Vous êtes sur la page 1sur 9

A Review of Broadcasting Methods for Mobile Ad Hoc Network

N.Karthikeyan1 Dr.V.Palanisamy2 Dr.K.Duraiswamy3

1
Research Scholar, Department of Computer Application
SNS College of Technology, Sathy Main Road, Coimbatore-641035, Tamilnadu, India
Telephone: +91-422-2669118, Mobile: +91-98427 90907 E-Mail: kaartheekeyan@rediffmail.com
2
Principal, Info Institute of Engineering and Technology, Sathy Main Road, Coimbatore-641107.
3
Dean, K.S. Rangasamy College of Technology, Tiruchengode - 637215.

Abstract: Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile hosts forming a
temporary network without the aid of any stand-alone infrastructure or centralized administration.
Mobile Ad-hoc networks are self-organizing and self-configuring multi hop wireless networks
where, the structure of the network changes dynamically. This is mainly due to the mobility of
nodes. The Nodes in the network not only acts as hosts but also as routers that route data to or
from other nodes in network. In mobile ad-hoc networks where there is no infrastructure support
as is the case with wireless networks, and since a destination node might be out of range of a
source node transmitting packets; a routing procedure is always needed to find a path so as to
forward the packets appropriately between the source and the destination. Network wide
broadcasting is an important function in MANETs, which attempts to deliver packets from a
source node to all other nodes in the network. Network wide broadcasting provides route
establishment and control functionality for a number of unicast and multicast protocols. This
paper discusses a broad range of research issues such as routing and routing protocols and
different broadcasting approaches in MANET environment.

Keywords: Mobile ad hoc network, routing protocols, broadcasting methods

1. INTRODUCTION devices communicate with access points like


base stations connected to the fixed network
The Internet Engineering Task Force (IETF) infrastructure. It is depict in Figure.1(a)
created a Mobile Ad hoc Network (MANET) working
group to standardize IP routing protocol functionality 2) Infrastructure-less – In Figure.1 (b)
suitable for wireless routing application within both static infrastructure-less approach, the mobile
and dynamic topologies with increased dynamics due to wireless network is commonly known as a
node motion and other factors. The vision of ad hoc mobile ad hoc network (MANET). A MANET
network is wireless internet, where users can move is a collection of wireless nodes that can
anywhere anytime and still remaining connected with the dynamically form a network to exchange
rest of the world. information without using any pre-existing
fixed network infrastructure.
The Mobile Ad-Hoc Network is characterized by
energy constrained nodes, bandwidth constrained links
and dynamic topology. In real-time applications, such as
audio, video, and real-time data, the ad hoc networks
need for Quality of Service (QoS) in terms of delay,
bandwidth, and packet loss is becoming important.
Providing QoS in ad-hoc networks is a challenging task
because of dynamic nature of network topology and
imprecise state information. Hence it is important to have
a dynamic routing protocol with fast re-routing
capability, which also provides stable route during the
life-time of the flows. Generally there are two distinct Figure 1: MANET Approaches
approaches for enabling wireless mobile units to
communicate with each other: The infrastructure-less approach is increasingly
becoming a very important part of communication
1) Infrastructure-based - Wireless mobile networks technology, because in many contexts information
have traditionally been based on the cellular exchange between mobile units cannot rely on any
concept and relied on good infrastructure support fixed network infrastructure, but on rapid
such as access point and backbone. Here mobile configuration of a wireless connections on-the-fly. In
infrastructure less network, a MANET consists of a set 1.2 Applications of MANET
of mobile nodes that may communicate with one another There are numerous scenarios that do not have an
from time to time, and where no base stations present. available network infrastructure and could benefit
Each host is equipped with a CSMA/CA transceiver. In from the creation of an ad hoc network.
such case, a mobile node may communicate with each
other directly or indirectly. If it is a indirect  Rescue/Emergency operations:
communication, a multi-hop scenario occurs, where the Rapid installation of a communication
packets originated from the source host are relayed by infrastructure during a natural/environmental
several intermediate mobile nodes before reaching the disaster that demolished the existing
destination. communication infrastructure line telephone
lines, backbones and access points.
Broadcasting is often used as a building block for
route discovery in on-demand ad hoc routing protocols.  Law enforcement activities:
For designing for ad hoc networks, one of the primary Rapid installation of a communication
goal is to reduce the overhead (collision and infrastructure during special operations.
retransmission, redundant retransmission) while reaching
all the nodes in the network. In wireless broadcasting, if  Commercial projects: Simple
all neighboring nodes relay or rebroadcast the received installation of a communication infrastructure
packet immediately, it will result in the problem of for commercial gatherings such as conferences,
“broadcast storm”. To avoid the broadcast storm exhibitions, workshops and meetings.
problem, some form of randomized delay can be
introduced before a neighboring node relays the received  Educational classrooms: Simple
packet. The performance of broadcast protocols can be installation of a communication infrastructure
measured by a variety of metrics. A commonly used to create an interactive classroom on demand.
metric is the number of messages retransmissions with
respect to the number of nodes. The next important
metric is reachability or the ratio of nodes connected to
the source that received the broadcast message. Time
delay or latency is sometimes used, which is the time
needed for the last node to receive the broadcast message
initiated at the source.

1. 1. MANET Characteristics

The fundamental difference between fixed networks


and MANET is that the computers in a MANET are
mobile. Due to the mobility of these nodes, there are
some characteristics that are only applicable to MANET.
Some of the key characteristics are described below [1]:

1. Dynamic Network Topologies: Nodes are free to


Figure 2: Ad-hoc Technology for Military Communications
move arbitrarily, meaning that the network topology,
which is typically multi-hop, may change randomly With the increase of portable devices as well as
and rapidly at unpredictable times. progress in wireless communication, ad hoc
networking is gaining importance with the increasing
2. Bandwidth constrained links: Wireless links have number of widespread applications. Ad hoc
significantly lower capacity than their hardwired networking can be applied anywhere where there is
counterparts. They are also less reliable due to the little or no communication infrastructure or the
nature of signal propagation. existing infrastructure is expensive or inconvenient
to use. Typical applications include [2]:
3. Energy constrained operation: Devices in a mobile
network may rely on batteries or other exhaustible • Military battlefield: Ad hoc networking would
means as their power source. For these nodes, the allow the military to take advantage of
conservation and efficient use of energy may be the commonplace network technology to maintain
most important system design criteria. an information network between the soldiers,
vehicles, and military information head quarters.
The MANET characteristics described above imply Ad hoc Technology for military communication
different assumptions for routing algorithms as the is shown in Figure. 2.
routing protocol must be able to adapt to rapid changes
in the network topology. • Commercial sector: Emergency rescue
operations (like fire, flood, earthquake, etc.,)
must take place where non-existing or damaged
communications infrastructure and rapid corresponding hop-count from the node. Each route
deployment of a communication network is needed. table entry is tagged with a sequence number, which
is created by a destination node. To maintain
• Local level: Ad hoc networks can autonomously consistency of the route tables in a dynamically
link an instant and temporary multimedia network changing network topology, each node transmits
using notebook computers or palmtop computers to table updates either periodically (periodic update) or
spread and share information among participants at a when new significant information is available
e.g. conference or classroom. (triggered update).

• Personal Area Network (PAN): Short-range Routing information is advertised by


MANET can simplify the intercommunication broadcasting or multicasting. The packets are
between various mobile devices (such as a PDA, a transmitted periodically and incrementally as
laptop, and a cellular phone). topological changes are detected. Topological
changes include movement of a node from place to
place or the disappearance of the node from the
2. ROUTING PROTOCOLS IN MANET network. Information about the time interval between
arrival of the very first routing solution and the
Broadcasting may be used to disseminate data to all arrival of the best routing solution for each particular
other nodes in the network or may be used by MANET destination is also maintained. On the basis of this
unicast or multicast routing protocols to disseminate information, a decision may be made to delay
control information. For example, unicast protocols such advertising routes that are about to change, thus,
as Dynamic Source Routing (DSR), Ad Hoc On Demand reducing fluctuations in the route tables. The
Distance Vector (AODV), Zone Routing Protocol (ZRP) advertisement of possible unstable routes is delayed
and Location Aided Routing (LAR) use broadcasting to to reduce the number of rebroadcasts of possible
establish routes. Currently these protocols all rely on a route entries that normally arrive with the same
simple form of plain or blind flooding technique, in sequence number.
which each node retransmits each received unique packet
exactly one time. The main role of broadcasting methods The proactive routing protocols are
in Routing protocols are route discovery process in
several routing protocols such as DSR, AODV, ZRP, and Destination-sequenced distance vector
LAR, when advising an error message to erase invalid (DSDV)
routes from the routing table, or as an efficient Wireless routing protocol
mechanism for reliable multicast in a fast-moving (WRP)
MANET. According to the routing strategy the routing Global state routing (GSR)
protocols can be categorized as [3, 4] Fisheye state routing (FSR)
Source-tree adaptive routing
 Proactive routing protocols and
 Reactive on-demand routing protocols (STAR)
Distance routing effect algorithm for mobility
2.1 Proactive (Table-Driven) Routing Protocols
(DREAM)
These routing protocols are similar to and come as Multimedia support in mobile wireless network
a natural extension of those for the wired networks. In
proactive routing, each node has one or more tables that (MMWN)
contain the latest information of the routes to any node in Cluster-head gateway switch routing
the network. The two kinds of table updating in proactive
protocols are the periodic update and the triggered (CGSR)
update. In periodic update, each node periodically Hierarchical state routing (HSR)
broadcasts its table in the network. Each node just Optimized link state routing
arriving in the network receives that table. In triggered (OLSR)
update, as soon as a node detects a change in its Topology broadcast reverse path forwarding
neighborhood, it broadcasts entries in its routing table
that have changed as a result. (TBRP
F)
Proactive routing tends to waste bandwidth and
power in the network because of the need to broadcast 2.2 Reactive Routing Protocols
the routing tables/updates. Furthermore, as the number of
nodes in the MANET increases, the size of the table will On-demand routing protocols were designed to
increase; this can become a problem in and of itself. reduce the overheads in proactive protocols by
DSDV, which is known not to be suitable for large dense maintaining information for active routes only. This
networks, was described in. A route table at each node means routes are determined and maintained for
enumerates all available destinations and the nodes that require to send data to a particular
destination. Route discovery usually occurs by flooding a
route request packets through the network. Network-wide broadcasting [5] aims at
distributing messages from the source node to all
Reactive protocols can be classified into two other nodes in the network. Broadcasting is a major
categories: source routing and hop-by-hop routing. In communication primitive required by many
source routed on-demand protocols each data packets applications and protocols in MANETs. Broadcast
carry the complete the source to destination address. protocols are a fundamental building block to realize
Therefore, each intermediate node forwards these principal middleware functionalities such as
packets according to the information kept in the header replication, group management and consensus.
of each packet. This means that the intermediate nodes Furthermore, broadcasting is frequently used to
do not need to maintain up-to-date routing information discover and advertise resources. A simple example
for each active route in order to forward the packet of resource discovery is the route discovery in many
towards the destination. Furthermore, nodes do not need reactive routing protocols. Broadcasting is also
to maintain neighbor connectivity through periodic frequently used to distribute content to all network
beacon messages. The major drawback of with source participants, such as alarm signals or
routing protocols is that in large networks they do not announcements. In highly dynamic scenarios,
perform well. This is due to two main reasons; firstly as broadcasting serves as a robust way of realizing
the number of intermediate nodes in each route grows, other communication primitives, such as multicast.
then so does the probability of route failure. Secondly, as
the number of intermediate nodes in each route grows, Design Issues
then the amount of overhead carried in each header of
each packet will grow as well. Therefore, in large The air interface is a shared medium, which
networks with significant levels of multi-hoping and shows its broadcast nature. This broadcast nature of
high levels of mobility, these protocols may not scale radio channels can be exploited for simple and
well. efficient local broadcasting. We refer by local
In hop-by-hop routing (also called as point-to-point broadcast or MAC broadcast to the capability of
routing) each data packet only carries the destination sending one message to all nodes within the
address and the next hop address. Therefore, each communication range using one single transmission.
intermediate node in the path to the destination uses its This capability can be used to send network-control
routing table to forward each data packet towards the traffic to all neighbors (e.g. HELLO beacons) or to
destination. The advantage of this strategy is that routes support broadcasting algorithms. Since in a shared
are adaptable to the dynamically changing environment medium a broadcast to all nodes in the transmission
of MANETs, since each node can update its routing table range costs the sender as much as one unicast
when they receiver fresher topology information and transmission to a single neighbor, it is recommended
that broadcasting strategies exploit this property.
hence forward the data packets over fresher and better
Here, we focus on the IEEE 802.11 standard.
routes. Using fresher route recalculations are required
Therefore, all nodes located within the
during data transmission. The disadvantage of this
communication range are able to receive a local
strategy is that each intermediate node must store and broadcast. Using local broadcast nodes do not use the
maintain routing information for each active route and optional RTS/CTS optimization of CSMA/CA, but
each node may require to be aware of their surrounding transmit data (on a free channel) and without any
neighbors through the use of beaconing messages. consideration for hidden terminals. The lack of the
RTS/CTS feature may also lead to the exposed
The reactive routing protocols are terminal problem, which reduces the network
capacity. Therefore, MAC broadcasting decreases
Ad hoc on-demand distance vector (AODV) the reliability of data delivery compared to sending
Dynamic source routing (DSR) the message to all neighbors using unicast with the
Routing on-demand acyclic multi-path (ROAM) RTS/CTS scheme. However, MAC broadcasting
Light-weight mobile routing (LMR) massively reduces the number of transmissions
Temporally ordered routing algorithm (TORA) compared to the unicast-based broadcast.
Accordingly, MAC broadcasting is frequently used
Associated-based routing (ABR)
to develop broadcast protocols in MANETs.
Signal stability adaptive (SSA)
Relative distance micro-discovery ad hoc routing The most straightforward solution for
(RDMAR) broadcasting is when nodes forward a received
Location-aided routing (LAR) message to all their neighbors using local broadcasts.
Ant-colony-based routing algorithm (ARA) Eventually, all nodes within the network should
receive the message. This primitive strategy is like a
Flow oriented routing protocol (FORP)
flood and therefore, is called plain flooding (also
Cluster-based routing protocol (CBRP) called simple flooding, pure flooding, or blind
flooding). Even though flooding might lead to an
3.0 BROADCASTING IN MANET unnecessary message overhead, it should provide a
robust basic strategy for broadcasting in networks
with an unknown or changing topology. Due to its directional predecessor, DSP achieves much lower
simplicity, localized nature, and topology transparency, broadcast redundancy and conserves bandwidth and
flooding is widely used in MANETs as a basic scheme energy consumption. DSP is based on 2-hop
for many broadcast protocols. However, the topology information and does not rely on any
characteristics of MANETs still prohibit a flooding location or angle-of-arrival (AoA) information. A
process from reaching every node. If the density of nodes special case of DSP can be used for preserving
is too high, the radio transmission will block out shortest paths in on-demand route discovery
messages, since too many nodes are repeating their processes. Another special case of DSP is proposed
incoming messages. This problem is referred to as to use the directional reception mode in
broadcast storms [6]. It describes three major problems broadcasting. This paper proved that the average
that in particular occur if plain flooding is used to realize number of forward nodes in DSP is within a constant
broadcasting in crowded MANETs: redundancy, factor of the minimal value in an optimal solution.
collisions and contention. Extensive simulation results show that DSP
outperforms many existing directional and omni
Redundancy takes place if message forwarding is directional broadcast protocols in terms of efficiency
useless because it only reaches nodes that already have and/or reliability.
received the message. In order to send a broadcast
message, a mobile node only needs to assess a clear Jie Wu, Fei Dai[8], proposed and evaluated a
channel before transmitting. Therefore, collision (e.g. mobility management method based on the use of
due to a hidden node) may occur frequently. Without two transmission ranges. Using this mechanism, it
further measures, a mobile node is not able to know can also be extended Wu and Dai’s coverage
whether a message was successfully received by its condition to a dynamic environment where network
neighbors. Contention occurs if the sender has messages topology is allowed to change, even during the
in its MAC buffer but it could not send them. Depending broadcast process. In addition, connectivity, link
on the buffer strategy and its parameters, messages may availability, and consistency issues related to
be deleted from the queue, if the channel is blocked by neighborhood information of different nodes have
other neighbors. also been addressed. This scheme can also be
extended to provide mobility management for other
In order to relieve the broadcast storm problem, activities such as topology control in MANETs.
strategies to restrict forwarding to a subset of nodes have
to be developed. It is obvious that for a fixed Ivan, Mahtab and Jovisa[9] proposed the
communication range the intensity of the broadcast broadcasting method significantly to reduce the or
storm problem depends on the node density, i.e. number eliminate the communication overhead of a
of nodes per unit of area. Therefore, node density has a broadcasting task by applying the concept
great impact on the performance of such strategies. On neighboring nodes. Retransmissions by only internal
the other hand, if node density is very low, the network nodes in a dominating set are sufficient for reliable
becomes partitioned and flooding will only reach nodes broadcasting. It also proposed to eliminate neighbors
in the partition containing the source. The common that already received the message and rebroadcast
approach to deal with partitioning is that nodes cache only if the list of neighbors that might need the
messages and repeat forwarding at the appropriate time, message is nonempty. The important features of this
i.e. partition join. We call each repetition and subsequent work is reliability (reaching all nodes in the absence
forward a rebroadcast. For this purpose we need efficient of message collisions), significant rebroadcast
repetitive strategies. Global view detection may become savings, and their localized and parameter less
very costly in MANETs and particularly in highly behavior. The reduction communication overhead for
mobile ones. Therefore, scenario detection is undesired broadcasting take is measured experimentally.
in MANETs. Furthermore the same node may participate
in different MANET scenarios. As a result, we require a 5.0 BROADCASTING METHODS IN
generalized technique for broadcasting, which is suitable MANET
for most of application scenarios.
5.1 Simple Flooding Method
4.0 RELATED WORK
In this method[10], a source node of a
The following are the qualitative and quantitative MANET disseminates a message to all its
analysis of broadcasting methods of MANET by means neighbors, each of these neighbors will check if
of different performance metrics. they have seen this message before, if yes the
message will be dropped, if not the message will
Fei Dai, Jie Wu [7], proposed and implemented an redisseminated at once to all their neighbors. The
efficient broadcast protocol for ad hoc networks using process goes on until all nodes have the message.
directional antennas. This protocol, called directional Although this method is very reliable for a MANET
self-pruning (DSP), is a non-trivial generalization of an with low density nodes and high mobility but it is
existing localized deterministic broadcast protocol using very harmful and unproductive as it causes severe
omni directional antennas. Compared with its omni network congestion and quickly exhaust the battery
power. Blind flooding ensures the coverage; the see if any node is closer than a threshold distance
broadcast packet is guaranteed to be received by every value. If true, the node doesn’t rebroadcast.
node in the network, providing there is no packet loss
caused by collision in the MAC layer and there is no Location-Based Scheme:
high-speed movement of nodes during the broadcast
process. However, due to the broadcast nature of wireless The Location-Based scheme uses a more
communication media, redundant transmissions in blind precise estimation of expected additional coverage
flooding may cause the broadcast storm problem [11], in area in the decision to rebroadcast. In this method,
which redundant packets cause contention and collision. each node must have the means to determine its own
location, e.g., a Global Positioning System (GPS).
5.2 Probability based Approach Whenever a node originates or rebroadcasts a packet
it adds its own location to the header of the packet.
Probabilistic based Flooding: When a node initially receives a packet, it notes the
location of the sender and calculates the additional
The Probabilistic scheme [10, 11] is similar to coverage area obtainable were it to rebroadcast. If the
Flooding, except that nodes only rebroadcast with a additional area is less than a threshold value, the
predetermined probability. In dense networks multiple node will not rebroadcast, and all future receptions of
nodes share similar transmission coverage. Thus, the same packet will be ignored. Otherwise, the node
randomly having some nodes not rebroadcast saves node assigns a RAD before delivery. If the node receives a
and network resources without harming delivery redundant packet during the RAD, it recalculates the
effectiveness. In sparse networks, there is much less additional coverage area and compares that value to
shared coverage; thus, nodes won’t receive all the the threshold. The area calculation and threshold
broadcast packets with the Probabilistic scheme unless comparison occur with all redundant broadcasts
the probability parameter is high. When the probability is received until the packet reaches either its scheduled
100%, this scheme is identical to Flooding.
send time or is dropped.
Counter-Based Scheme:
5.4 Neighbor Knowledge Method
Ni [12] et al show an inverse relationship between
the number of times a packet is received at a node and Self Pruning:
the probability of that node being able to reach additional
area on a rebroadcast. This result is the basis of their Self Pruning is an effective method in reducing
Counter-Based scheme. Upon reception of a previously broadcast redundancy. Each node in this approach
unseen packet, the node initiates a counter with a value is required to have knowledge of its neighbors,
of one and sets a Random Access Delay(RAD) (which is this knowledge can be achieved by periodic
randomly chosen between 0 and Tmax seconds). During ”Hello” messages. The receiving node will first
the RAD, the counter is incremented by one for each compare its neighbor lists to that of sender’s list, the
redundant packet received. If the counter is less than a receiving node will rebroadcast if the additional
threshold value when the RAD expires, the packet is nodes could be reached, otherwise the receiving
rebroadcast. Otherwise, it is simply dropped. node will drop the message. This is the simplest
approach in the neighbor knowledge method. In
5.3 Area Based Methods Figure 3, after receiving a message from node 2 node
1 will rebroadcast the message to node 4 and node 3
Suppose a node receives a packet from a sender that as it’s only additional nodes. Note that node 5
is located only one meter away. If the receiving node also will rebroadcast the same message to node
rebroadcasts, the additional area covered by the 4 as it’s only additional node. In this situation still
retransmission is quite low. On the other extreme, if a the message redundancy takes place.
node is located at the boundary of the sender node’s
transmission distance, then a rebroadcast would reach
significant additional area, 61% to be precise[12]. A 6
5
node using an Area Based Method can evaluate
additional coverage area based on all received redundant 4
transmissions. We note that area based methods only 7
consider the coverage area of a transmission; they don’t
1 2
consider whether nodes exist within that area.

Distance-Based Scheme:
3
A node using the Distance-Based Scheme compares
the distance between itself and each neighbor node that Figure 3: Self Pruning approach
has previously rebroadcast a given packet1. Upon
Ad Hoc Broadcasting Approach:
reception of a previously unseen packet, a RAD is
initiated and redundant packets are cached. When the
In this approach, only nodes selected as gateway
RAD expires, all source node locations are examined to
nodes and a broadcast message header are allowed to Resource Discovery and Advertisement:
rebroadcast the message. The approach is described as
follows: Further typical broadcast scenarios are resource
1. Locate all two hop neighbors that can only be (or service) discovery and advertisement. MANET
reached by a one hop neighbor. Select these one nodes may have little or no knowledge at all about
hop neighbors as gateways. the capabilities and services offered by each other.
2. Calculate the cover set that will receive the Therefore, mechanisms for resource discovery or
message from the current gateway set advertisement are important for these self-
3. for the neighbors not yet in the gateway set, find configurable networks. Due to the decentralized and
the one that would cover the most two hop highly dynamic nature of MANETs, service
neighbors not in the cover set. Set this one hop discovery and service advertisement frequently use
neighbor as a gateway. broadcasting strategies. An example of resources is a
4. Repeat process 2 and 3 until all two hop neighbors are multi-hop routing path to a given destination. For
covered. highly dynamic topologies the route is continuously
5. When a node receives a message and is a changing and the resource is so highly dynamic that
gateway, this node determines which of its maintaining a route to all nodes at every time is very
neighbors already received the message in the same costly. However, most of the time, it is not necessary
transmission. These neighbors are considered already to have an up-to-date route to all other nodes. Hence,
covered and are dropped from the neighbor used to a novel class of reactive routing protocols, such as
select the next hop gateways. DSR [17] and AODV [18] has been developed.
Reactive routing protocols only set up routes to
5 nodes they communicate with and these routes are
kept alive as long as they are needed. This is realized
4 by a route discovery mechanism, which uses
6 broadcasting strategies to distribute control messages
1 for route discovery.
2
Sensor Data Dissemination:

3 Another important application field for


broadcasting is the sensor data dissemination. Real-
time sensor data may be disseminated to other nodes
Figure 4: Ad hoc broadcasting approach in order to realize a fully-replicated database, where
In Figure 4-Ad hoc broadcasting approach, node 2 has 1, every database node has a consistent view of real
5 and 6 nodes as one hop neighbors, 3 and 4 nodes has time events. Data consistency algorithms act on
two hop neighbors. Node 3 can be reached through node disseminated observation data and chronologically
1 as a one hop neighbor of node 2. Node 4 can be order observed events in MANETs.
reached through node 1 or node 5 as one hop neighbors
of node 2. Node 3 selects node 1 as a gateway to 7.0 CONCLUSION
rebroadcast the message to nodes 3 and 4. Upon
receiving the message node 5 will not rebroadcast the This paper presents an overview of the
message as it is not a gateway. characteristics, applications and features MANET.
Also we have done the detailed review of
6.0 APPLICATIONS OF BROADCASTING broadcasting methods of MANET and its
IN MANET applications. It concluded that simple flooding
requires each node to rebroadcast all packets.
Content Distribution Applications: Probability based methods use some basic
understanding of the network topology to assign a
A typical application for broadcasting in MANETs probability to a node to rebroadcast. Area based
is news spreading. Examples are the broadcasting of aid methods assume nodes have common transmission
information in a disaster area to coordinate relief actions distances: a node will rebroadcast only if the
(e.g. fire fighting [13]), the dissemination of parking rebroadcast will reach sufficient additional coverage
availability in a city scenario, dissemination of accident area. Neighbor knowledge methods maintain state on
information in VANETs and the dissemination of alarms their neighborhood via “Hello” packets, which are
and announcements. Further content distribution used in the decision to rebroadcast. Broadcasting is
applications are publish-subscribe applications, where an essential building block of any MANET, so it is
some nodes are subscribers to content providers. These imperative to utilize the most efficient broadcast
applications typically run in the background for a few methods possible to ensure a reliable network. The
hours or even a few days. Examples are Usenet-on-fly existing broadcasting schemes do not yield good
[14], latency insensitive data [15] and file sharing in a performance for other scenarios. Different
peer-to-peer (P2P) manner [16]. comparative studies show that most of the methods
require more rebroadcasts with respect to the number
of the retransmitting nodes, thus facing problems in a [9] Ivan Stojmenovic, Mahtab seddigh, and Jovisa
high density mobile MANET. Zunic,“ Dominating Sets and Neighbor
Elimination-Based Broadcasting Algorithms in
ACKNOWLEDGMENTS wireless Networks” IEEE Transactions on
Parallel and Distributed Systems, Volume 13,
The author would like to thank Dr. S.N. No.1, January 2002.
Subbramanian, Director cum Secretary,
Dr.S.Rajalakshmi, Correspondent, Dr.V.P. Arunachalam, [10] N.Karthikeyan. V.Palanisamy, K.Duraiswamy.
Principal, SNS College of Technology, Coimbatore for “Performance Comparison of Broadcasting
their motivation and constant encouragement. The author Methods in Mobile Ad Hoc Network”,
would like to thank Supervisor Dr. V. Palanisamy, IJFGCN Volume.2 No.2, pp. 47-58, June
Principal, Info Institute of Engineering and Joint 2009
Supervisor Dr.K.Duraiswamy, Dean, KSR College of
Technology for their valuable inputs and fruitful [11] Ni, S., Y. Tseng, Y. Chen and J. Sheu, 1999.
discussions The broadcast storm problem in a mobile ad
hoc network. Proceedings of the ACM/IEEE
REFERENCES International Conference on Mobile Computing
and Networking, Aug. 15-19, Seattle,
[1] S. Corson and J. Macker, Mobile Ad hoc Washington, United States, pp: 151-162.
Networking: Routing Protocol Performance issues http://portal.acm.org/citation.cfm?
and Evaluation Considerations, RFC 2501, January id=313451.313525
1999.
[12] S. Ni, Y. Tseng, Y. Chen and J. Sheu. The
[2] Stefano Basagni (Editor), Marco Conti (Editor), Broadcast Storm Problem in a Mobile Ad hoc
ilvia Giordano (Editor), Ivan Stojmenović (Editor) Network. International Workshop on Mobile
Mobile Ad Hoc Networking ISBN: 978-0-471- Computing and Networks, 151–162, 1999.
37313-1, Wiley-IEEE Press, August 2004
[13] G. Karumanchi, S. Muralidharan, and R.
[3] Lang, Daniel, Routing Protocols for Mobile Ad Prakash. Information dissemination in
Hoc Networks - Classification, Evaluation and partitionable mobile ad hoc networks. In
Challenges, VDM Verlag, ISBN: 3836469081 Proceedings of the 18th IEEE Symposium on
Reliable Distributed Systems (SRDS), pages
[4] Boukerche A., “Performance comparison and 4{13, October 1999.
analysis of ad hoc routing algorithms”, IEEE
International Conference on. Performance, [14] C. Becker, M. Bauer, and J. HÄahner. Usenet-
Computing, and Communications, 2001, Apr on-the-fly: supporting locality of information
2001, pp 171-178. in spontaneous networking environments. In
[5] B. Williams and T. Camp. Comparison of Proceedings of the Workshop on Ad hoc
Broadcasting Techniques for Mobile Ad hoc Communications and Collaboration in
Networks. In Proceedings of the ACM Symposium Ubiquitous Computing Environments (CSCW),
on Mobile Ad Hoc Networking and Computing 2002.
(MOBIHOC), 194–205, 2002
[15] J. Su, A. Chin, A. Goel, and E.D. Lara. User
[6] Y.-C. Tseng, S.-Y. Ni, and E.-Y. Shih, “Adaptive mobility for opportunistic ad-hoc networking.
Approaches to Relieving Broadcast Storms in a In Proceedings of the 6th IEEE Workshop on
Wireless Multihop Mobile Ad Hoc Network,” Mobile Computing Systems and Applications,
IEEE Trans. Computers, vol. 52, no. 5, pp. 545- 2004.
557, May 2003.

[7] Jie Wu, Fei Dai, Mobility Management and its [16] C. Lindemann and O.Waldhorst. Epidemic
Applications in Efficient Broadcasting in Mobile Ad dissemination of presence information in
Hoc Networks INFOCOM 2004. Twenty-third mobile instant messaging systems. In
Annual Joint Conference of the IEEE Computer and Proceedings of The 2005 Conference on
Communications Societies Publication Date: 7-11 Communication in Distributed Systems
March 2004 Volume: 1, on page(s): - 350. (KiVS), February 2005.
[8] Jie Wu, Fei Dai, "Efficient Broadcasting with
[17]D.B. Johnson and D.A. Maltz. Dynamic source
Guaranteed Coverage in Mobile Ad Hoc Networks,"
routing in ad hoc wireless networks. Mobile
IEEE Transactions on Mobile Computing, vol. 4, no.
3, pp. 259-270, May/June 2005, doi:10.1109/ Computing (Kluwer Academic Publishers),
353, 1996.
[18]C. E. Perkins, E. M. Belding-Royer and S. Das.
Ad hoc On-Demand Distance Vector (AODV)
Routing. RFC 3561, July 2003.

Vous aimerez peut-être aussi