A Practical Approach to Reliable Flooding in Mobile Ad hoc Networks

نویسندگان

  • Robert Sombrutzki
  • Anatolij Zubow
چکیده

Flooding in Mobile Ad hoc Networks (MANET) is an important communication primitive. It serves as a building block for higher layer protocols like content distribution, route discovery in routing protocols as well as used by services like Address Resolution Protocol (ARP) and Dynamic Host Configuration Protocol (DHCP). The nodes in real MANETs are not uniformly distributed. There are always dense and sparse parts in the network. For the dense parts of the network the redundancy provided by naive flooding is to high leading the packet loss due to collisions, wasting radio resources and thus need to be reduced. On the other hand, even in stationary networks without node mobility wireless links are lossy due to external and internal interference, fading or weak signal. Thus the transmission of a packet can fail. Both characteristics need to be considered when designing a flooding protocol. The proposed flooding scheme operates using purely local information about the network topology and is therefore in contrast to methods which rely on an overlay routing structures suitable for MANETs. It achieves a very high reliability while still being efficient as follows. First, we repeat the transmission of the flooding message at the network layer as long as we find strongly connected neighboring nodes which so far have not successfully received the flooding message. In each iteration the most promising neighboring node is selected according to a novel metric. Second, to achieve a high reliability we use unicasting at the link-layer for the transmission of flooding messages to the selected peer node. This allows us to compensate for dropped flooding messages due to lossy links or MAC collisions and allows us to adapt the level of redundancy in order to improve reachability while keeping the message overhead low. As long as the selected peer does not successfully acknowledge the packet reception or a passive acknowledgment was overheard the MAC transmission is repeated. Third, to achieve an efficient solution we piggyback flooding messages with the address of nodes we expect that they will receive the flooding message which is feasible due to the used link-layer unicasting. The proposed peer selection metric is of low complexity and thus can be computed on a per packet basis. The proposed flooding scheme can be implemented on top of existing IEEE 802.11 or 802.15.4 PHY/MAC stacks without any modifications. Results from extensive network simulation show that the proposed scheme is able to achieve a reachability of close to one even in very challenging networks where all other known methods fail. Moreover, our proposed scheme is able to achieve a high reachability in a very efficient way with low delay, e.g. in challenging networks the best known solutions requires up to four times more MAC transmissions to achieve the same level of reachability.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR

Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks

In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...

متن کامل

Energy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization

Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...

متن کامل

Energy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization

Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014