Proposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting

Similar documents
Proposal of interference reduction routing for ad-hoc networks

A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels

Evaluation of adaptive rate control scheme for ad-hoc networks in fading environments

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Multicast over Vehicle Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Comparison of MANET (Mobile Ad hoc Network) Protocols (ODMRP with AMRIS and MAODV)

MULTICASTING IN MANET USING THE BEST EFFECTIVE PROTOCOLS

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

#$% * #$%+ $ (% Enables community-centric applications: Military and law enforcement. Search and rescue applications.

A Performance Comparison of Multicast Routing Protocols In Ad hoc Networks

High-Throughput Multicast Routing Metrics in Wireless Mesh Networks

An Efficient Proactive Routing Method for Mobile Ad Hoc Networks using Peer-to-Peer and Cellular Communication System

Comparison of MANET Multicast Routing Protocols by Varying Number of Nodes

Preemptive Multicast Routing in Mobile Ad-hoc Networks

Multicasting in Ad-Hoc Networks: Comparing MAODV and ODMRP

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

RMAC: A Reliable Multicast MAC Protocol for Wireless Ad Hoc Networks

E-ODMRP: Enhanced ODMRP with Motion Adaptive Refresh

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

QoS-aware Multicast Ad hoc On-Demand Distance Vector Routing

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks

Bandwidth-Efficient Multicast Routing for Multihop, Ad-Hoc Wireless Networks *

A Hybrid Topology based Multicast Routing for Cognitive Radio Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

An Intelligent Mesh Based Multicast Routing Algorithm for MANETs using Particle Swarm Optimization

An Energy-Efficient MAC using Dynamic Phase Shift for Wireless Sensor Networks

Recent Researches in Communications, Information Science and Education

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Application Layer Multicasting for Mobile Ad-Hoc Networks with Network Layer Support

A Survey on Modified RTS/CTS Mechanism

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Sybil Attack In High Throughput Multicast Routing In Wireless Mesh Network

Efficient & Robust Multicast Routing Protocol in Mobile Adhoc Network

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

Modified On-Demand Multicasting Routing Protocol for Ad Hoc Networks

Improvement of on Demand Multicast Routing Protocol in Ad Hoc Networks to Achieve Good Scalability and Reliability

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

A Cooperative Framework for Reliable Multicast Forwarding in Mobile Ad hoc NETworks

On-Demand Multicast Routing Protocol with Multipoint Relay (ODMRP-MPR) in Mobile Ad-Hoc Network

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

IETF 75 - MANET WG Routing Loop Issue in Mobile Ad Hoc Networks

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks

Review of Medium Access Control protocol for MANET

MAC RELIABLE BROADCAST IN AD HOC NETWORKS

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

Keywords-MANETs, Multicast mode, Clustering, Inter-domain routing.

Mobile Communications. Ad-hoc and Mesh Networks

An Extended AODV Protocol for Multipath Routing in MANETs

Performance Comparison of Routing Protocols for wrecked ship scenario under Random Waypoint Mobility Model for MANET

A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks

Addressing Asymmetric Link in Wireless Mesh Networks

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

RMAC: A New MAC Protocol with Reliable Multicast Support for Wireless Ad-Hoc Networks

Routing Protocols in Mobile Ad-Hoc Network

Figure 1: Ad-Hoc routing protocols.

A Reliable Extension to the ODMRP Ad Hoc Multicast Protocol

2013, IJARCSSE All Rights Reserved Page 85

An Efficient Group Communication Protocol for Mobile Robots

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

WITH the increase in the bandwidth of wireless channels

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks

E-ODMRP:Enhanced ODMRP with Motion. Adaptive Refresh

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

Evaluating the Performance of a Demand-Driven Multicast Routing Scheme in Ad-Hoc Wireless Networks

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Impact of Route Selection Metrics on the Performance of On-Demand Mesh-based Multicast Ad hoc Routing

TECHNICAL RESEARCH REPORT

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Receiver Based Multicasting Protocol for Wireless Sensor Networks

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks

Effectiveness of DSDV Protocol Under Hidden Node Environment

A Multi-Channel Medium Access Control Protocol for Multicast in Mobile Ad-hoc Network

Mobile Ad Hoc Networking (MANET) Intended status: Experimental Expires: August 18, UtopiaCompression Corporation A.

Scalable Position-Based Multicast for Mobile Ad-hoc Networks

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks

28 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 1, JANUARY Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs

MIMO-CAST: A CROSS-LAYER AD HOC MULTICAST PROTOCOL USING MIMO RADIOS

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Analysis of S-MAC/T-MAC Protocols for Wireless Sensor Networks

An Implementation Study of the AODV Routing Protocol

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN

Effect of Radio-Wave Propagation Model On Network Performance With AODV Routing Protocol For IL-VANET

Transcription:

Proposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting Katsuhiro Naito, Yasunori Fukuda, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic Engineering, Mie University 1577 Kurimamachiya, Tsu, Mie, 514-857, Japan, {naito, kmori, koba}@elec.mie-u.ac.jp OMRON Corporation Shiokoji Horikawa, Shimogyo-ku, Kyoto, 6-853, Japan, yasunori fukuda@omron.co.jp ABSTRACT In this paper, we propose an autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting. In ad hoc multicasting, packet collisions due to hidden node problems at upstream nodes cause packet losses at all downstream nodes. Therefore, collision avoidance mechanisms are important to improve packet delivery ratio at destination nodes. In this paper, we extend an On-Demand Multicast Routing Protocol () as a base multicast routing protocol to implement transmission timing control mechanisms. In the proposed protocol, each node constructs a neighbor-node list, and informs the neighbor node list to its own upstream node. As a result, upstream nodes can detect their hidden nodes by using these neighbor-node lists from their downstream nodes. Then, each node can select different transmission timing autonomously not to conflict the transmission timing. From the simulation results, it is shown that the proposed method can achieve high data delivery ratio by reducing packet corruptions. Keywords: Ad hoc networks, Multicast, Routing, Hidden nodes, Transmission timing control 1 Introduction An ad hoc network is a dynamic autonomous wireless network formed by mobile devices with wireless communication capability. Due to a limited radio propagation range of wireless devices, each node behaves as a router as well as an end host. Therefore, end-to-end communication is performed by multi-hop communication. In order to achieve the multihop communication, each node requires a routing protocol for route construction. Several routing protocols have been proposed in recent years for ad hoc networks [1]. Various applications are focused in ad hoc networks. Multicast communication is required for new type applications such as a video streaming. Multicasting in ad hoc networks faces many challenges due to changes in network topology and features in wireless communication environment. Therefore, conventional routing protocols for wired networks cannot apply to ad hoc networks. Some multicast routing protocols have been newly proposed for ad hoc networks [2], [3]. IEEE 82.11 is a candidate device for forming ad hoc networks [4]. Generally, unicast mode communication can avoid collisions due to hidden node problems by using RTS (Request To Send) / CTS (Clear To Send) mechanisms. Meanwhile, broadcast mode communication is used for multicasting in the IEEE 82.11 systems. Since a sender node only performs channel sensing in the broadcast mode communication, it is difficult to avoid collisions due to hidden node problems [5] [7]. Moreover, some nodes transmit same data packets at same timing in multicasting. Therefore, the hidden node problems cause many packet losses due to collisions. Additionally, almost all multicast routing protocols construct a tree based topology. So one packet loss on an upstream node means many packet losses on all downstream nodes [8]. In order to achieve reliable broadcast communication, various Media Access Control (MAC) multicast protocols have been recently proposed [9], [1]. Some of these schemes extend basic IEEE 82.11 control mechanisms, such as RTS/CTS and ACK for unicast communication, to broadcast communication. However, these schemes require modifications of a frame format or a hardware. Additionally, routing mechanisms for solving these issues have not been considered in detail [11]. In this paper, we propose an autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting. In the proposed scheme, each node constructs a neighbor-node list to collect neighbor node information. Then, it informs the neighbor-node list to its own upstream node. The upstream node detects its hidden nodes by checking the neighbor-node lists from its downlink nodes. Then, it controls its transmission timing not to conflict hidden node s transmission timing. As a result, the proposed scheme can avoid packet corruption due to hidden node problems. The numerical results show that the proposed scheme can achieve the high delivery ratio.

2 In the proposed scheme, we utilize an On-Demand Multicast Routing Protocol () [12] as a base multicast routing protocol. is a mesh based routing protocol for ad hoc multicasting, and uses the forwarding group concept. builds routes on demand and uses a mesh to create multicast routes. A soft-state approach is taken in to maintain multicast members. When a multicast source has packets to send, it broadcasts a Join-Query control packet to a entire network. Join-Query packets are periodically broadcast to refresh membership information and update routes. When intermediate nodes receive Join-Query packets, they store a source node ID and a sequence number in its message cache to detect any duplication of Join-Query packets. The routing table is updated with an upstream node ID from messages which were received for a reverse path back to the source node. If Join-Query packets are not a duplicate and a Time-To-Live (TTL) value is greater than zero, they will be rebroadcast. When multicast destinations receive Join-Query packets, they create and transmit a Join-Reply control packet to their upstream node. When nodes receive the Join-Reply packets, they check whether their own node ID matches the next hop node ID within the Join-Reply packets. If it does, the nodes recognize that they should be forwarding group nodes. Therefore, they set a FG-flag and broadcast the Join-Reply packets. The Join-Reply packets are propagated by each forwarding group member until they reach the multicast source node. 3 Transmission Timing Control Scheme In ad hoc multicasting, some forwarding group nodes forward same data packets simultaneously. Therefore, transmitted data packets will be corrupted if hidden node problems occur between forwarding group nodes. Figure 1 shows the example communication with hidden node problems. In this figure, the source node communicates with two intermediate nodes. The first intermediate node communicates with the first destination node and the second destination node. The second intermediate node communicates with the second destination node and the third destination node. In this example, hidden node problems occur between the first intermediate node and the second intermediate node. In ad hoc multicasting, intermediate nodes forward data packets from upstream nodes. Therefore, the first intermediate node and the second intermediate node forward the same data packets from the source node simultaneously in Fig. 1. As a result, the first destination node can receive the data packet from the first intermediate node, and the third desti- de 1 de 1 Source de Hidden de P ack et C orrup tion de 2 de 2 de 3 Figure 1: Data packet corruption due to hidden node problems. nation node can receive it from the second intermediate node. But, the second destination node cannot receive it due to the packet collision according to hidden node problems. In this paper, we propose the autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting. The proposed protocol is extended based on to detect hidden nodes, and controls transmission timing not to conflict data packet transmission. 3.1 Construction of neighbor-node list In order to detect hidden nodes at intermediate nodes, all downstream nodes construct a neighbor-node list in the proposed protocol. The neighbor-node list is constructed due to received Join-Query packets. Figure 2 shows a flow chart when a node receives Join-Query packets. If the node receives Join-Query packets, it stores a previous hop IP address into its own neighbor-node list. Then, it tries to detect any duplication by checking a sequence number within the Join-Query packets. If the received Join-Query packet is not duplicate, the node stores a hop count value into a message cache. Finally, it increments the hop count value in the Join-Query packet. Then, the Join-Query packet will be rebroadcast. If the node is destination nodes, it continues the reception of Join-Query packets for a given length of time. As a result, it collects neighbor node information and constructs the neighbor-node list. After a certain period of time, it transmits a Join-Reply packet including the neighbor-node list to its own upstream node. 3.2 tification of the neighbor-node list If a destination node receives Join-Query packets, it broadcasts a Join-Reply packet including a neighbor-node list and

Receive a Join Query Receive a Join Reply Add the previous hop IPaddress to own list Own IP address is included in the next hop IP address? Join Query is duplicated? Yes Y es Cache the hop count Own hop count is less than a hop count in the Join Reply? Y es Discard the Join Reply Update routing information Compare the own list with the list in Join Reply Member of multicast address? Detect a hidden node in the list in Join Reply? Yes Y es Update the routing table Set a transmission delay time Increment the hop count & decrement the TTL Set a FG flag Rebroadcast the Join Reply The TTL is larger than Discard the Join Query Figure 3: Flow chart for Join-Reply packet. Yes Rebroadcast the Join Query Figure 2: Flow chart for Join-Query packet. its own hop count value. Therefore, we extend a frame format of the Join-Reply packets in Fig. 4. The new frame format of the Join-Reply packets has fields for neighbor IP addresses. Figure 3 shows a flow chart when a node receives Join-Reply packets. If a node receives Join-Reply packets, it compares its own hop count value with the hop count value within the Join-Reply packets. If the hop count value in Join- Reply packets is larger than its own hop count value, the node recognizes that the Join-Reply packets were broadcasted by downstream nodes. In this instance, it then compares the own neighbor-node list and the neighbor-node list within the Join- Reply packets. If it detects new node addresses, which are not included in its own neighbor-node list, the detected new nodes are hidden nodes against own node. Therefore, data packets may be corrupted at downstream nodes. In the proposed pro- tocol, each node selects delay duration according to an index value of its own node address in the neighbor-node list. The delay duration is calculated by the following equation. T wait = T T rans N index α, (1) where T T rans is the transmission duration of data packets, N index is the index number of its own node address in the neighbor-node list of the Join-Reply packets, and α is the constant value for delay-duration margin not to overlap transmission duration of each node. In addition, hidden nodes also detect their own node address in the neighbor-node list. Therefore, they also set the delay duration according to the index value of the hidden node address in the neighbor-node list. Furthermore, nodes select a new index value not to conflict transmission timing in different neighbor-node lists when it receives some Join-Reply packets from some hidden nodes. As a result, nodes with hidden node problems can select the different delay-duration according to neighbor-node lists from downstream nodes. Moreover, the source node broadcasts Join-Query packets

Type Count RF Hop Count Multicast Group IP Address Previous Hop IP Address Sequence Number Neighbor IP Address[1] Sender IP Address[1] Next Hop IP Address[1] Route Expiration Time[1] Neighbor IP Address[n] Sender IP Address[n] Next Hop IP Address[n] Route Expiration Time[n] de 1 (IP-4) de 1 () NNL() IP-1 IP-4 IP-5 NNL(IP-4) TX with Delay Source de (IP-1) NNL(IP-1) NNL(IP-5) NNL(IP-5) de 2 (IP-5) NNL(IP-5) de 2 () TX with Delay 1 NNL() IP-1 IP-5 IP-6 NNL(IP-6) de 3 (IP-6) Figure 4: Frame format of Join-Reply packet. periodically to update routing information. The delay duration is also changed if new Join-Reply packets, which are related to new Join-Query packets, are received. Therefore, the proposed protocol can update appropriate delay duration if node topology is changed by node movement. 3.3 Data delivery In the proposed protocol, we focus on transmission timing of intermediate nodes with same hop count value from a source node. This is because a hop count value is same, reception timing of data packets is also same. Therefore, intermediate nodes transmit same data packets at same instance if relation between intermediate nodes is hidden node condition. Consequently, intermediate nodes delay data packet forwarding according to set up delay duration. The delay duration is set up by exchanging Join-Query packets and Join-Reply packets. As a result, nodes can avoid data packet collisions at downstream nodes if they have hidden nodes. Additionally, delay time in the proposed protocol is not long because the delay duration is set as multiple transmission duration for one packet and margin duration. 3.4 Example operations Figure 5 shows example operations of the proposed protocol. In this figure, dot circles mean the communication ranges of each node, arrowed dot lines mean the Join-Query packets, and arrowed lines means the Join-Reply packets. In this example, the source node can communicate with the first intermediate node and the second intermediate node. But, these two intermediate nodes cannot communicate with each Figure 5: Example operations. other directly. Therefore, hidden node problems occur between the first intermediate node and the second intermediate node. The first intermediate node can communicate with the first destination node and the second destination node. The second intermediate node can communicate with the second destination node and the third destination node. The two intermediate nodes transmit the data packets if the source node transmits the data packet in multicasting. The first destination node and the third destination node can receive the data packet. However, the second destination node cannot receive the data packet due to collision if the first intermediate node and the second intermediate node transmit the data packets at the same instant. In the proposed protocol, the source node broadcasts the Join-Query packet. Then, the first intermediate node and the second intermediate node rebroadcast the Join-Query packets. Finally, all destination nodes also rebroadcast them. As a result, each node can construct the neighbor-node list like as the lists in Fig. 5. In this example, we assume that the first intermediate node broadcasts the Join-Query packet first, and the second intermediate node broadcasts it secondly. This is because transmission timing of each node is selected due to carrier sense multiple access (CSMA) mechanisms. In the assumption, the second destination node selects the first intermediate node as an upstream node. If the first intermediate node receives the Join-Reply packet from the second destination node, it compares hop count values of its own node and the second destination node. In this figure, the hop count value of the first intermediate node is one and the hop count value of the second destination node is two. Therefore, the first intermediate

Table 1: Simulation parameters. Simulator QualNet Simulation time 3 [s] Simulation trial 1 [times] Number of nodes 1 [nodes] de positions Random de mobility ne Area 1 1, 125 125 [m] Application CBR 128K [bps] Size of data packet 124 [Byte] Transmission interval 65 [ms] Queuing delay 15 [ms] Refresh time 5 [s] Wireless device IEEE 82.11g Transmission rate 54M [bps] Transmission range 2 [m] Propagation model Free space Wireless environment AWGN Routing protocol, protocol node compares the neighbor-node list of its own node and the neighbor-node list in the Join-Reply packet from the second destination node. In the example, the neighbor-node list of the first intermediate node includes IP-1, IP-4 and IP-5, and the neighbor-node list of the second destination node includes and. As a result, the first intermediate node can find that the neighbornode list of its own node does not include the node address of, and it recognizes the second intermediate node with the node address of according to the Join-Reply packet from the second destination node. The index number of the address in the neighbor-node list is zero. So, the delay duration of the first intermediate node is set to [s]. 4 Numerical results In this section, we compare performance for the proposed protocol with that for the conventional protocol. The simulations are performed by the network simulator QualNet [13]. In the simulations, we assume the IEEE 82.11g as the wireless communication device, and the transmission rate is fixed at 54M [bps]. One hundred nodes are placed randomly in 1 1 [m] or 125 125 [m] area. The source and the destination nodes are selected randomly. The application is a constant bit rate (CBR) with 128K [bps] and data packets with the length of 124 [Byte] are transferred for 3 [s]. We consider additive white gaussian noise (AWGN) environment and a free space propagation model. In the proposed protocol, nodes receive some Join-Query packets and stores them for rmalized number of collisions.1.8.6.4.2 1 2 3 4 5 6 7 8 9 1 Figure 6: rmalized collisions at multicast group(1 1[m]) rmalized number of collisions.6.5.4.3.2.1 1 2 3 4 5 6 7 8 9 1 Figure 7: rmalized collisions at multicast group(125 125[m]) queuing delay to construct a neighbor-node list. The queuing delay is set to 15 [ms] in the simulations. The simulation results are an average of 1 trials of simulation. Simulation parameters are shown in detail in Table 1. Figures 6 and 7 show the normalized number of collisions at the multicast group nodes. The multicast group nodes mean the group of the source node, intermediate nodes, and destination nodes. The normalized number of collisions defines that the number of collision packets from the multicast group nodes is divided by the number of transmitted packets from the multicast group nodes. From results, we can find that the number of collisions increases according to increasing in the number of destination nodes. The reason for this is that the number of multicast group nodes also increases, and the number of transmitted packets also increases. Therefore, the packet collision probability also increases. From these figures, the proposed protocol can reduce the number of colli-

.1 1 rmalized number of collisions.8.6.4.2 Packet delivery ratio.8.6.4.2 1 2 3 4 5 6 7 8 9 1 Figure 8: rmalized collisions at all nodes(1 1[m]) 1 2 3 4 5 6 7 8 9 1 Figure 1: Packet delivery ratio(1 1[m]).6 1 rmalized number of collisions.5.4.3.2.1 Packet delivery ratio.8.6.4.2 1 2 3 4 5 6 7 8 9 1 1 2 3 4 5 6 7 8 9 1 Figure 9: rmalized collisions at all nodes(125 125[m]) Figure 11: Packet delivery ratio(125 125[m]) sions. Moreover, the performance is improved more according to increasing in the number of destination nodes. This is because the proposed protocol can detect hidden nodes and can control the transmission timing not to conflict data packets. Additionally, the number of hidden nodes also increases according to increasing in the number of destination nodes. Figures 8 and 9 show the normalized number of collisions at all nodes. The normalized number of collisions defines that the number of collision packets from all nodes is divided by the number of transmitted packets from all nodes. From results, it is shown that the proposed protocol can reduce number of collision packets. Moreover, the number of collision packets increases a little according to increasing in the number of destination nodes. This is caused by the proposed protocol can recognize hidden nodes better according to increasing of the destination nodes. Figures 1 and 11 show the packet delivery ratio. From results, the proposed protocol can improve the packet delivery ratio more than ten percent. In ad hoc multicasting, a packet corruption at the upstream node means the packet losses at the downstream nodes. Therefore, it is important to avoid the packet corruption at upstream nodes. 5 Conclusions In this paper, we have proposed an autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting. The proposed protocol is extended protocol based on. The node can recognize hidden nodes for its own node by exchanging the neighbor-node list between nodes. Then, it can autonomously control the adequate transmission timing to avoid collisions between hidden nodes and own node. From simulation results, it is shown that the proposed protocol can improve the packet delivery ratio by reducing the number of collisions in the whole networks.

Acknowledgment This work was supported by Grant-in-Aid for Young Scientists (B)(2759), Japan Society for the Promotion of Science (JSPS). REFERENCES [12] Sung-Ju Lee, William Su, Mario Gerla, On-Demand Multicast Routing Protocol () for ad hoc networks, Internet-Draft, draft-ietf-manet-odmrp-2.txt, Jan. 2. [13] Network Simulator Qualnet is http://www.scalablenetworks.com/ [1] H. Y. Hsieh and R. Sivakumar, Performance comparison of celluar and multi-hop wireless networks: A quantitative study, Proc. ACM SIGMETRICS, pp. 113 122, Boston, MA, USA, June. 21. [2] C. d. M. Cordeiro, H. Gossain, and D. P. Agrawal, Multicast over Wireless Mobile ad hoc networks: Present and Future Direction, IEEE Network January/February 23. [3] K. Viswanath, K. Obraczka, and G. Tsudik, Exploring Mesh and Tree- based Multicast. Routing Protocols for MANETs, IEEE Transactions on Mobile Computing, vol. 5, no. 1, pp. 28 42, Jan. 26. [4] K. Tang, and M. Gerla, Random Access MAC for Efficient Broadcast Support in ad hoc networks, IEEE Wireless Communications and Networking Conference (WCNC 2), pp. 454 459, Sept. 2. [5] S. Gupta, V. Shankar, and S. Lalwani, Reliable Multicast MAC Protocol for Wireless LANs, IEEE ICC 3, vol. 1, pp. 93 97, 27. [6] W. Si, and C. Li, RMAC: A Reliable Multicast MAC Protocol for Wireless adhoc networks, IEEE International Conference on Parallel Processing (ICPP 4), vol. 1, pp. 494 51, Aug. 24. [7] C.Y. Chiu, E.H.-K. Wu, Y. Wang, and G.-H. Chen, A Reliable and Efficient MAC Layer Broadcast Protocol for Mobile ad hoc networks, IEEE Transactions on Vehicular Technology, vol.56, no.4, pp.2296 235, July 27. [8] X. Wang, L. Wang, Y. Wang, and D. Gu, Reliable Multicast Mecha- nism in WLAN with Extended Implicit MAC Acknowledgment, IEEE Vehicular Technology Conference 28, pp. 2695 2699, 28. [9] K. Lee and D. Cho, A multiple access collision avoidance protocol for multicast service in mobile ad hoc networks, IEEE Communications Letters, vol. 7, no. 1, pp. 58 51, Oct. 23. [1] K. S. Lau and C. W. Pao, Collision Avoidance and Recovery for Multicast Communications in ad hoc networks, IEICE transactions on communications, vol. E88-B, no.7 pp. 2937 2943, Jul. 25. [11] M. Pandey and D. Zappala, A Scenario-Based Evaluation of Mobile Ad Hoc Multicast Routing Protocols, July. 24.