Efficient Flooding in Mobile Ad Hoc Networks
نویسندگان
چکیده
Flooding is one of the most fundamental operations in mobile ad hoc networks. Different from broadcast that requires a broadcast routing for transmission of large amount data, flooding is the one-off operation which is usually used for dissemination of control packets. Most of the major routing protocols rely on flooding for disseminating route discovery, route maintenance, and topology update packets. However, pure flooding in which each node retransmits the packet once suffers from the problems of excessive redundancy of messages, resource contention, and signal collision. A lot of efficient flooding schemes have been proposed to avoid these problems. The chapter investigates existing solutions on efficient flooding schemes, and classifies these solutions into three categories based on the information each node keeps: 1) no need of neighbor information; 2) 1-hop neighbor information; 3) 2-hop or more neighbor information. We focus on the most representative works in each category, and discuss various algorithms, protocols, and techniques which make flooding more efficient. Challenges and future work are pointed out at the end.
منابع مشابه
Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR
Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...
متن کاملIntuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks
In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...
متن کاملEnergy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization
Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...
متن کاملEnergy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization
Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...
متن کاملMulticast Routing in Mobile Ad hoc Networks Using Source Grouped Flooding
In this paper, we address the multicast routing problem for mobile ad hoc networks (MANETs). We present the Source Grouped Flooding approach to achieve multicast in MANETs. The protocol creates multiple multicast routes between the source and group members based on hop count distance constraints. We also propose a probabilistic data forwarding mechanism to achieve efficient data dissemination. ...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کامل