Javascript must be enabled to continue!
Performance Enhancement of Routing Protocols in Mobile Ad hoc Networks
View through CrossRef
This paper proposes to use virtual backbone structure to handle control messages in ad hoc networks. This structure is effective in reducing the overhead of disseminating control information. In the first part, the approach to build the virtual backbone on the setup phase is presented. The construction of backbone is based on the Minimum Connected Dominating Set (MCDS). The novelty is in the way on finding the MCDS. A Linear Programming approach is used to build a Minimum Dominating Set (MDS). Then, a spanning tree algorithm is applied to provide the MCDS. A theoretical analysis based on probabilistic approach is developed to evaluate the size of MCDS. Different techniques of diffusion in ad hoc networks are presented and compared. The flooding technique is simple and efficient, but it is expensive in term of bandwidth consumption and causes broadcast storm problem. Simulation results show that technique using virtual backbone performs flooding and it is compared to MPR (Multipoint Relay). The second part of this paper presents a distributed procedure to maintain the backbone when the mobility of terminals is introduced. A maintenance procedure will be executed by the node which changes its position. This procedure is distributed and guarantees the node connectivity to the backbone. The authors believe that the maintenance of the backbone with small size will be more effective. Simulation results show the performance of this procedure when mobility and scalability are considered.
Title: Performance Enhancement of Routing Protocols in Mobile Ad hoc Networks
Description:
This paper proposes to use virtual backbone structure to handle control messages in ad hoc networks.
This structure is effective in reducing the overhead of disseminating control information.
In the first part, the approach to build the virtual backbone on the setup phase is presented.
The construction of backbone is based on the Minimum Connected Dominating Set (MCDS).
The novelty is in the way on finding the MCDS.
A Linear Programming approach is used to build a Minimum Dominating Set (MDS).
Then, a spanning tree algorithm is applied to provide the MCDS.
A theoretical analysis based on probabilistic approach is developed to evaluate the size of MCDS.
Different techniques of diffusion in ad hoc networks are presented and compared.
The flooding technique is simple and efficient, but it is expensive in term of bandwidth consumption and causes broadcast storm problem.
Simulation results show that technique using virtual backbone performs flooding and it is compared to MPR (Multipoint Relay).
The second part of this paper presents a distributed procedure to maintain the backbone when the mobility of terminals is introduced.
A maintenance procedure will be executed by the node which changes its position.
This procedure is distributed and guarantees the node connectivity to the backbone.
The authors believe that the maintenance of the backbone with small size will be more effective.
Simulation results show the performance of this procedure when mobility and scalability are considered.
Related Results
Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach
Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach
Signaling in Next Generation IP-based networks heavily relies in the family of multimedia signaling protocols defined by IETF. Two of these signaling protocols are RTSP and SIP, wh...
[RETRACTED] Rhino XL Male Enhancement v1
[RETRACTED] Rhino XL Male Enhancement v1
[RETRACTED]Rhino XL Reviews, NY USA: Studies show that testosterone levels in males decrease constantly with growing age. There are also many other problems that males face due ...
Routing Security in Wireless Sensor Networks
Routing Security in Wireless Sensor Networks
Since routing is a fundamental operation in all types of networks, ensuring routing security is a necessary requirement to guarantee the success of routing operation. Securing rout...
Analisa dan Perbandingan Kinerja Routing Protocol OSPF dan EIGRP dalam Simulasi GNS3
Analisa dan Perbandingan Kinerja Routing Protocol OSPF dan EIGRP dalam Simulasi GNS3
Router is the network equipment for route the packet from one network segment to another in a bigscale network. Router can route packet because there is a routing table in router c...
XÂY DỰNG VÀ SỬ DỤNG HỌC LIỆU SỐ TRONG DẠY HỌC “SINH HỌC VI SINH VẬT VÀ VIRUS” (SINH HỌC 10)
XÂY DỰNG VÀ SỬ DỤNG HỌC LIỆU SỐ TRONG DẠY HỌC “SINH HỌC VI SINH VẬT VÀ VIRUS” (SINH HỌC 10)
Bài viết đề cập đến những nghiên cứu về tầm quan trọng của học liệu số, các dạng học liệu số trong dạy học Sinh học nói chung và dạy học Sinh học vi sinh vật và virus – Sinh học 10...
Effect of NTT on Performance of AODV in a Linear AD HOC Network
Effect of NTT on Performance of AODV in a Linear AD HOC Network
Wireless Ad Hoc Networks (WANETs) are predicted to be prevalent networks in coming future because of their infrastructure-less characteristics that result in self-organization, sel...
Performance and Improvement Analysis of the Underwater WSN Using a Diverse Routing Protocol Approach
Performance and Improvement Analysis of the Underwater WSN Using a Diverse Routing Protocol Approach
The planet Earth is the most water-rich place because oceans cover more than 75% of its land area. Because of the extraordinary activities that occur in the depths, we know very li...
Chuyên san Dạy và Học - Số 27 - Khởi đầu
Chuyên san Dạy và Học - Số 27 - Khởi đầu
Vạn vật trong tự nhiên vẫn luôn vận hành theo một vòng quay, như mặt trời phải lặn và mặt trăng phải mọc, như mùa hạ đi để mùa thu tới, như chiếc hạt rơi cho một sự sống sắp nảy ch...

