Professional Documents
Culture Documents
Abstract – Mobile ad hoc network (MANET) is a self- In Pure or blind flooding [5] the flooding message is
organized and self-configurable infrastructure less network transmitted again in the network by the receiving node. It
where the mobile nodes move arbitrarily. One of the major also assures that the flooded messages reaches every other
characteristic that differentiate mobile ad-hoc networks from node in the network provided the connections in the network
other types of networks is the ability of the mobile nodes to remain connected and also the network is collision free. But
receive and forward packets as a router. The focus of the work at the same time, huge amount of energy of the mobile
is to devise a strategy to control the flooding of control packets nodes is consumed and congestion is caused due to the
through the network in a way to improve the QoS parameters generation of redundant messages causing huge traffic. The
associated with MANETs. The proposed strategy tries to
congestion in the network increases the chances of collision
reduce the number of the intermediate nodes that participate
which further leads to retransmission of messages and also,
in the route discovery process thereby, reducing the total
number of control packets that are forwarded by the nodes in some nodes may fail to receive the messages. Sinha et al. [6]
the network. This is achieved by controlling the route request suggested that the number of nodes in the network that
(RREQ) broadcast storm using the node’s queue length. The receive a broadcast message is 80% low in moderately
source appends a random number with RREQ which is sparse graphs as compared to the dense networks. However
compared with the queue vacancy proportion at each in dense networks, this results into wastage of bandwidth
intermediate node. The intermediate node relays the RREQ and scarce node resources.
packet if the random number generated is less than the queue
The pure flooding, thus, suffers from the problem of
vacancy proportion. This reduces the number of congested
nodes forwarding the RREQ packets thereby improving QoS
contention, collision and redundant broadcast. Together,
parameters, preserving the energy and increasing the overall these are referred to as the broadcast storm problem [7]. To
network lifetime. The proposed algorithm Q-AODV is counter this problem many efficient flooding techniques
advancement over AODV that tries to find a less congested have been proposed. These techniques may be classified
route based on queue vacancy. The proposed algorithm Q- into three categories:
AODV improves average end to end delay, throughput and
x Probabilistic Techniques: The nodes that use
jitter, to some extent, as compared to AODV. The simulation
has been carried out on Qualnet.
probability based techniques for flooding decide to
transmit the message depending upon a specific
calculated probability or upon the occurrence of an
Keywords— AODV, Q-AODV, Queue, Queue length, Cross
event that related to the calculation of the probability
Layer, QoS, Improved QoS, Energy Efficient, Routing Protocol which with message can be transmitted further to the
neighboring nodes. Probabilistic based techniques
I. INTRODUCTION are usually proposed so as to reduce the amount of
redundant rebroadcasts. In order to avoid collisions,
this method also differentiates the timings of the
Broadcasting is the most elementary and the basic broadcasting of the messages. The probabilistic
operation in MANETs and plays an important role. It simply scheme includes probability-based and counter-based
means that a message is diffused to all nodes of the network methods.
from a given source node. The simplest and the commonly
used method for broadcasting in MANETs is flooding, x Area-Based Techniques: Area-Based Techniques use
where every uniquely received message is retransmitted knowledge of sender node locations to estimate
exactly once by each node. Various routing protocols, like whether a transmission would reach a significant
DSR (Dynamic Source Routing) [1], AODV (Ad hoc On amount of additional coverage area. In case of Area
Demand Distance Vector Routing) [2], ZRP (Zone Routing Based techniques, if the distance from the previously
Protocol) [3], LAR (Location-Aided Routing) [4], etc., broadcasting node is large then there is a higher
transmit route discovery packets, route maintenance packets probability of reaching more nodes. The relative
and topology update packets using the flooding technique. distance between neighbor nodes is estimated
This flooding function is very often raised in MANETs and either based on the received signal strength
thus, implementation of an efficient and effective flooding (distance-based scheme) or based on pre-acquired
scheme is crucial and important for optimizing the location information of neighbors by location
throughput of the network and for reducing the overhead of tracking devices such as the Global Position System
the routing protocols. (location-based scheme). The area based techniques
include distance-based and location-based schemes.
x Neighbor knowledge techniques: Neighbor forwarder node or not, if so, it repeats the process of
Knowledge Techniques require the use of “Hello” selecting the forwarder nodes and attaches it to the RREQ
type packets so that nodes have explicit data before rebroadcasting it; otherwise it will drop the RREQ.
regarding their neighboring nodes and depending The routing overhead of the AODV protocol has been
upon this knowledge further broadcast of the packets reduced by 38% by using this protocol.
is decided.
R. Vinod Kumar et al in [10] have proposed an energy
II. LITERATURE REVIEW efficient routing scheme (EEAODV) based on node’s
energy and congestion level. In their work every
Broadcasting is the fundamental communication intermediate node on receiving a RREQ, calculates a
operation in Mobile Ad hoc Networks where one node sends threshold value essentially based on its queue occupancy
a message to all other nodes in the network. Broadcasting is and energy level. The threshold value is then compared with
also used for topology updates, for network maintenance, or interface queue occupancy, and the node rebroadcasts the
simply for sending a control or warning message. Flooding RREQ only if its interface queue occupancy is lower than
is a popular broadcast scheme used during the discovery the threshold value. In this way overloaded nodes do not
phase of most MANET routing protocols, where every take part in the formation of new routes, and traffic load is
message that is received for the first time, is broadcasted to distributed evenly across network. The proposed scheme has
all the neighboring nodes. Using flooding, each node been shown by the authors to have better energy efficiency
receives the message from all its neighbors in a collision- and end to end delay.
free network. A lot of research has been done for the
reduction of surplus transmissions from neighboring nodes. K. Muthumayil et al in [11] have proposed a dynamic
Some have used the probabilistic approach for controlling and energy conscious routing algorithm ECL-AODV. The
the flooding of control packets while others have used the proposed algorithm works by avoiding the nodes having low
threshold value of remaining battery. Few have taken into residual energy, and tries to establish a route with high
consideration the threshold on the node’s queue length along residual energy. The proposed routing protocol promotes
with the hop count. balanced energy consumption across the network thereby
increasing the lifetime of the network.
Daniel Reina et al in [8] have proposed broadcast
scheme based on probabilistic flooding technique for mobile Radhika D. Joshi et al in [12] have proposed a flood
wireless networks. In addition to addressing the broadcast control algorithm DEEAR, in which every intermediate
storm problem, the protocol also extends the lifetime of the node receiving a RREQ packet delays the rebroadcast of the
network. Authors have suggested the use of simple RREQ packet by rebroadcast time proportional to the ratio
probabilistic broadcast scheme based upon battery level of of mean residual battery power of the entire network to its
the nodes. All the nodes exchange their battery levels by residual battery power, and hence the nodes having low
periodically sending HELLO messages. The initiation of the battery level will rebroadcast RREQ packets later than the
process of route discovery is done by a node with the help of nodes with relatively higher battery level.
flooding. The RREQ packets are flooded in the network Sunho Lim et al in [13] have proposed a novel
which includes the information about the maximum and communication mechanism, called Random Cast, in which a
minimum battery levels in the neighborhood of the sender node defines a threshold value for overhearing, that
originator node. Every intermediate node on reception of a maintains a balance between energy and routing
RREQ packet calculates its forwarding probability performance. It also reduces superfluous rebroadcasts for
depending upon its own battery level and the maximum and broadcast packets, thereby saving more energy.
minimum battery levels. The proposed simple probabilistic RandomCast allows a node to decide whether to overhear (a
based algorithm extends network lifetime, and has higher unicast message) and whether to forward a broadcast
throughput and improved fault tolerance. message or not. Every node maintains an overhearing
Sofian Hamad et al [9] has proposed a proficient (rebroadcast) probability based on its mobility, the number
flooding CNRR (Candidate Neighbors to Rebroadcast the of neighbors and sender ID. Random Cast has been shown
RREQ) algorithm in which the packets are rebroadcasted to improve the energy good put by as much as 56 percent.
based upon the node’s position in the network thereby In literature, many researchers have provided the
efficiently spreading the control packets across the network. overview [14][15][16][17][18][19] of various routing
The proposed algorithm is applied on AODV’s route protocols while focusing on the advantages and
discovery process to reduce the number of Route Request shortcomings of each of them. However, the broadcast
(RREQ) messages that propagate through the network. The storm is one of the key concerns of the Mobile Ad hoc
proposed algorithm improves the performance of the Networks [20][21][22]. Flooding also results in wastage of
network by decreasing the retransmission that are redundant considerable amount of the sacred energy resource. In past
in nature, thus helps in minimizing the chances of collision few years’, lot of researchers have focused in the area of
among the nodes and also reduces the chances of contention. flooding [23][24][25][26][27][28][29]. Some have used the
The algorithm does its work by partitioning the radio probabilistic approach to control the broadcast storm, some
transmission range of the nodes into four zones such that have used the area based or neighborhood based knowledge
only one node per zone is selected to forward the RREQ. [30][31], few have used the dominating set theory
The selection is done on the basis of the closeness of the [32][33][34] while various others have used the hybrid or
nodes towards the edge of the zone such that more area can the adaptive approaches. However most of them, using the
be covered. The node broadcasting the RREQ attaches the probabilistic approach, have considered mainly the battery
address of the Candidate Neighbors to Rebroadcast the life as the metric to avoid flooding, for example choosing
RREQ (CNRR) into RREQ. Whenever a node receives the the nodes having high remaining battery as the relaying
RREQ packet, it checks if the sender node has selected it as
295
2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)
296
2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)
297
2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)
Throughput
83205
81681
81120
80784
Throughput (bits/s)
67298
67417
35830
34163
33916
29338
100000
50000
AODV
0
1 2 3 4 5 Q-AODV
CBR
5.67617
6.5608
2.68552
10
2.13175
1.52715
1.04429
2.7983
2.15975
0.673681
0.588419
1.3955
Jitter (ms)
1.1287
298
2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)
299