i, i =1, 2,...,K; and thus they can decode the coded packet p. We desire to encode as many packets as possible. For simplicity, we use a greedy encoding algorithm shown in Algorithm 2: whenever having an opportunity to transmit, the node picks the first packet p in the output queue, checks whether the remaining packet q satisfies the broadcast coding Algorithm 1 ProcessPkt(p) 1: if All N(u) RecvP kt(p) then 2: return; 3: end if 4: if NativePkt(p) then 5: if {u} V CDS == then 6: return; 7: else 8: K = EncodeP kt(); 9: if K! =1then 10: SendCodedP kt(); 11: else 12: while BufferTime(p) <T threshold do 13: BufferPkt(p, T threshold ); 14: end while 15: if BufferTime(p) T threshold then 16: SendN ativep kt(p); 17: end if 18: end if 19: end if 20: else 21: for all q = DecodeP kt(p) do 22: P rocessp kt(q) 23: end for 24: end if rule and encodes as many packets as possible with the packet p (line 3-7). Normally the number of packets that can be encoded into a single packet is small (bounded by the node degree), the computational overhead is insignificant. Algorithm 2 EncodePkt() 1: Pick packet p at the head of the output queue 2: K =1 3: for all remaining packets q in the output queue do 4: if q satisf ies the Broadcast Coding Rule then 5: p = p q 6: K = K +1 7: continue 8: end if 9: end for 10: return (p, K) IV. PERFORMANCE EVALUATION In this section, we present the performance evaluation results from extensive simulation in ns-2.30 [12]. In our simulation experiment, we compare our NCDS scheme with (1) Blind Flooding; (2) the broadcast algorithm with network coding but not CDS ( NC + NON-CDS for short); (3) CDSbased Broadcasting. The network area is set to m 2 with nodes increasing from 50 to 100. Each node in the network has a constant transmission range of 300 m. The radio propagation model is the two-ray ground reflection
5 model and the radio model assumes a nominal bit rate of 2Mb/sec. The MAC layer scheme follows the IEEE MAC specification. The application traffic is CBR and all the application packets are of 256 bytes each. The broadcast sources are chosen randomly and we set a total of 20 broadcast sessions. The packet sending rate is 2 packets/sec. Two metrics are used: (1) energy gain, defined as the ratio of the total number of transmissions of blind flooding to the number of transmissions used by a considered broadcast scheme, and (2) number of coding operations, defined as the number of times that network coding occurs during the simulation. It is used to evaluate the increase of coding opportunities. The experiment results are the mean value of 10 rounds over different random topologies. Energy Gain Blind Flooding NC + NON CDS CDS based Broadcasting NCDS Number of nodes Fig. 5. Energy gain Consider the energy gain of the algorithms, as shown in Figure 5. As expected, NCDS outperforms the other three algorithms. Without considering coding opportunity lost problem, the energy gain of NC + NON-CDS algorithm is only 1.07, from which we can get that the benefits of network coding cannot be fully exploited as the theoretical analysis shows if we don t consider the coding opportunity lost problem. The energy gain for our NCDS algorithm can be as high as 2.61, which means blind flooding algorithm sends 161% more packets than NCDS. The energy gain of NCDS is composed by two parts - the CDS-based broadcasting energy gain which is about 1.91 and the energy gain brought by network coding which is about Number of Coding Operations NC + NON CDS NCDS Number of nodes Fig. 6. Number of coding operations We show that NCDS does provide more coding opportunities than using network coding on a plain network. Figure 6 shows the number of coding operations of the network coding without CDS scheme, labeled NC + NON-CDS in comparison with NCDS. On average, NCDS increases coding opportunities by about 106%, contributing to a greatly improved energy gain. V. CONCLUSION In this paper, we propose NCDS scheme with the goal of improving the energy gain for wireless ad hoc networks. To do so, our main idea is to apply network coding on CDSbased broadcasting. On one hand, CDS-based broadcasting is an energy efficient scheme itself and CDS can provide a common path for information flows which greatly increase the coding opportunity. On the other hand, network coding makes the transmissions of information flow on the path (provided by CDS) more efficient. Since the execution of network coding algorithm is independent with CDS-based broadcasting approach, we can get an extra network coding energy gain based on CDS-based broadcasting energy gain. To evaluate the performance of NCDS, we carried out a series of experiments in ns-2 and the results show that compared with Flooding, CDS-based broadcast, NCDS gains much higher energy gain by increasing the coding opportunities. ACKNOWLEDGMENT This work was supported in part through National Natural Science Foundation of China (No , No , No ), National Natural Science Foundation of China - Microsoft Research Asia (No ). REFERENCES [1] R. Ahlswede, N. Cai, S. Y. R. Li, and R. W. Yeung, Network information flow, IEEE Transactions on Information Theory, vol. 46, no. 4, pp , [2] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard and J. Crowcroft, XORs in the Air: Practical Wireless Network Coding, ACM SIGCOMM 2006, September [3] J. Liu, D. Goeckel, and D. Towsley, Bounds on the gain of network coding and broadcasting in wireless networks, in INFOCOM, [4] S. Ni, Y. Tseng, Y. Chen, and J. Sheu. The broadcast storm problem in a mobile ad hoc network, Proc. MOBICOM 99, pp , Aug [5] S. Sengupta, S. Rayanchu, and S. Banerjee, Network Coding-Aware Routing in Wireless Networks, IEEE/ACM Transactions on Networking, vol. 18, no. 4, pp , [6] H. Lim and C. Kim, Flooding in wireless ad hoc networks, Computer Communications Journal, [7] I. Stojmenovic, S. Seddigh, and J. Zunic, Dominating sets and neighbor elimination based broadcasting algorithms in wireless networks, IEEE Trans. Parallel and Distributed Systems, vol. 13, no. 1, Jan. 2002, [8] W. Lou and J.Wu, On reducing broadcast redundancy in ad hoc wireless networks, IEEE Transactions on Mobile Computing, [9] H. Jiang, W. Liu, D. Wang, T. Chen, X. Bai, X. Liu, Y. Wu, and W. Liu, CASE: Connectivity-Based Skeleton Extraction in Wireless Sensor Networks, Proc. IEEE INFOCOM, pp , Apr [10] T.W.Haynes et al., Funcamentals of Domination in Graphs, Marcel Dekker, Inc., A Sireis of Monographs and Text books, [11] C. Perkins, E. Belding-Royer, S. Das, and I. Chakeres, Ad-Hoc On- Demand Distance Vector Routing, in Proc. IEEE WMCSA 99, pp , [12] Network Simulator.
Network coding over connected dominating set: energy minimal broadcasting in wireless ad hoc networks
DOI 10.1007/s11276-013-0648-z Network coding over connected dominating set: energy minimal broadcasting in wireless ad hoc networks Shuai Wang Chonggang Wang Kai eng Guang Tan Hongbo Jiang Yan Dong Ó Springer
More informationDCAR: Distributed Coding-Aware Routing in Wireless Networks
: Distributed Coding-Aware Routing in Wireless Networks Jilin Le, John C.S. Lui Department of Computer Science and Engineering Chinese University of Hong Kong {jlle, cslui}@cse.cuhk.edu.hk Dah Ming Chiu
More informationManagement Science Letters
Management Science Letters 4 (2014) 2509 2516 Contents lists available at GrowingScience Management Science Letters homepage: www.growingscience.com/msl Delay-based network coding packet selection Rasoul
More informationXORs in the Air: Practical Wireless Network Coding
XORs in the Air: Practical Wireless Network Coding S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft MIT & University of Cambridge Can we use 3 transmissions to send traffic? 1 2 4 3 Can we
More informationOn Reducing Broadcast Redundancy in Ad Hoc Wireless Networks
On Reducing Broadcast Redundancy in Ad Hoc Wireless Networks Wei Lou and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL Abstract Unlike in a wired network,
More informationFountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding
Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding Khaldoun Al Agha LRI, Paris XI University, Orsay, France Email: alagha@lri.fr
More informationVolume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient
More informationPerformance of New Broadcast Forwarding Criteria in MANET
Performance of New Broadcast Forwarding Criteria in MANET Lijuan Zhu 1, Bu-Sung Lee 1, Boon-Chong Seet 2, Kai-Juan Wong 3, Genping Liu 1, Shell-Ying Huang 1, and Keok-Kee Lee 1 1 Centre for Multimedia
More informationUsing Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions
Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College
More informationImpact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationA Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 6 (Jul. - Aug. 2013), PP 01-09 A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile
More informationQueue Management for Network Coding in Ad Hoc Networks
2012 Third International Conference on Intelligent Systems Modelling and Simulation Queue Management for Network Coding in Ad Hoc Networks S.E. Tan H.T. Yew M.S. Arifianto I. Saad K.T.K. Teo Modelling,
More informationAMoreEfficient COPE Architecture for Network Coding in Multihop Wireless Networks
766 IEICE TRANS. COMMUN., VOL.E92 B, NO.3 MARCH 2009 PAPER Special Section on Ad Hoc and Mesh Networking for Next Generation Access Systems AMoreEfficient COPE Architecture for Network Coding in Multihop
More informationCAR: Coding-Aware Opportunistic Routing in Wireless Mesh Networks
: Coding-Aware Opportunistic Routing in Wireless Mesh Networks Hongquan Liu and Yuantao Gu Received Jan., 3 Abstract An intermediate node in inter-flow network coding scheme, such as, needs to know exactly
More informationCS 268: Computer Networking. Taking Advantage of Broadcast
CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic
More informationNetwork Coding Via Opportunistic Forwarding in Wireless Mesh Networks
Network Coding Via Opportunistic Forwarding in Wireless Mesh Networks Jian Zhang ECE Department Rutgers University New Brunswick, U.S.A. jianz@caip.rutgers.edu Yuanzhu Peter Chen Department of Computer
More informationProbabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS
, pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,
More informationA Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks
A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks Yamin Li and Shietung Peng Department of Computer Science Hosei University Tokyo 18-858 Japan {yamin, speng}@k.hosei.ac.jp
More informationNetwork Coding Efficiency In The Presence Of An Intermittent Backhaul Network
IEEE ICC 2016 - Wireless Communications Symposium Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network Stefan Achleitner, Thomas La Porta Computer Science and Engineering The Pennsylvania
More informationEnsuring Multi Messages Broadcasting in Mobile Ad Hoc Network using Network Coding Approach
Journal of Computer Science 8 (6): 920-929, 2012 ISSN 1549-3636 2012 Science Publications Ensuring Multi Messages Broadcasting in Mobile Ad Hoc Network using Network Coding Approach 1 Bavithiraja, S.V.M.G.
More informationAn Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks
An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks Xiuzhen Cheng, Min Ding Department of Computer Science The George Washington University Washington, DC 20052, USA {cheng,minding}@gwu.edu
More informationBroadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 0000; 00: 6 Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding Pouya Ostovari, Abdallah Khreishah,
More informationCE693: Adv. Computer Networking
CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are
More information1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol
1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks
More informationGenetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks
Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks Jing He, Shouling Ji, Mingyuan Yan, Yi Pan, and Yingshu Li Department of Computer Science Georgia State University,
More informationA Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET
A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute
More informationConstructing Connected Dominating Sets with Bounded Diameters in Wireless Networks
Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng
More informationModified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS
Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS Ms. Nutan Julka 1, Prof. Dr. J.W Bakal 2 1 Dept. of Computer Science, Pillais Institute of Information Technology,
More informationA Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks
A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,
More informationLow Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks
Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and
More informationNETWORK coding [1] [3] has attracted much interest in
1714 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 60, NO. 4, MAY 2011 Analysis of General Network Coding Conditions and Design of a Free-Ride-Oriented Routing Metric Bin Guo, Student Member, IEEE, Hongkun
More informationA SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More informationDISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK
DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:
More informationA Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang
A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts
More informationEfficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas
Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343 Abstract
More informationDropping The Transmission Rate Using Distributed Broadcasting Algorithm In Wireless Ad-hoc Network
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 3, Issue 10 (September 2012), PP. 108-113 Dropping The Transmission Rate Using Distributed
More informationGATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani
GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationAn Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks
An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang School of Electrical and Computer Engineering, Purdue University,
More informationMuCAR: A Greedy Multi-flow-based Coding-Aware Routing in Wireless Networks
: A Greedy Multi-flow-based Coding-Aware Routing in Wireless Networks Jing Chen, Quan Yuan, Ruiying Du, and Jie Wu State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan,
More informationEstimate the Routing Protocols for Internet of Things
Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of
More informationA Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks
A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks Wei Lou and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343
More informationNECO: Network Coding Simulator
NECO: Network Coding Simulator Diogo Ferreira 1, Luísa Lima 2, João Barros 1 1 Instituto de Telecomunicações Faculdade de Engenharia da Universidade do Porto 2 Instituto de Telecomunicações Faculdade de
More informationLow-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding
Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding Jörg Widmer, Christina Fragouli, and Jean-Yves Le oudec Ecole Polytechnique Fédérale de Lausanne (EPFL), CH-15
More informationEfficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme
Efficient Broadcast s To Reduce number of transmission Based on Probability Scheme S.Tharani, R.Santhosh Abstract Two main approaches to broadcast packets in wireless ad hoc networks are static and dynamic.
More informationResearch on Transmission Based on Collaboration Coding in WSNs
Research on Transmission Based on Collaboration Coding in WSNs LV Xiao-xing, ZHANG Bai-hai School of Automation Beijing Institute of Technology Beijing 8, China lvxx@mail.btvu.org Journal of Digital Information
More informationThe Impact of Clustering on the Average Path Length in Wireless Sensor Networks
The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia
More informationReducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability
Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability Sivakumar.P, Sivaranjani.R, Srilakshmi.G, Subashini.R Abstract: Mobile ad hoc networks (MANET) have been proposed
More information1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based
1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,
More informationPerformance of Ad-Hoc Network Routing Protocols in Different Network Sizes
Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co
More informationCache Timeout Strategies for on-demand Routing in MANETs
1 Cache Timeout Strategies for on-demand Routing in MANETs Sanlin Xu Kim Blackmore Haley Jones Department of Engineering, Australian National University, ACT 0200 {Sanlin.Xu, Kim.Blackmore, Haley.Jones}@anu.edu.au
More informationMessage-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Khaled M. Alzoubi Department of Computer Science Illinois Institute of Technology Chicago, IL 6066 alzoubi@cs.iit.edu Peng-Jun Wan Department
More informationThroughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks
Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 191
More informationDYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET
DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,
More informationREDUCING transmission redundancy is key to optimal
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Coding Opportunity Aware Backbone Metrics for Broadcast in Wireless Networks Shuai Wang, Student Member, IEEE, Guang Tan, Member, IEEE, Yunhuai Liu,
More informationPRESENTED BY SARAH KWAN NETWORK CODING
PRESENTED BY SARAH KWAN NETWORK CODING NETWORK CODING PRESENTATION OUTLINE What is Network Coding? Motivation and Approach Network Coding with Lossless Networks Challenges in Developing Coding Algorithms
More informationLiterature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review
More informationWITH the evolution and popularity of wireless devices,
Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication
More informationNetwork Coding Based Packets Queue Operation for Wireless Ad Hoc Networks
Network Coding Based Packets Queue Operation for Wireless Ad Hoc Networks Shee Eng Tan, Zhan Wei Siew, Khairul Anuar Mohamad, Ismail Saad, Kenneth Tze Kin Teo Modelling, Simulation & Computing Laboratory,
More informationShortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks
Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless
More informationBehaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model
Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,
More informationA Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET
A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant
More informationGateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario
Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,
More informationEnhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1
Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu
More informationReliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm
Journal of Computer Science 7 (1): 46-51, 2011 ISSN 1549-3636 2011 Science Publications Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm
More informationMultiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks
Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at Charlotte,
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationDesign and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks
Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks Bo Han and Weijia Jia Department of Computer Science, City University of Hong Kong 3 Tat Chee
More informationUAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks
UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,
More informationA Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver
1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More informationADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks
AD: An Efficient Multihop roadcast Protocol ased on Asynchronous Duty-Cycling in Wireless Sensor Networks Yanjun Sun* Omer Gurewitz Shu Du Lei Tang* David. Johnson* *Rice University en Gurion University
More informationEnergy Efficient Routing of Wireless Sensor Networks Using Virtual Backbone and life time Maximization of Nodes
Energy Efficient Routing of Wireless Sensor Networks Using Virtual Backbone and life time Maximization of Nodes Umesh B.N 1, Dr G Vasanth 2 and Dr Siddaraju 3 1 Research Scholar, 2 Professor & Head, Dept
More informationPerformance Comparison of MANETs Routing Protocols for Dense and Sparse Topology
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse
More informationPiggyCode: a MAC layer network coding scheme to improve TCP performance over wireless networks
PiggyCode: a MAC layer network coding scheme to improve TCP performance over wireless networks Luca Scalia, Fabio Soldo, Mario Gerla Dipartimento di Ingegneria Elettrica, Elettronica e delle Telecomunicazioni,
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationReliable video-streaming delivery in wireless access networks using Network Coding
Reliable video-streaming delivery in wireless access networks using Network Coding MELISA JUNUZOVIĆ, KEMAL ALIČ, ALEŠ ŠVIGELJ Department of Communication Systems, Jozef Stefan Institute Jozef Stefan International
More informationAvailable online at ScienceDirect. Procedia Computer Science 46 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 1209 1215 International Conference on Information and Communication Technologies (ICICT 2014) Improving the
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationEfficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas
Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai Department of Electrical and Computer Engineering North Dakota State University Fargo, ND 5805 Email: fdai@ece.ndsu.edu
More informationJoint Routing, Scheduling, and Network Coding for Wireless Multihop Networks
211 International Symposium of Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks Joint Routing, Scheduling, and Network Coding for Wireless Multihop Networks Samat Shabdanov, Catherine
More informationNodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI
More informationDistributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks
Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks Peng-Jun Wan Khaled M. Alzoubi Ophir Frieder Abstract Connected dominating set (CDS) has been proposed as virtual backbone
More informationA Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks
A Simple Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks Chun-Su Park, You-Sun Kim, Kwang-Wook Lee, Seung-Kyun Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea
More informationImproving Performance in Ad hoc Networks through Location based Multi Hop Forwarding
Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding v.vallinayagi research scholar, manonmanium university tirunelveli-11 Dr.G.M.Nasira Assistant professor dept of computer
More informationPerformance of DSDV Protocol over Sensor Networks
Performance of DSDV Protocol over Sensor Networks Khushboo Tripathi, Tulika Agarwal and S. D. Dixit Department of Electronics and Communications University of Allahabad, Allahabad-211002, India Khushboo83@live.com
More informationInformation Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast
2005 Conference on Information Sciences and Systems, The Johns Hopkins University, March 16 18, 2005 Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast Yunnan Wu
More informationImproved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique
Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Vijay J Parmar Department of Computer Engineering,Sarvajanic College of Engineering and Technology Surat, Gujrat (India),E-mail
More informationMiddle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET
Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET 1 Prashant Dixit* Department of CSE FET, Manavrachna international institute of research
More informationANewRoutingProtocolinAdHocNetworks with Unidirectional Links
ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr
More informationInvestigation on OLSR Routing Protocol Efficiency
Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova
More informationAppointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks
Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University
More informationCompetent Broadcasting in MANET
Competent Broadcasting in MANET 1 Ms. K. Vijayalakshmi, 2 Mrs.S.Jeyanthi 1 M.E., Lecturer, CSE Dept., PSNA College of Engg. And Tech., Dindigul, Tamilnadu,India. 2 M.E., Lecturer, CSE Dept., PSNA College
More informationWIRELESS networks suffer from low throughput and
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 3, JUNE 2008 497 XORs in the Air: Practical Wireless Network Coding Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Médard, Senior Member,
More informationENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK
ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK Yousif Ali Saadi, Rosilah Hassan and Dahlila Putri Dahnil Network Communication Lab Research, Centre for Software Technology and Management
More informationEffects of MAC Approaches on Non-Monotonic Saturation with COPE - A Simple Case Study
Effects of MAC Approaches on Non-Monotonic Saturation with COPE - A Simple Case Study Jason Cloud*, Linda Zeger, Muriel Médard* *Research Laboratory of Electronics, Massachusetts Institute of Technology,
More informationPerformance Analysis and Enhancement of Routing Protocol in Manet
Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and
More informationAn Iterative Greedy Approach Using Geographical Destination Routing In WSN
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationEffect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols
Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy
More informationPractical Network Coding in Sensor Networks: Quo Vadis?
Practical Network Coding in Sensor Networks: Quo Vadis? Thiemo Voigt 1, Utz Roedig 2, Olaf Landsiedel 3,4, Kasun Samarasinghe 1, Mahesh Bogadi Shankar Prasad 1 1 Swedish Institute of Computer Science (SICS),
More information