Rheinisch-Westfälische Technische Hochschule Aachen Lehrstuhl für Informatik IV Prof. Dr. rer. nat. Otto Spaniol

Size: px
Start display at page:

Download "Rheinisch-Westfälische Technische Hochschule Aachen Lehrstuhl für Informatik IV Prof. Dr. rer. nat. Otto Spaniol"

Transcription

1 Rheinisch-Westfälische Technische Hochschule Aachen Lehrstuhl für Informatik IV Prof. Dr. rer. nat. Otto Spaniol COMPARISON of BROADCASTING TECHNIQUES for MOBILE AD HOC NETWORKS Seminar: Data Communication and Distributed Systems Summer 2003 Şerife Burcu Dilbaz Matrikelnummer: Betreuung: Mesut Güneş Lehrstuhl für Informatik IV, RWTH Aachen

2 TABLE OF CONTENTS ABSTRACT 3 1. INTRODUCTION 3 2. MOTIVATION 4 3. BROADCASTING TECHNIQUES IN MOBILE AD HOC NETWORKS SIMPLE FLOODING PROBABILITY BASED METHODS Probabilistic Scheme Counter-Based Scheme AREA BASED METHODS Distance-Based Scheme Location-Based Scheme NEIGHBOR KNOWLEDGE METHODS Flooding with Self Pruning Collection of Static Information Collection of Dynamic Information Scalable Broadcast Algorithm (SBA) Dominant Pruning Multipoint Relaying Ad Hoc Broadcast Protocol CDS-Based Broadcast Algorithm LENWB COMPARISONS OF THE BROADCASTING TECHNIQUES ALGORITHM EFFICIENCY CONGESTED NETWORK MOBILE NETWORK COMBINED NETWORKS CONCLUSION REFERENCES 20 2

3 Abstract Broadcasting is essential in ad hoc routing algorithms. Broadcasting is used in mobile ad hoc networks for paging, alarming, location updates and route discoveries. Many unicast routing protocols use broadcasting to establish routes. The simplest approach to broadcasting is flooding. But flooding causes redundancy of broadcast packets, contention and collision. To overcome the redundancy of flooding more efficient broadcasting methods than flooding have been proposed. This paper describes the broadcasting techniques and compares the performance of these techniques under different network conditions. 1. INTRODUCTION Mobile wireless networks continue to attract attention with the improvements in wireless communication and the increasing demand and availability of mobile devices. Mobile wireless networks have two variations. Infrastructured mobile networks and infrastructureless mobile networks. Infrastructured mobile networks need an infrastructure support consisting of fixed and wired gateways (see Figure 1). A mobile node communicates with a fixed base station in the network. As the mobile node moves, it can go out of the range of the base station and enter a new base station s range. In this case handoff is performed and the mobile node starts communicating with the new base station. Figure 1 - Infrastructured mobile network Infrastructureless mobile networks are known as mobile ad hoc networks. Mobile ad hoc networks are wireless multi-hop networks that don t require a fixed infrastructure. All nodes are mobile and can be connected dynamically and arbitrarily. Mobile nodes cooperate with each other to enable communication by functioning as routers which discover and maintain routes to other nodes in the network (see Figure 2). Figure 2 Ad hoc mobile network 3

4 Ad hoc Networks are useful when infrastructure is not available, is impractical, or expensive. Ad hoc networks are easy to deploy, therefore it has many applications in personal area networking (cell phone, laptop, ear phone, wrist watch), in military environments (soldiers, tanks, planes), in civilian environments (taxi cab network, meeting rooms, sports stadiums, boats, small aircraft), in emergency operations (search-and-rescue, police and fire fighters). Typical limitations of ad hoc networks are high power consumption, low bandwidth, high error rates and high mobility of the nodes. 2. MOTIVATION In mobile ad hoc networks, each node has a transmission radius and is able to send a message to all of its neighbors that are located within the radius. Packets sent by the source node are relayed by several intermediate nodes before reaching the destination node if the destination node is outside of the source node s transmission radius. In a broadcasting task, a source node sends the same message to all the nodes in the network. It is an important task used for paging, alarming, location updates, route discoveries. Network wide broadcasting is more frequent in ad hoc networks than in wired networks because of the node mobility and scarce system resources. Actually, broadcasting is essential in ad hoc routing algorithms. Many unicast routing protocols such as Dynamic Source Routing (DSR), Ad Hoc on Demand Distance Vector (AODV), Zone Routing Protocol (ZRP) and Location Aided Routing (LAR) use broadcasting to establish routes. The usual approach for broadcasting is through flooding. Flooding is the process in which the same message is transmitted by all nodes that receive it. Flooding is appropriate for mobile ad hoc networks as it requires no topological knowledge. However it is not optimal because it generates a high number of redundant messages. The redundant messages waste limited resources such as bandwidth and energy supply. The wireless medium does not have the capacity to be used abundantly for the unnecessary traffic. Flooding is very costly, since it causes redundancy, contention and collision. To overcome the redundancy of flooding more efficient broadcasting methods than flooding have been proposed. In this paper, broadcasting techniques will be described. Some of these techniques will be selected to be compared. Section 3 describes the broadcasting techniques, which are categorized in four categories: Simple Flooding, Probability-Based methods, Area-Based methods, Neighbor Knowledge based methods. Simple flooding ensures the coverage of the network but it has the largest number of rebroadcast packets. Probability-Based and Area-Based methods estimate its contribution to the overall broadcasting before rebroadcasting a packet. If the estimated contribution is lower than a threshold value, they don t rebroadcast the packet. In neighbor knowledge methods exchange hello packets in order to maintain topology knowledge of their neighborhood. Using this knowledge a small subset of neighbors is selected as rebroadcasting nodes. In Section 4 comparison results of the broadcasting methods will be given. Sample protocols from each category will be selected and the performance of these protocols will be examined under different network conditions. The effects of increasing node density, increasing congestion and increasing network mobility on the selected protocols will be demonstrated on graphs. In section 5 conclusions of the paper is presented. 4

5 3. BROADCASTING TECHNIQUES IN MOBILE AD HOC NETWORKS 3.1. Simple Flooding In simple flooding nodes have no neighborhood information. A node simply broadcasts a packet to all its neighbors. Each neighbor rebroadcasts the packet upon receiving it and this continues until all the nodes of the network receive the packet. Each node rebroadcasts the packet only once (See Figure 3). Simple flooding provokes many redundant packet rebroadcasts, because of the overlaping transmission coverages of some nodes. Redundant rebroadcasts causes contention and packet collisions. Figure 3 Retransmissions in simple flooding 3.2. Probability Based Methods Probabilistic Scheme The probabilistic scheme [2] reduces the broadcast redundancy by randomly having some of the nodes broadcast and some not. A node in the network broadcasts a message with a predetermined probability p and takes no action with probability 1-p. In dense networks the probability p is small, since multiple nodes transmission coverages overlap. In sparse networks the probability p is chosen higher. This scheme is equivalent to simple flooding when the broadcast probability is equal to Counter-Based Scheme The counter-based scheme [2] reduces the broadcast redundancy by preventing a node from rebroadcasting if the additional coverage of that node is too low. There is an inverse relation between the number of times a packet is received at a node and the probability that the node reaches additional area. The expected additional coverage after hearing the message k times, is expected to decrease quickly as k increases (See Figure 4). The counter-based scheme uses this fact and counts the number of times the same packet is received at a node within a predefined period, Random Assessment Delay (RAD). When RAD expires, the packet is rebroadcasted if the count is less than a threshold value, otherwise the packet is prohibited from rebroadcasting. The threshold value is chosen such that all nodes rebroadcast in sparse 5

6 networks and some nodes don t rebroadcast in dense networks. To maintain a high delivery ratio in sparse networks, a higher threshold value is needed; in dense networks a lower threshold value can be used. Figure 4 The expected additional coverage vs. number of transmissions heard 3.3. Area Based Methods Distance-Based Scheme The distance-based scheme [2] reduces the broadcast redundancy by having a node rebroadcast depending on its distance from its neighbors. The relative distance between nodes determines the additional coverage area (See Figure 5). If the distance is small, than the additional coverage area provided by rebroadcasting is small. If the distance is large, the provided additional coverage is large. In this scheme, a node compares the distances between itself and its neighbors and finds the minimum of them. If the minimum distance is less than a threshold value, the packet is considered as redundant and not sent. Signal strengths are used to calculate the distances between the nodes. Additional Coverage Area Figure 5 Distance-Based Scheme 6

7 Location-Based Scheme The location-based scheme [2] reduces the broadcast redundancy by having a node rebroadcast depending on the additional coverage area it provides. In this scheme the additional coverage area is estimated from the location information of the nodes. Therefore each node must determine its own location, e.g. by using Global Positioning System (GPS). Each node adds its location to the header of the packet before broadcasting or rebroadcasting it. Upon receiving a packet a node learns the location of the sender and calculates the additional coverage area provided if it rebroadcasts the packet. If the additional coverage area is less than a threshold value, then the node doesn t rebroadcast the packet Neighbor Knowledge Methods Flooding with Self Pruning Neighbor knowledge based methods are divided into neighbor-designating methods and selfpruning methods. In neighbor-designating methods, the forwarding status of each node is determined by its neighbors. In self-pruning methods, each node determines its forwarding status; forwarding or non-forwarding. This decision is based on node s local information. In this protocol every node knows its 1-hop neighbors [3]. To provide this information periodic hello packets are sent. A node adds the list of its neighbors to the header of the packet before broadcasting it. The node which receives this packet, compares the neighbors of the source node with its neighbors. If they are the same, the node doesn t rebroadcast the packet since rebroadcasting is redundant. Self pruning requires additional overhead of exchanging neighborhood information. To reduce the overhead, the received neighbor lists of the adjacent nodes can be cached. A node doesn t send its neighbor list if it s not been changed. The node that receives a packet without a neighborlist uses the entry in its cache. If a neighborlist is piggybacked in the packet, the receiver node updates its cache. An ad hoc network is considered as a graph G = (V,E) [4]. V is the set of nodes and E is the set of bidirectional links between the nodes. Each node has a neighbor set N(V) = {u (u,v) E}. The set of forward nodes is denoted by F and F V. A broadcast protocol ensures the coverage if it guarantees successful broadcast, that is every node receives the broadcast packet. Local information collected at a node v is represented formally as L v. L v is a triple (G v, p, F v ) where G v = (V v, E v ) is a subgraph of G which represents the topology of the small vicinity of the node v, p is the priority function on V v and F v represents a list of forward nodes extracted from incoming broadcast packets. F v F V v. The nodes in F v are called the black nodes. The nodes which are not black and whose priority is higher than v are called the gray nodes. The other nodes are called the white nodes. If u is a black node and a neighbor of v, then another neighbor w of v is covered by u if there exists a replacement path with gray nodes as intermediate nodes between u and w. More formally, there exists a path (u, v 1, v 2,..., v k, w) in G v, where p(v i ) > p(v) for i=1, 2,..., k. For example, in Figure 5, the black node s covers nodes v and x. Figure 5 Local Information for node u 7

8 In flooding with self pruning, each node decides its own forwarding status based on its local information. Local information of each node is divided into two categories: static and dynamic information. Static information includes neighbor topology and an attribute which is used as priority value. Dynamic information includes a small set of nodes that have forwarded the broadcast packet. When a node receives a broadcast packet, it either rebroadcasts it or drops it. When a node drops a broadcast packet, it is pruned from the forward node set. A node can be pruned from the forward node set, if each of its neighbors is either a black node or covered by a black node. This is called the self-pruning rule. According to this rule, node u in Figure 5 can be pruned because one of its neighbors is a black node and the remaing neighbors are covered by the black neighbor. Broadcast algorithm of self-pruning for each node v is defined as follows: 1. Periodically exchange hello message with neighbors and update the static information G v and p(v v ). 2. On receiving a broadcast packet, build up the black node set F v. 3. Test the self-pruning rule with the local information Lv = (G v,p,f v ). If the rule applies do nothing; otherwise forward the received packet Collection of Static Information Static information includes neighborhood topology and priority values. Neighborhood topology Gv in each node v is collected by exchanging hello messages periodically among neighbors. k-hop information can be collected after k rounds of hello message exchanges. Mobility pattern of an ad hoc network effects the maintenance overhead of k-hop information. A highly mobile network needs a smaller interval for exchanging hello packets than a slightly mobile network. If k is chosen larger, the interval for exchanging hello packets must be small so that the topology changes are disseminated quickly. Considering this overhead k must be chosen small. k = 0 means that there is no hello message, and each node knows only the black neighbors. The self-pruning rule cannot apply in this case, as it requires a complete list of neighbors. When k = 1, each node advertises its id via hello messages, so every node knows the ids of its neighbors but not the ids of the neighbors of its neighbors. Therefore self-pruning is still difficult to apply except for the case that all neighbors of a node are black. If all neighbors of the node are black, that means all neighbors are in the forward node set. Then the node can be pruned, since a broadcast is redundant in this case. Most self-pruning methods require 2-hop information. When k = 2, each node advertises its id and its neighbor set by hello messages. In this case replacement paths can be constructed and self-pruning rule can be applied considering not only the black nodes but also the neighbors that are covered by the black nodes. Generally k-hop knowledge can be collected when each node relays (k-1)-hop information in its hello packet. Figure 6 Neighborhood topology of node u 8

9 Collection of Dynamic Information The set of black nodes F v carried by the incoming broadcast packet contains the dynamic information, which is also named as history information. A self-pruning protocol is a static protocol if it doesn t collect any dynamic information, otherwise, it s a dynamic protocol. In a static protocol the static self-pruning rule is applied in step 3 of the broadcast algorithm. Static self-pruning algorithm states that a node can be pruned from the forward node set if each neighbor is covered simultaneously by all other neighbors. The benefit of static protocols is that the step 3 of the broadcast algorithm can be applied prior to any broadcasting. Because the static self-pruning rule doesn t require dynamic information which is carried in the broadcast packet. Instead, static information which is collected via hello packets is used. Static protocols reduce the computation delay but they usually produce a larger CDS than the dynamic protocols. In dynamic protocols, if a node has a larger black node set F v, than its chance to be pruned increases. There are two methods to increase the number of black nodes in the set: backoff delay and piggybacked history. The backoff delay postpones the testing of the self-pruning rule for a period of backoff delay, so that new black nodes can be observed forwarding the same packet within this period. Backoff delay also increases the overall delay. In piggybacking broadcast history information for a self-pruning method that uses k-hop information, the last k-1 visited nodes are piggybacked into the broadcast packet. Using more than k-hop history is a waste, since only black nodes within k-hops are useful to the selfpruning rule Scalable Broadcast Algorithm (SBA) In this algorithm a node doesn t rebroadcast a packet if all its neighbors have received the packet in the previous transmission [6]. All nodes are required to have 2-hop neighbor knowledge. This information is retrieved by sending hello packets that are composed of the node s identifier and the list of its neighbors. The node who receives this hello packet gains the knowledge of its own neighbors and the neighbors of them. In this algorithm, when a node receives a packet, it knows the transmitter node; because it s one of its neighbors. It also knows the neighbors of the transmitter node. Therefore it has the knowledge of the nodes which has been covered by this transmission. The node rebroadcasts the packet if it has additional neighbors that were not reached by the previous transmission. The broadcast algorithm can be divided into two parts: local neighborhood discovery and data broadcasting. Local neighborhood discovery is achieved by hello message exchanges. When a node receives a broadcast message, it discovers which nodes have been covered by this transmission by checking the neighbor list of the transmitter. Then these nodes including the transmitter are added into the broadcast cover set of the message. When making rebroadcast decision, the node checks the broadcast cover set of the message. If all its neighbors are in the set, then the rebroadcast operation is unnecessary and can be canceled. The data broadcasting procedure is illustrated as follows. 1. Source s broadcasts messages to all its neighbors and ignores duplicate messages received later. 2. A node u receives a broadcast message m from node r. Let N(u) denote the neighbor set of u. Node u performs the following operations. a) If N(u) N(r) {r}, then it doesn t rebroadcast the message. It ignores the duplications received later. b) Else, if the message is received firstly, then let broadcast cover set for the messsage m be C(u,m) = N(r) {r}. A rebroadcast is scheduled to be performed after a period of Random Assessment Delay (RAD). In this period, if a dublicate message is 9

10 received, the nodes that are covered by the received transmission are recorded in the broadcast cover set. C(u, m) = C(u, m) N(r) {r}. c) After RAD is expired, node u checks whether all its neighbors are in the broadcast cover set. If N(u) C(u, m), then the rebroadcast is canceled. Otherwise, u rebroadcasts the message m and ignores the dublicate messages received later Dominant Pruning In this protocol 2-hop neighbor knowledge is used like in the scalable broadcast algorithm. The sender node selects some or all of its 1-hop neighbor nodes that should rebroadcast [3]. A list of identities of the nodes that should rebroadcast are added in the header of the packet. It s called a forward list. Only the selected nodes can rebroadcast the packet. Selected neighbors also determine a forward list and add it in the rebroadcast packet and this process continues until all the nodes are covered. When a node receives a broadcast packet, it checks whether its identity is listed in the forward list. If its identity is in the forward list, it determines which of its neighbors should rebroadcast the packet. A Greedy Set Algorithm is used to determine the forward list so that the number of transmissions is minimum. If node u receives a broadcast packet from node r, and if it is in the forward list of r, it must select its own forward list before rebroadcasting the packet so that all nodes within 2-hop distance from u receive the packet. The forward list should be minimized to decrease the number of transmissions. r, N(r) have already received the packet, and N(u) will receive the packet when u forwards the packet. Therefore node u determines its forward list from the set N(u) N(r) so that all nodes in N(N(u)) - N(r) - N(u) receive the packet (See Figure 7). N(r) N(u) N(u) N(r) r u N(N(u)) N(N(u)) - N(r) - N(u) Figure 7 Dominant pruning method Multipoint Relaying In this algorithm number of rebroadcasts is reduced by selecting a subset of the neighbors as the rebroadcasting nodes [7]. The selected neighbors are called multipoint relays (MPRs). Selection of the neighbors is done explicitly by the senders as in the dominant pruning protocol. Each node selects its own multipoint relays. Only these multipoint relays can rebroadcast a packet. A receiving node rebroadcasts a packet if it is a multipoint relay of the sender (See Figure 4). To chose multipoint relays a node needs the information of its 1-hop neighbors and 2-hop neighbors. 1-hop neighbor information is gained via periodic hello packets. Each node 10

11 declares its presence to its neighbor. For 2-hop neighbor information list of neighbors is attached to the hello packet. IIn this way, each node gains its 1-hop and 2-hop neighbor set. Once a node has this information, it can select the minimal number of 1-hop neighbors which covers all of its two-hop neighbors. A node chooses its MPRs using the following algorithm[7]: First it finds all 2-hop neighbors that can be reached by one 1-hop neighbor. It puts these 2-hop neighbors in the cover set and assigns these 1-hop neighbors as MPRs. From the left 1-hop neighbors it finds the one that would cover the most 2-hop neighbors which are not in the cover set. This process continiues until all the 2-hop neighbors are in the cover set. Each node calculates its MPRs and adds the list of its chosen MPRs in the hello packets. A node receiving a hello packet, checks if its in the MPR list of the sender node. If it s an MPR of the sender node, it rebroadcasts the packets received from it. The concept of multipoint relaying is to reduce the number retransmissions while forwarding a broadcast packet. This technique restricts the number of retransmitters as much as possible by efficiently selecting a small subset of neighbors which covers the same network region that would be covered by the complete set of neighbors. This small subset of neighbors is called multipoint relays of a given network node. The scheme of multipoint relays (or MPRs) provides an adequate solution to reduce the flooding of broadcast messages in the network, while attaining the same goal of transferring the message to every node in the network with a high probability. Figure 8 Retransmissions in multipoint relaying In multipoint relaying technique each node calculates its own set of multipoint relays, which is completely independent of other nodes' selection of their MPRs. Each node reacts when its neighborhood nodes change and accordingly modifes its MPR set to cover its two-hop neighbors. An important aspect for the utilization of the multipoint relays is the manner in which these multipoint relays are selected by each node. Obviously, the goal is to achieve the maximum performance by selecting an optimal set of these MPRs by each node. But this task is not a trivial one. If the mechanism of selecting the MPRs is too simple, it may not select efficiently the MPRs in the dynamic and complex situations, and the expected performance gain would 11

12 not be achieved. On the other hand, if the algorithm of MPR selection is very long and complicated to provide a near to optimal MPR set, it may become difficult to implement it or it may generate its own control traffic to gather information for its functioning. So, there must be a compromise in designing such an algorithm for the selection of multipoint relays: it should be easy to implement, and it should give near to optimal MPR set in the majority of cases. The information needed to calculate the multipoint relays is the set of one-hop neighbors and the two-hop neighbors. To get the information about the one-hop neighbors, most protocols use some form of hello messages, that are sent locally by each node to declare its presence. In a mobile environment, these messages are sent periodically as a keep alive signals to refresh the information. To obtain the information of two-hop neighbors, one solution is that each node attach the list of its own neighbors, while sending its hello messages. In this way, each node can independently calculate its one-hop and two-hop neighbor set. Once a node has this information, it can select the minimal number of one-hop neighbors which covers all of its two-hop neighbors. One heuristic for the selection of multipoint relays is as follows. To select the multipoint relays for the node x, lets call the the set of one-hop neighbors of node x as N(x), and the set of its two-hop neighbors as N 2 (x). Let the selected multipoint relay set of node x be MPR(x). 1. Start with an empty multipoint relay set MPR(x). 2. First select those one-hop neighbor nodes in N(x) as the multipoint relays which are the only neighbor of some node in N 2 (x), and add these one-hop neighbor nodes to the multipoint relay set MPR(x). 3. While there still exist some node in N 2 (x) which is not covered by the multi-point relay set MPR(x) : a) For each node in N(x) which is not in MPR(x), compute the number of nodes that it covers among the uncovered nodes in the set N 2 (x). b) Add that node of N(x) in MPR(x) for which this number is maximum Ad Hoc Broadcast Protocol The Ad Hoc Broadcast Protocol (AHBP) is an extend form of dominant pruning and multipoint relaying. In this protocol Broadcast Relay Gateways (BRGs) are utilized as MBRs. BRGs are the only nodes that are allowed to rebroadcast. Each node selects its broadcast relay gateways at the time when a broadcast packet is transmitted. List of BRGs of the sender is transmitted within the broadcast packet, not via hello packets. hello packets are used to gain 2-hop neighbor information as in the previous protocols. A similar algorithm as in multipoint relaying is used for the selection of the BRG set. But in this algorithm when a node u receives a broadcast packet and is listed as a BRG in the header of this packet, u determines which neighbors have also received this packet by using its 2-hop neighbor knowledge. These nodes are considered as already covered and therefore they are removed from the set of possible BRGs of the node. In multipoint relaying MBRs selection is not done considering the source route of the broadcast packet. For high mobility networks extended AHBP can be used. When a node u receives a broadcast packet from node r, there might be a case that, at that time node u doesn t have node r in its neighbors list. This can happen if u and r have not yet exchanged hello messages. In extended AHBP (AHBP-EX) node u behaves as a BRG in this case and rebroadcasts the packet CDS-Based Broadcast Algorithm The Connected Dominating Set (CDS)-Based Broadcast algorithm is similar to the algorithms used in multipoint relaying and AHBP, but CDS-Based Broadcast algorithm performs more 12

13 calculations in the selection of the BRGs. AHBP considers the 1-hop neighbors of the source of the broadcast packet to be in the cover set. CDS-Based Broadcast algorithm also considers the higher priority BRGs of the previous sender in determining the cover set. Priority of the BRGs are designated in the BRG list which is transmitted in the header of the broadcast packet. The order of the BRG in the list shows its priority. If node B is in a higher priority(order) than node C, node C adds neighbors which are common to node B in the cover set. Once a node determines the cover set considering the source node and the BRGs with higher priorities, the node chooses its BRGs from the set of its neighbors that are not in the cover set LENWB The Lightweight and Efficient Network-Wide Broadcast (LENWB) protocol chooses the nodes that shoud rebroadcast implicitly, instead of specifying them explicitly. It utilizes hello packets to gain 2-hop neighbor knowledge as in the previous protocols. The hello packets contain the identity of the node, number of neighbors of the node, list of neighbors of the node and the number of their neighbors. Each node has a priority. The priority of a node is proportional to the number of neighbors of that node. The decision of rebroadcasting is made using the knowledge of the priorities of the neighbor nodes. A node considers its 1-hop and 2- hop neighbors that have higher priority and that have also received the broadcast packet in determining which of its neighbors are expected to rebroadcast. A node expects its higher priority neighbors to rebroadcast. If all of its low priority neighbors have already received the rebroadcasts of its higher priority neighbors, the node won t rebroadcast; otherwise it rebroadcasts the packet. More formally, whenever node v receives a broadcast packet from a neighbor u, it computes the set C of nodes that are connected to u via nodes that have higher priority values than v. If v s neighbor set, N(v) is contained in C, node v doesn t rebroadcast; otherwise, it is rebroadcasts. 4. COMPARISONS OF THE BROADCASTING TECHNIQUES Comparisons of broadcasting methods are provided in the paper of Brad Williams and Tracy Camp[1]. Simple Flooding, the Counter-Based scheme, the Location-Based scheme, SBA and AHBP are the selected broadcasting techniques in this paper. Simple Flooding is the only protocol in its category. Therefore it is chosen to represent its category. From the probability based methods the Counter-Based scheme is chosen, because it performed better than the Probabilistic scheme in most of the comparisons [2]. Area Based methods are represented by the Location-Based scheme. From the neighbor knowledge category two methods are selected: SBA and AHBP. Neighbor knowledge based protocols can be classified in two parts depending on the way a node makes rebroadcasting decision. In Self Pruning, SBA and LENWB this decision is made by the node itself. In Dominant Pruning, Multipoint Relaying, AHBP and CDS-Based Broadcasting a node is told to rebroadcast or not. From the first class where rebroadcast decision is local, SBA is chosen and the second class is represented by AHBP. Comparisons are performed considering different network conditons, like node densities, node mobilities and traffic rates. Selected broadcasting techniques are examined under four aspects in the comparisons: algorithm efficiency, congested networks, mobile networks and combined networks. The following sections describe these aspects and and the results of the comparisons. 13

14 4.1. Algorithm Efficiency To compare the algorithm efficiencies of the selected broadcasting techniques, a static network and Null MAC are used in the studies. Static network avoids the effects of node mobility. Null MAC is used to remove the congestion effect. All algorithms depend on the density of the network. In sparse networks, behaviours of the protocols converge to Simple Flooding since most of the nodes need to rebroadcast in sparse networks. In dense networks the differences of the algorithm efficiencies appear. The worstcase bound is provided by Simple Flooding since it has the largest forward set. The bestcase bound is provided theorotically by the Minimum Connected Dominating Set (MCDS). MCDS is the smallest set of rebroadcasting nodes, such that all the nodes in the set are connected and all the nodes that are not in the set are 1-hop neighbors of a node in the set. Figure 9 Delivery Ratio vs. Number of Network Nodes Figure 9 shows the delivery ratio of each protocol as the number of nodes increases in the static network with Null MAC. Delivery ratio is the percent of the nodes that receive the broadcast packet. From the graph, it s seen that Simple Flooding and the protocols representing neighbor knowledge based methods, namely SBA and AHBP perform better in sparse networks. Figure 10 shows the number of retransmitting nodes in each protocol as the number of nodes in the network increases. Protocols that have more complicated algorithms have fewer retransmitting nodes than the others. The neighbor knowledge based methods have the fewest retranmitting nodes in the studies. AHBP approximates theoretical the best-case. The figure also shows that area based schemes have fewer retransmitting nodes than probability based schemes. The threshold values for the Counter-Based and Location-Based schemes are held constant in the graphs of Figure 9 and Figure 10. For the Counter-Based scheme the threshold is 3, and for the Location-Based scheme it is 45 meters. But the threshold values effects the results. In the Counter-Based scheme, a higher threshold value in sparse networks and a lower threshold value in dense networks increases the delivery ratio. In Location-Based scheme, a lower threshold value is used to maintain a high delivery ratio in sparse networks and a higher threshold value is used in dense networks. 14

15 Figure 10 - Number of Retransmitting Nodes vs. Number of Network Nodes 4.2. Congested Network To compare the broadcasting protocols under the effect of congestion a static network and the contention based MAC scheme are used in the studies. Packet origination rate is increased keeping the packet size fixed to obtain congestion. Number of nodes remains constant. Figure 11 shows graph of delivery ratio versus packet origination rate. Delivery ratio decreases in every protocol as the network becomes more congested. Delivery ratio of Simple Flooding suffers the most, since congested network causes more collisions and queue overflows. Protocols that minimizes the number of retransmissions perform better in congested networks. Therefore AHBP and SBA has higher delivery ratios. Figure 11 Delivery Ratio vs. Packet Origination Rate 15

16 Figure 12 Number of Retransmitting Nodes vs Packet Origination Rate Figure 12 shows the number of retransmitting nodes as the packet origination rate is increased and the network becomes more congested. In Simple Flooding number of retransmitting nodes decreases because of the collisions and the queue overflows. The protocols which utilize RAD have an increase in the retransmitting nodes as the network becomes more congested. SBA, the Counter-Based scheme and the Location-Based scheme uses RAD in their algorithms and the effect of more congestion is an increase in the number of retransmitting nodes. This is due to the transmission delays of the redundant packets. Congestion prohibits redundant packets to arrive before RAD expires. Therefore more nodes rebroadcast. More rebroadcasts make the network even more congested and this causes more delays. We see that RAD based methods suffer in congested situations. A solution is adapting RAD so that it increases as the network becomes more congested. In general, neighbor knowledge based methods perform better than area based methods, which perform better than the probability based methods in congested networks. That means better performance comes with higher algorithmic cost and for neighbor knowledge based methods also with the cost of exchanging hello packets Mobile Network Selected broadcasting protocols are compared focusing on their reaction to node mobility in the network. A null MAC is used to avoid the effect of congestion. The number of nodes in the network is fixed to 60 and the packet source rate is set to 10 packets per second. Random way point mobility model with zero pause time is used in the simulations. Figure 13 shows the results of the simulations. Delivery ratios of the broadcasting protocols are compared as the average node speed is increased. The graph shows that delivery ratio of AHPB decreases as the network mobility increases. In AHBP the broadcast packet is rebroadcasted by the Broadcast Relay Gateways (BRGs). As the average node speed increases, it becomes very likely that a chosen BRG leaves the transmission range of the choosing node between hello message exchange. In AHBP-EX when a node moves inside another node s transmission range between hello message exchange, and receives a broadcast packet, it rebroadcasts the packet even though it s not listed as a BRG. Because of this property, AHBP-EX has better performance than AHBP in increased mobility, but still it under performs the other broadcasting protocols. An adaptation to AHBP-EX is to use shorter intervals for hello 16

17 packets. This enables AHBP-EX to maintain a high delivery ratio with a changing topology. However, there is a tradeoff between the cost of hello packets and the delivery ratio. Figure 13 Delivery Ratio vs. Average Node Speed The other neighbor knowledge based method, SBA doesn t behave like AHBP as the average node speed changes. The reason for this is the fact that a node assesses its own topology and makes rebroadcast decision locally in SBA. More nodes rebroadcast as the network mobility increases to maintain high delivery ratio. Figure 14 shows the number of retransmissions for each protocol. AHBP and AHBP-EX, both have less nodes rebroadcasting as the mobility increases. From the graphics we see that delivery ratios of the other protocols; Simple Flooding, the Counter-Based and Location-Based schemes, are not effected by topology changes. Figure 14 - Number of Retransmitting Nodes vs. Average Node Speed 17

18 4.4. Combined Networks In the three studies above the comparisons are performed by changing a particular network condition. Node density, network congestion and mobility is increased to examine the effects of these conditions on the broadcasting protocols. In this study combinations of different network conditions are used in the simulations to see the combined effect of them on the protocols. These combinations are given in Figure 15. The severity of the network environment increases as the trial number increases. Figure 15 Parameter Combinations for Combined Networks Figure 16 shows the delivery ratios of each protocol in each trial. Each protocol has a so called breaking point, where it can no londer deliver packets because of the severity of the network conditions. Simple Flooding is the first protocol that breaks. It breaks after Trial 2. The Counter-Based and the Location-Based protocols break after Trial 3 and neighbor knowledge based protocols break after Trial 4. SBA has the highest performance in Trial 4. But it breaks because of the increasing congestion. AHBP-EX is the worst performer in the first three trials, because of the untolerance of this protocol to increasing mobility. However the delivery ratio of AHBP-EX decreases more gracefully than the other protocols, and it is the best value in the fifth trial. Figure 17 shows the number of retransmitting nodes for each protocol in each trial. The number of rebroadcasting nodes in all protocols increases, as the severity of the network environment increases. The Counter-Based scheme starts behaving like Simple Flooding after the third trial in terms of delivery ratio and number of retransmitting nodes. The neighbor knowledge based methods have the fewest number of retransmitting nodes in every trial. Figure 16 Delivery Ratio as Severity of Network Increases 18

19 Figure 17 Number of Rebroadcasting Nodes as Severity of Network Environment Increases 5. CONCLUSION Increasing density in static networks effects the Probability-Based and Location-Based methods and increases the number of retransmitting nodes. The threshold value can be adapted to neighbor size in these methods to decrease the number of retransmitting nodes. Neighbor knowledge based methods approximate the best case, MCDS, as the node density of the network increases. Random Assessment Delay (RAD) utilizing schemes suffer in congested networks. RAD can be adabted by each node according to its congestion level. Neighbor knowledge based methods suffer in high-mobility networks. hello packet intervals can be reduced. Adapting RAD to the current congestion level improves SBA s performance in congested networks. The simulations show that the delivery ratios of adaptive SBA is higher than AHBP, but to achieve this higher delivery ratio, adaptive SBA requires higher number of retransmitting nodes. AHBP-EX performs better than other protocols in most severe network environments. However its delivery ratio is effected by the network mobility and it decreases as the network mobility increases. There is a trade off between algorithm complexity and redundant transmissions. Power requirements for more complex calculations is generally less than the power requirements of transmitting redundant packets. Simple Flooding is the worst case in generating redundant packets. Probability-Based and Area-Based methods have simple algorithms. But they fail to operate efficiently in congested networks. They can be improved but the improvement requires addition of hello messages and an adaptive RAD. The improvements spoil the simplicity of these protocols. It s not logical to choose one of the improved extension of these protocols since there are better protocols utilizing hello packets. Considering these, we can conclude that neighbor knowledge methods are preferred over other types of broadcasting protocols. But there is no clear conclusion between the two neighbor knowledge methods. AHBP-EX is recommended for networks having low mobility or extremely congested networks. Adaptive SBA is recommended for all other conditions. 19

20 6. REFERENCES [1] B. Williams, T. Camp. Comparison of Broadcasting Techniques for Mobile Ad Hoc Networks. Mobihoc, [2] S. Ni, Y. Tseng, Y. Chen, and J. Sheu. The Broadcast Storm Problem in a Mobile Ad Hoc Network. Mobicom, [3] H. Lim and C. Kim. Multicast Tree Construction and Flooding in Wireless Ad Hoc Networks. MSWIM, [4] J. Wu, F. Dai. A Generic Broadcast Protocol in Ad Hoc Networks Based on Self-Pruning. [5] J. Wu, F. Dai. Broadcasting in Ad Hoc Networks Based on Self-Pruning. [6] W. Peng and X. Lu. On the Reduction of Broadcast Redundancy in Mobile Ad Hoc Networks. Mobihoc, [7] A. Qayyum, L. Viennot, and A. Laouiti. Multipoint Relaying: Networks. INRIA - Rapport de recherche, [8] Y. Sasson, D. Cavin, A. Schiper. Probabilistic Broadcast for Flooding in Wireless Mobile Ad hoc Networks. Swiss Federal Institute of Technology, 2002 [9] V. Shurbanov, J. Redi. Energy-Efficient Flooding in Mobile Ad Hoc Networks. U.S. Army Research Laboratory s Collaborative Technology Alliance on Communications and Networking. [10] J. Wu, F. Dai, M. Gao, and I. Stojmenovic. On Calculating Power-Aware Connected Dominating Sets for Efficient Routing in Ad Hoc Wireless Networks. [11] I. Stojmenovic, M. Seddigh and J. Zunic. Dominating Sets and Neighbor Elimination- Based Broadcasting Algorithm in Wireless Networks. IEEE Transactions on Parallel and Distributed Systems. Vol. 13 No.1, [12] J. Sucec, I. Marsic. An Efficient Distributed Network-Wide Broadcast Algorithm for Mobile Ad Hoc Networks. CAIP Center. 20

Broadcasting Techniques for Mobile Ad Hoc Networks

Broadcasting Techniques for Mobile Ad Hoc Networks Broadcasting Techniques for Mobile Ad Hoc Networks Broadcasting: It is the process in which one node sends a packet to all other nodes in the network. 1 Usefulness of broadcasting Broadcasting of net-wide

More information

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Vijay J Parmar Department of Computer Engineering,Sarvajanic College of Engineering and Technology Surat, Gujrat (India),E-mail

More information

Comparison of Broadcasting Techniques for Mobile Ad Hoc Networks

Comparison of Broadcasting Techniques for Mobile Ad Hoc Networks Comparison of Broadcasting Techniques for Mobile Ad Hoc Networks Brad Williams Dept. of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 bwilliam@mines.edu Tracy Camp Dept. of

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS , pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,

More information

Performance of New Broadcast Forwarding Criteria in MANET

Performance of New Broadcast Forwarding Criteria in MANET Performance of New Broadcast Forwarding Criteria in MANET Lijuan Zhu 1, Bu-Sung Lee 1, Boon-Chong Seet 2, Kai-Juan Wong 3, Genping Liu 1, Shell-Ying Huang 1, and Keok-Kee Lee 1 1 Centre for Multimedia

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

On Reducing Broadcast Redundancy in Ad Hoc Wireless Networks

On Reducing Broadcast Redundancy in Ad Hoc Wireless Networks On Reducing Broadcast Redundancy in Ad Hoc Wireless Networks Wei Lou and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL Abstract Unlike in a wired network,

More information

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. Mobile Ad Hoc Networks: Routing TOPIC 8 UCS-805 MOBILE COMPUTING Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Mobile Ad Hoc Networks (MANET) Introduction

More information

A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks

A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks Wei Lou and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343

More information

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm Journal of Computer Science 7 (1): 46-51, 2011 ISSN 1549-3636 2011 Science Publications Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

More information

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS

Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS Ms. Nutan Julka 1, Prof. Dr. J.W Bakal 2 1 Dept. of Computer Science, Pillais Institute of Information Technology,

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks

A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks Jie Wu and Fei Dai Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Email:fjie,fdaig@cse.fau.edu

More information

Mobile Ad-Hoc Networks & Routing Algorithms

Mobile Ad-Hoc Networks & Routing Algorithms Mobile Ad-Hoc Networks & Routing Algorithms EMMANOUIL G. SPANAKIS, PhD. spanakis@csd.uoc.gr COLLABORATING RESEARCHER, COMPUTATIONAL BIOMEDICINE LABORATORY, FORTH-ICS VISITING LECTURER, COMPUTER SCIENCE

More information

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343 Abstract

More information

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant

More information

Variable Power Broadcasting in Ad Hoc Networks

Variable Power Broadcasting in Ad Hoc Networks Variable Power Broadcasting in Ad Hoc Networks Avinash Chiganmi, Kamil Sarac, and Ravi Prakash Department of Computer Science, University of Texas at Dallas Email: {avinash.chiganmi@student., ksarac@,

More information

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks Yamin Li and Shietung Peng Department of Computer Science Hosei University Tokyo 18-858 Japan {yamin, speng}@k.hosei.ac.jp

More information

Research Paper GNANAMANOHARAN ET AL., INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING TECHNOLOGY E-ISSN

Research Paper GNANAMANOHARAN ET AL., INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING TECHNOLOGY E-ISSN Research Paper PERFORMANCE ANALYSIS OF PROBABILISTIC BROADCAST ON DEMAND ROUTE DISCOVERY PROTOCOL FOR MOBILE AD HOC NETWORKS BASED ON NODE MOBILITY E.Gnanamanoharan 1, R.Bensraj 2 Address for Correspondence

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Glasgow eprints Service

Glasgow eprints Service Yassein, M. B. and Ould-Khaoua, M. and Papanastasiou, S. (25) On the performance of probabilistic flooding in mobile ad hoc networks. In, th International Conference on Parallel and Distributed Systems,

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 6 (Jul. - Aug. 2013), PP 01-09 A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile

More information

Localized Broadcasting in Mobile Ad Hoc Networks Using Neighbor Designation

Localized Broadcasting in Mobile Ad Hoc Networks Using Neighbor Designation 1 Localized Broadcasting in Mobile Ad Hoc Networks Using Neighbor Designation Wei Lou and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Email:{wlou,

More information

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai Department of Electrical and Computer Engineering North Dakota State University Fargo, ND 5805 Email: fdai@ece.ndsu.edu

More information

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme Efficient Broadcast s To Reduce number of transmission Based on Probability Scheme S.Tharani, R.Santhosh Abstract Two main approaches to broadcast packets in wireless ad hoc networks are static and dynamic.

More information

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Improved Self-Pruning for Broadcasting in Ad Hoc Wireless Networks

Improved Self-Pruning for Broadcasting in Ad Hoc Wireless Networks Wireless Sensor Network, 2017, 9, 73-86 http://www.scirp.org/journal/wsn ISSN Online: 1945-3086 ISSN Print: 1945-3078 Improved Self-Pruning for Broadcasting in Ad Hoc Wireless Networks Raqeebir Rab 1,

More information

A NEW DENSITY BASED PROBABILISTIC COUNTER SCHEME FOR SOLVING BROADCAST STORM IN MOBILE AD HOC NETWORKS

A NEW DENSITY BASED PROBABILISTIC COUNTER SCHEME FOR SOLVING BROADCAST STORM IN MOBILE AD HOC NETWORKS A EW DESITY BASED PROBABILISTIC COUTER SCHEME FOR SOLVIG BROADCAST STORM I MOBILE AD HOC ETWORKS A. SETHIL KUMAR, 2 K.S. RAMASWAMI Associate Professor, RVS College of Engineering and Technology, Coimbatore,

More information

Scalable Computing: Practice and Experience Volume 11, Number 1, pp

Scalable Computing: Practice and Experience Volume 11, Number 1, pp Scalable Computing: Practice and Experience Volume 11, Number 1, pp. 43 52. http://www.scpe.org ISSN 1895-1767 c 2010 SCPE EFFICIENT BROADCASTING IN MANETS BY SELECTIVE FORWARDING DOINA BEIN, AJOY K. DATTA,

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing Mobile Adhoc Networks and Routing in MANETS (most of the slides borrowed from Prof. Sridhar Iyer) Diwakar Yagyasen 1 Index Mobile Ad Hoc Networks (MANET) MAC in MANET MANET routing

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Competent Broadcasting in MANET

Competent Broadcasting in MANET Competent Broadcasting in MANET 1 Ms. K. Vijayalakshmi, 2 Mrs.S.Jeyanthi 1 M.E., Lecturer, CSE Dept., PSNA College of Engg. And Tech., Dindigul, Tamilnadu,India. 2 M.E., Lecturer, CSE Dept., PSNA College

More information

Broadcasting and Activity-Scheduling in Ad Hoc Networks

Broadcasting and Activity-Scheduling in Ad Hoc Networks 1 Broadcasting and Activity-Scheduling in Ad Hoc Networks Ivan Stojmenovic 1 and Jie Wu 2 1 SITE, University of Ottawa, Ottawa, Ontario K1N 6N5, Canada ivan@site.uottawa.ca 2 Dept. of Comp. Sci. & Eng.,

More information

Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability

Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability Sivakumar.P, Sivaranjani.R, Srilakshmi.G, Subashini.R Abstract: Mobile ad hoc networks (MANET) have been proposed

More information

AN IMPROVED APPROACH IN FLOODING WITH PACKET REACHABILITY IN FSR (FISHEYE STATE ROUTING) PROTOCOL USING MANET

AN IMPROVED APPROACH IN FLOODING WITH PACKET REACHABILITY IN FSR (FISHEYE STATE ROUTING) PROTOCOL USING MANET AN IMPROVED APPROACH IN FLOODING WITH PACKET REACHABILITY IN FSR (FISHEYE STATE ROUTING) PROTOCOL USING MANET 1 S. NITHYA REKHA, 2 Dr.C.CHANDRASEKAR, 1 Ph.D. Full-Time Research Scholar, Department of Computer

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

Stochastic Flooding Broadcast Protocols in Mobile Wireless Networks

Stochastic Flooding Broadcast Protocols in Mobile Wireless Networks Stochastic Flooding Broadcast Protocols in Mobile Wireless Networks Julien Cartigny David Simplot Jean Carle Abstract In wireless communication environment, the information broadcast based on the flooding

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

A Comparative Analysis between Forwarding and Network Coding Techniques for Multihop Wireless Networks

A Comparative Analysis between Forwarding and Network Coding Techniques for Multihop Wireless Networks A Comparative Analysis between Forwarding and Network Coding Techniques for Multihop Wireless Networks Suranjit Paul spaul2@connect.carleton.ca Broadband Network Lab, Carleton University Acknowledgements

More information

Enhanced Partial Dominant Pruning (EPDP) Based Broadcasting in Ad hoc Wireless Networks

Enhanced Partial Dominant Pruning (EPDP) Based Broadcasting in Ad hoc Wireless Networks Enhanced Partial Dominant Pruning (E) Based Broadcasting in Ad hoc Wireless Networks Ashikur Rahman, Md. Endadul Hoque, Farzana Rahman, Sabuj Kumar Kundu Department of Computer Science Engineering (CSE)

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

Performance Comparison Based On Broadcasting Technique In Mobile Ad-Hoc Network Urvish R. Patel 1 Ridhdhi I. Satoniya 2 Satish G.

Performance Comparison Based On Broadcasting Technique In Mobile Ad-Hoc Network Urvish R. Patel 1 Ridhdhi I. Satoniya 2 Satish G. IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 3, 214 ISSN (online): 2321-613 Performance Comparison Based On Broadcasting Technique In Mobile Ad-Hoc Network Urvish R.

More information

A Power-Preserving Broadcast Protocol for WSNs With DoS Resistance

A Power-Preserving Broadcast Protocol for WSNs With DoS Resistance In Proceedings of 17th International IEEE Conference on Computer Communications and Networks, August 28, pp. 1-6 A Power-Preserving Broadcast Protocol for WSNs With DoS Resistance Chien-Chun Ni, Tien-Ruey

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

ANALYZE AND EVALUATE THE IMPLEMENTATION OF CDS ALGORITHMS USING THE MOBILE AGENT.. 1 RAFAT AHMED ALHANANI, 2 JAAFAR ABOUCHABAKA, 3 RAFALIA NAJAT

ANALYZE AND EVALUATE THE IMPLEMENTATION OF CDS ALGORITHMS USING THE MOBILE AGENT.. 1 RAFAT AHMED ALHANANI, 2 JAAFAR ABOUCHABAKA, 3 RAFALIA NAJAT ANALYZE AND EVALUATE THE IMPLEMENTATION OF CDS ALGORITHMS USING THE MOBILE AGENT.. 1 RAFAT AHMED ALHANANI, 2 JAAFAR ABOUCHABAKA, 3 RAFALIA NAJAT 1 2 3 Department of Computer Science, IBN Tofail University,

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Ad Hoc Networks: Issues and Routing

Ad Hoc Networks: Issues and Routing Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF

WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF Youssef Saadi 1, Bouchaib Nassereddine 2, Soufiane Jounaidi 3 and Abdelkrim Haqiq 4 1,2,3 Computer, Networks, Mobility and Modeling laboratory Department

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH An Overview of Mobile Ad-Hoc Networks: Architecture, Routing and Challenges Avadhesh Kumar 1 Sonali Yadav 2 Kamalesh Chandra Maurya 3 1 Assistant Professor, avadhesh@iul.ac.in

More information

Impact of Link Discovery Delay on Optimized Link State Routing Protocol for Mobile ad hoc Networks

Impact of Link Discovery Delay on Optimized Link State Routing Protocol for Mobile ad hoc Networks Impact of Link Discovery Delay on Optimized Link State Routing Protocol for Mobile ad hoc Networks Akhila Kondai Problem Report submitted to the Benjamin M. Statler College of Engineering and Mineral Resources

More information

Ad Hoc Networks: Introduction

Ad Hoc Networks: Introduction Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Performance Evaluation in MANET by Using NCPR Scheme with Cluster Technique

Performance Evaluation in MANET by Using NCPR Scheme with Cluster Technique International Journal of Emerging Engineering Research and Technology Volume 3, Issue 7, July 2015, PP 22-31 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Performance Evaluation in MANET by Using NCPR

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks

Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks Shuhui Yang, Jie Wu, and Fei Dai Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 12180 Department

More information

Impact of Routing Overhead in A Real-Time MANET Environment

Impact of Routing Overhead in A Real-Time MANET Environment Impact of Routing Overhead in A Real-Time MANET Environment P. Chandra Sekhar M.R. Pavan Kumar B.Praveen Kumar Ch. Koteswararao chandu.0431@gmail.com sivapavan.mr@gmail.com Praveen.chou39@gmail.com chkoti518@gmail.com

More information

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks Radhu.R.Nair #1 T. K Parani *2 # Student, M.E Communication Systems engineering, Anna University DSCE Coimbatore, India *Assistant professor,

More information

Arvind Krishnamurthy Fall 2003

Arvind Krishnamurthy Fall 2003 Ad-hoc Routing Arvind Krishnamurthy Fall 2003 Ad Hoc Routing Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Overview (Advantages and Routing Protocols) of MANET

Overview (Advantages and Routing Protocols) of MANET Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 855-861 Research India Publications http://www.ripublication.com Overview (Advantages and Routing Protocols)

More information

Method for Handling Collisions of Broadcast Packets due to Hidden Node Problem

Method for Handling Collisions of Broadcast Packets due to Hidden Node Problem Method for Handling Collisions of Broadcast Packets due to Hidden Node Problem Rinki Sharma Department of Computer Engineering M.S. Ramaiah School of Advanced Studies, Bangalore rinki@msrsas.org Govind

More information

Vol. 2, Issue I, Jan ISSN

Vol. 2, Issue I, Jan ISSN Probabilistic Rebroadcast Protocol based on Neighbor Coverage to Reduce Routing Overhead in MANETs Shakeela Attikeri 1, Preeti Patil 2 1 Department of Computer Science and Engineering, Visvesvaraya University

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding

Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding Khaldoun Al Agha LRI, Paris XI University, Orsay, France Email: alagha@lri.fr

More information

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Fuzzy-Logic Based Probabilistic Broadcasting Technique for Mobile Adhoc Networks

Fuzzy-Logic Based Probabilistic Broadcasting Technique for Mobile Adhoc Networks www.ijcsi.org 165 Fuzzy-Logic Based Probabilistic Broadcasting Technique for Mobile Adhoc Networks Tasneem Bano 1 and Jyoti Singhai 2 1 Computer Science and Engineering, Maulana Azad National Institute

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

Reducing Routing Overhead In Manet Using Ncpr Protocol

Reducing Routing Overhead In Manet Using Ncpr Protocol Reducing Routing Overhead In Manet Using Ncpr Protocol Ms.Manjula.R 1, Mr.Santhosh.R 2 PG Scholar, Karpagam University, Coimbatore 1 Assistant Professor/CSE, Karpagam University, Coimbatore 2 ABSTRACT:

More information

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point International Journal of Computational Engineering Research Vol, 03 Issue5 Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point Shalu Singh

More information

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks 15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

AD hoc wireless networks (or simply ad hoc networks)

AD hoc wireless networks (or simply ad hoc networks) IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO. 10, OCTOBER 2004 1343 A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks Jie Wu, Senior Member, IEEE, and Fei Dai, Student Member, IEEE Abstract

More information

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols. MANET TECHNOLOGY Dharna 1, Varsha Saroha 2, R. B. Dubey 3 1,2,3 Department of Electronics and Communication Engineering, Hindu College of Engineering, Sonepat, Haryana,(India) ABSTRACT Wireless technology

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size Lovekesh Kumar / International Journal of Engineering Research and Applications (IJERA) ISSN: Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size Lovekesh Kumar* *(Department

More information

An Efficient Probability Based Broadcast Scheme for AODV Mobile ad-hoc Network Protocol

An Efficient Probability Based Broadcast Scheme for AODV Mobile ad-hoc Network Protocol An Efficient Probability Based Broadcast Scheme for AODV Mobile ad-hoc Network Protocol Komal Madan Department of Computer Science and Engineering NCCE, Israna, Haryana, India Sukhvir Singh Department

More information

Energy Efficient Broadcasting Using Sparse Topology in Wireless Ad Hoc Networks

Energy Efficient Broadcasting Using Sparse Topology in Wireless Ad Hoc Networks Energy Efficient Broadcasting Using Sparse Topology in Wireless Ad Hoc Networks Kousha Moaveninejad Xiang-Yang Li Keywords Wireless ad hoc networks, broadcasting, power consumption, spare structures, topology

More information

Mobile Ad-hoc Networks

Mobile Ad-hoc Networks Mobile Ad-hoc Networks Fred Baker 1 The manet problem Mobile Random and perhaps constantly changing Ad-hoc Not engineered Networks Elastic data applications which use networks to communicate 2 Examples

More information

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Fairness Example: high priority for nearby stations Optimality Efficiency overhead Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency

More information