neighborhood-based route discovery protocols for mobile ad

24
Neighborhood-based Route Discovery Protocols for Mobile Ad hoc Networks Sanaa A. Alwidian 1*, Ismail M. Ababneh 2, and Muneer O. Bani Yassein 31 Department of Computer Science and Applications The Hashemite University, Zarqa 13115, Jordan 2 Department of Computer Science Al al-Bayt University, Mafraq 25113, Jordan 3 Department of Computer Science Jordan University of Science and Technology, Irbid 21100, Jordan E-mail: [email protected] E-mail: [email protected] E-mail: [email protected] * Corresponding author. Tel: +962 5 390 3333 ext. 4786; E-mail: [email protected] Abstract: Networkwide broadcasting is used extensively in mobile ad hoc networks for route discovery and for disseminating data throughout the network. Flooding is a common approach to performing network-wide broadcasting. Although it is a simple mechanism that can achieve high delivery ratio, flooding consumes much of the communication bandwidth and causes serious packet redundancy, contention and collision. In this paper, we propose new broadcast schemes that reduce the overhead associated with flooding. In these schemes, a node selects a subset of its neighbors for forwarding the packet being broadcast to additional nodes. The selection process has for goal reducing the number of neighbors and maximizing the number of nodes that they can reach (i.e., forward the packet to). By applying this novel neighborhood- based broadcasting strategy, we have come up with routing protocols that have very low overhead. These protocols were implemented and simulated within the GloMoSim 2.03 network simulator. The simulation experiments show that our routing protocols can reduce the overhead for both low and high mobility substantially, as compared with the well-known and promising AODV routing protocol. In addition, they outperform AODV by increasing the delivery ratio and decreasing the end-to-end delays of data packets. Keywords: MANET, AODV, Broadcasting, Flooding, Route Discovery 1. Introduction A Mobile Ad hoc Network (MANET) is an autonomous ad hoc network consisting of a collection of mobile nodes that utilize wireless transmission for communication and cooperation. MANETs are self-configured, self-organized and self-controlled, without reliance on any pre- existing infrastructure or centralized access points. Therefore, they can be deployed anytime and anywhere. The numerous applications of MANETs include search and rescue operations, academic and industrial applications, and Personal Area Networks (PANs).

Upload: others

Post on 11-Feb-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Neighborhood-based Route Discovery Protocols for Mobile Ad hoc Networks

Sanaa A. Alwidian1*†

, Ismail M. Ababneh2‡

, and Muneer O. Bani Yassein3ᶲ

1Department of Computer Science and Applications

The Hashemite University, Zarqa 13115, Jordan

2Department of Computer Science

Al al-Bayt University, Mafraq 25113, Jordan

3Department of Computer Science

Jordan University of Science and Technology, Irbid 21100, Jordan

E-mail: [email protected]

E-mail: [email protected] ᶲ E-mail: [email protected]

* Corresponding author. Tel: +962 5 390 3333 ext. 4786; E-mail: [email protected]

Abstract: Network–wide broadcasting is used extensively in mobile ad hoc networks for route

discovery and for disseminating data throughout the network. Flooding is a common approach

to performing network-wide broadcasting. Although it is a simple mechanism that can achieve

high delivery ratio, flooding consumes much of the communication bandwidth and causes

serious packet redundancy, contention and collision. In this paper, we propose new broadcast

schemes that reduce the overhead associated with flooding. In these schemes, a node selects a

subset of its neighbors for forwarding the packet being broadcast to additional nodes. The

selection process has for goal reducing the number of neighbors and maximizing the number of

nodes that they can reach (i.e., forward the packet to). By applying this novel neighborhood-

based broadcasting strategy, we have come up with routing protocols that have very low

overhead. These protocols were implemented and simulated within the GloMoSim 2.03 network

simulator. The simulation experiments show that our routing protocols can reduce the overhead

for both low and high mobility substantially, as compared with the well-known and promising

AODV routing protocol. In addition, they outperform AODV by increasing the delivery ratio and

decreasing the end-to-end delays of data packets.

Keywords: MANET, AODV, Broadcasting, Flooding, Route Discovery

1. Introduction

A Mobile Ad hoc Network (MANET) is an autonomous ad hoc network consisting of a

collection of mobile nodes that utilize wireless transmission for communication and cooperation.

MANETs are self-configured, self-organized and self-controlled, without reliance on any pre-

existing infrastructure or centralized access points. Therefore, they can be deployed anytime and

anywhere. The numerous applications of MANETs include search and rescue operations,

academic and industrial applications, and Personal Area Networks (PANs).

A node in a MANET is required to operate as a host as well as a router that can forward

packets so that they can reach nodes that do not reside within the transmission range of the

source node. The topology of MANETs is dynamic. Nodes are free to change their physical

location by moving freely in all directions (Yao Yu et al., 2009 ).

A Network Wide Broadcast (NWB) is a common operation that is used extensively in

MANETs to discover routes and to disseminate data throughout the network. Flooding is a

common operation that is used to perform NWB. Flooding refers to the process whereby a node

rebroadcasts a packet when it receives it for the first time (Rogers et al., 2005). Although

flooding is simple and can achieve delivery to a large percentage of nodes in the network, it has

been shown to be expensive and wasteful; it consumes much of the communication bandwidth,

wastes network resources and causes serious redundancy, contention and collision, which are

collectively referred to as the broadcast storm problem (Ni et al., 2002).

Many researchers have identified the disadvantages of flooding, and they suggested various

solutions in the literature (Ni et al., 2002; Tseng et al., 2003). Several of these solutions use a

fixed threshold value (Bani Yassein et al., 2009; Sasson et al., 2003). A node that receives a

broadcast packet participates in the NWB only if some local measure meets the threshold value.

Some other schemes build a virtual backbone whose task is to disseminate the broadcast packet

throughout the network (Alzoubi et al., 2002; Clausen & Jacquet, 2003) . Only backbone

members are responsible for broadcasting packets. This approach is vulnerable to transmission

losses and poor robustness, measured in terms of achieved coverage in the presence of losses.

The virtual backbone becomes disconnected when a node moves away from its neighbor or

neighbors. Also, location-based schemes were proposed. An issue with these schemes is that they

depend on node location information that is typically provided by additional equipment, such as

GPS devices (Williams & Camp, 2002).

The main goal of the protocols proposed in this paper is also to reduce the overhead resulting

from flooding. However, the strategy we propose is based on selecting a subset of neighbors that

can forward a broadcast packet to a large number of nodes. Our protocols do not require distance

measurement or exact location determination devices. A forwarding node that receives the

broadcast packet selects a subset of its neighbors based on their ability to reach additional nodes,

and only the selected neighbors will continue the broadcasting process. To begin with, the source

node selects its forwarding neighbors that will participate in the process. By applying this

strategy, we have, in particular, come up with route discovery protocols that have very low

overhead. Yet, they are able to adapt quickly to changes in the network topology, providing also

high packet delivery ratio and low end-to-end delay. The proposed protocols have been

implemented and simulated using the GloMoSim 2.03 network simulator.

The rest of this paper is organized as follows. Section 2 contains a review of previous

research work related to network-wide broadcasting. In Section 3, we present the proposed

neighborhood-based schemes. In Section 4, we discuss the simulation environment, the

simulation parameters and the various performance metrics that are measured in the simulations.

In addition, the simulation results are presented and analyzed. Simulation results for larger area

are presented in Section 5. Finally, in Section 6, we conclude this paper and provide directions

for future work.

2. Related Work

In Mobile Ad hoc Networks, NWB is used extensively for many purposes, including route

discovery, address resolution and carrying out other network layer tasks (Rogers & Abu-

Ghazaleh, 2005). For instance, reactive routing protocols such as AODV (Perkin et al., 1999)

and DSR (Johnson, 1994) benefit from the information gathered while broadcasting route request

packets in maintaining a route table at every node. However, due to the dynamic nature of

MANETs, routes break often and routing protocols are required to update the route tables

frequently, causing a large number of broadcast messages to be disseminated across the network.

In the literature, there are many schemes proposed for broadcasting in MANETs. They have been

classified into the following five categories: simple, probabilistic, counter-based, area-based and

neighbor-knowledge-based flooding (Ni et al., 2002; Williams et al, 2002).

In simple flooding (Ni et al., 2002), a node broadcasts a received packet provided that it did

not broadcast it before. Packets received previously are discarded. In this naïve flooding, a node

rebroadcasts a packet at most once. Thus, the total number of rebroadcasts is in Θ(N), where N is

the number of nodes in the MANET (Zhang & Agrawal, 2005). Although simple flooding is a

straightforward approach that aims to reach every node in the network, it consumes much of the

communication bandwidth, wastes network resources and causes serious redundancy, contention

and collision, which are referred to as the broadcast storm problem (Ni et al., 2002).

Probabilistic schemes (Haas et al., 2002) have been proposed for broadcasting/multicasting in

wired and wireless networks. In such schemes, and upon receiving a new broadcast packet, a

mobile host rebroadcasts that packet according to a specific probability, P (Sasson et al., 2003).

It is obvious that when P=1, the probability-based approaches become similar to simple

flooding. The proposed probability-based schemes are differentiated based on the method used

for determining the value of P.

Sasson et al. (2003) have proposed a probabilistic approach so as to reduce the redundant

transmission of packets encountered in simple flooding and alleviate the broadcast storm

problem. In this approach, a broadcast probability, P, is assigned in advance. Upon receiving a

packet, a node rebroadcasts that packet according to the specified probability. It is demonstrated

in the literature that the best value of P is around 0.7 (Tseng et al., 2003). Probabilistic flooding

achieves good results compared with simple flooding. It reduces transmission redundancy, while

being able to reach a large percentage of nodes. However, this approach uses the same

probability without taking the density of the node's neighborhood area into consideration. For

example, if the node is in a dense area (i.e., has many neighbors), the packet can reach the same

set of nodes many times, resulting in broadcast redundancy. The broadcast probability should be

set low in nodes located in dense areas. On the other hand, if the transmitting node has a small

number of neighbors (i.e., it is located in a sparse area), it is less likely that the broadcast packet

will reach the hosts in the transmission area of the node, thus the broadcast probability should be

high (Bani Yassein et al., 2005).

Zhang et al. (Zhang & Agrawal, 2005) proposed a dynamic probabilistic scheme that

combines both probability-based and counter-based approaches. In this approach, a counter is

maintained at each node for counting the number of times a packet has been received. The packet

counter is used as density estimator, although it does not necessarily correspond to the exact

number of neighbors. Indeed, some neighbors may have suppressed their rebroadcasts according

to their local rebroadcast probability (Zhang & Agrawal, 2005). The probability P is increased if

the value of the packet counter is low (or equivalently if the current node is located in a sparse

neighborhood), and it is decreased if the value of a packet counter is high. Compared with the

probabilistic approaches where P is fixed, this dynamic approach has achieved higher throughput

since the total number of rebroadcasts is reduced. However, the decision to rebroadcast or not is

made after some delay.

Bani-Yassin et al. (2006) have proposed a dynamic probabilistic approach, where the

broadcast probability, P, is dynamically adjusted based on network density. To adjust the

probability, short HELLO packets are used to count one-hop neighbors. If the number of

neighbors is high, this indicates that the node is in a dense area. Thus, the chance of receiving

numerous rebroadcasts of the same packet is high, and the probability P is set low to avoid

redundancy. On the other hand, if the number of neighbors is small, P is set high to increase the

chance of reaching the neighbors.

In counter-based approaches, a specific threshold value is used, and the mobile host

rebroadcasts the packet only if the number of copies received by that host is less than the

threshold value (Sasson et al. 2003). The counter-based schemes control flooding by inhibiting

the rebroadcast of a message if it has been received more than a fixed number of times. It is

assumed that additional node coverage is not significant if the threshold value is exceeded.

Counter-based schemes can achieve high delivery ratio and throughput, but they suffer from

relatively long delays.

Area-based approaches (Williams & Camp, 2002) make use of geographical information that

is provided by GPS devices or physical layer support. Such additional information is exploited in

making broadcasting decisions that control flooding and reduce redundant rebroadcasts. The

reliance on GPS and other location devices is a disadvantage of the area-based approaches.

Neighbor-knowledge-based schemes make rebroadcast decisions depending on information

on neighboring nodes obtained by exchanging HELLO messages. One example of such

approaches is flooding with self-pruning (Peng & Lu, 2000). In this scheme, a 1-hop neighbor

list is maintained at each host, and this list is added to every broadcast packet. Upon delivering a

packet to the neighbors of a node, each neighbor compares its list of neighbors with the list

recorded in the packet. A packet is rebroadcast if some neighbors of the receiving node are not

included in the list recorded in the packet. An issue with this scheme is that redundancy is not

avoided. Two or more neighbors may have a common neighbor that is not listed in the packet,

and these neighbors will broadcast the packet so as to reach this neighbor.

3. The Proposed Schemes

Our proposed broadcast schemes use a novel neighborhood-based approach for dynamically

selecting the group of nodes that forward the broadcast message. The source node selects a

subset of its 1-hop neighbors for forwarding the broadcast packet, includes their addresses in the

packet header, and broadcasts the packet. A node that receives a broadcast packet is a forwarding

node if its address is included in the packet header. Otherwise, it drops the packet. Forwarding

nodes repeat the same process carried by the source.

The two broadcast schemes we propose differ in the method used for selecting forwarding

nodes. In the first method, a number of 1-hop neighbors that have the largest number of

neighbors are selected as forwarding nodes. In the second method, a subset of 1-hop neighbors

that can reach all 2-hop neighbors forms the forwarding group. The two schemes are respectively

referred to as the Broadcast-based K-Neighbor Scheme, and the Broadcast-based Covering

Neighbors Scheme. Below, they are described within the context of on-demand route discovery.

In this case, the packet being broadcast is the Route REQuest (RREQ) packet, and the goal is

finding a path to a destination node. When a RREQ packet reaches its destination node, the

destination sends a reply to the source of the request, and it does not forward the packet.

Information on neighbors that is used in the proposed schemes is obtained via HELLO messages

that are exchanged periodically, as in AODV.

3.1. Broadcast-based K-Neighbor Scheme (BKNS) This scheme is an on-demand, broadcast-based ad hoc route discovery protocol that is designed

for MANETs. The main goal of this scheme is to control the flooding process by reducing

redundant broadcasts, which reduces the routing overhead. To facilitate the understanding of

BKNS, we present a human activity called “cooperative search for a fugitive”, and adopt its

logic in BKNS.

3.1.1 The Cooperative Search for a Fugitive

We are in a police station, S, in a city, and we want to look for a fugitive hiding in a house, D.

We assume that we do not know where the house is, and city dwellers are very cooperative. We

can start the search process at the police station by searching in K (e.g., 3) neighboring houses

that have the largest number of neighbors. From each of these houses, we are guided by their

inhabitants to up to K neighbors that they know have the largest number of neighbors. A

condition is that we never continue the search process from a house reached previously. Using

this search method, we may be unable to find the house D, although we will likely reach most

city houses. For example, D may be located in a sparse section of the city. Upon failure, we can

make a thorough (naïve flooding) search starting from the police station.

3.1.2 Implementation of BKNS

BKNS is implemented based on the cooperative search described above, where S is the source of

the broadcast packet, D is its destination, and the houses and neighboring houses represent

MANET nodes at relevant time instances.

Figure 1 represents the topology of a MANET at some time instance. In BKNS, each node

maintains a parameter called the degree of the node, where the degree of node X, degree(X), is

the number of neighbors of this node. The degree of a node is equal to the size of that node’s

neighbor table, nbrTable. This table contains an entry for each neighbor from which a HELLO

message was received within the previous time-period, called the hello-interval. In Figure 1,

degree (S) =3, degree(C) = 12, degree (B) = 5 and degree (A) = 2.

Every hello-interval, each node broadcasts a HELLO message containing its address and

degree. Upon receiving the HELLO message, a node updates its routing and neighbor tables,

such that an entry will be added in both tables for the node that sent the HELLO message, if it is

not already in the table of neighbors.

At any time, the neighbor table of node X, nbrTable(X), will contain the addresses of all X’s

1-hop neighbors and their degrees. The neighbor table entries are sorted in the decreasing order

of the degree field. When a source node S wishes to communicate with a destination D, and there

is no known route to this destination, it prepares a RREQ message and selects the first K one-hop

neighbors that have the largest degrees as forwarding nodes. Through simulation experiments,

we have tried K = 1, 2, .., 8, and have found that choosing K = 4 as the maximum number of

forwarding nodes achieves good results for the simulation parameters considered. However,

using K = 4 does not achieve good results in environments with low density. In this case, the

performance of BKNS becomes almost exactly the same as the performance of AODV, since

almost all nodes will participate in the route discovery process. That is, the value of K should

depend on node density.

We have experimented with K being a fraction of the number of neighboring nodes, N.

Extensive simulation empirical evidence shows that K= 𝑵

𝟑 performs very well for various

densities. In what follows, we limit ourselves to this variant of BKNS.

After determining its K candidate neighbors, the source node appends their addresses to the

RREQ message. Upon receiving the RREQ message, only those nodes whose addresses are

among the K-neighbors’ addresses will process the message and rebroadcast it further, as shown

in Figure 2. The scheme BKNS is shown below in Figure 3.

C

S

A B

Figure 1: A MANET topology

1. Periodically, every HELLO_INTERVAL, broadcast a HELLO message containing own

address and degree.

2. On receiving a HELLO message :

3. update nbrTable(X), so that it will contain <1-hop neighbor address, 1-hop neighbor

degree > for neighbors.

4. maintain the nbrTable(X) entries sorted in decreasing order according to the degree

field.

5. if X needs to communicate with a destination D, the following actions take place:

6. if a route exists to the destination

7. use it.

8. else

9. prepare a RREQ message, select the first K neighbors, and appends their addresses

to the RREQ message to be sent, where K= 𝑵

𝟑 .

10. Upon receiving an RREQ message, the following actions take place:

11. if the recipient node is the destination, respond to the source.

12. else

13. only those intermediate nodes whose addresses are in the RREQ message will

process the RREQ and rebroadcast it further.

14. If no response is received from D and the number of RREQ retries have been exhausted

15. source sends a flooding RREQ packet.

Figure 3: BKNS implementation algorithm

Figure 2: BKNS broadcast example

3.2. Broadcast-based Covering Neighbors Scheme (BCNS)

This is the second ad hoc, on-demand, broadcast-based scheme that we propose for controlling

flooding and reducing its overhead. In BCNS, the forwarding one-hop neighbors of a particular

node are selected such that they cover all of that node’s two-hop neighbors. For a node X, we

refer to the set of X's one-hop neighbors that cover all of its two-hop neighbors as

CoveringSet(X), and the set of the two-hop neighbors as SuperSet(X). An important aspect of

constructing CoveringSet is to keep this set as small as possible. This is because the smaller the

set, the less the overhead. Unfortunately, the task of selecting the optimal covering set with

minimum size is an NP-hard problem (Wikipedia, Accessed June, 2009). Therefore, in our

BCNS scheme, we propose a greedy algorithm as a heuristic for constructing the CoveringSet, as

illustrated in the next subsection. The idea of our BCNS scheme is clarified in Figure 4.

For a node to calculate its CoveringSet, it requires the set of its 1-hop neighbors and 2-hop

neighbors. To obtain the list of 1-hop neighbors, we depend on periodic HELLO messages that

are sent periodically (every HELLO_INTERVAL) by each of the nodes. To obtain the list of 2-

hop neighbors, a node sends a list of its own neighbors with the HELLO message it transmits

periodically. The proposed BCNS scheme has been implemented using the algorithm shown in

Figure 5a.

Figure 4: BCNS scheme concept

3.3. Heuristic for Calculating the CoveringSet

Let us refer to the set of all 1-hop neighbors of node Y as 1-hop(Y), and the set of all

neighbors of 1-hop neighbors of Y as 2-hop(Y). In addition, let SuperSet(Y) denote the set of

unique 2-hop neighbors of Y. We have: SuperSet(Y) =∪∀ 𝑖 ϵ 2−ℎ𝑜𝑝 𝑌 . The subset of 1-hop(Y)

that covers 2-hop(Y) (i.e., CoveringSet(Y)) is computed by the algorithm shown in Figure 5b.

1. Periodically, every HELLO_INTERVAL, broadcast a HELLO message containing own

address, degree and list of addresses of 1-hop neighbors.

2. On receiving a HELLO message at a node X:

3. Update nbrTable(X), so that it will contain <1-hop neighbor’s addresses, 1-hop neighbor’s

degree, 2-hop neighbor’s addresses>.

4. Sort the contents of nbrTable(X) in the descending order of the degree field.

5. If X needs to communicate with a destination D, the following actions take place:

6. If a route exists to the destination.

7. use it

8. Else

9. find a subset of 1-hop neighbors that cover all 2-hop neighbors by applying the

CoveringSet(Y) heuristic shown in Figure 6.

10. Prepare a RREQ message, and include the addresses of the nodes in the CoveringSet(X) in

the RREQ message.

11. Upon receiving an RREQ message, the following actions take place:

12. If the recipient node is the destination.

13. done.

14. Else

15. only those intermediate nodes whose addresses are in the RREQ message will process

the RREQ and rebroadcast it further.

16. If the destination is not found and the RREQ_RETRIES timer expires

17. source sends a flooding RREQ packet.

Figure 5a: BCNS implementation algorithm

4. Performance Analysis

In this research, we evaluate the performance of two routing protocols that are based on the

proposed route discovery schemes and compare them with AODV, where route discovery is

based on flooding.

We have implemented the proposed BKNS and BCNS route discovery schemes within the

GloMoSim network simulator version 2.03 (Zeng et al., 1998). This simulator already contains

an implementation of AODV. In our simulation experiments, we model a network of 10, 20, and

50 nodes. The nodes are placed randomly in a rectangular flat area. Two different areas of

dimensions equal to 600 m × 600 m and 1000 m × 1500 m were considered. The goal of using

the larger area is to experiment with longer paths (i.e., paths with more hops) and lower node

densities. The network bandwidth is 2 Mbps and the medium access control (MAC) layer

protocol is IEEE 802.11. For experiments that investigate the effect of speed, the maximum node

velocities (MaxSpeed) considered are 1, 5, 10, 20 and 50 m/s. Node velocities are distributed

uniformly over the interval [0, MaxSpeed]. Additional simulation parameters are shown in Table

1. Parameter values adopted in this work have been used in the literature (e.g., (Trung et al.,

2007)). Each simulation run lasts for 300 seconds, and runs are repeated ten times with different

random seeds.

Input: nbrTable(Y) - neighbor table for node Y.

Output: CoveringSet(Y).

1. If 2-hop(Y)==NULL

2. return (0)

3. Else

4. SuperSet(Y) =∪∀ 𝑖 ϵ 2−ℎ𝑜𝑝 𝑌 .

5. Initialize CoveringSet(Y) to .

6. For nodes in the sorted 1-hop(Y) list do:

7. check if the current node has a path to some nodes in SuperSet(Y) and add it

to CoveringSet(Y).

repeat until all nodes in the original SuperSet(Y) computed in 4 are covered by

CoveringSet(Y).

return (CoveringSet(Y)).

Figure 5b: Covering set construction heuristic

Table 1: General simulation parameters

Parameter Value

Simulator GloMoSim 2.03 Routing protocols evaluated AODV, BKNS, BCNS Simulation time 300 s Number of nodes 10, 20, and 50 nodes Simulation area 600 m 600 m or 1000 m 1500 m Transmission range 250 m Movement model Random-waypoint Traffic type Constant Bit Rate (CBR) Data payload 512 bytes/packet Packet rate 1, 2, 4, 6, and 8 packets/s Link bandwidth 2 Mbps

4.1. Performance Metrics

In comparing the performance of the protocols considered in this paper, we have used several

common performance metrics. These are the control overhead, packet delivery ratio, end-to-end

delay, and saved rebroadcasts (Sun et al., 2008).

Control overhead

The control overhead (overhead, for short) represents the ratio of the number of control packets

generated by the protocol to the number of data packets received by the destinations. It is

computed as follows:

𝑂𝑣𝑒𝑟ℎ𝑒𝑎𝑑 = 𝑁𝑜. 𝑜𝑓 𝑐𝑜𝑛𝑡𝑟𝑜𝑙 𝑝𝑎𝑐𝑘𝑒𝑡𝑠 𝑠𝑒𝑛𝑡

𝑁𝑜. 𝑜𝑓 𝑑𝑎𝑡𝑎 𝑝𝑎𝑐𝑘𝑒𝑡𝑠 𝑟𝑒𝑐𝑒𝑖𝑣𝑒𝑑

Packet Delivery Ratio

The Packet Delivery Ratio (PDR) is the ratio of the number of data packets received by

destination nodes to those sent by the source nodes. The PDR is computed as follows:

𝑃𝑎𝑐𝑘𝑒𝑡 𝐷𝑒𝑙𝑖𝑣𝑒𝑟𝑦 𝑅𝑎𝑡𝑖𝑜 = 𝑁𝑜. 𝑜𝑓 𝑝𝑎𝑐𝑘𝑒𝑡𝑠 𝑟𝑒𝑐𝑒𝑖𝑣𝑒𝑑

𝑁𝑜. 𝑜𝑓 𝑝𝑎𝑐𝑘𝑒𝑡𝑠 𝑠𝑒𝑛𝑡

Average end-to-end delay

This performance parameter represents the average delay between the time when the data packet

originates at the source node and the time it reaches the destination node.

Saved Rebroadcasts

The saved rebroadcasts performance parameter represents the ratio of the number of route

request (RREQ) packets retransmitted to the total number of route request (RREQ) packets

received by the nodes (Hanashi et al., 2008). Let r be the number of RREQ packets that are

received by the nodes, and let t be the number of RREQ packets that they retransmit, the

percentage of saved rebroadcasts is computed as follows:

𝑆𝑎𝑣𝑒𝑑 𝑅𝑒𝑏𝑟𝑜𝑎𝑑𝑐𝑎𝑠𝑡𝑠 = 𝑟 − 𝑡

𝑟∗ 100%

4.2. Simulation Results and Analysis

In the following subsections, we present and analyze the simulation results obtained for various

input parameters. Unless it is specified otherwise, the results are shown for the 600 m × 600 m

area.

4.2.1. Effects of Speed and Number of Traffic Generators:

The purpose of the simulation experiments summarized in this subsection is to study the effect of

the speed of nodes on the performance of the protocols using different numbers of constant bit

rate (CBR) traffic generators. In these experiments, MaxSpeed is varied from 1m/s to 50 m/s. We

have conducted many experiments for 10, 15 and 20 CBR traffic sources, where each source

generates a traffic load of 4 packets/s. However, Due to space limitations, we will present the

simulation results for 20 sources.

In Figure 6, BKNS and BCNS generate substantially less control overhead than AODV.

Also, the overhead of AODV increases substantially with the speed of nodes. However, the

overhead of BKNS and BCNS is relatively stable. For the maximum speed of 1 m/s, BKNS and

BCNS outperform AODV by 29% and 46%, respectively. For the maximum speed of 50 m/s,

BKNS and BCNS outperform AODV by 70% and 72%, respectively. Overall, the simulation

results show that as the number of sources increases from 10 to 15 to 20, the control overhead

increases for all speed values, and both BKNS and BCNS outperform AODV significantly for all

source numbers considered. When the number of sources increases, the probability that packets

collide becomes larger, leading to higher route discovery overhead.

Figure 6: Overhead for 20 sources and a CBR of 4 packets/s

It can be seen in Figure 7 that BKNS and BCNS have slightly higher delivery ratios than

AODV for all maximum speed values. When the maximum node speed is low (1 m/s), BKNS

and BCNS outperform AODV by 1.3% and 2%, respectively. For the high maximum speed

value of 50 m/s, the performance improvements are 1.7% and 2.4%, respectively. The results of

the simulation experiments show that increasing the number of sources reduces the delivery ratio

for all protocols. Reasons for this reduction are packet collisions and dropped packets. Overall,

BCNS and BKNS slightly outperform AODV in terms of packet delivery ration for all numbers

of sources considered (10, 20 and 50 sources).

In Figure 8, BKNS and BCNS reduce the end-to-end delay by over 20% as compared with

AODV for all maximum speed values. Furthermore, as the number of traffic sources increases

from 10 to 15 to 20, the end-to-end delays increase for all protocols. As more data packets are

generated per time unit when the number of sources increases, higher queuing delays can be

expected. However, BKNS and BCNS still outperform AODV in terms of average end-to-end

delay for all source numbers considered.

Figure 9 depicts the Saved Rebroadcasts (SRB) achieved by our protocols in comparison with

AODV when the number of sources again equals 20. Similar trends were obtained for 10 and 15

sources. As the figure shows clearly, our schemes outperform AODV in terms of avoiding

redundant retransmissions of received packets. In addition, both BKNS and BCNS prove their

stability and ability to save rebroadcasts even for high speed values, whereas the performance of

AODV degrades significantly as the maximum node speed increases. On average, BKNS and

BCNS save 90% and 97% of the rebroadcasts for all maximum speed values. However, AODV

saves 60% of the rebroadcasts for the maximum speed of 1m/s, and saves only 33% for the

maximum speed of 50 m/s.

Figure 7: Packet delivery ratio for 20 sources and a CBR of 4 packets/s

4.2.2. Effects of Traffic Load and Number of Nodes:

The purpose of the simulations presented in this subsection is to investigate the influence of

varying the traffic load of the sources. For this purpose, we consider the source packet rates of 1,

2, 4, 6, and 8 packets/s, where the number of CBR generators is 10 and node speeds are

uniformly distributed over the interval [0, 50 m/s]. When the total number of nodes is 10, we say

that the network is sparse; in contrast, when this number is 50, we say that the network is dense.

We have conducted many experiments for 10, 20 and 50 nodes. However, due to space

limitations, we will not show the simulation results when the number of nodes is 20. Rather, we

show simulation results for 10 (sparse network) and 50 (dense network) nodes so as to show the

impact that the density of nodes has on overall performance.

Figure 8: End-to-end delay for 20 sources and a CBR of 4 packets/s

Figure 9: SRB for 20 sources and a CBR of 4 packets/s

4.2.2.1. Sparse Network Results

Here, the number of nodes in the network is 10, and each node generates a traffic load that varies

from 1 packet/s to 8 packets/s. In Figure 10, it is clear that our protocols outperform AODV in

terms of routing overhead for all traffic load values. This is because they control flooding by

selecting only a subset of nodes for forwarding packets. Figure 10 results show that for low

traffic load, BKNS and BCNS outperform AODV by about 40% and 56%, respectively. When

the traffic load is high, the improvement reaches 47% and 52% for BKNS and BCNS,

respectively.

Figure 11 shows that BKNS and BCNS also outperform AODV in terms of PDR for all

traffic load values. When the traffic load is low, both BKNS and BCNS outperform AODV by 7

percent. For the highest traffic load value, BKNS and BCNS outperform AODV by 12 and 14

percents, respectively.

Figure 10: Overhead for 10 nodes and MaxSpeed = 50 m/s

Figure 11: Packet delivery ratio for 10 nodes and MaxSpeed = 50 m/s

The large overhead of AODV as compared with BKNS and BCNS increases packet end-to-

end delays. The average end-to-end delay of AODV is higher than that of the proposed

protocols, as shown in Figure 12. The average end-to-end delay of AODV is larger than that of

BKNS and BCNS by about 50 to 90 percent.

Figure 13 shows that BKNS and BCNS outperform AODV in terms of SRB for all traffic

loads considered. When the traffic load is 1 packet/s, BKNS and BCNS outperform AODV by

14 and 24 percents, respectively. For 8 packets/s, BKNS and BCNS outperform AODV by 15

and 26 percents, respectively.

Figure 12: End-to-end delay for 10 nodes and MaxSpeed = 50 m/s

Figure 13: SRB for 10 nodes and MaxSpeed = 50 m/s

4.2.2.2. Dense network Results

The purpose of the simulation results presented in this subsection is to illustrate the impact of

increasing the number of nodes on the performance of the protocols under study.

It can be seen in Figure 14 that BKNS and BCNS outperform AODV in terms of control

overhead for all source traffic load values considered. For the low source traffic load of 1

packet/s, BKNS and BCNS outperform AODV by 73% and 80%, respectively. For the source

traffic load of 8 packets/s, the performance advantages of BKNS and BCNS are 62% and 84%,

respectively. Comparing Figure 14 with Figure 10, it can be seen that the control overhead

increases when the number of nodes is increased from 10 to 50. The reason is that more control

packets are expected to be sent when there are more nodes in the network.

Figure 15 displays the packet delivery ratio obtained for the three protocols. It can be noticed

in the figure that for low traffic loads (1 and 2 packets/s), our protocols and AODV have almost

similar delivery ratio values. However, for high source traffic loads (6 and 8 packets/s), our

protocols become substantially superior. This says that BKNS and BCNS are as effective as

AODV in delivering packets to destinations for low traffic load values; however, they are

substantially more effective for high traffic load values.

Figure 16 displays the average end-to-end delays for the various source CBR traffic rates

considered. The results show that as the traffic load increases, the average end-to-end delay for

all protocols increases as well. Nevertheless, our protocols are still superior to AODV, especially

for high traffic loads.

Figure 14: Overhead for 50 nodes and MaxSpeed = 50 m/s

In Figure 17, we plot SRB against the source traffic load. The figure shows that BKNS and

BCNS outperform AODV for all traffic loads. When the traffic load is low (1 packet/s), BKNS

and BCNS outperform AODV by 61% and 64%, respectively. For the highest traffic load value

considered (8 packets/s), BKNS and BCNS outperform AODV by 67% and 69%, respectively.

Figure 15: Packet delivery ratio for 50 nodes and MaxSpeed = 50 m/s

Figure 16: End-to-end delay for 50 nodes and MaxSpeed = 50 m/s

5. Simulation Results for Larger Area

In this section, the main goal of the simulation experiments is to show the behavior of our

protocols and the behavior of AODV when the simulation area becomes larger (i.e. 1000 m

1500 m) and MaxSpeed varies from the low speed of 1 m/s to the high speed of 50 m/s, where

node speeds are again uniform over the interval [0, MaxSpeed]. The Figures 18-21 show

consistency between the results of these experiments and those of the previous experiments. The

simulation parameters are set as follows:

Number of nodes: 50 nodes.

Maximum speed: 1, 5, 10, 20, 50 m/s.

Packet rate: 4 packets/s.

Number of sources = 20 CBR generators.

The other simulation parameters are set as in Table 1.

In Figure 18, it is clear that our protocols outperform AODV in terms of reducing the routing

overhead for all speed values. This is because they control flooding by selecting only a subset of

nodes for retransmitting packets. This reduces the number of control packets, which means a

reduction in the overall routing overhead. Figure 18 shows that for the lowest speed value

(MaxSpeed = 1 m/s), both BKNS and BCNS outperform AODV by 55%. When the maximum

speed of nodes is high (50 m/s), the enhancement reaches 66% and 76% for BKNS and BCNS,

respectively.

Figure 19 results show that BKNS and BCNS outperform AODV for all speed values by a

small percentage. When the maximum speed is lowest, BKNS and BCNS outperform AODV by

6 and 7.5 percents, respectively. For the highest maximum speed considered, BKNS and BCNS

outperform AODV by 4 and 8 percents, respectively.

Figure 17: SRB for 50 nodes and MaxSpeed = 50 m/s

In Figure 20, the average end-to-end delay for all packets in AODV is higher than in our

protocols. When the maximum speed of nodes is 1 m/s, AODV’s average end-to-end delay is

more than twice that of BKNS and BCNS. Whereas, when the maximum speed of nodes is 50

m/sec, the enhancement of both BKNS and BCNS over AODV is about 33%.

Figure 21 displays the SRB of the protocols and shows that BKNS and BCNS substantially

outperform AODV for all speed values. When the speed is low (MaxSpeed = 1 m/sec), BKNS

and BCNS outperform AODV by 58 and 59 percents, respectively. For the high maximum speed

of 50 m/sec, BKNS and BCNS outperform AODV by 80 and 89 percents, respectively.

Figure 18: Overhead for 50 nodes, 20 sources, and CBR = 4 packets/s

Figure 19: Packet delivery ratio for 50 nodes, 20 sources, and CBR = 4 packets/s

6. Conclusions

In this paper, we have proposed two neighborhood-based route discovery schemes for mobile ad

hoc networks. The primary aim of these schemes is reducing the overhead associated with the

route discovery process. The source node selects a subset of its one-hop neighbors for

forwarding the route request packet further, and it includes their addresses in the request packet

that it broadcasts. This process is repeated by every selected forwarding node, except the

destination node. Non-forwarding nodes drop received route request packets. Thus, the

forwarding nodes are selected dynamically in an expanding ring fashion starting with the source.

At each step, the selection process has for goal reducing the number of upcoming forwarding

nodes. Using extensive simulations, we have evaluated the proposed schemes and found that

Figure 21: SRB for 50 nodes, 20 sources, and CBR = 4 packets /second

Figure 20: Average end-to-end delay for 50 nodes, 20 sources, and CBR = 4 packets/

second

they have very low overhead, yet they can achieve substantially higher delivery ratios than

AODV when the traffic load is heavy. Even under moderate loads, they can achieve slightly

higher delivery ratios than AODV, which is a successful and well-known routing scheme for ad

hoc networks.

References

Abdalla M. Hanashi, Aamir Siddique, Irfan Awan & Mike Woodward (2008), Dynamic

Probabilistic Flooding Performance Evaluation of On-Demand Routing Protocols in MANETs.

Proc. of the 2008 International Conference on Complex, Intelligent and Software Intensive

Systems, Vol. 0. pp. 200-204.

Baolin Sun, Chao Gui, Qifei Zhang, Bing Yan, and Wei Liu (2008), A Multipath On-Demand

Routing with Path Selection Entropy for Ad Hoc Networks.Proc. of the 9th International

Conference for Young Computer Scientists, Nov. 2008, pp. 558-563.

Brad Williams &Tracy Camp (2002), Comparison of broadcasting techniques for mobile ad hoc

networks. Proc. of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and

Computing (MOBIHOC 2002), ACM New York, NY, USA, pp. 194-205.

Charles E. Perkin & Elizabeth M. Royer (1999), Ad-hoc on-demand distance vector

routing.Proc. of the Second IEEE Workshop on Mobile Computing Systems and Applications

(WMCSA '99), 25-26 Feb. 1999, pp. 90-100.

David B. Johnson (1994), Routing in Ad Hoc Networks of Mobile Hosts. Proc. of the Workshop

on Mobile Computing Systems and Applications, IEEE Computer Society, Santa Cruz, CA, Dec.

1994 , pp. 158-163.

H. Trung, W. Benjapolakul& P. Duc(2007), Performance evaluation and comparison of different

ad hoc routing protocols. Computer Communications, 30(11,12), 2478-2496.

Khaled Alzoubi, Xiang-Yang Li, Yu Wang, Peng-Jun Wan & Ophir Frieder (2002) Message-

optimal connected dominating sets in mobile ad hoc networks. Proc. of the 3rd

ACM

international symposium on Mobile ad hoc networking and computing (MOBIHOC'02), 157–

164.

M. Bani Yassein, A. Al-Dubai, M. Ould Khaoua & Omar M. Al-jarrah (2009), New Adaptive

Counter Based Broadcast Using Neighborhood Information in MANETS. Proc. 2009 IEEE

International Symposium on Parallel & Distributed Processing , May 2009, pp. 1-7.

Muneer Masadeh Bani Yassein, Mohamed Ould-Khaoua & Stylianos Papanastasiou (2005),

Performance Evaluation of Flooding in MANETs in the presence of Multi-Broadcast Traffic.

Proc. of the 11th International Conference on Parallel and Distributed Systems (ICPADS05), vol.

2, July 2005 pages 505 – 509.

Muneer Masadeh Bani Yassein, Mohamed Ould-Khaoua, Lewis M. Mackenzie, Stylianos

Papanastasiou & A. Jamal (2006), Improving route discovery in on-demand routing protocols

using local topology information in MANETs.Proc. of the ACM International Workshop on

Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired

Networks, ACM Press, Terromolinos, Spain, pp. 95–99.

Muneer Masadeh Bani-Yassein, Mohamed Ould-Khaoua, Lewis M. Mackenzie & Stylianos

Papanastasiou (2006), Performance analysis of adjusted probabilistic broadcasting in mobile ad

hoc networks. International Journal of Wireless Information Networks, 13(2), 127–140.

Paul Rogers, & Nael Abu-Ghazaleh (2005), Robustness of network-wide broadcasts in

MANETs. Proc. of the 2nd

IEEE International Conference on Mobile Ad Hoc and Sensor

Systems (MASS 2005), Vol. 3, Nov. 2005, pp. 161-185.

Qi Zhang & Dharma P. Agrawal (2005), Dynamic Probabilistic Broadcasting in MANETs.

Journal of Parallel and Distributed Computing, vol. 65, pp. 220-233.

Sze-Yao Ni, Yu-Chee Tseng, Yuh-Shyan Chen, & Jang-Ping Sheu (2002), The broadcast storm

problem in a mobile ad hoc network. Wireless Networks, 8 (2), pp 153-167.

Thomas Clausen &Philippe Jacquet (2003), Optimized link state routing protocol, Internet Draft,

Internet Engineering Task Force, Oct. 2003, http://www.ietf.org/internet-drafts/draft-ietf-manet-

olsr-11.txt.

Wei Peng, and Xi-Cheng Lu (2000), On the reduction of broadcast redundancy in mobile ad hoc

networks. Proc. of the ACM International Symposium on Mobile Ad Hoc Networking &

Computing (MOBIHOC), Boston, MA, 129-130.

Wikipedia, the free encyclopedia, Online, Accessed June, 2009, "Set Cover Problem," Available

from URL http://en.wikipedia.org/wiki/Set_cover_problem

X. Zeng, R. Bagrodia & M. Gerla (1998), GloMoSim: a library for parallel simulation of large-

scale wireless networks.Proc. of the 1998 12th

Workshop on Parallel and Distributed

Simulations (PADS’98), Banff, Alb., Canada, May 26-29, 1998, pp. 154–161.

Y.-C. Tseng, S.-Y. Ni &E.-Y. Shih (2003), Adaptive approaches to relieving broadcast storm in

a wireless multihop mobile ad hoc network. IEEE Transactions on Computers, 52(5).

Yao Yu, Yu Zhou, and Sidan Du (2009), Service Discovery in Mobile Ad Hoc Networks Using

Mobility-Aware Attenuated Bloom Filters. Proc. 2009 IITA International Conference on

Services Science, Management and Engineering, (July 2009), pp. 266-269.

Yoav Sasson, David Cavin & André Schiper (2003), Probabilistic broadcast for flooding in

wireless mobile ad hoc networks. Proc. of the IEEE Wireless Communications & Networking

Conference (WCNC 2003), pp. 1124–1130.

Yu-Chee Tseng, Sze-Yao Ni & En-Yu Shih (2003), Adaptive Approaches to Relieving

Broadcast Storms in a Wireless Multihop Mobile Ad Hoc Network. IEEE Transactions on

Computers, 52(5), pp. 545-557.

Zygmunt J. Haas, Joseph Y. Halpern, and Li Li (2002), Gossip-based ad hoc routing. Proc. of the

IEEE INFOCOM, IEEE Computer Society, New York.