SlideShare a Scribd company logo
1 of 18
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
DOI:10.5121/ijcnc.2023.15202 21
BROADCAST SCHEDULING PROTOCOLS IN MULTI-
HOP MOBILE AD HOC NETWORKS
Chandra Kanta Samal
Department of Comp.Sc., ANDC, Delhi University, New Delhi, India
ABSTRACT
When packets are sending in multi-hop mobile unintended networks numerous problems occur like
flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of
packets simultaneously in MANETs that using the slot assignments approach, when additional channels are
transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of
the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and
therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the
mobile ad hoc network for collision control and reliable communication. This paper proposes two new
broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of
efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced
performance within the different environments. Evaluation of simulation results with other well-known
exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best
within the wireless network and channel bandwidths are well utilized within the network.
KEYWORDS
Broadcast latency problems; Efficiency; Reachability; Reliability; Average latency etc.
1. INTRODUCTION
A mobile ad hoc network is a group of wireless mobile phones forming a provisional set-up does
not include support of any centralized administration. If the source node cannot directly send a
message to destination node because of wireless nodes have limited transmission range. So, the
source node forwards a message through intermediary nodes towards the destination node. Thus,
a multi-step situation happens, and a packet may need to be relayed by several nodes before it
reaches its destination [1, 2]. The major problems in MANETs are battery powered, interference,
security, bandwidth, and reliability. Due to the mobility of nodes, the network's properties are
unpredictable; its topology changes and the signal strength varies with the environment and time
[3, 4].Consequently, communication pathways are divided up and new routes are generated
dynamically [5].
For reliable communication in an ad hoc mobile network, the broadcast algorithm is crucial. [6,
7]. Many contentions, redundancy, rebroadcasts, and collisions are different categories for the
issue. The flooding process produces a lot of redundant messages because, first, it is possible that
neighboring nodes have already received each node's retransmission of a message. Second, there
will be several nodes competing for access to the wireless channel since all nodes want to
rebroadcast the message at the same time or very close to it. Third, since the hidden terminal
problem will always exist, many collisions will happen even without the use of the RTS/CTS
exchange [8, 9].
International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
22
2. EXITING RELATED WORKS
This section compares two broadcast protocol's performance in terms of efficiency and reliability
in multi-hop ad hoc networks in both highand low-density networks. The two broadcast protocols
are Delayed Flooding with Cumulative Neighborhood Protocol and Proposed Enhanced Generic
Self-Pruning Protocol. The Delayed Flooding with Cumulative Neighborhood (DFCN) Protocol
enables broadcasting on wide-area networks with excellent bandwidth management. It is made up
of many different wireless mobile devices, then create a network and we see the network’s
bandwidth of the channel is accurately used [10].Suppose we are increasing density of these
nodes within the network area, when packet transmission it does not exhaust way increased
bandwidth, it may decrease redundancy and rebroadcast there. The main aim of the DFCN
protocol is minimizing the number of emissions that’s result impact on improving the network
throughput and also route, selecting the path of nodes at maximizing coverage in the network
[10]. Basic method of DFCN algorithm is broadcasting messages in distributed mobile
unintended networks, message sent from source node to forward to any or all nodes within the
network. Here, the method of selecting the routing nodes is used. These nodes forward messages
to intermediate nodes, utilizing the least amount of the network as a result. This protocol will be
an enhanced version of that which is mentioned in [11].This protocol benefits the conservation of
energy in multi-hop unplanned mobile network. The difficulty of this protocol is that the desired
bandwidth cannot be transferred because of the high mobility of the nodes. The reliability of the
sparse network decreases when network size is increased. There is no system-wide traffic
monitoring if the size of the degree is increasing. The network does not communicate the
maximum quantity of data because low emission results from the algorithm’s node selection
technique.
Excessive network traffic may cause a significant delay in packet transmission if multiple hosts
must simultaneously compete for a finite amount of communication bandwidth. The genetic
algorithm is more powerful than other algorithms such as the results of the algorithm fulfill high
efficiency but low reliability [12].This algorithm's advantage is that it performs effectively with
low mobility. While certain algorithms are highly reliable, they are also inefficient, and vice
versa. The proposed enhanced generic self-pruning (PEGSP) algorithm's main objective is to
achieve high reliability in extreme mobile networks. This can be achieved by either increasing the
delivery ratio of a reliable algorithm or decreasing the number of forward nodes in an efficient
approach.
The "Hello Messages" technique was used by the proposed PEGSP algorithm to detect the high
mobility of nodes during route connection establishment, which eliminated the issue of
inadequate consideration of their capabilities. Additionally, the proposed PEGSP algorithm used a
different set of messages called location information messages and timers that were informed to
detect a link failure. The drawback of the algorithm is that when mobile node speeds increase,
network efficiency declines. The degree of node dependence is extremely high, and node
accessibility within the networks' transmission range is not always guaranteed. A Dynamic
scalable broadcast algorithm is a dynamic broadcast protocol and it is reliably in a MANET. The
exiting dynamic broadcast technique is not reliable in mobile ad hoc networks because of the
node's mobility and self-motivated topology changes its position in distributed mobile ad hoc
network. The existing protocol designs do not have better performance in the network. Author’s
purpose DSB algorithm is very good for slot assignments among nodes due to reduced
interference between nodes at the time of slot reservation. Our emphasis is on collision
avoidance, but on reducing the problems of redundancy, rebroadcasting and broadcast latency.
International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
23
3. TECHNICAL APPROACH
In a multi-hop Mobile Ad hoc Network, we have created broadcasting protocols for dependable
and spam-free communication. In this research, we suggest two novel broadcast protocols that
modify the Stable Reliable Broadcast Scheduling (SRBS) and Dynamic Scalable Broadcast
(DSB) algorithms. The SRBS is a static broadcast protocol; it is a higher performance in high
mobility and increasing network size [13].
In dynamic broadcast protocol nodes join and leave to each other’s within the network. The
Dynamic Scalable Broadcast Algorithm has no central computing managed; each node keeps the
state data record in its place. Every node makes this recording by gathering information from its
neighbors 1-hop and 2-hop stop. When the node communicates over the network, it detects the
node of its neighbors within the network. If a network node's neighbour is occupied, then the
sleep cycle repeats this process until the neighbor node in the network is busy otherwise node
would join the neighbor’s node in the network for process of registration. As we are using set
covering scheme, the node should know its 1-hop neighbors and the 2-hop coverage within the
network. In the set covering scheme, minimum 1-hop nodes require covering the 2-hop nodes in
the network and hence reduce rebroadcast and redundancy [14].
Figure 1. An example of three-layer graph [14]
In figure 1, when packets communicate in the multi-hop network collision of nodes may occur at
layer 3. The nodes "a", "b","c","d" and "e" in layer 1 and "l", "f", "g", "h", " i", "j" and "k" at
layer 2 is the source node's one-hop and two-hop neighbours, respectively, whenever the node "s"
in layer 0 is the only source node. The nodes "a", "c" and "e" in layer 1 could be the very
minimum required to cover all nodes in layer 2.For layer 2 has no common neighbours for nodes
"a”, "c" and "e", they will broadcast packetsat the same time without collision occur in layer 2.
So, we have got used the independent transmission plan to reduce collisions and broadcast
latency [14]. If the degree size of a node is increased within the network it will be unreliable for
communication. That's why the All to All protocols are used for slot allocation between mobile
nodes to regulate the overload of node and avoid queuing of node [14]. This approach may be
well worked in MANET, it helps for reliable communication in the multi-hop networks. We make
slot timers for a node to sense the neighbor node’s network. If the node is not detecting
neighbor’s node network within the slot time period, we have got to line the slot timer again.
Subsequently, if the source node does not detect the neighbor node’s network, it declares that
neighbor node’s network is out of transmission range. Every device chooses to send an
identifying packet. A new device must broadcast an ID Packet; If not, it remains in receive mode
onlyA recognizes a new neighbour when it receives an ID packet. At the time of the identification
interval, we use three slots as follows:
International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
24
 Request slot
 Collision slot
 Broadcast slot
The new node is introduced through the registration process, it identified to all or part of its
neighbors at 1 or 2-hops distance in the network. If more nodes ready to join the network are
located one or two hops away from the source node, only those nodes who successfully
completed the registration process should be permitted. The X Node reserves the broadcast slot,
if no one else has to join the network. If Node Y also wants to affix the registration process, it
should wait for an X node to complete the registration process successfully.
If X is a joining node, it detects an empty broadcast slot and sends the request control packet in
the request slot for the registration request. If X did not sense any collision in the network when
broadcasting its control packets. If X notices an empty collision slot, it knows that neither of its
neighbours within 1 or 2 hops is submitting a request to start the registration process. If the
registration process is successful, then are made frame schedule for 1-hop neighbors is created
otherwise sleep cycle is repeated and slot timers are made again until the registration process is
successful. In the final step we execute the frame schedule as collision free in the multi hop
network [15].
Neighbor Broadcast Coverage: TheAuthor follows the neighbor broadcast coverage method
purpose by reference [16, 17]: Let set Bm and Bn are the neighbor node, node n forwards the
messages to node m and Dm stand for neighbor set coverage up to two hops. The m node
receives a message from n node first time, so the neighbor set coverage broadcast follows:
Dm=Bm-Bn-{n}-----------------------------------------------------(1)
Reliable BroadcastPacket: The scalable broadcast algorithm has mentioned by reference [18].
We use to knowledge the two hops neighbor set coverage by equation (1).If n node is not
received message from m node, it is clear that m set is no neighbor coverage, on that situation m
set is not rebroadcast the packets then node n will delay the rebroadcast schedule. We consider
themaximum number of neighbor coverage nodes is a highest priority for broadcast packetas
comparison with those nodes is a covered minimum neighbor. Broadcast delay is calculated
noden’s degree (Cn) and its neighbor’s maximum degree (Cmax):
Dt (Delay Time) = Cmax/Cn-------------------------------------(2)
3.1. Flow Chart of DSBAlgorithm
The Dynamic Scalable Broadcast (DSB) algorithm flow chart is provided in this work.
International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
25
Detect Neighbors Node
in the Network
Neighbors Node in the
Network Busy
Sleep Cycle
Yes
Process For Registration
Making Slot Timers (Assign slot
Time Period)
Using Set Covering Scheme (1-hop
Neighbors and 2-hops coverage )
Using Independent Transmission
Scheme ( For Multi-hop
communication)
Using All to All protocol
(Slot allocation among Nodes)
No
Request Slot
Collision slot
free
Broadcast Slot
Free
Wait for collision slot
free
Sleep Cycle
No
Wait for Broadcast Slot
Free
Yes Yes
No
||*Nodes joined in the Network
|| * Minimum Nodes coverage
|| * Reduce Rebroadcast
|| * Reduce Redundant
|| * Avoid Collision
|| * Reduce Broadcast Latency
|| * Traffic Control
|| * Avoid Queuing
|| * Reduce Overload of Node
|| * Mobility Control
|| * Collision Control
2
1
Broadcast Slot For Reservation
Yes
Sleep Cycle
Run the Frame Schedule
Make Frame Schedule to 1-hop
Neighbors
Success Registration
Process
Yes
No
|| Success Registration
Process
|| Success Registration Process keep in the Frame
Schedule
|| Execute the Frame Schedule in Multi-hop MANET
1
2
Figure 2. DSB Algorithm’s Flow chart
International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
26
3.2. Stable Reliable Broadcast Scheduling Algorithm’s Flow Chart.
The SRBS Algorithm flow chart is mentioned[13].
Detect
Neighbors Node
in the Network
Neighbors Node
in the Network
Busy
Sleep Cycle
Yes
Reduce the
interval of
“HELLO”
messages
No
Making Timers
Timer Expired at S and T
did not send “HELLO”
messages
Use 1-hop
Location
information at
node S
Yes
Broadcast
Neighbor
identification
Requests
No
Receive Neighbor
IDs in Transmission
Slices
New Neighbor
Detected
Yes
Finding 1-hop
location
Information T at S
Node T is
moving out the
1-hop of S
Inform All Nodes
Set timer again
Timer
Expired
Node T is
moving out the
1-hop of S
Inform All Nodes
No
Yes
Yes
No
No
1
International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
27
Construct & Transmit a
Temporary
Polling Schedule
No
Neighbors Reply in Temporary
Slots with Scheduling Data
New Transmission Schedule
For 1-hop Neighborhood
Slot Allocation to 1-hop
Neighbors (Using the Reliable
Time Slot Allocation Among
Mobile Nodes Algorithm
Make Frame Schedule to 1-hop
Neighbors
Wait one Frame for 1-hop
Neighbors to Forward New
Schedule
1-hop Neighbors Message
Reception
When RAD Expiration Broadcast
Message M immediate emission
Reachibility=|r(m)|/|N(s)|
# Where r(m): The set of IDs that are known have received the messages referred to as r(m).
# N(s): The Set of Neighbors of the Node S by N(S).
(f(m)=Reachibility >= Min
Reachibility)
# f(m): The decision of whether the message should be forwarded or not .
Broadcast message
Dropped
Broadcast message
Forward
Wait one Frame for 2-hop
Neighbors to Forward
New Schedule
When node gets a
New Neighbor event
then (N(s)<Density
Threshold)
Rad(m) 0
Yes
# Density Threshold means , incoming message from the 1-hop Neighbors node. No
Yes
No
1
International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
28
Flow chart of Reliable time slot allocation among mobile nodes[19].
S Source Node
S=0
Set_Cover=0
Num_OF_ITS=0
M1=E
M2=F
j=0
H=Nil
E →Set of 1-hop nodes from S
F → Set of 2-hop nodes from S
F≠0
Stop Slot Allocation
Add v to Set_Cover
Remove v from E
Remove Nodes є M(v) from F
Select a node vєE that maximizes the
size of |M(v)∩F|
No Yes
1
International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
29
vєSet_Cover(Let v be the first node listed in set cover)
If v and every node in H(i) share
No common Neighbors in 2-hop Nodes
i=i+1
Num_OF_ITS=Num_OF_ITS+1
T= nil, j++, K=0
Add v to ITS(i)
i=0
Add v to ITS(Num_OF_ITS)
K=K+1
Choose the node
v in S
(|M(TU{v})|>|M(T)|)&&
(|M(TU{v})|>=|M(TU{u}))
Stop Slot Allocation
M(T)=M(T)+1
M2 Collision freely covered By T
S=S-v
T=TU{v}
No
Yes
No
Yes
1
3
2
|M(TU{v})|>|M(T)|
Stop Allocation
H=HU{T}
M2=M2-M(T)
Return(H)
No
Yes
2
3
Figure 3. Flow chart of SRBS Algorithm
International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
30
4. SIMULATION AND RESULT ANALYSIS
We have compared the various metric’s simulation results of theSRBS, DFCN, DSB and PEGSP
methods; it is implemented in GloMoSim simulatorv2.03 [20,21,22]. We have got taken the
subsequent parameters within the configuration setup.
Table 1. Simulation Configuration setup parameters
Physical ground area 3000 * 3000m
Seed value 1
Time 600 seconds
TEMPRATURE 290.0
Edge 500m
Nodes varied 300 to 600
RADIO-BANDWIDTH 2mb/s
NOISE-FIGURE 10.0dB
Radio transmission power 10.0 dbm
Node placement RANDOM
MOBILITY-WP-MIN-SPEED 0
MOBILITY-WP-MAXI-SPEED 10m/s-240m/s
MAC-Protocol 802.11
MAX PACKET IN IFQ 50
MOBILITY-WP-PAUSE time period 10s
PROMISCUOUS-MODE NO
The throughput of the network with 150 nodes is displayed in figure 4 as a result.If we
consistently increase node speed, it starts at 20 m/s and goes up to 120 m/s then the four
algorithms throughput decreases because of the high speed of nodes. Therefore, DFCN algorithm
has low throughput and SRBS algorithm performs better than the other three algorithms.
Expression of the throughput:
Throughput= (∑P(mg)-∑Q(mg))/∑R(nbn)-----------------------------------------(3)
(Where P(mg)→ Sent the total Numberof transmission messages, Q(mg)→Number of neighbor
nodes received message, R(nbn)→ Total number of neighbor nodes)
Figure 4. Throughput Vs Mobility of Node (Size of node is 150)
International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
31
Above figure 5result that when the size of nodes is 500, area is 3000 sq.m2 and speed of nodes is
30 m/s that time PEGSP algorithm results slightly less than the DFCN and DSB algorithms result.
If we are increasing regularly the network size and number of nodes, then the four algorithms
throughput will decrease. The SRBS algorithm is determined to be superior to the opposing three
algorithms.
Figure 5. Throughput Vs Network Size (sq.m2)
Figure 6. Reachability Vs Number of Nodes (Mobile node’s speed is 30 m/s)
The DSB algorithm is more reachable than the SRBS, DFCN and PEGSP algorithms, according
to the resulting extract from figure 6. Reachability of the DFCN algorithm is marginally better
than PEGSP algorithm at 500 nodes.
Reachability is determined by how many nodes have actually received broadcast packets.
Reachability = ∑Q(rp)/∑R(nd)--------------------------------------------------(4)
(Where Q(rp) → Actual no of nodes has received broadcast packets, R(nd) → Number of nodes
overall in the networks).
International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
32
Figure 7. Rebroadcast Vs Number of Nodes (Node’s mobility is 30m/s)
Figure 7 demonstrates that the SRBS algorithm's simulation result is improved than the other
three algorithms because of rebroadcast ratio is minimum.
Rebroadcast Ratio=∑RT/∑TN-------------------------------------------------(5)
(Where RT → RT is that Actual number of nodes retransmitted packets, TN→The network's
total nodes are represented by the TN).
Figure 8. Average Latencies Vs Number of Nodes (Each Nodes Speed is 10m/s)
Below figure 8 graph shows that when we are increasing network size of nodes, then four
algorithm’s broadcast latencies result is increasing. Average broadcast latency means from the
interval time of the broadcast was started to destination host finishes at the time of rebroadcast.
The DSB algorithm has less average latency than compare DFCN, SRBS and PEGSP algorithms.
So, the DSB algorithm is a good performance because of minimum delay.
Rebroadcast Vs Number of Nodes
0
20
40
60
80
100
100 200 300 400 500 600
Number of Nodes
Rebroadcast(%) SRBS
DSB
DFCN
PEGSP
International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
33
Figure 9. Reliability Vs Mobility (Size of nodes is 100)
In figure 9's outcome demonstrates that as node speeds increase from 0 to 240 m/s, the SRBS
algorithm is more reliable than the other three algorithms. Percentage number of node shas
received that broadcast of packets within the network we called reliability. It concludes that
SRBS algorithm’s result beyond other algorithms, but DFCN algorithm’s performance is
incredibly poor.
This figure 10 we have seen the efficiency level of SRBS algorithm is better, more other
algorithm’s results. In network percentage number of nodes forwarded the packets are called
Efficiency. The figure 10, if we are increasing each of the node’s speed is 30m/s then the DFCN
performance is slightly less of the PEGSP and DSB algorithm’s performance. Similarly, speed of
mobile nodes was increased from 30 to 60 m/s at that time DSB algorithms performance same as
PEGSP algorithm. So, as mobile node speed increases from 0 to 210 m/s on a regular basis, the
performance of the two methods degrades.
Figure 10. Efficiency Vs Mobility (Mobile Nodes size is 150)
Reliability Vs Mobility
0
25
50
75
100
0 30 60 90 120 150 180 210 240
Mobility(Mobility is measuredm/s)
Reliability(Delivery
Ratio
%)
SRBS
DSB
DFCN
PEGSP
Efficiency Vs Mobility
0
10
20
30
40
50
60
70
80
90
100
0 30 60 90 120 150 180 210
Mobility(Mobility is measured in m/s)
Efficiency(%)
SRBS
DSB
DFCN
PEGSP
International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
34
Figure 11. Throughput Vs Transmission Range
(Size of nodes is 150 and mobility of nodes is 30 m/s)
The above figure 11SRBS algorithm contains good performance compare with the DSB, DFCN
and PEGSP algorithm’s result when varies in the different transmission ranges. After rising
transmission range up to 240m and each of the node’s speed is 30m/s, DFCN algorithm’s
performance remains the same as DSB algorithm but it is higher than the PEGSP algorithm.
From figure 12, If we regularly varying degree of nodes up to 120 then the DSB algorithm gives
higher throughput of DFCN,PEGSP and SRBS algorithms. So, the simulation graph DSB
algorithm is healthier.
Figure 12. Throughput Vs Degree of Nodes
(Node size is150 and node speed is 15m/s)
Throughput Vs Transmission Range
0
20
40
60
80
100
60 120 180 240 300 360
Transmission Range (Transmission Range measure in meter)
Throughput(Throughput
measured
in
bits
per
second)
SRBS
DSB
DFCN
PEGSP
Throughput Vs Degree of Nodes
0
10
20
30
40
50
60
70
80
90
100
15 30 45 60 75 90 105 120
Degree of Nodes
Throughput(Throughput
is
measured
in
bits
per
second)
SRBS
DSB
DFCN
PEGSP
International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
35
Figure 13. Network Connectivity Rate Vs No of Nodes
In Figure 13, the network connectivity rate is decreased if we increase the number of nodes.
Thus, the SRBS algorithm produces better results than the other three algorithms.
Figure 14 compares the outputs of the four algorithms result. Performance is improved with the
SRBS algorithm. The collision rate likewise rises as packet size grows.
Figure 14. Collision Rate Vs No of Nodes
It shows from figure 15 that as node size increases, there is more delay for four algorithms. The
PEGSP algorithm is better than the DFCN algorithm up to a node size 100. When the number of
nodes increases, the DFCN protocol outperforms the PEGSP protocol. The SRBS algorithm
results best of three algorithms.
0
20
40
60
80
100
50 100 150 200 250 300 350 400
Network
Connectivity
Rate
Number of Nodes(Mobile Nodes Speed is 30m/s)
Network Connectivity Rate Vs No of Nodes
SRBS DFCN DSB PEGSP
0
500
1000
1500
2000
2500
3000
3500
4000
50 100 150 200 250 300 350 400
Collision
Rate
Number of Nodes(Speed of Mobile Nodes is 30m/s)
Collision Rate Vs No of Nodes
SRBS DFCN DSB PEGSP
International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
36
Figure 15. End-to-End Delay Vs No of Nodes
Figure 16. Connectivity Rate Vs Traffic Overload of Node
According to Figure 16, a node's connection rate performance suffers as its traffic overload
grows. As a result, the SRBS algorithm achieves better results than the DSB, DFCN and PEGSP
algorithms.
5. CONCLUSIONS
The author proposed two broadcast protocols modify SRBS and DSB and compared them with
well-known existing broadcast algorithms. It is a reliable and high efficiency in a different traffic
pattern of highly mobile networks. When we send packets within the network, it takes minimum
nodes for communication from source to destination. This algorithm reduces flooding, broadcast
latency and redundancy problems. In our simulation, we have got measured the performance of
reliability, efficiency, throughput, average latency and rebroadcast. We have got tested the results
by varying node mobility, varies transmission ranges, number of nodes, degree of node, network
size, network connectivity rate, collision rate, end-to-end delay, and traffic overload of the node.
It shows best result when compared with the DFCN and PEGSP algorithms. Our result shows that
once we increase the quantity of nodes and node mobility then the SRBS algorithm produces
better results than the opposite three algorithms. In simulation results in some cases, we
have seen that if we do not increase node mobility and the number of nodes, then the results of
the DSB algorithm are better than the opposite three algorithms in terms of reachability, average
0
0.2
0.4
0.6
0.8
1
50 100 150 200 250 300 350 400
End-to-End
Delay
Number of Nodes(Mobile Node's speed is 30m/s)
End-to-End Delay Vs No of Nodes
SRBS DFCN DSB PEGSP
0
20
40
60
80
100
15 30 45 60 75 90 105 120
Connectivity
Rate
Traffic overload of Node(Node's Speed is 30m/s)
Connectivity Rate Vs Traffic overload of Node
SRBS DFCN DSB PEGSP
International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
37
latencies, and throughput (Degree of nodes). If we increase the number of nodes and do not
increase node mobility, then the DFCN’s algorithm results are better than the PEGSP algorithm.
This algorithm is minimizing the frame length to communication in the network, which implies it
proves that the bandwidth of the channels is correctly utilized and provides the most throughputs.
CONFLICT OF INTEREST
The author has declared no competing interests for publication.
REFERENCES
[1] DemetresKouvatsos and Is-Haka Mkwawa, “Broadcasting Methods in Mobile Ad hoc Networks: An
Overview”, Department of Computing, University of Bradford, UK, Department of Computer
Science , University College Dublin, Ireland, in 2009.
[2] Ching-Chuan Chiang and Mario Gerla, “Routing and Multicast in Multi hop Mobile Wireless
Networks”, University of California, Los Angeles. In Proc.ICUPC’97.
[3] Eroll L. Lloyd, “Broadcast Scheduling for TDMA in wireless multi hop networks”, Department of
Computer Science and Information Sciences, University of Delaware, Hand book of wireless
Networks and Mobile Computing Pages 347-368, 2002.
[4] S.Ramanathan and E.L. Lloyd, “Scheduling Algorithms for Multi Hop Radio Networks”, IEEE/ACM
Transactions on Networking, 1:166-177, April 1993.
[5] Zygmunt.J.Haas and B.Liang, “ Ad hoc Mobility Management with Randomized Database groups”,
323 Frank Rhodes Hall, School of Electrical Engineering Cornel University, lthaca, NY 14853
Proceedings of the IEEE International Conference on communications 1756-1762, 1999.
[6] B. Williams and T.Camp, “Comparison of Broadcasting Techniques for Mobile Ad hoc Networks”,
Department of Math and Computer Science , Colorado, School of Mines Golden, CO 80401, In
Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc
02),194-205, March 2002.
[7] Wei Lou and Jie Wu, “A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile
Ad Hoc Networks”, Department of Computer Science and Engineering, Florida Atlantic University,
Conference on Global Telecommunications Conference, 2003. GLOBECOM '03. IEEE, Volume: 6,
January 2004.
[8] Brian J. Wolf, Joseph L. Hammond, Daniel L.Noneaker and Harlan B. Russell, “Distributed
Formation of Broadcast Transmission Schedules for Mobile Ad Hoc Networks”,Dept. of Electrical
and Computer Engineering, Clemson University, Clemson SC, IEEE Volume-6, 2007.
[9] J.Jetcheva, Y.Hu, D.Maltz and D.Johnson, “A Simple Protocol for Multicast and Broadcast in Mobile
Ad hoc Networks”, Internet Draft, Draft-IETF-MANET simplembcast-01, 2001.
[10] Luc Hogie, Marcin Seredynski and Frederic Guinand, “A Bandwidth-Efficient Broadcasting Protocol
for Mobile Multi-Hop Ad hoc Networks”, Pascal BouvryUniversity,Luxembourg6, rueR.
CoudenhoveKalergiL- 1359 Luxembourg, Polish Academy of Sciences Ordona 2102-237, Warsaw,
Poland, University du Havre 25, rue Philippe Lebon76600 Le Havre, France. Proceedings of the
International Conference on Networking, International Conference on Systems and International
Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06) Computer
Society IEEE 2006.
[11] L. Hogie, F. Guinand, and P. Bouvry, “A heuristic for efficient broadcasting in the Metropolitan ad
hoc networks”, University du Havre, University du Luxembourg. University du Havre, 25, rue
Philippe Lebon 76600 Le Havre, France. University du Luxembourg Campus Kirchberg 6, rue
R.Coudenhove-Kalergi L-1359 Luxembourg. In KES, pages 727–733, 2004.
[12] H.A Ali, M.S Saleh, M.A. Sadik, “An Efficient Reliable Broadcast Algorithm in Ad hoc Networks
Based on Self-Pruning”,IJICIS, Vol.5, No. 1, July 2005.
[13] Chandra Kanta Samal, G.V. Singh and Sanjay Kumar Dhurandher, “Stable and Reliable Broadcast
Scheduling in Multi-Hop MANET”, AND College, University of Delhi, New Delhi, India, SC&SS,
Jawaharlal Nehru University, New Delhi, India and NSIT, University of Delhi, New Delhi, India,
International Journal of Engineering Science and Technology (IJEST), Vol. 3 No. 9 September 2011,
page no. 6962-6969, ISSN: 0975-5462.
International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
38
[14] Pei-Kai Hung, Jang-Ping Sheu and Chin-Shun Hsu, “Scheduling of Broadcasts in Multi-hop Wireless
Networks”, Dept. of Computer Science and Information Engineering, National Central University
Chung-Li, 320 Taiwan, R.O.C., European Wireless 2002 proceedings , 2002.
[15] Research Scholar S. Madhavi and Professor I. Ramesh Babu, “A New Method for Adaptive Broadcast
Scheduling in Mobile Ad hoc Networks”, Department of Computer Science and Engineering,
Acharya Nagarjuna University Guntur, A.P., India, IJCSNS International Journal of Computer
Science and Network Security, Vol.8 No.3, March 2008.
[16] Lim, H. and Kim, C, “Multicast tree construction and flooding in wireless ad hoc networks”, In
Proceedings of the 3rd ACM international workshop on modeling, analysis and simulation of wireless
and mobile systems, pages 61-68. ACM Press. (2000).
[17] Tseng, Y.-C., Ni, S.-Y, and Shih, E.-Y. “Adaptive Approaches to Relieving Broadcast Storms in a
Wireless Multihop Mobile Ad Hoc Network”, In Proceedings of the International Conference on
Distributed Systems, pages 481.488(2001).
[18] Peng, W. and Lu, X. C. ,“On the reduction of broadcast redundancy in mobile ad hoc networks”, In
Proceedings First Annual Workshop on Mobile and Ad Hoc Networking and Computing, pages 129-
130(2000).
[19] Chandra Kanta Samal, “Reliable Time Slot Allocation Scheme among Mobile Nodes in MANET”
AND College, University of Delhi, New Delhi, India, International Journal of Computer Science
Trends and Technology (IJCST), Volume 9, Issue 5, Sep-Oct 2021.
[20] GloMoSim:“Global Mobile Information Systems Simulation Library”,
http://pcl.cs.ucla.edu/projects/glomosim.
[21] Mario GerlaLokesh Bajaj, MineoTakai, Rajat Ahuja, RajiveBagrodia, “GloMoSim: A Scalable
Network Simulation Environment”, Technical Report 990027, University of California, 13, 1999.
[22] Richard A.Meyer and RajiveBagrodia, “PARSEC USER MANUAL for PARSEC. Release 1.1”,
Revised in September 1999, http://pcl.cs.ucla.edu,1999.
AUTHOR
Dr. Chandra Kanta Samal received the M. Tech. (CS) and Ph. D(CS) from Jawaharlal
Nehru University, New Delhi, India. Having 16th
years of teaching experience in the field
of Computer Science at AND College, Delhi University, New Delhi, India. More papers
published on Wireless Networks, Image Processing and robotics in various International
Journals and Conferences.

More Related Content

Similar to Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks

DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
ijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
ijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
ijujournal
 
29 88-96
29 88-9629 88-96
29 88-96
idescitation
 

Similar to Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks (20)

A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AA
 
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...
 
23
2323
23
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
 
29 88-96
29 88-9629 88-96
29 88-96
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
 
Ha3512291233
Ha3512291233Ha3512291233
Ha3512291233
 
C0351725
C0351725C0351725
C0351725
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
 

More from IJCNCJournal

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
IJCNCJournal
 

More from IJCNCJournal (20)

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 

Recently uploaded

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 

Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 DOI:10.5121/ijcnc.2023.15202 21 BROADCAST SCHEDULING PROTOCOLS IN MULTI- HOP MOBILE AD HOC NETWORKS Chandra Kanta Samal Department of Comp.Sc., ANDC, Delhi University, New Delhi, India ABSTRACT When packets are sending in multi-hop mobile unintended networks numerous problems occur like flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of packets simultaneously in MANETs that using the slot assignments approach, when additional channels are transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the mobile ad hoc network for collision control and reliable communication. This paper proposes two new broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced performance within the different environments. Evaluation of simulation results with other well-known exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best within the wireless network and channel bandwidths are well utilized within the network. KEYWORDS Broadcast latency problems; Efficiency; Reachability; Reliability; Average latency etc. 1. INTRODUCTION A mobile ad hoc network is a group of wireless mobile phones forming a provisional set-up does not include support of any centralized administration. If the source node cannot directly send a message to destination node because of wireless nodes have limited transmission range. So, the source node forwards a message through intermediary nodes towards the destination node. Thus, a multi-step situation happens, and a packet may need to be relayed by several nodes before it reaches its destination [1, 2]. The major problems in MANETs are battery powered, interference, security, bandwidth, and reliability. Due to the mobility of nodes, the network's properties are unpredictable; its topology changes and the signal strength varies with the environment and time [3, 4].Consequently, communication pathways are divided up and new routes are generated dynamically [5]. For reliable communication in an ad hoc mobile network, the broadcast algorithm is crucial. [6, 7]. Many contentions, redundancy, rebroadcasts, and collisions are different categories for the issue. The flooding process produces a lot of redundant messages because, first, it is possible that neighboring nodes have already received each node's retransmission of a message. Second, there will be several nodes competing for access to the wireless channel since all nodes want to rebroadcast the message at the same time or very close to it. Third, since the hidden terminal problem will always exist, many collisions will happen even without the use of the RTS/CTS exchange [8, 9].
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 22 2. EXITING RELATED WORKS This section compares two broadcast protocol's performance in terms of efficiency and reliability in multi-hop ad hoc networks in both highand low-density networks. The two broadcast protocols are Delayed Flooding with Cumulative Neighborhood Protocol and Proposed Enhanced Generic Self-Pruning Protocol. The Delayed Flooding with Cumulative Neighborhood (DFCN) Protocol enables broadcasting on wide-area networks with excellent bandwidth management. It is made up of many different wireless mobile devices, then create a network and we see the network’s bandwidth of the channel is accurately used [10].Suppose we are increasing density of these nodes within the network area, when packet transmission it does not exhaust way increased bandwidth, it may decrease redundancy and rebroadcast there. The main aim of the DFCN protocol is minimizing the number of emissions that’s result impact on improving the network throughput and also route, selecting the path of nodes at maximizing coverage in the network [10]. Basic method of DFCN algorithm is broadcasting messages in distributed mobile unintended networks, message sent from source node to forward to any or all nodes within the network. Here, the method of selecting the routing nodes is used. These nodes forward messages to intermediate nodes, utilizing the least amount of the network as a result. This protocol will be an enhanced version of that which is mentioned in [11].This protocol benefits the conservation of energy in multi-hop unplanned mobile network. The difficulty of this protocol is that the desired bandwidth cannot be transferred because of the high mobility of the nodes. The reliability of the sparse network decreases when network size is increased. There is no system-wide traffic monitoring if the size of the degree is increasing. The network does not communicate the maximum quantity of data because low emission results from the algorithm’s node selection technique. Excessive network traffic may cause a significant delay in packet transmission if multiple hosts must simultaneously compete for a finite amount of communication bandwidth. The genetic algorithm is more powerful than other algorithms such as the results of the algorithm fulfill high efficiency but low reliability [12].This algorithm's advantage is that it performs effectively with low mobility. While certain algorithms are highly reliable, they are also inefficient, and vice versa. The proposed enhanced generic self-pruning (PEGSP) algorithm's main objective is to achieve high reliability in extreme mobile networks. This can be achieved by either increasing the delivery ratio of a reliable algorithm or decreasing the number of forward nodes in an efficient approach. The "Hello Messages" technique was used by the proposed PEGSP algorithm to detect the high mobility of nodes during route connection establishment, which eliminated the issue of inadequate consideration of their capabilities. Additionally, the proposed PEGSP algorithm used a different set of messages called location information messages and timers that were informed to detect a link failure. The drawback of the algorithm is that when mobile node speeds increase, network efficiency declines. The degree of node dependence is extremely high, and node accessibility within the networks' transmission range is not always guaranteed. A Dynamic scalable broadcast algorithm is a dynamic broadcast protocol and it is reliably in a MANET. The exiting dynamic broadcast technique is not reliable in mobile ad hoc networks because of the node's mobility and self-motivated topology changes its position in distributed mobile ad hoc network. The existing protocol designs do not have better performance in the network. Author’s purpose DSB algorithm is very good for slot assignments among nodes due to reduced interference between nodes at the time of slot reservation. Our emphasis is on collision avoidance, but on reducing the problems of redundancy, rebroadcasting and broadcast latency.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 23 3. TECHNICAL APPROACH In a multi-hop Mobile Ad hoc Network, we have created broadcasting protocols for dependable and spam-free communication. In this research, we suggest two novel broadcast protocols that modify the Stable Reliable Broadcast Scheduling (SRBS) and Dynamic Scalable Broadcast (DSB) algorithms. The SRBS is a static broadcast protocol; it is a higher performance in high mobility and increasing network size [13]. In dynamic broadcast protocol nodes join and leave to each other’s within the network. The Dynamic Scalable Broadcast Algorithm has no central computing managed; each node keeps the state data record in its place. Every node makes this recording by gathering information from its neighbors 1-hop and 2-hop stop. When the node communicates over the network, it detects the node of its neighbors within the network. If a network node's neighbour is occupied, then the sleep cycle repeats this process until the neighbor node in the network is busy otherwise node would join the neighbor’s node in the network for process of registration. As we are using set covering scheme, the node should know its 1-hop neighbors and the 2-hop coverage within the network. In the set covering scheme, minimum 1-hop nodes require covering the 2-hop nodes in the network and hence reduce rebroadcast and redundancy [14]. Figure 1. An example of three-layer graph [14] In figure 1, when packets communicate in the multi-hop network collision of nodes may occur at layer 3. The nodes "a", "b","c","d" and "e" in layer 1 and "l", "f", "g", "h", " i", "j" and "k" at layer 2 is the source node's one-hop and two-hop neighbours, respectively, whenever the node "s" in layer 0 is the only source node. The nodes "a", "c" and "e" in layer 1 could be the very minimum required to cover all nodes in layer 2.For layer 2 has no common neighbours for nodes "a”, "c" and "e", they will broadcast packetsat the same time without collision occur in layer 2. So, we have got used the independent transmission plan to reduce collisions and broadcast latency [14]. If the degree size of a node is increased within the network it will be unreliable for communication. That's why the All to All protocols are used for slot allocation between mobile nodes to regulate the overload of node and avoid queuing of node [14]. This approach may be well worked in MANET, it helps for reliable communication in the multi-hop networks. We make slot timers for a node to sense the neighbor node’s network. If the node is not detecting neighbor’s node network within the slot time period, we have got to line the slot timer again. Subsequently, if the source node does not detect the neighbor node’s network, it declares that neighbor node’s network is out of transmission range. Every device chooses to send an identifying packet. A new device must broadcast an ID Packet; If not, it remains in receive mode onlyA recognizes a new neighbour when it receives an ID packet. At the time of the identification interval, we use three slots as follows:
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 24  Request slot  Collision slot  Broadcast slot The new node is introduced through the registration process, it identified to all or part of its neighbors at 1 or 2-hops distance in the network. If more nodes ready to join the network are located one or two hops away from the source node, only those nodes who successfully completed the registration process should be permitted. The X Node reserves the broadcast slot, if no one else has to join the network. If Node Y also wants to affix the registration process, it should wait for an X node to complete the registration process successfully. If X is a joining node, it detects an empty broadcast slot and sends the request control packet in the request slot for the registration request. If X did not sense any collision in the network when broadcasting its control packets. If X notices an empty collision slot, it knows that neither of its neighbours within 1 or 2 hops is submitting a request to start the registration process. If the registration process is successful, then are made frame schedule for 1-hop neighbors is created otherwise sleep cycle is repeated and slot timers are made again until the registration process is successful. In the final step we execute the frame schedule as collision free in the multi hop network [15]. Neighbor Broadcast Coverage: TheAuthor follows the neighbor broadcast coverage method purpose by reference [16, 17]: Let set Bm and Bn are the neighbor node, node n forwards the messages to node m and Dm stand for neighbor set coverage up to two hops. The m node receives a message from n node first time, so the neighbor set coverage broadcast follows: Dm=Bm-Bn-{n}-----------------------------------------------------(1) Reliable BroadcastPacket: The scalable broadcast algorithm has mentioned by reference [18]. We use to knowledge the two hops neighbor set coverage by equation (1).If n node is not received message from m node, it is clear that m set is no neighbor coverage, on that situation m set is not rebroadcast the packets then node n will delay the rebroadcast schedule. We consider themaximum number of neighbor coverage nodes is a highest priority for broadcast packetas comparison with those nodes is a covered minimum neighbor. Broadcast delay is calculated noden’s degree (Cn) and its neighbor’s maximum degree (Cmax): Dt (Delay Time) = Cmax/Cn-------------------------------------(2) 3.1. Flow Chart of DSBAlgorithm The Dynamic Scalable Broadcast (DSB) algorithm flow chart is provided in this work.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 25 Detect Neighbors Node in the Network Neighbors Node in the Network Busy Sleep Cycle Yes Process For Registration Making Slot Timers (Assign slot Time Period) Using Set Covering Scheme (1-hop Neighbors and 2-hops coverage ) Using Independent Transmission Scheme ( For Multi-hop communication) Using All to All protocol (Slot allocation among Nodes) No Request Slot Collision slot free Broadcast Slot Free Wait for collision slot free Sleep Cycle No Wait for Broadcast Slot Free Yes Yes No ||*Nodes joined in the Network || * Minimum Nodes coverage || * Reduce Rebroadcast || * Reduce Redundant || * Avoid Collision || * Reduce Broadcast Latency || * Traffic Control || * Avoid Queuing || * Reduce Overload of Node || * Mobility Control || * Collision Control 2 1 Broadcast Slot For Reservation Yes Sleep Cycle Run the Frame Schedule Make Frame Schedule to 1-hop Neighbors Success Registration Process Yes No || Success Registration Process || Success Registration Process keep in the Frame Schedule || Execute the Frame Schedule in Multi-hop MANET 1 2 Figure 2. DSB Algorithm’s Flow chart
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 26 3.2. Stable Reliable Broadcast Scheduling Algorithm’s Flow Chart. The SRBS Algorithm flow chart is mentioned[13]. Detect Neighbors Node in the Network Neighbors Node in the Network Busy Sleep Cycle Yes Reduce the interval of “HELLO” messages No Making Timers Timer Expired at S and T did not send “HELLO” messages Use 1-hop Location information at node S Yes Broadcast Neighbor identification Requests No Receive Neighbor IDs in Transmission Slices New Neighbor Detected Yes Finding 1-hop location Information T at S Node T is moving out the 1-hop of S Inform All Nodes Set timer again Timer Expired Node T is moving out the 1-hop of S Inform All Nodes No Yes Yes No No 1
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 27 Construct & Transmit a Temporary Polling Schedule No Neighbors Reply in Temporary Slots with Scheduling Data New Transmission Schedule For 1-hop Neighborhood Slot Allocation to 1-hop Neighbors (Using the Reliable Time Slot Allocation Among Mobile Nodes Algorithm Make Frame Schedule to 1-hop Neighbors Wait one Frame for 1-hop Neighbors to Forward New Schedule 1-hop Neighbors Message Reception When RAD Expiration Broadcast Message M immediate emission Reachibility=|r(m)|/|N(s)| # Where r(m): The set of IDs that are known have received the messages referred to as r(m). # N(s): The Set of Neighbors of the Node S by N(S). (f(m)=Reachibility >= Min Reachibility) # f(m): The decision of whether the message should be forwarded or not . Broadcast message Dropped Broadcast message Forward Wait one Frame for 2-hop Neighbors to Forward New Schedule When node gets a New Neighbor event then (N(s)<Density Threshold) Rad(m) 0 Yes # Density Threshold means , incoming message from the 1-hop Neighbors node. No Yes No 1
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 28 Flow chart of Reliable time slot allocation among mobile nodes[19]. S Source Node S=0 Set_Cover=0 Num_OF_ITS=0 M1=E M2=F j=0 H=Nil E →Set of 1-hop nodes from S F → Set of 2-hop nodes from S F≠0 Stop Slot Allocation Add v to Set_Cover Remove v from E Remove Nodes є M(v) from F Select a node vєE that maximizes the size of |M(v)∩F| No Yes 1
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 29 vєSet_Cover(Let v be the first node listed in set cover) If v and every node in H(i) share No common Neighbors in 2-hop Nodes i=i+1 Num_OF_ITS=Num_OF_ITS+1 T= nil, j++, K=0 Add v to ITS(i) i=0 Add v to ITS(Num_OF_ITS) K=K+1 Choose the node v in S (|M(TU{v})|>|M(T)|)&& (|M(TU{v})|>=|M(TU{u})) Stop Slot Allocation M(T)=M(T)+1 M2 Collision freely covered By T S=S-v T=TU{v} No Yes No Yes 1 3 2 |M(TU{v})|>|M(T)| Stop Allocation H=HU{T} M2=M2-M(T) Return(H) No Yes 2 3 Figure 3. Flow chart of SRBS Algorithm
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 30 4. SIMULATION AND RESULT ANALYSIS We have compared the various metric’s simulation results of theSRBS, DFCN, DSB and PEGSP methods; it is implemented in GloMoSim simulatorv2.03 [20,21,22]. We have got taken the subsequent parameters within the configuration setup. Table 1. Simulation Configuration setup parameters Physical ground area 3000 * 3000m Seed value 1 Time 600 seconds TEMPRATURE 290.0 Edge 500m Nodes varied 300 to 600 RADIO-BANDWIDTH 2mb/s NOISE-FIGURE 10.0dB Radio transmission power 10.0 dbm Node placement RANDOM MOBILITY-WP-MIN-SPEED 0 MOBILITY-WP-MAXI-SPEED 10m/s-240m/s MAC-Protocol 802.11 MAX PACKET IN IFQ 50 MOBILITY-WP-PAUSE time period 10s PROMISCUOUS-MODE NO The throughput of the network with 150 nodes is displayed in figure 4 as a result.If we consistently increase node speed, it starts at 20 m/s and goes up to 120 m/s then the four algorithms throughput decreases because of the high speed of nodes. Therefore, DFCN algorithm has low throughput and SRBS algorithm performs better than the other three algorithms. Expression of the throughput: Throughput= (∑P(mg)-∑Q(mg))/∑R(nbn)-----------------------------------------(3) (Where P(mg)→ Sent the total Numberof transmission messages, Q(mg)→Number of neighbor nodes received message, R(nbn)→ Total number of neighbor nodes) Figure 4. Throughput Vs Mobility of Node (Size of node is 150)
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 31 Above figure 5result that when the size of nodes is 500, area is 3000 sq.m2 and speed of nodes is 30 m/s that time PEGSP algorithm results slightly less than the DFCN and DSB algorithms result. If we are increasing regularly the network size and number of nodes, then the four algorithms throughput will decrease. The SRBS algorithm is determined to be superior to the opposing three algorithms. Figure 5. Throughput Vs Network Size (sq.m2) Figure 6. Reachability Vs Number of Nodes (Mobile node’s speed is 30 m/s) The DSB algorithm is more reachable than the SRBS, DFCN and PEGSP algorithms, according to the resulting extract from figure 6. Reachability of the DFCN algorithm is marginally better than PEGSP algorithm at 500 nodes. Reachability is determined by how many nodes have actually received broadcast packets. Reachability = ∑Q(rp)/∑R(nd)--------------------------------------------------(4) (Where Q(rp) → Actual no of nodes has received broadcast packets, R(nd) → Number of nodes overall in the networks).
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 32 Figure 7. Rebroadcast Vs Number of Nodes (Node’s mobility is 30m/s) Figure 7 demonstrates that the SRBS algorithm's simulation result is improved than the other three algorithms because of rebroadcast ratio is minimum. Rebroadcast Ratio=∑RT/∑TN-------------------------------------------------(5) (Where RT → RT is that Actual number of nodes retransmitted packets, TN→The network's total nodes are represented by the TN). Figure 8. Average Latencies Vs Number of Nodes (Each Nodes Speed is 10m/s) Below figure 8 graph shows that when we are increasing network size of nodes, then four algorithm’s broadcast latencies result is increasing. Average broadcast latency means from the interval time of the broadcast was started to destination host finishes at the time of rebroadcast. The DSB algorithm has less average latency than compare DFCN, SRBS and PEGSP algorithms. So, the DSB algorithm is a good performance because of minimum delay. Rebroadcast Vs Number of Nodes 0 20 40 60 80 100 100 200 300 400 500 600 Number of Nodes Rebroadcast(%) SRBS DSB DFCN PEGSP
  • 13. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 33 Figure 9. Reliability Vs Mobility (Size of nodes is 100) In figure 9's outcome demonstrates that as node speeds increase from 0 to 240 m/s, the SRBS algorithm is more reliable than the other three algorithms. Percentage number of node shas received that broadcast of packets within the network we called reliability. It concludes that SRBS algorithm’s result beyond other algorithms, but DFCN algorithm’s performance is incredibly poor. This figure 10 we have seen the efficiency level of SRBS algorithm is better, more other algorithm’s results. In network percentage number of nodes forwarded the packets are called Efficiency. The figure 10, if we are increasing each of the node’s speed is 30m/s then the DFCN performance is slightly less of the PEGSP and DSB algorithm’s performance. Similarly, speed of mobile nodes was increased from 30 to 60 m/s at that time DSB algorithms performance same as PEGSP algorithm. So, as mobile node speed increases from 0 to 210 m/s on a regular basis, the performance of the two methods degrades. Figure 10. Efficiency Vs Mobility (Mobile Nodes size is 150) Reliability Vs Mobility 0 25 50 75 100 0 30 60 90 120 150 180 210 240 Mobility(Mobility is measuredm/s) Reliability(Delivery Ratio %) SRBS DSB DFCN PEGSP Efficiency Vs Mobility 0 10 20 30 40 50 60 70 80 90 100 0 30 60 90 120 150 180 210 Mobility(Mobility is measured in m/s) Efficiency(%) SRBS DSB DFCN PEGSP
  • 14. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 34 Figure 11. Throughput Vs Transmission Range (Size of nodes is 150 and mobility of nodes is 30 m/s) The above figure 11SRBS algorithm contains good performance compare with the DSB, DFCN and PEGSP algorithm’s result when varies in the different transmission ranges. After rising transmission range up to 240m and each of the node’s speed is 30m/s, DFCN algorithm’s performance remains the same as DSB algorithm but it is higher than the PEGSP algorithm. From figure 12, If we regularly varying degree of nodes up to 120 then the DSB algorithm gives higher throughput of DFCN,PEGSP and SRBS algorithms. So, the simulation graph DSB algorithm is healthier. Figure 12. Throughput Vs Degree of Nodes (Node size is150 and node speed is 15m/s) Throughput Vs Transmission Range 0 20 40 60 80 100 60 120 180 240 300 360 Transmission Range (Transmission Range measure in meter) Throughput(Throughput measured in bits per second) SRBS DSB DFCN PEGSP Throughput Vs Degree of Nodes 0 10 20 30 40 50 60 70 80 90 100 15 30 45 60 75 90 105 120 Degree of Nodes Throughput(Throughput is measured in bits per second) SRBS DSB DFCN PEGSP
  • 15. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 35 Figure 13. Network Connectivity Rate Vs No of Nodes In Figure 13, the network connectivity rate is decreased if we increase the number of nodes. Thus, the SRBS algorithm produces better results than the other three algorithms. Figure 14 compares the outputs of the four algorithms result. Performance is improved with the SRBS algorithm. The collision rate likewise rises as packet size grows. Figure 14. Collision Rate Vs No of Nodes It shows from figure 15 that as node size increases, there is more delay for four algorithms. The PEGSP algorithm is better than the DFCN algorithm up to a node size 100. When the number of nodes increases, the DFCN protocol outperforms the PEGSP protocol. The SRBS algorithm results best of three algorithms. 0 20 40 60 80 100 50 100 150 200 250 300 350 400 Network Connectivity Rate Number of Nodes(Mobile Nodes Speed is 30m/s) Network Connectivity Rate Vs No of Nodes SRBS DFCN DSB PEGSP 0 500 1000 1500 2000 2500 3000 3500 4000 50 100 150 200 250 300 350 400 Collision Rate Number of Nodes(Speed of Mobile Nodes is 30m/s) Collision Rate Vs No of Nodes SRBS DFCN DSB PEGSP
  • 16. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 36 Figure 15. End-to-End Delay Vs No of Nodes Figure 16. Connectivity Rate Vs Traffic Overload of Node According to Figure 16, a node's connection rate performance suffers as its traffic overload grows. As a result, the SRBS algorithm achieves better results than the DSB, DFCN and PEGSP algorithms. 5. CONCLUSIONS The author proposed two broadcast protocols modify SRBS and DSB and compared them with well-known existing broadcast algorithms. It is a reliable and high efficiency in a different traffic pattern of highly mobile networks. When we send packets within the network, it takes minimum nodes for communication from source to destination. This algorithm reduces flooding, broadcast latency and redundancy problems. In our simulation, we have got measured the performance of reliability, efficiency, throughput, average latency and rebroadcast. We have got tested the results by varying node mobility, varies transmission ranges, number of nodes, degree of node, network size, network connectivity rate, collision rate, end-to-end delay, and traffic overload of the node. It shows best result when compared with the DFCN and PEGSP algorithms. Our result shows that once we increase the quantity of nodes and node mobility then the SRBS algorithm produces better results than the opposite three algorithms. In simulation results in some cases, we have seen that if we do not increase node mobility and the number of nodes, then the results of the DSB algorithm are better than the opposite three algorithms in terms of reachability, average 0 0.2 0.4 0.6 0.8 1 50 100 150 200 250 300 350 400 End-to-End Delay Number of Nodes(Mobile Node's speed is 30m/s) End-to-End Delay Vs No of Nodes SRBS DFCN DSB PEGSP 0 20 40 60 80 100 15 30 45 60 75 90 105 120 Connectivity Rate Traffic overload of Node(Node's Speed is 30m/s) Connectivity Rate Vs Traffic overload of Node SRBS DFCN DSB PEGSP
  • 17. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 37 latencies, and throughput (Degree of nodes). If we increase the number of nodes and do not increase node mobility, then the DFCN’s algorithm results are better than the PEGSP algorithm. This algorithm is minimizing the frame length to communication in the network, which implies it proves that the bandwidth of the channels is correctly utilized and provides the most throughputs. CONFLICT OF INTEREST The author has declared no competing interests for publication. REFERENCES [1] DemetresKouvatsos and Is-Haka Mkwawa, “Broadcasting Methods in Mobile Ad hoc Networks: An Overview”, Department of Computing, University of Bradford, UK, Department of Computer Science , University College Dublin, Ireland, in 2009. [2] Ching-Chuan Chiang and Mario Gerla, “Routing and Multicast in Multi hop Mobile Wireless Networks”, University of California, Los Angeles. In Proc.ICUPC’97. [3] Eroll L. Lloyd, “Broadcast Scheduling for TDMA in wireless multi hop networks”, Department of Computer Science and Information Sciences, University of Delaware, Hand book of wireless Networks and Mobile Computing Pages 347-368, 2002. [4] S.Ramanathan and E.L. Lloyd, “Scheduling Algorithms for Multi Hop Radio Networks”, IEEE/ACM Transactions on Networking, 1:166-177, April 1993. [5] Zygmunt.J.Haas and B.Liang, “ Ad hoc Mobility Management with Randomized Database groups”, 323 Frank Rhodes Hall, School of Electrical Engineering Cornel University, lthaca, NY 14853 Proceedings of the IEEE International Conference on communications 1756-1762, 1999. [6] B. Williams and T.Camp, “Comparison of Broadcasting Techniques for Mobile Ad hoc Networks”, Department of Math and Computer Science , Colorado, School of Mines Golden, CO 80401, In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc 02),194-205, March 2002. [7] Wei Lou and Jie Wu, “A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks”, Department of Computer Science and Engineering, Florida Atlantic University, Conference on Global Telecommunications Conference, 2003. GLOBECOM '03. IEEE, Volume: 6, January 2004. [8] Brian J. Wolf, Joseph L. Hammond, Daniel L.Noneaker and Harlan B. Russell, “Distributed Formation of Broadcast Transmission Schedules for Mobile Ad Hoc Networks”,Dept. of Electrical and Computer Engineering, Clemson University, Clemson SC, IEEE Volume-6, 2007. [9] J.Jetcheva, Y.Hu, D.Maltz and D.Johnson, “A Simple Protocol for Multicast and Broadcast in Mobile Ad hoc Networks”, Internet Draft, Draft-IETF-MANET simplembcast-01, 2001. [10] Luc Hogie, Marcin Seredynski and Frederic Guinand, “A Bandwidth-Efficient Broadcasting Protocol for Mobile Multi-Hop Ad hoc Networks”, Pascal BouvryUniversity,Luxembourg6, rueR. CoudenhoveKalergiL- 1359 Luxembourg, Polish Academy of Sciences Ordona 2102-237, Warsaw, Poland, University du Havre 25, rue Philippe Lebon76600 Le Havre, France. Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06) Computer Society IEEE 2006. [11] L. Hogie, F. Guinand, and P. Bouvry, “A heuristic for efficient broadcasting in the Metropolitan ad hoc networks”, University du Havre, University du Luxembourg. University du Havre, 25, rue Philippe Lebon 76600 Le Havre, France. University du Luxembourg Campus Kirchberg 6, rue R.Coudenhove-Kalergi L-1359 Luxembourg. In KES, pages 727–733, 2004. [12] H.A Ali, M.S Saleh, M.A. Sadik, “An Efficient Reliable Broadcast Algorithm in Ad hoc Networks Based on Self-Pruning”,IJICIS, Vol.5, No. 1, July 2005. [13] Chandra Kanta Samal, G.V. Singh and Sanjay Kumar Dhurandher, “Stable and Reliable Broadcast Scheduling in Multi-Hop MANET”, AND College, University of Delhi, New Delhi, India, SC&SS, Jawaharlal Nehru University, New Delhi, India and NSIT, University of Delhi, New Delhi, India, International Journal of Engineering Science and Technology (IJEST), Vol. 3 No. 9 September 2011, page no. 6962-6969, ISSN: 0975-5462.
  • 18. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 38 [14] Pei-Kai Hung, Jang-Ping Sheu and Chin-Shun Hsu, “Scheduling of Broadcasts in Multi-hop Wireless Networks”, Dept. of Computer Science and Information Engineering, National Central University Chung-Li, 320 Taiwan, R.O.C., European Wireless 2002 proceedings , 2002. [15] Research Scholar S. Madhavi and Professor I. Ramesh Babu, “A New Method for Adaptive Broadcast Scheduling in Mobile Ad hoc Networks”, Department of Computer Science and Engineering, Acharya Nagarjuna University Guntur, A.P., India, IJCSNS International Journal of Computer Science and Network Security, Vol.8 No.3, March 2008. [16] Lim, H. and Kim, C, “Multicast tree construction and flooding in wireless ad hoc networks”, In Proceedings of the 3rd ACM international workshop on modeling, analysis and simulation of wireless and mobile systems, pages 61-68. ACM Press. (2000). [17] Tseng, Y.-C., Ni, S.-Y, and Shih, E.-Y. “Adaptive Approaches to Relieving Broadcast Storms in a Wireless Multihop Mobile Ad Hoc Network”, In Proceedings of the International Conference on Distributed Systems, pages 481.488(2001). [18] Peng, W. and Lu, X. C. ,“On the reduction of broadcast redundancy in mobile ad hoc networks”, In Proceedings First Annual Workshop on Mobile and Ad Hoc Networking and Computing, pages 129- 130(2000). [19] Chandra Kanta Samal, “Reliable Time Slot Allocation Scheme among Mobile Nodes in MANET” AND College, University of Delhi, New Delhi, India, International Journal of Computer Science Trends and Technology (IJCST), Volume 9, Issue 5, Sep-Oct 2021. [20] GloMoSim:“Global Mobile Information Systems Simulation Library”, http://pcl.cs.ucla.edu/projects/glomosim. [21] Mario GerlaLokesh Bajaj, MineoTakai, Rajat Ahuja, RajiveBagrodia, “GloMoSim: A Scalable Network Simulation Environment”, Technical Report 990027, University of California, 13, 1999. [22] Richard A.Meyer and RajiveBagrodia, “PARSEC USER MANUAL for PARSEC. Release 1.1”, Revised in September 1999, http://pcl.cs.ucla.edu,1999. AUTHOR Dr. Chandra Kanta Samal received the M. Tech. (CS) and Ph. D(CS) from Jawaharlal Nehru University, New Delhi, India. Having 16th years of teaching experience in the field of Computer Science at AND College, Delhi University, New Delhi, India. More papers published on Wireless Networks, Image Processing and robotics in various International Journals and Conferences.