Hitting time analysis for a class of random packet forwarding schemes in ad hoc networks
نویسندگان
چکیده
In this paper we study the problem of searching for a node or a piece of data in an ad hoc network using random packet forwarding. In particular, we examine three different methods. The first is a random direction forwarding scheme where the query packet is forwarded along a randomly chosen direction (following an approximate straight line) till it either hits the destination node (the target) or the boundary. It bounces off the boundary in the latter case and the process continues till the target is found. In the second approach, in addition to query packet traversing the network, the target releases an advertisement packet that propagates along a randomly chosen direction so that all nodes visited by the advertisement packet obtain and store the target location information. In the third method the query packet is assumed to follow a random walk type of forwarding. Our primary interest is in comparing the average hitting time under these methods and the memory required to store location information. In particular, we show that under the random direction forwarding the target hitting time is Θ( a 2 b ), where a and b denote the size/radii of the network and the target area, assumed to be circular in shape, respectively. The hitting time is Θ(a) with target advertisement, and Θ(a log a b ) under the random walk type of forwarding. We further show that the target advertisement method achieves mean hitting time on the same order as greedy forwarding schemes with less memory requirement. We discuss practical implementation issues of these methods and provide simulation results on their performance under more realistic settings. Index Terms Wireless sensor networks, ad hoc networks, data search, random forwarding, routing with uncertainty, random walk This work was supported in part by the Engineering Research Centers Program of the National Science Foundation under NSF Award EEC-9986866, and NSF grant ANI-0238035.
منابع مشابه
A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملCluster Based Cross Layer Intelligent Service Discovery for Mobile Ad-Hoc Networks
The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...
متن کاملThe Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks
Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...
متن کاملHybrid Packet-Pheromone-Based Probabilistic Routing for Mobile Ad Hoc Networks
Ad-Hoc networks are collections of mobile nodes communicating using wireless media without any fixed infrastructure. Minimal configuration and quick deployment make Ad-Hoc networks suitable for emergency situations like natural disasters or military conflicts. The current Ad-Hoc networks can only support either high mobility or high transmission rate at a time because they employ static approac...
متن کاملRegular Tiling Based Flooding Scheme for Energy Efficiency in Wireless Ad Hoc Networks
Flooding is a fundamental operation in wireless ad hoc networks to propagate control messages in the entire network. The traditional flooding scheme generates excessive packet retransmissions, resource contention, and collisions since every node forwards the packet at least once. Several flooding schemes have been proposed to avoid these problems. However, these unnecessary forwarding nodes rem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Ad Hoc Networks
دوره 7 شماره
صفحات -
تاریخ انتشار 2009