Design and Performance-Study of Crash-Tolerant Protocols for Broadcasting and Supporting Consensus in MANETs
نویسندگان
چکیده
Self-organized collaborative applications in terrains with no infrastructure support for untethered communication are long known to be feasible only with the mobile ad-hoc networking (MANET) technology. Supporting collaboration however requires a solution to the consensus problem, using which collaborating users with different initial opinions can decide identically. Efficient consensus solutions require efficient broadcast support. This paper presents four crash-tolerant broadcast protocols which are designed (i) to provide the maximum broadcast coverage that can ever be guaranteed, and (ii) to suit a wide range of MANET types: from a connected MANET (no partitions) to intermittently disconnected one (partitions occurring rarely and healing swiftly) to an intermittently connected one (partitions taking longer to heal and re-appearing swiftly). The resulting design challenges are addressed systematically, beginning with formulating a MANET liveness property and deriving two foundational results that would guide the protocol design. The protocols’ performance is then studied through simulations for a range of node speeds and network densities. The one with the least overhead among them is used to host a known, randomized consensus protocol as a broadcast application. The consensus overhead and the latency are found to be surprisingly small even when each node has distinct initial opinion. The underlying reason is attributed to the specific characteristics of MANETs and the features of the broadcast protocol. keywords. Crash-tolerance, Ad-hoc networking, Partitions and Connectedness, Broadcasting, Consensus. ∗Tel: +44-191-222-8546, Fax: +44-191-222-8232
منابع مشابه
Secure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملComparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET
Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....
متن کاملDesign and performance study of algorithms for consensus in sparse, mobile ad-hoc networks
Mobile Ad-hoc Networks (MANETs) are self-organizing wireless networks that consist of mobile wireless devices (nodes). These networks operate without the aid of any form of supporting infrastructure, and thus need the participating nodes to co-operate by forwarding each other’s messages. MANETs can be deployed when urgent temporary communications are required or when installing network infrastr...
متن کاملEvaluating the Impact of Faults on Broadcasting Protocols for MANETs
Broadcasting in MANETs is a fundamental building block for dealing with routing and reaching consensus. In this kind of network, faults are commonplace. In spite of this, existing broadcast protocols are not adequate to deal with failures present in a real world scenario, such as link failures, network partitions, topology change during broadcasts and momentary node failures. Moreover, the ones...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کامل