Node Credit Based Efficient Flooding (NCBEF) Method for Mobile Ad-hoc Networks

被引:0
|
作者
Gianey H.K. [1 ]
Choudhury T. [2 ]
Elngar A.A. [3 ]
机构
[1] Department of Computer Science & Engineering, Thapar Institute of Engineering & Technology, Patiala, Punjab
[2] Department of Computer Science, University of Petroleum and Energy Studies, Dehradun
[3] Faculty of Computers & Artificial Intelligence, Beni-Suef University, Beni-Suef City, Salah Salem Str.
来源
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems | 2019年 / 6卷 / 20期
关键词
Broadcast Storm Problem; Broadcasting; Flooding; Mobile Ad-hoc Networks; NCBEF; Routing; Wireless Networks;
D O I
10.4108/eai.13-7-2018.159944
中图分类号
学科分类号
摘要
Effective routing is one important research issue for mobile ad-hoc network where gadgets have confined resources. Due to non-foreseeing network topology, frequent link failure occurred that drives route break, partitions and high routing overhead issue. These issues result superfluous resource wastage and diminish network life. Existing reactive routing algorithm helps nodes to discover route via broadcast of route request to all these reachable nodes. Receiving node of route request further forward to all its neighbours' nodes that lead flooding. Here broadcasting of route request results several issues such as wastage of resources, congestions, redundancy of route request and broadcast storm problem. Though to maximize resource utilization and minimize broadcast storm problem, efficient broadcast method in routing algorithm is required. Numerous contributions have done towards efficient broadcasting which concentrate different aspects. In this paper, NCBEF method is presented that motive was to do efficient flooding. NCBEF method enables node to broadcast route request to some neighbours instead of all. To do this, NCBEF method, determine high creditable neighbours during hello signal transmission. Few hypotheses were formulated to evaluate and test NCBEF method. Hypotheses were evaluated by simulation of NCBEF method in network simulator software on the basis of certain criteria.___________________________________________________________ © 2019. Hemant Kumar Gianey et al., licensed to EAI. All Rights Reserved.
引用
收藏
页码:1 / 13
页数:12
相关论文
共 50 条
  • [21] Localised minimum spanning tree flooding in ad-hoc networks
    Lipman, J
    Boustead, P
    Chicharo, J
    ADVANCED WIRED AND WIRELESS NETWORKS, 2005, 26 : 19 - 37
  • [22] QoS in Mobile Ad-Hoc Networks
    Sra, Pushp
    Chand, Satish
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 105 (04) : 1599 - 1616
  • [23] QoS in Mobile Ad-Hoc Networks
    Pushp Sra
    Satish Chand
    Wireless Personal Communications, 2019, 105 : 1599 - 1616
  • [24] An on-demand cluster formation scheme for efficient flooding in ad-hoc networks
    Wang, GC
    Cho, GH
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (09) : 3563 - 3569
  • [25] A Computationally Efficient Method for Joint Authentication and Intrusion Detection in Mobile Ad-hoc Networks
    Bu, Shengrong
    Yu, F. Richard
    Liu, Peter X.
    Tang, Helen
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [26] A Mobility Management Protocol On Mobile Ad-Hoc Networks
    Dogru, Ibrahim Alper
    Simsek, Mehmet
    Akcayol, Muhammet Ali
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2008, 11 (04): : 313 - 318
  • [27] Energy-efficient anonymous multicast in mobile ad-hoc networks
    Kao, Jung-Chun
    Marculescu, Radu
    2007 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, VOLS 1 AND 2, 2007, : 363 - 370
  • [28] Efficient group communications in location aware mobile ad-hoc networks
    Mitra, Pramita
    Poellabauer, Christian
    PERVASIVE AND MOBILE COMPUTING, 2012, 8 (02) : 229 - 248
  • [29] Condensation-based routing in mobile ad-hoc networks
    Palmieri, Francesco
    Castiglione, Aniello
    MOBILE INFORMATION SYSTEMS, 2012, 8 (03) : 199 - 211
  • [30] Cluster maintenance in mobile ad-hoc networks
    Wang, L
    Olariu, S
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2005, 8 (2-3): : 111 - 118