scholarly journals Adaptive Strategy to Change Firing Phases of Collided Nodes in Extended-Desync TDMA-Based MANETs

Sensors ◽  
2021 ◽  
Vol 21 (20) ◽  
pp. 6776
Author(s):  
Cheol-Woong Lee ◽  
Gyu-Min Lee ◽  
Byeong-Hee Roh

As a multi-hop extension of the desynchronization-based TDMA (Desync-TDMA), the extended Desync-TDMA (Ext-Desync) with self-adapting property is proposed to overcome the limitations of existing CSMA/CA and dynamic TDMA-based schemes for Mobile Ad-hoc Networks (MANETs). However, existing studies overlooked the potential problem of firing message collisions caused by node movements, leading to the severe degradation of MANET networking performance. In this paper, we derive a mathematical model to evaluate the problem due to collisions of firing messages for moving nodes. With the derived model, we propose a method for a collided node to determine whether it changes its firing phase or not, adaptively in a distributed manner, by considering both the collision situation and the slot utilization. The comparative analysis between the proposed method and existing representative ones is also presented for various networking features. The performances of the proposed method are compared with CSMA/CA as well as other existing Ext-Desync-based schemes. The numerical results show that the proposed method achieved much faster resolution and higher slot utilization in collision situations than other Ext-Desync-based schemes. In addition, we also show that the proposed method outperformed the comparable methods, including CSMA/CA, in terms of packet delivery ratios and end-to-end delays.

Open Physics ◽  
2016 ◽  
Vol 14 (1) ◽  
pp. 498-507 ◽  
Author(s):  
Marjan Kuchaki Rafsanjani ◽  
Hamideh Fatemidokht ◽  
Valentina Emilia Balas

AbstractMobile ad hoc networks (MANETs) are a group of mobile nodes that are connected without using a fixed infrastructure. In these networks, nodes communicate with each other by forming a single-hop or multi-hop network. To design effective mobile ad hoc networks, it is important to evaluate the performance of multi-hop paths. In this paper, we present a mathematical model for a routing protocol under energy consumption and packet delivery ratio of multi-hop paths. In this model, we use geometric random graphs rather than random graphs. Our proposed model finds effective paths that minimize the energy consumption and maximizes the packet delivery ratio of the network. Validation of the mathematical model is performed through simulation.


Author(s):  
Yaser Khamayseh ◽  
Muneer Bani Yassein ◽  
Iman I. Badran ◽  
Wail Mardini

Collision is a common problem in Mobile Ad Hoc Networks (MANETs). There are several backoff algorithms that have been proposed to avoid this problem. This paper proposes a new backoff algorithm called the Square Root Backoff (SRB). Moreover, it identifies that no algorithm can perform the best in all cases. Therefore, an adaptive strategy is proposed to choose the best backoff mechanism from a set of mechanisms based on network density and mobility parameters. The proposed adaptive algorithm is implemented in two phases, the offline phase and the online phase. Such design aims at reducing the time complexity of the algorithm by performing some of the computations prior to the actual deployment and of the network. Results from simulations demonstrate that the SRB algorithm achieved better performance than BEB and LB. Moreover, the adaptive backoff algorithm obtains the best throughput and end-to-end delay performance over the other backoff algorithms.


Author(s):  
L Raghavendar Raju ◽  
C R K Reddy

<p align="justify"> Identifying trusted nodes for safe communication is a key challenge in mobile ad-hoc networks. Node compromises a service and leads to uncertainty in node behaviour. Computing the node trust and node management will enhance the security aspect in MANETs. This paper proposes a security improvisation based on a Node Trust Prediction Approach (NTPA).  NTPA aims to prevent the interference of an  anomalous node in a MANET. There by  improving the <strong><em>security and data delivery output</em></strong>. The NTPA calculates the node trust prediction by evaluating the four most frequent actions that are performed by a node in the communication process. <em>Node authorization </em>is a key aspect in the evaluation of an ad hoc network’s security. In the proposed method, we monitor the <em>valid</em> and <em>Invalid Authorization </em>of a node. Data delivery reliability is measured with S<em>uccess of Packet delivery </em>and <em>Loss or Drop of packets. </em>In this paper, NTPA is compared with SAR(Security-Aware Routing) and AODV (Adhoc on-Demand Distance Vector), to evaluate the efficiency in an adhoc networks. The empirical results shows that there is an increase of 25% packet delivery and  a 40% reduction in  routing overhead.  <strong></strong></p>


Sign in / Sign up

Export Citation Format

Share Document