An Enhanced Expanding Ring Search for Route Discovery in MANETs Ngoc Duy Pham and Hyunseung Choo School of Information and Communication Engineering Sungkyunkwan University [email protected] Abstract A mobile ad-hoc network is a self-configuring network of mobile routers that are connected by wireless links in infrastructure-less situation. These kinds of networks have many challenges such as unreliable links, lack of scalability, etc. and energy consumption is a major issue in designing network protocols because of battery constraints. The route discovery process in reactive routing protocols uses Expanding Ring Search heuristic algorithm for reducing broadcast overhead and saving energy consumption. However, based on our observation we see that there are still some redundant broadcasts in this process. So, in this paper we propose a method which solves the redundancy of route discovery based on expanding ring search. The performance evaluation results show that our proposal helps to reduce the overhead of expanding ring search based route discovery up to about 20%, and therefore the total energy consumption of is decreased by 15%.

1. Introduction

overhead of the route discovery process,

Mobile Ad hoc Networks (MANETs) [1] provide

the

Expanding Ring Search [3], [4] is applied. This

a flexible, infrastructure-less communication which

heuristic

is an alternative for conventional wired networks.

non-destination

Because of the infrastructure-less characteristic,

request that they have cached information about

MANETs have many challenges and the success

destination.

of

Expanding Ring Search (ERS)

the

MANETs

nodes

a

replying

method to

the

for route

on

of

greatest

making the route discovery process be more

limitations of mobile computing environment is

efficient. However, it still has some disadvantages

the

mobile

that need to be alleviated in order to get better

devices. For extending the lifetime of mobile ad

results. Historically, there have been some ideas

hoc, many energy efficient protocols have been

proposed for improving ERS such as Optimising

designed

by

ERS [5] and Blocking ERS [6]. In our study, we

proposing an energy efficient scheme to improve

focus on the flooding mechanism of ERS. Because

the sustainability of MANETs.

ERS uses pure flooding for broadcasting the

In reactive multi-hop routing protocols [2], when

query message to all nodes, we propose a new

having

method to improve the flooding of ERS, and

sustainability.

finite

power

[2].

a

We

packet

One

supplies

inherent

continue

to

send

the

those

the

in

works

source

the

provides

depends

network

paradigm

algorithm

node

is applied for

broadcasts a request message to query the route

hence making it become more efficient.

to the destination, and then all nodes in the

In this paper, we describe a method which makes

network cooperate to re-transmit this message.

the ERS based route discovery of traditional

This process is called route discovery and the

reactive routing protocols like AODV and DSR [8]

re-transmitting

become

message

of

all

nodes

in

the

more

energy

efficient.

This

scheme

network in some cases causes a large overhead

reduces the number of re-transmitting request

with energy consumption. In order to reduce the

messages in the route discovery process which

85

means we can reduce the network overhead and save

energy

consumption.

The

performance

results show that our proposal can make ERS based

route

discovery

of

AODV

reduce

the

number of re-transmitting route request messages by 20%; therefore, up to 15% of the total energy consumption of this protocol can be saved. 2. Related Work

radius of the search ring and start searching

The Time To Live Sequence based Expanding

again. At the second searching, the nodes in the

Ring Search (ERS) [4] algorithm is a technique

first ring have to relay RREQ messages twice:

that can avoid network-wide broadcasting by

once in the first search and once for the second

searching a larger area around the source of

search. Similarly, if the third search occurs, nodes

broadcast. The goal of this algorithm is to find

in the first ring have to relay a RREQ message

nodes that have information needed about the

three times; nodes in the second ring have to

destination in their route caches. ERS is widely

relay RREQ twice. From those analyses, in this

used especially in multi-hop wireless networks.

section,

The source node is the center of the search ring;

optimizing ERS.

we

introduce

a

new

method

for

ERS successively searches a larger area until the node having needed information being searched is

3. 1 Basic Idea

found. The mechanism is: the searching process

When a node sends a message to the entire

begins by sending out a query with a small Time

network, it first broadcasts the message to its

To Live (TTL) value. Each time the query is

neighbors. In pure flooding, every neighbor has to

relayed by an immediate node, the TTL value is

relay the message by continuously re-transmitting

decreased by 1. If the TTL value is greater than

the receiving message to its own neighbors if it

0, the query will be forwarded; otherwise it is not

receives the message the first time. If the node

forwarded any further. After sending out a query

already has received this message before, it will

with a given TTL value, the source waits for a

drop the message immediately. However, if the

period of a timeout to receive the reply. If there

message has some data regarding the sender then

is no reply within the timeout period, the source

dropping the duplicate message will waste the

node increases the TTL by adding an incremental

neighbor’s information.

value and starts searching again. The searching

From the idea described above, in order to make

process, as above, continues until the information

duplicate messages more useful, we modify the

needed is found or the TTL value reaches a

pure flooding by a node before sending a message

threshold T. At this time, if no reply is received,

out and that will add the predecessor address into

the

entire

the message data. The predecessor of one node is

network (TTL value is set to a very large

the node from which it receives the message; in

number). Fig. 1 illustrates an example of an ERS.

this case, the predecessor is also called the

source

starts

a

broadcast

to

the

previous node or the sender. When relaying a 3. The Proposed Scheme

message,

the

node

also

adds

a

predecessor

Fig. 1(b) is an example of ERS that source

address into the message data before sending the

node S expands the search ring one time. In the

message out to neighbors. On receiving that

first ring, there is no node has information about

message, neighbors can collect the address of its

the destination so the node S has to increase the

sender and also the predecessor address of the

86

sender by extracting this information from the

address of the sender in the message data

incoming message data. This data is seen as the

before

local topology information of 2-hop neighbors.

predecessor address has been extracted, the

3. 2 Efficient Flooding Based on Overhearing

node

dropping compares

the the

message. address

When

with

its

the own

We now discuss an overhearing based efficient

address. If the two addresses have the same

flooding scheme for ad hoc networks. With the

value, the node sets the value of the variable

assumption that there are at least two floodings

‘relay’ to true. The example in Fig. 3.3 shows

happening

how each node works in the first step.

continuously,

the

proposed

scheme

reduces the overhead of flooding based on the

Fig. 2(a) shows the network topology. Each node

neighbor information collected in the previous

has a variable name ‘relay’ whose initial value is

pure flooding. The proposed scheme is divided

false. Node A wants to send a message to an

into

entire network; it broadcasts the message to its

two

parts:

the

first

is

collecting

local

topology information and the second is reducing

neighbors.

the overhead of pure flooding.

transmission

The collecting local topology information step

message. A becomes the predecessor of B and C

needs a process of pure flooding. When pure

in the message path. This is the first time B and

flooding occurs, every node collects neighbors’

C receive a flooding message so they participate

information by overhearing sending messages out

in relaying the message. But before relaying the

of its neighbors. Each node has a variable named

message, B and C add their predecessor addresses

‘relay’ and its initial value is false. The process at

into the message data and send them out.

each node occurs as in these steps:

Assume that B first relays the message received

z

When receiving a flooding message, the node

from A as in Fig. 2(b). A, C, and D receive the

relays the message if it has not received this

message of B. A receives a duplicate message; it

message

before.

the

extracts the predecessor address in the message

message

out,

sender

data and compares this to its address. They are

(predecessor) address into the message data

same so A sets its variable ‘relay’ to true. C also

and then broadcasts.

receives a duplicate message but the predecessor

But

the

before

node

adds

sending the

z If a node has already received this flooding

Because

B

and

range

of

A,

C they

are

in

the

receive

the

address in the message is different to its address

message before, it extracts the predecessor

so

87

C

drops

the

duplicate

message

without

changing anything.

node determines the value of the variable

Likewise, O and C relay the message received

‘relay’ by overhearing messages sent out by

from A (Fig. 2(c)). Each node receiving messages

neighbors.

from O and C completes the same process as

z The second search: Some nodes participated in

done in A and C above. Finally, D relays the

the first search can be silent by applying

message received from B (Fig. 2(d)). B overhears

reducing the overhead of pure flooding. The

the

the

silent node has its variable ‘relay’ set to false.

this

Nodes that are not in the overlapping area of

address with its own one. They are same so B

the first search and the second search have to

sets its variable ‘relay’ to true. C does nothing

use pure flooding while collecting the local

because the predecessor address is different to its

topology information for changing the value of

address.

variable ‘relay’.

sending

predecessor

message address,

out of and

D,

then

obtains

compares

In the second phase, reducing the overhead of

z The third search: Some nodes participating in

pure flooding step, if another pure flooding occurs

the second search can be silent by applying

then the overhead of this flooding can be reduced

reducing the overhead of pure flooding step as

by using the value of the variable ‘relay’ at each

in the second search. Nodes that are not in

node. Only nodes that have the variable ‘relay’ set

the overlapping area have to use pure flooding

to true relay the message received from its

while collecting the local topology information.

z The same process to the forth search, fifth

neighbor; nodes with ‘relay’ of false receive a message but do not relay. With the network in

search,

etc.

if

the

source

node

continues

Fig. 2(a), after a pure flooding of A, assume that

expanding the search ring for find information

O wants to send a message to the entire network

about the destination.

as in Fig. 2(e). At this time, only the nodes that 4. Simulation Results

have the variable ‘relay’ set to true (node A and

To

B) can relay a message for O. So, in this case,

analyze

the

efficiency

of

the

proposed

a

scheme, we compare the performance of ERS

message to the entire network and that message

with that of ERS using the proposed scheme. We

is propagated to all of the nodes.

use ERS based route discovery of AODV for an

there

are

only

3

broadcasts

for

sending

instance of ERS. The modified ERS based route discovery

3. 3 ERS based Route Discovery

of

AODV

proposed scheme.

In ERS based route discovery, the source node

is

an

instance

of

the

We also select pure route

uses continuous flooding with a larger searching

discovery of AODV

area to find information about the destination. The

comparisons.

mechanism of ERS satisfies the assumption of the

Qualnet simulator environment and perform the

proposed scheme, so in this part we present a

simulation

until

way how to apply our scheme to reduce the

converged;

then

overhead

of

the

i

th

searching th

based

on

the

Hundred

We

different

as a basic protocol

develop

the

performance we

obtain networks

simulation measures average are

for in are

values.

generated

searching. Assume that

randomly in an area, 1500 x 1500 m2. The

a source node invokes the route discovery process

transmission radius is set to 250 meter, each data

to find a route to a destination, the application of

packet with attached information has a constant

the

length of 512 bytes, and the bandwidth of a

information from the i-1

proposed

scheme

into

ERS

based

route

discovery is summarized as follow,

z The first search:

Collecting local

wireless channel is set to 2M b/s as the default. topology

In the simulation, we place a certain number of

information based on the pure flooding. Each

nodes from 50 to 200 randomly on the network

88

area. The network load is set to 50 active routes

process by reducing the number of nodes relaying

which means that during 30 seconds of simulation

the query messages. The results are energy is

time, at random moments, one random source

saved and collisions in the network are decreased.

sends a packet to a random destination and this

Our

occurs 50 times. Our observation from the figures

efficiency of route discovery using the proposed

of simulation results is:

scheme as compared with route discovery based

z The proposed idea makes AODV using ERS

on ERS only.

performance

evaluation

demonstrates

the

reduce by 20% of the number of RREQs forwarded. AODV using ERS is 20% better

Acknowledgement

than pure AODV in term of the number of

This research was supported by MIC, Korea

RREQs

under ITRC IITA-2007-(C1090-0701-0046).

forwarded;

therefore,

in

total

the

proposed scheme improves AODV up to about

Dr. Choo is the corresponding author.

40% for the reduced number of RREQs.

z Reducing the number of relaying messages has the

same

meaning

as

reducing

Reference [1] C.E. Perkins, “Ad Hoc Networking,” Addison-

energy

Wesley, Reading, MA, 2000.

consumption of nodes in the network. From

[2] E.M. Royer and C.K. Toh, “A Review of Current

Fig. 3(c), we see that the proposed scheme makes

AODV

using

ERS

reduce

Routing Protocols for Ad-Hoc Mobile Wireless

energy

Networks,” IEEE Personal Communications, 1999.

consumption up to 15% so it helps nodes live

[3] I. Park and I. Pu, “Energy Efficient Expanding

longer.

z Another important metric in the comparison is

Ring Search,” Proceedings of the IEEE AMS, 2007.

the successful route discovered. From the Figs.

[4] J. Hassan and S. Jha, “Performance Analysis of

3(b), the proposed scheme reduces the number

Expanding Ring Search for Multi-Hop Wireless

of RREQs forwarded in the AODV

Networks,” Proceedings of the IEEE VTC, 2004.

route

request process but does not affect the ratio of

[5] J. Hassan and S. Jha, “Optimising Expanding Ring

the routes discovered successfully.

Search for Multi-Hop Wireless Networks”, IEEE Global Telecommunications Conference, Dallas, 2004.

5. Conclusion

[6] I. Park, J. Kim, and I. Pu, “Blocking Expanding

In this paper, we proposed an efficient way to

Ring

Search

Algorithm

for

Efficient

Ad

Hoc

Energy

improve the route request process of AODV in

Consumption

particular and an efficient way to improve the

Proceedings of the WONS, Les Menuires, 2006.

in

Mobile

Networks”,

ERS algorithm in general. By using our proposal,

[7] C.E. Perkins, E.M. Royer, and S.R. Das, “Ad-hoc

many protocols using ERS such as AODV and

On-Demand Distance Vector (AODV) Routing,”

DSR can reduce the overhead of the route request

IETF Internet Draft (work in progress), 2003.

89

An Enhanced Expanding Ring Search for Route ...

means we can reduce the network overhead and save ... dropping the duplicate message will waste the ... duplicate messages more useful, we modify the.

576KB Sizes 1 Downloads 187 Views

Recommend Documents

Energy Efficient Expanding Ring Search for Route ...
work of user devices that are connected by wireless links in infrastructure-less situation. ... disadvantages that need to be alleviated in order to get better results.

Search-Enhanced-CPC_IT-IT.pdf
nelle tue. campagne CPC. SCBN | Microsoft Certified Professional - Google Partner : website. www.scbn.biz - fax +39 178 22 65 173 - mail. [email protected].

Fluctuation-Dissipation Theorems in an Expanding Universe
Apr 21, 2006 - thermodynamical state of the matter in the universe can, to a very ..... As indicated at the end of the previous section, the time-dependence of ...

An original route for the preparation of hard FePt
results from controlled diffusion and an ordering phase transformation. Coercivities as high as .... (experimental data are represented by solid lines; powder diffraction .... [1] O. Kubaschewski, Fe–Pt binary phase diagram, in: Iron-. Binary Phase

An Enhanced Multi-channel MAC Protocol for Wireless ...
An Enhanced Multi-channel MAC Protocol for. Wireless Ad hoc Networks. Duc Ngoc Minh Dang. ∗. , Nguyen Tran Quang. ∗. , Choong Seon Hong. ∗ and Jin ...

An Enhanced ODE Solver for REDUCE
REDUCE [8, 15] is one of the longest-established general-purpose computer algebra systems. Nevertheless, there is no “standard” REDUCE differential equation solver, although a number of “user-contributed packages” for dealing with various asp

Enhanced Search Widget XML Configuration Version 3.7.4 - GitHub
What this does is gets all the valid coded value domain values and adds then to a ...... Please refer to the Enhanced Search Widget Fixed Datagrid Setup.pdf for ...

Enhanced Search with Wildcards and Morphological ... - Dipanjan Das
analysis of cultural, social and linguistic trends through five centuries of written text in ... to come up with a list of presidents and then search for them one-by-one.

Brewing an enhanced customer experience - Intel - Media13
The attractive design and advanced, interactive features mean ... around six months using advanced aerospace .... Viewer Analytics (AVA) functionality,” Acht-.

Fluctuation-Dissipation Theorems in an Expanding ... - Semantic Scholar
Apr 21, 2006 - These solutions coincide with the time-independent Jüttner ... where x and p are the position and momentum of the particle, and Bt is the.

Fluctuation-Dissipation Theorems in an Expanding ... - Semantic Scholar
Apr 21, 2006 - distribution of temperature T = D/αmkB in the limit where a becomes time- ..... the geometry and the matter content of the space-time. The above ...

10 Expanding Confederation
Apr 1, 1999 - Company set up a trading post nearby, the .... She ran the farm and taught school to local children in ... deals between the British and the First.

The Search for an 'Authentic Christian'_Study ... - Campus Bible Church
Jan 3, 2010 - own life, he cannot be My disciple; whoever does not carry his own cross and come after Me, cannot be My disciple. Jesus was not trying to get ...

The Search for an 'Authentic Christian'_Study ... - Campus Bible Church
Jan 3, 2010 - “Weld” yourself to what is good is another way of saying it. 4. “Be devoted to one another in brotherly love; give preference to one another.”.

An Efficient Pseudocodeword Search Algorithm for ...
next step. The iterations converge rapidly to a pseudocodeword neighboring the zero codeword ..... ever our working conjecture is that the right-hand side (RHS).

Delay stage circuitry for a ring oscillator
of Search . ..... phase deadband characteristics to be easily optimized. Another object of the present .... (ASIC), a memory controller, or a graphics engine. Master.

Biperpedia: An Ontology for Search Applications - Research at Google
contains up to two orders of magnitude more attributes than Free- base. An attribute ... the top 100 attributes and 0.52 for the top 5000 attributes). In addition to its .... Name, domain class, and range: The name of an attribute in. Biperpedia is a

An Intelligent Search Agent System for Semantic ...
networks and we describe a prototype system based on the. Intelligent Agent ... H.3.3 [Information Storage and Retrieval]: Informa- tion Search Retrieval; H.4 ... Keywords. Information Retrieval, Semantic Network, Web Agents, On- tology. 1.