chapter 1 mobile ad hoc network - …shodhganga.inflibnet.ac.in/bitstream/10603/15481/6/06_chapter...

50
1 CHAPTER 1 MOBILE AD HOC NETWORK 1.1 INTRODUCTION Mobile Ad hoc Network is a collection of wireless mobile devices such as laptops, handheld digital devices, personal digital assistants and wearable computers forming a temporary network without the aid of any infrastructure or centralized administration. The vision of MANET (Corson and Macker 1999) is to form a wireless Internet, where users can move anywhere anytime with the rest of the world and by incorporating routing functionality into mobile nodes. The Internet Engineering Task Force (IETF) has created a MANET working group to standardize the Internet Protocol (IP) routing protocol functionality suitable for wireless routing application within both static and dynamic network topologies. MANETs are self-organized and self-configured multi-hop wireless networks where the structure of the network changes dynamically due to the mobility of mobile nodes. MANETs are being increasingly used due to their decentralized and dynamic nature as well as the fact that they do not require any fixed, preexisting infrastructure. In general, there are two distinct approaches for enabling wireless mobile units to communicate with each other. They are Infrastructure-based Wireless Local Area Networks (Wireless LANs) (Murthy and Manoj 2004) and Infrastructure-less Ad hoc Wireless LANs (Jochen Schiller 2003).

Upload: hoangtruc

Post on 30-Mar-2018

236 views

Category:

Documents


4 download

TRANSCRIPT

1

CHAPTER 1

MOBILE AD HOC NETWORK

1.1 INTRODUCTION

Mobile Ad hoc Network is a collection of wireless mobile devices

such as laptops, handheld digital devices, personal digital assistants and

wearable computers forming a temporary network without the aid of any

infrastructure or centralized administration. The vision of MANET (Corson

and Macker 1999) is to form a wireless Internet, where users can move

anywhere anytime with the rest of the world and by incorporating routing

functionality into mobile nodes. The Internet Engineering Task Force (IETF)

has created a MANET working group to standardize the Internet Protocol (IP)

routing protocol functionality suitable for wireless routing application within

both static and dynamic network topologies.

MANETs are self-organized and self-configured multi-hop wireless

networks where the structure of the network changes dynamically due to the

mobility of mobile nodes. MANETs are being increasingly used due to their

decentralized and dynamic nature as well as the fact that they do not require

any fixed, preexisting infrastructure. In general, there are two distinct

approaches for enabling wireless mobile units to communicate with each

other. They are Infrastructure-based Wireless Local Area Networks (Wireless

LANs) (Murthy and Manoj 2004) and Infrastructure-less Ad hoc Wireless

LANs (Jochen Schiller 2003).

2

Infrastructure-based Wireless Network: Wireless networks have

traditionally been based on the cellular concept and relied on good

infrastructure support such as Access Point (AP) and backbone. Here mobile

devices communicate with access points as base stations connected to the

fixed network infrastructure. It is depicted in Figure 1.1(a).

Infrastructure-less Wireless Network: Figure 1.1(b) shows infrastructure-

less approach namely ad hoc wireless network, wherein the wireless devices

can communicate with each other, which is commonly known as a MANET.

A MANET is a collection of wireless nodes that can dynamically form a

network to exchange information without using any pre-existing fixed

network infrastructure.

Figure 1.1 MANET Approaches

Like wired Local Area Networks, a Wireless LAN has a

communication range typical of a single building or a cluster of buildings, i.e.,

100–500 meters. A Wireless LAN should satisfy the same requirements

3

typical of any LAN, including high capacity, full connectivity among attached

stations and broadcast capability. However, to meet these objectives, Wireless

LANs should be designed to face some issues specific to the wireless

environment, such as security on the air, power consumption, mobility and

bandwidth limitation of the air interface. Infrastructure-based Wireless LANs

require a special node called Access Point, which hosts or terminal connects

via existing wired LANs. APs can act as a router and arbiter between

mobile devices and the rest of the networks. This approach is used in

Wireless-Fidelity (Wi-Fi) hotspots to provide wireless Internet access at

coffee shops, airports, conferences and other public places.

The set of mobile nodes that are associated with a particular

AP is called the Basic Service Set (BSS). A number of BSSs can be

connected together by means of a backbone network to form an Extended

Service Set (ESS), in order to extend the Wi-Fi coverage area. In ESS, every

AP is given with the same service set identifier, which serves as a

network “name” for the network users. In many dynamic environments such

as disaster sites, battlefields and temporary conference meetings where

people and/or vehicles need to be temporarily interconnected, it may be

difficult and/or expensive to deploy infrastructure-based Wireless LANs.

For these environments, infrastructure-less or ad hoc Wireless LANs

provide a viable alternative solution.

Ad hoc Wireless LANs do not need any fixed infrastructure

and require only the mobile nodes to cooperate in a peer-to-peer fashion to

form a temporary network in order to exchange data. However, this

configuration of the Institute of Electrical and Electronics Engineering (IEEE)

802.11 standard is limited to single-hop communication which is only

applicable to mobile nodes within a mutual transmission range.

4

Due to increase in the processing power and transceiver capability

of the mobile nodes, it has become feasible to increase the communication

range of the temporary network using the mobile nodes itself as forwarding

agents and relying on the upper layers of the protocol stack for multi-hop

path formation. Therefore, mobile nodes acting as routers and it may form

the backbone of a spontaneous network that extends the range of the ad

hoc wireless LAN beyond the transmission radius of the source. This

latter category of ad hoc wireless LANs is popularly referred as MANET.

The MANET is characterized by energy constrained nodes,

bandwidth constrained links and dynamic topology. In real-time applications,

such as audio, video, and real-time data, the ad hoc networks need Quality of

Service (QoS) in terms of delay, bandwidth, and packet loss is important.

Providing QoS in ad-hoc networks is a challenging task because of the

dynamic nature of network topology and imprecise state information. Hence it

is important to have a dynamic routing protocol with fast re-routing

capability, which also provides stable route during the life-time of the flows.

The infrastructure-less approach is increasingly becoming a very important

part of communication technology, because in many contexts, information

exchange between mobile units cannot rely on any fixed network

infrastructure, but on rapid configuration of wireless connections on-the-fly.

In Infrastructure-less network, a MANET consists of a set of

mobile nodes that may communicate with one another from time to time

where no base stations are present. In MANET, each host is equipped with a

Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) (Crow et al

1997) transceiver. In such cases, a mobile node may communicate with each

other directly or indirectly. If it is an indirect communication, a multi-hop

scenario occurs, where the packets originated from the source host are relayed

by several intermediate mobile nodes before reaching the destination. The

traffic types in ad hoc networks are quite different from those in an

infrastructure-based wireless network, including:

5

Peer-to-Peer: Communication between two nodes that are within

one hop. The peer-to-peer is shown in Figure 1.2.

Figure 1.2 Peer-to-Peer Communication

Remote-to-Remote: Figure 1.3 depicts the communication between

two nodes beyond a single hop but which maintain a stable route

between them. This may be the result of several nodes staying

within the communication range of each other in a single area or

possibly moving as a group. The traffic is similar to standard

network traffic.

Figure 1.3 Remote-to-Remote Communication

6

There are various types of communications based on the type of

recipients namely unicasting, anycasting, multicasting and broadcasting.

Unicasting: One to one communication is called unicasting.

In unicasting, the packet is transmitted to a specific recipient.

Anycasting: From a single node to any one node, out of a set of

nodes.

Multicasting: Multicasting is a limited case of broadcasting in

which a subset of nodes from the entire nodes participates and

communicates among them. It is the transmission of datagrams

to a group of nodes identified by a single destination address.

Broadcasting: One to all communication is referred to as

broadcasting. The packet is transmitted to each and every node

of the network. Broadcasting is often used as a building block

for route discovery in on-demand ad hoc routing protocols. For

designing the ad hoc networks, one of the primary goal is to

reduce the broadcast overhead (redundant retransmission,

channel contention and packet collision) while reaching all the

nodes in the network.

The nodes in the MANET are not only acting as hosts but also as

routers that route data to or from other nodes in a network. In MANET, where

there is no infrastructure support as is the case with wired network since a

destination node might be out of range of a source node transmitting packets,

a routing procedure (Ramanathan and Steenstrup 1996) is always needed to

find a path as it forwards the packets appropriately between the source and the

destination. Network-wide broadcasting (Jetcheva et al 2001) provides route

7

establishment and control functionality for a number of unicast and multicast

protocols.

1.1.1 MANET Characteristics

A MANET is an autonomous system consisting of mobile nodes

which are free to move in a random manner. In MANET, mobile nodes are

equipped with wireless transceivers to communicate with each other. MANET

has the following salient characteristics (Corson and Macker 1999):

1. Dynamic Network Topologies: In MANET, mobile nodes

location changes as they move around causing the network

topology. Typically the multi-hop may change arbitrarily and

rapidly at un predictable times.

2. Bandwidth constrained variable constraints links: The

bandwidth of the wireless links in MANET are significantly

lower than the wired links. MANET has relatively low

bandwidth links, high bit error rates, unstable and asymmetric

links.

3. Energy constrained operations: Mobile devices such as

laptops and personal digital assistants rely on battery power

for their energy sources. Mobile devices act as both an end

system and a router for forwarding operation at the same time.

The important tasks of mobile devices in MANET are

wireless signal transmission, retransmission and broadcasting

operations which require battery power.

4. Physical Security: Wireless networks are more prone to the

physical security threats of eavesdropping, denial-of-service

and routing attacks when compared to wired networks.

8

1.1.2 MANET Features

Regardless of the application, there are certain features that can

determine the effectiveness and efficiency of a MANET. MANETs share

many of the properties of wired-infrastructure LANs and it posses the

following unique features (Corson and Macker 1999):

1. Autonomous nodes: In MANET, each mobile node is an

autonomous node, which may function as a host and also as a

router that relays packets along network paths.

2. Distributed operation: The nodes in a MANET should

associate among itself and each node act as a relay to

implement routing and security functions. Since there is no

background network for the central control of the network

operations, the control and management of the network must

be distributed among nodes.

3. Multi-hop routing: When delivering packets from a source

to its destination (when the sender node are not directly

connected with destination node), the packets should be

forwarded via one or more intermediate nodes.

4. Infrastructure-less network: The MANET is an autonomous

system of mobile nodes that are connected without any

infrastructure or centralized administration. Each node also

acts as a router for forwarding message to other nodes that

may not be within the same transmission range.

5. Heterogeneity: The scope of MANET applications show that

the number of mobile nodes can range from small number of

nodes to tens of thousands of nodes. The size, memory,

9

computational power and battery power of theses mobile

nodes are different from one another.

1.1.3 Applications of MANET

With the increase of portable devices as well as progress in wireless

communication, MANET is gaining more importance with the increasing

number of widespread applications. MANET can be applied anywhere where

there is little or no communication infrastructure or the existing infrastructure

is expensive or inconvenient to use.

Significant examples of MANETs include establishing survivable,

efficient and dynamic communication for emergency/rescue operations,

disaster relief efforts, and military networks. Such network scenarios cannot

rely on centralized or organized connectivity, but it can be conceived as

applications of MANET. However, MANETs are not solely intended for

disconnected autonomous operations or scaled scenarios (i.e. hundreds or

even thousands of cooperation wireless nodes in a region). They may be used

as hybrid infrastructure extensions in fixed infrastructure operations. A hybrid

infrastructure extension is a dynamic enhancement to a home or campus

wireless networking environment. It provides an extended service and allows

low-cost, low complexity dynamic adjustments to provide coverage regions

and range extensions away from the more fixed infrastructures networks.

The majority of applications for the MANET technology are in

areas where rapid deployment and dynamic reconfiguration are necessary and

the wired network is not available. There are numerous scenarios that do not

have an available network infrastructure and could benefit from the creation

of an ad hoc network. Typical applications include (Corson and Macker

1999):

10

Military battlefield: MANET would allow the military to take

advantage of commonplace network technology to maintain an

information network between the soldiers, vehicles, and military

information head quarters.

Rescue/Emergency operations: Rapid installation of a

communication infrastructure during a natural/environmental

disaster that demolished the existing communication

infrastructure like telephone lines, backbones and access points.

Commercial sector: Emergency rescue operations (like fire,

flood, earthquake, etc.,) must take place where non-existing or

damaged communications infrastructure need rapid deployment

of a communication network.

Local level: MANET can autonomously link an instant and

temporary multimedia network using notebook computers or

palmtop computers to spread and share information among

participants at a conference or classroom.

Personal Area Network (PAN): Short-range MANET can

simplify the intercommunication between various mobile

devices such as Personal Digital Assistants (PDAs), a laptop,

and a cellular phone.

Educational classrooms: Simple installation of a

communication infrastructure to create an interactive classroom

on demand.

Commercial projects: Simple installation of a communication

infrastructure for commercial gatherings such as conferences,

exhibitions, workshops and meetings.

11

1.1.4 Challenges Faced in MANET

Regardless of the attractive applications, the features of MANET

introduce several challenges that must be studied carefully before a wide

commercial deployment can be expected. These include (Corson and Macker

1999):

Routing: Since the topology of the network is constantly

changing, the issue of routing packets between any pair of nodes

becomes a challenging task. Most protocols should be based on

reactive routing instead of proactive.

Security and Reliability: MANET has security problems

particularly due to nasty neighbour relaying packets. Further,

wireless link characteristics introduce reliability problems,

because of the limited wireless transmission range, the

broadcast nature of the wireless medium (e.g. hidden terminal

problem), mobility-induced packet losses, and data transmission

errors.

Quality of Service (QoS): Providing different quality of service

levels in a constantly changing environment will be a challenge.

Internetworking: The coexistence of routing protocols, for the

sake of internetworking a MANET with a fixed network, in a

mobile device is a challenge for the mobility management.

Power Consumption: For most of the lightweight mobile

terminals, the communication-related functions should be

optimized for less power consumption (Toh 2001).

12

1.1.5 MANET Mobility Models

To thoroughly and systematically study a new MANET protocol, it

is important to evaluate its performance. Protocol simulation (Kurkowski et al

2005) has several key parameters, including mobility model and

communicating traffic pattern, among others. The Mobility model (Lin et al

2004) is designed to describe the movement pattern of mobile users, and how

their location, velocity and acceleration change over time. Since mobility

patterns may play a significant role in determining the protocol performance,

it is desirable for mobility models to emulate the movement pattern of

targeted real life applications in a reasonable way. Camp et al (2002)

described seven different synthetic entity mobility models for ad hoc

networks which are listed below:

Random Walk Mobility Model (including its many

derivatives): A simple mobility model based on random

directions and speeds.

Random Waypoint Mobility Model: A model that includes

pause times between changes in destination and speed.

Random Direction Mobility Model: A model that forces

mobile nodes to travel to the edge of the simulation area before

changing direction and speed.

A Boundless Simulation Area Mobility Model: A model that

converts a two dimensional rectangular simulation area into a

torus-shaped simulation area.

Gauss-Markov Mobility Model: A model that uses one tuning

parameter to vary the degree of randomness in the mobility

pattern.

13

A Probabilistic Version of the Random Walk Mobility

Model: A model that utilizes a set of probabilities to determine

the next position of an MN.

City Section Mobility Model: A simulation area that represents

streets within a city.

1.2 MANET AND OSI REFERENCE MODEL

The International Organization for Standardization (ISO)

proposed the Open System Interconnection (OSI) reference model (Day and

Zimmerman 1983). In OSI reference model, there are seven layers: physical,

datalink, network, transport, session, presentation and application layer. It is

primarily designed to enable multi-vendor computers to interact and

communicate. OSI defines seven layers in a hierarchy that goes from physical

to application layers as shown in Figure 1.4. OSI is still a reference model,

often used to describe and outline the different levels of networking

protocols and their relationships with each other. The communication

mechanisms of a MANET are mainly associated with the protocols operating

at layers 1 to 3 of the OSI reference model.

1.2.1 Physical Layer

The IEEE 802.11 standards (Crow et al 1997) specify a Physical

Layer (PHY) and Medium Access Control (MAC) layer for Wireless LAN.

The physical layer serves as an interface between the MAC sub layer and

wireless medium where frames are transmitted and received. The physical

layer variants include the provision of Clear Channel Assessment (CCA),

which is needed for sensing the wireless medium and indicating to the MAC

layer when a signal is detected or when the channel is busy. The Physical

14

Layer is subdivided into the Physical Layer Convergence Protocol (PLCP)

and Physical Medium Dependent (PMD) sub layer.

Application layer

Network layer

Presentation layer

Session layer

Transport layer

PHYSICAL LAYER

802.11

FHSS

PHY

802.11

DSSS

PHY

802.11 a

OFDM

PHY

802.11b

HR/DSSS

PHY

Data link

Layer

LOGICAL LINK CONTROL LAYER

(LLC)

MEDIUM ACCESS CONTROL SUB

LAYER (MAC)

Figure 1.4 The OSI Reference Model and its Relationship with MANET

The PLCP sub layer provides a carrier channel assessment and

provides a common PHY Service Access Points (SAP) with 1 / 2 Mbps

transfer rate. Finally the Physical Medium Dependent (PMD) sub layer

handles modulation and encoding and decoding of signals.

The IEEE 802.11 wireless standard support three different physical

layers: one layer based on Infra Red (IR) (Kahn and Barry 1997) and other

two layers based on radio transmission. Radio based standards operate within

the 2.4 Giga Hertz (GHz) ISM band. The 802.11 standard defines data rates of

15

1 Mbps and 2 Mbps via radio waves using Frequency Hopping Spread

Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS).

Using FHSS techniques, the 2.4 GHz band is divided into 75

channels of 1 MHz each. The sender and receiver agree on a hopping pattern,

and data is sent over a sequence of the sub channels. Each conversation within

the 802.11 network occurs over a different hopping pattern, and the patterns

are designed to minimize the chance of two senders using the same sub

channel simultaneously. The standard specifies Gaussian Shaped Frequency

Shift Keying (GSFSK) modulation scheme for the FHSS PHY. For 1 Mbps a

2 level Digital GSFSK (Chang and Shiu 2006) is used, (1 bit is mapped to one

frequency) a 4 level GFSK for 2 M bit/s (i.e., 2 bit are mapped to one

frequency).

Direct Sequence Spread Spectrum (DSSS) is the alternative spread

spectrum techniques separated by code and not by frequency. In 802.11,

DSSS spreading is achieved using a chipping sequence. IEEE 802.11 DSSS

PHY also uses a 2.4 GHz ISM band and offers both 1 and 2 Mbps data rates.

The system uses Differential Binary Phase Shift Keying (DBPSK) (Lo et al

1993) for 1 Mbps transmission and Differential Quadrature Phase Shift

Keying (DQPSK) for 2 Mbps as modulation scheme.

1.2.2 Datalink Layer

The IEEE 802.11 standard specifies a MAC layer and a Physical

Layer for Wireless LANs. The MAC layer provides to its users both

contention-based and contention-free access control on a variety of physical

layers. The basic access method in the IEEE 802.11 MAC protocol is the

Distributed Coordination Function (DCF), which is a CSMA/CA MAC

protocol. Besides the DCF, the IEEE 802.11 also incorporates an alternative

access method known as the Point Coordination Function (PCF). As the PCF

16

access method cannot be adopted in ad hoc networks. In wireless network, the

sender may apply carrier sense and detect an idle medium. The sender starts

sending but a collision happens at the receiver due to a second sender. The

sender detects no collision, assumes that the data has been transmitted without

errors, but actually a collision might have destroyed the data at the receiver.

Thus, this common MAC Scheme from wired network fails in a wireless

network. The major challenge of the MAC sublayer is the hidden node

problem (Crow et al 1997).

Figure 1.5 Hidden Node Problem

The Hidden Node Problem is depicted in Figure 1.5, when node A

wants to transmit a frame to node B, node C is not aware of this transmission

due to its distance from node A (node C is a hidden terminal for node A). If

node C simultaneously transmits a frame to node B, a collision occurs at node

B. In wireless network, many MAC protocols (Xu and Saadawl 2002) have

been designed to solve this hidden node problem through CSMA/CA scheme.

This scheme is sender initiated including an exchange of channel reservation

control frames between the communicating nodes prior to data transmission.

In this case, all the neighbouring nodes of a given communicating node need

17

to be informed that the channel will be occupied for a time period. As shown

in Figure 1.5, node A wishing to transmit a data packet to node B, node A

first broadcasts a Request To Send (RTS) control frame (Ju et al 2003)

containing the length of the data and address of node B. Upon receiving the

RTS, node B responds by broadcasting a Clear To Send (CTS) control frame

containing the length of data and address of node A. Any node overhearing

either of these two control frames remains silent for the entire transmission

period.

Considering the situation in wireless networks, where the exposed

terminal problem occurs when a node is prevented from sending packets to

other nodes due to a neighbouring transmitter. As shown in Figure 1.6, four

nodes labeled R1, S1, S2, and R2, where the two receivers (R1 and R2) are

out of range of each other, yet the two transmitters (S1 and S2) in the middle

are in range of each other. Here, if a transmission between S1 and R1 is

taking place, node S2 is prevented from transmitting to R2 as it concludes

after carrier sense that it will interfere with the transmission by its neighbour

S1. However, it is to be noted that R2 could still receive the transmission of

S2 without interference because it is out of range from S1. This is known as

Exposed Terminal Problem, depicted in Figure 1.6.

Figure 1.6 Exposed Terminal Problem

18

1.2.3 Network Layer

Residing above the data link layer, the network layer (Basagani

et al 2004) is responsible for routing packets from source to destination. In

wired network, routing paths are usually fixed since nodes are static.

However, in wireless networks, mobile nodes are free to move, resulting in

frequently changed routing paths. The wireless network layer hence needs to

take care of mobility management, such as location tracking or update

information, which is not considered in static wired networks. Network layer

provides end-to-end transmission service. Due to the dynamic nature of

MANET, the destination node may not be located within the transmission

range of the source node. Therefore, the need for a routing protocol to set up

route from source to destination and a mechanism to maintain the route, since

some links may be broken due to node mobility. The important task of

network layer includes the exchange of routing information, finding a route to

a destination and providing efficient utilization of the available

communication bandwidth of the network. As a result, a good routing

protocol should be able to solve the above issues with a low communication

overhead.

1.3 BROADCASTING IN MANET

Network-wide broadcasting (Jetcheva et al 2001) means one node

sends a packet to all other nodes in a network. Broadcasting is a building

block for unicast routing protocols such as Dynamic Source Routing(DSR)

(Johnson et al 2007), Ad hoc On-Demand Distance Vector(AODV) (Perkins

2003), Zone Routing Protocol(ZRP)(Haas et al 2002), and Location Aided

Routing(LAR) (Ko and Vaidya 1998) use broadcasting to establish routes for

delivery of packets. A MANET consists of a set of wireless mobile hosts that

may communicate with one another from time to time. In MANET, no base

stations are supported for communication among the mobile hosts. Each host

19

is equipped with a CSMA/CA transceiver. In such an environment, a host

may communicate with another directly or indirectly. In the latter case, a

multi-hop scenario occurs, where the packets originated from the source host

are relayed by several intermediate hosts before reaching the destination.

Hence it is important to carefully design an efficient broadcasting method so

as to avoid redundancy in the dissemination process for discovering the route

in the multi-hop network. Broadcasting is a major communication primitive

required by many applications and protocols in MANETs. Traditional

broadcast method often causes unproductive and harmful bandwidth

congestion and wastes node resources.

Further, broadcasting is frequently used to discover and advertise

resources. A simple example of resource discovery is the route discovery in

many reactive routing protocols. Broadcasting is also frequently used to

distribute content to all network participants, such as alarm signals or

announcements. In highly dynamic scenarios, broadcasting serves as a robust

way of realizing other communication primitives, such as multicast.

1.3.1 Design Issues

MANET consists of a set of mobile hosts that may communicate

with each other without any infrastructure and centralized administration.

Each mobile node is equipped with wireless transceiver which can access the

air medium. The nature of broadcasting is spontaneous; any mobile node can

issue a broadcast operation at any time. Collision avoidance is difficult in

overcoming the hidden node problem, where a node is able to determine

whether its neighbours are busy receiving transmissions from an uncommon

neighbour.

The 802.11 MAC (I. C. S. L. M. S. Committee 1997) utilizes a

Request To Send (RTS) / Clear To Send(CTS) / Data / Acknowledgement

20

(ACK) procedure used for hidden node problem when unicasting packets.

However, the RTS/CTS/Data/ACK procedure is too difficult to implement for

broadcast packets as it would be difficult to coordinate. Therefore, the only

requirement made for broadcasting nodes is that they assess a clear channel

before broadcasting. Unfortunately, clear channel assessment does not prevent

collisions from hidden nodes. Additionally, no recource is provided for

collision when two neighbours assess a clear channel and transmit

simultaneously.

Suppose a source node originates a broadcast packet, the radio

waves propagate at the speed of light, all neighbours will receive the

transmission simultaneously and also rebroadcast the packet at the same time.

To overcome this problem, broadcast protocols jitter the scheduling of

broadcast packets from the network layer to the MAC layer by some uniform

random amount of time. This (small) offset allows one neighbour to obtain

the channel first, while other neighbours detect that the channel is busy (clear

channel assessment fails). The jitter time can be relatively small, just enough

to allow one node access to the channel before the others.

Broadcasting protocols require a node to keep track of the

redundant packets received over a short time interval in order to determine

whether to rebroadcast or not. That time interval is termed as Random Delay

Time (RDT), it is randomly chosen from a uniform distribution between 0 and

Tmax seconds, where Tmax is the highest possible delay interval. This delay in

transmission accomplishes two things. First, it allows nodes sufficient time to

receive redundant packets and assess whether to rebroadcast. Second, the

randomized scheduling prevents the collisions.

An important design consideration is the implementation of the

random delay time. One approach is to send broadcast packets to the MAC

layer after a short random time similar to the jitter. In this case, packets

21

remain in the InterFace Queue (IFQ) until the channel becomes clear for

broadcast. While the packet is in the IFQ, redundant packets may be received,

allowing the network layer to determine if rebroadcasting is still required. If

the network layer protocol decides the packet should not be rebroadcast, it

informs the MAC layer to discard the packet.

A second approach is to implement the random delay time as a

longer time period and keep the packet at the network layer until the RDT

expires. Retransmission assessment is done considering all redundant packets

during the RDT. After RDT expiration, the packet is either sent to the MAC

layer or dropped. No attempts are made by the network layer to remove the

packet after sending it to the MAC layer. Each broadcast protocol requires

node to rebroadcast a given packet not more than one time in order to prevent

infinite transmission loops. Thus, each broadcast protocol requires that node

cache the original source node ID of the packet and the packet ID. It allows

the protocol to uniquely identify each broadcast packet and assign appropriate

behavior upon reception of a packet. This characteristic strictly avoids the

infinite loops behavior of broadcasting.

1.3.2 Applications of Broadcasting

Content Distribution Applications

A typical application for broadcasting in MANETs is news

spreading. Examples are the broadcasting of aid information in a disaster area

to coordinate relief actions (e.g. fire fighting (Karumanchi et al 1999)), the

dissemination of parking availability information in a city scenario,

dissemination of accident information in Vehicle Ad hoc NETwork (VANET)

and the dissemination of alarms and announcements. Further content

distribution applications are publish-subscribe applications, where some

nodes are subscribers to content providers. These applications typically run in

22

the background for a few hours or even a few days. Examples are Usenet-on-

fly (Becker et al 2002), latency insensitive data (Su et al 2004) and file

sharing in a peer-to-peer (P2P) manner (Lindemann and Waldhorst 2005).

Resource Discovery and Advertisement

Further typical broadcast scenarios are resource (or service)

discovery and advertisement. MANET nodes may have little or no knowledge

at all about the capabilities and services offered by each other. Therefore,

mechanisms for resource discovery or advertisement are important for these

self-configurable networks. Due to the decentralized and highly dynamic

nature of MANETs, service discovery and service advertisement frequently

use broadcasting strategies. An example of resources is a multi-hop routing

path to a given destination. For highly dynamic topologies the route is

continuously changing and the resource is so highly dynamic that maintaining

a route to all nodes at every time is very costly. However, most of the time, it

is not necessary to have an up-to-date route to all other nodes. Hence, a novel

class of reactive routing protocols, such as DSR and AODV has been

developed. Reactive routing protocols only set up routes to nodes they

communicate with and these routes are kept alive as long as they are needed.

This is realized by a route discovery mechanism, which uses broadcasting

strategies to distribute control messages for route discovery.

Sensor Data Dissemination

Another important application of broadcasting is the sensor data

dissemination. Real-time sensor data may be disseminated to other nodes in

order to realize a fully-replicated database, where every database node has a

consistent view of real time events. Data consistency algorithms act on

disseminated observation data and chronologically order observed events in

MANETs.

23

1.4 PROBLEM DEFINITION

Broadcasting is a communication primitive and important network

service for routing protocols in MANET. On-demand routing protocols such

as DSR and AODV use flooding as the basic mechanism to propagate

control message namely Route REQuest (RREQ) for determining the route

in the MANET. This simplest mechanism is known as simple flooding.

Despite its simplicity, simple flooding generates excessive amount of

redundant retransmission, channel contention and packet collision. Such a

phenomenon is referred to as broadcast storm problem and it can lead to a

collapse in the operation of the network, since it requires every node

involved to retransmit the message. Broadcasting a large number of RREQ

packets may guarantee a high chance of discovering routes to the

destinations. But, this will consume a lot of energy resources of mobile node

and cause congestion of the network. Therefore, a route discovery method

that can guarantee an efficient utilization of these limited system resources

while achieving acceptable levels of other performance metrics such as

overhead and power consumption is required.

In most existing probabilistic approaches of network-wide

broadcasting, the rebroadcast probability at a given node is fixed. Here, every

node in the network has the same probability to rebroadcast a packet

regardless of the number of its neighbouring nodes. This could lead to poor

reachability or more number of redundant retransmissions. In counter-based

scheme, packets received at a node are less than that of a threshold value.

However, most of the existing solutions are inadequate in reducing the

number of redundant broadcast while still guarantee that most nodes receive

the packet. In some cases, the schemes require near topological information or

used additional hardware devices for distance measurement or location

identification in order to reduce the redundant transmissions. The aim of this

24

thesis is to propose an efficient probabilistic scheme for MANET in order to

reduce the broadcast overhead and alleviate the broadcast storm problem.

1.5 ABOUT THE PROPOSED WORK

Simple flooding and Probability flooding are the broadcast methods

to provide a solution for network-wide broadcasting but consume more

network resources. Further k-means clustering based flooding is also

evaluated and its performance is compared with the simple and probability

flooding methods. Ideally, the rebroadcast probability p should be high in a

node located in a sparse region and relatively low in a node located in a dense

region. If the rebroadcast probability p is too low then the reachability might

be poor while if the rebroadcast probability p is set too high then many

redundant rebroadcasts might be generated.

In this work, an optimum density based model for probability

flooding is proposed and its performance is compared with the existing

broadcasting methods. This research work suggests and investigates the

performance of a new method namely optimum density based model for

probability flooding where the rebroadcast probability is determined at a

transmitting node densities and as well as its previous neighbour node’s

densities instead of assigning fixed probability for each node. The primary

goal of this research is to study the existing protocols for flooding through

network simulator-2(ns-2) simulations (Hogie et al 2006) and device a new

and efficient broadcasting method which will cause minimum broadcast

overhead in the MANET.

Secondly, the another new method namely Flooding Reduced-

Destination Sequenced Distance Vector routing protocol is proposed for

reducing the overhead due to periodic and triggered update messages using

optimum density based probability flooding in Destination Sequenced

25

Distance Vector routing protocol. By doing an extensive literature survey, the

resources for doing the proposed research on ns-2 and the required knowledge

will be acquired from various resources. First a MANET with required

number of nodes with suitable mobility and transmission power is proposed to

be constructed on ns-2. This ns-2 is widely used by academia and the research

community for simulation of MANETs and ad hoc routing protocols and can

effectively simulate an 802.11 network. The CMU/Rice University Monarch

group has made extensions to ns-2 to support mobility including ability to

simulate multi-hop wireless ad-hoc networks. The key reason for selecting ns-

2 is the fact that it supports the use of co-ordinate system by default and

without major modification should serve our purposes. The other advantage is

the simulator code for most protocols. The researchers are interested in

comparing exist for ns-2 which are freely available. A suitable version of

ns-2 is proposed to be installed on Red Hat Linux 9 for implementing the

idea. While evaluation, the various standard metrics are proposed to be used

for selecting suitable protocols. Suitable trace files will be used for measuring

various performances. The trace files will be filtered and analyzed by using

suitable perl scripts or grep utility to find the performance. Finally, based on

the information gathered from the trace files, various graphs will be prepared

for visualizing the performance of the flooding algorithms.

1.6 CONTRIBUTIONS OF THIS RESEARCH

A detailed study and analysis of the impact of broadcast mechanism

in routing protocols on network performance is done. This analysis obviously

proved the problems due to the overhead of broadcast or flooding algorithms

in their design.

An improved version of broadcast algorithm based on K-means

clustering algorithm is proposed and evaluated with suitable network

26

scenario. The performance of cluster based broadcasting is compared with the

simple flooding and probability flooding method.

This research proposes a density based broadcast approach namely

optimum density based model for probability flooding for reducing the

broadcast overhead in MANET. In several previous works, particularly in

probability based flooding schemes, the rebroadcast of a message will be done

only based on the density of a particular transmitting node. But in this

algorithm, each node will forward or rebroadcast a message based on its

density as well as its previous neighbour node’s density. This characteristic

makes this algorithm most unique and produced excellent improvements in its

performance. The simulation results reveal that the new approach improves

the route discovery process by reducing the Medium Access Control (MAC)

load, routing load, collision and power consumption when compared to

simple and probability flooding.

This research work also proposes a new method namely Flooding

Reduced-Destination Sequenced Distance Vector routing protocol for

reducing the broadcast overhead due to periodic and triggered update

messages in Destination Sequenced Distance Vector routing protocol. The

simulation results reveal that the new approach FR-DSDV improves the

network performance by reducing the Medium Access Control (MAC) load,

routing load, collision and power consumption when compared to DSDV.

1.7 LITERATURE SURVEY

1.7.1 Basic Routing Protocol Families

1.7.1.1 Distance Vector Routing Protocols

Elizabeth Royer and Chai-Keong Toh (1999) have described about

routing protocols of MANET. In distance vector routing protocols, every host

maintains a routing table containing the distance from itself to possible

27

destinations. Each routing table entry contains the next hop to the destination

and the distance to the destination. Nodes only feed the estimated link costs

for each destination (e.g. the number of hops to destination) to their

neighbours, instead of flooding the whole network. All nodes calculate the

shortest paths to the destinations using that broadcasted information.

1.7.1.2 Link State Routing Protocols

Elizabeth Royer and Chai-Keong Toh (1999) have briefed about

Link state routing protocols. These protocols keep a routing table for

complete topology, which is built up by finding the shortest path of link costs.

Link cost information is periodically transmitted and received by all nodes

using a flooding technique; these periodic floods are called Link State

Advertisements (LSA). Flooding means that a node sends out its information

to all other neighbour nodes and they forward all received information to their

neighbours and so on. Each node updates its table using the new link cost

information gathered from these floods.

1.7.1.3 Source Routing Protocols

Elizabeth Royer and Chai-Keong Toh (1999) presented about

source routing protocols. In source routing, all data packets carry their

routing information as their header. The originating node could learn this

routing information by means of a source routing protocol: When a node

receives a (broadcast) route request packet for a destination, it adds its own

address to the header and then forwards the packet. The destination uses the

recorded route in reverse order to send a route reply to the requesting node.

Thus, the originating node is provided with the complete route to the

destination. The routing decision is made at departure. Loops are avoided,

since nodes can determine if they are already in the packet header.

28

1.7.2 Types of Routing Protocols

Routing protocols are needed whenever delivered data packets need

to be handed over several nodes to arrive at their destinations. Routing

protocols have to find routes for packet delivery and make sure that the

packets are delivered to the correct destinations. The existing routing

protocols such as distance vector routing and link-state routing were

originally designed for static, wired networks and dynamic topology was not

considered. Mehran et al (2004) have classified the Routing protocols for ad

hoc networks into different categories.

Pro-active, re-active and hybrid

Centralized or distributed

Dynamic or static

As for the second criterion, when a routing protocol is centralized,

all decisions are made at a center node, whereas in a distributed routing

protocol, all nodes cooperate, usually in a symmetric way, in order to reach a

routing decision. The third criterion is concerned with the nature of the

information used for the routing process.

A dynamic protocol may change behavior according to the network

status, which can cause congestion on a link or many other possible factors. A

link may fail unexpectedly, or a new link may be added. A dynamic routing

protocol must discover these changes, automatically adjust its routing tables,

and inform other routers of the changes. The process of rebuilding the routing

tables based on new information is called convergence. Static protocols on the

other hand do not change when the network status changes and the changes

must be added manually. An example of a static protocol is flooding, in which

a node always retransmits an incoming packet, unless it has already sent the

same packet earlier.

29

Broadcasting may be used to disseminate data to all other nodes in

the network or may be used by MANET unicast or multicast routing protocols

to disseminate control information. For example, unicast protocols such as

DSR, AODV, ZRP and LAR use broadcasting to establish routes. Currently

these protocols all rely on a simple form of plain or blind flooding technique,

in which each node retransmits each received unique packet exactly one time.

The main role of broadcasting methods in routing protocols are route

discovery process, when advising an error message to erase invalid routes

from the routing table, or as an efficient mechanism for reliable multicast in a

fast-moving MANET. Generally speaking, currently known routing protocols

for ad hoc networks can be classified in three different classes: pro-active

protocols, re-active protocols and the hybrid protocols. These three classes

differ in a number of ways.

1.7.2.1 Proactive Routing Protocols

These routing protocols are similar to and come as a natural

extension of those for the wired networks. In proactive routing (Das et al

1999), each node has one or more tables that contain the latest information of

the routes to any node in the network. The two kinds of table updating in

proactive protocols are the periodic update and the triggered update. In

periodic update, each node periodically broadcasts its table in the network.

Each node just arriving in the network receives that table. In triggered update,

as soon as a node detects a change in its neighbourhood, it broadcasts entries

in its routing table that have changed as a result.

Proactive routing tends to waste bandwidth and power in the

network because of the need to broadcast the routing tables/updates.

Furthermore, as the number of nodes in the MANET increases, the size of the

table will increase; this can become a problem in and of itself. DSDV, which

is not to be suitable for large dense network. A route table at each node

30

enumerates all available destinations and the corresponding hop-count from

the node. Each route table entry is tagged with a sequence number, which is

created by a destination node. To maintain consistency of the route tables in a

dynamically changing network topology, each node transmits table updates

either periodically (periodic update) or when new significant information is

available (triggered update).

Routing information is advertised by broadcasting or multicasting.

The packets are transmitted periodically and incrementally as topological

changes are detected. Topological changes include movement of a node from

place to place or the disappearance of the node from the network. Information

about the time interval between arrival of the very first routing solution and

the arrival of the best routing solution for each particular destination is also

maintained.

On the basis of this information, a decision may be made to delay

advertising routes that are about to change, thus, reducing fluctuations in the

route tables. The advertisement of possible unstable routes is delayed to

reduce the number of rebroadcasts of possible route entries that normally

arrive with the same sequence number. Some of the Proactive routing

protocols are:

Destination-Sequenced Distance Vector (DSDV)

Wireless Routing Protocol (WRP)

Global State Routing (GSR)

Fisheye State Routing (FSR)

Source-Tree Adaptive Routing (STAR)

Distance Routing Effect Algorithm for Mobility (DREAM)

Multimedia Support in Mobile Wireless Network (MMWN)

31

Cluster-Head Gateway Switch Routing (CGSR)

Hierarchical State Routing (HSR)

Optimized Link State Routing (OLSR)

Topology Broadcast Reverse Path Forwarding (TBRPF)

Open Shortest Path First (OSPF)

1.7.2.2 Reactive Routing Protocols

Maltz et al (1999) presented on-demand routing protocols were

designed to reduce the overheads in proactive protocols by maintaining

information for active routes only. This means routes are determined and

maintained for nodes that require sending data to a particular destination.

Route discovery usually occurs by flooding a route request packets through

the network.

Reactive protocols can be classified into two categories: source

routing and hop-by-hop routing. In source routed on-demand protocols each

data packets carry the complete source to destination address. Therefore, each

intermediate node forwards these packets according to the information kept in

the header of each packet. This means that the intermediate nodes do not need

to maintain up-to-date routing information for each active route in order to

forward the packet towards the destination. Furthermore, nodes do not need to

maintain neighbour connectivity through periodic beacon messages.

The major drawback with source routing protocols is that in large

networks they do not perform well. This is due to two main reasons; firstly as

the number of intermediate nodes in each route grows, then so does the

probability of route failure. Secondly, as the number of intermediate nodes in

each route grows, then the amount of overhead carried in each header of each

packet will grow as well. Therefore, in large networks with significant levels

32

of multi-hoping and high levels of mobility, these protocols may not scale

well.

In hop-by-hop routing (also called as point-to-point routing) each

data packet only carries the destination address and the next hop address.

Therefore, each intermediate node in the path to the destination uses its

routing table to forward each data packet towards the destination. The

advantage of this strategy is that routes are adaptable to the dynamically

changing environment of MANETs, since each node can update its routing

table when receive fresher topology information and hence forward the data

packets over fresher and better routes. Using fresher route recalculations are

required during data transmission.

The disadvantage of this strategy is that each intermediate node

must store and maintain routing information for each active route and each

node may require to be aware of their surrounding neighbours through the use

of beaconing messages. Some of the reactive routing protocols are:

Ad hoc On-Demand Distance Vector (AODV)

Dynamic Source Routing (DSR)

Routing On-demand Acyclic Multi-Path (ROAM)

Light-Weight Mobile Routing (LMR)

Temporally Ordered Routing Algorithm (TORA)

Associated-Based Routing (ABR)

Signal Stability Adaptive (SSA)

Relative Distance Micro-discovery Ad hoc Routing (RDMAR)

Location-Aided Routing (LAR)

Ant-colony-based Routing Algorithm (ARA)

Flow Oriented Routing Protocol (FORP)

Cluster-Based Routing Protocol (CBRP)

33

1.7.2.3 Hybrid Routing Protocols

Hybrid protocols combine the advantages of both pro-active and re-

active routing, by locally using pro-active routing and inter-locally using re-

active routing. This is partly based on the assumption that most

communication in MANETs takes place between nodes that are close to each

other, and the assumption that changes in topology are only important if they

happen in the vicinity of a node. When a link fails or a node disappears on the

other side of the network, it has only effect on local neighbourhoods; nodes

on the other side of the network are not affected. The ZRP is an example of a

hybrid routing protocol.

In MANET, mobile nodes communicate with each other using

multi-hop wireless transceivers. There is no infrastructure such as base

stations. A big challenge in the design of ad hoc network is the development

of dynamic routing protocols that can efficiently find or establish the routes

between two communicating nodes. The routing protocol must be able to keep

up with the high degree of node mobility that often changes the network

topology frequently and unpredictably.

1.7.3 Broadcasting Methods

Ni et al (1999) classified several proposed broadcast algorithms in

two categories: deterministic and probabilistic. In a deterministic broadcast

protocol, the set of relay nodes is chosen deterministically to cover the entire

network. When a node receives a broadcast message, it will decide

deterministically whether to forward the message or not. The probabilistic

approaches require each node to rebroadcast the packet to its neighbours with

a given forwarding probability. The advantages of deterministic broadcast

schemes are low broadcast overhead and low potential packet collisions. In

34

contrast to deterministic broadcast, a probabilistic broadcast protocol usually

causes redundant retransmissions, which incurs relatively more overhead and

potential packet collisions. To solve the impact of the broadcast storm

problem several broadcast schemes have been proposed. Each of these

methods operates differently according to their inherent characteristics.

These methods can be broadly categorized into four groups as follows:

1. Simple Flooding

2. Probability Based Methods

a. Probabilistic Scheme

b. Counter-Based Scheme

3. Area Based Methods

a. Distance-Based Scheme

b. Location-Based Scheme

4. Neighbour Knowledge Methods

a. Flooding with Self Pruning

b. Scalable Broadcast Algorithm (SBA)

c. Dominant Pruning

d. Multipoint Relaying

e. Ad Hoc Broadcast Protocol (AHBP)

f. Connected Dominating Set (CDS)-Based Broadcast

Algorithm

g. Lightweight and Efficient Network-Wide Broadcast

(LENWB)

35

1.7.4 Simple Flooding Method

Ni et al (1999) described about the simple flooding with broadcast

storm problem. In simple flooding, source node broadcasts a packet to all its

neighbours. Each of those neighbours in turn rebroadcasts the packet it

receives the packet for the first time. This behaviour continues until all

reachable network nodes have received and rebroadcast the packet once. The

dissemination of packets in this way often consumes valuable network

resources such as bandwidth and node power due to redundant

retransmissions of broadcast packets. These redundant retransmissions of

packets cause high contention and collision in the network. This is known as

broadcast storm problem which can lead to a total collapse in the operation of

the network.

Jetcheva et al (2001) proposed in IETF internet draft, the use of

flooding as s simple protocol for broadcasting and multicasting in ad hoc

networks which are characterized by low node densities and/or high mobility.

Williams and Camp (2002) compared the performance of several proposed

broadcast approaches including the probabilistic, counter-based, area based

and neighbour knowledge methods.

1.7.5 Probability Based Methods

1.7.5.1 Probabilistic Scheme

Probability based method is one of the simplest and most efficient

broadcast method that have been suggested by Ni et al (1999). This method is

similar to simple flooding, except that nodes only rebroadcast with a pre

determined forwarding probability p so that every node has the same

probability to rebroadcast the message, regardless of its number of

neighbours.

36

The study of Ni et al (1999) and Tseng et al (2003) shown that the

probability scheme has poor reachability. The problem comes from the

uniformity of the algorithm; every node has the same probability to

rebroadcast the packet regardless of network topology.

Zhang and Agrawal (2005) suggested dynamic probabilistic

algorithm that combines the properties of probabilistic and counter-based

methods. In this method the forwarding probability at a node is set based on

the number of duplicate packets received at a node. But the values of a packet

counter at a node does not necessarily correspondent to the exact number of

neighbours of the node, since some of its neighbours may have suppressed

their rebroadcasts according to their local rebroadcast probability.

Cartigny and Simplot (2003) described a probabilistic scheme

where the forwarding probability p is computed from the local density n. The

authors have also introduced a fixed value parameter k to achieve high

reachability. This broadcast scheme has a drawback of being locally uniform. This

is because each node in the network determines its forwarding probability

based on the fixed efficiency parameter k which is not globally optimal.

1.7.5.2 Counter Based Scheme

In the counter-based techniques, when a node receives a broadcast

packet, it initiates a Random Assessment Delay (RAD) timer and a counter

which counts the number of received duplicate packets. When the timer

expires, if the counter exceeds the threshold value, the node assumes that all

its neighbours might have received the same packet and will not rebroadcast

the packet. Otherwise, the node will broadcast the packet. The predefined

counter threshold is the key parameter of this technique and it has been shown

in Tseng et al (2003) that transmission redundancy could be reduced by

37

choosing a threshold value between 2 and 4. The algorithm for counter-based

scheme is described as follows:

Algorithm: Counter-Based Scheme

Upon reception of a broadcast packet ‘m’ at a node X for the first time

- Initialize the packet counter C=1

- Set the RAD timer

- Wait for RAD timer to expire

- While waiting

For every duplicate packet m received

increment C by 1

- if (c < C) (here c is the counter threshold value)

Forward the packet m

else

Drop the packet m

End Algorithm.

1.7.6 Area Based Methods

Suppose a node receives a packet from a sender that is located only

one meter away. If the receiving node rebroadcasts, the additional area

covered by the retransmission is quite low. On the other side, if a node is

located at the boundary of the sender node’s transmission distance, then a

rebroadcast would reach significant additional area. Area based methods only

consider the coverage area of a transmission; they don’t consider whether

nodes exist within that area.

1.7.6.1 Distance-Based Scheme

Ni et al (1999) described the distance based scheme for reducing

the redundant rebroadcast, contention and collision. In distance-based

38

scheme, a node compares the distance between itself and each neighbouring

node that has previously forwarded a given packet. In this scheme, a node

upon reception of a broadcast packet for the first time initiates a RAD timer.

Before the expiration of the RAD timer, the node checks the location of the

senders of each received packet. If any sender is closer than a threshold

distance value (D), the node will not rebroadcast the packet. Otherwise, the

node rebroadcast it when the RAD expires. The algorithm for distance-based

scheme is described as follows:

Algorithm: Distance-Based Scheme

Upon reception of a broadcast packet m at a node X for the first time

- Initialize a RAD timer

- Before the timer expires:

Check the location of the sender of packet m.

- If the sender is closer than the threshold distance D

The packet m is dropped

else

Forward the packet m after the RAD expires

End Algorithm

Here, a node using the distance-based scheme requires the

knowledge of the geographical location of its neighbours in order to make a

rebroadcast decision. This can be achieved by Global Positioning System

(GPS) receiver, where nodes could include their location information in each

packet transmitted. Although distance-based scheme achieve high reachability

they suffer from high number of redundant broadcast packets because a node

that has received a broadcast many a time may still rebroadcast the packet if

all the neighbouring nodes transmission distances are greater than the

threshold value.

39

1.7.6.2 Location-Based Scheme

Tseng et al (2002) have described the location-based scheme,

where each node is expected to know its own position relative to the sender’s

position using geo-location technique such as GPS (Latiff et al 2005).

Whenever a node originates or forwards a broadcast packet it adds its own

location to the header of the packet. Upon the reception of a previously

unseen packet, the node initiates a waiting timer and accumulates the

coverage area that has been covered by the arrived packet. When the waiting

timer expires, if the accumulated coverage area is larger than a threshold

value, the node will not rebroadcast the packet. Otherwise, the node broadcast

the packet. The operation of the location-based scheme is summarized as

follows:

Algorithm: Location-Based Scheme

Upon reception of a broadcast packet m at a node X for the first time

- Initiate a waiting timer(RAD)

- Before the timer expires

Calculate the coverage area covered by the received packet m

- When the waiting timer expires:

- If the coverage area is larger than the threshold location L

The packet m is dropped

else

Forward the packet m

End Algorithm

Deterministic Schemes

Deterministic scheme requires some sort of topological knowledge

of the network to build a fixed backbone that guarantees full coverage of the

network for a broadcast operation. The topological knowledge of the network

is collected by maintaining information about nodes neighborhood via

40

periodic exchange of hello packets. This deterministic scheme uses only a

subset of nodes in the network to forward the broadcast packet. Williams and

Camp (2002) referred to this category as neighbour knowledge-based

algorithm. The descriptions of the various neighbour knowledge-based

schemes are presented below:

1.7.7 Neighbour Knowledge Method

1.7.7.1 Flooding with Self-Pruning

Lim and Kim (2000) and Wu and Dai (2003) presented the simple

neighbour knowledge-based method namely flooding with self-pruning. This

protocol requires that each node have knowledge of its one-hop neighbours,

which is obtained via periodic hello packets. A node includes its list of known

neighbours in the header of each rebroadcast packet. A node receiving a

broadcast packet compares its neighbour list to the sender’s neighbour list. If

the receiving node would not reach any additional nodes, it refrains from

rebroadcasting; otherwise the node rebroadcasts the packet.

4

56

1 2

7

3

Figure 1.7 Self Pruning Approach

In Figure 1.7, after receiving a message from node 2, node 1 will

rebroadcast the message to node 4 and node 3 as its only additional nodes. It

is noted that node 5 also will rebroadcast the same message to node 4

41

as it’s only additional node. In this situation still the message redundancy

takes place in the network.

1.7.8 Forwarding Neighbour Schemes

In forwarding neighbours schemes, the forwarding status of each

node is determined by its neighbours. Specifically, the sender proactively

selects a subset of its 1-hop neighbours as forwarding nodes. The forwarding

nodes are selected using a Connected Dominating Set (CDS) (Ivan et al 2002)

algorithm and the identifiers (IDs) of the selected forwarding nodes are

piggybacked on the broadcast packet as the forwarder list. Each designated

forward node in turn designates its own list of forward nodes before

forwarding the broadcast packet.

The Dominant Pruning algorithm is a typical example of the

forwarding neighbour’s schemes. Ideally, the number of forwarding nodes

should be minimized to decrease the number of redundant transmissions.

However, the optimal solution is NP-complete and requires that nodes know

the entire topology of the network.

1.7.8.1 Scalable Broadcast Algorithm

Peng and Lu (2000) presented the Scalable Broadcast Algorithm

(SBA). It requires that all nodes have knowledge of their neighbours within a

two hop radius. This neighbour knowledge coupled with the identity of the

node from which a packet is received allows a receiving node to determine if

it would reach additional nodes by rebroadcasting. 2-hop neighbour

knowledge is achievable via periodic "Hello" packets; each "Hello" packet

contains the node's identifier (IP address) and the list of known neighbours.

After a node receives a "Hello" packet from all its neighbours, it has two hop

topology information centered at itself.

42

1.7.8.2 Dominant Pruning

Dominant Pruning also uses 2-hop neighbour knowledge, obtained

via "Hello" packets, for routing decisions described in Lim and Kim (2000).

Unlike SBA, however, Dominant Pruning requires rebroadcasting nodes to

proactively choose some or all of its 1-hop neighbours as rebroadcasting

nodes. Only those chosen nodes are allowed to rebroadcast. Nodes inform

neighbours to rebroadcast by including their address as part of a list in each

broadcast packet header.

When a node receives a broadcast packet it checks the header to see

if its address is part of the list. If so, it uses a Greedy Set Cover algorithm to

determine which subset of neighbours should rebroadcast the packet, given

knowledge of which neighbours have already been covered by the sender’s

broadcast. The Greedy Set Cover algorithm, as adapted in Lim and Kim

(2000) recursively chooses 1-hop neighbours which cover the most 2-hop

neighbours and recalculates the cover set until all 2-hop neighbours are

covered.

1.7.8.3 Multipoint Relaying

Multipoint Relaying is presented in Qayyum et al (2000). It is

similar to Dominant Pruning in that rebroadcasting nodes are explicitly

chosen by upstream senders. For example, say Node A is originating a

broadcast packet. It has previously selected some, or in certain cases all, of it

one hop neighbours to rebroadcast all packets they receive from Node A. The

chosen nodes are called Multipoint Relays (MPRs) and they are the only

nodes allowed to rebroadcast a packet received from Node A. Each MPR is

required to choose a subset of its one hop neighbours to act as MPRs as well.

Since a node knows the network topology within a 2-hop radius, it can select

1-hop neighbours as MPRs that most efficiently reach all nodes within the

43

two hop neighbourhood. Qayyum et al (2000) propose the following

algorithm for a node to choose its MPRs:

They propose the following algorithm for a node to choose its

MPRs:

Find all 2-hop neighbours that can only be reached by one 1hop

neighbour. Assign those 1-hop neighbours as MPRs.

Determine the resultant cover set (i.e., the set of 2-hop

neighbours that will receive the packet from the current MPR

set).

From the remaining 1-hop neighbours not yet in the MPR set,

find the one that would cover the most 2-hop neighbours not in

the cover set.

Repeat from step 2 until all 2-hop neighbours are covered.

Multipoint Relaying is described in detail as part of the Optimized

Link State Routing (OLSR) (Clausen and Jacquet 2003) protocol defined by

an Internet draft. In this implementation, “Hello” Packets include fields for a

node to list the MPRs it has chosen. Anytime a node receives a “Hello”

packet, it checks if it is an MPR for the source of the packet. If so, it must

rebroadcast all data packets received from that source. Clearly, the update

interval for “Hello” packets must be carefully chosen and, if possible,

optimized for network conditions.

1.7.8.4 Ad Hoc Broadcast Protocol

Peng and Lu (2002) described Ad Hoc Broadcast Protocol (AHBP)

an approach similar to Multipoint Relaying. In AHBP, only nodes who are

designated as a Broadcast Relay Gateway (BRG) within a broadcast packet

44

header are allowed to rebroadcast the packet. BRGs are proactively chosen

from each upstream sender which is a BRG itself. The algorithm for a BRG to

choose its BRG set is identical to that used in Multipoint Relaying (see steps

1-4 for choosing MPRs).

AHBP differs from Multipoint Relaying in three ways:

A node using AHBP informs 1-hop neighbours of the BRG

designation within the header of each broadcast packet. This

allows a node to calculate the most effective BRG set at the

time a broadcast packet is transmitted. In contrast, Multipoint

Relaying informs 1-hop neighbours of the MPR designation via

“Hello” packets.

In AHBP, when a node receives a broadcast packet and is listed

as a BRG, the node uses 2-hop neighbour knowledge to

determine which neighbours also have received the broadcast

packet in the same transmission. These neighbours are

considered already “covered” and are removed from the

neighbour graph used to choose next hop BRGs. In contrast,

MPRs are not chosen considering the source route of the

broadcast packet.

AHBP is extended to account for high mobility networks.

Suppose Node A receives a broadcast packet from Node B, and

Node A does not list Node B as a neighbour (i.e., Node A and

Node B have not yet exchanged “Hello” packets). In AHBP-EX

(extended AHBP); Node A will assume BRG status and

rebroadcast the node. Multipoint relaying could be similarly

extended.

45

4

5

1 2

6

3

Figure 1.8 Ad hoc Broadcasting Approach

Figure 1.8 shows ad hoc broadcasting approach, node 2 has 1, 5 and

6 nodes as one hop neighbours, 3 and 4 nodes has two hop neighbours. Node

3 can be reached through node 1 as a one hop neighbour of node 2. Node 4

can be reached through node 1 or node 5 as one hop neighbours of node 2.

Node 2 selects node 1 as a gateway to rebroadcast the message to nodes 3 and

4. Upon receiving the message node 5 will not rebroadcast the message as it is

not a gateway.

1.7.8.5 Connected Dominated Set - Based Broadcast Protocol

Peng and Lu (1999) described the Connected Dominating Set

(CDS)-Based Broadcast Algorithm, a more calculation intensive algorithm for

selecting Broadcast Relay Gateways (BRGs). Where AHBP only considers

the source of the broadcast packet to determine a receiving node’s initial

cover set, CDS-based broadcast algorithm also considers the set of higher

priority BRGs selected by the previous sender.

For example, suppose Node A has selected Nodes B, C and D (in

this order) to be BRGs. When Node C receives a broadcast packet from Node

A, AHBP requires Node C to add neighbours common to Node A to the initial

cover set.

46

CDS-Based Broadcast Algorithm also requires that Node C adds

neighbours common to Node B, because Node B is a higher priority BRG.

Likewise, Node D is required to consider common neighbours with nodes A,

B and C respectively. Once the initial cover set is determined, a node then

chooses which neighbours should function as BRGs. The algorithm for

determining this is the same as that for AHBP and Multipoint Relaying.

1.7.8.6 Lightweight and Efficient Network-Wide Broadcast

Sucec and Marsic (2000) described the Lightweight and Efficient

Network-Wide Broadcast (LENWB) protocol. LENWB relies on

2-hop neighbour knowledge obtained from “Hello” packets. However, instead

of a node explicitly choosing nodes to rebroadcast, the decision is implicit. In

LENWB, each node decides to rebroadcast based on knowledge of which of

its other one and two hop neighbours are expected to rebroadcast. The

information required for that decision is knowledge of which neighbours have

received a packet from the common source node and which neighbours have a

higher priority for rebroadcasting. The priority is proportional to a node’s

number of neighbours; the higher the node’s degree the higher is the priority.

Since a node relies on its higher priority neighbours to rebroadcast, it can

proactively compute if all of its lower priority neighbours will receive those

rebroadcasts; if not, the node rebroadcasts.

Fei Dai and Jie Wu (2005) proposed and implemented an efficient

broadcast protocol for ad hoc networks using directional antennas. This

protocol, called Directional Self-Pruning (DSP), is a non-trivial generalization

of an existing localized deterministic broadcast protocol using omni

directional antennas. Compared with its omni directional predecessor, DSP

achieves much lower broadcast redundancy and conserves bandwidth and

energy consumption. DSP is based on 2-hop topology information and does

not rely on any location or Angle-of-Arrival (AoA) information.

47

A special case of DSP can be used for preserving shortest paths in

on-demand route discovery processes. Another special case of DSP is

proposed to use the directional reception mode in broadcasting. It is proved

that the average number of forward nodes in DSP is within a constant factor

of the minimal value in an optimal solution. Extensive simulation results

show that DSP outperforms many existing directional and omni directional

broadcast protocols in terms of efficiency and/or reliability.

Jie Wu and Fei Dai (2004) proposed and evaluated a mobility

management method based on the use of two transmission ranges. Using this

mechanism, it can also be extended Wu and Dai’s coverage condition to a

dynamic environment where network topology is allowed to change, even

during the broadcast process. In addition, connectivity, link availability, and

consistency issues related to neighbourhood information of different nodes

have also been addressed. This scheme can also be extended to provide

mobility management for other activities such as topology control in

MANETs.

Ivan et al (2002) proposed the broadcasting method significantly to

reduce or eliminate the communication overhead of a broadcasting task by

applying the concept of neighbouring nodes. Retransmissions by only internal

nodes in a dominating set are sufficient for reliable broadcasting. It is also

proposed to eliminate neighbours that already received the message and

rebroadcast only if the list of neighbours that might need if the message is

nonempty. The important features of this work is reliability (reaching all

nodes in the absence of message collisions), significant rebroadcast savings,

and their localized and parameter less behavior. The reduction communication

overhead for broadcasting take is measured experimentally.

Liu et al (2007) presented a distributed and efficient flooding

scheme. The authors first study the sufficient and necessary condition of

48

100% deliverability for flooding schemes that are based on only one-hop

neighbor information. The proposed flooding algorithm achieves the local

optimality in two senses: 1) the number of forwarding nodes in each step is

the minimal; 2) the time complexity for computing forwarding nodes is the

lowest, which is O (n log n), where n is the number of neighbors of a node.

1.7.9 Summary

In this chapter, the description of routing protocols and its

classification are described. On-demand routing protocols are designed to

reduce the overheads in proactive protocols by maintaining information for

active routes only. This means routes are determined and maintained for

nodes that require sending data to a particular destination. In proactive

routing, each node has one or more tables that contain the latest information

of the routes to any node in the network. The two kinds of table updating in

proactive protocols are the periodic update and the triggered update. In

periodic update, each node periodically broadcasts its table in the network.

Each node just arriving in the network receives that table. In triggered update,

as soon as a node detects a change in its neighbourhood, it broadcasts entries

in its routing table that have changed as a result. This chapter has also

provided a general overview of the existing various broadcasting methods

proposed in MANETs including simple flooding, probabilistic schemes,

neighbour knowledge-based, distance-based, location-based and counter-

based schemes.

From the literature survey, it concludes that simple flooding

requires each node to rebroadcast all packets. In simple flooding, where each

mobile node forwards every received packet exactly once. Simple flooding

guarantees that packets reach every node in the network, but it produces high

redundant retransmissions in MANET. To reduce the broadcast storm

problem in flooding, a number of broadcasting methods have been suggested

49

in the literature. The broadcasting methods can be categorized into

deterministic and probabilistic. The deterministic scheme requires global

network topological information to build a virtual backbone that covers all the

nodes in the network. It is not scalable because of the excessive overhead

associated with building and maintaining network topological information

especially in the presence of mobility.

In probabilistic flooding method, each node decides to rebroadcast

based on same fixed probability p. The problem of probability flooding is

fixed probability or uniformity of the algorithm; every node has the same

probability to rebroadcast the packet, regardless of its number of neighbours.

The poor reachability exhibited by the fixed probability is due to assigning the

same forwarding probability at every node in the network. In an attempt to

address this issue, this thesis proposes a new broadcasting method namely

optimum density based model for probability flooding to reduce the redundant

rebroadcasts by assigning forwarding or rebroadcast probability for a node

based on the type of network namely dense and sparse network. In this

method, the rebroadcast probability for a node is based on its densities and as

well as densities of its previous neighbor node instead of assigning fixed

rebroadcast probability for each node in MANET.

1.8 OUTLINE OF THE THESIS

This thesis has been arranged in seven chapters. A brief description

of each chapter is given below.

Chapter 1 provides an introduction to the MANET, characteristics

of MANET, features and applications of MANET, OSI reference model,

broadcasting in MANET, problem definition, proposed work, contributions of

the research, literature review and thesis organization.

50

Chapter 2 presents the analysis of the impact of broadcast

mechanism in proactive routing protocol (DSDV) and reactive routing

protocols (DSR and AODV) on network performance. This chapter also

analysis the performance of cluster based broadcasting in MANETs and its

performance is compared with the basic flooding and probability based

flooding method.

Chapter 3 presents a proposed broadcast method namely optimum

density based model for probability flooding algorithm. The performance of

the optimum density based model for probability flooding is compared with

the existing broadcasting methods such as simple flooding and probability

flooding method.

Chapter 4 presents a second proposed method namely flooding

reduced-destination sequenced distance vector routing protocol for reducing

the broadcasting overhead in destination sequenced distance vector routing

protocol using density based flooding method. The performance of the

proposed method is compared with the existing destination sequenced

distance vector routing protocol.

Chapter 5 summarizes the results presented in this thesis and

discusses some possible directions for future research work.