Share This Article:

Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks

Abstract Full-Text HTML XML Download Download as PDF (Size:871KB) PP. 19-28
DOI: 10.4236/ijcns.2015.83003    2,900 Downloads   3,214 Views   Citations
Author(s)    Leave a comment

ABSTRACT

The Gossip-Based Relay Protocol (GRP) is developed based on Ad Hoc on Demand Distance Vector Protocol (AODV) and proposed to increase the efficiency of package routing functionality in ad hoc networks through specific flooding scheme. This lightweight protocol reduced the collisions on the network through specific mechanisms. Request to Send/Clear to Send (RTS/CTS) mechanism is widely used in ad hoc environment with Temporarily Ordered Routing Algorithm (TORA) in order to eliminate collisions and allow access to the shared medium through proposed authentication methods. Since GRP contains specific mechanism of directed acyclic Graph (DAG) mechanism to mitigate overhead problem, RTS/CTS modified TORA might result in similar performance metrics. In this paper, TORA protocol has a modification of new RTS/CTS mechanism and has been simulated in order to be compared with proposed lightweight robust forwarding GRP scheme in terms of specific performance metrics such as network throughput, end-to-end delay and message flooding rate over the network through OPNET simulation package in order to expose the optimal solution to increase overall network throughput in ad hoc environment.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Sari, A. (2015) Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks. International Journal of Communications, Network and System Sciences, 8, 19-28. doi: 10.4236/ijcns.2015.83003.

References

[1] Hass, Z., Halpern, J.Y. and Li, L. (2002) Gossip-Based ad Hoc Routing. IEEE/ACM Transactions on Networking (ToN), 14, 479-491.
[2] Paruchuri, V.K., Durresi, A., Dash, D.S. and Jain, R. (2003) Optimal Flooding Protocol for Routing in Ad-Hoc Networks. IEEE Wireless Communications and Networking Conference, March 2003, 93-102.
[3] Calinescu, G., Mandoiu, I., Wan, P.-J. and Zelikovsky, A. (2004) Selecting Forwarding Neighbors in Wireless ad Hoc Networks. Mobile Networks and Application, 9, 1-23.
[4] Maeung, S., Yang, S.J. and Shenoy, N. (2004) Modelling and Analysis of Gossip Based Relay Networks for Ubiquitous and Extended Access. OPNETWORK 2004, Washington DC, 30 August-3 September 2004, 1-5.
[5] Sari, A. and Necat, B. (2012) Impact of RTS Mechanism on TORA and AODV Protocol’s Performance in Mobile ad Hoc Networks. International Journal of Science and Advanced Technology (IJSAT), 2, 188-191.
[6] Sari, A. (2014) Security Approaches in IEEE 802.11 MANET. International Journal of Communications, Network and System Sciences, 7, 365-372.
http://dx.doi.org/10.4236/ijcns.2014.79038
[7] Sari, A. and Rahnama, B. (2013) Simulation of 802.11 Physical Layer Attacks in MANET. 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), Madrid, 5-7 June 2013, 334-337.
http://dx.doi.org/10.1109/CICSYN.2013.79
[8] Sari, A. (2014) Security Issues in RFID Middleware Systems: A Case of Network Layer Attacks: Proposed EPC Implementation for Network Layer Attacks. Transactions on Networks & Communications, Society for Science and Education, United Kingdom, 2, 1-6.
http://dx.doi.org/10.14738/tnc.25.431
[9] OPNET Technologies Inc. Opnet Simulator.
www.opnet.com

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.