Resource aware information dissemination in ad hoc networks
نویسندگان
چکیده
Information dissemination (flooding) forms an integral part of routing protocols, network management, service discovery and information collection (sensing). Given the broadcast nature of ad hoc network communications, information dissemination provides a challenging problem. This paper introduces Utility Based Flooding (UBF). UBF is a distributed optimised flooding mechanism for ad hoc networks that unlike existing optimised flooding algorithms is fully resource aware. Resource awareness is achieved by assigning a forwarding utility to neighouring nodes to determining the desirability of a neighbouring node in continuing a flood. UBF is particularly applicable to ad hoc network environments composed of heterogeneous nodes that may have varying characteristics and constraints. In this paper, UBF is compared to existing flooding mechanisms in a constrained environment. Nodes are assigned varying degrees of remaining battery power and user based constraints that limit a nodes benevolence based upon its remaining battery power. We show through simulation that UBF compared to Utility Based Multipoint Relay (UMPR) flooding, Multipoint Relay (MPR) flooding and Blind flooding significantly improves broadcast reachability over successive broadcasts, does not adversely affect performance and extends the lifetime of the network. UBF delivers packets to over 90% of nodes in the network for over 70 successive broadcasts. Blind flooding, UMPR and MPR are only able achieve 42, 39 and 23 successive broadcasts respectively.
منابع مشابه
A Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks
Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...
متن کاملEnergy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization
Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...
متن کاملEnergy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization
Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...
متن کاملIntuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks
In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کامل