首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The control and routing performances of mobile ad hoc networks (MANETs) depend upon the efficiency of the network-wide broadcasting schemes that are in place. Ad hoc networks are often characterized by poor infrastructure quality, limited resources, dynamic variation and a need for mobility; therefore, ease of deployment, adaptability and potential for energy-savings are the primary drivers considered in the design of typical broadcasting schemes. This paper proposes a distributed intelligent broadcasting protocol (DIBP) that is capable of dynamically determining the broadcasting nodes in a MANET, based upon the distribution of network nodes. This eliminates the need for active network monitoring and periodical maintenance is not required. In addition, the distributed intelligent broadcasting protocol employs an adjustable parameter for determining the broadcasting node, broadcasting timing and the number of broadcasting nodes. This parameter can be changed dynamically based on different operational requirements; such as energy savings, hop count, network delay and other similar targets. Simulations of networks employing the protocol yield results showing that the DIBP performs better in terms of delivery delay, number of rebroadcast nodes, and delivery ratio.  相似文献   

2.
《Ad hoc Networks》2007,5(5):531-546
Broadcasting is a commonly used communication primitive needed by many applications and protocols in mobile ad hoc networks (MANET). Unfortunately, most broadcast solutions are tailored to one class of MANETs with respect to node density and node mobility and are unlikely to operate well in other classes. In this paper, we introduce hypergossiping, a novel adaptive broadcast algorithm that combines two strategies. Hypergossiping uses adaptive gossiping to efficiently distribute messages within single network partitions and implements an efficient heuristic to distribute them across partitions. Simulation results in ns-2 show that hypergossiping operates well for a broad range of MANETs with respect to node densities, mobility levels and network loads.  相似文献   

3.
As mobile ad hoc networks (MANETs) are emerging as important components in critical and large-scale applications, it is crucial to develop MANET routing mechanisms with provably low complexity. In this paper, we give a tutorial overview of the efficient use of elementary node clustering and route request broadcast mechanisms for low-complexity MANET routing. We explain these mechanisms with illustrative examples and discuss their theoretical performance characteristics. We demonstrate that node clustering with constant density and route request broadcasting with a doubling radius technique over the network of cluster leaders can be employed for MANET routing with theoretically proven low complexity. Moreover, we contrast these efficient elementary clustering and route request broadcast mechanisms with clustering and route information accumulation mechanisms in the widely studied AODV and DSR routing protocols and discuss the implications of these various mechanisms for scalable MANET routing.  相似文献   

4.
丛佩丽  赵恒 《电信科学》2016,32(10):110-116
在移动自组织网络中,基于移动节点地理位置辅助信息,提出了一种新的泛洪算法——位置辅助泛洪改进算法(ILFA),ILFA通过节点位置信息重传广播分组并有效控制网络流量。此外,将ILFA应用于经典MANET源路由(dynamic source routing,DSR)协议中,通过限定请求区域和期望区域等限制路由发现的有效范围,进而通过设置提名广播重传邻居列表限定路由请求分组重传范围,有效减小DSR路由寻路分组的传播次数。仿真结果证明,和传统泛洪方案相比,ILFA能够有效减小DSR路由协议的路由开销并提升MANET吞吐量。  相似文献   

5.
Nodes in a computer network often require a copy of a message to be delivered to every node in the network. The network layer can provide such a service, referred to as network‐wide broadcast routing or simply ‘broadcasting’. Broadcasting has many applications, including its role as a service to many routing protocols. In a mobile ad hoc network (MANET), simplistic broadcast schemes (such as flooding) inundate the network with redundancy, contention, collision, and unnecessary use of energy resources. This can prevent broadcasts from achieving their primary objective of maximizing delivery ratio, while also considering secondary objectives, such as balancing energy resources or reducing the network's burden on congested or busy nodes. As a solution, we propose multiple‐criteria broadcasting (MCB). In MCB, the source of each broadcast specifies the importance assigned to broadcast objectives. Network nodes use these priorities, along with local and neighbor knowledge of distributed factors, to broadcast in accordance with the objective priorities attributed to the message. Using ns2, the performance of MCB is evaluated and compared to that of other broadcast protocols. To present knowledge, MCB constitutes the first reconfigurable, multi‐objective approach to broadcasting. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

6.

Broadcasting is an important phenomenon, because it serves as simplest mode of communication in a network, via which each node disseminates information to their neighboring nodes simultaneously. Broadcasting is widely used in various kind of networks, such as wireless sensor networks, wireless networks, and ad-hoc networks. Similarly, in cognitive radio networks (CRNs), broadcasting is also used to perform many tasks including neighbor discovery, spectrum mobility, spectrum sharing, and dissemination of message throughout the network. The traditional approach that has been used as broadcasting in CRNs is simple flooding in which a message is disseminated in the network without any strategy check. Simple flooding can cause major setbacks in the network, such as excessive redundant rebroadcasts, and collision drops which collectively are termed as broadcast storm problem. To reduce the effects of broadcast storm problem in wireless networks, we propose and compare four broadcasting strategies for cognitive radio networks in this paper. These four strategies are: (1) probability based, (2) counter based, (3) distance based, and (4) area based. Extensive NS-2 based simulations are carried out on different threshold values for each broadcasting strategy. After experimental evaluation, it is demonstrated that counter based broadcasting surpasses other broadcasting strategies by achieving maximum delivery ratio of 60% and by decreasing redundant rebroadcasts and collision drops up to 44 and 37% respectively.

  相似文献   

7.
Exploring mesh and tree-based multicast. Routing protocols for MANETs   总被引:2,自引:0,他引:2  
Recently, it became apparent that group-oriented services are one of the primary application classes targeted by MANETs. As a result, several MANET-specific multicast routing protocols have been proposed. Although these protocols perform well under specific mobility scenarios, traffic loads, and network conditions, no single protocol has been shown to be optimal in all scenarios. The goal of this paper is to characterize the performance of multicast protocols over a wide range of MANET scenarios. To this end, we evaluate the performance of mesh and tree-based multicast routing schemes relative to flooding and recommend protocols most suitable for specific MANET scenarios. Based on the analysis and simulation results, we also propose two variations of flooding, scoped flooding and hyper flooding, as a means to reduce overhead and increase reliability, respectively. Another contribution of the paper is a simulation-based comparative study of the proposed flooding variations against plain flooding, mesh, and tree-based MANET routing. In our simulations, in addition to "synthetic" scenarios, we also used more realistic MANET settings, such as conferencing and emergency response.  相似文献   

8.
Mobile ad hoc networks (MANETs) own a flexible framework with the absence of a server, where conventional security components fail to compensate the level of MANET security conditions since it is confined to a particular environment, its data transfer potential, and battery and memory constrains. MANET provides a well‐grounded path and an efficiency in communication, but the confidentiality of the trust parameters remains a great challenge since it may be overheard by the impostor. This demands the need of exchanging the encrypted mathematical values. The proposed machine learning security paradigm provides firm and trustworthy network in spite of establishment over additional network platform. The QoS is improved through support vector machine for denial‐of‐service attack. The node has to be clustered to accomplish its respective task. The clustering is done with the help of LEACH protocol, where cluster head and Cluster member are fixed to transfer the data in the network. Low Energy adaptive clustering heirarchy (LEACH) propagates energy to abstain from draining of battery and malignant network. A secure framework is built along with encryption and decoding to protect from denial‐of‐service attack. Acknowledgement‐based flooding attack has been focused with the help of support vector machine algorithm. The messages are encoded in from the source node and coded again during transmission phase to obtain the original message. Defending the traditional methodologies, the proposed work provides excellent QoS when compared and tested with other protocols. The results obtained ensure its efficiency when support vector machine technique is combined with encryption scheme.  相似文献   

9.
Mobile ad-hoc network (MANET) is a temporary network in which the main requirement for establishing the communication path among nodes is that the nodes should be cooperative. However, in the presence of malicious node, the MANET’s routing protocol such as AODV is vulnerable to different types of flooding attacks. The flooding attack can be continuous or selective. In the available literature, although many researchers have analyzed the network under continuous flooding attack but they have not focussed on selective flooding attack in which an attacker can sometimes behave as a normal and sometimes behave as a malicious. Most of the existing schemes use constant threshold value which lead to a false positive problem in the network. In order to address this issue, a new mechanism called as Mitigating Flooding Attack Mechanism is proposed which is based on a dynamic threshold value and consists of three phases. It makes use of several special nodes called as Flooding-Intrusion Detection System (F-IDS) that are deployed in MANETs in order to detect and prevent flooding attack. The F-IDS nodes are set in promiscuous in order to monitor the behaviour of the node. The simulation results show that the proposed mechanism improves network performance metrics in terms of PDR, throughput and reduces the routing overhead as well as normalized routing load.  相似文献   

10.
一种适合于无线网络的竞争广播算法   总被引:1,自引:0,他引:1  
周伯生  吴介一  费翔 《电子学报》2003,31(2):280-283
广播是无线网络中基本且重要的操作.竞争广播算法是一种基于竞争机制的广播协议算法,适合于移动自组网络.分析和仿真结果表明,与泛洪方案相比,竞争广播算法去除了大量冗余转播,改善了网络的广播性能,提高了网络的吞吐量.另外,竞争广播算法思想还能应用于其他网络协议,如应用于路由协议的路由发现过程,提高路由算法的性能等.  相似文献   

11.
Routing algorithms with time and message complexities that are provably low and independent of the total number of nodes in the network are essential for the design and operation of very large scale wireless mobile ad hoc networks (MANETs). In this paper, we develop and analyze Cluster Overlay Broadcast (COB), a low-complexity routing algorithm for MANETs. COB runs on top of a one-hop cluster cover of the network, which can be created and maintained using, for instance, the Least Cluster Change (LCC) algorithm. We formally prove that the LCC algorithm maintains a cluster cover with a constant density of cluster leaders with minimal update cost. COB discovers routes by flooding (broadcasting) route requests through the network of cluster leaders with a doubling radius technique. Building on the constant density property of the network of cluster leaders, we formally prove that, if there exists a route from a source to a destination node with a minimum hop count of A, then COB discovers a route with at most O(/spl Delta/) hops from the source to the destination node in at most O(/spl Delta/) time and by sending at Most O(/spl Delta//sup 2/) messages. We prove this result for arbitrary node distributions and mobility patterns and also show that COB adapts asymptotically optimally to the mobility of the nodes. In our simulation experiments, we examine the network layer performance of COB, compare it with Dynamic Source Routing, and investigate the impact of the MAC layer on COB routing.  相似文献   

12.
Frequent changes in network topologies caused by mobility in mobile ad hoc networks (MANETs) impose great challenges to designing routing schemes for such networks. Various routing schemes each aiming at particular type of MANET (e.g., flat or clustered MANETs) with different mobility degrees (e.g., low, medium, and high mobility) have been proposed in the literature. However, since a mobile node should not be limited to operate in a particular MANET assumed by a routing scheme, an important issue is how to enable a mobile node to achieve routing performance as high as possible when it roams across different types of MANETs. To handle this issue, a quantity that can predict the link status for a time period in the future with the consideration of mobility is required. In this paper, we discuss such a quantity and investigate how well this quantity can be used by the link caching scheme in the dynamic source routing protocol to provide the adaptability to variable topologies caused by mobility through computer simulation in NS-2.  相似文献   

13.
On-demand routing protocols are widely used in mobile Ad-hoc network (MANET). Flooding is an important dissemination scheme in routing discovering of on-demand routing protocol. However, in high-density MANET redundancy flooding packets lead to dramatic deterioration of the performance which calls broadcast storm problem (BSP). A location-aided probabilistic broadcast (LAPB) algorithm for routing in MANET is proposed to reduce the number of routing packets produced by flooding in this paper. In order to reduce the redundancy packets, only nodes in a specific area have the probability, computed by location information and neighbor knowledge, to propagate the routing packets. Simulation results demonstrate that the LAPB algorithm can reduce the packets and discovery delay (DD) in the routing discovery phase.  相似文献   

14.
Recently, wireless networks have become one of the major development trends in computer network technology. Because there is no more need of the wired transmission medium, applications have thus diversified. One such growing field of wireless networks is the mobile ad‐hoc network (MANET). A MANET consists of mobile hosts (such as portable laptops, vehicles, etc.), and no fixed infrastructure is required. MANETs provide ease of self‐configuration and can extend coverage at a low cost. Numerous applications have therefore been proposed under this network environment for daily life use. Because MANETs nodes are capable of moving, MANET network topology changes frequently. Thus, the traditional routing protocols fail to fit such an environment. In this paper, we propose an efficient routing protocol for MANETs, which integrates the mathematical model of profit optimization (the Kelly formula) from the field of economics to cope with the routing problem caused by node mobility. Some numerical simulations have been conducted to evaluate the performance of the proposed method using the network simulator NS‐2. The results show that our proposed method outperforms conventional routing protocols in packet delivery ratio comparisons; and the average end‐to‐end delays are within a tolerable range. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

15.
The Broadcast Storm Problem in a Mobile Ad Hoc Network   总被引:29,自引:0,他引:29  
Tseng  Yu-Chee  Ni  Sze-Yao  Chen  Yuh-Shyan  Sheu  Jang-Ping 《Wireless Networks》2002,8(2-3):153-167
Broadcasting is a common operation in a network to resolve many issues. In a mobile ad hoc network (MANET) in particular, due to host mobility, such operations are expected to be executed more frequently (such as finding a route to a particular host, paging a particular host, and sending an alarm signal). Because radio signals are likely to overlap with others in a geographical area, a straightforward broadcasting by flooding is usually very costly and will result in serious redundancy, contention, and collision, to which we call the broadcast storm problem. In this paper, we identify this problem by showing how serious it is through analyses and simulations. We propose several schemes to reduce redundant rebroadcasts and differentiate timing of rebroadcasts to alleviate this problem. Simulation results are presented, which show different levels of improvement over the basic flooding approach.  相似文献   

16.
MANET is a set of mobile nodes which works in a dynamic changing network and it is capable of communicating with each other efficiently where all the nodes perform a dual role as that of a transmitter and a receiver. MANETs do not use any centralized administration for communication. The performance of a MANET can be further enhanced by adapting a cluster mechanism with the help of CEAACK to provide security from penetrators. In this paper we propose a new improved ant colony optimization algorithm with two strategies to reduce the overhead in communication by predicting mobility of node and cluster formation. Firstly, a dynamic mechanism is designed for determining one or more heuristic parameters for improving the performance of the MANET. Secondly a dynamic list of nodes are maintained which helps in forming clusters and electing the cluster head faster. In addition a dynamic broadcast approach algorithm is incorporated to provide the information about the status of the nodes to the hybrid fuzzy-ant colony algorithm. This approach ensures low maintenance cost and is expected to be robust against node failures and network topology changes. The positive outcome of these two techniques consumes low energy and in the process provides better efficiency in data transmission in MANETs. It also achieves correct delivery of packets without unnecessary delay.  相似文献   

17.
In this paper, we present NB-TRACE, which is an energy-efficient network-wide voice broadcasting architecture for mobile ad hoc networks. In the NB-TRACE architecture, the network is organized into overlapping clusters through a distributed algorithm, where the clusterheads create a nonconnected dominating set. Channel access is regulated through a distributed TDMA scheme maintained by the clusterheads. The first group of packets of a broadcast session is broadcast through flooding, where each data rebroadcast is preceded by an acknowledgment to the upstream node. Nodes that do not get an acknowledgment for a predetermined time, except the clusterheads, cease to rebroadcast, which prunes the redundant retransmissions. The connected dominating set formed through this basic algorithm is broken in time due to node mobility. The network responds to the broken links through multiple mechanisms to ensure the maintenance of the connected dominating set. We compare NB-TRACE with four network layer broadcast routing algorithms (Flooding, Gossiping, Counter-based broadcasting, and Distance-based broadcasting) and three medium access control protocols (IEEE 802.11, SMAC, and MH-TRACE) through extensive ns-2 simulations. Our results show that NB-TRACE outperforms other network/MAC layer combinations in minimizing energy dissipation and optimizing spatial reuse, while producing competitive QoS performance.  相似文献   

18.
Nodes mobility brings flinty challenges to multicast in Mobile ad hoc Networks (MANETs). To track nodes mobility, flooding messages are widely used for data delivery structure construction and maintenance in many multicast protocols. These periodic flooding messages significantly consume network resources, such as energy and bandwidth, and result in network collisions. To release data delivery structure maintenance onus, profited from GPS location service, a number of stateless location based multicast protocol were proposed, where a destination list is encapsulated into each data packet for data packet orientation. However, due to data packet capability limitation, the way of encapsulating a destination list in each data packet header restricts the protocol scalability. To solve the scalability issue of multicast protocols, we propose a Scalable Location Guide Overlay Multicast (SLGOM) for MANETs. Analysis and simulation results show that SLGOM achieves high performance in large multicast group and significantly improves the scalability of stateless multicast with respect to group size. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

19.
Tree-Based Data Broadcast in IEEE 802.15.4 and ZigBee Networks   总被引:4,自引:0,他引:4  
This paper studies efficient and simple data broadcast in IEEE 802.15.4-based ad hoc networks (e.g., ZigBee). Since finding the minimum number of rebroadcast nodes in general ad hoc networks is NP-hard, current broadcast protocols either employ heuristic algorithms or assume extra knowledge such as position or two-hop neighbor table. However, the ZigBee network is characterized as low data rate and low cost. It cannot provide position or two-hop neighbor information, but it still requires an efficient broadcast algorithm that can reduce the number of rebroadcast nodes with limited computation complexity and storage space. To this end, this paper proposes self-pruning and forward node selection algorithms that exploit the hierarchical address space in ZigBee networks. Only one-hop neighbor information is needed; a partial list of two-hop neighbors is derived without exchanging messages between neighboring nodes. The ZigBee forward node selection algorithm finds the minimum rebroadcast nodes set with polynomial computation time and memory space. Using the proposed localized algorithms, it is proven that the entire network is covered. Simulations are conducted to evaluate the performance improvement in terms of the number of rebroadcast nodes, number of duplicated receivings, coverage time, and communication overhead  相似文献   

20.

Worldwide Interoperability for Microwave Access (Wimax) is power station through which mobile network, commonly known as A Mobile Ad-hoc Network (MANET) is used by the people. A MANET can be described as an infrastructure-less and self-configure network with autonomous nodes. Participated nodes in MANETs move through the network constantly causing frequent topology changes. Designing suitable routing protocols to handle the dynamic topology changes in MANETs can enhance the performance of the network. In this regard, this paper proposes four algorithms for the routing problem in MANETs. First, we propose a new method called Classical Logic-based Routing Algorithm for the routing problem in MANETs. Second is a routing algorithm named Fuzzy Logic-based Routing Algorithm (FLRA). Third, a Reinforcement Learning-based Routing Algorithm is proposed to construct optimal paths in MANETs. Finally, a fuzzy logic-based method is accompanied with reinforcement learning to mitigate existing problems in FLRA. This algorithm is called Reinforcement Learning and Fuzzy Logic-based (RLFLRA) Routing Algorithm. Our proposed approaches can be deployed in dynamic environments and take four important fuzzy variables such as available bandwidth, residual energy, mobility speed, and hop-count into consideration. Simulation results depict that learning process has a great impact on network performance and RLFLRA outperforms other proposed algorithms in terms of throughput, route discovery time, packet delivery ratio, network access delay, and hop-count.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号