SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010.
10.5121/ijasuc.2010.1203 22
PERFORMANCE ANALYSIS OF BROADCASTING IN
MOBILE AD HOC NETWORKS USING CLUSTER
APPROACH
D.Sivaganesan1
and Dr.R.Venkatesan2
1
Department of Computer Science and Engineering, Karpagam College of Engineering,
Coimbatore, Tamilnadu, India.
dsg_pol@rediffmail.com
2
Department of Information Technology, PSG College of Technology, Coimbatore,
Tamilnadu, India.
ABSTRACT
Broadcasting is a fundamental service in Mobile Ad hoc Networks (MANETs). Cluster based approach
are proposed in literature to reduce the network collision, to reduce delay of packet transmission, to
reduce the energy consumption and improves the throughput. In this paper, a cluster- based
infrastructure is proposed for broadcasting in MANETs. The backbone of the network takes advantage of
the cluster structure and only requires cluster- heads and some selected gateways to forward the
broadcast packet. Each cluster head selects some gateways to forward the packet when it sends the
packet to all the cluster heads in its coverage set. Cluster structures have been simulated using mobile
simulator Glomosim 2.03, which gives better performance to reduce the network collision, to reduce
delay of packet transmission, to reduce the energy consumption and improves the throughput.
KEYWORDS
MANET, Connected Dominating Set, Cluster, Ad Hoc Network
1. INTRODUCTION
A mobile ad hoc network (MANET) is a special type of wireless mobile network which
forms a temporary network without the aid of an established infrastructure or a
centralised administration. Each node in MANET is a router. If a source node is unable to
send a message directly to its destination node due to limited transmission range, the
source node uses intermediate nodes to forward the message towards the destination node.
Broadcasting is the process in which a source node sends a message to all other
nodes in MANET[3]. Broadcasting is important in MANET for routing information
discovery,[1] for instance, protocols such as dynamic source routing (DSR) , ad hoc on
demand distance vector (AODV)[2][9] , and location aided routing use broadcasting to
establish routes. Broadcasting MANET poses more challenges than in wired networks
due to node mobility and scarce system resources. Because of the mobility there is no
single optimal scheme for all scenarios. Mobile ad hoc networks (MANETs) are collections
of autonomous mobile hosts without the help of centre base stations. Applying such networks
into practice brings many challenges to the protocol design, such as routing in highly dynamic
networks [10], allocating shared wireless channels and saving limited bandwidth. Trade offs are
needed in the protocol design to achieve these conflicting goals. The broadcast nature of
wireless transmissions, that all the neighbours of a host will receive the packet when the host
transmits a packet. Extremely limits the scalability of the network. When the size of the network
increases and the network becomes dense, even a simple broadcast operation may trigger a huge
International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010.
23
transmission collision and contention that may lead to the collapse of the whole network [16].
This is referred to as the broadcast storm problem [4]. Therefore, building some type of
backbone infrastructure for a network can enhance the performance of the whole network when
the network becomes dense. Basically, the backbone of a network converts a dense network to a
sparse one to relieve the communication overhead of the whole network. The cluster structure is
a simple backbone infrastructure which has only two levels of hierarchical structure. The
network is partitioned into a group of clusters. Each cluster has one cluster head that dominates
all other members in the cluster. Two cluster heads cannot be neighbours. Gateways are those
non-cluster head nodes that have at least one neighbour that belongs to other clusters. It is easy
to see that cluster heads and gateways form a backbone of the original network. Theoretically,
we can describe a MANET as a unit disk graph G=(V, E), where the node set V represents a set
of wireless mobile hosts and the edge set E represents a set of bi-directional links between the
neighbouring hosts, assuming all hosts have the same transmission range r. Two hosts are
considered neighbours if and only if their geographic distance is less than r. We use Nk
(v) to
represent v’s h-hop neighbour set, including v itself. Generally, a backbone infrastructure of a
network can he considered as a connected dominating set (CDS) [7] of a given graph. A
dominating set (DS) is a subset of nodes such that every node in the graph is either in the set or
has an edge linked to a node in the set. If the sub graph induced from a DS of the graph is
connected, the DS is a CDS. Another concept, an independent set (IS) is defined as a set of
nodes of the network; in which each pair of nodes are not neighbours. In a cluster network, the
set of cluster heads is an IS and the set of the cluster heads and gateways is a CDS [15].
2. RELATED WORK
Flooding is one of the earliest protocols for multicasting and broadcasting in ad hoc networks
[2], [3]. In flooding, every node in the network transmits the message to its neighbours after
receiving it. Flooding can lead to severe contention ,collision and redundant transmissions: a
situation referred to as broadcast storm [1].In a series of papers [4], [5], [6], it was proposed that
a connected dominating set (CDS)[7] can be used as a virtual backbone for routing in ad hoc
networks. Williams and Camp [3] have classified the broadcast protocols into flooding,
probability-based, counter based, distance-based, location-based and neighbour knowledge
schemes. Similarly, neighbour knowledge schemes can be divided into selecting forwarding
neighbours and clustering-based. In counter-based scheme inhibits the rebroadcast if the packet
has already been received for more than a given number of times. In the probabilistic scheme
when receiving a broadcast packet for the first time, a node rebroadcasts the packet with a
probability p; when p=1, this scheme reduces to blind flooding. In the distance-based scheme a
node rebroadcasts the packet only if the distance between the sender and the receiver is larger
than a given threshold. In the location-based scheme, a node rebroadcasts a packet only when
the additional coverage due to the new emission is larger than a certain bound. In the selecting
forwarding neighbours a broadcasting node selects some of its1-hop neighbours as rebroadcast
nodes. Finally, the cluster structure is a simple backbone infrastructure whereby the network is
partitioned into a group of clusters. Each cluster has one cluster head that dominates all other
members in the cluster. A node is called a gateway if it lies within the transmission range of two
or more cluster heads. Gateway nodes are generally used for routing between clusters. The
rebroadcast is performed by cluster heads and gateways.
In this paper, we report results from Glomosim. 2.03 as the simulation platform. Glomosim 2.03
is a popular network simulator which has originally been designed for wireless networks and
has been support simulations in MANET settings in order to characterise neighbourhood’s
information, such as the average number of neighbours of a given node by means of ‘Hello’
packet exchanges. We proposed cluster structure for broadcasting in MANETs for analysing the
performance of network collision, delay for packet transmission, energy consumption and the
throughput.
International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010.
24
3. PRELIMINARIES
3.1. Ad Hoc Broadcasting Approach
In this approach, only nodes selected as gateway nodes and a broadcast message header are
allowed to rebroadcast the message. The approach is described as follow
1. Locate all two hop neighbours that can only be reached by a one hop neighbour.
Select these one hop neighbours as gateways.
2. Calculate the cover set that will receive the message from the current gateway set.
3. For the neighbours not yet in the gateway set, find the one that would cover the most two
hop neighbours not in the cover set. Set this one hop neighbour as a gateway.
4. Repeat process 2 and 3 until all two hop neighbours are covered.
5. When a node receives a message and is a gateway, this node determines which of its
Neighbours already received the message in the same transmission. These neighbours
are considered already covered and are dropped from the neighbour used to select the
next hop gateways.
In Figure 1. node 2 has 1, 5 and 6 nodes as one hop neighbours, 3 and 4 nodes has two hop
neighbours. Node 3 can be reached through node 1 as a one hop neighbour of node 2. Node 4
can be reached through node 1 or node 5 as one hop neighbours of node 2. Node 3 selects node
1 as a gateway to rebroadcast the message to nodes 3 and 4. Upon receiving the message node 5
will not rebroadcast the message as it is not a gateway.
The Limitations are deduced from a detailed comparative study in [12].
1. All methods apart from neighbour based methods require more rebroadcasts,
with respect to the number of retransmitting nodes [15].
2. Because it does not use local information to decide whether to rebroadcast or
not, the Ad hoc broadcasting approaches have difficulties in a very high
mobile MANET.
Figure 1. Ad Hoc Broadcasting Approach
3.2. Cluster Network
The clustering problem can now be defined formally. We are given an undirected graph G
= (V, E) representing a communication network where the vertices are the nodes in the
network and the edges are the communication links. The clustering process first divides V
into a collection of (not necessarily disjoint) subsets {V1 , V2 , . . . , Vk }, such that each
subset Vi induces a connected sub graph of G. Note that these induced sub graphs can
overlap. Each such vertex subset is a cluster [11] [12] [13]. Ideally, the size of the
International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010.
25
clusters falls in a desired range and the induced sub graphs have small diameters. Note
that the clustering approach has been used to address traffic coordination schemes,
routing problems and fault tolerance issues. Note that cluster approach proposed in
[15] was adopted in order to reduce the complexity of the storm broadcasting problem .
Each node in a MANET periodically sends ”Hello” messages to advertise its presence.
Each node has a unique ID. A cluster is a set of nodes formed as follows. A node with a
local minimal ID will elect itself as a cluster head. All surrounding nodes of a head are
members of the cluster identified by the heads ID. Within a cluster, a member that can
communicate with a node in another cluster is a gateway. To take mobility into account,
when two heads meet, the one with a larger ID gives up its head role. This cluster
formation is depicted in Figure 2.
Figure 2.Clustered MANET
In a cluster, the heads rebroadcast can cover all other nodes in its cluster. To rebroadcast
message to nodes in other clusters, gateway nodes are used, hence there is no need for
a non-gateway nodes to rebroadcast the message [17].
3.3. Graph Dominating Set
A dominating set of a graph G = (V, E) is a subset S ⊆ V, such that every vertex v ∈ V is
either in S or adjacent to a vertex of S [5]. The solid black vertices in Figure 3. form a
dominating set of the graph. A vertex of S is said to dominate it self and all adjacent
vertices. We say that an edge is dominated if either of its endpoints is in S and refer to
other edges as free. In general, a vertex subset S is called a distance-k dominating set if
every vertex v is within the closed distance-k neighbourhood of some vertex of S. The
solid black vertices in Figure 3 . Form a dominating set of the graph. A vertex of S is
said to dominate itself and all adjacent vertices. We say that an edge is dominated if
either of its endpoints is in S and refer to other edges as free. In general, a vertex subset S
is called a distance-k dominating set if every vertex v is within the closed distance-k
neighbourhood of some vertex of S. A dominating set is an independent dominating set
if no two vertices in the dominating set are adjacent. An example is shown in Figure 4.
Another important variant is the connected dominating set.
International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010.
26
Figure 3. Dominating Set Figure 4. Connected Dominating Set
4. BROADCASTING IN CLUSTER MANET
4.1. The Cluster Broadcasting
Considering the case that the backbone of the network consists of the fixed cluster heads and
dynamically selected gateways that depend on the source of a broadcast; that is, the gateways
are selected at the time when a cluster head needs to relay the packet. Since this backbone is
constructed step by step as the broadcast traverses the network, some pruning techniques can be
used to reduce the. Broadcast redundancy. Generally, pruning techniques can eliminate some
redundant broadcasting operations between two downstream neighbours of a sender if these two
neighbours know that they have received a broadcast packet from the same upstream sender.
For a simple network with 3 nodes in Fig 5. Suppose node u broadcasts a packet, both nodes v
and w receive the packet, and then they rebroadcast the packet to each other. Apparently, the
last two transmissions are redundant. There is many ways to reduce this kind of transmission
redundancy. When a node receives a broadcast packet, if it can back-off a short period of time
before it relays the packet, it may receive more copies of the same packet from its other
neighbours. If all of its neighbours can be covered by these already received broadcast copies, it
can resign its role of re-broadcast operation. For the network in Fig 5, when both v and w
receive the packet from u, if both v and w have a random delay before they relay the packet, and
w receives the duplicated packet from v before its delay times out, w realizes that all its
neighbours (u and v) have already received the packet. Therefore, it does not relay the packet. In
this case, one redundant transmission is saved. Another way to reduce transmission redundancy
is to piggyback the covered nodes with the broadcast packet when the sender broadcasts a
packet. From the information of the piggybacked packet, each receiver can compute which
subset of its neighbour set has already received the packet.
Figure 5. An illustration of the transmission redundancy in a network with three nodes
u
v
w
International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010.
27
For example, in Figure 5. u broadcasts a packet that piggybacks v and w because they
have received the packet when u broadcasts the packet. At the time that v and w receive
the packet, they know that all of their neighbours (for v they are w and u; for w they are
u and v) have received the broadcast, therefore, none of them will relay the packet
again. In this case, two redundant transmissions are saved. Of course, these methods
will introduce some extra cost, for example, the first one will lead to more delay time
and the second one will increase the message length. By using the pruning technique of
attaching the sender’s coverage set and selected gateways will broadcast the packet.
4.2. Working Principle of the Cluster
1. If the source is not a cluster head, it just sends the broadcast packet to its cluster head.
2. When a cluster head receives the broadcast packet from its upstream cluster head
sender for the first time, it executes the selection process: It chooses some gateways,
called forward nodes, to forward the packet to all the cluster heads in its coverage set.
Its overage set is updated by excluding the cluster head sender and those cluster heads
in the sender’s coverage set that are piggybacked with the broadcast packet. The
coverage set of this cluster head, together with its selected forward nodes, are
piggybacked with the broadcast packet for the forwarding purpose. A Cluster head will
do nothing if it receives a duplicated packet.
3. When a non-cluster head node receive the broadcast packet for the first time and if it is
a forward node, it relays the packet; otherwise, it does nothing.
5. SIMULATION RESULT
The simulation was carried out using Glomosim. 2.03. The parameters used in the following
simulation experiments are listed in Table 1. The MAC layer scheme follows the IEEE 802.11
MAC specification. We have used the broadcast mode with RTS/CTS/ACK mechanisms for all
packet transmissions. The following graph shows the simulation output for ad-hoc networks
with IEEE 802.11 MAC protocol. Figure 6. Shows the reduction of the collision rate. Figure 7.
Shows the reduction of energy consumption. Figure 8.Shows the reduction of delay of
transmission of packets between the clusters heads. Figure 9.Shows throughput for cluster
structure MANET.
Table 1. The parameters used in the simulation
Parameter Value
Simulator Glomosim. 2.03
Network Area 900 x 900 m2
Transmission Range 100~300 meter
MAC Layer IEEE 802.11
Bandwidth 2 M b /s
Data Packet Size 512 bytes
Number of Nodes 20~100
Routing-Protocol AODV
Simulation Time 100 s
Number of Trials 10
International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010.
28
Figure 6. Number of Nodes Vs Collision Rate
Figure 7. Number Nodes Vs Energy Consumption.
International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010.
29
Figure 8. Nodes Vs Delay
Figure 9.Nodes Vs Throughput
International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010.
30
6. CONCLUSIONS
The broadcast nature of wireless transmissions, that all the neighbours of a host will receive the
packet when the host transmits a packet. Extremely limits the scalability of the network. When
the size of the network increases and the network becomes dense, even a simple broadcast
operation may trigger a huge transmission collision and contention that may lead to the collapse
of the whole network [16]. This is referred to as the broadcast storm problem. To reduce this
problem, we proposed cluster structure for broadcasting in MANETs. We describe the
construction of the cluster-based networks. It point out that maintaining a network without
collision at all times for broadcasting is costly and unnecessary rebroadcast will occur.
Therefore, building a Cluster Networks is better choice for collision free transmission in
MANET. Based on our simulation results, we conclude that cluster structure is best to reduce
the network collision, to reduce delay of packet transmission, to reduce the energy consumption
and improves the throughput.
REFERENCES
[1] V. Park and S. Corson,( 1997), A Highly Adaptive Distributed Routing Algorithm for Mobile
Wireless Networks, INFOCOM 97, 1407-1415.
[2] C. Perkins, E. Beldig-Royer and S. Das,( 2003),Ad hoc on Demand Distance Vector(AODV)
Routing. Request for Comments 3561.
[3] B. Williams and T. Camp,( 2002), Comparison of Broadcasting Techniques for Mobile Ad
hoc Networks. In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and
Computing (MOBIHOC), 194–205.
[4] S. Ni, Y. Tseng, Y. Chen and J. Sheu, (1999), The Broadcast Storm Problem in a Mobile Ad
Hoc Network. International Workshop on Mobile Computing and Networks, 151–162.
[5] B. N. Clark, C. J. Colbourn, and D. S. Johnson, (1990), Unit dis k graphs,
Discrete Mathematics, 85 pp. 165–177.
[6] M.Gerla and J.C. Tsai, (1995), Multicluster, mobile, multimedia radio network,
Wireless Networks, pp. 255–265.
[7] W. Peng and X. Lu,(1999),Efficient Broadcast in Mobile Ad hoc Networks using
Connected Dominating Sets. Journal of Software.
[8] W. Peng and X. Lu,( 2002),AHBP: An Efficient Broadcast Protocol for Mobile
Ad Hoc Networks. Journal of Science and Technology.
[9] C. Perkins, E. Royer and S. Das, (2002), Ad hoc On-demand Distance Vector
(AODV) Routing. IETF Internet-Draft, draft-ietf-manet-aodv-11.txt.
[10] D. Johnson, D. Maltz and Y. Hu, (2003), The Dynamic Source Routing Protocol
for Mobile Ad hoc Networks. Internet Draft: draft-ietf-manet-dsr-09.txt.
[11] B.An and S. Papavassiliou, (2001), A mobility-based clustering approach to support
Mobility management and multicast routing in mobile ad-hoc wireless networks,
International Journal of Network Management, pp. 387–395.
[12] S. Banerjee and S. Khuller, (2000), A clustering scheme for hierarchical
Routing in wireless networks, Tech. Report CS-TR-4103, University of Maryland,
College Park.
[13] M.Steenstrup,( 2001), Cluster-based networks, in Ad Hoc Networking, C. Perkins,
ed., Addison- Wesley.
[14] X.-Y. Li, (2003), Topology control in wireless ad hoc networks, in Ad Hoc
Networking, S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, eds., IEEE
Press.
International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010.
31
[15] K. M. Aizoubi. P. J. Wan and O. Frieder, (2002), Message-Optimal Connected Dominating Sets
In Mobile Ad Hoc Networks. Proc.of ACM Mobihoc’2002. Pages 157-164.
[16] H. Lim and C. Kim, ( 2001), Flooding In Wireless Ad Hoc Networks. Computer
Communications Journal, 24(3-4): 353- 363.
[17] J. Wu and W. Lou, (2003), Forward-Node-Set-Based Broadcast In Clustered Mobile Ad Hoc
Networks, Accepted To Appear In Wireless Networks and Mobile Computing, A Special Issue
On Algorithmic, Geometric, Graph, Combinatorial, And Vector Aspects.
Authors
Mr.D.Sivaganesan received BE degree in Computer Science Engineering in
1999, M.Tech degree in Information Technology in 2004.He is currently working
as an Assistant Professor in the Department of Computer Science and
Engineering, Karpagam College of Engineering, Coimbatore.He is currently
pursuing Ph.D. His research interest includes Mobile Computing, Object
Computing, Simulation and Microprocessors Based Systems. He has published
12 technical papers in International, National Conferences and Journals.
Dr.R.Venkatesan received Ph.D degree in Computer Science and Engineering.
He is currently working as Professor and Head, Department of Information
Technology, PSG College of Technology, Coimbatore. His research interest
includes Simulation and Modeling, Software Engineering, Software, Algorithm
Design, Database Technology, Software Project Management, Software Process
Management. He has published 26 technical papers in International, National
Conferences and Journals.

More Related Content

What's hot

Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]ingenioustech
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...eSAT Journals
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparisonPhearin Sok
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
 
Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant NetworksAnubhav Mahajan
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancingijdpsjournal
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...ijdpsjournal
 
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKIMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
 
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETIMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETijcsa
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksJPINFOTECH JAYAPRAKASH
 
Multicasting in DTN Networks
Multicasting in DTN Networks Multicasting in DTN Networks
Multicasting in DTN Networks Nagendra Posani
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...IJRES Journal
 

What's hot (20)

Fa25939942
Fa25939942Fa25939942
Fa25939942
 
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
 
ROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTNROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTN
 
Aj25210213
Aj25210213Aj25210213
Aj25210213
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETs
 
Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant Networks
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancing
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
 
F0963440
F0963440F0963440
F0963440
 
17 18
17 1817 18
17 18
 
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKIMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
 
ICICCE0367
ICICCE0367ICICCE0367
ICICCE0367
 
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETIMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networks
 
Multicasting in DTN Networks
Multicasting in DTN Networks Multicasting in DTN Networks
Multicasting in DTN Networks
 
23
2323
23
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...
 

Similar to PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER APPROACH

Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 
ADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKS
ADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKSADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKS
ADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKSijasuc
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcastIJCNCJournal
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesijcsit
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 

Similar to PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER APPROACH (20)

Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
ADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKS
ADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKSADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKS
ADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKS
 
Bn25384390
Bn25384390Bn25384390
Bn25384390
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET
 
Eb34777780
Eb34777780Eb34777780
Eb34777780
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
IJET-V2I6P5
IJET-V2I6P5IJET-V2I6P5
IJET-V2I6P5
 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcast
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 

Recently uploaded

What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 

Recently uploaded (20)

What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 

PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER APPROACH

  • 1. International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010. 10.5121/ijasuc.2010.1203 22 PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER APPROACH D.Sivaganesan1 and Dr.R.Venkatesan2 1 Department of Computer Science and Engineering, Karpagam College of Engineering, Coimbatore, Tamilnadu, India. dsg_pol@rediffmail.com 2 Department of Information Technology, PSG College of Technology, Coimbatore, Tamilnadu, India. ABSTRACT Broadcasting is a fundamental service in Mobile Ad hoc Networks (MANETs). Cluster based approach are proposed in literature to reduce the network collision, to reduce delay of packet transmission, to reduce the energy consumption and improves the throughput. In this paper, a cluster- based infrastructure is proposed for broadcasting in MANETs. The backbone of the network takes advantage of the cluster structure and only requires cluster- heads and some selected gateways to forward the broadcast packet. Each cluster head selects some gateways to forward the packet when it sends the packet to all the cluster heads in its coverage set. Cluster structures have been simulated using mobile simulator Glomosim 2.03, which gives better performance to reduce the network collision, to reduce delay of packet transmission, to reduce the energy consumption and improves the throughput. KEYWORDS MANET, Connected Dominating Set, Cluster, Ad Hoc Network 1. INTRODUCTION A mobile ad hoc network (MANET) is a special type of wireless mobile network which forms a temporary network without the aid of an established infrastructure or a centralised administration. Each node in MANET is a router. If a source node is unable to send a message directly to its destination node due to limited transmission range, the source node uses intermediate nodes to forward the message towards the destination node. Broadcasting is the process in which a source node sends a message to all other nodes in MANET[3]. Broadcasting is important in MANET for routing information discovery,[1] for instance, protocols such as dynamic source routing (DSR) , ad hoc on demand distance vector (AODV)[2][9] , and location aided routing use broadcasting to establish routes. Broadcasting MANET poses more challenges than in wired networks due to node mobility and scarce system resources. Because of the mobility there is no single optimal scheme for all scenarios. Mobile ad hoc networks (MANETs) are collections of autonomous mobile hosts without the help of centre base stations. Applying such networks into practice brings many challenges to the protocol design, such as routing in highly dynamic networks [10], allocating shared wireless channels and saving limited bandwidth. Trade offs are needed in the protocol design to achieve these conflicting goals. The broadcast nature of wireless transmissions, that all the neighbours of a host will receive the packet when the host transmits a packet. Extremely limits the scalability of the network. When the size of the network increases and the network becomes dense, even a simple broadcast operation may trigger a huge
  • 2. International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010. 23 transmission collision and contention that may lead to the collapse of the whole network [16]. This is referred to as the broadcast storm problem [4]. Therefore, building some type of backbone infrastructure for a network can enhance the performance of the whole network when the network becomes dense. Basically, the backbone of a network converts a dense network to a sparse one to relieve the communication overhead of the whole network. The cluster structure is a simple backbone infrastructure which has only two levels of hierarchical structure. The network is partitioned into a group of clusters. Each cluster has one cluster head that dominates all other members in the cluster. Two cluster heads cannot be neighbours. Gateways are those non-cluster head nodes that have at least one neighbour that belongs to other clusters. It is easy to see that cluster heads and gateways form a backbone of the original network. Theoretically, we can describe a MANET as a unit disk graph G=(V, E), where the node set V represents a set of wireless mobile hosts and the edge set E represents a set of bi-directional links between the neighbouring hosts, assuming all hosts have the same transmission range r. Two hosts are considered neighbours if and only if their geographic distance is less than r. We use Nk (v) to represent v’s h-hop neighbour set, including v itself. Generally, a backbone infrastructure of a network can he considered as a connected dominating set (CDS) [7] of a given graph. A dominating set (DS) is a subset of nodes such that every node in the graph is either in the set or has an edge linked to a node in the set. If the sub graph induced from a DS of the graph is connected, the DS is a CDS. Another concept, an independent set (IS) is defined as a set of nodes of the network; in which each pair of nodes are not neighbours. In a cluster network, the set of cluster heads is an IS and the set of the cluster heads and gateways is a CDS [15]. 2. RELATED WORK Flooding is one of the earliest protocols for multicasting and broadcasting in ad hoc networks [2], [3]. In flooding, every node in the network transmits the message to its neighbours after receiving it. Flooding can lead to severe contention ,collision and redundant transmissions: a situation referred to as broadcast storm [1].In a series of papers [4], [5], [6], it was proposed that a connected dominating set (CDS)[7] can be used as a virtual backbone for routing in ad hoc networks. Williams and Camp [3] have classified the broadcast protocols into flooding, probability-based, counter based, distance-based, location-based and neighbour knowledge schemes. Similarly, neighbour knowledge schemes can be divided into selecting forwarding neighbours and clustering-based. In counter-based scheme inhibits the rebroadcast if the packet has already been received for more than a given number of times. In the probabilistic scheme when receiving a broadcast packet for the first time, a node rebroadcasts the packet with a probability p; when p=1, this scheme reduces to blind flooding. In the distance-based scheme a node rebroadcasts the packet only if the distance between the sender and the receiver is larger than a given threshold. In the location-based scheme, a node rebroadcasts a packet only when the additional coverage due to the new emission is larger than a certain bound. In the selecting forwarding neighbours a broadcasting node selects some of its1-hop neighbours as rebroadcast nodes. Finally, the cluster structure is a simple backbone infrastructure whereby the network is partitioned into a group of clusters. Each cluster has one cluster head that dominates all other members in the cluster. A node is called a gateway if it lies within the transmission range of two or more cluster heads. Gateway nodes are generally used for routing between clusters. The rebroadcast is performed by cluster heads and gateways. In this paper, we report results from Glomosim. 2.03 as the simulation platform. Glomosim 2.03 is a popular network simulator which has originally been designed for wireless networks and has been support simulations in MANET settings in order to characterise neighbourhood’s information, such as the average number of neighbours of a given node by means of ‘Hello’ packet exchanges. We proposed cluster structure for broadcasting in MANETs for analysing the performance of network collision, delay for packet transmission, energy consumption and the throughput.
  • 3. International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010. 24 3. PRELIMINARIES 3.1. Ad Hoc Broadcasting Approach In this approach, only nodes selected as gateway nodes and a broadcast message header are allowed to rebroadcast the message. The approach is described as follow 1. Locate all two hop neighbours that can only be reached by a one hop neighbour. Select these one hop neighbours as gateways. 2. Calculate the cover set that will receive the message from the current gateway set. 3. For the neighbours not yet in the gateway set, find the one that would cover the most two hop neighbours not in the cover set. Set this one hop neighbour as a gateway. 4. Repeat process 2 and 3 until all two hop neighbours are covered. 5. When a node receives a message and is a gateway, this node determines which of its Neighbours already received the message in the same transmission. These neighbours are considered already covered and are dropped from the neighbour used to select the next hop gateways. In Figure 1. node 2 has 1, 5 and 6 nodes as one hop neighbours, 3 and 4 nodes has two hop neighbours. Node 3 can be reached through node 1 as a one hop neighbour of node 2. Node 4 can be reached through node 1 or node 5 as one hop neighbours of node 2. Node 3 selects node 1 as a gateway to rebroadcast the message to nodes 3 and 4. Upon receiving the message node 5 will not rebroadcast the message as it is not a gateway. The Limitations are deduced from a detailed comparative study in [12]. 1. All methods apart from neighbour based methods require more rebroadcasts, with respect to the number of retransmitting nodes [15]. 2. Because it does not use local information to decide whether to rebroadcast or not, the Ad hoc broadcasting approaches have difficulties in a very high mobile MANET. Figure 1. Ad Hoc Broadcasting Approach 3.2. Cluster Network The clustering problem can now be defined formally. We are given an undirected graph G = (V, E) representing a communication network where the vertices are the nodes in the network and the edges are the communication links. The clustering process first divides V into a collection of (not necessarily disjoint) subsets {V1 , V2 , . . . , Vk }, such that each subset Vi induces a connected sub graph of G. Note that these induced sub graphs can overlap. Each such vertex subset is a cluster [11] [12] [13]. Ideally, the size of the
  • 4. International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010. 25 clusters falls in a desired range and the induced sub graphs have small diameters. Note that the clustering approach has been used to address traffic coordination schemes, routing problems and fault tolerance issues. Note that cluster approach proposed in [15] was adopted in order to reduce the complexity of the storm broadcasting problem . Each node in a MANET periodically sends ”Hello” messages to advertise its presence. Each node has a unique ID. A cluster is a set of nodes formed as follows. A node with a local minimal ID will elect itself as a cluster head. All surrounding nodes of a head are members of the cluster identified by the heads ID. Within a cluster, a member that can communicate with a node in another cluster is a gateway. To take mobility into account, when two heads meet, the one with a larger ID gives up its head role. This cluster formation is depicted in Figure 2. Figure 2.Clustered MANET In a cluster, the heads rebroadcast can cover all other nodes in its cluster. To rebroadcast message to nodes in other clusters, gateway nodes are used, hence there is no need for a non-gateway nodes to rebroadcast the message [17]. 3.3. Graph Dominating Set A dominating set of a graph G = (V, E) is a subset S ⊆ V, such that every vertex v ∈ V is either in S or adjacent to a vertex of S [5]. The solid black vertices in Figure 3. form a dominating set of the graph. A vertex of S is said to dominate it self and all adjacent vertices. We say that an edge is dominated if either of its endpoints is in S and refer to other edges as free. In general, a vertex subset S is called a distance-k dominating set if every vertex v is within the closed distance-k neighbourhood of some vertex of S. The solid black vertices in Figure 3 . Form a dominating set of the graph. A vertex of S is said to dominate itself and all adjacent vertices. We say that an edge is dominated if either of its endpoints is in S and refer to other edges as free. In general, a vertex subset S is called a distance-k dominating set if every vertex v is within the closed distance-k neighbourhood of some vertex of S. A dominating set is an independent dominating set if no two vertices in the dominating set are adjacent. An example is shown in Figure 4. Another important variant is the connected dominating set.
  • 5. International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010. 26 Figure 3. Dominating Set Figure 4. Connected Dominating Set 4. BROADCASTING IN CLUSTER MANET 4.1. The Cluster Broadcasting Considering the case that the backbone of the network consists of the fixed cluster heads and dynamically selected gateways that depend on the source of a broadcast; that is, the gateways are selected at the time when a cluster head needs to relay the packet. Since this backbone is constructed step by step as the broadcast traverses the network, some pruning techniques can be used to reduce the. Broadcast redundancy. Generally, pruning techniques can eliminate some redundant broadcasting operations between two downstream neighbours of a sender if these two neighbours know that they have received a broadcast packet from the same upstream sender. For a simple network with 3 nodes in Fig 5. Suppose node u broadcasts a packet, both nodes v and w receive the packet, and then they rebroadcast the packet to each other. Apparently, the last two transmissions are redundant. There is many ways to reduce this kind of transmission redundancy. When a node receives a broadcast packet, if it can back-off a short period of time before it relays the packet, it may receive more copies of the same packet from its other neighbours. If all of its neighbours can be covered by these already received broadcast copies, it can resign its role of re-broadcast operation. For the network in Fig 5, when both v and w receive the packet from u, if both v and w have a random delay before they relay the packet, and w receives the duplicated packet from v before its delay times out, w realizes that all its neighbours (u and v) have already received the packet. Therefore, it does not relay the packet. In this case, one redundant transmission is saved. Another way to reduce transmission redundancy is to piggyback the covered nodes with the broadcast packet when the sender broadcasts a packet. From the information of the piggybacked packet, each receiver can compute which subset of its neighbour set has already received the packet. Figure 5. An illustration of the transmission redundancy in a network with three nodes u v w
  • 6. International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010. 27 For example, in Figure 5. u broadcasts a packet that piggybacks v and w because they have received the packet when u broadcasts the packet. At the time that v and w receive the packet, they know that all of their neighbours (for v they are w and u; for w they are u and v) have received the broadcast, therefore, none of them will relay the packet again. In this case, two redundant transmissions are saved. Of course, these methods will introduce some extra cost, for example, the first one will lead to more delay time and the second one will increase the message length. By using the pruning technique of attaching the sender’s coverage set and selected gateways will broadcast the packet. 4.2. Working Principle of the Cluster 1. If the source is not a cluster head, it just sends the broadcast packet to its cluster head. 2. When a cluster head receives the broadcast packet from its upstream cluster head sender for the first time, it executes the selection process: It chooses some gateways, called forward nodes, to forward the packet to all the cluster heads in its coverage set. Its overage set is updated by excluding the cluster head sender and those cluster heads in the sender’s coverage set that are piggybacked with the broadcast packet. The coverage set of this cluster head, together with its selected forward nodes, are piggybacked with the broadcast packet for the forwarding purpose. A Cluster head will do nothing if it receives a duplicated packet. 3. When a non-cluster head node receive the broadcast packet for the first time and if it is a forward node, it relays the packet; otherwise, it does nothing. 5. SIMULATION RESULT The simulation was carried out using Glomosim. 2.03. The parameters used in the following simulation experiments are listed in Table 1. The MAC layer scheme follows the IEEE 802.11 MAC specification. We have used the broadcast mode with RTS/CTS/ACK mechanisms for all packet transmissions. The following graph shows the simulation output for ad-hoc networks with IEEE 802.11 MAC protocol. Figure 6. Shows the reduction of the collision rate. Figure 7. Shows the reduction of energy consumption. Figure 8.Shows the reduction of delay of transmission of packets between the clusters heads. Figure 9.Shows throughput for cluster structure MANET. Table 1. The parameters used in the simulation Parameter Value Simulator Glomosim. 2.03 Network Area 900 x 900 m2 Transmission Range 100~300 meter MAC Layer IEEE 802.11 Bandwidth 2 M b /s Data Packet Size 512 bytes Number of Nodes 20~100 Routing-Protocol AODV Simulation Time 100 s Number of Trials 10
  • 7. International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010. 28 Figure 6. Number of Nodes Vs Collision Rate Figure 7. Number Nodes Vs Energy Consumption.
  • 8. International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010. 29 Figure 8. Nodes Vs Delay Figure 9.Nodes Vs Throughput
  • 9. International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010. 30 6. CONCLUSIONS The broadcast nature of wireless transmissions, that all the neighbours of a host will receive the packet when the host transmits a packet. Extremely limits the scalability of the network. When the size of the network increases and the network becomes dense, even a simple broadcast operation may trigger a huge transmission collision and contention that may lead to the collapse of the whole network [16]. This is referred to as the broadcast storm problem. To reduce this problem, we proposed cluster structure for broadcasting in MANETs. We describe the construction of the cluster-based networks. It point out that maintaining a network without collision at all times for broadcasting is costly and unnecessary rebroadcast will occur. Therefore, building a Cluster Networks is better choice for collision free transmission in MANET. Based on our simulation results, we conclude that cluster structure is best to reduce the network collision, to reduce delay of packet transmission, to reduce the energy consumption and improves the throughput. REFERENCES [1] V. Park and S. Corson,( 1997), A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks, INFOCOM 97, 1407-1415. [2] C. Perkins, E. Beldig-Royer and S. Das,( 2003),Ad hoc on Demand Distance Vector(AODV) Routing. Request for Comments 3561. [3] B. Williams and T. Camp,( 2002), Comparison of Broadcasting Techniques for Mobile Ad hoc Networks. In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC), 194–205. [4] S. Ni, Y. Tseng, Y. Chen and J. Sheu, (1999), The Broadcast Storm Problem in a Mobile Ad Hoc Network. International Workshop on Mobile Computing and Networks, 151–162. [5] B. N. Clark, C. J. Colbourn, and D. S. Johnson, (1990), Unit dis k graphs, Discrete Mathematics, 85 pp. 165–177. [6] M.Gerla and J.C. Tsai, (1995), Multicluster, mobile, multimedia radio network, Wireless Networks, pp. 255–265. [7] W. Peng and X. Lu,(1999),Efficient Broadcast in Mobile Ad hoc Networks using Connected Dominating Sets. Journal of Software. [8] W. Peng and X. Lu,( 2002),AHBP: An Efficient Broadcast Protocol for Mobile Ad Hoc Networks. Journal of Science and Technology. [9] C. Perkins, E. Royer and S. Das, (2002), Ad hoc On-demand Distance Vector (AODV) Routing. IETF Internet-Draft, draft-ietf-manet-aodv-11.txt. [10] D. Johnson, D. Maltz and Y. Hu, (2003), The Dynamic Source Routing Protocol for Mobile Ad hoc Networks. Internet Draft: draft-ietf-manet-dsr-09.txt. [11] B.An and S. Papavassiliou, (2001), A mobility-based clustering approach to support Mobility management and multicast routing in mobile ad-hoc wireless networks, International Journal of Network Management, pp. 387–395. [12] S. Banerjee and S. Khuller, (2000), A clustering scheme for hierarchical Routing in wireless networks, Tech. Report CS-TR-4103, University of Maryland, College Park. [13] M.Steenstrup,( 2001), Cluster-based networks, in Ad Hoc Networking, C. Perkins, ed., Addison- Wesley. [14] X.-Y. Li, (2003), Topology control in wireless ad hoc networks, in Ad Hoc Networking, S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, eds., IEEE Press.
  • 10. International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010. 31 [15] K. M. Aizoubi. P. J. Wan and O. Frieder, (2002), Message-Optimal Connected Dominating Sets In Mobile Ad Hoc Networks. Proc.of ACM Mobihoc’2002. Pages 157-164. [16] H. Lim and C. Kim, ( 2001), Flooding In Wireless Ad Hoc Networks. Computer Communications Journal, 24(3-4): 353- 363. [17] J. Wu and W. Lou, (2003), Forward-Node-Set-Based Broadcast In Clustered Mobile Ad Hoc Networks, Accepted To Appear In Wireless Networks and Mobile Computing, A Special Issue On Algorithmic, Geometric, Graph, Combinatorial, And Vector Aspects. Authors Mr.D.Sivaganesan received BE degree in Computer Science Engineering in 1999, M.Tech degree in Information Technology in 2004.He is currently working as an Assistant Professor in the Department of Computer Science and Engineering, Karpagam College of Engineering, Coimbatore.He is currently pursuing Ph.D. His research interest includes Mobile Computing, Object Computing, Simulation and Microprocessors Based Systems. He has published 12 technical papers in International, National Conferences and Journals. Dr.R.Venkatesan received Ph.D degree in Computer Science and Engineering. He is currently working as Professor and Head, Department of Information Technology, PSG College of Technology, Coimbatore. His research interest includes Simulation and Modeling, Software Engineering, Software, Algorithm Design, Database Technology, Software Project Management, Software Process Management. He has published 26 technical papers in International, National Conferences and Journals.