Cross-layer routing for peer database querying over mobile ad hoc networks
نویسندگان
چکیده
The widespread of mobile ad hoc networking calls for a careful design of network functions in order to meet the application requirements and economize on the limited resources. In this paper we address the problem of distributing query messages among peers in mobile ad hoc networks. We assume that peers are organized in classes. Each peer possesses a local database and can answer queries posed by other peers. Each peer can also pose queries to all the peers belonging to a certain class or classes. Contrary to traditional p2p lookup queries, we are interested in collecting answers from as many peers as possible. We propose a query routing protocol, called CL-QF, which is based on a novel cross-layer design. The purpose of this design is to incorporate application layer specifics (e.g., class information) into the network layer in order to reduce transmissions therefore economize on resources. CL-QF coexists with traditional routing. This synergy minimizes the complexity and signaling of CL-QF while the network is able to seamlessly provide legacy unicast communication. CL-QF manages a reduction of up to 78% compared to non-cross-layer approaches, such as probabilistic forwarding, without compromising the ability to effectively collect replies. 2011 Elsevier B.V. All rights reserved.
منابع مشابه
Cluster Based Cross Layer Intelligent Service Discovery for Mobile Ad-Hoc Networks
The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملPerformance Evaluation of the Mobile Peer-to-Peer Protocol
The utilization of peer-to-peer (P2P) overlay networks on mobile ad hoc networks (MANET) introduces new services and possibilities such as context based routing and location based services (LBS). A simple layering of both networks is inefficient and does not scale well because the virtual P2P overlay network does not match the frequently changing physical network topology of the MANET. The Mobi...
متن کاملProtocol for peer-to-peer networking in mobile environments
Peer-to-Peer (P2P) as well as mobile ad hoc networks (MANETs) follow the same idea of creating a network without the help of central entities. However P2P and MANETs operate on different network layers. A combination of both, creates new services and possibilities, but also faces several problems. Introducing P2P computing in ad-hoc networks without considering the particular requirements of ad...
متن کاملA cross-layer approach for real-time multimedia streaming on wireless peer-to-peer ad hoc network
Peer-to-peer (P2P) live streaming over mobile ad hoc network (MANET) is a state-of-theart technique for wireless multimedia applications, such as entertainments and disaster recovery. The peers share the live streaming over MANET via multi-hop wireless link, so an efficient data delivery scheme must be required. However, the high churn rate and the frequent mobility baffle the P2P membership ma...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computer Networks
دوره 56 شماره
صفحات -
تاریخ انتشار 2012