A Token Based Protocol for Mutual Exclusion in Mobile Ad Hoc Networks

被引:5
|
作者
Sharma, Bharti [1 ]
Bhatia, Ravinder Singh [2 ]
Singh, Awadhesh Kumar [2 ]
机构
[1] DIMT Kurukshetra, Kurukshetra, Haryana, India
[2] NIT Kurukshetra, Kurukshetra, Haryana, India
来源
JOURNAL OF INFORMATION PROCESSING SYSTEMS | 2014年 / 10卷 / 01期
关键词
MANET; Inter-Cluster; Intra-Cluster; Mutual Exclusion; Token Ring;
D O I
10.3745/JIPS.2014.10.1.036
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Resource sharing is a major advantage of distributed computing. However, a distributed computing system may have some physical or virtual resource that may be accessible by a single process at a time. The mutual exclusion issue is to ensure that no more than one process at a time is allowed to access some shared resource. The article proposes a token-based mutual exclusion algorithm for the clustered mobile ad hoc networks (MANETs). The mechanism that is adapted to handle token passing at the inter-cluster level is different from that at the intra-cluster level. It makes our algorithm message efficient and thus suitable for MANETs. In the interest of efficiency, we implemented a centralized token passing scheme at the intra-cluster level. The centralized schemes are inherently failure prone. Thus, we have presented an intra-cluster token passing scheme that is able to tolerate a failure. In order to enhance reliability, we applied a distributed token circulation scheme at the inter-cluster level. More importantly, the message complexity of the proposed algorithm is independent of N, which is the total number of nodes in the system. Also, under a heavy load, it turns out to be inversely proportional to n, which is the (average) number of nodes per each cluster. We substantiated our claim with the correctness proof, complexity analysis, and simulation results. In the end, we present a simple approach to make our protocol fault tolerant.
引用
收藏
页码:36 / 54
页数:19
相关论文
共 50 条
  • [41] KDSR: An Efficient DHT-based Routing Protocol for Mobile Ad Hoc Networks
    Zhao, Bo
    Wen, Yingyou
    Zhao, Hong
    HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 2, PROCEEDINGS, 2009, : 245 - 249
  • [42] A location information-based route discovery protocol for mobile ad hoc networks
    Ammari, H
    El-Rewini, H
    CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 625 - 630
  • [43] A Token-Based Group Mutual Exclusion Algorithm for Cellular Wireless Networks
    Swaroop, Abhishek
    Singh, Awadhesh Kumar
    2009 ANNUAL IEEE INDIA CONFERENCE (INDICON 2009), 2009, : 402 - +
  • [44] RAA: A ring-based address autoconfiguration protocol in mobile ad hoc networks
    Chen, YS
    Lin, SM
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2005, 3794 : 773 - 782
  • [45] Secure group key management protocol for mobile ad hoc networks
    Selvakumar, K.
    Seethalakshmi, N.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 11989 - 11995
  • [46] A hierarchical virtual backbone construction protocol for mobile ad hoc networks
    Sharma, Bharti
    Bhatia, Ravinder Singh
    Singh, Awadhesh Kumar
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (03) : 276 - 288
  • [47] Secure Anonymity Multipath Routing Protocol in Mobile Ad Hoc Networks
    Wu, Meng
    Chen, Siguang
    PROCEEDING OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT TECHNOLOGIES, 2009, : 81 - 85
  • [48] Distributed Secure Routing Protocol for Mobile Ad-Hoc Networks
    Khalil, Issa
    Bataineh, Sameer
    Qubajah, Liana
    Khreishah, Abdallah
    2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 106 - 110
  • [49] Secure group key management protocol for mobile ad hoc networks
    K. Selvakumar
    N. Seethalakshmi
    Cluster Computing, 2019, 22 : 11989 - 11995
  • [50] Increasing OLSR Protocol Security in Mobile Ad-Hoc Networks
    Defta, Luminita Costinela
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON VIRTUAL LEARNING, 2014, : 401 - 407