1
International Journal of Scientific & Engineering Research, Volume 3, Issue 4, April-2012
ISSN 2229-5518
A Reduced Flooding Algorithm and Comparative Study of Grid Fisheye State Routing Protocol for MANET
S. Nithya Rekha and Dr. C.Chandrasekar
Abstract— Mobile Ad-hoc Network (MANET) is the self organizing collection of mobile nodes. The communication in MANE T is done via a wireless media. Ad hoc wireless networks have massive commercial and military potential because of their mobility support. Due to demanding real time multimedia applications, Quality of Services (QoS) support in such infrastructure less net works have become essential. QoS routing in mobile Ad-Hoc networks is challenging due to rapid change in network topology. In this paper, we focused to reduce flooding performance of the Fisheye State Routing (FSR) protocol in Grid using ns -2 network simulator under different performance metrics scenario in respect to number of Nodes and Speed. A Comparative study of FSR and GFSR is made in Speed with metrics .For example, the connection establishment is costly in terms of time and resource where the networ k is mostly affected by connection request flooding. The proposed approach presents a way to reduce flooding in MANETs. Flooding is dictated by the propagation of conn ection- request packets from the source to its neighborhood nodes. The proposed architect ure embarks on the concept of sharing neighborhood information. The proposed approach focuses on exposing its neighborhood peer to another node that is referred to as its frien d-node, which had requested/forwarded connection request. If there is a hig h probability for the friend node to communicate through the exposed routes, this could improve the efficacy of bandwidth utilization by reducing flooding, as the routes have been acquir ed, without any broadcasts. Friendship between nodes is quantized based on empirical computations and heuristic algorithms. The nodes store the neighborhood information in their cache that is periodically verified for consistency. Simulation results show the performance of this proposed method.
Index Terms— - MANET, Flooding,Fisheye State Routing( FSR) protocol, Grid FSR , cache, connection-request, sharing, friend-node, NS2, Performance Metrics, Speed.
—————————— ——————————
he principal objective of a routing protocol is efficient discovery and establishment of a route between the source and the destination so that there can be a timely
and efficient delivery of information between them. A Locat- ing Service is used to locate the receiver inside the network. It dynamically maps the logical address of the receiver to its current location in the network. Once the receiver is located, routing and forwarding algorithms are used to route the in- formation through the MANET. The routing is done using one-hop transmission service provided by the enabling tech- nologies to construct an end-to-end (reliable) delivery servic- es, from sender to one or more receivers. A number of fea- tures are expected to be supported by the routing protocols which include parameters like minimal control & processing overhead, loop freedom & prevention, efficient dynamic to- pology establishment and maintenance, scalability, support for unidirectional links, security & reliability and support for Quality of Service.[4],[5].
————————————————
S.Nithya Rekha is currently pursuing Ph.D. in Computer Science as a Full-Time Research Scholar in Periyar University, India,
PH- +919944954001. E-mail: rekhasiva24@gmail.com
Dr. C.Chandrasekar is an Associate Professor in Dept. of
Computer Science in Periyar University, India,
PH- +919994599967. E-mail:ccsekar@gmail.com
The rest of this paper is organized as follows: First of all, we make a brief survey on FSR in section 2, with my previous re- search work. In section 3, proposed work in grid FSR to reduce flooding. Section 4, presents the Results and Discussion. Sec- tion 5, presents the Simulation Results of performance evalua- tion of various Parameters and section 6 concludes the paper.
In my previous research work,[1] the investigations was on the behavior of the Proactive Routing Protocol Fisheye State Routing (FSR) in the Grid by analysis of various parameters. The Performance metrics that are used to eva- luate routing protocols are Packet Delivery Ratio (PDR), Network Control Overhead, Normalized Overhead, Throughput and Average End to End Delay. Experimen- tal results reveal that FSR is more efficient in Grid FSR in all QOS constraints. FSR can be used in all Resource critical en- vironments. Grid Fisheye state routing (GFSR) consumes less bandwidth by restricting the propagation of routing control messages in paths formed by alternating gateways and neighbor heads, and allowing the gateways to selective- ly include routing table entries in their control messages. PDR and Throughput are 100% efficient in Simulation Re- sults in NS2.
IJSER © 2012
2
International Journal of Scientific & Engineering Research, Volume 3, Issue 4, April-2012
ISSN 2229-5518
G. P. Mario, M. Gerla and T.W. Chen, (2000) et.al, proposed that the FSR is a descendant of GSR [2]. In [3], the authors introduce a novel proactive (FSR), the notion of multi-level fisheye scope to reduce routing update overhead in large networks. Nodes exchange link state entries with their neigh- bors with a frequency which depends on distance to destina- tion. From link state entries, nodes construct the topology map of the entire network and compute optimal routes. Simu- lation experiments show that FSR is simple, efficient and scal- able routing solution in a mobile, ad hoc environment. Fig. 1 refers the fisheye scope with different hops.
The following are the advantages of FSR.
* Simplicity
* Usage of up-to-date shortest routes
* Robustness to host mobility
* Exchange Partial Routing Update with neighbors
Fig. 1 : Fisheye Scope
The simulation results demonstrate the advantages of our approach. It can greatly reduce the redundant messages, thus saving much network bandwidth and energy. It can also en- hance the reliability of broadcasting. It can be used in static or mobile wireless networks to implement scalable broadcast or multicast communications. As a result, the proactive ap- proach provides a better quality of service by this new ap- proach of Probability of calculating the Intimacy factor with neighbor node and friend node.
In Fig. 2, the gateways along the routing path will check the destination and determine who the next hop should be. When a packet approaches nearer to its destination, the routing in- formation stored in the gateways becomes progressively more accurate. Packets finally arrive at the grid of destination node. If destination is a gateway, the packet is received by that gateway. Initially before data transmission each grid broadcast its grid member’s information through gateway node. So that each gateway can exchange its grid members list as the whole network comes under the communication. While data transmission between grid members to other node gateway maintains unicast transmission until reaches its des- tination.
Fig. 2: GRID Architecture with Unicast data path from Source node to Destination Node
Grid Gateway Destination Node
Grid Member GRID
Source Node ------ Unicast Datapath
In order for the destination node to know the location of the destination or the receiver they have to acquire the route through the process of flooding. Flooding involves broadcast- ing of a packet to all the nodes of the network requesting the route of the destination node [6]. The nodes either respond with a reply back to the sender if in case, the current receiv- ing node of the packet is the destination, or otherwise they forward the packet to other nodes. The destination node responds to the sender with the connection acknowledge- ment. The path traced by the acknowledge packet is re- membered in all the forwarding hosts as the route from sender to destination.
On one hand though the process of flooding helps the
sender to dynamically obtain the location of the destination
and the route over which information could be transmit-
ted, it unnecessarily augments the load on the network as all
the nodes in the network participate in the process of flood-
ing[5]. If flooding is carried out frequently then it may alto-
gether lead to the instability of the network. The direct impli-
cation of this observation is that flooding should be kept as
infrequent as possible. One standard way to reduce the
flooding mechanism is to provide the nodes with a small
cache where the routes could be stored for future refer-
ence. The continuously changing characteristic of the ad hoc network environment poses further a problem, when routes are stored in a cache. There is always a possibility for the destination nodes to move from their place to another or
even switch off. The cache reflects a static value and therefore in order to keep the data in the cache consistent they must be updated as frequently as possible. To ac-
IJSER © 2012
3
International Journal of Scientific & Engineering Research, Volume 3, Issue 4, April-2012
ISSN 2229-5518
count for these the routes in cache must be updated and validated periodically. The direct implication of this is that broadcast will be done frequently, which is to be avoided at all costs.
A new parameter referred to as the timeout period[6] is in- troduced to alleviate the problems arising. The timeout period is maintained for every route of the destination stored in the cache.This parameter reflects the lifetime of a route. The mo- ment the timeout value expires the route in cache is deleted. Though still broadcasts are made, the frequency of broad- casts is reduced. The value of the timeout period reflects the frequency at which flooding occurs and if it is chosen to be a large number there is still a possibility of the route to have become invalid before the expiry of the cache. Therefore, the timeout value has to be prudently chosen. A tradeoff has therefore to be struck between the consistency of informa- tion and the frequency of broadcasts made.
The suggested protocol falls under the category of reactive pro- tocols. The nodes in this approach obtain the routes only when demand arises. The nodes use the common flooding approach to acquire the routes. Though flooding is used at the initial phases, it is decreased gradually. The most common me- thod of using a cache with a fixed timeout period for each route is also used. The nodes are equipped with a small cache to save the routes and a timeout value is chosen. The selection of the timeout value is done as in case of the conventional networks, keeping in mind the other constraints of the network. How- ever, the variation in the approach comes from the fact that the expiry of the timeout period does not trigger an update. The routes of the destination in the cache are rather erased after the timeout period. The nodes may then have to use flooding again to regain the routes, but in order to avoid that routes are shared between the nodes based on some criteria.
The primary focus of the protocol is on sharing information about the neighborhood of a peer with yet another node in the network. The neighborhood of a peer here reflects the contacts of the node in question with that of other nodes in the network. In other words, the neighborhood reflects the entries of routes in the cache. This information regarding the contacts a node has with other nodes in the vicinity is stored in tables or any other suitable data structure that is compatible with the pro- tocol being adopted. The sharing of neighborhood information is not a mandatory task rather it is done at the discretion of the nodes concerned. The given approach intends to minimize the flooding requests that are needed to acquire the same infor- mation in the absence of the sharing mechanism.
The sharing of information occurs mainly between the nodes that are in direct contact with one another. Though the same can be carried out between nodes that are connected through a series of a finite number of intermediate nodes, factors such as the power levels of the nodes could be questioned to decide whether such a sharing could improve the efficiency or not. Since the sharing of information is at the discretion of the nodes in contact, they can decide whether the process has
to be carried out or not. The process affects only the nodes that are communicating and any series of finite set of intermediate nodes that connect the two nodes, if such a process is to be trig- gered between nodes connected by multi-hop links. The nodes can also take into account parameters such as the current load on the route connecting the nodes, the current load on the two nodes and the power levels required to carry out the opera- tion before initiating the sharing of information.
The process of sharing of neighborhood information oc- curs when the receiving node decides that the node that started the communication between the two is ready for accepting the information. This decision could be made based on a parameter called the intimacy factor. The intimacy factor reflects the level of trust between the two nodes that are communicating. A threshold level of intimacy factor could be defined called as IFTHRES, which could then be compared against the intimacy factor, calculated between two com- municating nodes to determine, when exactly to commence the sharing of neighborhood information. If the intima- cy factor calculated is greater than IFTHRES then the re- ceiving node can make a request to the sender enquiring its acceptance to the information about the routes to nearby nodes. This request is optional and the receiver does so at its discretion.
After the receiver ensures that the node that initiated the communication is ready to receive the neighborhood informa- tion, it posts a request to the sender. The sender can accept or reject the request. It can take into account the load on the link, the load on it, and its power level before posting to the re- ceiver its consent. This can ensure that the sharing of routes doesn’t exhaust the limited resources available. After the transmission of the sender’s consent to the request, the sharing of the information or routes begins. The receiver shares a percentage of its cache entries with its friend node, depending upon the power levels and other such criteria. The sender then comes to know of the locations good possi- bility for the sender to send messages to these of various destinations close to the receiver. There may be a destina- tions, in which case the flooding process required for ac- quiring the same, have been eliminated.
In a MANET, the presented approach could be modeled in the following way.
Total number of nodes in the network = Tn Total number of nodes in cache = Kn Unknown nodes = Un
The network is considered to have Tn number of nodes. The initiator of communication or the sender is assumed to have knowledge of routes of certain number of nodes in the network. The sender is unaware of the route of the other nodes, of which some may be near the receiver, with which the sender is currently communicating. The receiver is assumed to have a
IJSER © 2012
4
International Journal of Scientific & Engineering Research, Volume 3, Issue 4, April-2012
ISSN 2229-5518
similar knowledge of routes of various nodes in the network. The set of routes in the receiver’s cache need not be dis- joint in comparison with the contents of the cache in the source’s node; although the greater, the dissimilarity in the con- tents of the cache would imply a greater efficiency in the work- ing of the protocol.
Route Gain Ratio (RGR) = (contents of sender’s cache)
~ (contents of receiver’s cache)
RGR ∝ η
Where η, is the efficiency of the protocol.
After the receiving the routes of the nodes in the neighborhood of the receiver, these are stored in the cache of the sender. The basic understanding is that, given that the sender has contacted the receiver, it has a good probability to communi- cate with the nodes nearby the receiver. Since the ap- proach is reactive protocol oriented, new routes have to be acquired before the transmission of information to the other destinations. Calculating the probability that the sender communicates with any of the unknown nodes or nodes for
which it does not have the location, a clear understanding of the
Probability that an exposed node is communicated = P
Let x be the number of exposed nodes contacted by the
sender. Then, P = λ.
The set of routes that are exposed are only valid until the
timeout period, after which they are deleted from the cache. The
quantity of maximum concern here is the number of exposed
nodes that are contacted.
Probty. that x nodes are contacted = P(X = x)
P(X = x) = (e −λ λ x ) / x!
P(X = x) = (e −np λ x ) / x!
P(X = x) = (e –n (Pc* Pe) λ x ) / x!
Where Pc = ( Uc C Tc ) / ( Tc C Un ) Pe = ( En C Tc ) / ( Un C En) Total exposed nodes contacted: Te = P*En
The higher the value of Te , the lesser the broadcasts required for getting the routes for the unknown nodes. The probability
that no exposed node is contacted is given by
P(X = 0), where
P(X = 0) = e −n (Pc* Pe)
Pc * Pe > 0 and always a finite quantity,
P(X = 0)= e − n(Pc*P )
working efficiency of the protocol can be obtained. Number of nodes (given) : Tn
e
= e > 0
Probability that an unknown node is contacted by the
sender :Pu
The approach will prove to be efficient only if the sender
can utilize the information obtained from the receiver
before it expires.
Time available for the sender for utilizing the routes : Tout
Assuming the average time spent per node as, Average time spent in communicating with a node: Tavg
Total number of calls possible before routes expire : Tout / Tavg = Tc
Total number of unknown nodes: Un (nodes whose route are unknown to sender)
Probty. that an unknown node is contacted : Pu
Pu = ( Un C Tcalls ) / ( Tn C Un )
When Tn is large, Pn tends to be very small. The efficien- cy of the protocol increases only when the unknown nodes
contacted for a subset of the nodes in the neighborhood of the receiver. In other words, the maximum efficiency is gained only when the unknown node contacted is one of those exposed by the receiver to the sender during the sharing of neighborhood information.
Let number of nodes exposed = En
Probty. that a node exposed is contacted : Pe
Pe = (En C Tc ) / (Un C En )
Probability that the node contacted forms a subset of the nodes
exposed: P = Pc * Pe
If the probability that the node contacted is from the set
of nodes whose routes have been exposed by the receiver,
then the protocols succeeds in eliminating the flooding requests
which otherwise would have been required to contact the un- known nodes. Considering the MANET environment to con- sist of a large number of nodes n and the probability Pu being small, Poisson distribution could used to model the sit-
uation as following.
Total number of nodes = n = Tn
The probability of contacting an exposed node is therefore never zero. To improve the probability and decrease further the flood- ing process that are carried out, the value of P(X=x) must be closer to unity.[6,10] To increase the number of exposed nodes contacted there exists two possible approaches, one by improv- ing the value of En and the other wherein P is increased. Boost- ing the value of En is not under the control of the designer. En signifies the number of exposed nodes and is directly dependent on the neighborhood of the receiver that exposes the routes of the nodes to the sender. The value of En depends on the topol- ogy of the network, the density of the network and the mobili- ty of the nodes in the network.
Although En is strictly not under the control of the network designer, the value of En can be enhanced considerably by in- creasing the number of nodes exposed. In general, the re- ceiver might then be expected to expose routes of the direct contacts it has, to the sender. In order to escalate further the probability of contacting an exposed node, it can augment the sample space of the nodes exposed. In other words, it can expose more nodes. This involves the receiver exposing nodes that are connected to it even through multi-hop links. The different nodes can be exposed one by one based on priorities assigned to them according to the distance of the exposed node from the receiver. The sender may wish to stop the transaction at any time in the middle by issuing an ―I’m satiated‖ message. The receiver on receiving the message stops sending the routes.
The second method of increasing the probability P to im-
prove the value of Te proves to be more feasible. In order to am- plify the value of P the number of nodes that can be con-
tacted before the exposed routes become invalid, can be boosted. This implies that the timeout period should be in- creased. If timeout value is enhanced then it can have two im- pacts on the network. The first impact is one, which would lead to lesser number of flooding, due to less frequent updates and a higher value of probability of contacting an exposed node.
IJSER © 2012
5
International Journal of Scientific & Engineering Research, Volume 3, Issue 4, April-2012
ISSN 2229-5518
The second would promote a chance for the data or the routes to be corrupted between the timeout periods. As a consequence of this, a tradeoff has to be struck between consistency of data and the reduction of flooding requests.
The total number of messages that are transferred between the sender and receiver depends on the amount of information shared between them. It also depends on the number of inter- mediate nodes that are present between the sender and the re- ceiver. However, considering the fact that the sharing of information only affects the sender, receiver and the finite number of intermediate nodes, if any is present; it can be concluded that the number of messages processed and transferred would be less than in case of flooding. This relies on the fact that the latter process involves all the nodes of the MANET environment. Therefore, even if the sharing process is a slightly prolonged one the process does not have any impact on the other nodes of the network, which still remain free for communication.
Also in the suggested approach, the flooding requests are minimized to a hop count of one. The flooding is initially li- mited to the immediate circle of nodes remaining in the cov- erage region of the node that is broadcasting the flooding request. Of these nodes, if any has the route to the destination in its cache it posts a message to the sender of the broad- cast request, replying that the destination is its friend. At this point, the sender might establish the connection with the res- ponding node, rather than the destination nodes itself. This in- termediate node then routes the messages sent to it, to the intended destination.
In the worst case, the immediate circle of nodes in the cover-
age region of the source node might not have the route to the destination. Under such circumstances, the source node can rebroadcast the message with a hop count that can be found using an algorithm to increase the depth of flooding exponentially. When the flooding is done again with a greater hop count than used in the previous broadcast, the request is posted to more number of nodes. The process is repeated with a more number of nodes covered during each time.
The connection to the intended destination is then bro- ken into different connections that involve nodes in direct con- tacts. Therefore, the source sends the message to the node with which it maintains the direct contact and which knows the route to the destination. This node then contacts with the destination or with the other node in the set of nodes connect- ing the source with the destination. The focus of the sender of the information is then on passing the information packet only to the node in direct contact. The task of routing the pack- et to the intended destination is then vested with the intermediate node that receives the packet. This responsibil- ity then shifts from intermediate node to another one, if mul- tiple nodes are present between the link connecting the sender and the receiver, as in case of any other multi-hop link. The last node meets with the responsibility, when it receives the packet and transmits it to the intended receiver through a direct link.
In general, when two nodes start communicating with each other the sender or the initiator of the communication is moved to the stranger node state with respect to the receiver. As the communication proceeds, the intimacy factor is aug- mented based on some well-defined method. After the intimacy factor crosses the threshold value, the stranger node moves to the friend node state again with respect to the receiving node. This transformation between the states indicates that the receiv- er now is starting to trust the sender and share some informa- tion regarding the routes of nodes in its vicinity. The change of state triggers the sharing of routes, which is initiated by the receiver at the end of the ongoing transactions. The speed of this state change is a very important parameter in the de- sign of the protocol. The faster the change, the earlier the sender or the initiator obtains the neighborhood information. This also has the consequence of a malicious node being able to quickly get the location of various destinations and launch an attack on the network. After the state change, the receiver is identified as being ready to receive the request for sharing the information regarding nearby nodes. The nodes that are acquired from the receiver are stored in the cache with a timeout period. Like any ordinary route that is stored in the cache after the expiry of the timeout period as per the norms of the protocol the routes are cleared.
The method of shifting the state of a source node or the initiator of a communication, from stranger node to friend node could be based either on some empirical or heuristic algorithms.
Empirically this could be done by maintaining a track of the messages transmitted between the nodes concerned or cal- culating the time during which the communication persists. It should also be noted that when the time of communication is taken into account, the factor could affect the sharing process In fact, it could bring down the efficiency of the protocol as the time to make use of the routes acquired is reduced. A balance therefore must be found between the two parame- ters. On the other hand, if the factor is based on the messages transmitted, a counter must be maintained by the receiver to count the packets received. In the aforemen- tioned situation, the counter value could be directly used as the intimacy factor or could be weighted by any suitable constant to give the intimacy factor values.
Let the number of packets transmitted by the stranger node to receiver by Pt.
Pt ∝ k* Intimacy Factor, where k is some constant.
There also remains a good chance for the routes exposed to be
already known to the sender. Under such circumstance, if poss-
ible the sender tries to correct the information that is maintained
in the cache of the receiver. The sender then posts a ―Gratis
Reply‖ to the receiver. This informs the receiver the route,
which was declared corrupt, and the new route that has to re-
place the corrupted one. A comparison is therefore required at
the sender’s side when it’s receiving the exposed nodes’ routes
to ensure that the routes are correct. If during the compari-
son process the sender or the friend node to the receiver, identi-
IJSER © 2012
6
International Journal of Scientific & Engineering Research, Volume 3, Issue 4, April-2012
ISSN 2229-5518
fies a route that is already known to it but is different from the one exposed by the receiver, it has to be able to discri- minate between the right and the faulty route. The faulty one need not always be a wrong route, but can be an old route for which a newer version exists. A mechanism can be used to either accept a standard reference or to communicate a cho- sen reference across nodes whichever proves feasible.
The Network simulator 2 has been used to analyze the para- metric performance of Fisheye State Routing Protocol (FSR) in Grid .The metric based analysis is shown in figure 3 to figure
14. We simulate flooding protocols using Network Simulator
2 [15].
Moreover, performance of flooding protocols using Grid
FSR has reduced flooding with respect to nodes. The nodes
are increased from 50, 75,100,125,150. Thus, the expectation
that the efficient flooding scheme has improved the Grid
FSR performance with various parameters.
End-to-End Delay: A specific packet is transmitting from source to destination and calculates the differ- ence between send times and received times. Delays due to route discovery, queuing, propagation and transfer time are included in the delay metric. Cer- tainly Fig. 3, and Fig.4 shows decrease in delay as in Flooding is reduced in FSR within Grid scenario.
Packet Deliver Ratio (PDR): The (PDR) is defined as
the ratio between the amount of packets sent by the source and received by the destination. Fig.5, and Fig.6 explains that PDR is more than 80% efficient in Reduced Flooding than FSR. On all other nodes PDR is better for FSR due to it scope technique and thus reduced traffic overhead.
Throughput: Throughput is the average rate of suc-
cessful data packets received at destination. It is usually measured in bits per second (bit/s or bps), and sometimes in data packets per second. The result are shown in Fig.7, and Fig.8
Jitter: Jitter is the variation of the packet arrival time.
In jitter calculation the variation in the packet arrival time is expected to be low. The delays between the different packets need to be low for better perfor- mance in ad-hoc networks. It becomes a matter of concern if it is more than the threshold value, which is different for data. The result are shown in Fig. 9 and Fig.10.
Energy: Based on realistic simulation models, these
protocols shows significant energy-conserving poten- tial. Energy is reduced in flooding becomes para- mount in constraining battery dimensions and reple- nishment needs. Although, many routing protocols that minimize the energy consumed for multi-hop packet delivery have been designed, most of them
surprisingly rely on flooding. The results are shown in Fig.11 and Fig.12 as energy is reduced due to dis- seminating flooding.
Control Overhead: The results shows that overhead
is reduced in Fig.13 and Fig.14. Network Control Overhead (NCO) [1] is used to show the efficiency of the MANET’s routing protocol scheme. It is defined, as the ratio of the number of control messages (the number of routing packets, Address Resolution Protocol (ARP), and control packets e.g., RTS, CTS and ACK) propagated by each node throughout the network and the number of the data packets received by the destinations. The reductions of network con- trol overhead at higher data rate are very significant. This is because the same amount of routing and con- trol messages are needed.
Fig. 3: End to End Delay V/s Nodes in Flooding
Fig. 4: Delay in Reduced Flooding with Grid FSR
IJSER © 2012
International Journal of Scientific & Engineering Research, Volume 3, Issue 4, April-2012
ISSN 2229-5518
7
Fig. 9 : Jitter V/s Nodes in Reduced Flooding
Fig. 5: Packet Delivery Ratio V/s Nodes in Flooding
Fig. 6 : PDR in Reduced Flooding with Grid FSR
Fig.7: Throughput V/s Nodes in Reduced Flooding
Fig. 8 : Throughput in Reduced Flooding with Grid FSR
Fig. 10: Jitter in Reduced Flooding with Grid FSR
Fig. 11: Energy V/s Nodes in Reduced Flooding
Fig. 12 : Energy in Reduced Flooding with Grid FSR
IJSER © 2012
International Journal of Scientific & Engineering Research, Volume 3, Issue 4, April-2012
ISSN 2229-5518
Fig. 13: Overhead in Reduced Flooding with GFSR
Fig. 14: Overhead V/s Nodes in Reduced Flooding
In Fig. 15, GFSR have an increase in Throughput than FSR with respect to Speed. But there is a constant decrease in throughput with speed in FSR. Delay is reduced in GFSR flooding than FSR in Fig. 16. There is certain increase in GFSR Overhead than FSR in Fig. 17. The Speed is increased from 5, 10,15,20,25 m/s. in simulation.
8
Fig. 16: FSR & GFSR – Speed V/s Delay
Fig. 17: FSR & GFSR – Speed V/s Overhead
Fig. 15: FSR & GFSR – Speed V/s Throughput
Fig. 18: Probabilistic Flooding of Rebroadcasting in
Nam W indow
IJSER © 2012
9
International Journal of Scientific & Engineering Research, Volume 3, Issue 4, April-2012
ISSN 2229-5518
Fig. 19 : Reduced Flooding in NAM W indow
Through a comparative study of efficient flooding, we have shown the above results. Figure 18 and 19 above shows the output NAM Window of Rebroadcasting and reduced flood- ing during simulation output.
Firstly, probability in Intimacy factor under certain cir- cumstances, as the source node can rebroadcast the message with a hop count that can be found using an algorithm to increase the depth of flooding exponentially further to lo- cate the destination. The protocol scales well for networks of all sizes. Secondly, The efficiency of the protocol has vary- ing degrees of dependency with many parameters of the net- work, which includes the timeout period, the intimacy factor and others. Finally, the reduced flooding in routing traffic overhead and periodical propagation of link state in- formation makes Grid FSR suitable for the high mobile dy- namic changing network topology and thus the throughput is good with the high mobility of nodes, and therefore the av- erage end-to-end delay is also very low. One of our future research works is to develop an efficient and optimized routing protocol with heavy mobility and routing overheads with different Mobility Models. Also the above proposed work will be interpreted in Rough Set Theory.
The First Author extends her gratitude to UGC as this re- search work was supported by Basic Scientist Research (BSR) Non-SAP Scheme, under grant reference number,F-4-
1/2006(BSR)/11-142/2010(BSR) UGC XI Plan.
[1] S.Nithya Rekha, Dr.C.Chandrasekar, R.Kaniezhil, ―Efficient Routing Algorithm for MANET using Grid FSR‖, In the International Pro- ceedings of Computer Science and Advancement in Information Technology & Business, Management and Governance (IPCSIT)
2011,Vol.20, pp.86-92, IACSIT Press, Singapore.
[2] T. W. Chen and M. Gerla, ―Global State Routing: A New Routing Scheme for Ad-hoc Wireless Networks,‖ In Proceedings of IEEE ICC’98, Atlanta, GA, Jun.1998, pp. 171-175.
[3] G. P. Mario, M. Gerla and T-W Chen, ―Fisheye State Routing: A Routing Scheme for Ad Hoc Wireless Networks, ―Proceedings of the International Conference on Communications, New Orleans, USA, June 2000, pp. 70 -74.
[4] Ashish K. Maurya and Dinesh Singh, ―Simulation based Perfor- mance Comparison of AODV, FSR and ZRP Routing Protocols in MANET‖, In International Journal of Computer Applications,(0975 -
8887) Vol.12-No.2, Nov.2010.
[5] Yunjung Yi, Mario Gerla, Taek Jin Kwon, Efficient Flooding in Ad hoc Networks: a Comparative Performance Study. In the Proceed- ings of the IEEE International Conference on Communications (ICC)
2003.
[6] I. Stojmenovic, (Handbook of Wireless Networks and Mobile Com- puting, Wiley, New York, 2002.
[7] S.Nithya Rekha, Dr.C.Chandrasekar, R.Kaniezhil, ― Effect of Quality Parameters in Efficient Routing Protocol – Grid FSR with Best QoS Constraints‖ International Journal of Computer Applications,Vol.
37,No.2, pp.51-57, January 2012. Published by Foundation of Com- puter Science, New York, USA.
[8] Yoav Sasson, David Cavin, Andre Schiper, Probabilistic Broadcast for Flooding in Wireless Mobile Ad hoc Networks. In the Proceed- ings of Wireless Communications and Networking, 2003. WCNC
2003. IEEE Explore.Vol.2,pp. 1124 - 1130 .
[9] Jang-Ping Sheu,Cheng-Ta Hu,Chin-Min Chao, ―Energy-Conserving Grid Routing Protocol In Mobile Ad Hoc Networks‖, Published In The handbook of ad hoc wireless networks by CRC Press, Inc. Boca Raton, FL, USA ©2003,ISBN:0-8493-1332-5.
[10] Ronald L. Graham, Donald E. Knuth, Oren Patashnik, Concrete
Mathematics, Addison Wesley Publishing Company, Pub., 1989.
[11] M. Chatterjee, S.K. Das, and D. Turgut.WCA: A weighted clustering algorithm for mobile ad hoc networks. Journal of Cluster Compu ting, volume 5(2), pages 193–204, 2002.
[12] Y. Sasson, D. Cavin, and A. Schiper, Probabilistic broadcast for flooding in wireless mobile ad hoc networks, In Proc. IEEE Wireless Communications & Networking Conference (WCNC - 2003), pp.
1124–1130, March 2003.
[13] Ioannis C.Avramopoulos, Hisashi Kobayashi, ―Guaranteed Delivery
Flooding Protocols for Mobile Ad Hoc Networks‖.
[14] Imrich Chlamtac, Marco Conti, Jennifer J.-N.Liu, Mobile ad hoc networking: imperatives and challenges.
IJSER © 2012
10
International Journal of Scientific & Engineering Research, Volume 3, Issue 4, April-2012
ISSN 2229-5518
[15] The Network Simulator ns-2,http://www.isi.edu/nsnam/ns/ns- man.html.
[16] W. Lou, and J. Wu, On reducing broadcast redundancy in mobile ad hoc networks, IEEE Transactions Mobile Computing, Vol. 1, No. 2, pp. 111–123, 2002.
[17] J. Wu and F. Dai, Broadcasting in ad hoc networks based on self- pruning, In Proc. Annual Joint Conference IEEE Computer and Communications Societies (INFOCOM_ 2003), Vol. 3, pp. 2240–2250,
2003.
[18] R. S. Sisodia, B. S. Manoj and C. Siva Ram Murthy, ―A Preferred Link-Based Routing Protocol for Ad Hoc Wireless Networks,‖ Jour- nal of Communications and Networks, vol. 4, no. 1, March 2002, pp.
14-21.
IJSER © 2012