SlideShare a Scribd company logo
1 of 15
Download to read offline
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015
DOI : 10.5121/ijwmn.2015.7301 1
WIRELESS MESH NETWORKS CAPACITY
IMPROVEMENT USING CBF
Youssef Saadi1
, Bouchaib Nassereddine2
, Soufiane Jounaidi3
and Abdelkrim Haqiq4
1,2,3
Computer, Networks, Mobility and Modeling laboratory
Department of Mathematics and Computer
FST, Hassan 1st University, Settat, Morocco
4
e-NGN Research group, Africa and Middle East
ABSTRACT
Wireless mesh network has recently received a great deal of attention as a promising technology to provide
ubiquitous high bandwidth access for a large number of users. Such network may face a significant
broadcast traffic that may consequently degrade the network reliability.
In this paper, we have focused interest to wireless mesh network based IEEE 802.11s and we have designed
a self-pruning method to control and reduce the broadcast traffic forwarding. Our scheme, namely Control
of Broadcast Forwarding (CBF), defines two behaviours to manage the broadcasting operation. Routing
packets are managed differently from data broadcast messages to avoid afflicting the routing process.
The simulations results show that CBF ameliorates the network capacity by reducing considerably the
number of redundant packets, improving the end to end delay and providing high reachability and packet
delivery ration.
KEYWORDS
Flooding Protocols, Wireless Mesh Network, Broadcast Storm
1. INTRODUCTION
In multi-hop wireless networks, the trivial way to broadcast a message to all network nodes is via
flooding that is a network-wide broadcasting operation by which a packet is disseminated to all
other nodes with some nodes selected as relays.
Broadcasting by flooding is an important process used for path and topology discovery in many
unicast routing protocols such as AODV, DSR, ZRP ā€¦ it is used also by many applications that
may include service discovery, address auto configuration or network self-organization.
However such operation is costly and may lead to the broadcast storm problems as referred in
[16].
Redundancy, collision and contention are features of the broadcast storm problems that seriously
degrade the network performances and hinder the transmission of data packets [5].
Actually, flooding a wireless network based CSMA/CA brings the following drawbacks:
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015
2
ā€¢ Contention: after receiving the same broadcast message, some neighbors decide to
retransmit it at correlated times. Theses transmissions will contend with each other on
channel access.
ā€¢ Redundant retransmissions: a node decides to rebroadcast a message to its neighbors
while they have already received the message.
ā€¢ Collision: the lack of CTS/RTS dialogue, the absence of collision detection and the
deficiency backoff mechanism make collision more likely to occur.
These problems become increasingly likely in a wireless mesh network (WMN) based IEEE
802.11s. Actually:
ā€¢ Flooding is strongly used by HWPM [7] which is the default routing protocol in such
network.
ā€¢ The network control, routing, and topology maintenance rely heavily on layer-2
broadcasting.
ā€¢ A wireless mesh network may bridge wired networks which deploy many broadcast-
based applications such as the address resolution protocol (ARP), the spanning-tree
protocol (STP), and Dynamic Host Configuration Protocol (DHCP).
ā€¢ The WMN ad hoc and infrastructure planes may share the same channel and overlap their
coverage area.
These features result in a considerable augmentation of broadcast traffic that can significantly
hinder the transmission and routing of unicast data thereby degrading the network reliability.
Previous proposed schemes delay the retransmission of received broadcast packets for a Random
Assessment Delay (RAD) which allow nodes sufficient time to receive redundant packets and
ascertain whether a rebroadcast is needed or not. The RAD may prevent collisions by
differentiating time of retransmissions.
Actually, the RAD deployment may cause serious problems in CSMA/CA based wireless
networks. The backoff mechanism is triggered whenever contention occurs by delaying randomly
the retransmissions. This delay will be added to the RAD resulting on much more delays that may
affect the packet runtime cost.
Previous works does not carry about saving the routing information. They may force using non
optimal paths for certain destinations.
Hence, in our approach we address these problems by abandoning the RAD deployment and by
processing packets according to their types. Data packets will be manage differently from routing
packets.
2. WIRELESS MESH NETWORKS BASED IEEE 802.11S
2.1. Introduction
Wireless Mesh Networks (WMNs) based IEEE 802.11s [17] are the next step in the evolution of
IEEE 802.11 Wireless Local Area Networks (WLANs). They tend to extend the coverage area of
WLANs by wireless dynamic association of access points. Unlike WLANs, mesh networks are a
particular type of Mobile Ad hoc Networks (MANETs) with low mobility. They are self-
organized, self-configured, self-healing and self-discovering.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015
Typically, a wireless mesh network based IEEE 802.11s is a set of stationary wireless routers
(i.e., Mesh points) communicating in multi
points (i.e., Mesh Access Points) interconnectin
forward data to or from wireline entry points (i.e., Mesh Portal Points) that are gateways bridging
external networks (i.e., Internet).
A WMN is considered hybrid between wireless ad hoc networks and infra
networks, thus providing flexibility in building and expanding the network [
infrastructure plane is the area covered by a MAP to serve Mesh stations. The ad hoc plane is the
area covered by MPs, MAPs and MPPs to for
Figure 1. WMN based
2.2. Routing Procedure
Routing in WMNs based IEEE 802.11s uses layer 2 addressing instead of IP addresses. The 11s
task group has set a target configuration containing up to 32 network entities which can
participate in routing. But configurations with more nodes remain possible.
Hybrid Wireless Mesh Network (HWMP) [
networks. It combines between two types of protocols:
The reactive RM- AODV protocol which is a variant of the ad hoc on demand vector protocol
[12] using the Air Time metric. In this protocol the route is established on demand.
Actually, when a Mesh Point decides to communicate with another
route, it initiates a discovery process to look for an optimized routing path.
flooding a path request packet (PREQ) that may cross multi hops to reach the destination or a
Mesh Point knowing already a route to this destination. At the other hand, on receiving the
PREQ, the destination Mesh Point answers back th
packet PREP that indicates the reverse path to the destination.
The proactive protocol TBR (Tree Based Routing) most often used for routing to gateways. It
configures a particular MP as the root of the tree (e.g
protocol proceeds in two phases, first phase consisting of tree construction: here the root
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015
Typically, a wireless mesh network based IEEE 802.11s is a set of stationary wireless routers
(i.e., Mesh points) communicating in multi-hop and forming a kind of backhaul behind access
oints) interconnecting client devices (Mesh Stations). The mesh points
forward data to or from wireline entry points (i.e., Mesh Portal Points) that are gateways bridging
external networks (i.e., Internet).
A WMN is considered hybrid between wireless ad hoc networks and infrastructure-based wireless
networks, thus providing flexibility in building and expanding the network [Figure 1
infrastructure plane is the area covered by a MAP to serve Mesh stations. The ad hoc plane is the
area covered by MPs, MAPs and MPPs to forward the trafļ¬c on the infrastructure plane.
Figure 1. WMN based IEEE 802.11s architecture [17]
Routing in WMNs based IEEE 802.11s uses layer 2 addressing instead of IP addresses. The 11s
task group has set a target configuration containing up to 32 network entities which can
participate in routing. But configurations with more nodes remain possible.
Hybrid Wireless Mesh Network (HWMP) [7] is the default routing protocol used in such
networks. It combines between two types of protocols:
AODV protocol which is a variant of the ad hoc on demand vector protocol
] using the Air Time metric. In this protocol the route is established on demand.
Actually, when a Mesh Point decides to communicate with another one that he does not know the
route, it initiates a discovery process to look for an optimized routing path. So, it broadcasts by
flooding a path request packet (PREQ) that may cross multi hops to reach the destination or a
Mesh Point knowing already a route to this destination. At the other hand, on receiving the
PREQ, the destination Mesh Point answers back the source by sending a unicast route reply
packet PREP that indicates the reverse path to the destination.
The proactive protocol TBR (Tree Based Routing) most often used for routing to gateways. It
configures a particular MP as the root of the tree (e.g., bridge linking an external network). The
protocol proceeds in two phases, first phase consisting of tree construction: here the root
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015
3
Typically, a wireless mesh network based IEEE 802.11s is a set of stationary wireless routers
hop and forming a kind of backhaul behind access
tations). The mesh points
forward data to or from wireline entry points (i.e., Mesh Portal Points) that are gateways bridging
based wireless
Figure 1]. The
infrastructure plane is the area covered by a MAP to serve Mesh stations. The ad hoc plane is the
ļ¬c on the infrastructure plane.
Routing in WMNs based IEEE 802.11s uses layer 2 addressing instead of IP addresses. The 11s
task group has set a target configuration containing up to 32 network entities which can
] is the default routing protocol used in such
AODV protocol which is a variant of the ad hoc on demand vector protocol
] using the Air Time metric. In this protocol the route is established on demand.
that he does not know the
it broadcasts by
flooding a path request packet (PREQ) that may cross multi hops to reach the destination or a
Mesh Point knowing already a route to this destination. At the other hand, on receiving the
e source by sending a unicast route reply
The proactive protocol TBR (Tree Based Routing) most often used for routing to gateways. It
., bridge linking an external network). The
protocol proceeds in two phases, first phase consisting of tree construction: here the root
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015
4
periodically broadcasts a message "Root Announcement" with the distance field set to zero. The
MPs then rebroadcast this message while updating the distance to the root. At the end of this
phase, each MP has chosen a MP father. This MP father is located on the shortest path to the root.
The second phase consists of subscribing the MPs and their stations at the root by sending a
"Gratuitous PREP" message. Now when an MP S wants to send a message to an MP D, it sends it
to the root, which relays it to the MP D.
In previous works [14, 15], we have evaluated by simulations our approach, namely control of
broadcast forwarding (CBF). The basic ideas behind were to compute how much CBF can reduce
routing broadcast traffic impact on unicast data transmissions and how much rebroadcasts could
be saved.
In this work, we enhanced CBF to guarantee more network coverage and more redundant packets
decrease. We evaluated our scheme in comparison with Blind Flooding according to several
simulation scenarios taking into account various parameters like network density, topology and
traffic load.
Reminder of this paper is organized as follows:
Section 3 presents related flooding algorithms. Section 4 describes the Control of Broadcast
Forwarding scheme. Section 5 presents the simulation model and shows the obtained results.
Section 6 concludes this paper.
3. RELATED WORKS
Many works were proposed in the past to mitigate the broadcasting problems in MANETs. They
can be categorized into two basic classes.
There are schemes involving the use of neighbourhood knowledge to prune or retransmit the
received broadcast message. Two approaches are defined: self-pruning and dominant pruning
schemes. In the self-pruning algorithms, each node decides itself to prune the received broadcast
message. In dominant pruning approach, only a subset of nodes is selected to forward the
broadcast message.
Other protocols try to delay the rebroadcasting operation for a random assessment delay (RAD) in
which various observations are performed including neighbours density, number of duplicated
packets, and the signal strength. Up on that and according to a predefined threshold, each
receiving node may decide to rebroadcast or not the broadcast message.
Below are listed famous broadcasting methods applied for MANETs:
Authors in [2, 9] have identified the simple flooding protocol. This scheme requires from each
node to retransmit the received broadcast packet for the first time after a small random delay
(JITTER). Duplicates are discarded immediately. In a network of n nodes, this results on n
retransmissions.
Simple flooding is costly in term of number of retransmitting node, contention and collisions
likelihood. These problems are referred as the broadcast storm problems. However it remains a
simple protocol for broadcasting and multicasting in non-dense or high mobile ad hoc networks
as it is proposed by the IETF Internet Draft [9]. Simple flooding is deployed in HWMP the
default routing protocol of IEEE 802.11s wireless mesh networks.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015
5
The authors in [16] have identified the broadcast storm problem through analysis and simulations.
They have designed counter-based, probabilistic-based, distant-based, location-based and cluster-
based broadcasting schemes to reduce redundancy and collisions in mobile ad hoc networks. The
results concluded that counter-based protocol can significantly decrease the number of
retransmitting nodes when the network is dense. Location-based scheme can eliminate many
redundant packets under all kind of host distributions, but it involves the use of GPS receivers
which is costly in mobile ad-hoc networks, particularly in term of energy consumption.
In [3], researchers have defined two flooding methods: self-pruning and dominant pruning which
both utilize the neighbourhood information to reduce redundancy. Both schemes perform better
than simple flooding, particularly in networks with low mobility rate.
The authors in [4] determined some deficiencies of the dominant pruning method. They proposed
two improvements: the total dominant pruning and the partial dominant pruning algorithms.
Simulation results demonstrate that both total and partial schemes achieve better performances
that the original dominant pruning algorithm specially on reducing the number of redundant
packets.
In [10], an efficient broadcast protocol for MANETs (AHPB) is defined. The algorithm chooses a
set of nodes, namely Broadcast Relay Gateways (BRGs), which will rebroadcast a flooded
packet. The others nodes will not participate in rebroadcast operation. The BRGs constitute a
connected dominating set of the network and can achieve a high reliability. AHPB reduces
significantly the redundant retransmissions and saves the network bandwidth. It can be applied in
static networks to provide efficient broadcast service.
The authors in [11] defined a self-pruning scheme called scalable broadcast algorithm (SBA) that
uses 2-hop neighbourhood knowledge to prune redundant rebroadcast. The protocol requires 2-
hop hello messages exchange to take decision on broadcasting or not the received broadcast
packets. Each node whenever it has uncovered neighbours by the sender transmission it schedules
a retransmission after a random delay (RAD) in which it learns about covered neighbours from
received duplicate packets. After RAD expiration, if it still has uncovered neighbours it will
rebroadcast the message otherwise it will discard it.
Williams and T. Camp in [18] have classified the broadcast techniques into several categories and
tried to simulate a subset of each category to pinpoint specific features to network conditions like
congestion, mobility and density. The results demonstrate that methods using a random access
delay (RAD) for rescheduling the retransmissions suffer from congestive networks. Also, it has
been observed that the mobility afflicts the neighboursā€™ knowledge methods while probabilistic-
based algorithms are disturbed by increasing network density.
In [8] M. Jacobsson designed a self-pruning scheme, namely prioritized flooding with Self
Pruning (PFS) which is a combination between counter-based scheme and flooding with self-
pruning algorithm. A new design of RAD was adopted based on an estimation of the uncovered
neighbors. The scheme requires only one hop hello messages which lead to decreased overhead in
comparison with other protocols. PFS performs high reachability and reduce considerably the
number redundant packets. However it costs in end to end delay.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015
6
4. CONTROL OF BROADCAST FORWARDING PRINCIPAL
CBF approach is a self-pruning protocol using two hop neighbourhood information to decide
whether to rebroadcast or eliminate the received broadcast packet for the first time. Duplicates are
discarded immediately based on packet sequence number. The two-hop neighbourhood
information is obtained by periodically exchanging hello messages. After this exchange, each
mesh point builds a table containing the list of its immediate neighbours and their neighbours. An
example of such table is shown below in [Figure 2].
Figure 2. Built neighbours table by node C
CBF manages differently broadcast traffic accordingly to packet type information element. This
make CBF more tolerant to routing process.
CBF uses the following notations and assumptions:
NG (M): the one hop neighbours list of the mesh point M.
Degree_S (M): the number of uncovered neighbours of mesh point M by the sender transmission
performed by S.
DTS (M): the table of degrees which is a map containing pairs of Mā€™s covered neighbours and
their degrees.
UCS (M): the list of uncovered neighbours of the mesh point M by the sender dissemination
performed by node S.
Actually, on receiving a routing broadcast packet, CBF checks if the receiverā€™s neighbours have
been already covered by the broadcast. If so, the routing packet will be discarded, else the packet
will be forwarded.
When receiving data broadcast packet, CBF operates as follows:
On receiving a broadcast message from node S, the receiver H performs the following procedure:
It checks the sender neighbours list NG(S)
If NG (S) ā€“ {H} includes NG (H) ā€“{S} then H discards the packet immediately.
Else, meaning that there are uncovered neighbours, H performs the following actions:
ā€¢ It builds the degrees table DTS (H)
ā€¢ If it has the maximum degree Degree_S (H) among its immediate covered neighbours,
then it rebroadcasts the packet.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015
7
ā€¢ Else H checks for existing covered mesh points that have max degree and that may cover
all its uncovered neighbours. If such nodes exist, the packet will be discarded, else the
packet will be retransmitted.
An example of CBF operation is shown in [Figure 3]:
In this example, the mesh point S broadcasts a message that will be received by its immediate
neighbours A, B and C.
On checking the senderā€™s neighbours list, A, B and C will know about the existence of uncovered
neighbours by S transmission.
The uncovered neighbours of A are nodes {1, 2} (i.e., UCS(A) = {1, 2}), so its degree is 2 (i.e.,
Degree_S (A) =2).
The uncovered neighbours of B are nodes {4, 5}, so its degree is 2 (i.e., Degree_S (B) =2).
The uncovered neighbours of C are nodes {1, 2, 3, 4, 5}, so its degree is 5 (i.e., Degree_S (C) =5).
C has the maximum degree and its retransmission may cover uncovered neighbours of both A and
B. Thus, C will rebroadcast the packet while A and B will discard it.
Figure 3. Example of CBF operation
5. SIMULATION AND RESULTS
In this section we evaluated our algorithm CBF in comparison with Blind Flooding which is the
default scheme used in HWMP routing process and in many other applications involved in
Ethernet networks that may be bridged to the mesh. The main focus of the simulations is to
observe CBF dealing with broadcast data packet according to various network scenarios. Features
like network density and traffic load were studied here.
We used NS-2 [1] to simulate and compare the performance of both protocols. We selected the
Distributed Coordination Function (DCF) of IEEE 802.11[6] as the MAC protocol.
RTS/CTS/ACK exchange was disabled since we are only concerned by broadcasting operation. In
each simulation scenario, flooding messages were generated at random times by random mesh
points. Nodes were placed in such a way to form a square grid mesh network as shown in [Fig. 4],
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015
8
and they are supposed to be static since we aim to simulate a wireless mesh network where
mobility is not a critical constraint. Grid topology is a better choice for wireless mesh networks
according to [13]. The table [Table 1] summaries the common parameters used in all simulations.
Table 1. Common parameters.
Number of nodes (n) 9-225
MAC layer IEEE 802.11
Transmission data rate 11Mbits/s
Basic rate 1Mbits/s
Flooding message payload 64Bytes
Flooding rate 2packets/s ; 10packets/s
Hello Interval 1s
Transmission range 250m
Simulation time 1000s
To compare the performances of both flooding protocols we used the following parameters:
Reachability: It expresses how many nodes have been reached by the flooding message. For
example, if the network size is 50 nodes and a flooding message was received by 40, so the
reachability is 40/49=81.63%.
Retransmissions: it is the broadcast cost criteria that determine the number of rebroadcasting
nodes for a flooding message.
End to end delay: is the time from the first moment of sending a flooding message until its
reception by the last node in the network.
Overhead: is the number of bytes transmitted by unit time. It includes both flooded and hello
messages.
5.1. Non dense WMN
In this experiment, each node is distant from its closed neighbours by fixed distance that is equal
to 175m. So, each node can communicate directly only with its immediate closed neighbours. To
communicate with the others nodes, a multi hop process is needed. The flooding rate is fixed to
2packets/second (i.e., low traffic) and to 10packets/second (i.e., heavy traffic).
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015
9
Figure 4. CBF & BF reachability in non-dense network
Figure 5. CBF & BF saved rebroadcasts in non-dense network
97.5
98
98.5
99
99.5
100
0 50 100 150 200 250
Reachability(%)
Number of nodes
non dense
BF_2pk CBF_2pk BF_10pk CBF_10pk
0
50
100
150
200
250
0 50 100 150 200 250
Numberofretransmittingnodes
Number of nodes
BF_2pk CBF_2pk BF_10pk CBF_10pk
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015
10
Figure 6. CBF & BF Average End to End Delay in non-dense network
Figure 7. CBF & BF overhead in non-dense network
The results, presented by figures 4,5,6 and 7, show that CBF ameliorates the WMN capacity by
reducing the number of redundant packets, the network overhead and the average end to end
delay.
Actually, in the networks with low traffic, CBF produce similar reachability as BF. It performs in
average 99.82% network reachability against 99.32% provided by BF. When traffic is high, many
packets were not received due to contention and collisions resulting of strong demand on
0
0.01
0.02
0.03
0.04
0.05
0.06
0.07
0 50 100 150 200 250
EndToEndDelay(s)
Number of nodes
BF_2pk CBF_2pk BF_10pk CBF_10pk
0
50
100
150
200
250
0 50 100 150 200 250
Overhead(ko/s)
Number of nodes
BF_2pk CBF_2pk BF_10pk CBF_10pk
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015
11
rebroadcasting at correlated times. This explains why reachability is reduced with BF operation to
reach in average 98% of the network nodes. However CBF keeps a uniform percentage of 99.68%
which is a good value to consider in heavy traffic networks. The good reachability is consequence
of the choice of the differentiating time (JITTER value) before rebroadcasting which is favouring
nodes with most uncovered neighbors to retransmit first and faster.
The end to end delay is slightly improved by CBF in both low and heavy traffic scenarios. Also,
CBF achieve lower overhead in comparison with BF. We estimate an average overhead reduction
of 4ko/s in low traffic network and 24ko/s in high traffic network.
CBF reduces considerably the number of redundant packets. We estimate 50% of saved
rebroadcasts in both low and heavy traffic network.
5.2. Dense WMN
We reduce the distance separating closed neighbours to become 75m. Same flooding rates are
chosen in this scenario.
Figure 8. CBF & BF Reachability in dense network
97
97.5
98
98.5
99
99.5
100
0 50 100 150 200 250
Reachability(%)
Number of nodes
dense
BF_2pk CBF_2pk BF_10pk CBF_10pk
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015
12
Figure 9. CBF & BF Saved Rebroadcasts in dense network
Figure 10. CBF & BF Average End to End Delay in dense network
0
50
100
150
200
250
0 50 100 150 200 250
Numberofretransmittingnodes
Number of nodes
BF_2pk CBF_2pk BF_10pk CBF_10pk
0
0.05
0.1
0.15
0.2
0.25
0 50 100 150 200 250
EndToEndDelay(s)
Number of nodes
BF_2pk CBF_2pk BF_10pk CBF_10pk
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015
13
Figure 11. CBF & BF overhead in dense network
In dense networks, CBF shows better performances than BF. It performs high reachability [Figure
8] in low traffic networks just like BF with an average value of 99.95%. However, we observe a
decreased value in high traffic networks for both protocols. The average reachability is estimated
to 98%. This can be explained by the non-availability of the complete neighbouring information
when needed. A solution to that problem is to adjust the hello message interval to the network
size. It must be reduced or increased dynamically according to the network density.
Just like in non-dense networks, CBF achieve better performances in terms of average end to end
delay [Figure 10], saved rebroadcasts and overhead.
The saved rebroadcasts [Figure 9] is almost estimated to 50% in low traffic network and to 42%
in high traffic network. The number of retransmitting nodes is increased when it is about heavy
traffic due to non-exact neighbouring information provided by hello messages exchange.
The overhead [Figure 11] is in average reduced about 4ko/s in low traffic networks and about
18ko/s in high traffic networks.
6. CONCLUSION
Broadcasting by flooding remains a major problem in multi hop networks and particularly in
wireless mesh networks. In this study, we evaluated our scheme, namely CBF, in comparison
with Blind Flooding protocol. Several experiments were chosen to evaluate the performances of
CBF. The results show that CBF behaves well in both dense and non-dense networks and in both
low and high traffic networks. The performance parameters were considerably improved,
especially, in terms of average end to end delay, overhead, reachability and number of saved
rebroadcasts. In future works we will target improving the reachability in high traffic networks to
keep it closed to 100%. We will also compare our scheme with the most suitable broadcasting
protocols for mesh networks.
0
50
100
150
200
250
0 50 100 150 200 250
Overhead(ko/s)
Number of nodes
BF_2pk CBF_2pk BF_10pk CBF_10pk
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015
14
ACKNOWLEDGEMENTS
The authors would like to thank Martin Jacobsson for his considerable help.
REFERENCES
[1] K. Fall, K. Varadhan. ā€œThe NS Manualā€ . Vint Project, UC Berkeley, LBL, DARPA, USC/ISI, and
Xerox PARC. April 14, 2002.
[2] C. Ho, K. Obraczka, G. Tsudik, K. Viswanath, Flooding for reliable multicast in multihop ad hoc
networks, in: Proceedings of the International Workshop on Discrete Algorithms and Methods for
Mobile Computing and Communications (DIALM), ACM, 1999, pp. 64ā€“71.
[3] H. Lim and C. Kim, Flooding for Wireless Ad-Hoc Networks, in Computer Communications vol. 24,
no. 3-4, pp. 353-363, 2011.
[4] W. Lou, J. Wu, On reducing broadcast redundancy in ad hoc wireless networks IEEE Transactions on
Mobile Computing 1 (2002) 111ā€“123.
[5] W. Lou, J. Wu, Toward broadcast reliability in mobile ad hoc networks with double coverage, IEEE
Transactions on Mobile Computing 6 (2007) 148ā€“163.
[6] IEEE 802.11 Standard Working Group, Draft Standard for Information Technology ā€“
Telecommunications and Information Exchange Between Systems ā€“ LAN/MAN Speciļ¬c
requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
Speciļ¬cations, IEEE P802.11-REVma/D9.0, January 2007.
[7] IEEE 802.11s Task Group HWMP Specification doc.: IEEE 802.11-06/1778r1 November 2006.
[8] M. Jacobsson, C. Guo, I.G.M.M. Niemegeers, A ļ¬‚ooding protocol for manets with self-pruning and
priorited retransmissions, in: International Workshop on Localized Communication and Topology
Protocols for Ad hoc Networks (LOCAN), Washington DC, USA, 2005.
[9] J. Jetcheva, Y. Hu, D. Maltz and D. Johnson. A Simple Protocol for Multicast and Broadcast
in Mobile Ad hoc Networks. Internet Draft, draft- ietf-manet-simple-mbcast-01.txt, 2001.
[10] Wei Peng, Xicheng Lu, Ahbp: An efļ¬cient broadcast protocol for mobile ad hoc networks, Journal of
Science and Technology - Beijing, China, 2002.
[11] Wei Peng, Xi-Cheng Wu, On the reducation of broadcast redundancy in mobile ad hoc networks, In
The Sixth Annual International Conference on Mobile Computing and Networking (MobiCom 2000),
Boston, USA, August 6-11, 2000.
[12] C.E. Perkins, E.M. Belding-Royer, S.R. Das, Ad hoc on-demand distance vector (aodv) routing, IETF
RFC3561, July 2003.
[13] J. Robinson, E. Knightly, A performance study of deployment factors in wireless mesh networks, in:
Proceedings of the IEEE International Conference on Computer Communications (INFOCOM ā€™07),
2007, pp. 2054ā€“2062.
[14] Saadi, Y.; Nassereddine, B.; Bennani, S.; Maach, A., "An adaptive approach to control broadcast
traffic in wireless mesh networks based IEEE 802.11s," Complex Systems (ICCS), 2012 International
Conference on , vol., no., pp.1,7, 5-6 Nov. 2012
doi: 10.1109/ICoCS.2012.6458512
[15] Saadi, Y.; Nassereddine, B.; Haqiq, A., "CBF evaluation through simulation," Next Generation
Networks and Services (NGNS), 2014 Fifth International Conference on , vol., no., pp.182,186, 28-30
May 2014
doi: 10.1109/NGNS.2014.6990250
[16] Y.-C. Tseng, S.-Y. Ni, Y.-S. Chen, J.-P. Sheu, The broadcast storm problem in a mobile ad hoc
network, Wireless Networks 8 (2/3) (2002) 153ā€“167.
[17] X. Wang, and A.O. Lim, IEEE 802.11s wireless mesh networks: Framework and challenges, Ad Hoc
Networks 6 (2008) 970ā€“984.
[18] Brad Williams, Tracy Camp, Comparison of broadcasting techniques for mobile ad hoc networks, In
The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc
2002), Lausanne, Switzerland, June 9-11, 2002.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015
15
Author
Youssef SAADI received the B.Sc. degree in Computer Engineering in 2005 and M.Sc.
degree in Systems and Networks in 2008 from Hassan 1st University, Faculty of Sciences
and Techniques of Settat (FSTS), Morocco. He has been working as professor of Computer
Sciences in high school since 2006, Berrechid, Morocco. Currently, he is working toward
his Ph.D. at FSTS. His current research interests are: Wireless Mesh Network Capacity Amelioration,
Flooding Operation Improvement, and Study of Mobile Ad hoc Networks.
Dr. Bouchaib NASSEREDDINE is a professor at Faculty of Sciences and Techniques
(FSTS), Hassan 1st
University, Settat, Morocco. He is an active member of research team
RIME at MOHAMMADIA School of Engineers, Rabat, Morocco and he is a researcher in
the Computer, Networks, Mobility, and Modelling Laboratory, at FSTS.
Dr. Abdelkrim HAQIQ has a High Study Degree (DES) and a PhD (Doctorat d'Etat), both
in Applied Mathematics, option modeling and performance evaluation of computer
communication networks, from the University of Mohamed V, Agdal, Faculty of Sciences,
Rabat, Morocco. Since September 1995 he has been working as a Professor at the
department of Mathematics and Computer at the Faculty of Sciences and Techniques, Settat, Morocco. He
is the Director of Computer, Networks, Mobility and Modeling laboratory and the Coordinator of the
education of Computer Engineering at the Faculty of Sciences and Techniques, Settat. He is also a General
Secretary of e-Next Generation Networks Research Group, Moroccan section.

More Related Content

What's hot

Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158IJERA Editor
Ā 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
Ā 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
Ā 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSimKathirvel Ayyaswamy
Ā 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
Ā 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
Ā 
Secure routing Adhoc Networks
Secure routing Adhoc NetworksSecure routing Adhoc Networks
Secure routing Adhoc NetworksMuhammad Yousuf Khan
Ā 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcastIJCNCJournal
Ā 
Md3421762181
Md3421762181Md3421762181
Md3421762181IJERA Editor
Ā 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
Ā 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
Ā 
Computer network solution
Computer network solutionComputer network solution
Computer network solutionMd. Mashiur Rahman
Ā 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
Ā 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...Alexander Decker
Ā 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
Ā 

What's hot (20)

Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
Ā 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Ā 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
Ā 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
Ā 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
Ā 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
Ā 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
Ā 
Secure routing Adhoc Networks
Secure routing Adhoc NetworksSecure routing Adhoc Networks
Secure routing Adhoc Networks
Ā 
E1073644
E1073644E1073644
E1073644
Ā 
Aj32242252
Aj32242252Aj32242252
Aj32242252
Ā 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcast
Ā 
Mane ts
Mane tsMane ts
Mane ts
Ā 
Md3421762181
Md3421762181Md3421762181
Md3421762181
Ā 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
Ā 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Ā 
Computer network solution
Computer network solutionComputer network solution
Computer network solution
Ā 
Ds35676681
Ds35676681Ds35676681
Ds35676681
Ā 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
Ā 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...
Ā 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Ā 

Viewers also liked

An educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidAn educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidijwmn
Ā 
Spatial multiplexing ofdmoqam systems with time reversal technique
Spatial multiplexing ofdmoqam systems with time reversal techniqueSpatial multiplexing ofdmoqam systems with time reversal technique
Spatial multiplexing ofdmoqam systems with time reversal techniqueijwmn
Ā 
Analyse Performance of Fractional Fourier Transform on Timing and Carrier Fr...
 Analyse Performance of Fractional Fourier Transform on Timing and Carrier Fr... Analyse Performance of Fractional Fourier Transform on Timing and Carrier Fr...
Analyse Performance of Fractional Fourier Transform on Timing and Carrier Fr...ijwmn
Ā 
Sinr, rsrp, rssi and rsrq
Sinr, rsrp, rssi and rsrqSinr, rsrp, rssi and rsrq
Sinr, rsrp, rssi and rsrqijwmn
Ā 
Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...ijwmn
Ā 
COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...
COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...
COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...ijwmn
Ā 
O dsr optimized dsr routing
O dsr optimized dsr routingO dsr optimized dsr routing
O dsr optimized dsr routingijwmn
Ā 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingijwmn
Ā 
Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm U...
Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm U...Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm U...
Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm U...ijwmn
Ā 
Opportunistic and playback sensitive scheduling for video streaming
Opportunistic and playback sensitive scheduling for video streamingOpportunistic and playback sensitive scheduling for video streaming
Opportunistic and playback sensitive scheduling for video streamingijwmn
Ā 
A new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacityA new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacityijwmn
Ā 
P ERFORMANCE A NALYSIS O F A DAPTIVE N OISE C ANCELLER E MPLOYING N LMS A LG...
P ERFORMANCE A NALYSIS  O F A DAPTIVE N OISE C ANCELLER E MPLOYING N LMS A LG...P ERFORMANCE A NALYSIS  O F A DAPTIVE N OISE C ANCELLER E MPLOYING N LMS A LG...
P ERFORMANCE A NALYSIS O F A DAPTIVE N OISE C ANCELLER E MPLOYING N LMS A LG...ijwmn
Ā 
Performance analysis of fls, exp, log and
Performance analysis of fls, exp, log andPerformance analysis of fls, exp, log and
Performance analysis of fls, exp, log andijwmn
Ā 
Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...ijwmn
Ā 
Mobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applicationsMobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applicationsijwmn
Ā 
Zigbee based wearable remote healthcare monitoring system for elderly patients
Zigbee based wearable remote healthcare monitoring system for elderly patientsZigbee based wearable remote healthcare monitoring system for elderly patients
Zigbee based wearable remote healthcare monitoring system for elderly patientsijwmn
Ā 

Viewers also liked (16)

An educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidAn educational bluetooth quizzing application in android
An educational bluetooth quizzing application in android
Ā 
Spatial multiplexing ofdmoqam systems with time reversal technique
Spatial multiplexing ofdmoqam systems with time reversal techniqueSpatial multiplexing ofdmoqam systems with time reversal technique
Spatial multiplexing ofdmoqam systems with time reversal technique
Ā 
Analyse Performance of Fractional Fourier Transform on Timing and Carrier Fr...
 Analyse Performance of Fractional Fourier Transform on Timing and Carrier Fr... Analyse Performance of Fractional Fourier Transform on Timing and Carrier Fr...
Analyse Performance of Fractional Fourier Transform on Timing and Carrier Fr...
Ā 
Sinr, rsrp, rssi and rsrq
Sinr, rsrp, rssi and rsrqSinr, rsrp, rssi and rsrq
Sinr, rsrp, rssi and rsrq
Ā 
Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...
Ā 
COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...
COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...
COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...
Ā 
O dsr optimized dsr routing
O dsr optimized dsr routingO dsr optimized dsr routing
O dsr optimized dsr routing
Ā 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
Ā 
Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm U...
Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm U...Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm U...
Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm U...
Ā 
Opportunistic and playback sensitive scheduling for video streaming
Opportunistic and playback sensitive scheduling for video streamingOpportunistic and playback sensitive scheduling for video streaming
Opportunistic and playback sensitive scheduling for video streaming
Ā 
A new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacityA new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacity
Ā 
P ERFORMANCE A NALYSIS O F A DAPTIVE N OISE C ANCELLER E MPLOYING N LMS A LG...
P ERFORMANCE A NALYSIS  O F A DAPTIVE N OISE C ANCELLER E MPLOYING N LMS A LG...P ERFORMANCE A NALYSIS  O F A DAPTIVE N OISE C ANCELLER E MPLOYING N LMS A LG...
P ERFORMANCE A NALYSIS O F A DAPTIVE N OISE C ANCELLER E MPLOYING N LMS A LG...
Ā 
Performance analysis of fls, exp, log and
Performance analysis of fls, exp, log andPerformance analysis of fls, exp, log and
Performance analysis of fls, exp, log and
Ā 
Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...
Ā 
Mobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applicationsMobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applications
Ā 
Zigbee based wearable remote healthcare monitoring system for elderly patients
Zigbee based wearable remote healthcare monitoring system for elderly patientsZigbee based wearable remote healthcare monitoring system for elderly patients
Zigbee based wearable remote healthcare monitoring system for elderly patients
Ā 

Similar to WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF

Active path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessActive path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessAlexander Decker
Ā 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networkschetan1nonly
Ā 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.comIJERD Editor
Ā 
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...ijwmn
Ā 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
Ā 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
Ā 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...IOSR Journals
Ā 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
Ā 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Ā 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesijcsit
Ā 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSIJMIT JOURNAL
Ā 
A New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsCSCJournals
Ā 
Cooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolCooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolIOSR Journals
Ā 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR ProtocolRajesh Karumanchi
Ā 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...IOSR Journals
Ā 
Route Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node ClusteringRoute Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node ClusteringEditor IJCATR
Ā 
Route Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node ClusteringRoute Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node ClusteringEditor IJCATR
Ā 

Similar to WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF (20)

Active path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessActive path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wireless
Ā 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Ā 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
Ā 
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Ā 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
Ā 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
Ā 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...
Ā 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Ā 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
Ā 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
Ā 
Aodv
AodvAodv
Aodv
Ā 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
Ā 
A New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNs
Ā 
Cooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolCooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing Protocol
Ā 
B010130508
B010130508B010130508
B010130508
Ā 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
Ā 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Ā 
A0110104
A0110104A0110104
A0110104
Ā 
Route Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node ClusteringRoute Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node Clustering
Ā 
Route Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node ClusteringRoute Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node Clustering
Ā 

Recently uploaded

HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
Ā 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
Ā 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
Ā 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
Ā 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
Ā 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
Ā 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
Ā 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
Ā 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
Ā 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
Ā 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
Ā 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
Ā 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
Ā 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
Ā 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
Ā 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
Ā 

Recently uploaded (20)

HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
Ā 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Ā 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Ā 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Ā 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Ā 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
Ā 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
Ā 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Ā 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
Ā 
young call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Service
young call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Serviceyoung call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Service
young call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Service
Ā 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
Ā 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Ā 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Ā 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Ā 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
Ā 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Ā 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Ā 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
Ā 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
Ā 
young call girls in Green ParkšŸ” 9953056974 šŸ” escort Service
young call girls in Green ParkšŸ” 9953056974 šŸ” escort Serviceyoung call girls in Green ParkšŸ” 9953056974 šŸ” escort Service
young call girls in Green ParkšŸ” 9953056974 šŸ” escort Service
Ā 

WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF

  • 1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015 DOI : 10.5121/ijwmn.2015.7301 1 WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF Youssef Saadi1 , Bouchaib Nassereddine2 , Soufiane Jounaidi3 and Abdelkrim Haqiq4 1,2,3 Computer, Networks, Mobility and Modeling laboratory Department of Mathematics and Computer FST, Hassan 1st University, Settat, Morocco 4 e-NGN Research group, Africa and Middle East ABSTRACT Wireless mesh network has recently received a great deal of attention as a promising technology to provide ubiquitous high bandwidth access for a large number of users. Such network may face a significant broadcast traffic that may consequently degrade the network reliability. In this paper, we have focused interest to wireless mesh network based IEEE 802.11s and we have designed a self-pruning method to control and reduce the broadcast traffic forwarding. Our scheme, namely Control of Broadcast Forwarding (CBF), defines two behaviours to manage the broadcasting operation. Routing packets are managed differently from data broadcast messages to avoid afflicting the routing process. The simulations results show that CBF ameliorates the network capacity by reducing considerably the number of redundant packets, improving the end to end delay and providing high reachability and packet delivery ration. KEYWORDS Flooding Protocols, Wireless Mesh Network, Broadcast Storm 1. INTRODUCTION In multi-hop wireless networks, the trivial way to broadcast a message to all network nodes is via flooding that is a network-wide broadcasting operation by which a packet is disseminated to all other nodes with some nodes selected as relays. Broadcasting by flooding is an important process used for path and topology discovery in many unicast routing protocols such as AODV, DSR, ZRP ā€¦ it is used also by many applications that may include service discovery, address auto configuration or network self-organization. However such operation is costly and may lead to the broadcast storm problems as referred in [16]. Redundancy, collision and contention are features of the broadcast storm problems that seriously degrade the network performances and hinder the transmission of data packets [5]. Actually, flooding a wireless network based CSMA/CA brings the following drawbacks:
  • 2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015 2 ā€¢ Contention: after receiving the same broadcast message, some neighbors decide to retransmit it at correlated times. Theses transmissions will contend with each other on channel access. ā€¢ Redundant retransmissions: a node decides to rebroadcast a message to its neighbors while they have already received the message. ā€¢ Collision: the lack of CTS/RTS dialogue, the absence of collision detection and the deficiency backoff mechanism make collision more likely to occur. These problems become increasingly likely in a wireless mesh network (WMN) based IEEE 802.11s. Actually: ā€¢ Flooding is strongly used by HWPM [7] which is the default routing protocol in such network. ā€¢ The network control, routing, and topology maintenance rely heavily on layer-2 broadcasting. ā€¢ A wireless mesh network may bridge wired networks which deploy many broadcast- based applications such as the address resolution protocol (ARP), the spanning-tree protocol (STP), and Dynamic Host Configuration Protocol (DHCP). ā€¢ The WMN ad hoc and infrastructure planes may share the same channel and overlap their coverage area. These features result in a considerable augmentation of broadcast traffic that can significantly hinder the transmission and routing of unicast data thereby degrading the network reliability. Previous proposed schemes delay the retransmission of received broadcast packets for a Random Assessment Delay (RAD) which allow nodes sufficient time to receive redundant packets and ascertain whether a rebroadcast is needed or not. The RAD may prevent collisions by differentiating time of retransmissions. Actually, the RAD deployment may cause serious problems in CSMA/CA based wireless networks. The backoff mechanism is triggered whenever contention occurs by delaying randomly the retransmissions. This delay will be added to the RAD resulting on much more delays that may affect the packet runtime cost. Previous works does not carry about saving the routing information. They may force using non optimal paths for certain destinations. Hence, in our approach we address these problems by abandoning the RAD deployment and by processing packets according to their types. Data packets will be manage differently from routing packets. 2. WIRELESS MESH NETWORKS BASED IEEE 802.11S 2.1. Introduction Wireless Mesh Networks (WMNs) based IEEE 802.11s [17] are the next step in the evolution of IEEE 802.11 Wireless Local Area Networks (WLANs). They tend to extend the coverage area of WLANs by wireless dynamic association of access points. Unlike WLANs, mesh networks are a particular type of Mobile Ad hoc Networks (MANETs) with low mobility. They are self- organized, self-configured, self-healing and self-discovering.
  • 3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015 Typically, a wireless mesh network based IEEE 802.11s is a set of stationary wireless routers (i.e., Mesh points) communicating in multi points (i.e., Mesh Access Points) interconnectin forward data to or from wireline entry points (i.e., Mesh Portal Points) that are gateways bridging external networks (i.e., Internet). A WMN is considered hybrid between wireless ad hoc networks and infra networks, thus providing flexibility in building and expanding the network [ infrastructure plane is the area covered by a MAP to serve Mesh stations. The ad hoc plane is the area covered by MPs, MAPs and MPPs to for Figure 1. WMN based 2.2. Routing Procedure Routing in WMNs based IEEE 802.11s uses layer 2 addressing instead of IP addresses. The 11s task group has set a target configuration containing up to 32 network entities which can participate in routing. But configurations with more nodes remain possible. Hybrid Wireless Mesh Network (HWMP) [ networks. It combines between two types of protocols: The reactive RM- AODV protocol which is a variant of the ad hoc on demand vector protocol [12] using the Air Time metric. In this protocol the route is established on demand. Actually, when a Mesh Point decides to communicate with another route, it initiates a discovery process to look for an optimized routing path. flooding a path request packet (PREQ) that may cross multi hops to reach the destination or a Mesh Point knowing already a route to this destination. At the other hand, on receiving the PREQ, the destination Mesh Point answers back th packet PREP that indicates the reverse path to the destination. The proactive protocol TBR (Tree Based Routing) most often used for routing to gateways. It configures a particular MP as the root of the tree (e.g protocol proceeds in two phases, first phase consisting of tree construction: here the root International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015 Typically, a wireless mesh network based IEEE 802.11s is a set of stationary wireless routers (i.e., Mesh points) communicating in multi-hop and forming a kind of backhaul behind access oints) interconnecting client devices (Mesh Stations). The mesh points forward data to or from wireline entry points (i.e., Mesh Portal Points) that are gateways bridging external networks (i.e., Internet). A WMN is considered hybrid between wireless ad hoc networks and infrastructure-based wireless networks, thus providing flexibility in building and expanding the network [Figure 1 infrastructure plane is the area covered by a MAP to serve Mesh stations. The ad hoc plane is the area covered by MPs, MAPs and MPPs to forward the trafļ¬c on the infrastructure plane. Figure 1. WMN based IEEE 802.11s architecture [17] Routing in WMNs based IEEE 802.11s uses layer 2 addressing instead of IP addresses. The 11s task group has set a target configuration containing up to 32 network entities which can participate in routing. But configurations with more nodes remain possible. Hybrid Wireless Mesh Network (HWMP) [7] is the default routing protocol used in such networks. It combines between two types of protocols: AODV protocol which is a variant of the ad hoc on demand vector protocol ] using the Air Time metric. In this protocol the route is established on demand. Actually, when a Mesh Point decides to communicate with another one that he does not know the route, it initiates a discovery process to look for an optimized routing path. So, it broadcasts by flooding a path request packet (PREQ) that may cross multi hops to reach the destination or a Mesh Point knowing already a route to this destination. At the other hand, on receiving the PREQ, the destination Mesh Point answers back the source by sending a unicast route reply packet PREP that indicates the reverse path to the destination. The proactive protocol TBR (Tree Based Routing) most often used for routing to gateways. It configures a particular MP as the root of the tree (e.g., bridge linking an external network). The protocol proceeds in two phases, first phase consisting of tree construction: here the root International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015 3 Typically, a wireless mesh network based IEEE 802.11s is a set of stationary wireless routers hop and forming a kind of backhaul behind access tations). The mesh points forward data to or from wireline entry points (i.e., Mesh Portal Points) that are gateways bridging based wireless Figure 1]. The infrastructure plane is the area covered by a MAP to serve Mesh stations. The ad hoc plane is the ļ¬c on the infrastructure plane. Routing in WMNs based IEEE 802.11s uses layer 2 addressing instead of IP addresses. The 11s task group has set a target configuration containing up to 32 network entities which can ] is the default routing protocol used in such AODV protocol which is a variant of the ad hoc on demand vector protocol ] using the Air Time metric. In this protocol the route is established on demand. that he does not know the it broadcasts by flooding a path request packet (PREQ) that may cross multi hops to reach the destination or a Mesh Point knowing already a route to this destination. At the other hand, on receiving the e source by sending a unicast route reply The proactive protocol TBR (Tree Based Routing) most often used for routing to gateways. It ., bridge linking an external network). The protocol proceeds in two phases, first phase consisting of tree construction: here the root
  • 4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015 4 periodically broadcasts a message "Root Announcement" with the distance field set to zero. The MPs then rebroadcast this message while updating the distance to the root. At the end of this phase, each MP has chosen a MP father. This MP father is located on the shortest path to the root. The second phase consists of subscribing the MPs and their stations at the root by sending a "Gratuitous PREP" message. Now when an MP S wants to send a message to an MP D, it sends it to the root, which relays it to the MP D. In previous works [14, 15], we have evaluated by simulations our approach, namely control of broadcast forwarding (CBF). The basic ideas behind were to compute how much CBF can reduce routing broadcast traffic impact on unicast data transmissions and how much rebroadcasts could be saved. In this work, we enhanced CBF to guarantee more network coverage and more redundant packets decrease. We evaluated our scheme in comparison with Blind Flooding according to several simulation scenarios taking into account various parameters like network density, topology and traffic load. Reminder of this paper is organized as follows: Section 3 presents related flooding algorithms. Section 4 describes the Control of Broadcast Forwarding scheme. Section 5 presents the simulation model and shows the obtained results. Section 6 concludes this paper. 3. RELATED WORKS Many works were proposed in the past to mitigate the broadcasting problems in MANETs. They can be categorized into two basic classes. There are schemes involving the use of neighbourhood knowledge to prune or retransmit the received broadcast message. Two approaches are defined: self-pruning and dominant pruning schemes. In the self-pruning algorithms, each node decides itself to prune the received broadcast message. In dominant pruning approach, only a subset of nodes is selected to forward the broadcast message. Other protocols try to delay the rebroadcasting operation for a random assessment delay (RAD) in which various observations are performed including neighbours density, number of duplicated packets, and the signal strength. Up on that and according to a predefined threshold, each receiving node may decide to rebroadcast or not the broadcast message. Below are listed famous broadcasting methods applied for MANETs: Authors in [2, 9] have identified the simple flooding protocol. This scheme requires from each node to retransmit the received broadcast packet for the first time after a small random delay (JITTER). Duplicates are discarded immediately. In a network of n nodes, this results on n retransmissions. Simple flooding is costly in term of number of retransmitting node, contention and collisions likelihood. These problems are referred as the broadcast storm problems. However it remains a simple protocol for broadcasting and multicasting in non-dense or high mobile ad hoc networks as it is proposed by the IETF Internet Draft [9]. Simple flooding is deployed in HWMP the default routing protocol of IEEE 802.11s wireless mesh networks.
  • 5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015 5 The authors in [16] have identified the broadcast storm problem through analysis and simulations. They have designed counter-based, probabilistic-based, distant-based, location-based and cluster- based broadcasting schemes to reduce redundancy and collisions in mobile ad hoc networks. The results concluded that counter-based protocol can significantly decrease the number of retransmitting nodes when the network is dense. Location-based scheme can eliminate many redundant packets under all kind of host distributions, but it involves the use of GPS receivers which is costly in mobile ad-hoc networks, particularly in term of energy consumption. In [3], researchers have defined two flooding methods: self-pruning and dominant pruning which both utilize the neighbourhood information to reduce redundancy. Both schemes perform better than simple flooding, particularly in networks with low mobility rate. The authors in [4] determined some deficiencies of the dominant pruning method. They proposed two improvements: the total dominant pruning and the partial dominant pruning algorithms. Simulation results demonstrate that both total and partial schemes achieve better performances that the original dominant pruning algorithm specially on reducing the number of redundant packets. In [10], an efficient broadcast protocol for MANETs (AHPB) is defined. The algorithm chooses a set of nodes, namely Broadcast Relay Gateways (BRGs), which will rebroadcast a flooded packet. The others nodes will not participate in rebroadcast operation. The BRGs constitute a connected dominating set of the network and can achieve a high reliability. AHPB reduces significantly the redundant retransmissions and saves the network bandwidth. It can be applied in static networks to provide efficient broadcast service. The authors in [11] defined a self-pruning scheme called scalable broadcast algorithm (SBA) that uses 2-hop neighbourhood knowledge to prune redundant rebroadcast. The protocol requires 2- hop hello messages exchange to take decision on broadcasting or not the received broadcast packets. Each node whenever it has uncovered neighbours by the sender transmission it schedules a retransmission after a random delay (RAD) in which it learns about covered neighbours from received duplicate packets. After RAD expiration, if it still has uncovered neighbours it will rebroadcast the message otherwise it will discard it. Williams and T. Camp in [18] have classified the broadcast techniques into several categories and tried to simulate a subset of each category to pinpoint specific features to network conditions like congestion, mobility and density. The results demonstrate that methods using a random access delay (RAD) for rescheduling the retransmissions suffer from congestive networks. Also, it has been observed that the mobility afflicts the neighboursā€™ knowledge methods while probabilistic- based algorithms are disturbed by increasing network density. In [8] M. Jacobsson designed a self-pruning scheme, namely prioritized flooding with Self Pruning (PFS) which is a combination between counter-based scheme and flooding with self- pruning algorithm. A new design of RAD was adopted based on an estimation of the uncovered neighbors. The scheme requires only one hop hello messages which lead to decreased overhead in comparison with other protocols. PFS performs high reachability and reduce considerably the number redundant packets. However it costs in end to end delay.
  • 6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015 6 4. CONTROL OF BROADCAST FORWARDING PRINCIPAL CBF approach is a self-pruning protocol using two hop neighbourhood information to decide whether to rebroadcast or eliminate the received broadcast packet for the first time. Duplicates are discarded immediately based on packet sequence number. The two-hop neighbourhood information is obtained by periodically exchanging hello messages. After this exchange, each mesh point builds a table containing the list of its immediate neighbours and their neighbours. An example of such table is shown below in [Figure 2]. Figure 2. Built neighbours table by node C CBF manages differently broadcast traffic accordingly to packet type information element. This make CBF more tolerant to routing process. CBF uses the following notations and assumptions: NG (M): the one hop neighbours list of the mesh point M. Degree_S (M): the number of uncovered neighbours of mesh point M by the sender transmission performed by S. DTS (M): the table of degrees which is a map containing pairs of Mā€™s covered neighbours and their degrees. UCS (M): the list of uncovered neighbours of the mesh point M by the sender dissemination performed by node S. Actually, on receiving a routing broadcast packet, CBF checks if the receiverā€™s neighbours have been already covered by the broadcast. If so, the routing packet will be discarded, else the packet will be forwarded. When receiving data broadcast packet, CBF operates as follows: On receiving a broadcast message from node S, the receiver H performs the following procedure: It checks the sender neighbours list NG(S) If NG (S) ā€“ {H} includes NG (H) ā€“{S} then H discards the packet immediately. Else, meaning that there are uncovered neighbours, H performs the following actions: ā€¢ It builds the degrees table DTS (H) ā€¢ If it has the maximum degree Degree_S (H) among its immediate covered neighbours, then it rebroadcasts the packet.
  • 7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015 7 ā€¢ Else H checks for existing covered mesh points that have max degree and that may cover all its uncovered neighbours. If such nodes exist, the packet will be discarded, else the packet will be retransmitted. An example of CBF operation is shown in [Figure 3]: In this example, the mesh point S broadcasts a message that will be received by its immediate neighbours A, B and C. On checking the senderā€™s neighbours list, A, B and C will know about the existence of uncovered neighbours by S transmission. The uncovered neighbours of A are nodes {1, 2} (i.e., UCS(A) = {1, 2}), so its degree is 2 (i.e., Degree_S (A) =2). The uncovered neighbours of B are nodes {4, 5}, so its degree is 2 (i.e., Degree_S (B) =2). The uncovered neighbours of C are nodes {1, 2, 3, 4, 5}, so its degree is 5 (i.e., Degree_S (C) =5). C has the maximum degree and its retransmission may cover uncovered neighbours of both A and B. Thus, C will rebroadcast the packet while A and B will discard it. Figure 3. Example of CBF operation 5. SIMULATION AND RESULTS In this section we evaluated our algorithm CBF in comparison with Blind Flooding which is the default scheme used in HWMP routing process and in many other applications involved in Ethernet networks that may be bridged to the mesh. The main focus of the simulations is to observe CBF dealing with broadcast data packet according to various network scenarios. Features like network density and traffic load were studied here. We used NS-2 [1] to simulate and compare the performance of both protocols. We selected the Distributed Coordination Function (DCF) of IEEE 802.11[6] as the MAC protocol. RTS/CTS/ACK exchange was disabled since we are only concerned by broadcasting operation. In each simulation scenario, flooding messages were generated at random times by random mesh points. Nodes were placed in such a way to form a square grid mesh network as shown in [Fig. 4],
  • 8. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015 8 and they are supposed to be static since we aim to simulate a wireless mesh network where mobility is not a critical constraint. Grid topology is a better choice for wireless mesh networks according to [13]. The table [Table 1] summaries the common parameters used in all simulations. Table 1. Common parameters. Number of nodes (n) 9-225 MAC layer IEEE 802.11 Transmission data rate 11Mbits/s Basic rate 1Mbits/s Flooding message payload 64Bytes Flooding rate 2packets/s ; 10packets/s Hello Interval 1s Transmission range 250m Simulation time 1000s To compare the performances of both flooding protocols we used the following parameters: Reachability: It expresses how many nodes have been reached by the flooding message. For example, if the network size is 50 nodes and a flooding message was received by 40, so the reachability is 40/49=81.63%. Retransmissions: it is the broadcast cost criteria that determine the number of rebroadcasting nodes for a flooding message. End to end delay: is the time from the first moment of sending a flooding message until its reception by the last node in the network. Overhead: is the number of bytes transmitted by unit time. It includes both flooded and hello messages. 5.1. Non dense WMN In this experiment, each node is distant from its closed neighbours by fixed distance that is equal to 175m. So, each node can communicate directly only with its immediate closed neighbours. To communicate with the others nodes, a multi hop process is needed. The flooding rate is fixed to 2packets/second (i.e., low traffic) and to 10packets/second (i.e., heavy traffic).
  • 9. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015 9 Figure 4. CBF & BF reachability in non-dense network Figure 5. CBF & BF saved rebroadcasts in non-dense network 97.5 98 98.5 99 99.5 100 0 50 100 150 200 250 Reachability(%) Number of nodes non dense BF_2pk CBF_2pk BF_10pk CBF_10pk 0 50 100 150 200 250 0 50 100 150 200 250 Numberofretransmittingnodes Number of nodes BF_2pk CBF_2pk BF_10pk CBF_10pk
  • 10. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015 10 Figure 6. CBF & BF Average End to End Delay in non-dense network Figure 7. CBF & BF overhead in non-dense network The results, presented by figures 4,5,6 and 7, show that CBF ameliorates the WMN capacity by reducing the number of redundant packets, the network overhead and the average end to end delay. Actually, in the networks with low traffic, CBF produce similar reachability as BF. It performs in average 99.82% network reachability against 99.32% provided by BF. When traffic is high, many packets were not received due to contention and collisions resulting of strong demand on 0 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0 50 100 150 200 250 EndToEndDelay(s) Number of nodes BF_2pk CBF_2pk BF_10pk CBF_10pk 0 50 100 150 200 250 0 50 100 150 200 250 Overhead(ko/s) Number of nodes BF_2pk CBF_2pk BF_10pk CBF_10pk
  • 11. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015 11 rebroadcasting at correlated times. This explains why reachability is reduced with BF operation to reach in average 98% of the network nodes. However CBF keeps a uniform percentage of 99.68% which is a good value to consider in heavy traffic networks. The good reachability is consequence of the choice of the differentiating time (JITTER value) before rebroadcasting which is favouring nodes with most uncovered neighbors to retransmit first and faster. The end to end delay is slightly improved by CBF in both low and heavy traffic scenarios. Also, CBF achieve lower overhead in comparison with BF. We estimate an average overhead reduction of 4ko/s in low traffic network and 24ko/s in high traffic network. CBF reduces considerably the number of redundant packets. We estimate 50% of saved rebroadcasts in both low and heavy traffic network. 5.2. Dense WMN We reduce the distance separating closed neighbours to become 75m. Same flooding rates are chosen in this scenario. Figure 8. CBF & BF Reachability in dense network 97 97.5 98 98.5 99 99.5 100 0 50 100 150 200 250 Reachability(%) Number of nodes dense BF_2pk CBF_2pk BF_10pk CBF_10pk
  • 12. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015 12 Figure 9. CBF & BF Saved Rebroadcasts in dense network Figure 10. CBF & BF Average End to End Delay in dense network 0 50 100 150 200 250 0 50 100 150 200 250 Numberofretransmittingnodes Number of nodes BF_2pk CBF_2pk BF_10pk CBF_10pk 0 0.05 0.1 0.15 0.2 0.25 0 50 100 150 200 250 EndToEndDelay(s) Number of nodes BF_2pk CBF_2pk BF_10pk CBF_10pk
  • 13. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015 13 Figure 11. CBF & BF overhead in dense network In dense networks, CBF shows better performances than BF. It performs high reachability [Figure 8] in low traffic networks just like BF with an average value of 99.95%. However, we observe a decreased value in high traffic networks for both protocols. The average reachability is estimated to 98%. This can be explained by the non-availability of the complete neighbouring information when needed. A solution to that problem is to adjust the hello message interval to the network size. It must be reduced or increased dynamically according to the network density. Just like in non-dense networks, CBF achieve better performances in terms of average end to end delay [Figure 10], saved rebroadcasts and overhead. The saved rebroadcasts [Figure 9] is almost estimated to 50% in low traffic network and to 42% in high traffic network. The number of retransmitting nodes is increased when it is about heavy traffic due to non-exact neighbouring information provided by hello messages exchange. The overhead [Figure 11] is in average reduced about 4ko/s in low traffic networks and about 18ko/s in high traffic networks. 6. CONCLUSION Broadcasting by flooding remains a major problem in multi hop networks and particularly in wireless mesh networks. In this study, we evaluated our scheme, namely CBF, in comparison with Blind Flooding protocol. Several experiments were chosen to evaluate the performances of CBF. The results show that CBF behaves well in both dense and non-dense networks and in both low and high traffic networks. The performance parameters were considerably improved, especially, in terms of average end to end delay, overhead, reachability and number of saved rebroadcasts. In future works we will target improving the reachability in high traffic networks to keep it closed to 100%. We will also compare our scheme with the most suitable broadcasting protocols for mesh networks. 0 50 100 150 200 250 0 50 100 150 200 250 Overhead(ko/s) Number of nodes BF_2pk CBF_2pk BF_10pk CBF_10pk
  • 14. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015 14 ACKNOWLEDGEMENTS The authors would like to thank Martin Jacobsson for his considerable help. REFERENCES [1] K. Fall, K. Varadhan. ā€œThe NS Manualā€ . Vint Project, UC Berkeley, LBL, DARPA, USC/ISI, and Xerox PARC. April 14, 2002. [2] C. Ho, K. Obraczka, G. Tsudik, K. Viswanath, Flooding for reliable multicast in multihop ad hoc networks, in: Proceedings of the International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM), ACM, 1999, pp. 64ā€“71. [3] H. Lim and C. Kim, Flooding for Wireless Ad-Hoc Networks, in Computer Communications vol. 24, no. 3-4, pp. 353-363, 2011. [4] W. Lou, J. Wu, On reducing broadcast redundancy in ad hoc wireless networks IEEE Transactions on Mobile Computing 1 (2002) 111ā€“123. [5] W. Lou, J. Wu, Toward broadcast reliability in mobile ad hoc networks with double coverage, IEEE Transactions on Mobile Computing 6 (2007) 148ā€“163. [6] IEEE 802.11 Standard Working Group, Draft Standard for Information Technology ā€“ Telecommunications and Information Exchange Between Systems ā€“ LAN/MAN Speciļ¬c requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Speciļ¬cations, IEEE P802.11-REVma/D9.0, January 2007. [7] IEEE 802.11s Task Group HWMP Specification doc.: IEEE 802.11-06/1778r1 November 2006. [8] M. Jacobsson, C. Guo, I.G.M.M. Niemegeers, A ļ¬‚ooding protocol for manets with self-pruning and priorited retransmissions, in: International Workshop on Localized Communication and Topology Protocols for Ad hoc Networks (LOCAN), Washington DC, USA, 2005. [9] J. Jetcheva, Y. Hu, D. Maltz and D. Johnson. A Simple Protocol for Multicast and Broadcast in Mobile Ad hoc Networks. Internet Draft, draft- ietf-manet-simple-mbcast-01.txt, 2001. [10] Wei Peng, Xicheng Lu, Ahbp: An efļ¬cient broadcast protocol for mobile ad hoc networks, Journal of Science and Technology - Beijing, China, 2002. [11] Wei Peng, Xi-Cheng Wu, On the reducation of broadcast redundancy in mobile ad hoc networks, In The Sixth Annual International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, USA, August 6-11, 2000. [12] C.E. Perkins, E.M. Belding-Royer, S.R. Das, Ad hoc on-demand distance vector (aodv) routing, IETF RFC3561, July 2003. [13] J. Robinson, E. Knightly, A performance study of deployment factors in wireless mesh networks, in: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM ā€™07), 2007, pp. 2054ā€“2062. [14] Saadi, Y.; Nassereddine, B.; Bennani, S.; Maach, A., "An adaptive approach to control broadcast traffic in wireless mesh networks based IEEE 802.11s," Complex Systems (ICCS), 2012 International Conference on , vol., no., pp.1,7, 5-6 Nov. 2012 doi: 10.1109/ICoCS.2012.6458512 [15] Saadi, Y.; Nassereddine, B.; Haqiq, A., "CBF evaluation through simulation," Next Generation Networks and Services (NGNS), 2014 Fifth International Conference on , vol., no., pp.182,186, 28-30 May 2014 doi: 10.1109/NGNS.2014.6990250 [16] Y.-C. Tseng, S.-Y. Ni, Y.-S. Chen, J.-P. Sheu, The broadcast storm problem in a mobile ad hoc network, Wireless Networks 8 (2/3) (2002) 153ā€“167. [17] X. Wang, and A.O. Lim, IEEE 802.11s wireless mesh networks: Framework and challenges, Ad Hoc Networks 6 (2008) 970ā€“984. [18] Brad Williams, Tracy Camp, Comparison of broadcasting techniques for mobile ad hoc networks, In The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), Lausanne, Switzerland, June 9-11, 2002.
  • 15. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 3, June 2015 15 Author Youssef SAADI received the B.Sc. degree in Computer Engineering in 2005 and M.Sc. degree in Systems and Networks in 2008 from Hassan 1st University, Faculty of Sciences and Techniques of Settat (FSTS), Morocco. He has been working as professor of Computer Sciences in high school since 2006, Berrechid, Morocco. Currently, he is working toward his Ph.D. at FSTS. His current research interests are: Wireless Mesh Network Capacity Amelioration, Flooding Operation Improvement, and Study of Mobile Ad hoc Networks. Dr. Bouchaib NASSEREDDINE is a professor at Faculty of Sciences and Techniques (FSTS), Hassan 1st University, Settat, Morocco. He is an active member of research team RIME at MOHAMMADIA School of Engineers, Rabat, Morocco and he is a researcher in the Computer, Networks, Mobility, and Modelling Laboratory, at FSTS. Dr. Abdelkrim HAQIQ has a High Study Degree (DES) and a PhD (Doctorat d'Etat), both in Applied Mathematics, option modeling and performance evaluation of computer communication networks, from the University of Mohamed V, Agdal, Faculty of Sciences, Rabat, Morocco. Since September 1995 he has been working as a Professor at the department of Mathematics and Computer at the Faculty of Sciences and Techniques, Settat, Morocco. He is the Director of Computer, Networks, Mobility and Modeling laboratory and the Coordinator of the education of Computer Engineering at the Faculty of Sciences and Techniques, Settat. He is also a General Secretary of e-Next Generation Networks Research Group, Moroccan section.