Energy evaluation of AID protocol in Mobile Ad Hoc Networks
نویسندگان
چکیده
Mobile Ad Hoc Networks (MANETs) are communication networks formed on the fly by radio-equipped mobile nodes without relying on any fixed infrastructure. Flooding is the simplest technique for information dissemination in ad hoc based networks, in which nodes disseminate a received message to all their neighbors. This algorithm leads to the broadcast storm problem that severely affects the energy consumption due to redundant submissions. To regulate redundant submissions, which can cause more collisions and requires more energy, recently there have been developed numerous broadcasting techniques. These techniques have been mainly proposed to solve the storm problem by preventing certain nodes from rebroadcasting received messages and/or by differentiating the timing of rebroadcasts. In this paper, we have evaluated and compared an adaptive information dissemination (AID) algorithm with other MANETs broadcasting protocols with respect to the energy efficiency. In AID, each node can dynamically adjust the values of its local parameters using information from neighboring nodes without requiring any additional effort, such as distance measurements or exact locationdetermination of nodes. Simulation results are reported and show that adaptive broadcasting schemes are most efficient with respect to save broadcast, energy consumption, and reachability. & 2015 Elsevier Ltd. All rights reserved.
منابع مشابه
Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks
In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...
متن کاملEnergy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization
Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...
متن کاملEnergy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization
Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...
متن کاملEvaluation of a BIBD Based Directional MAC Protocol for Wireless Ad Hoc Networks
The use of directional antennas in wireless ad hoc networks can significantly improve global performance due to a high spatial channel reuse. Nevertheless, its introduction poses new location dependent problems related to the MAC protocol. In this paper, the Balanced Incomplete Block Design theory has been exploited to develop a new MAC protocol for wireless ad hoc networks using directional ant...
متن کاملImproving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR
Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Network and Computer Applications
دوره 58 شماره
صفحات -
تاریخ انتشار 2015