This document proposes a new contention-based forwarding (CBF) mechanism for position-based routing in mobile ad hoc networks. CBF selects the next hop through a distributed contention process using biased timers, without requiring periodic beacon messages. It aims to use more accurate position information than existing beacon-based approaches and eliminate routing overhead from beacons. CBF works in three steps: broadcast of the packet, contention between neighbors to become the next hop using biased timers, and suppression of duplicate packets from losing neighbors. The document analyzes CBF's properties and compares its performance to beacon-based greedy forwarding through simulation.
Analysis of Selfish behavior in energy consumption model based Multihop cellu...ijsrd.com
Many nodes would not transmit during data transmission and they are considered to be in cooperative. To make them cooperative a fair charging policy is used by charging the since and destination nodes so that both of them can benefit from the communication and it can secure the payment. Charging since and destination nodes almost computationally free, and significantly reduce the number of generated and submitted checks. In this way, each intermediate node earns some credits and the destination node pays the total packet relaying cost. To implement this charging policy efficiently, hashing operations are used in the ACK packets to reduce the number of public-key-cryptography operations. Moreover, reducing the overhead of the payment checks is essential for the efficient implementation of the incentive mechanism due to the large number of payment transactions
POSITION BASED ADAPTIVE ROUTING FOR VANETSIJCNCJournal
Routing plays a very significant role in multi hop data dissemination in Vehicular Ad-Hoc Networks
(VANETs). Wehave proposed a Position based Adaptive Routing (PAR) protocol which is scalable for different
network densities in VANETs. This scheme uses Preferred Group Broadcasting (PGB) for route discovery.
In this mode, after broadcasting the request for route discovery the source node starts listening to
the channel. If the packet is not further rebroadcasted by any neighbor in a set timeout, then it repeats the
broadcast. This process is repeated until the request reaches the destination. The destination keeps on accumulating
route requests coming from different paths until predefined time. It then chooses the least cost
path as route reply. It uses the set of traversed anchors for sending the unicast route reply to the source
node. PAR uses Advance Greedy Forwarding (AGF) for data forwarding and greedily forwards the data
packet to the next anchor towards destination node. It switches to carry and forward mode once it finds
partitions in the network. The intermediate vehicle buffers the packet until next junction and switches back
to position based scheme and greedily forwards to next node in range which is closest to the destination. To
have an end to end connectedpath, it uses guards to guard anchors tied to different junction and geographical
locations in the network. The algorithm is scalable and exploits advantages of existing techniques
already developed for specific scenarios in VANET. Results show that the service ratio and packet
delay of PAR are higher than its counterparts.
We make use of the existence of cell-disjoint paths in the 3D grid topology to design a new highly reliable adaptive geographic routing protocol called Grid-based Adaptive Routing Protocol (GARP) for Underwater Wireless Sensor Networks. In GARP, the underwater environment is viewed as a virtual 3D grid of cells. A packet is forwarded following a pre-constructed routing path from a node in a grid cell to a node in a neighbouring grid cell repeatedly until the destination sink node is reached. When a selected routing path becomes unavailable, GARP adapts to the condition by switching to an alternative path making use of the existing cell-disjoint paths. Since the protocol uses pre-constructed routing paths, it avoids path establishment and path maintenance overheads. Analytical performance evaluation results for GARP are obtained showing its high reliability. In tested cases, the delivery ratio has approached 100% when the network density has reached a minimum number of sensor nodes per grid cell.
This document discusses a cooperative transmission protocol for wireless sensor networks. The protocol aims to improve energy efficiency and transmission reliability. It establishes cooperative clusters during data transmission where neighboring nodes help each other. The cluster head recruits nodes to assist in communication. The protocol is analyzed based on factors like capacity, end-to-end robustness to packet loss, and the tradeoff between energy consumption and error rate. Simulation results show the protocol increases transmission reliability and achieves a longer network lifetime compared to non-cooperative schemes.
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...IJCNCJournal
The Broadcast storm problem causes severe interference, intense collision and channel contention, which greatly degrades the QoS performance metrics of the routing protocols. So, we suggest a neighbourhood coverage knowledge probabilistic broadcasting model (NCKPB) integrating with AODV protocol with knowledge on 2-hop neighbourhood coverage; a connectivity function to control a node’s forwarding probability of retransmission to alleviate significant overhead redundancy. Our objective is to minimize the broadcast RREQ overhead while ensuring fair retransmission bandwidth. We considered two more important measures called Saved Rebroadcast and Reachability. The outcomes of NCKPB, Fixed probability (FP) and Flooding (FL) routing schemes are examined under three major operating conditions, such as node density, mobility and traffic load. The NS-2 results demonstrate the efficacy of the proposed NCKPB model by illustrating its performance superiority over all key metrics such as redundancy overhead, end to end latency, throughput, reachability, saved rebroadcast and collision contrast to FP and FL.
Chorus is a novel broadcast protocol that improves the efficiency and scalability of wireless broadcast using self-interference cancellation at the MAC/PHY layers. It allows packet collisions and resolves them using symbol-level interference cancellation and iterative decoding. This collision-tolerant mechanism significantly improves spatial reuse and transmission diversity. Chorus also includes a cognitive MAC sensing and scheduling scheme that further facilitates these advantages, resulting in asymptotic broadcast delay proportional to the network radius. Evaluation shows Chorus provides significantly better performance than CSMA/CA-based protocols in terms of scalability, reliability, delay, and other metrics across various network scenarios.
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
Clustering is an important research area for mobile ad hoc networks (MANETs) as it increases the capacity of network, reduces the routing overhead and makes the network more scalable in the presence of both high mobility and a large number of mobile nodes. Routing protocols based on flat topology are not scalable because of their built-in characteristics. However, clustering cause overhead which consumes considerable bandwidth, drain mobile nodes energy quickly, likely cause congestion, collision and data delay in larger networks. This paper uses an implementation of the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based routing protocol to examine the influence of clustering on the performance of mobile ad hoc networks. This paper evaluates channel utilization and control overhead as a function of number of nodes per sq. km to show the effect of clustering. Simulation results show that in high mobility scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. When designing mobile ad hoc networks, several interesting and difficult problems arise because of the shared nature of the wireless medium, limited transmission power (range) of wireless devices, node mobility, and battery limitations. This paper aims at providing a new schema to improve Dynamic Source Routing (DSR) Protocol. The aim
behind the proposed enhancement is to find the best route in acceptable time limit without having broadcast storm. Moreover, O-DSR enables network not only to overcome congestion but also maximize the lifetime of mobile nodes. Some simulations results show that the Route Request (RREQ) and the Control Packet Overhead decrease by 15% when O-DSR is used, consequently. Also the global energy consumption in O-DSR is lower until to 60 % , which leads to a long lifetime of the network.
Analysis of Selfish behavior in energy consumption model based Multihop cellu...ijsrd.com
Many nodes would not transmit during data transmission and they are considered to be in cooperative. To make them cooperative a fair charging policy is used by charging the since and destination nodes so that both of them can benefit from the communication and it can secure the payment. Charging since and destination nodes almost computationally free, and significantly reduce the number of generated and submitted checks. In this way, each intermediate node earns some credits and the destination node pays the total packet relaying cost. To implement this charging policy efficiently, hashing operations are used in the ACK packets to reduce the number of public-key-cryptography operations. Moreover, reducing the overhead of the payment checks is essential for the efficient implementation of the incentive mechanism due to the large number of payment transactions
POSITION BASED ADAPTIVE ROUTING FOR VANETSIJCNCJournal
Routing plays a very significant role in multi hop data dissemination in Vehicular Ad-Hoc Networks
(VANETs). Wehave proposed a Position based Adaptive Routing (PAR) protocol which is scalable for different
network densities in VANETs. This scheme uses Preferred Group Broadcasting (PGB) for route discovery.
In this mode, after broadcasting the request for route discovery the source node starts listening to
the channel. If the packet is not further rebroadcasted by any neighbor in a set timeout, then it repeats the
broadcast. This process is repeated until the request reaches the destination. The destination keeps on accumulating
route requests coming from different paths until predefined time. It then chooses the least cost
path as route reply. It uses the set of traversed anchors for sending the unicast route reply to the source
node. PAR uses Advance Greedy Forwarding (AGF) for data forwarding and greedily forwards the data
packet to the next anchor towards destination node. It switches to carry and forward mode once it finds
partitions in the network. The intermediate vehicle buffers the packet until next junction and switches back
to position based scheme and greedily forwards to next node in range which is closest to the destination. To
have an end to end connectedpath, it uses guards to guard anchors tied to different junction and geographical
locations in the network. The algorithm is scalable and exploits advantages of existing techniques
already developed for specific scenarios in VANET. Results show that the service ratio and packet
delay of PAR are higher than its counterparts.
We make use of the existence of cell-disjoint paths in the 3D grid topology to design a new highly reliable adaptive geographic routing protocol called Grid-based Adaptive Routing Protocol (GARP) for Underwater Wireless Sensor Networks. In GARP, the underwater environment is viewed as a virtual 3D grid of cells. A packet is forwarded following a pre-constructed routing path from a node in a grid cell to a node in a neighbouring grid cell repeatedly until the destination sink node is reached. When a selected routing path becomes unavailable, GARP adapts to the condition by switching to an alternative path making use of the existing cell-disjoint paths. Since the protocol uses pre-constructed routing paths, it avoids path establishment and path maintenance overheads. Analytical performance evaluation results for GARP are obtained showing its high reliability. In tested cases, the delivery ratio has approached 100% when the network density has reached a minimum number of sensor nodes per grid cell.
This document discusses a cooperative transmission protocol for wireless sensor networks. The protocol aims to improve energy efficiency and transmission reliability. It establishes cooperative clusters during data transmission where neighboring nodes help each other. The cluster head recruits nodes to assist in communication. The protocol is analyzed based on factors like capacity, end-to-end robustness to packet loss, and the tradeoff between energy consumption and error rate. Simulation results show the protocol increases transmission reliability and achieves a longer network lifetime compared to non-cooperative schemes.
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...IJCNCJournal
The Broadcast storm problem causes severe interference, intense collision and channel contention, which greatly degrades the QoS performance metrics of the routing protocols. So, we suggest a neighbourhood coverage knowledge probabilistic broadcasting model (NCKPB) integrating with AODV protocol with knowledge on 2-hop neighbourhood coverage; a connectivity function to control a node’s forwarding probability of retransmission to alleviate significant overhead redundancy. Our objective is to minimize the broadcast RREQ overhead while ensuring fair retransmission bandwidth. We considered two more important measures called Saved Rebroadcast and Reachability. The outcomes of NCKPB, Fixed probability (FP) and Flooding (FL) routing schemes are examined under three major operating conditions, such as node density, mobility and traffic load. The NS-2 results demonstrate the efficacy of the proposed NCKPB model by illustrating its performance superiority over all key metrics such as redundancy overhead, end to end latency, throughput, reachability, saved rebroadcast and collision contrast to FP and FL.
Chorus is a novel broadcast protocol that improves the efficiency and scalability of wireless broadcast using self-interference cancellation at the MAC/PHY layers. It allows packet collisions and resolves them using symbol-level interference cancellation and iterative decoding. This collision-tolerant mechanism significantly improves spatial reuse and transmission diversity. Chorus also includes a cognitive MAC sensing and scheduling scheme that further facilitates these advantages, resulting in asymptotic broadcast delay proportional to the network radius. Evaluation shows Chorus provides significantly better performance than CSMA/CA-based protocols in terms of scalability, reliability, delay, and other metrics across various network scenarios.
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
Clustering is an important research area for mobile ad hoc networks (MANETs) as it increases the capacity of network, reduces the routing overhead and makes the network more scalable in the presence of both high mobility and a large number of mobile nodes. Routing protocols based on flat topology are not scalable because of their built-in characteristics. However, clustering cause overhead which consumes considerable bandwidth, drain mobile nodes energy quickly, likely cause congestion, collision and data delay in larger networks. This paper uses an implementation of the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based routing protocol to examine the influence of clustering on the performance of mobile ad hoc networks. This paper evaluates channel utilization and control overhead as a function of number of nodes per sq. km to show the effect of clustering. Simulation results show that in high mobility scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. When designing mobile ad hoc networks, several interesting and difficult problems arise because of the shared nature of the wireless medium, limited transmission power (range) of wireless devices, node mobility, and battery limitations. This paper aims at providing a new schema to improve Dynamic Source Routing (DSR) Protocol. The aim
behind the proposed enhancement is to find the best route in acceptable time limit without having broadcast storm. Moreover, O-DSR enables network not only to overcome congestion but also maximize the lifetime of mobile nodes. Some simulations results show that the Route Request (RREQ) and the Control Packet Overhead decrease by 15% when O-DSR is used, consequently. Also the global energy consumption in O-DSR is lower until to 60 % , which leads to a long lifetime of the network.
A survey on mac strategies for cognitive radio networksAbir Hossain
The document presents CoRe-MAC, a MAC protocol for cooperative relaying in wireless networks that extends CSMA/CA. It uses reactive relay selection, where a relay is selected only if direct transmission between the source and destination fails. This avoids overhead when cooperation is not needed. Potential relays listen to direct transmissions and can act as relays if needed. Relay selection involves relays applying to relay and the destination selecting the best relay. Simulation results show CoRe-MAC performs similar to CSMA/CA for good SNR but improves throughput and reliability over larger distances by enabling cooperation when needed.
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...IOSR Journals
This document presents a novel rebroadcast technique called Neighbor Coverage based Probabilistic Rebroadcast (NCPR) protocol to reduce routing overhead in mobile ad hoc networks. The NCPR protocol calculates a rebroadcast delay based on the number of common neighbors between nodes to prioritize dissemination of neighbor information. It also calculates a rebroadcast probability based on additional neighbor coverage ratio and connectivity factor to reduce unnecessary rebroadcasts while maintaining network connectivity. The protocol is implemented by enhancing the AODV routing protocol in NS-2 to reduce overhead from hello packets and neighbor lists in route requests. Its performance is evaluated under varying network sizes, traffic loads, and packet loss conditions.
This document summarizes geographical routing in wireless sensor networks. It begins with an introduction to geographic routing protocols, which route packets based on the geographic position of nodes rather than their network addresses. It then discusses several specific geographic routing protocols, including Greedy Perimeter Stateless Routing (GPSR) and Geographical and Energy Aware Routing (GEAR). The document also covers topics like how nodes obtain location information, security issues in geographic routing like the Sybil attack, and concludes that geographic routing can enable scalable and energy-efficient routing in wireless sensor networks.
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
Battlefield theater applications require supporting large number of nodes. It can facilitate many multi-hop
paths between each source and destination pairs. For scalability, it is critical that for supporting network
centric applications with large set of nodes require hierarchical approach to designing networks. In this
research we consider using Mobile Ad Hoc Network (MANET) with multiple clusters. Each cluster
supports a few nodes with a cluster head. The intra-cluster connectivity amongst the nodes within the
cluster is supported by multi-hop connectivity to ensure handling mobility in such a way that no service
disruption can occur. The inter-cluster connectivity is also achieved by multi-hop connectivity. However,
for inter-cluster communications, only cluster heads are connected. The selection of intra-cluster
communications and inter-cluster communications allow scalability of the network to support multiservices
applications end-to-end with a desired Quality of Service (QoS). This paper proposes graph
theoretic approach to establish efficient connection between a source and a destination within each cluster
in intra-cluster network and between clusters in inter-cluster network. Graph theoretic approach
traditionally was applied networks where nodes are static or fixed. In this paper, we have applied the
graph theoretic routing to MANET where nodes are mobile. One of the important challenges in MANET is
to support an efficient routing algorithm for multi-hop communications across many nodes which are
dynamic in nature. However, dynamic behavior of the nodes requires greater understanding of the node
degree and mobility at each instance of time in order to maintain end-to-end QoS for multi-service
provisioning. This paper demonstrates graph theoretic approach produces an optimum multi-hop
connectivity path based on cumulative minimum degree that minimizes the contention and scheduling
delay end-to-end. It is applied to both intra-cluster communications as well as inter-cluster
communications. The performance shows that having a multi-hop connectivity for intra-cluster
communications is more power efficient compared to broadcast of information with maximum power
coverage. Each cluster performs similarly and the algorithm is also used for inter-cluster communications.
Our simulation results show that the proposed graph theoretic routing approach will reduce the overall
delay and improves the physical layer data frame transmission.
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Eswar Publications
Ad hoc networks are collections of mobile nodes communicating with each other using wireless media without any fixed infrastructure. During both route discovery and traversal of route-reply packets from destination to source,
broadcast of packets is required which incurs huge message cost. The present article deals with the message cost
reduction during transmission of route-reply from destination to source. Also the redundancy that is visible within the 2-hop neighborhood of a node is minimized during broadcasting of route-reply. This improves the average lifetime of network nodes by decreasing the possibility of network partition. The scheme of 2NI can be used with any reactive routing protocol in MANETs.
This document summarizes research on distributed path computation algorithms that aim to prevent routing loops. It introduces the Distributed Path Computation with Intermediate Variables (DIV) algorithm, which can operate with any routing algorithm to guarantee loop-freedom. DIV generalizes previous loop-free algorithms and provably outperforms them by reducing synchronous updates and helping maintain paths during network changes. The document also reviews link-state routing, distance-vector routing, and existing loop-prevention techniques like the Diffusing Update Algorithm and Loop Free Invariance algorithms.
Recently proposed wireless mesh routing metrics
based on awareness of congestion, load or interference typically
employ queue occupancy of a node's wireless interface to
estimate traffic load. Queue occupancy, however, does not
directly reflect the impact of channel contention from neighbor
nodes. We propose an alternative called the channel load-aware
(CLAW) routing metric that takes into consideration not only
the traffic load within the node itself, but also the degree of
interference and contention within the channel. CLAW uses
local information from a node's MAC layer to estimate channel
busyness and contention levels. It does not require complex
computations, nor the exchange of link-level statistics with
neighbors. Our preliminary results show that CLAW can
identify congested regions within the network and thus enable
the determination of routes around these congested areas. We
present the results of simulations we conducted to evaluate the
use of CLAW in mesh-wide routing.
International Journal of Engineering Research and DevelopmentIJERD Editor
This document summarizes a research paper that proposes a Hierarchical Grid Location Service (HGLS) to efficiently provide location information in mobile ad hoc networks. The key points are:
1) HGLS partitions the network area into a hierarchy of grids, with the smallest grids making up larger grids. A location server is selected for each grid level using an election algorithm prioritizing nodes with more energy closer to the grid center.
2) When a node needs the location of another node, it queries the location servers starting from the lowest grid level. This avoids flooding the entire network.
3) As nodes move between grids, they update location servers. The protocol aims to minimize updates and queries to conserve
This document describes a routing protocol designed for reliable and efficient communication in wireless sensor networks (WSNs). It discusses four existing routing protocols - Gradient-Based Routing (GBR), Gradient Broadcast (GRAB), Dynamic Source Routing (DSR), and Adhoc On-demand Distance Vector Routing (AODV) - and analyzes their performance tradeoffs. It then proposes a new light-weight routing protocol called Efficient and Reliable routing (EAR) that aims to achieve reliable and efficient routing in single-hub and multi-hub WSNs while minimizing energy consumption and communication overhead. The protocol design and operation are explained in detail.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Improving data transmission in the vanet using multi criteria decision making...ijfcstjournal
In vehicular ad
-
hoc networks the packets are sent using multi
-
hop methods and the receiving limit of a
message is gradually extended, but the exponential increment of the number of nodes re
-
broadcasting a
message results in broadcast storm problem in data
broadcasting in this case. Some characteristics like
high speed of nodes, rapid topological changes and repetitive discontinuities have made it difficult
to
design an efficient broadcasting protocol for these networks.
We have offered a novel fuzzy method
based on multi
-
criteria decision
-
making (MCDM) for prioritizing the
vehicles in selection of the most proper neighbor to broadcast data in this paper. With using this f
uzzy
method, the most proper vehicles participate in data broadcasting. The results of
simulation using NS show
that because of selecting the neighboring vehicles with high priority in data broadcasting, the spee
d of
sending the packs is increased and the network load is considerably decreased. This method also
considerably decreases broadca
sting traffic.
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...ijwmn
Ad Hoc mobile networks are constituted of nodes that move freely without a centralized administration.
These nodes contribute in the routing of data packets that are sent by a source. This happens when the
latter is not capable of reaching its destination. On the other hand, their mobility causes recurrent
breakdowns of the routing paths notably with sparse MANET. In order to optimize the performance of such
networks, we suggest a new extension of protocols: Stream Control Transmission Protocols (SCTP) named
SCTP-MANET. Their main function is therefore to improve the availability of the links in sparse MANET
protocols. This could be achieved by a better integration of Multihoming. With this aim in mind, this new
extension is based on a cross-layer interface between transport and routing layers as well as the use of
specific messages.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
A neighbor coverage based probabilistic rebroadcast for reducing routing over...JPINFOTECH JAYAPRAKASH
This document proposes a neighbor coverage-based probabilistic rebroadcast protocol to reduce routing overhead in mobile ad hoc networks. It calculates a rebroadcast delay based on common neighbors to determine the forwarding order. It also calculates a rebroadcast probability based on uncovered neighbors, connectivity, and node density. Simulation results show it generates less rebroadcast traffic than flooding and other optimized schemes.
Caching strategies for on demand routing protocols for wireless ad hoc networkAcel-Omeran
This document analyzes caching strategies for on-demand routing protocols in wireless ad hoc networks. It evaluates different design choices for cache structure, capacity, and timeout using the Dynamic Source Routing (DSR) protocol through detailed simulations. The simulations consider 50 different mobility scenarios drawn from 5 mobility models to analyze how caching algorithms are affected by node movement patterns.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A Review on Geographical Location Based Energy Efficient Direction Restricted...IJRES Journal
Delay Tolerant Network (DTNs) is a wireless network that experiences frequent connectivity and due to mobility of nodes long duration partitions occurred during transmission of data. DTN has the main feature that there is not full path present from source to destination. In Delay Tolerant Network (DTN), traditional routing protocol for mobile Ad-hoc protocol to be ineffective to extend of message transmission between different nodes. Delay tolerant networks (DTNs) are used in many applications like in deep space communications, under water Acoustic Network, Sparsely Populated Areas Networks Etc. In such network a routing with minimum energy congumption is major issue. In this paper, we try to explore a routing issue in DTN. First energy requirement and routing with their corresponding countermeasures in DTN are explained. Moving nodes in DTN keep the updating of network as well energy at every stage. By using the geographical concept the location of each node is maintained by updating in topology. There are many routing protocols are available for routing purpose in DTN.
Winter occurs from December to February, bringing cold weather and snow. During this season, trees are bare and animals hibernate as the days grow shorter. People wear warm clothing like coats, hats and gloves, and enjoy hot drinks and foods indoors to stay warm. They play in the snow by making snowmen and igloos or celebrate indoors near the fireplace.
The document describes an opportunistic packet scheduling and media access control (OSMA) protocol for wireless LANs and multi-hop ad hoc networks. The OSMA protocol aims to alleviate the head-of-line blocking problem and exploit multiuser diversity by allowing a node to schedule transmissions to receivers with good channel conditions. The key mechanisms of OSMA are multicast RTS frames containing a list of candidate receivers, and priority-based CTS frames where the receiver with the best channel and highest priority replies first to avoid collisions. Simulation results show the OSMA protocol can significantly improve network throughput while maintaining fairness between links.
This document discusses various MAC protocols for ad hoc wireless networks. It begins by outlining key issues in designing MAC protocols for these networks, such as bandwidth efficiency, quality of service support, and the hidden and exposed terminal problems. It then covers classifications of MAC protocols including contention-based, contention-based with reservation mechanisms, and contention-based with scheduling mechanisms. Specific protocols are discussed within each category.
The document discusses MAC protocols for ad hoc networks. It begins by outlining problems MAC protocols must address, such as bandwidth efficiency, hidden/exposed terminals, and mobility. It then classifies MAC protocols into contention-based without reservation, contention-based with reservation, and contention-based with scheduling. Examples are provided for each category, including MACA, BTMA, D-PRMA, and DPS. The document also covers MAC protocols that use directional antennas to improve throughput and reuse.
A survey on mac strategies for cognitive radio networksAbir Hossain
The document presents CoRe-MAC, a MAC protocol for cooperative relaying in wireless networks that extends CSMA/CA. It uses reactive relay selection, where a relay is selected only if direct transmission between the source and destination fails. This avoids overhead when cooperation is not needed. Potential relays listen to direct transmissions and can act as relays if needed. Relay selection involves relays applying to relay and the destination selecting the best relay. Simulation results show CoRe-MAC performs similar to CSMA/CA for good SNR but improves throughput and reliability over larger distances by enabling cooperation when needed.
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...IOSR Journals
This document presents a novel rebroadcast technique called Neighbor Coverage based Probabilistic Rebroadcast (NCPR) protocol to reduce routing overhead in mobile ad hoc networks. The NCPR protocol calculates a rebroadcast delay based on the number of common neighbors between nodes to prioritize dissemination of neighbor information. It also calculates a rebroadcast probability based on additional neighbor coverage ratio and connectivity factor to reduce unnecessary rebroadcasts while maintaining network connectivity. The protocol is implemented by enhancing the AODV routing protocol in NS-2 to reduce overhead from hello packets and neighbor lists in route requests. Its performance is evaluated under varying network sizes, traffic loads, and packet loss conditions.
This document summarizes geographical routing in wireless sensor networks. It begins with an introduction to geographic routing protocols, which route packets based on the geographic position of nodes rather than their network addresses. It then discusses several specific geographic routing protocols, including Greedy Perimeter Stateless Routing (GPSR) and Geographical and Energy Aware Routing (GEAR). The document also covers topics like how nodes obtain location information, security issues in geographic routing like the Sybil attack, and concludes that geographic routing can enable scalable and energy-efficient routing in wireless sensor networks.
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
Battlefield theater applications require supporting large number of nodes. It can facilitate many multi-hop
paths between each source and destination pairs. For scalability, it is critical that for supporting network
centric applications with large set of nodes require hierarchical approach to designing networks. In this
research we consider using Mobile Ad Hoc Network (MANET) with multiple clusters. Each cluster
supports a few nodes with a cluster head. The intra-cluster connectivity amongst the nodes within the
cluster is supported by multi-hop connectivity to ensure handling mobility in such a way that no service
disruption can occur. The inter-cluster connectivity is also achieved by multi-hop connectivity. However,
for inter-cluster communications, only cluster heads are connected. The selection of intra-cluster
communications and inter-cluster communications allow scalability of the network to support multiservices
applications end-to-end with a desired Quality of Service (QoS). This paper proposes graph
theoretic approach to establish efficient connection between a source and a destination within each cluster
in intra-cluster network and between clusters in inter-cluster network. Graph theoretic approach
traditionally was applied networks where nodes are static or fixed. In this paper, we have applied the
graph theoretic routing to MANET where nodes are mobile. One of the important challenges in MANET is
to support an efficient routing algorithm for multi-hop communications across many nodes which are
dynamic in nature. However, dynamic behavior of the nodes requires greater understanding of the node
degree and mobility at each instance of time in order to maintain end-to-end QoS for multi-service
provisioning. This paper demonstrates graph theoretic approach produces an optimum multi-hop
connectivity path based on cumulative minimum degree that minimizes the contention and scheduling
delay end-to-end. It is applied to both intra-cluster communications as well as inter-cluster
communications. The performance shows that having a multi-hop connectivity for intra-cluster
communications is more power efficient compared to broadcast of information with maximum power
coverage. Each cluster performs similarly and the algorithm is also used for inter-cluster communications.
Our simulation results show that the proposed graph theoretic routing approach will reduce the overall
delay and improves the physical layer data frame transmission.
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Eswar Publications
Ad hoc networks are collections of mobile nodes communicating with each other using wireless media without any fixed infrastructure. During both route discovery and traversal of route-reply packets from destination to source,
broadcast of packets is required which incurs huge message cost. The present article deals with the message cost
reduction during transmission of route-reply from destination to source. Also the redundancy that is visible within the 2-hop neighborhood of a node is minimized during broadcasting of route-reply. This improves the average lifetime of network nodes by decreasing the possibility of network partition. The scheme of 2NI can be used with any reactive routing protocol in MANETs.
This document summarizes research on distributed path computation algorithms that aim to prevent routing loops. It introduces the Distributed Path Computation with Intermediate Variables (DIV) algorithm, which can operate with any routing algorithm to guarantee loop-freedom. DIV generalizes previous loop-free algorithms and provably outperforms them by reducing synchronous updates and helping maintain paths during network changes. The document also reviews link-state routing, distance-vector routing, and existing loop-prevention techniques like the Diffusing Update Algorithm and Loop Free Invariance algorithms.
Recently proposed wireless mesh routing metrics
based on awareness of congestion, load or interference typically
employ queue occupancy of a node's wireless interface to
estimate traffic load. Queue occupancy, however, does not
directly reflect the impact of channel contention from neighbor
nodes. We propose an alternative called the channel load-aware
(CLAW) routing metric that takes into consideration not only
the traffic load within the node itself, but also the degree of
interference and contention within the channel. CLAW uses
local information from a node's MAC layer to estimate channel
busyness and contention levels. It does not require complex
computations, nor the exchange of link-level statistics with
neighbors. Our preliminary results show that CLAW can
identify congested regions within the network and thus enable
the determination of routes around these congested areas. We
present the results of simulations we conducted to evaluate the
use of CLAW in mesh-wide routing.
International Journal of Engineering Research and DevelopmentIJERD Editor
This document summarizes a research paper that proposes a Hierarchical Grid Location Service (HGLS) to efficiently provide location information in mobile ad hoc networks. The key points are:
1) HGLS partitions the network area into a hierarchy of grids, with the smallest grids making up larger grids. A location server is selected for each grid level using an election algorithm prioritizing nodes with more energy closer to the grid center.
2) When a node needs the location of another node, it queries the location servers starting from the lowest grid level. This avoids flooding the entire network.
3) As nodes move between grids, they update location servers. The protocol aims to minimize updates and queries to conserve
This document describes a routing protocol designed for reliable and efficient communication in wireless sensor networks (WSNs). It discusses four existing routing protocols - Gradient-Based Routing (GBR), Gradient Broadcast (GRAB), Dynamic Source Routing (DSR), and Adhoc On-demand Distance Vector Routing (AODV) - and analyzes their performance tradeoffs. It then proposes a new light-weight routing protocol called Efficient and Reliable routing (EAR) that aims to achieve reliable and efficient routing in single-hub and multi-hub WSNs while minimizing energy consumption and communication overhead. The protocol design and operation are explained in detail.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Improving data transmission in the vanet using multi criteria decision making...ijfcstjournal
In vehicular ad
-
hoc networks the packets are sent using multi
-
hop methods and the receiving limit of a
message is gradually extended, but the exponential increment of the number of nodes re
-
broadcasting a
message results in broadcast storm problem in data
broadcasting in this case. Some characteristics like
high speed of nodes, rapid topological changes and repetitive discontinuities have made it difficult
to
design an efficient broadcasting protocol for these networks.
We have offered a novel fuzzy method
based on multi
-
criteria decision
-
making (MCDM) for prioritizing the
vehicles in selection of the most proper neighbor to broadcast data in this paper. With using this f
uzzy
method, the most proper vehicles participate in data broadcasting. The results of
simulation using NS show
that because of selecting the neighboring vehicles with high priority in data broadcasting, the spee
d of
sending the packs is increased and the network load is considerably decreased. This method also
considerably decreases broadca
sting traffic.
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...ijwmn
Ad Hoc mobile networks are constituted of nodes that move freely without a centralized administration.
These nodes contribute in the routing of data packets that are sent by a source. This happens when the
latter is not capable of reaching its destination. On the other hand, their mobility causes recurrent
breakdowns of the routing paths notably with sparse MANET. In order to optimize the performance of such
networks, we suggest a new extension of protocols: Stream Control Transmission Protocols (SCTP) named
SCTP-MANET. Their main function is therefore to improve the availability of the links in sparse MANET
protocols. This could be achieved by a better integration of Multihoming. With this aim in mind, this new
extension is based on a cross-layer interface between transport and routing layers as well as the use of
specific messages.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
A neighbor coverage based probabilistic rebroadcast for reducing routing over...JPINFOTECH JAYAPRAKASH
This document proposes a neighbor coverage-based probabilistic rebroadcast protocol to reduce routing overhead in mobile ad hoc networks. It calculates a rebroadcast delay based on common neighbors to determine the forwarding order. It also calculates a rebroadcast probability based on uncovered neighbors, connectivity, and node density. Simulation results show it generates less rebroadcast traffic than flooding and other optimized schemes.
Caching strategies for on demand routing protocols for wireless ad hoc networkAcel-Omeran
This document analyzes caching strategies for on-demand routing protocols in wireless ad hoc networks. It evaluates different design choices for cache structure, capacity, and timeout using the Dynamic Source Routing (DSR) protocol through detailed simulations. The simulations consider 50 different mobility scenarios drawn from 5 mobility models to analyze how caching algorithms are affected by node movement patterns.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A Review on Geographical Location Based Energy Efficient Direction Restricted...IJRES Journal
Delay Tolerant Network (DTNs) is a wireless network that experiences frequent connectivity and due to mobility of nodes long duration partitions occurred during transmission of data. DTN has the main feature that there is not full path present from source to destination. In Delay Tolerant Network (DTN), traditional routing protocol for mobile Ad-hoc protocol to be ineffective to extend of message transmission between different nodes. Delay tolerant networks (DTNs) are used in many applications like in deep space communications, under water Acoustic Network, Sparsely Populated Areas Networks Etc. In such network a routing with minimum energy congumption is major issue. In this paper, we try to explore a routing issue in DTN. First energy requirement and routing with their corresponding countermeasures in DTN are explained. Moving nodes in DTN keep the updating of network as well energy at every stage. By using the geographical concept the location of each node is maintained by updating in topology. There are many routing protocols are available for routing purpose in DTN.
Winter occurs from December to February, bringing cold weather and snow. During this season, trees are bare and animals hibernate as the days grow shorter. People wear warm clothing like coats, hats and gloves, and enjoy hot drinks and foods indoors to stay warm. They play in the snow by making snowmen and igloos or celebrate indoors near the fireplace.
The document describes an opportunistic packet scheduling and media access control (OSMA) protocol for wireless LANs and multi-hop ad hoc networks. The OSMA protocol aims to alleviate the head-of-line blocking problem and exploit multiuser diversity by allowing a node to schedule transmissions to receivers with good channel conditions. The key mechanisms of OSMA are multicast RTS frames containing a list of candidate receivers, and priority-based CTS frames where the receiver with the best channel and highest priority replies first to avoid collisions. Simulation results show the OSMA protocol can significantly improve network throughput while maintaining fairness between links.
This document discusses various MAC protocols for ad hoc wireless networks. It begins by outlining key issues in designing MAC protocols for these networks, such as bandwidth efficiency, quality of service support, and the hidden and exposed terminal problems. It then covers classifications of MAC protocols including contention-based, contention-based with reservation mechanisms, and contention-based with scheduling mechanisms. Specific protocols are discussed within each category.
The document discusses MAC protocols for ad hoc networks. It begins by outlining problems MAC protocols must address, such as bandwidth efficiency, hidden/exposed terminals, and mobility. It then classifies MAC protocols into contention-based without reservation, contention-based with reservation, and contention-based with scheduling. Examples are provided for each category, including MACA, BTMA, D-PRMA, and DPS. The document also covers MAC protocols that use directional antennas to improve throughput and reuse.
- ADP Dental Co Ltd is one of the largest dental groups in the UK with over 128 practices and plans to expand to 300 practices in the next 3 years.
- They provide support to dentists through management policies and help with relocating to a new community. Positions are normally full-time with an expected commitment of at least 2 years.
- The document discusses the structure of the UK's National Health Service (NHS) dental system including Units of Dental Activity (UDA), requirements for dentists, and information needed for registering to practice in the UK.
The document discusses MAC protocols for ad hoc networks. It begins by outlining problems MAC protocols must address, such as bandwidth efficiency, synchronization, and the hidden terminal problem. It then classifies MAC protocols into three categories: contention-based without reservation, contention-based with reservation, and contention-based with scheduling. Several example protocols are described for each category, including how they address issues like bandwidth utilization and collisions. The document also covers MAC protocols that use directional antennas and power control techniques.
This document summarizes a research paper on a CDMA-based MAC protocol for wireless ad hoc networks. The protocol, called CA-CDMA, addresses the near-far problem in CDMA systems by incorporating distributed power control and interference feedback between nodes. Simulation results show that CA-CDMA can increase throughput by up to 280% compared to 802.11 by allowing simultaneous transmissions through power control. Future work may involve combining CA-CDMA with other capacity enhancement techniques like directional antennas or multi-rate support.
Visage is a crowdsourced recruiting platform for startups and SMEs. The problem we are solving is that recruitment agencies are too expensive and job ads are not enough to attract talent.
The document discusses MAC layer protocols for wireless networks. It begins by explaining that MAC (Media Access Control) controls access to the shared transmission medium on a local area network. It aims to prevent nodes from interfering with each other's transmissions. Common MAC protocols discussed include CSMA/CD used in Ethernet, and early wireless MAC protocols like MACA which introduced RTS/CTS to avoid the hidden terminal problem. A key part of wireless MAC is the IEEE 802.11 distributed coordination function, which uses carrier sensing, backoff mechanisms and RTS/CTS/DATA/ACK to allow multiple nodes fair access to the shared wireless channel.
On the surface a packet is a chunk of information
but at the deeper level a packet is one unit of binary data capable
of being transferred through a network. Delivering data packets
for highly dynamic mobile ad hoc networks in a reliable and
timely manner. Driven by this issue, an efficient Position-based
Opportunistic Routing (POR) protocol which takes advantage of
the stateless property of geographic routing. In proactive routing
protocols the route discovery and recovery procedures are time
and energy consuming process. Once the path breaks, data
packets will get lost or be delayed for a long time until the
reconstruction of the route, causing transmission interruption.
but Geographic routing (GR) uses location information to
forward data packets, in a hop-by-hop routing fashion. Greedy
forwarding is used to select next hop forwarder with the largest
positive progress toward the destination while void handling
mechanism is triggered to route around communication voids. No
end-to-end route need to be maintained, leading to GR’s high
efficiency and scalability. In the operation of greedy forwarding,
the neighbour which is relatively far away from the sender is
chosen as the next hop. If the node moves out of the sender’s
coverage area, the transmission will fail. In GPSR (a very famous
geographic routing protocol), the MAC-layer failure feedback is
used to offer the packet another chance to reroute.
This document provides a survey of different void handling techniques that are suitable for vehicular ad hoc networks (VANETs). It begins with an introduction to geographic routing and the void problem in networks. Then it describes six categories of void handling techniques: planar graph based, face routing based, restricted direction based, hierarchical based, trajectory based, and cluster based. For each category, it briefly explains one or two representative techniques. Finally, it provides a comparative survey of the techniques based on important performance features.
This document summarizes a research paper that proposes a new Position Based Opportunistic Routing Protocol (POR) to improve reliable data delivery in mobile ad hoc networks. Existing geographic routing protocols have issues with route failures and delays in discovering new routes when nodes move. The proposed POR protocol selects multiple forwarding candidate nodes to opportunistically forward packets. If the primary forwarder fails, backup candidates can forward packets to avoid transmission interruptions. Simulation results show the POR protocol has lower delay and higher packet delivery ratio compared to existing protocols.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
This paper addresses the problem of reliably delivering data packets in highly dynamic mobile ad hoc networks. Existing ad hoc routing protocols are susceptible to node mobility, especially in large-scale networks, as they rely on predetermined end-to-end routes. The paper proposes a Position-based Opportunistic Routing protocol that takes advantage of geographic routing's stateless property and wireless broadcasting. It allows multiple neighbor nodes to cache and forward packets opportunistically if the primary forwarder fails, reducing transmission interruptions and rerouting delays. A Virtual Destination-based Void Handling scheme is also proposed to cooperate with POR for handling communication holes.
The document summarizes an Efficient Position-Based Opportunistic Routing (EPOR) protocol proposed for mobile ad hoc networks. EPOR takes advantage of geographic routing and the broadcast nature of wireless transmissions. When a packet is transmitted, overhearing nodes can act as forwarding candidates. The best forwarder is chosen, but if it fails to forward in time, a suboptimal candidate will forward instead to avoid transmission interruptions. Simulation results show EPOR achieves higher packet delivery ratios and lower end-to-end delays than GPSR and AOMDV routing protocols, even under high node mobility.
Adaptive position update for geographic routing in mobile ad hoc networksJPINFOTECH JAYAPRAKASH
The document proposes an Adaptive Position Update (APU) strategy for geographic routing in mobile ad hoc networks. APU dynamically adjusts the frequency at which nodes broadcast updates about their position based on their mobility and proximity to packet forwarding paths. This reduces update costs and improves routing performance compared to periodic broadcasting or other updating schemes. APU incorporates rules where nodes with less predictable movement or near forwarding paths update more frequently. Simulations show APU generates similar or less overhead than other schemes but achieves better delivery ratios and delays.
Adaptive position update for geographic routing in mobile ad hoc networksJPINFOTECH JAYAPRAKASH
This document proposes an Adaptive Position Update (APU) strategy for geographic routing in mobile ad hoc networks. APU dynamically adjusts the frequency at which nodes broadcast updates about their position based on their mobility and proximity to packet forwarding paths. This aims to reduce the cost of frequent updates while maintaining accurate location information where it is needed for routing. The strategy uses two rules: 1) nodes that are harder to predict update more frequently, and 2) nodes closer to forwarding paths update more frequently. Simulations show APU can significantly reduce costs compared to periodic updating while improving routing performance in terms of delivery ratio and delay.
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
This document summarizes several data-centric routing protocols for wireless sensor networks. It begins by outlining the challenges of routing in WSNs, including energy consumption, scalability, addressing, robustness, topology, and application-specific needs. It then describes several data-centric routing protocols, including flooding, directed flooding, constrained flooding, gossiping, fuzzy gossiping, location-based gossiping, and others. It notes advantages and disadvantages of these protocols for efficiently routing data in wireless sensor networks while minimizing energy consumption.
Survey on Routing in Opportunistic Networks
this paper basically overviews and disused those potential methods and Techniques to select next hop to forward the packets (message) to destination.
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...IOSR Journals
This document describes a study that developed a test bed to evaluate load and battery lifetime in wireless mesh networks using a multicast forwarding approach. The test bed used the AODV routing protocol and implemented layer 3 acknowledgments and retransmissions. Results found that the network supported data delivery with acknowledgments even under full load. Battery lifetime across mesh nodes was measured between 19-100% and load was minimum compared to previous work, demonstrating the effectiveness of the multicast forwarding approach. Future work could enhance security and implement cross-layer support between network and MAC layers.
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...graphhoc
Energy consumption and delay incurred in packet delivery are the two important metrics for measuring the performance of geographic routing protocols for Wireless Adhoc and Sensor Networks (WASN). A protocol capable of ensuring both lesser energy consumption and experiencing lesser delay in packet delivery is thus suitable for networks which are delay sensitive and energy hungry at the same time. Thus a smart packet forwarding technique addressing both the issues is thus the one looked for by any geographic routing protocol. In the present paper we have proposed a Fermat point based forwarding technique which reduces the delay experienced during packet delivery as well as the energy consumed for transmission and reception of data packets.
Distributed Path Computation Using DIV AlgorithmIOSR Journals
This document summarizes research on distributed path computation algorithms that aim to prevent routing loops. It introduces the Distributed Path Computation with Intermediate Variables (DIV) algorithm, which can operate with any routing algorithm to guarantee loop-freedom. DIV generalizes previous loop-free algorithms and provably outperforms them by reducing synchronous updates and helping maintain paths during network changes. The document also reviews link-state routing, distance-vector routing, and existing loop-prevention techniques like the Diffusing Update Algorithm and Loop Free Invariance algorithms.
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...IJCERT
IJCERT Standard on-line Journal
ISSN(Online):2349-7084,(An ISO 9001:2008 Certified Journal)
iso nicir csir
http://www.ijcert.org offers Discount for Indian research Scholars
IJCERT (ISSN 2349–7084 (Online)) is approved by National Science Library (NSL), National Institute of Science Communication And Information Resources (NISCAIR), Council of Scientific and Industrial Research, New Delhi, India.
Improved aodv based on energy strength and dropping ratioIJLT EMAS
Wireless Sensor Networks are the latest trends in the
market due to the demand for communication and networking
among the wireless network devices. The routing protocols are
used in the Wireless Sensor Networks for efficient
communication of data between sensor nodes. The designs of
routing protocols in Wireless Sensor Networks are very concern
because they are influenced by many challenging factors. To
design the networks, the factors needed to be considered are the
coverage area, mobility, energy power consumption,
communication capabilities etc.. Broadcasting is an inevitable
operation in the route discovery phase of AODV protocol. A
probability based AODV is proposed, it uses nodes remaining
energy and threshold random delay to generate the
rebroadcasting of route request packet. The route request packet
of AODV is modified to gather nodes remaining energy strength.
The performance of probability based AODV is compared with
AODV over packet delivery fraction, normalized routing
overhead, delay and average acquisition latency.
NS-2 based simulator is used to evaluate the performance of
routing protocol.
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...ijasuc
A crucial issue for a mobile ad hoc network is the handling of a large number of nodes. As more nodes join
the mobile ad hoc network, contention and congestion are more likely. The on demand routing protocols
which broadcasts control packets to discover routes to the destination nodes, generate a high number of
broadcast packets in a larger networks causing contention and collision. We propose an efficient route
discovery protocol, which reduces the number of broadcast packet, using controlled flooding technique.
The simulation results show that the proposed probabilistic flooding decreases the number of control
packets floating in the network during route discovery phase, without lowering the success ratio of path
discoveries. Furthermore, the proposed method adapts to the normal network conditions. The results show
that up to 70% of control packet traffic is saved in route discovery phase when the network is denser.
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...inventionjournals
The document proposes a Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wireless Ad Hoc Network. It introduces Position-Aware Geocast Routing Mechanism (PAGRM) to improve reliability of data delivery and energy efficiency. PAGRM uses geographical locations for geocast routing and region tracking. It combines geographic routing with region flooding to achieve high delivery rates and low overhead. Simulation results show PAGRM has higher throughput and lower time complexity than other region tracking methods.
The document summarizes key points from an 8th lecture on wireless sensor networks. It discusses various medium access control (MAC) protocols that control when nodes can access a shared wireless medium. These include contention-based protocols like MACA that use RTS/CTS handshaking and schedule-based protocols with fixed or dynamic scheduling. It also describes energy-efficient MAC protocols for low data rate sensor networks like S-MAC, T-MAC, and preamble sampling that increase sleep time to reduce energy use through synchronized sleep schedules or long preambles.
This document proposes a time division beacon scheduling mechanism for building synchronized multi-hop cluster-tree wireless sensor networks using the IEEE 802.15.4/Zigbee protocol stack. It analyzes challenges with beacon frame collisions in cluster-tree networks and reviews approaches proposed by others. The key contributions are a beacon frame scheduling mechanism based on time division to avoid collisions, a duty cycle management methodology, and an experimental demonstration of feasibility using a test bed. The goal is to overcome limitations in the standards for constructing synchronized multi-hop networks.
The document is a technical report from the Center for Satellite and Hybrid Communication Networks (CSHCN) at the University of Maryland that proposes a new single channel TDMA-based broadcast scheduling protocol called the Five-Phase Reservation Protocol (FPRP) for mobile ad hoc networks. The FPRP allows nodes to efficiently make nearly conflict-free reservations for TDMA broadcast slots in a distributed manner without relying on centralized coordination or prior network information. It employs a five-phase contention process localized to each node's two-hop neighborhood to minimize collision probability during reservation.
The document discusses medium access control (MAC) protocols for wireless ad-hoc networks. It describes several MAC protocols including the Five Phase Reservation Protocol (FPRP) and Distributed Wireless Ordering Protocol (DWOP). FPRP uses a five phase process for distributed reservation of time slots. DWOP aims to provide fair channel access that approximates a first-in-first-out scheduling order by sharing packet arrival times between nodes. The document evaluates these protocols and discusses their advantages in providing quality of service guarantees and fair scheduling in wireless ad-hoc networks.
This document summarizes several medium access control (MAC) protocols for wireless networks, focusing on those suitable for mobile and energy-efficient operation. It discusses both contention-based protocols like MACA, S-MAC, and B-MAC, which use carrier sensing and random access, as well as schedule-based protocols like LEACH, SMACS, and TRAMA, which establish schedules to avoid collisions. It also covers the IEEE 802.15.4 standard for low-power wireless personal area networks.
This document discusses various MAC protocols for ad hoc wireless networks. It begins by outlining key issues in designing MAC protocols for these networks, such as bandwidth efficiency, quality of service support, and the hidden and exposed terminal problems. It then covers classifications of MAC protocols including contention-based, contention-based with reservation mechanisms, and contention-based with scheduling mechanisms. Specific protocols are discussed within each category.
1. Contention-based forwarding for mobile ad hoc networks q
Holger F€uußler a,*, J€oorg Widmer a
, Michael K€aasemann a
, Martin Mauve a
,
Hannes Hartenstein b
a
Department of Mathematics and Computer Science, University of Mannheim, L15, 16, D-68161 Mannheim, Germany
b
NEC Network Labs Europe, Kurf€uursten-Anlage 36, D-69115 Heidelberg, Germany
Abstract
Existing position-based unicast routing algorithms which forward packets in the geographic direction of the des-
tination require that the forwarding node knows the positions of all neighbors in its transmission range. This infor-
mation on direct neighbors is gained by observing beacon messages each node sends out periodically.
Due to mobility, the information that a node receives about its neighbors becomes outdated, leading either to a
significant decrease in the packet delivery rate or to a steep increase in load on the wireless channel as node mobility
increases. In this paper, we propose a mechanism to perform position-based unicast forwarding without the help of
beacons. In our contention-based forwarding scheme (CBF) the next hop is selected through a distributed contention
process based on the actual positions of all current neighbors. For the contention process, CBF makes use of biased
timers. To avoid packet duplication, the first node that is selected suppresses the selection of further nodes. We propose
three suppression strategies which vary with respect to forwarding efficiency and suppression characteristics. We an-
alyze the behavior of CBF with all three suppression strategies and compare it to an existing greedy position-based
routing approach by means of simulation with ns-2. Our results show that CBF significantly reduces the load on the
wireless channel required to achieve a specific delivery rate compared to the load a beacon-based greedy forwarding
strategy generates.
Ó 2003 Elsevier B.V. All rights reserved.
Keywords: Mobile ad hoc networks; Position-based routing; Beaconless forwarding
1. Introduction
The idea of position-based routing was origi-
nally developed for packet radio networks in the
1980s [1,2]. Due to the availability of GPS it re-
ceived renewed interest during the last few years as
a method for routing in mobile ad hoc networks
[3–6]. The general idea of position-based routing is
to select the next hop based on position informa-
tion such that the packet is forwarded in the geo-
graphical direction of the destination.
The most important characteristic of position-
based routing is that forwarding decisions are
based on local knowledge. It is not necessary to
create and maintain a global route from the sen-
der to the destination. Therefore, position-based
routing is commonly regarded as highly scalable
and very robust against frequent topological
changes. It is particular well suited in environments
q
This work was supported by the ÔFleetNetÕ project as part
of German Ministry of Education and Research (BMBF)
contract no. 01AK025D.
*
Corresponding author.
E-mail address: fuessler@informatik.uni-mannheim.de
(H. F€uußler).
1570-8705/$ - see front matter Ó 2003 Elsevier B.V. All rights reserved.
doi:10.1016/S1570-8705(03)00038-6
Ad Hoc Networks 1 (2003) 351–369
www.elsevier.com/locate/adhoc
2. where the nodes have access to their geographical
position, such as in inter-vehicle communication
[7,8].
Position-based routing can be divided into two
main functional elements: a location service and a
position-based forwarding strategy. The location
service maps the unique identifier (such as an IP
address) of a node to its current geographical po-
sition. It can be seen as analogous to the route
discovery process of reactive topological routing
algorithms such as DSR [9] or AODV [10]. For the
remainder of this work we assume that an appro-
priate location service is present which supplies the
sender of a packet with the geographical position
of the packetsÕ destination. Candidates for loca-
tion services are outlined in the section on related
work.
Position-based forwarding is performed by a
node to select one of its neighbors in transmission
range as the next hop the packet should be for-
warded to. Usually, the forwarding decision is
based on the nodeÕs own geographical position, the
position of all neighbors within transmission range
and the geographical position of the destination.
The sender requests the position of the destination
from the location service and then includes it in the
header of the packet. Given this information, the
node forwards the packet to one of its neighbors
such that the packet makes progress toward the
destination. This process is called greedy forward-
ing. It is possible that there is no neighbor with
positive progress toward the destination while a
valid route to the destination exists. The packet is
then said to have reached a local optimum. In this
case, a recovery strategy is used to escape the local
optimum and to find a path toward the destina-
tion.
In all existing strategies for greedy unicast for-
warding, the position of a node is made available
to its direct neighbors (i.e., nodes within single-hop
transmission range) in form of periodically trans-
mitted beacons. 1
Each node stores the informa-
tion it receives about its neighbors in a table and
thus maintains position information about all di-
rect neighbors.
While the beaconing frequency can be adapted
to the degree of mobility the fundamental problem
of inaccurate position information is always pre-
sent: a neighbor selected as a next hop may no
longer be in transmission range. As will be out-
lined later (see Section 4, Fig. 12) this leads to a
significant decrease in the packet delivery rate with
increasing node mobility and to a high load on the
wireless channel due to several MAC layer re-
transmissions. To reduce the inaccuracy of posi-
tion information it is possible to increase the
beaconing frequency. However, this also increases
the load on the network up to a point where the
available capacity is almost exclusively used for
the transmission of beacons. Alternatively, it has
been proposed to hand packets back to the routing
layer if the next hop is no longer available [3]. At
the routing layer the packets are then rerouted to
a different neighbor. While this eliminates the
problem of packet drops, the trial-and-error ap-
proach can cause even more bandwidth-consum-
ing MAC layer retransmissions. Our experiments
(see Fig. 14) indicate that under high mobility, the
beacon-based forwarding approach requires on
average more than three MAC transmissions for
one single-hop packet forwarding, increasing the
load on the network caused by data packets by
more than a factor of three. Existing work (e.g.,
[3]) does not take this effect into account since
there the load is measured at the routing level in-
stead of the MAC layer.
Thus, for a given packet delivery rate, the load
at the MAC layer increases dramatically with
beacon-based greedy unicast forwarding (either
through an increased beaconing frequency or
through trail-and-error) with increasing node-
mobility. In addition, a node forwarding a packet
can only select a neighbor as next hop if it is
contained in its neighbor table. Nodes that just
moved into transmission range and that have not
yet sent a beacon are therefore not considered as
next hop nodes. This may lead to the failure of
greedy forwarding even though an appropriate
neighbor is present.
In this paper, we propose a novel greedy for-
warding strategy for position-based routing algo-
1
There are position-assisted approaches that do not require
beacons (e.g., LAR) but they do require directional flooding
and can thus not be considered to be unicast forwarding.
352 H. F€uußler et al. / Ad Hoc Networks 1 (2003) 351–369
3. rithms. We call the approach contention-based
forwarding (CBF). CBF performs greedy for-
warding without the help of beacons and without
the maintenance of information about the direct
neighbors of a node. Instead, all suitable neighbors
of the forwarding node participate in the next hop
selection process and the forwarding decision is
based on the actual position of the nodes at the
time a packet is forwarded. This is in contrast to
existing greedy forwarding algorithms that base
their decision on the positions of the neighbors
as they are perceived by the forwarding node. In
order to escape from local optima, existing re-
covery strategies, as mentioned in the section on
related work, can either be used directly or may be
adapted to be used with CBF.
CBF shows advantages over existing greedy
forwarding strategies in two important aspects:
1. Use of accurate position information: in CBF
each neighbor uses the (very accurate) position
information it has about itself to determine if
it should become the next hop for a given pack-
et. For a given delivery rate the required band-
width for CBF does therefore not increase with
node mobility (i.e., neither an increased beacon-
ing frequency, nor trial-and-error is needed). In
addition, CBF always bases the selection of the
next hop on all direct neighbors, even those that
have just moved into transmission range.
2. Elimination of beacon overhead: removing the
beacons eliminates a major part of routing
overhead which occurs independently of the ac-
tual data traffic. This includes the bandwidth
used for the transmission of beacons 2
and the
memory required in the nodes to store neighbor
information.
CBF consists of two parts: the selection of the
next hop is performed by means of contention,
while suppression is used to reduce the chance of
accidentally selecting more than one node as the
next hop. We present three suppression strategies
with different suppression characteristics. The re-
sults of our study show that suppression of du-
plicate packets works well, that CBF has similar
packet delivery ratios as beacon-based greedy
routing, and that it dramatically reduces the load
on the wireless medium for a given delivery rate if
node mobility is high. CBF, therefore, represents a
good alternative to traditional beacon-based
greedy forwarding.
The contention process of CBF used for next-
hop selection represents a paradigm change in the
forwarding of packets. In traditional protocols,
the forwarder actively selects the desired next-hop
by unicasting the packet to the corresponding
MAC address. In contrast, with CBF the respon-
sibility for next-hop selection lies with the set of
possible next hops. Furthermore, if no other in-
teraction between forwarder and next hop is re-
quired, which is the case for two of the three
presented strategies, MAC layer addresses become
obsolete.
The remainder of this paper is structured as
follows: In Section 2 we summarize related work.
Section 3 contains a description of CBF with three
alternative suppression schemes. In Section 4, the
properties of CBF are analyzed and its perfor-
mance is further investigated in Section 5 by means
of simulation. Finally, Section 6 points out direc-
tions of future work and concludes the paper.
2. Related work
Ad hoc routing protocols can be classified into
topology-based [11] and position-based schemes
[12]. In addition, they can be further subdivided
into proactive and reactive methods: with a pro-
active method, routing information is maintained
independently of actual data communication.
With a reactive scheme routing information is ac-
quired on-demand when there is data to forward.
As described in the introduction, position-based
routing consists of the forwarding algorithm and a
location service which maps the ID of a node to its
geographic position. The forwarding algorithm
can be further subdivided into greedy forwarding
and a repair strategy for situations where greedy
2
While some existing MAC protocols do require beacon
messages (e.g., for synchronization purposes), the overhead
incurred by these beacons is very small compared to that
required for beacon messages used for building up neighbor
tables.
H. F€uußler et al. / Ad Hoc Networks 1 (2003) 351–369 353
4. forwarding fails. Examples for position-based
forwarding algorithms are face-2 [6], Greedy pe-
rimeter stateless routing (GPSR) [3], and Termin-
odes routing [5]. Existing position-based greedy
forwarding algorithms have both proactive and
reactive elements: they require proactive informa-
tion about the local neighborhood of a node. This
information is provided in form of periodic bea-
con messages transmitted independently of data
packets. The actual position-based greedy for-
warding of data packets is then done in a reactive
manner. The CBF algorithm put forward in this
paper does not require beacons and thus com-
pletely eliminates the proactive part of position-
based routing. It is an alternative to the greedy
forwarding part of existing protocols. An ap-
proach similar to area-based suppression, one of
the three suppression schemes presented here, was
independently proposed in [13]. As a repair strat-
egy Geodesic Anchors as proposed for Terminodes
routing could be used. The repair strategies of
face-2 and GPSR would require a heuristic for
traversing graphs without the need to know a
nodeÕs neighbors.
Another related routing algorithm is location
aided routing (LAR) [14]. LAR is a reactive to-
pology-based routing algorithm, employing posi-
tion information only to limit network load during
the route discovery phase. A route request in LAR
is flooded in the direction of the destination. This
directed flooding does not require beacons: when a
node receives a route request it checks whether it is
in the region that leads to the destination. If this is
the case it forwards the request. While directional
flooding is a robust approach for route discovery,
it does not scale well being used for unicast
transmissions. The key difference between LAR
and CBF is that CBF performs suppression to
avoid packet duplication and to provide unicast
capability, while the route request scheme of LAR
uses directional flooding where packet duplication
is common and desired.
Homezone [15], the grid location service (GLS)
[16], and the location service part of DREAM [4]
are examples for existing location services. Al-
though some location services (like GLS) distrib-
ute location information in a proactive fashion,
one can think of mechanisms that are fully reac-
tive, for example a scheme similar to a DSR route
request [9], where a node issues a location request
using flooding and the node with the requested ID
answers with its current position. A reactive loca-
tion service designed along these lines was ana-
lyzed in [17]. In combination with our forwarding
scheme a completely reactive position-based rout-
ing algorithm can be designed.
3. Contention-based forwarding
The general idea of CBF is to base the for-
warding decision on the current neighborhood as
it exists in reality and not as perceived by the
forwarding node. This requires that all suitable
neighbors of the forwarding node are involved in
the selection of the next hop.
CBF works in three steps: first, the forwarding
node transmits the packet as a single-hop broad-
cast to all neighbors. 3
Second, the neighbors
compete with each other for the ‘‘right’’ to forward
the packet. During this contention period, a node
determines how well it is suited as a next hop for
the packet. Third, the node that wins the conten-
tion suppresses the other nodes and thus estab-
lishes itself as the next forwarding node.
In the following we describe in detail how
contention can be realized on the basis of biased
timers. Furthermore, we present three different
suppression strategies.
3.1. Timer-based contention
The decentralized selection of one node out of a
set of nodes is a common problem encountered in
many areas of computer networks. It is known
as feedback control in group communication [18,
19] or as medium access control in (wireless and
3
In general, this should require similar resources as a single-
hop unicast transmission except that packets for other nodes
cannot be discarded at the network interface but have to be
passed up the protocol stack. Depending on the physical and
MAC layer there may be further differences between unicast
and broadcast (e.g., in IEEE 802.11 the sleep mode may not be
applicable).
354 H. F€uußler et al. / Ad Hoc Networks 1 (2003) 351–369
5. wired) local area networks such as IEEE 802.11
[20].
A standard approach for this selection is by
means of timers. In its most simple form, timer-
based contention requires that each node sets a
timer with a random value. Once the first timer
expires, the corresponding node responds. The
timers of all other nodes are canceled and their
responses are suppressed.
It is important to realize that with this conten-
tion algorithm more than one node may respond,
even if a ÔgoodÕ suppression mechanism is used.
This will happen when the difference between the
timeout value of the earliest timer and some other
timer is smaller than the time required for sup-
pression. Therefore, the interval from which the
timeout values are selected should increase with
the number of competing nodes. It was shown in
[18] that exponentially distributed random timers
can further decrease the number of responses
compared to uniformly distributed timers.
To use such a simple timer-based mechanism
for the forwarding decision, all nodes that receive
the packet check if they are closer to the destina-
tion than the forwarding node. If this is the case, a
random (exponentially distributed) timer is set to
start the contention and the node responding first
is selected as the next hop.
The problem of the simple timer-based con-
tention is that all nodes which are located closer to
the destination than the forwarding node are
treated equally. Thus a node providing minimal
progress would have the same chance to be se-
lected as next hop as a node providing a large
progress. We therefore propose to determine the
value for the timers based on how much progress a
node provides toward the destination instead of
setting them randomly.
To greedily minimize the remaining distance to
the destination, the progress P is defined as 4
Pðf ; z; nÞ ¼ max 0;
distðf ; zÞ À distðn; zÞ
rradio
given f is the position of the forwarder, z the po-
sition of the destination and n the position of the
considered neighbor. dist is defined as the Euclid-
ean distance between two positions and rradio is the
nominal radio range.
Fig. 1 illustrates the suitability of a node as next
hop depending on its location. A progress value
(P) of 0 indicates that a node is unsuitable while a
value of 1 is optimal and is reached if the node is
located at the intersection of the circle delineating
the transmission range of the forwarding node and
the line from the forwarding node to the destina-
tion. Thus P increases linearly from 0 to 1 with the
progress that a node at this position would provide
for the packet.
For the contention in CBF we select the timer
runtime as
tðPÞ ¼ T ð1 À PÞ;
where T is the maximum forwarding delay. This
makes sure that the node with the largest progress
is selected as next hop. Since the runtime of the
timer only depends on the remaining distance to
the destination it is identical for all nodes that are
located on the same circle around the destination.
A packet duplication may occur in the following
situation: if the best suited node has a progress of
P1 and there exists at least one node with a pro-
gress of P such that tðPÞ À tðP1Þ d, where d is the
minimum time interval needed for suppression,
then at least one packet duplication occurs. All
nodes with progress P and
P1 P P P 1 À
d þ Tð1 À P1Þ
T
¼ P1 À
d
T
4
Note that the original definition of progress in [2] is
different to ours since in [2] an additional projection onto the
line crossing f and z is used.
Forwarder
Destination
-250
-100
0
100
250[m] -250
-100
0
100
250
[m]
0
0.5
1
Progress
Fig. 1. Packet progress (transmission range 250 m).
H. F€uußler et al. / Ad Hoc Networks 1 (2003) 351–369 355
6. are within this so-called duplication area and can-
not be suppressed, as shown in Fig. 2.
An interesting property of the duplication area
is that it becomes smaller the closer the best suited
node is located to the destination. As long as the
positions of the nodes are uniformly distributed
this reduces the chance of packet duplication in a
similar way as exponentially distributed random
timers reduce the chance of packet duplication
when compared to linearly distributed random
timers.
Analytically, this property can be made explicit
via the probability density function (PDF) of the
progress of a randomly selected point within the
forwarding nodeÕs transmission range. Let d de-
note the distance between forwarding node and
destination and let us assume a normalized trans-
mission range of 1. The radius r of a circle around
the destination as depicted in Fig. 2 corresponds to
a progress d À r for r 2 ½d À 1; d þ 1Š. The PDF
for progress d À r is given by
2
p
Á r Á arccos
r2
þ d2
À 1
2dr
: ð1Þ
Graphs of expression (1) for d ¼ 1; 2; 20 are shown
in Fig. 3. 5
From the shape of these graphs it can
be seen that there are relatively few well suited
nodes (with a large positive progress). Setting the
contention timer according to the progress will
thus result in few timers with a short runtime and
many timers with a long runtime which decreases
the likeliness of packet duplication.
Packet duplication is closely coupled with the
characteristics of the MAC layer. With many
MAC schemes (as for example IEEE 802.11),
packets will be serialized and thus packet dupli-
cation can be avoided. In wireless networks based
on CSMA/CA [21], the serialization is not only
performed between packets from nodes which are
in transmission range of each other but is typically
done on the basis of the interference range which is
roughly twice the transmission range. As a conse-
quence, the transmission of all neighbors of the
forwarding node will be serialized since the dis-
tance between any two neighbors does not exceed
twice the transmission range. If packets can be
removed from the interface queue of the MAC
layer, then the forced serialization can be used to
eliminate the effect of packet duplication caused by
the suppression delay d, as described in Section
3.1. One node will be the first to forward a packet.
Other nodes that have queued a duplicate of the
packet may drop it once they overhear the for-
warding of the packet by another node.
3.2. Suppression
Let us now assume that all neighbors of the
forwarding node have set their contention timer
according to their respective distances to the des-
Forwarder
Destination
Best Suited
Node (P1)
Duplication Area
Transmission
Range
r
Fig. 2. Duplication area.
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
-1 -0.5 0 0.5 1
progress (d-r)
d=1
d=2
d=20
Fig. 3. PDF of packet progress.
5
We note that this figure ignores that values below zero are
unsuitable for forwarding.
356 H. F€uußler et al. / Ad Hoc Networks 1 (2003) 351–369
7. tination. After the first of those timers expires, a
suppression algorithm aims to cancel the timers in
all other nodes to prevent multiple next hops and
thereby packet duplication.
3.2.1. Basic suppression scheme
The most basic conceivable suppression mech-
anism works as follows: if the timer at a node
expires, the node assumes that it is the next hop
and broadcasts the packet. When another node
receives this broadcast and still has a timer run-
ning for the packet, the timer is canceled and the
node will not forward the packet.
Depending on where the initial next hop is lo-
cated, other nodes may be out of transmission
range and will thus not be suppressed. In the worst
case, up to three copies of the packets may be
forwarded, as shown in Fig. 4. The larger the
number of nodes within transmission range of the
source, the higher the probability of one or more
packet duplications.
It should be noted that the packet duplications
described here are in addition to packet duplica-
tions caused by the amount of time required for
the suppression of other nodes, as described in the
previous section. They do occur even if the sup-
pression requires no time at all.
3.2.2. Area-based suppression
In order to avoid the extra packet duplications
from the basic suppression scheme we propose to
artificially reduce the area from which the next hop
is selected. We call this reduced area the suppression
area and the algorithm area-based suppression. The
key idea is to choose the suppression area such that
all nodes within that area are in transmission range
of each other, avoiding extra packet duplications as
they may appear in the basic suppression scheme.
Area-based suppression requires a decision on
how the suppression area is chosen. One possible
choice is a circle with the diameter of the trans-
mission range located within the forwarding
nodeÕs transmission range in direction of the des-
tination (e.g., the gray circle in Fig. 5). A circle is
the geometric shape covering the largest area given
that any two points within the shape are no farther
apart than the transmission range. If the nodes are
uniformly distributed this means that on average
the circle will contain the highest number of
neighboring nodes when compared to other shapes
where the distance between any two points does
not exceed the transmission range. However, sev-
eral parts of the forwarding area which make good
forwarding progress are not included in the circle.
A different shape where any two points are no
further apart than the transmission range, the
Reuleaux triangle [22], much better covers the area
with good forwarding progress (see Fig. 5). 6
By
using the Reuleaux triangle with a width of the
transmission range, we trade off the number of
nodes contained in the suppression area against the
inclusion of better suited nodes. The motivation
Destination
Next Hops
Forwarder
Fig. 4. Packet duplication in the basic scheme.
Destination
Reuleaux Triangle
(1)(3) (2)
Forwarder
Fig. 5. Forwarding areas.
6
A Reuleaux triangle with a width of r can be constructed by
placing three circles with radius r at the corners of an
equilateral triangle with an edge length r. The intersection of
the circles is the Reuleaux triangle.
H. F€uußler et al. / Ad Hoc Networks 1 (2003) 351–369 357
8. for using the Reuleaux triangle is illustrated in Fig.
6. The curve titled ‘‘total’’ is the PDF for the
progress of nodes with positive progress. The
curve ‘‘circle’’ denotes the fraction of the density
‘‘total’’ for a neighbor with progress p to be con-
tained in the circle. The same applies for the
‘‘Reuleaux’’ curve and the Reuleaux triangle. Be-
tween 60% and 100% progress, the Reuleaux tri-
angle covers more of the neighbors than the circle
and above approximately 80%, the Reuleaux tri-
angle covers all of the neighbors with this progress.
Therefore, it is more likely to include a node with
good forwarding progress.
Given the Reuleaux triangle as suppression
area, the suppression algorithm works as follows:
• The forwarding node broadcasts the packet.
• Only the nodes contained in the Reuleaux tri-
angle participate in the contention process.
• The node at which the timer runs out first is the
next hop and broadcasts the packet.
• All other nodes are suppressed. Packet dupli-
cation may occur only because of the time re-
quired for suppression.
Of course it is possible that the only neighbors
of the forwarding node that provide forward
progress toward the destination are not contained
in the Reuleaux triangle (1). In this case the for-
warding node will not hear another node for-
warding the packet. Consequently, the process is
repeated with the remaining areas (2) and (3)
where nodes with forwarding progress may be lo-
cated, until the forwarding node hears a rebroad-
cast of the packet. If no node within areas (1), (2),
or (3) responds, then there is no node with positive
forward progress and a recovery strategy has to be
used just like in existing position-based forwarding
schemes. The order in which areas (2) and (3) are
selected when no node is located in area (1) should
be chosen randomly. This way, a tendency to al-
ways route around areas with little or no coverage
in the same direction is avoided.
The key advantage of area-based suppression is
the reduction of packet duplications. This comes
at the cost of requiring up to three broadcasts for
forwarding a packet. However, it is important to
realize that requiring more than one broadcast
becomes less and less likely as the number of nodes
increases. Furthermore, the Reuleaux triangle
covers the largest of the three areas and therefore
has the highest probability of containing a poten-
tial next hop.
3.2.3. Active selection
While area-based suppression eliminates the
packet duplications caused by nodes not being in
transmission range of each other it does not pre-
vent packet duplications caused by the time re-
quired to perform the suppression. Active selection
of the next hop prevents all forms of packet du-
plication at the cost of additional control mes-
sages. It is inspired by the request to send, clear to
send (RTS/CTS) MACA-scheme proposed in [23]
and used (as a variant) in IEEE 802.11 (see [20]).
The scheme works as follows: the forwarding
node broadcasts a control packet called RTF (re-
quest to forward) instead of immediately broad-
casting the packet. The RTF contains the
forwarding nodeÕs location and the final destina-
tionÕs location. Every neighbor checks if it pro-
vides forward progress for the packet announced
by the RTF. If this is the case it sets a reply timer
according to the basic suppression scheme. If the
timer runs out, a control-packet called CTF (clear
to forward) is transmitted to the forwarding node.
The CTF packet contains the position of the node
sending the CTF. If a node hears a CTF for the
packet, it deletes its own timer and is suppressed.
0
0.2
0.4
0.6
0.8
1
1.2
1.4
0 0.2 0.4 0.6 0.8 1
single hop packet progress
total
reuleaux
circle
Fig. 6. PDF of nodes with equal forward progress (total) and
fractions contained within the circle and Reuleaux areas.
358 H. F€uußler et al. / Ad Hoc Networks 1 (2003) 351–369
9. The forwarding node may receive multiple CTF
control-packets. Of all neighbors that have trans-
mitted a CTF packet it selects the node with the
largest forward progress and transmits the packet
to this node using unicast. An additional benefit
of active selection compared to basic and area-
based suppression is that it may be integrated with
RTS/CTS schemes to avoid the ‘‘hidden terminal
problem’’.
Active selection prevents all forms of packet
duplication, even though multiple nodes may send a
CTF control packet. The forwarding node acts as a
central authority deciding which node is selected as
the next hop. This comes at the cost of additional
overhead in form of RTF/CTF control packets.
4. Performance analysis
A very most important characteristic of the
different algorithms is the packet duplication
probability. Furthermore, it is interesting to see
how much message overhead and time is required
to forward a packet from hop to hop. In the fol-
lowing we determine the likeliness of packet du-
plication and the forwarding delay for each of the
three suppression schemes.
For the analysis, the following model was used.
Without loss of generality, the forwarding node is
located at position (0,0) and the transmission range
is set to one. The position of the final destination is
ðdx; dyÞ with dx and dy uniformly distributed in
[0;20) and 1 6
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
d2
x þ d2
y
q
20. Neighbor nodes are
sampled similar with the number of neighbors in-
creasing exponentially from 1 to 256. The timer
used for contention is calculated by each neighbor
n with forward progress as
tðnÞ ¼ T 1
0
B
@ À
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
ðdx À nxÞ2
þ ðdy À nyÞ2
q
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
d2
x þ d2
y
q
1
C
A; ð2Þ
where T is the maximum response time and
tðnÞ 2 ½0; TŠ. 7
4.1. Average number of next hops
The simulation results regarding the probability
of packet duplication for the three algorithms are
presented in Fig. 7. In the simulations, there is no
suppression delay (d ¼ 0) and no node mobility.
For the basic suppression scheme, there are at
most three next hops and packet duplication can
only occur because nodes are further apart than
the transmission range and thus do not suppress
each other. With a growing number of neighbors,
the probability of ‘‘no next hop’’ approaches zero
while the likeliness of packet duplication (2 or 3
next hops) increases. The probability of a single
next hop with the basic suppression scheme
reaches a maximum for approximately 4 neigh-
boring nodes. With more than 9 neighbors, pack-
ets are duplicated with a probability of more than
0.5.
In area-based suppression, packet duplication
can only occur due to suppression delay or node
mobility and we should see no duplication other-
wise. This is confirmed by the simulation results
presented in Fig. 7(b). The curve for ‘‘no neighbors
with forward progress’’ quickly drops to zero as
the number of neighbors increases and in most
cases exactly one node will forward the packet.
For the active selection scheme there can be no
packet duplication at all, since the forwarder is the
final arbiter for the decision which neighbor is
selected as the next hop. This comes at the cost of
additional overhead. The overhead consists of one
RTF control packet transmitted by the forwarder
and of one or more CTF control packets trans-
mitted by the neighbors. The number of CTF
control packets generated is the same as the
number of unsuppressed nodes in the basic sup-
pression scheme and can thus be seen in Fig. 7(a).
4.2. Impact of the suppression delay d
For the basic and the area-based scheme,
packet duplication can occur even if neighbors are
within each others transmission range, as long as
they are contained in the duplication area. The size
of the duplication area depends on the time re-
quired for the suppression, causing an increase in
packet duplication probability with increasing
7
For a reasonably low variance, each simulation was run 107
times. As pseudo-random number generator, the ‘‘Mersenne
Twister’’ [24] as implemented in the GNU scientific library [25],
was used.
H. F€uußler et al. / Ad Hoc Networks 1 (2003) 351–369 359
10. suppression delay. In Fig. 8(a), the average num-
ber of next hops for different suppression delays is
shown for the basic scheme. While a suppression
delay of 0:001T and 0:01T affects the duplication
of packets only marginally, a suppression delay of
0:1T causes significant packet duplication even for
low numbers of neighbors. Hence, given a certain
(MAC dependent) suppression delay, T should be
chosen as a large multiple of d if the basic sup-
pression scheme is used.
The number of duplicates is much lower when
area-based suppression is used. Also, there is no
significant increase in the number of next hops as
long as d is a small fraction of T. Only for d ¼ 0:1T
there is a noticeable increase in duplicate packet as
shown in Fig. 8(b).
As discussed before, active selection will not
cause packet duplication due to the suppression
delay.
4.3. Forwarding delay
With respect to delay, the basic suppression
scheme is faster than the other two alternatives.
The only delay introduced is caused by waiting for
the first neighbor to forward the packet, as de-
picted in Fig. 9.
With the area-based suppression scheme it is
possible that no node with forward progress is
contained in the Reuleaux triangle oriented to-
ward the destination, even though a neighbor with
forward progress exists outside of this area. Up to
0
2
4
6
8
10
4 16 64 256
avgnumberofresponses
number of neighbors
0.0
0.001
0.01
0.1
(a)
0
2
4
6
8
10
4 16 64 256
avgnumberofresponses
number of neighbors
0.0
0.001
0.01
0.1
(b)
Fig. 8. Average number of next hops for increasing suppression delay d. (a) Basic suppression scheme. (b) Area-based suppression.
0
0.2
0.4
0.6
0.8
1
4 16 64 256
relativeprobability
number of neighbors
0
1
2
3
(a)
0
0.2
0.4
0.6
0.8
1
4 16 64 256
relativeprobability
number of neighbors
0
1
(b)
Fig. 7. Relative probabilities of n next hops (d ¼ 0). (a) Basic suppression scheme. (b) Area-based suppression and active selection.
360 H. F€uußler et al. / Ad Hoc Networks 1 (2003) 351–369
11. three broadcast transmissions of the same packet
may be necessary to guarantee that a suitable
neighbor is found if one exists. Fig. 10 shows the
probability distribution for the number of broad-
casts required to find a neighbor with forward
progress. Again, it is possible that no neighbor
with forward progress exists. From Fig. 10 we
observe that for any significant number of neigh-
bors, it is highly likely that a node is located within
the Reuleaux triangle. This corresponds to the
conclusions made in Section 3.2.2 concerning Fig.
6. In particular, the best nodes are likely to be
located within the Reuleaux triangle.
The area-based suppression has the same char-
acteristics as the basic suppression scheme when a
forwarding node can be found in the first Reuleaux
triangle. Otherwise, the forwarding node has to
wait for T and then has to rebroadcast the packet
in the second and possibly even the third area. The
probability of no next hop in the Reuleaux triangle
is very small for a reasonable number of neighbors
(6 or more). Hence, the difference in forwarding
delay between the basic and the area-based sup-
pression scheme is only significant for a small
number of neighbors within transmission range.
The forwarding delay introduced by active se-
lection depends not only the time required to
transmit a data packet but also on the time to
transmit the RTF and CTF. Both packets are
likely to be small and the time to transmit them
should be significantly smaller than the time for
data packet transmission. If the forwarder waits
for the feedback delay T (i.e., until all possible
CTFs have arrived) and then forwards the packet
to the best suitable node, we have a constant for-
warding delay of T, as shown in Fig. 9.
With an integration of MAC layer and CBF,
the forwarding delay can be improved by giving a
higher priority to data packets which suppress
subsequent CTF packets after the first CTF was
received by the forwarder.
4.4. General remarks
To conclude, even though the basic suppression
scheme is the fastest and does not incur any ad-
ditional overhead in terms of additional messages
or retries until a next hop is found, its applicability
is limited. Even under favorable conditions packet
duplication occurs with a likeliness of more than
50% at each hop. Therefore, more sophisticated
suppression schemes are desirable.
The area-based suppression scheme is very well
suited if the density of nodes is sufficiently high.
Only for very small numbers of neighbors the good
suppression characteristics are offset by a larger
forwarding delay.
Active selection can be used with all node
densities and suppression delay values. There will
be no uncontrolled duplication of packets. Its
main drawback is that it transmits at least two
additional packets (RTF/CTF) for each forward-
ing of the data packet. For scenarios where the
density of nodes is high and the suppression delay
0.2 T
0.4 T
0.6 T
0.8 T
1.0 T
1.2 T
1.4 T
4 16 64 256
avgtimebeforenextforward
number of neighbors
basic
area
select
Fig. 9. Average time before next forward.
0
0.2
0.4
0.6
0.8
1
4 16 64 256
relativeprobability
number of neighbors
NOGREEDY
FIRST
SECOND
THIRD
Fig. 10. Relative probabilities of ‘‘first next hop is in region’’.
H. F€uußler et al. / Ad Hoc Networks 1 (2003) 351–369 361
12. is comparatively low the area-based suppression
scheme may be preferable.
5. Protocol simulations
5.1. Simulation setup
The proposed mechanisms were implemented
in the ns-2 network simulator [26] version 2.1b8a
(using the MAC layer of the version 2.1b9 with
additional bug fixes). The size of the simulated
area is 2 km · 2 km. We simulate different node
densities and different levels of mobility using the
Random Waypoint Model [9]. 8
The different lev-
els of mobility are achieved by modifying the
maximum node speed, with a movement pause
time of zero. For every combination of protocol-
variant, node density, and maximum speed we
generate 50 independent sets of movement sce-
narios. For each of these scenarios, we randomly
pick one sender-receiver pair. The sender trans-
mits 100 packets with a payload of 128 bytes with
a constant rate of 4 packets per second. Each
simulation lasts for 40 s of simulation time. Data
traffic starts at 5–10 s (randomized) after the
start of the simulation, giving the beacon-based
protocols time to exchange neighbor information
and leaving enough time to deliver outstanding
packets at the end before the simulation is termi-
nated.
The simulated protocols are the three CBF
schemes as described in Section 3.2 and a basic
greedy forwarding mechanism based on GPSR [3].
The protocols are simulated without perimeter
mode (i.e., without repair strategy if greedy for-
warding fails to find a route to the destination).
Greedy forwarding using beacons is simulated
with and without the ability to re-route packets if a
selected next-hop is not reachable by the link layer,
the so-called MAC callback option. The two al-
ternatives are called Ôoptimized greedyÕ and Ôbasic
greedyÕ in the discussion of the simulations. The
simulated beacon intervals are 0.5, 1.0, and 2.0 s
and both greedy schemes used implicit beaconing,
where beacons are also piggybacked on data
packets.
An ÔoptimizationÕ used for CBF is the intro-
duction of a duplication suppression scheme that
works as follows: Every packet is marked with a
packet ID by the original sender. If a node has
already forwarded a packet with this ID or was
suppressed during the contention, it will not at-
tempt to forward the packet again.
The underlying MAC protocol is IEEE 802.11
with a capacity of 1 MBit/s to ensure that the
broadcasts for CBF (as well as the beacons) and
the unicast packets for greedy routing are trans-
mitted at the same bitrate. 9
For the simulations,
an unmodified MAC 802.11 was used but we note
that with an integration of CBF and MAC, the
performance of CBF can be improved consider-
ably.
In the following sections we investigate the
performance of the different routing algorithms
with particular focus on the impact of node mo-
bility. A more extensive simulation study of CBF
can be found in [28].
5.2. Node density
As a first sanity check, we simulated CBF and
greedy forwarding without node mobility for dif-
ferent node densities. Without mobility, the bea-
con interval has no impact on the performance of
greedy routing and location information is always
accurate.
An immediate result of this simulation is that
the runs with 100 and 200 nodes result in high
packet loss rates for all approaches. This is caused
by the fact they frequently reach a local optimum
and thus fail with low node densities.
8
Note that with the random waypoint model, the node
density is not uniform [27]. The higher the node mobility, the
earlier will the originally uniformly distributed nodes accumu-
late in the middle of the simulation area, decreasing the average
communication distance. Nevertheless, we choose the model to
allow comparison of our simulation results with other simula-
tion studies.
9
Earlier versions of the ns-2 MAC had a bug using a higher
rate for broadcasts than the standard allows. This bug is fixed in
the code we used.
362 H. F€uußler et al. / Ad Hoc Networks 1 (2003) 351–369
13. In more detail it can be observed that the basic
CBF scheme achieves a higher packet delivery ra-
tio than all other schemes as shown in Fig. 11. Due
to packet duplication, packets may be forwarded
along a non-greedy path and find a route to the
destination even if no greedy route exists. As is to
be expected, the other CBF schemes as well as
greedy forwarding have very similar packet deliv-
ery ratios, which depend mostly on the probability
that a greedy route exists given the current node
density. The area based scheme has a slightly lower
packet delivery ratio for very low node densities
as the sequence of probing areas may result in
choosing a forwarding node that makes less pro-
gress than the best node of all forwarding areas.
For higher node densities where the forwarder is
almost always in the first forwarding area this
discrepancy vanishes. Active selection performs
slightly worse than the other schemes for higher
node densities since the request response proce-
dure increases the likelihood that a packet collision
occurs during the forwarding process. Its perfor-
mance could easily be improved by allowing
packet retransmissions.
The analysis of other performance measures
(e.g., routing overhead and forwarding delay) is of
little value if only a fraction of the sent packets
arrive at the destination. For this reason, we limit
the remainder of our analysis to simulations with
300 nodes.
5.3. Packet delivery ratio
Fig. 12 shows the packet delivery ratio of the
three CBF schemes: the basic greedy scheme for
all three simulated beacon intervals and the opti-
mized greedy scheme for a beacon interval of one
second. The values for optimized greedy with
other beacon intervals were omitted because their
performance in the chosen scenarios is similar to
the run with a beacon interval of 1 s. The node
density is 300 nodes in the simulated area of 4
km2
. The x-axis shows the four different groups of
movement scenarios with their respective maxi-
mum node speed.
As can be seen from the graph, all CBF schemes
and the optimized greedy scheme reach very high
packet delivery ratios. Since the node density is
fairly high, greedy routes exist most of the time.
Only the packet delivery ratio of the active selec-
tion scheme suffers slightly when mobility is high.
In such scenarios it is possible that a node moves
out of transmission range before sending the CTF
(which nevertheless may suppress the CTFs of
other nodes) or before receiving the actual data
packet. Currently, the active selection scheme uses
no recovery strategy that attempts to retransmit a
packet if no CTF is heard after the timeout in-
terval T , and the packet is lost.
In contrast to the CBF schemes and to the
optimized greedy approach, the basic greedy
0
0.2
0.4
0.6
0.8
1
100 200 300 400
packetdeliveryratio
number of nodes
cbf basic
cbf area
cbf select
greedy
Fig. 11. Packet delivery ratio for different node densities.
0
0.2
0.4
0.6
0.8
1
5030100
packetdeliveryratio
max. node speed [m/s]
cbf basic
cbf area
cbf select
greedy opt 1.0
greedy basic 0.5
greedy basic 1.0
greedy basic 2.0
Fig. 12. Packet delivery ratio for scenarios with 300 nodes.
H. F€uußler et al. / Ad Hoc Networks 1 (2003) 351–369 363
14. scheme performs significantly worse under mo-
bility. With a maximum node speed of 50 m/s the
packet delivery ratio drops to 0.2 with a beacon
interval of 2 s. ÔBasic greedyÕ selects a greedy
forwarder out of the list of neighbors and tries to
transmit the packet to it. If a neighbor moves out
of transmission range, its entry expires and it is
removed from the neighbor table after a timeout
period during which no packets are received. 10
During this period, all packets handed down to
the link layer with this node as next hop are lost.
The optimized greedy scheme detects these fail-
ures and reroutes all packets in the MAC queue
destined for this next hop. Consequently, no
packets are lost when the best suitable neighbor
leaves the radio range if there is another suitable
next hop in the neighbor table. The higher the
node mobility, the more packets cannot by de-
livered with the basic greedy scheme and are
therefore re-queued by the optimized scheme.
Hence, the good performance of the optimized
scheme comes at the expense of a trial-and-error
strategy to detect a suitable forwarder that is still
in transmission range, which may significantly
increase the per hop delay (see also Section 5.5)
and the network load. The CBF schemes achieve
similar packet delivery ratios without any link
layer packet loss recovery for the packet trans-
missions.
The same scenarios have also been simulated
for densities of 100, 200, and 400 nodes within the 4
km2
simulation area (not shown here). Generally,
low node densities with only 100 or 200 nodes
reduce the likelihood of greedy routes to the des-
tination and all schemes achieve lower packet de-
livery ratios. With 400 nodes, the optimized greedy
scheme, the basic CBF scheme, and the area-
based CBF scheme deliver 100% of the packets.
Active selection achieves a delivery ratio slightly
below 100% with high mobility scenarios for rea-
sons explained above. The performance of the
the basic greedy schemes improves only margin-
ally.
5.4. Transmission costs
In Fig. 13 we show the transmission costs for
the optimized greedy schemes and the CBF
mechanisms in terms of average number of bytes
transmitted at the MAC layer over the course of
the simulation. The basic greedy schemes were
omitted for lack of comparability; at high mobil-
ity, the packet delivery ratio is too low to allow a
meaningful interpretation of the total overhead.
As expected, all CBF methods use less band-
width than the greedy schemes together with the
overhead caused by the beacon messages. 11
The
area-based scheme consumes the least bandwidth,
as no packet duplication occurs and––given a node
density of approximately 15 nodes within trans-
mission range––the forwarding node is almost al-
ways located within the Reuleaux triangle. Active
selection causes a slightly higher overhead through
the additional RTF and CTF messages and the
basic CBF schemes causes the highest transmission
costs due to packet duplication. The bandwidth
consumption of all CBF schemes is relatively in-
dependent of mobility. The slight decrease in
overhead can mainly be attributed to the decrease
in the average path length caused by the random
waypoint model.
The overhead caused by optimized greedy
routing depends on a number of factors. The
amount of data transmitted for beacon messages
scales proportionally to the number of nodes, the
beacon interval, and the simulation time. The va-
lue decreases somewhat with an increase in traffic
since implicit beaconing causes beacons to be
piggybacked on the data packets. Furthermore,
the transmission costs for the greedy scheme in-
creases significantly with an increase in mobility.
The better the available neighbor information due
to a high beacon rate, the lower the increase in
MAC overhead caused by increasing mobility.
When mobility is high, a large fraction of the
packets have to be sent multiple times because of
the MAC callback. This ratio decreases when more
10
This beacon expiry timeout is usually a multiple of the
beacon interval. We chose it as 3.5 times the beacon interval as
in the simulations in [3].
11
Results are significantly worse for the greedy schemes
when we investigate the number of packets instead of the
amount of bytes, since beacon messages are generally much
smaller than data packets.
364 H. F€uußler et al. / Ad Hoc Networks 1 (2003) 351–369
15. accurate neighbor information is available, at the
expense of an increase of the overhead caused by
the beacons.
To analyze the transmission costs caused by the
optimized greedy scheme in more detail, Fig. 14
shows the specific components of MAC traffic for
a beacon interval of 2 s and the scenarios with 300
nodes.
The bandwidth consumed by beacon messages
and MAC control packets (i.e., unicast acknowl-
edgments of the data packets) is independent of
the mobility rate. In contrast, the overhead caused
by the transmission of data packets increases sig-
nificantly with higher mobility. Without mobility,
optimized greedy consumes about as much band-
width as area-based CBF. For a maximum node
speed of 30 m/s, optimized greedy already con-
sumes the same bandwidth as the active selection
scheme (while the additional RTF/CTF messages
in the active selection scheme also provide pro-
tection against the hidden terminal problem). For
node speeds of 50 m/s and above, the greedy
scheme even significantly exceeds the bandwidth
usage of the basic CBF scheme with its unsup-
pressed duplicates. At this node mobility, the for-
warding overhead is higher than the overhead
caused by the beacon messages of all 300 nodes
and exceeds the forwarding overhead with no
mobility almost by a factor of four.
With only one sender and receiver and a data
rate of 4 KBit/s, the amount of data traffic is ex-
tremely low given the total number of nodes. At
such low rates, the additional traffic caused by the
optimized greedy scheme can be handled by the
MAC layer without any problems. However, for
reasonable combinations of beacon traffic and
actual data traffic, we expect the overhead ratio to
become much worse. When the additional traffic
caused by repeated MAC callback results in con-
gestion, data packets as well as beacon messages
may be lost. The former have to be retransmitted
at the cost of additional bandwidth consumption,
while loss of the latter decrease the accuracy of the
neighbor tables, further aggravating the MAC
callback problem.
5.5. Forwarding delay
For all CBF simulations, the maximum re-
sponse time T was set to 45 ms. This parameter has
a large impact on the average latency and was not
subject to optimization. The optimal setting of T
depends to a large degree on the MAC protocol
and can be significantly reduced by integrating
MAC and CBF. The parameter should further be
dynamically adjusted to the node density and to
network load. An optimized maximum response
time adjustment strategy is left for future work.
Nevertheless, an analysis of packet forwarding
latencies confirms the observations regarding the
protocol overhead. Fig. 15 shows the average per
hop latency (i.e., the time required by a packet to
0
200
400
600
800
1000
1200
1400
1600
1800
5030100
amountofdatatransmittedonMAC[kBytes]
max. node speed [m/s]
greedy opt 0.5
greedy opt 1.0
greedy opt 2.0
cbf basic
cbf select
cbf area
Fig. 13. Transmission costs on MAC layer for 300 nodes.
0
50
100
150
200
250
300
350
400
450
5030100
[kBytes/run]
max. node speed [m/s]
beacons
data packets
MAC control packets
Fig. 14. Cost composition of greedy opt 2.0.
H. F€uußler et al. / Ad Hoc Networks 1 (2003) 351–369 365
16. travel from source to destination divided by the
average number of hops of the route). Comparing
the CBF schemes, the basic scheme has the lowest
latency. There is no RTF/CTF handshake as with
active selection and no sequential querying of re-
gions as in the area-based scheme. This also ex-
plains the delay characteristics of the other two
CBF schemes: with zero mobility the select scheme
performs slightly better, because sometimes better
routes may be found than with the ordered que-
rying of areas. In a static scenario, this affects all
packets, causing a perceptible difference in laten-
cies. Mobility alleviates this effect and area-based
CBF achieves slightly lower latency values.
When comparing CBF with the optimized
greedy strategy, one can observe a similar behavior
as with the transmission overhead. While mobility
even reduces the forwarding delay of the CBF
schemes, the delay of optimized greedy increases
drastically with higher mobility. For maximum
mobility rates of more than 30 m/s, the forwarding
delay is larger than that of the unoptimized CBF
schemes. The responsibility for this effect lies again
in the increasing number of link layer retransmis-
sions.
6. Conclusions and outlook
The advantage of position-based routing over
other ad hoc routing protocols is the fact that
nodes require only knowledge about the local
neighborhood and the destinationÕs location in-
stead of global route topology. Therefore, posi-
tion-based routing is better suited for networks
with a certain degree of mobility. With the CBF
mechanism proposed in this paper, even this local
knowledge and hence the sending of beacon mes-
sages is no longer required. Any node with pro-
gress toward a destination can participate in the
forwarding process without the need for this node
to be registered in a neighbor table. For CBF, data
packets are transmitted via single-hop broadcast.
All nodes within radio range and with forward
progress toward the destination are eligible to
continue to forward the packet. Thus, the re-
sponsibility for the forwarding decision now lies
with the set of possible next hops instead of the
forwarding node, as is the case in conventional
forwarding methods. Forwarding takes place after
a contention period during which one or more
nodes are selected as next hops. Selection of more
than one next hop causes unwanted packet dupli-
cation. We presented different suppression strate-
gies to avoid this.
For existing position-based forwarding
schemes, node mobility results in frequent beacon
messages to keep the neighbor tables reasonably
up-to-date. Particularly for highly mobile net-
works, CBF can provide significant bandwidth
savings through the elimination of beacon mes-
sages and the reduction of MAC layer retries for
packet transmissions caused by inaccurate neigh-
bor tables. Furthermore, the decrease in the total
number of packets reduces the probability of
packet collisions and inefficient routing caused by
inaccurate neighbor tables is avoided.
The simulation results presented in this paper
show that excessive re-sending of data due to
outdated neighbor table entries as it is the case for
traditional position-based routing can be com-
pletely avoided by the proposed CBF approach.
Since CBF does not require any beaconing, and
since CBF together with the area-based suppres-
sion strategy does not lead to any noticeable
packet duplication, the resulting data volume
overhead of the contention-based method is much
less than the data volume overhead generated with
traditional position-based routing in highly mobile
0
0.005
0.01
0.015
0.02
0.025
0.03
0.035
30 50100
[s]
max. node speed [m/s]
greedy opt 0.5
greedy opt 1.0
greedy opt 2.0
cbf select
cbf area
cbf basic
Fig. 15. Average hop latency for 300 nodes.
366 H. F€uußler et al. / Ad Hoc Networks 1 (2003) 351–369
17. ad hoc networks. Clearly, reducing load on the
wireless medium is beneficial for ad hoc network-
ing in general. In the rare case where a packet
duplication occurs due to CBF, a simple strategy
exists to improve the proposed suppression
schemes: if duplication of packets occurs, these
packets will be routed to the same destination at
roughly the same time. Even with a very small
state about which packets were recently for-
warded, the duplicates can easily be suppressed in
later nodes.
Thus, packet duplication can be reduced while
the simplicity of the suppression schemes is re-
tained. In addition to the reduced forwarding
overhead, the CBF schemes also provide a lower
packet forwarding delay when node mobility is
high. For the simulations, we used very conserva-
tive timer settings and we expect the reduction in
forwarding delay to be much more pronounced
with a well tuned CBF implementation.
One key item of future work will be the inte-
gration of CBF and MAC functionality. Since
both serve a somewhat similar purpose their inte-
gration can significantly reduce the overhead in-
curred by the CBF scheme. In particular, we
expect that it is possible to significantly reduce the
runtime of the random timers used for the con-
tention process. If a MAC layer with RTS/CTS is
used to solve the hidden terminal problem (as is
possible with IEEE 802.11), it can be combined
with the RTF/CTF messages of active selection
which will significantly increase the efficiency of
this suppression strategy. Furthermore, a maxi-
mum response time T which adapts to network
load and node density can reduce the delay in-
curred by the contention period. So far, we have
only considered greedy forwarding. In position-
based routing, greedy forwarding fails if no
neighbor with progress toward the destination
exists. In such a case, a recovery strategy is used to
circumnavigate the area with no reception. While
Geodesic Anchors, as proposed for Terminodes
routing, is directly applicable to CBF we also plan
to investigate other alternatives that are more
similar to the repair strategies of face-2 and GPSR.
The use of directional antennas in ad hoc net-
works recently gained increased scientific interest
[29]. This technology seems to be a promising
candidate particularly in the context of area-based
suppression.
References
[1] T.-C. Hou, V.O. Li, Transmission range control in
multihop packet radio networks, IEEE Trans. Commun.
34 (1) (1986) 38–44.
[2] H. Takagi, L. Kleinrock, Optimal transmission ranges for
randomly distributed packet radio terminals, IEEE Trans.
Commun. 32 (3) (1984) 246–257.
[3] B.N. Karp, H.T. Kung, GPSR: greedy perimeter stateless
routing for wireless networks, in: Proceedings of the Sixth
Annual ACM/IEEE International Conference on Mobile
Computing and Networking (MobiCom Õ00), Boston, MA,
2000, pp. 243–254.
[4] S. Basagni, I. Chlamtac, V.R. Syrotiuk, B.A. Woodward,
A distance routing effect algorithm for mobility
(DREAM), in: Proceedings of the Fourth Annual ACM/
IEEE International Conference on Mobile Computing and
Networking (MobiCom Õ98), Dallas, TX, 1998, pp. 76–84.
[5] L. Blazzevicc, S. Giordano, J.-Y. LeBoudec, Self-organizing
wide-area routing, in: Proceedings of SCI 2000/ISAS 2000,
Orlando, FL, 2000.
[6] P. Bose, P. Morin, I. Stojmenovic, J. Urrutia, Routing with
guaranteed delivery in ad hoc wireless networks, in:
Proceedings of the 3rd International Workshop on Dis-
crete Algorithms and Methods for Mobile Computing and
Communications (DIAL-M Õ99), Seattle, WS, 1999, pp.
48–55.
[7] R. Morris, J. Jannotti, F. Kaashoek, J. Li, D.S.J. DeCo-
uto, CarNet: A scalable ad hoc wireless network system, in:
Proceedings of the 9th ACM SIGOPS European Work-
shop: Beyond the PC: New Challenges for the Operating
System, Kolding, Denmark, 2000, p. 127ff.
[8] H. Hartenstein, B. Bochow, A. Ebner, M. Lott, M.
Radimirsch, D. Vollmer, Position-aware ad hoc wireless
networks for inter-vehicle communications: The FleetNet
project, in: Proceedings of the Second ACM International
Symposium on Mobile and Ad hoc Networking Com-
puting (MobiHoc Õ01), Long Beach, CA, 2001.
[9] D.B. Johnson, D.A. Maltz, Dynamic source routing in ad
hoc wireless networks, in: T. Imielinski, H. Korth (Eds.),
Mobile Computing, vol. 353, Kluwer Academic Publishers,
Boston, MA, 1996, pp. 153–181.
[10] C.E. Perkins, E.M. Royer, Ad hoc on-demand distance
vector routing, in: Proceedings of the 2nd IEEE Work-
shop on Mobile Computing Systems and Applications
(WMCSA), New Orleans, LA, 1999, pp. 90–100.
[11] E.M. Royer, C.-K. Toh, A review of current routing
protocols for ad hoc mobile wireless networks, IEEE
Personal Commun. 6 (2) (1999) 46–55.
[12] M. Mauve, J. Widmer, H. Hartenstein, A survey on
position-based routing in mobile ad hoc networks, IEEE
Network 15 (6) (2001) 30–39.
H. F€uußler et al. / Ad Hoc Networks 1 (2003) 351–369 367
18. [13] M. Heissenb€uuttel, T. Braun, A novel position-based and
beacon-less routing algorithm for mobile ad hoc networks,
in: Proceedings of the 3rd IEEE Workshop on Applica-
tions and Services in Wireless Networks (ASWN Õ03),
Bern, Switzerland, 2003, pp. 197–209.
[14] Y.-B. Ko, N.H. Vaidya, Location-aided routing (LAR) in
mobile ad hoc networks, in: Proceedings of the Fourth
Annual ACM/IEEE International Conference on Mobile
Computing and Networking (MobiCom Õ98), Dallas, TX,
1998, pp. 66–75.
[15] S. Giordano, M. Hamdi, Mobility management: the virtual
home region, Tech. Rep. SSC/1999/037, EPFL-ICA, Octo-
ber 1999.
[16] J. Li, J. Jannotti, D.S.J. DeCouto, D.R. Karger, R. Morris,
A scalable location service for geographic ad hoc routing,
in: Proceedings of the Sixth Annual ACM/IEEE Interna-
tional Conference on Mobile Computing and Networking
(MobiCom Õ00), Boston, MA, 2000, pp. 120–130.
[17] T. Camp, J. Boleng, L. Wilcox, Location Information
Services in Mobile Ad Hoc Networks, in: Proceedings of
the IEEE International Conference on Communications
(ICC), New York, 2002, pp. 3318–3324.
[18] J. Nonnenmacher, E.W. Biersack, Scalable feedback for
large groups, IEEE/ACM Trans. Networking 7 (3) (1999)
375–386.
[19] T.T. Fuhrmann, J. Widmer, On the scaling of feedback
algorithms for very large multicast groups, Computer
Communications 24 (5–6) (2001) 539–547.
[20] ANSI/IEEE, ANSI/IEEE Std 802. 11, 1999th Edition,
1999.
[21] L. Kleinrock, F.A. Tobagi, Packet switching in radio
channels: Part I––carrier sense multiple-access modes and
their throughput-delay characteristics, IEEE Trans. Com-
mun. 23 (12) (1975) 1400–1416.
[22] W. Gleißner, H. Zeitler, The Reuleaux triangle and its
center of mass, Results Math. 37 (2000) 335–344.
[23] P. Karn, MACA––a new channel access method for packet
radio, in: Proceedings of the 9th ARRL/CRRL Amateur
Radio Computer Networking Conference, 1990, pp. 134–
140.
[24] M. Matsumoto, T. Nishimura, Mersenne Twister: a 623-
dimensionally equidistributed uniform pseudo-random
number generator, ACM Trans. Model. Comput. Simul.
8 (1) (1998) 3–30.
[25] M. Galassi, J. Davies, J. Theiler, B. Gough, G. Jung-
man, M. Booth, F. Rossi, GNU Scientific Library––
Reference Manual, http://sources.redhat.com/gsl, January
2002.
[26] The ns-2 network simulator, http://www.isi.edu/nsnam/ns/.
[27] C. Bettstetter, Mobility modeling in wireless networks:
categorization, smooth movement, and border effects,
ACM SIGMOBILE Mobile Comput. Commun. Rev.
(MC2R) 5 (3) (2001) 55–67.
[28] M. K€aasemann, Beaconless position-based routing for
mobile ad hoc networks, MasterÕs thesis, Department of
Mathematics and Computer Science, University of Mann-
heim, 2003.
[29] L. Bao, J.J. Garcia-Luna-Aceves, Transmission scheduling
in ad hoc networks with directional antennas, in: Proceed-
ings of the Eigth Annual ACM/IEEE International Con-
ference on Mobile Computing and Networking (MobiCom
Õ02), Atlanta, GA, 2002, pp. 48–58.
Holger F€uußler received his M.S. degree
in Business Administration and Com-
puter Science (Diplom-Wirtschaftsin-
formatiker) from the University of
Mannheim, Germany in 2001. Since
then, he is a research staff member at
the ‘‘Lehrstuhl f€uur Praktische Infor-
matik IV’’ of the University of
Mannheim, working toward his Ph.D.
degree in Computer Science. His work
is funded by NEC Network Labs Eu-
rope within the framework of the
FleetNet project by the BMBF (Ger-
man Ministry of Education and Re-
search). His research interest focusses on Mobile Ad Hoc
Networks, especially between street-bound vehicles.
J€oorg Widmer received his M.S. degree
in Business Administration and Com-
puter Science and his Ph.D. degree in
Computer Science from University of
Mannheim, Germany in 2000 and
2003, respectively. In 1999 and 2000,
he was at ICIR, Berkeley, CA (for-
merly ACIRI) to write his M.S. thesis
on ‘‘Equation Based Congestion Con-
trol’’. Since 2003 he is employed as
senior researcher at the Swiss Federal
Institute of Technology––Lausanne
(EPFL) where he is working on ultra-
wide band wireless communication.
His reserach interests include ad hoc networking, congestion
control, and multicast communication.
Michael K€aasemann received a MasterÕs
degree in Technical Computer Science
in 2003 at the University of Mannheim,
Mannheim, Germany. He was a re-
search intern at the NEC Network
Laboratories Europe from 2002 to
2003, where he focused on Mobile Ad
Hoc Networking and Network Simula-
tions. His research interests include
mobile communications, network rout-
ing, multimedia and hardware design.
Martin Mauve received his M.S. and
Ph.D. degrees in Computer Sciencefrom
the University of Mannheim, Germany,
in 1997 and 2000, respectively. He was
an assistant professor at the University
of Mannheim from October 2000 until
March 2003. Since April 2003 he is a
professor at the Heinrich Heine Uni-
versity of D€uusseldorf, leading the re-
search group on Computer Networks
and Communication Systems. His re-
search interests include mobile ad hoc
networks, inter-vehicle communications
and distributed multimedia systems.
368 H. F€uußler et al. / Ad Hoc Networks 1 (2003) 351–369
19. Hannes Hartenstein received a Mas-
terÕs degree in Mathematics in 1995
and the Ph.D. degree in Computer
Science in 1998, both from Albert–
Ludwigs- Universitaet, Freiburg, Ger-
many. He was Erasmus Scholar with
the University of East Anlia, Norwich,
UK, in 1991–1992 and received the
Capocelli Award from the IEEE Data
Compression Conference 1997 (with
M. Ruhl) for the paper ÔOptimal frac-
tal coding is NP-hardÕ. He joined NEC
Network Laboratories Europe in 1999
and is now a Senior Research Staff
Member with the Mobile Internet Group. He currently focusses
on IP-based mobility management as well as on ad hoc routing.
His research interests include mobile communications, net-
working, multimedia, security, and theoretical computer sci-
ence.
H. F€uußler et al. / Ad Hoc Networks 1 (2003) 351–369 369