scholarly journals Flood and Contain: An Optimized Repeal-Based Flooding Algorithm for Wireless Ad Hoc and Sensor Networks

Sensors ◽  
2020 ◽  
Vol 20 (20) ◽  
pp. 5914
Author(s):  
Javier Gomez ◽  
Martha Montes-de-Oca ◽  
Jose Jaime Camacho-Escoto

Flooding is a simple yet reliable way of discovering resources in wireless ad hoc networks such as mobile ad hoc networks (MANETs), ad hoc sensors, and recently, IoT networks. However, its operation is resource-intensive, especially in densely populated networks. Several approaches can be found in the literature to reduce the impact of flooding. Many of these approaches follow a repeal-based operation, chasing and stopping further propagation of flooding packets once the target is found. However, repeal-based protocols might end up transmitting even more packets than the original flooding. This work characterizes a maximum repeal-flooding boundary beyond which it is counterproductive to chase the original flooding. We present the Flood and Contain (F&C) algorithm, a method that can quickly establish the maximum repeal-flooding boundary for each node while making no assumptions on the underlying network. F&C’s packet overhead increases linearly with the hop count up to the maximum repeal-flooding boundary, in which case there is no attempt to chase the original flooding. In this latter case, F&C generates only as many packets as the original flooding. Simulations show that, on average, F&C reduces the total flooding overhead (compared to traditional flooding) up to 35 percent once considering all possible destinations, with only a slight increase in resource discovery latency, and it outperforms all other repeal-based protocols, particularly for longer routes.

2021 ◽  
Author(s):  
Altaf Hussain ◽  
Muhammad Rafiq Khan

Abstract Mobile Ad-hoc Network (MANET) is the most emerging and fast expanding technology since the last two decades. One of the major issue and challenging area in MANET is the process of routing due to dynamic topologies and high mobility of mobile nodes. The exchange of information from source to a destination is known as the process of routing. Spectacular amount of attention has been paid by researchers to reliable routing in ad-hoc networks. Efficiency and accuracy of a protocol depends on many parameters in these networks. In addition to other parameters node velocity and propagation models are among them. Calculating signal strength at receiver is the responsibility of a propagation model while mobility of nodes is responsible for topology of the network. A huge amount of loss in performance is occurred due to variation of signal strength at receiver and obstacles between transmissions. Simulation tools are developed to analyze the weakness and strength of protocols along with different parameters that may impact the performance. The choice of a propagation models have an abundant effect on performance on routing protocols in MANET. In this research, it has been analyzed to check the impact of different propagation models on the performance of Optimized Link State Routing (OLSR) in Sparse and Dense scenarios in MANET. The simulation has been carried out in NS-2 by using performance metrics as average Throughput, average packet drop and average latency. The results predicted that propagation models and mobility has a strong impact on the performance of OLSR in considered scenarios.


2007 ◽  
Vol 3 (1) ◽  
pp. 105-117 ◽  
Author(s):  
Arjan Durresi ◽  
Vamsi Paruchuri ◽  
Mimoza Durresi ◽  
Leonard Barolli

Wireless Mobile Ad Hoc Networks are particularly vulnerable due to their fundamental characteristics such as an open medium, dynamic topology, distributed cooperation, and constrained capability. Location information of nodes can be critical in wireless ad hoc networks, especially in those deployed for military purposes. In this paper, we present two Protocols for anonymous routing to prevent location disclosure attacks. The Protocol for Anonymous Routing (PAR) guarantees absolute anonymity, which itself might cause problems as it would become hard to identify malicious and misbehaving nodes. PAR-Enhanced trades off some anonymity to enable detection of malicious and misbehaving nodes.


Sign in / Sign up

Export Citation Format

Share Document