SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Informatics and Communication Technology (IJ-ICT)
Vol. 6, No. 2, August 2017, pp. 69~75
ISSN: 2252-8776, DOI: 10.11591/ijict.v6i2.pp69-75  69
Journal homepage: http://iaesjournal.com/online/index.php/IJICT
Improving Performance of Mobile Ad Hoc Network Using
Clustering Schemes
Mohamed Er-Rouidi1*
, Houda Moudni2
, Hassan Faouzi3
, Hicham Mouncif4
, Abdelkrim Merbouha5
1, 2, 3, 5
Faculty of Sciences and Technology, Sultan Moulay Slimane University, Beni Mellal, Morocco
4
Faculty Polydisciplinary, Sultan Moulay Slimane University, Beni Mellal, Morocco
Article Info ABSTRACT
Article history:
Received Feb 13, 2017
Revised Jun 24, 2017
Accepted Jul 15, 2017
Mobile ad hoc network become nowadays more and more used in different
domains, due to its flexibility and low cost of deployment. However, this
kind of network still suffering from several problems as the lack of resources.
Many solutions are proposed to face these problems, among these solutions
there is the clustering approach. This approach tries to partition the network
into a virtual group. It is considered as a primordial solution that aims to
enhance the performance of the total network, and makes it possible to
guarantee basic levels of system performance. In this paper, we study some
schemes of clustering such as Dominating-Set-based clustering, Energy-
efficient clustering, Low-maintenance clustering, Load-balancing clustering,
and Combined-metrics based clustering.
Keywords:
Ad-hoc network
Clustering
MANET
Quality of Service
Routing protocols Copyright © 2017 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Mohamed Er-Rouidi,
Department of computer science,
Faculty of Sciences and Technology,
Sultan Moulay Slimane University, Beni Mellal, Morocco
Email: m.errouidi@usms.ma
1. INTRODUCTION
Mobile Ad hoc NETwork (MANET) it a group of autonomous nodes that are mobile and able to
communicate with each other without the existing of any fixed infrastructure or a centralized administration.
Also, it characterized by the flexibility and a low cost of deployment [1]. These characteristics enable
MANETs to give us significant benefits in virtually any scenario that includes a cadre of highly mobile users
or platforms, a strong need to share IP-based information, and an environment in which fixed network
infrastructure is impractical, impaired, or impossible. Key applications include disaster recovery, heavy
construction, mining, transportation, defense, and special event management [2].
Each entity in the network cans communicate directly with their neighbors that exist in its range. To
communicate with other entities, it is necessary to pass its data packet to others entities that will be
responsible for forwarding it. To do this, it is essential that the entities are situated in relation to each other,
and are able to construct routes between them: this is the role of the routing protocol. A routing protocol is
used to discover routes between the sender and the receiver entities. The main objective of such an ad hoc
network routing protocol is the establishment of a correct and efficient route between a pair of entities so that
messages may be delivered in a timely manner. The construction of the route should be done with a
minimum of overhead and bandwidth consumption [3]. Many protocols have been proposed to the Internet
Engineering Task Force Mobile Ad Hoc Networking group, based on different assumptions, such as Ad-hoc
On-demand Distance Vector (AODV) [4], Dynamic Source Routing (DSR) [5], Destination Sequenced
Distance-Vector (DSDV) [6] and Temporally Ordered Routing Algorithm (TORA) [7]. These protocols
during building the route are based on the broadcast of control messages to find the optimum path between
the source and destination. However, this method shows it is less relevant. Since most of these protocols take
 ISSN: 2252-8776
IJ-ICT Vol. 6, No. 2, August 2017 : 69 – 75
70
the shortest path as the main metric, other parameters like the state of nodes are not taken in consideration.
Also, the diffusion of control messages in the whole network has a bad effect on the entities as the excessive
consumption of resources. Many solutions are proposed to face this problem; in this paper we are interested
to clustering solution that aim to reduce these problems especially in a dense network. Clustering approach
tries to partition the network into a virtual group with respect of certain rules.
The rest of the paper is organized as follows. Section 2 gives a brief description of routing protocol
in mobile ad-hoc network. Section 3 describes the clustering method with the different classes. Finally,
Section 4 concludes the paper.
2. ROUTING PROTOCOL IN MANET
In mobile ad hoc network, each node needs to send a data packet toward another node that does not
exist in its transmission range; it uses the neighboring nodes to reach the destination node. As well, each
mobile node operates as an ordinary node and also as a router by forwarding packets for other mobile nodes
in the network. So, each node by forwarding a packet, it based on an ad-hoc routing protocol that allows it to
discover multi-hop paths through the network to any other node. Many protocols have been proposed. These
protocols in general can be divided into three categories [8-9] Figure 1 shows examples of these categories:
a. Proactive protocols (Table Driven): These types of protocols are called table driven protocols in
which, each node has the route to any destination in his routing table. Packets are transferred to the
predetermined route specified in the routing table. In this class of protocol, the packet transmission is
done faster, but the routing overhead is higher because all the routes must be defined before transferring
the packets. On the other hand, proactive protocols have lower latency because all the routes are
maintained at all the times. Examples of proactive are Destination Sequenced Distance Vector (DSDV)
[6] and Optimized Link State Routing (OLSR) [10].
b. Reactive protocols (On-Demand): In this category of protocol, nodes initialize a route discovery
mechanism to find the route towards the destination node when the source node has data packets to
send. The advantage of these protocols is that overhead messaging is reduced. One of the weaknesses of
these protocols is the delay in discovering a new route. Examples are Dynamic Source Routing (DSR)
[5] and Ad-hoc On-demand Distance Vector (AODV) [4].
c. Hybrid protocols: Hybrid routing protocols are a combination of both reactive and proactive routing
protocols. These protocols use reactive approach with the nearest nodes and the proactive approach with
farthest nodes. It was proposed to reduce the control overhead of proactive routing protocols and also
decrease the latency caused by route discovery in reactive routing protocols. Examples of hybrid routing
protocols are ZRP (Zone routing protocol) [10] and TORA (Temporarily Ordered Routing Algorithm)
[7].
Figure 1. Sorting of routing protocols
From this brief description of different group of routing protocols. We can observe that nodes
broadcast control packets in the whole network periodically or when needed, in order to find the route to the
destination node. Indeed, this method generates a substantial amount of control packets that are often not
needed. Which lead to a large consumption of network resources as energy and bandwidth, also it generates a
considerable overhead of control packets. This problem increases considerably when the nodes in the
network are mobile and the network topology changes frequently.
IJ-ICT ISSN: 2252-8776 
Improving Performance of Mobile Ad Hoc Network Using Clustering schemes (Mohamed Er-Rouidi)
71
3. CLUSTERING
The clustering approach tends to partition the different node in the network into virtual groups,
groups or clusters of nodes are created with respect to the closeness of nodes to each other and other factors
that determinate that a node to be included or excluded from the cluster. Each cluster in the network can
contain three types of nodes, such as cluster-head, cluster-gateway and cluster-member. Each type has a
function or role assigned in the cluster. The cluster-head node it is like the manager and acts as location
servers for all the nodes in the cluster by performing intra-cluster transmission arrangement, data forwarding,
and so on. Cluster-gateway it is cluster-member with inter-cluster links, so it is like the way to other cluster
that allow forwarding packet between clusters. Cluster-member is an ordinary node, which is a non-cluster-
head or cluster-gateway [11-12]. Figure 2 presents a cluster structure illustration.
Figure 2. Cluster structure illustration
The use of clustering approach in Manet has many benefits, the topology updating information and
routing information can be reduced to the exchange of aggregated information between various clusters and
the exchange of detailed topology information to single clusters. Facilitates the spatial reuse of resources to
increase the system capacity. A cluster structure makes an ad-hoc network appear smaller and more stable in
the view of each mobile terminal. The clustering schemes of MANETs can be classified according to
different criteria. In this paper, we classify the clustering protocols based on their objectives. According to
this criterion, the proposed clustering schemes for MANETs can be grouped into six categories.
3.1. Dominating-Set-Based Clustering
The majority clustering techniques in mobile ad hoc networks are based on dominating sets.
Distributed algorithms are designed in order to find small dominating sets. The term distributed means that
each node only has information of the local structure of the network [13]. A set S is dominating if each node
in the graph G=(V,E) is either in S or adjacent to at least one of the nodes in S. A dominant set in mobile ad
hoc networks is formed by the set of the network cluster-heads. Since a large number of cluster-heads will
increase substantially the number of routing hops causing higher communication overheads and extra energy
consumption, the basic idea is to find a minimum dominating set. The minimum dominating set problem is
formulated in the context of a network in order to find a minimum number of transmitters that allow all the
other nodes to be within the range of at least one of the selected senders.
Authors of [14] propose a new Connected Dominating Set (CDS) algorithm for clustering in
MANETs. the proposed algorithm is based on Wu and Li’s [15] algorithm, authors provide significant
modifications by considering the degrees of the nodes during marking process and also provide further
heuristics to decrease the size of CDS. And showed that this improvement is remarkable when the number of
nodes in the network is large, in a dense network. As in [16] authors describe a Connected Dominating Set-
Energy Protocol (CDSEP) for MANET to optimize the problem of broadcasting in the network. The main
concept introduced in this protocol is a distributed algorithm which computes the connected dominating set
(CDS) based on node energy and node connectivity. The CDS nodes in the CDSEP protocol are selected to
forward packets during the broadcasting process, and the information broadcasted in the network through
these CDS is also about the CDS. Thus, a second optimization is achieved by minimizing the contents of the
control packets broadcasted in the network. Hence, only a small subset of links with the nodes is declared
instead of all the links and the nodes.
3.2. Energy-Efficient Clustering
Mobile nodes in MANET normally depend on battery power supply during operation, hence the
energy limitation poses a severe challenge for network performance [17-18]. A MANET should strive to
 ISSN: 2252-8776
IJ-ICT Vol. 6, No. 2, August 2017 : 69 – 75
72
reduce its energy consumption greedily in order to prolong the network lifespan. Also, a cluster-head bears
extra work compared with ordinary members, and it more likely “dies” early because of excessive energy
consumption. The lack of mobile nodes due to energy depletion may cause network partition and
communication interruption [19]. Hence, it is also important to balance the energy consumption among
mobile nodes to avoid node failure, especially when some mobile nodes bear special tasks or the network
density is comparatively sparse.
Madhvi et al [20] propose an energy aware algorithm based on clustering to provide longer life time
of MANET. The proposed algorithm would be an energy efficient clustering algorithm that uses both
scalability and energy metric for cluster layout. An index number is assigned to each node taking in
consideration its energy level, the node with higher energy level becomes a cluster head or the root of max-
heap tree. The remaining nodes come under the cluster head or root head forming a tree. Each cluster head
gets connected with the other cluster head in the network. Here the range of clusters is fixed to one hop or it
can be considered as stable clusters with moving nodes. The communication in the network will occur
directly among cluster heads, and there is no gateway node. As in [21] authors propose Energy Efficient
Zone based Routing with Parallel Collision Guided Broadcasting Protocol (ZCG) that uses parallel and
distributed broadcasting technique to reduce redundant broadcasting in the network and to accelerate the
process of path discovery, while maintaining a high reachability ratio as well as keeping node energy
consumption low. ZCG uses a one hop clustering algorithm that divided the network into groups led by
reliable leaders that are mostly static and have plentiful battery resources.
3.3. Mobility-Aware Clustering
The property of mobility in mobile ad-hoc network has also an important impact on the stability of
the clusters. So, taking into consideration the factor of mobility during the construction of the clusters
structure, will have a significant impact on the stability of the clusters and thus other parameters of the
network[22]. This technique tends to group the different node that has the same mobility model into the same
cluster, in order to reduce the operation of the re-clustering also the re-affiliation of the cluster-member in the
clusters.
Authors of paper [23] present a new routing protocol Mobility Prediction-Based Clustering
(MPBC). This protocol contains two phases, the initial clustering phase and the cluster maintaining phase.
The Doppler shifts associated with periodically exchanged Hello packets are used to estimate the relative
speeds between neighboring nodes, and the estimation results are used as the basic information in MPBC. In
the initial clustering phase, the nodes having the less relative mobility in their neighborhoods are selected as
the cluster heads. In the cluster maintaining phase, mobility prediction strategies are introduced to control the
various problems caused by node movements, such as possible association losses to current Cluster Heads
and Cluster Head role changes, for extending the connection lifetime and giving more stable clusters.
3.4. Low-Maintenance Clustering
Among the problems of clustering, there is maintenance of the different clusters of the network. As
in a clustered network requires a periodic exchange message for maintaining the clusters. In MANET, the
topology of the network change frequently, resulting in increasing the control overhead of the network and
consume a substantial amount of resources of the network like the bandwidth and the energy due to the
maintenance operations of clusters[24].minimizing this problem is a necessary issue. Proposed low-
maintenance clustering protocols tend to create stable cluster architecture by reducing the number of re-
clustering in the network.
The paper [25] propose an algorithm based on the work presented in [26] type strategy for cluster
formation and maintenance. Authors added some new features to the solution, so as to improve the stability
of clustering. Like other clustering schemes the proposed scheme involves two phases: Cluster formation and
cluster maintenance. In this proposed approach cluster formation phase involves general clustering and
cluster improvement. General clustering is followed by cluster improvement which guarantees the maximum
number of connected clusters. For cluster maintenance, follow the local clustering.
3.5. Load-Balancing Clustering
Load-balancing clustering algorithms believe that there are an optimum number of mobile nodes
that a cluster can handle, especially in a cluster-head-based MANET. A too-large cluster may put too heavy
of a load on the cluster-heads, causing cluster-heads to become the bottleneck of a MANET and reduce
system throughput. A too-small cluster, however, may produce a large number of clusters and thus increase
the length of hierarchical routes, resulting in longer end-to-end delay. Load-balancing clustering schemes set
upper and lower limits on the number of mobile nodes that a cluster can deal with. When a cluster size
IJ-ICT ISSN: 2252-8776 
Improving Performance of Mobile Ad Hoc Network Using Clustering schemes (Mohamed Er-Rouidi)
73
exceeds its predefined limit, re-clustering procedures are invoked to adjust the number of mobile nodes in
that cluster.
Authors of [27] propose energy aware load balancing algorithm. Global reclustering is initiated
when the network becomes significantly unbalanced i.e. if the variance of degree of the cluster heads in the
network is greater than a pre-determined threshold. Degree of all cluster heads would be needed at each node
to evaluate the average of degree of all cluster heads in the network, afterward the variance among
themselves, which is not possible in adhoc network because of its distributed nature. For this, a formula is
derived in which variance can be updated at each hop i.e. variance of N nodes can be expressed in terms of
variance of N-1 nodes and average of N-1 nodes. Also in [28] authors used dynamic genetic algorithms such
as Elitism-based Immigrants Genetic algorithm and Memory Enhanced Genetic Algorithm to solve dynamic
load-balanced clustering problem. These schemes, select an optimal cluster head by considering the distance
and energy parameters. The authors used Elitismbased Immigrants Genetic algorithm to maintain the
diversity level of the population and Memory Enhanced Genetic Algorithm to store the old environments into
the memory. It promises the energy efficiency of the entire cluster structure to increase the lifetime of the
network.
3.6. Combined-Metrics Based Clustering
Combined-metrics-based clustering takes a number of metrics into account for cluster configuration,
including node degree, residual energy capacity, moving speed, and so on. This category aims at electing the
most suitable cluster-head in a local area, and does not give preference to mobile nodes with certain
attributes, such as lowest ID or highest node degree. One advantage of this clustering scheme is that it can
flexibly adjust the weighting factors for each metric to adjust to different scenarios. For example, in a system
where battery energy is more important, the weighting factor associated with energy capacity can be set
higher [29]. However, not all of these parameters are always available and accurate, and the information
inaccuracy may affect clustering performance.
A centralized cluster formation and distributed cluster head selection based algorithm is proposed in
[30] that adopts a centralized cluster formation and distributed cluster heads selection method. Using
minimum energy clustering, the network is separated into energy-balanced clusters and takes in consideration
energy and communication distance, optimal cluster heads are selected in order to prolong the network life
time.
3.7. Summary
Table 1 summarizes the main features and objectives of some protocol that uses clustering schemes.
Table 1. Features of Clustering Schemes
clustering
schemes
Based on
CHs
Election
Cluster
Stability
With
clusterhead?
1-hop or
multi-hop
Clusters
Number
Objectives
Cokuslu
[14]
CDS
Node
degree
High yes 1-hop Moderate
Get a low number of nodes as
dominating nodes to construct
a CDS. reduce the number of
nodes participating in routing
and reduce the size of DS
Madhvi[20] Energy
Highest
energy
Low yes 1-hop High
Avoid node with low energy
level and limit the time that a
mobile node can serve as a
clusterhead.
MPBC[23] Mobility
Lowest
mobility
High yes 1-hop
Relatively
Low
reduce the influence of
mobile nodes’ movement on
cluster topology updates in
terms of re-affiliation and re-
clustering
Yousuf[25]
Low-
maintenance
Node
stability
Very
High
yes 1-hop Low
Limiting re-clustering
situations and reducing
clustering control overhead.
LBRA[27] Topology
Node
degree
Relatively
High
yes Multi-hop Moderate
Balancing the traffic load in
each cluster by limiting the
number of cluster member
LEACH-
LEACH-C
[30]
Combined-
metrics
Combined
weight
metrics
Very
High
yes 1-hop Low
Electing the most suitable
clusterheads in local areas by
considering several metrics
and keeping a stable cluster
structure by reducing re-
clustering situations.
 ISSN: 2252-8776
IJ-ICT Vol. 6, No. 2, August 2017 : 69 – 75
74
4. CONCLUSION
In this article, we first provided fundamental concepts about clustering, including the definition of
cluster and clustering, the necessity of clustering for a large dynamic MANET, and the side effects and cost
of clustering. We discussed each clustering scheme in terms of objective, mechanism, performance, and
application scenario. With this work, we see that a cluster-based MANET has many important issues to
examine, such as the cluster structure stability, the control overhead of cluster construction and maintenance,
the energy consumption of mobile nodes with different cluster-related status, the traffic load distribution in
clusters, and the fairness of serving as cluster-heads for a mobile node. As well, the different types of
clustering may have a different focus and objectives. However, clustering cost always needs to be considered
when discussing a clustering scheme, because clustering cost is important to evaluate the performance and
scalability improvement of a clustering scheme no matter which specific objectives it bears.
REFERENCES
[1] I. Chlamtac; M. Conti; and J. J.-N. Liu , “Mobile ad hoc Networking: Imperatives and Challenges,” Ad Hoc
Networks, vol. 1, no. 1, pp. 13–64, 2003.
[2] C. E. Perkins, “Ad Hoc Networking,” Reading: A., vol. 1. 2001.
[3] J. Macker and S. Corson, “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and
Evaluation Considerations,” no. No. RFC 2501, 1999.
[4] C. Perkins; E. Belding Royer; and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” 2003.
[Online]. Available: https://www.ietf.org/rfc/rfc3561.txt. [Accessed: 01-Jul-2003].
[5] D. B. Johnson and D. A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks”. 1996.
[6] C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for
Mobile Computers,” ACM SIGCOMM Comput. Commun. Rev., vol. 24, no. 4, 1994.
[7] S. Corson and V. Park, “Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification.”
[8] M. Abolhasan; T. Wysocki; and E. Dutkiewicz, “A Review of Routing Protocols for Mobile ad hoc networks,” Ad
Hoc Networks, vol. 2, no. 1, pp. 1–22, 2004.
[9] E. M. Royer and Chai-Keong Toh, “A review of Current Routing Protocols for ad hoc Mobile Wireless Networks,”
IEEE Pers. Commun., vol. 6, no. 2, pp. 46–55, Apr. 1999.
[10] Z. Haas; M. Pearlman; P. Samar, “The Zone Routing Protocol (ZRP) for Ad Hoc Networks,” 2002.
[11] Y. Y. JANE and P. H. J, “A Survey of Clustering Schemes for Mobile ad hoc Networks,” IEEE Commun. Surv.
Tutorials, vol. 7, no. 1, pp. 32–48, 2005.
[12] S. Chinara and S. K. Rath, “A Survey on one-hop Clustering Algorithms in Mobile ad hoc Networks,” J. Netw.
Syst. Manag., vol. 17, no. 1–2, pp. 183–207, 2009.
[13] Blanca Alicia; L. Ospina; and R. C. Hincapié, “Survey of Clustering Techniques for Mobile ad hoc Networks,”
Rev. Fac. Ing. Univ. Antioquia, no. 41, pp. 145–161, 2007.
[14] D. Cokuslu; K. Erciyes; and O. Dagdeviren, “A Dominating Set Based Clustering Algorithm for Mobile Ad Hoc
Networks,” Springer, Berlin, Heidelberg, 2006, pp. 571–578.
[15] J. Wu and H. Li, “A Dominating-Set-Based Routing Scheme in Ad Hoc Wireless Networks,” Telecommun. Syst.,
vol. 18, no. 1/3, pp. 13–36, 2001.
[16] A. Kies; Z. M. Maaza; and R. Belbachir, “A Connected Dominating Set Based on Connectivity and Energy in
Mobile Ad Hoc Networks,” Acta Polytech. Hungarica, vol. 9, no. 5, 2012.
[17] M. Er-Rouidi; H. Moudni; H. Mouncif; and A. Merbouha, “An Energy Consumption Evaluation of Reactive and
Proactive Routing Protocols in Mobile Ad-Hoc Network,” in Proceedings-Computer Graphics, Imaging and
Visualization: New Techniques and Trends, CGiV 2016, 2016.
[18] M. Er-Rouidi; H. Moudni; H. Faouzi; H. Mouncif, and A. Merbouha, “Energy Enhancement of Ad-hoc On-demand
Distance Vector Routing Protocol for Maximum Lifetime in MANET,” Int. Arab Conf. Inf. Technol., 2016.
[19] C.-K. Toh, “Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless ad hoc
Networks,” IEEE Commun. Mag., vol. 39, no. 6, pp. 138–147, Jun. 2001.
[20] M. Saxena; N. Phate; K. J. Mathai; and M. A. Rizvi, “Clustering Based Energy Efficient Algorithm Using Max-
Heap Tree for MANET,” 2014 Fourth Int. Conf. Commun. Syst. Netw. Technol., pp. 123–127, 2014.
[21] S. S. Basurra; M. De Vos; J. Padget; Y. Ji; T. Lewis; and S. Armour, “Energy Efficient Zone Based Routing
Protocol for MANETs,” Ad Hoc Networks, vol. 25, no. PA, pp. 16–37, 2015.
[22] Y. Oh and K. Lee, “A Clustering Algorithm Based on Mobility Properties in Mobile Ad Hoc Networks,” Int. J.
Distrib. Sens. Networks, vol. 11, no. 6, p. 567269, Jun. 2015.
[23] M. Ni; Z. Zhong; and D. Zhao, “MPBC: A Mobility Prediction-Based Clustering Scheme for Ad Hoc Networks,”
IEEE Trans. Veh. Technol., vol. 60, no. 9, pp. 4549–4559, Nov. 2011.
[24] Taek Jin Kwon; M. Gerla; V. K. Varma; M. Barton; and T. R. Hsing, “Efficient flooding with passive clustering -
An overhead-free selective forward mechanism for ad hoc/sensor networks,” Proc. IEEE, vol. 91, no. 8, pp. 1210–
1220, Aug. 2003.
[25] A. Yousuf and J. Singh, “Clustering in MANETs with Minimum Reclustering and Communication Overhead,”
Circ. Comput. Sci., vol. 1, no. 1, pp. 54–58, 2016.
[26] J. Y. Yu and P. H. J. Chong, “An Efficient Clustering Scheme for Large and Dense Mobile ad hoc Networks
(MANETs),” Comput. Commun., vol. 30, no. 1, pp. 5–16, Dec. 2006.
IJ-ICT ISSN: 2252-8776 
Improving Performance of Mobile Ad Hoc Network Using Clustering schemes (Mohamed Er-Rouidi)
75
[27] S. Kaur and V. Kumari, “Efficient Clustering with Proposed Load Balancing Technique for MANET,” Int. J.
Comput. Appl., vol. 111, no. 13, pp. 975–8887, 2015.
[28] M. Kaliappan; S. Augustine; and B. Paramasivan, “Enhancing Energy Efficiency and Load Balancing in mobile ad
hoc Network using Dynamic Genetic Algorithms,” J. Netw. Comput. Appl., vol. 73, pp. 35–43, 2016.
[29] Ratishagarwal1 and Roopamgupta2, “Review of Weighted Clustering Algorithms for Mobile ad hoc Networks,”
GESJ Comput. Sci. Telecommun., vol. 1, no. 33, 2012.
[30] A. A. Khamiss; C. Senchun; Z. Baihai; and C. Lingguo, “Combined Metrics-Clustering Algorithm Based on
LEACH-C,” in the 27th Chinese Control and Decision Conference (2015 CCDC), pp. 5252–5257, 2015.
BIOGRAPHIES OF AUTHORS
Mohamed Er-rouidi, obtained he’s Master degree in computer science in 2013 from the faculty
of Science and Technology, Beni Mellal. Currently he is a PhD student at the Center of Doctoral
Studies in the Faculty of Science and technology of Beni Mellal. His research interest includes
wireless networks, quality of service, algorithms & applications and routing protocols.
Houda Moudni currently is a PhD candidate in the Department of Computer Science at
University Sultan MoulaySlimane, Beni Mellal, Morocco. Her current research interests include:
networking, security issues and securing mobile ad hoc networks.
Hassan Faouzi received his M.Sc. degree in Business Intelligence from Faculty of Science and
Technology Beni mellal Morocco in 2013. He is currently a Phd student at the same Faculty. His
current research interests lie in the fields of Ad hoc networking and security.

More Related Content

What's hot

DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLIJCNCJournal
 
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS cscpconf
 
A02120201010
A02120201010A02120201010
A02120201010theijes
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkEditor IJCATR
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)ijngnjournal
 
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETCross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETijcncs
 
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSMULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSIJCNCJournal
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)cscpconf
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocolIJCNCJournal
 
Optimization Algorithm to Control Interference-based Topology Control for De...
 Optimization Algorithm to Control Interference-based Topology Control for De... Optimization Algorithm to Control Interference-based Topology Control for De...
Optimization Algorithm to Control Interference-based Topology Control for De...IJCSIS Research Publications
 
Rough set based QoS enabled multipath source routing in MANET
Rough set based QoS enabled multipath source routing  in MANET Rough set based QoS enabled multipath source routing  in MANET
Rough set based QoS enabled multipath source routing in MANET IJECEIAES
 
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...IJLT EMAS
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backupcsandit
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
 

What's hot (19)

DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
 
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
 
A02120201010
A02120201010A02120201010
A02120201010
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor Network
 
C0351725
C0351725C0351725
C0351725
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
 
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETCross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
 
Position based Opportunistic routing in MANET
Position based Opportunistic routing in MANETPosition based Opportunistic routing in MANET
Position based Opportunistic routing in MANET
 
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSMULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocol
 
Optimization Algorithm to Control Interference-based Topology Control for De...
 Optimization Algorithm to Control Interference-based Topology Control for De... Optimization Algorithm to Control Interference-based Topology Control for De...
Optimization Algorithm to Control Interference-based Topology Control for De...
 
Rough set based QoS enabled multipath source routing in MANET
Rough set based QoS enabled multipath source routing  in MANET Rough set based QoS enabled multipath source routing  in MANET
Rough set based QoS enabled multipath source routing in MANET
 
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backup
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 

Similar to 1. 8481 1-pb

Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 
Gateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet ConnectivityGateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet Connectivityijsrd.com
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesijcsit
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
 
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocolsrahulmonikasharma
 
The Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANETThe Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANETIRJET Journal
 
Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET  Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET pijans
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
 
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...rahulmonikasharma
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET Journal
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
 

Similar to 1. 8481 1-pb (20)

Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
Gateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet ConnectivityGateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet Connectivity
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
50120130406027
5012013040602750120130406027
50120130406027
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
 
J018216275
J018216275J018216275
J018216275
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 
The Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANETThe Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANET
 
Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET  Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET
 
50120130405022
5012013040502250120130405022
50120130405022
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
 
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 

More from IAESIJEECS

08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...IAESIJEECS
 
07 20278 augmented reality...
07 20278 augmented reality...07 20278 augmented reality...
07 20278 augmented reality...IAESIJEECS
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...IAESIJEECS
 
05 20275 computational solution...
05 20275 computational solution...05 20275 computational solution...
05 20275 computational solution...IAESIJEECS
 
04 20268 power loss reduction ...
04 20268 power loss reduction ...04 20268 power loss reduction ...
04 20268 power loss reduction ...IAESIJEECS
 
03 20237 arduino based gas-
03 20237 arduino based gas-03 20237 arduino based gas-
03 20237 arduino based gas-IAESIJEECS
 
02 20274 improved ichi square...
02 20274 improved ichi square...02 20274 improved ichi square...
02 20274 improved ichi square...IAESIJEECS
 
01 20264 diminution of real power...
01 20264 diminution of real power...01 20264 diminution of real power...
01 20264 diminution of real power...IAESIJEECS
 
08 20272 academic insight on application
08 20272 academic insight on application08 20272 academic insight on application
08 20272 academic insight on applicationIAESIJEECS
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing surveyIAESIJEECS
 
06 20273 37746-1-ed
06 20273 37746-1-ed06 20273 37746-1-ed
06 20273 37746-1-edIAESIJEECS
 
05 20261 real power loss reduction
05 20261 real power loss reduction05 20261 real power loss reduction
05 20261 real power loss reductionIAESIJEECS
 
04 20259 real power loss
04 20259 real power loss04 20259 real power loss
04 20259 real power lossIAESIJEECS
 
03 20270 true power loss reduction
03 20270 true power loss reduction03 20270 true power loss reduction
03 20270 true power loss reductionIAESIJEECS
 
02 15034 neural network
02 15034 neural network02 15034 neural network
02 15034 neural networkIAESIJEECS
 
01 8445 speech enhancement
01 8445 speech enhancement01 8445 speech enhancement
01 8445 speech enhancementIAESIJEECS
 
08 17079 ijict
08 17079 ijict08 17079 ijict
08 17079 ijictIAESIJEECS
 
07 20269 ijict
07 20269 ijict07 20269 ijict
07 20269 ijictIAESIJEECS
 
06 10154 ijict
06 10154 ijict06 10154 ijict
06 10154 ijictIAESIJEECS
 
05 20255 ijict
05 20255 ijict05 20255 ijict
05 20255 ijictIAESIJEECS
 

More from IAESIJEECS (20)

08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...
 
07 20278 augmented reality...
07 20278 augmented reality...07 20278 augmented reality...
07 20278 augmented reality...
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...
 
05 20275 computational solution...
05 20275 computational solution...05 20275 computational solution...
05 20275 computational solution...
 
04 20268 power loss reduction ...
04 20268 power loss reduction ...04 20268 power loss reduction ...
04 20268 power loss reduction ...
 
03 20237 arduino based gas-
03 20237 arduino based gas-03 20237 arduino based gas-
03 20237 arduino based gas-
 
02 20274 improved ichi square...
02 20274 improved ichi square...02 20274 improved ichi square...
02 20274 improved ichi square...
 
01 20264 diminution of real power...
01 20264 diminution of real power...01 20264 diminution of real power...
01 20264 diminution of real power...
 
08 20272 academic insight on application
08 20272 academic insight on application08 20272 academic insight on application
08 20272 academic insight on application
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
 
06 20273 37746-1-ed
06 20273 37746-1-ed06 20273 37746-1-ed
06 20273 37746-1-ed
 
05 20261 real power loss reduction
05 20261 real power loss reduction05 20261 real power loss reduction
05 20261 real power loss reduction
 
04 20259 real power loss
04 20259 real power loss04 20259 real power loss
04 20259 real power loss
 
03 20270 true power loss reduction
03 20270 true power loss reduction03 20270 true power loss reduction
03 20270 true power loss reduction
 
02 15034 neural network
02 15034 neural network02 15034 neural network
02 15034 neural network
 
01 8445 speech enhancement
01 8445 speech enhancement01 8445 speech enhancement
01 8445 speech enhancement
 
08 17079 ijict
08 17079 ijict08 17079 ijict
08 17079 ijict
 
07 20269 ijict
07 20269 ijict07 20269 ijict
07 20269 ijict
 
06 10154 ijict
06 10154 ijict06 10154 ijict
06 10154 ijict
 
05 20255 ijict
05 20255 ijict05 20255 ijict
05 20255 ijict
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

1. 8481 1-pb

  • 1. International Journal of Informatics and Communication Technology (IJ-ICT) Vol. 6, No. 2, August 2017, pp. 69~75 ISSN: 2252-8776, DOI: 10.11591/ijict.v6i2.pp69-75  69 Journal homepage: http://iaesjournal.com/online/index.php/IJICT Improving Performance of Mobile Ad Hoc Network Using Clustering Schemes Mohamed Er-Rouidi1* , Houda Moudni2 , Hassan Faouzi3 , Hicham Mouncif4 , Abdelkrim Merbouha5 1, 2, 3, 5 Faculty of Sciences and Technology, Sultan Moulay Slimane University, Beni Mellal, Morocco 4 Faculty Polydisciplinary, Sultan Moulay Slimane University, Beni Mellal, Morocco Article Info ABSTRACT Article history: Received Feb 13, 2017 Revised Jun 24, 2017 Accepted Jul 15, 2017 Mobile ad hoc network become nowadays more and more used in different domains, due to its flexibility and low cost of deployment. However, this kind of network still suffering from several problems as the lack of resources. Many solutions are proposed to face these problems, among these solutions there is the clustering approach. This approach tries to partition the network into a virtual group. It is considered as a primordial solution that aims to enhance the performance of the total network, and makes it possible to guarantee basic levels of system performance. In this paper, we study some schemes of clustering such as Dominating-Set-based clustering, Energy- efficient clustering, Low-maintenance clustering, Load-balancing clustering, and Combined-metrics based clustering. Keywords: Ad-hoc network Clustering MANET Quality of Service Routing protocols Copyright © 2017 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Mohamed Er-Rouidi, Department of computer science, Faculty of Sciences and Technology, Sultan Moulay Slimane University, Beni Mellal, Morocco Email: m.errouidi@usms.ma 1. INTRODUCTION Mobile Ad hoc NETwork (MANET) it a group of autonomous nodes that are mobile and able to communicate with each other without the existing of any fixed infrastructure or a centralized administration. Also, it characterized by the flexibility and a low cost of deployment [1]. These characteristics enable MANETs to give us significant benefits in virtually any scenario that includes a cadre of highly mobile users or platforms, a strong need to share IP-based information, and an environment in which fixed network infrastructure is impractical, impaired, or impossible. Key applications include disaster recovery, heavy construction, mining, transportation, defense, and special event management [2]. Each entity in the network cans communicate directly with their neighbors that exist in its range. To communicate with other entities, it is necessary to pass its data packet to others entities that will be responsible for forwarding it. To do this, it is essential that the entities are situated in relation to each other, and are able to construct routes between them: this is the role of the routing protocol. A routing protocol is used to discover routes between the sender and the receiver entities. The main objective of such an ad hoc network routing protocol is the establishment of a correct and efficient route between a pair of entities so that messages may be delivered in a timely manner. The construction of the route should be done with a minimum of overhead and bandwidth consumption [3]. Many protocols have been proposed to the Internet Engineering Task Force Mobile Ad Hoc Networking group, based on different assumptions, such as Ad-hoc On-demand Distance Vector (AODV) [4], Dynamic Source Routing (DSR) [5], Destination Sequenced Distance-Vector (DSDV) [6] and Temporally Ordered Routing Algorithm (TORA) [7]. These protocols during building the route are based on the broadcast of control messages to find the optimum path between the source and destination. However, this method shows it is less relevant. Since most of these protocols take
  • 2.  ISSN: 2252-8776 IJ-ICT Vol. 6, No. 2, August 2017 : 69 – 75 70 the shortest path as the main metric, other parameters like the state of nodes are not taken in consideration. Also, the diffusion of control messages in the whole network has a bad effect on the entities as the excessive consumption of resources. Many solutions are proposed to face this problem; in this paper we are interested to clustering solution that aim to reduce these problems especially in a dense network. Clustering approach tries to partition the network into a virtual group with respect of certain rules. The rest of the paper is organized as follows. Section 2 gives a brief description of routing protocol in mobile ad-hoc network. Section 3 describes the clustering method with the different classes. Finally, Section 4 concludes the paper. 2. ROUTING PROTOCOL IN MANET In mobile ad hoc network, each node needs to send a data packet toward another node that does not exist in its transmission range; it uses the neighboring nodes to reach the destination node. As well, each mobile node operates as an ordinary node and also as a router by forwarding packets for other mobile nodes in the network. So, each node by forwarding a packet, it based on an ad-hoc routing protocol that allows it to discover multi-hop paths through the network to any other node. Many protocols have been proposed. These protocols in general can be divided into three categories [8-9] Figure 1 shows examples of these categories: a. Proactive protocols (Table Driven): These types of protocols are called table driven protocols in which, each node has the route to any destination in his routing table. Packets are transferred to the predetermined route specified in the routing table. In this class of protocol, the packet transmission is done faster, but the routing overhead is higher because all the routes must be defined before transferring the packets. On the other hand, proactive protocols have lower latency because all the routes are maintained at all the times. Examples of proactive are Destination Sequenced Distance Vector (DSDV) [6] and Optimized Link State Routing (OLSR) [10]. b. Reactive protocols (On-Demand): In this category of protocol, nodes initialize a route discovery mechanism to find the route towards the destination node when the source node has data packets to send. The advantage of these protocols is that overhead messaging is reduced. One of the weaknesses of these protocols is the delay in discovering a new route. Examples are Dynamic Source Routing (DSR) [5] and Ad-hoc On-demand Distance Vector (AODV) [4]. c. Hybrid protocols: Hybrid routing protocols are a combination of both reactive and proactive routing protocols. These protocols use reactive approach with the nearest nodes and the proactive approach with farthest nodes. It was proposed to reduce the control overhead of proactive routing protocols and also decrease the latency caused by route discovery in reactive routing protocols. Examples of hybrid routing protocols are ZRP (Zone routing protocol) [10] and TORA (Temporarily Ordered Routing Algorithm) [7]. Figure 1. Sorting of routing protocols From this brief description of different group of routing protocols. We can observe that nodes broadcast control packets in the whole network periodically or when needed, in order to find the route to the destination node. Indeed, this method generates a substantial amount of control packets that are often not needed. Which lead to a large consumption of network resources as energy and bandwidth, also it generates a considerable overhead of control packets. This problem increases considerably when the nodes in the network are mobile and the network topology changes frequently.
  • 3. IJ-ICT ISSN: 2252-8776  Improving Performance of Mobile Ad Hoc Network Using Clustering schemes (Mohamed Er-Rouidi) 71 3. CLUSTERING The clustering approach tends to partition the different node in the network into virtual groups, groups or clusters of nodes are created with respect to the closeness of nodes to each other and other factors that determinate that a node to be included or excluded from the cluster. Each cluster in the network can contain three types of nodes, such as cluster-head, cluster-gateway and cluster-member. Each type has a function or role assigned in the cluster. The cluster-head node it is like the manager and acts as location servers for all the nodes in the cluster by performing intra-cluster transmission arrangement, data forwarding, and so on. Cluster-gateway it is cluster-member with inter-cluster links, so it is like the way to other cluster that allow forwarding packet between clusters. Cluster-member is an ordinary node, which is a non-cluster- head or cluster-gateway [11-12]. Figure 2 presents a cluster structure illustration. Figure 2. Cluster structure illustration The use of clustering approach in Manet has many benefits, the topology updating information and routing information can be reduced to the exchange of aggregated information between various clusters and the exchange of detailed topology information to single clusters. Facilitates the spatial reuse of resources to increase the system capacity. A cluster structure makes an ad-hoc network appear smaller and more stable in the view of each mobile terminal. The clustering schemes of MANETs can be classified according to different criteria. In this paper, we classify the clustering protocols based on their objectives. According to this criterion, the proposed clustering schemes for MANETs can be grouped into six categories. 3.1. Dominating-Set-Based Clustering The majority clustering techniques in mobile ad hoc networks are based on dominating sets. Distributed algorithms are designed in order to find small dominating sets. The term distributed means that each node only has information of the local structure of the network [13]. A set S is dominating if each node in the graph G=(V,E) is either in S or adjacent to at least one of the nodes in S. A dominant set in mobile ad hoc networks is formed by the set of the network cluster-heads. Since a large number of cluster-heads will increase substantially the number of routing hops causing higher communication overheads and extra energy consumption, the basic idea is to find a minimum dominating set. The minimum dominating set problem is formulated in the context of a network in order to find a minimum number of transmitters that allow all the other nodes to be within the range of at least one of the selected senders. Authors of [14] propose a new Connected Dominating Set (CDS) algorithm for clustering in MANETs. the proposed algorithm is based on Wu and Li’s [15] algorithm, authors provide significant modifications by considering the degrees of the nodes during marking process and also provide further heuristics to decrease the size of CDS. And showed that this improvement is remarkable when the number of nodes in the network is large, in a dense network. As in [16] authors describe a Connected Dominating Set- Energy Protocol (CDSEP) for MANET to optimize the problem of broadcasting in the network. The main concept introduced in this protocol is a distributed algorithm which computes the connected dominating set (CDS) based on node energy and node connectivity. The CDS nodes in the CDSEP protocol are selected to forward packets during the broadcasting process, and the information broadcasted in the network through these CDS is also about the CDS. Thus, a second optimization is achieved by minimizing the contents of the control packets broadcasted in the network. Hence, only a small subset of links with the nodes is declared instead of all the links and the nodes. 3.2. Energy-Efficient Clustering Mobile nodes in MANET normally depend on battery power supply during operation, hence the energy limitation poses a severe challenge for network performance [17-18]. A MANET should strive to
  • 4.  ISSN: 2252-8776 IJ-ICT Vol. 6, No. 2, August 2017 : 69 – 75 72 reduce its energy consumption greedily in order to prolong the network lifespan. Also, a cluster-head bears extra work compared with ordinary members, and it more likely “dies” early because of excessive energy consumption. The lack of mobile nodes due to energy depletion may cause network partition and communication interruption [19]. Hence, it is also important to balance the energy consumption among mobile nodes to avoid node failure, especially when some mobile nodes bear special tasks or the network density is comparatively sparse. Madhvi et al [20] propose an energy aware algorithm based on clustering to provide longer life time of MANET. The proposed algorithm would be an energy efficient clustering algorithm that uses both scalability and energy metric for cluster layout. An index number is assigned to each node taking in consideration its energy level, the node with higher energy level becomes a cluster head or the root of max- heap tree. The remaining nodes come under the cluster head or root head forming a tree. Each cluster head gets connected with the other cluster head in the network. Here the range of clusters is fixed to one hop or it can be considered as stable clusters with moving nodes. The communication in the network will occur directly among cluster heads, and there is no gateway node. As in [21] authors propose Energy Efficient Zone based Routing with Parallel Collision Guided Broadcasting Protocol (ZCG) that uses parallel and distributed broadcasting technique to reduce redundant broadcasting in the network and to accelerate the process of path discovery, while maintaining a high reachability ratio as well as keeping node energy consumption low. ZCG uses a one hop clustering algorithm that divided the network into groups led by reliable leaders that are mostly static and have plentiful battery resources. 3.3. Mobility-Aware Clustering The property of mobility in mobile ad-hoc network has also an important impact on the stability of the clusters. So, taking into consideration the factor of mobility during the construction of the clusters structure, will have a significant impact on the stability of the clusters and thus other parameters of the network[22]. This technique tends to group the different node that has the same mobility model into the same cluster, in order to reduce the operation of the re-clustering also the re-affiliation of the cluster-member in the clusters. Authors of paper [23] present a new routing protocol Mobility Prediction-Based Clustering (MPBC). This protocol contains two phases, the initial clustering phase and the cluster maintaining phase. The Doppler shifts associated with periodically exchanged Hello packets are used to estimate the relative speeds between neighboring nodes, and the estimation results are used as the basic information in MPBC. In the initial clustering phase, the nodes having the less relative mobility in their neighborhoods are selected as the cluster heads. In the cluster maintaining phase, mobility prediction strategies are introduced to control the various problems caused by node movements, such as possible association losses to current Cluster Heads and Cluster Head role changes, for extending the connection lifetime and giving more stable clusters. 3.4. Low-Maintenance Clustering Among the problems of clustering, there is maintenance of the different clusters of the network. As in a clustered network requires a periodic exchange message for maintaining the clusters. In MANET, the topology of the network change frequently, resulting in increasing the control overhead of the network and consume a substantial amount of resources of the network like the bandwidth and the energy due to the maintenance operations of clusters[24].minimizing this problem is a necessary issue. Proposed low- maintenance clustering protocols tend to create stable cluster architecture by reducing the number of re- clustering in the network. The paper [25] propose an algorithm based on the work presented in [26] type strategy for cluster formation and maintenance. Authors added some new features to the solution, so as to improve the stability of clustering. Like other clustering schemes the proposed scheme involves two phases: Cluster formation and cluster maintenance. In this proposed approach cluster formation phase involves general clustering and cluster improvement. General clustering is followed by cluster improvement which guarantees the maximum number of connected clusters. For cluster maintenance, follow the local clustering. 3.5. Load-Balancing Clustering Load-balancing clustering algorithms believe that there are an optimum number of mobile nodes that a cluster can handle, especially in a cluster-head-based MANET. A too-large cluster may put too heavy of a load on the cluster-heads, causing cluster-heads to become the bottleneck of a MANET and reduce system throughput. A too-small cluster, however, may produce a large number of clusters and thus increase the length of hierarchical routes, resulting in longer end-to-end delay. Load-balancing clustering schemes set upper and lower limits on the number of mobile nodes that a cluster can deal with. When a cluster size
  • 5. IJ-ICT ISSN: 2252-8776  Improving Performance of Mobile Ad Hoc Network Using Clustering schemes (Mohamed Er-Rouidi) 73 exceeds its predefined limit, re-clustering procedures are invoked to adjust the number of mobile nodes in that cluster. Authors of [27] propose energy aware load balancing algorithm. Global reclustering is initiated when the network becomes significantly unbalanced i.e. if the variance of degree of the cluster heads in the network is greater than a pre-determined threshold. Degree of all cluster heads would be needed at each node to evaluate the average of degree of all cluster heads in the network, afterward the variance among themselves, which is not possible in adhoc network because of its distributed nature. For this, a formula is derived in which variance can be updated at each hop i.e. variance of N nodes can be expressed in terms of variance of N-1 nodes and average of N-1 nodes. Also in [28] authors used dynamic genetic algorithms such as Elitism-based Immigrants Genetic algorithm and Memory Enhanced Genetic Algorithm to solve dynamic load-balanced clustering problem. These schemes, select an optimal cluster head by considering the distance and energy parameters. The authors used Elitismbased Immigrants Genetic algorithm to maintain the diversity level of the population and Memory Enhanced Genetic Algorithm to store the old environments into the memory. It promises the energy efficiency of the entire cluster structure to increase the lifetime of the network. 3.6. Combined-Metrics Based Clustering Combined-metrics-based clustering takes a number of metrics into account for cluster configuration, including node degree, residual energy capacity, moving speed, and so on. This category aims at electing the most suitable cluster-head in a local area, and does not give preference to mobile nodes with certain attributes, such as lowest ID or highest node degree. One advantage of this clustering scheme is that it can flexibly adjust the weighting factors for each metric to adjust to different scenarios. For example, in a system where battery energy is more important, the weighting factor associated with energy capacity can be set higher [29]. However, not all of these parameters are always available and accurate, and the information inaccuracy may affect clustering performance. A centralized cluster formation and distributed cluster head selection based algorithm is proposed in [30] that adopts a centralized cluster formation and distributed cluster heads selection method. Using minimum energy clustering, the network is separated into energy-balanced clusters and takes in consideration energy and communication distance, optimal cluster heads are selected in order to prolong the network life time. 3.7. Summary Table 1 summarizes the main features and objectives of some protocol that uses clustering schemes. Table 1. Features of Clustering Schemes clustering schemes Based on CHs Election Cluster Stability With clusterhead? 1-hop or multi-hop Clusters Number Objectives Cokuslu [14] CDS Node degree High yes 1-hop Moderate Get a low number of nodes as dominating nodes to construct a CDS. reduce the number of nodes participating in routing and reduce the size of DS Madhvi[20] Energy Highest energy Low yes 1-hop High Avoid node with low energy level and limit the time that a mobile node can serve as a clusterhead. MPBC[23] Mobility Lowest mobility High yes 1-hop Relatively Low reduce the influence of mobile nodes’ movement on cluster topology updates in terms of re-affiliation and re- clustering Yousuf[25] Low- maintenance Node stability Very High yes 1-hop Low Limiting re-clustering situations and reducing clustering control overhead. LBRA[27] Topology Node degree Relatively High yes Multi-hop Moderate Balancing the traffic load in each cluster by limiting the number of cluster member LEACH- LEACH-C [30] Combined- metrics Combined weight metrics Very High yes 1-hop Low Electing the most suitable clusterheads in local areas by considering several metrics and keeping a stable cluster structure by reducing re- clustering situations.
  • 6.  ISSN: 2252-8776 IJ-ICT Vol. 6, No. 2, August 2017 : 69 – 75 74 4. CONCLUSION In this article, we first provided fundamental concepts about clustering, including the definition of cluster and clustering, the necessity of clustering for a large dynamic MANET, and the side effects and cost of clustering. We discussed each clustering scheme in terms of objective, mechanism, performance, and application scenario. With this work, we see that a cluster-based MANET has many important issues to examine, such as the cluster structure stability, the control overhead of cluster construction and maintenance, the energy consumption of mobile nodes with different cluster-related status, the traffic load distribution in clusters, and the fairness of serving as cluster-heads for a mobile node. As well, the different types of clustering may have a different focus and objectives. However, clustering cost always needs to be considered when discussing a clustering scheme, because clustering cost is important to evaluate the performance and scalability improvement of a clustering scheme no matter which specific objectives it bears. REFERENCES [1] I. Chlamtac; M. Conti; and J. J.-N. Liu , “Mobile ad hoc Networking: Imperatives and Challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13–64, 2003. [2] C. E. Perkins, “Ad Hoc Networking,” Reading: A., vol. 1. 2001. [3] J. Macker and S. Corson, “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations,” no. No. RFC 2501, 1999. [4] C. Perkins; E. Belding Royer; and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” 2003. [Online]. Available: https://www.ietf.org/rfc/rfc3561.txt. [Accessed: 01-Jul-2003]. [5] D. B. Johnson and D. A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks”. 1996. [6] C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” ACM SIGCOMM Comput. Commun. Rev., vol. 24, no. 4, 1994. [7] S. Corson and V. Park, “Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification.” [8] M. Abolhasan; T. Wysocki; and E. Dutkiewicz, “A Review of Routing Protocols for Mobile ad hoc networks,” Ad Hoc Networks, vol. 2, no. 1, pp. 1–22, 2004. [9] E. M. Royer and Chai-Keong Toh, “A review of Current Routing Protocols for ad hoc Mobile Wireless Networks,” IEEE Pers. Commun., vol. 6, no. 2, pp. 46–55, Apr. 1999. [10] Z. Haas; M. Pearlman; P. Samar, “The Zone Routing Protocol (ZRP) for Ad Hoc Networks,” 2002. [11] Y. Y. JANE and P. H. J, “A Survey of Clustering Schemes for Mobile ad hoc Networks,” IEEE Commun. Surv. Tutorials, vol. 7, no. 1, pp. 32–48, 2005. [12] S. Chinara and S. K. Rath, “A Survey on one-hop Clustering Algorithms in Mobile ad hoc Networks,” J. Netw. Syst. Manag., vol. 17, no. 1–2, pp. 183–207, 2009. [13] Blanca Alicia; L. Ospina; and R. C. Hincapié, “Survey of Clustering Techniques for Mobile ad hoc Networks,” Rev. Fac. Ing. Univ. Antioquia, no. 41, pp. 145–161, 2007. [14] D. Cokuslu; K. Erciyes; and O. Dagdeviren, “A Dominating Set Based Clustering Algorithm for Mobile Ad Hoc Networks,” Springer, Berlin, Heidelberg, 2006, pp. 571–578. [15] J. Wu and H. Li, “A Dominating-Set-Based Routing Scheme in Ad Hoc Wireless Networks,” Telecommun. Syst., vol. 18, no. 1/3, pp. 13–36, 2001. [16] A. Kies; Z. M. Maaza; and R. Belbachir, “A Connected Dominating Set Based on Connectivity and Energy in Mobile Ad Hoc Networks,” Acta Polytech. Hungarica, vol. 9, no. 5, 2012. [17] M. Er-Rouidi; H. Moudni; H. Mouncif; and A. Merbouha, “An Energy Consumption Evaluation of Reactive and Proactive Routing Protocols in Mobile Ad-Hoc Network,” in Proceedings-Computer Graphics, Imaging and Visualization: New Techniques and Trends, CGiV 2016, 2016. [18] M. Er-Rouidi; H. Moudni; H. Faouzi; H. Mouncif, and A. Merbouha, “Energy Enhancement of Ad-hoc On-demand Distance Vector Routing Protocol for Maximum Lifetime in MANET,” Int. Arab Conf. Inf. Technol., 2016. [19] C.-K. Toh, “Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless ad hoc Networks,” IEEE Commun. Mag., vol. 39, no. 6, pp. 138–147, Jun. 2001. [20] M. Saxena; N. Phate; K. J. Mathai; and M. A. Rizvi, “Clustering Based Energy Efficient Algorithm Using Max- Heap Tree for MANET,” 2014 Fourth Int. Conf. Commun. Syst. Netw. Technol., pp. 123–127, 2014. [21] S. S. Basurra; M. De Vos; J. Padget; Y. Ji; T. Lewis; and S. Armour, “Energy Efficient Zone Based Routing Protocol for MANETs,” Ad Hoc Networks, vol. 25, no. PA, pp. 16–37, 2015. [22] Y. Oh and K. Lee, “A Clustering Algorithm Based on Mobility Properties in Mobile Ad Hoc Networks,” Int. J. Distrib. Sens. Networks, vol. 11, no. 6, p. 567269, Jun. 2015. [23] M. Ni; Z. Zhong; and D. Zhao, “MPBC: A Mobility Prediction-Based Clustering Scheme for Ad Hoc Networks,” IEEE Trans. Veh. Technol., vol. 60, no. 9, pp. 4549–4559, Nov. 2011. [24] Taek Jin Kwon; M. Gerla; V. K. Varma; M. Barton; and T. R. Hsing, “Efficient flooding with passive clustering - An overhead-free selective forward mechanism for ad hoc/sensor networks,” Proc. IEEE, vol. 91, no. 8, pp. 1210– 1220, Aug. 2003. [25] A. Yousuf and J. Singh, “Clustering in MANETs with Minimum Reclustering and Communication Overhead,” Circ. Comput. Sci., vol. 1, no. 1, pp. 54–58, 2016. [26] J. Y. Yu and P. H. J. Chong, “An Efficient Clustering Scheme for Large and Dense Mobile ad hoc Networks (MANETs),” Comput. Commun., vol. 30, no. 1, pp. 5–16, Dec. 2006.
  • 7. IJ-ICT ISSN: 2252-8776  Improving Performance of Mobile Ad Hoc Network Using Clustering schemes (Mohamed Er-Rouidi) 75 [27] S. Kaur and V. Kumari, “Efficient Clustering with Proposed Load Balancing Technique for MANET,” Int. J. Comput. Appl., vol. 111, no. 13, pp. 975–8887, 2015. [28] M. Kaliappan; S. Augustine; and B. Paramasivan, “Enhancing Energy Efficiency and Load Balancing in mobile ad hoc Network using Dynamic Genetic Algorithms,” J. Netw. Comput. Appl., vol. 73, pp. 35–43, 2016. [29] Ratishagarwal1 and Roopamgupta2, “Review of Weighted Clustering Algorithms for Mobile ad hoc Networks,” GESJ Comput. Sci. Telecommun., vol. 1, no. 33, 2012. [30] A. A. Khamiss; C. Senchun; Z. Baihai; and C. Lingguo, “Combined Metrics-Clustering Algorithm Based on LEACH-C,” in the 27th Chinese Control and Decision Conference (2015 CCDC), pp. 5252–5257, 2015. BIOGRAPHIES OF AUTHORS Mohamed Er-rouidi, obtained he’s Master degree in computer science in 2013 from the faculty of Science and Technology, Beni Mellal. Currently he is a PhD student at the Center of Doctoral Studies in the Faculty of Science and technology of Beni Mellal. His research interest includes wireless networks, quality of service, algorithms & applications and routing protocols. Houda Moudni currently is a PhD candidate in the Department of Computer Science at University Sultan MoulaySlimane, Beni Mellal, Morocco. Her current research interests include: networking, security issues and securing mobile ad hoc networks. Hassan Faouzi received his M.Sc. degree in Business Intelligence from Faculty of Science and Technology Beni mellal Morocco in 2013. He is currently a Phd student at the same Faculty. His current research interests lie in the fields of Ad hoc networking and security.