SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
Rupak Bhattacharyya et al. (Eds) : ACER 2013,
pp. 25–32, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3203
FUZZY-CONTROLLED POWER-AWARE
PROACTIVE-ACKNOWLEDGEMENT BASED
BROADCASTING (FP2
B) FOR MOBILE AD HOC
NETWORKS
Anuradha Banerjee
Department of Computer Applications, Kalyani Govt. Engineering College,
West Bengal, India
anuradha79bn@gmail.com
ABSTRACT
Network-wide broadcasting is a fundamental operation for mobile ad hoc networks. In
broadcasting, a source node sends a message to all other nodes in the network. Under ordinary
flooding procedure, each node transmits the broadcast message to all of its 1-hop downlink
neighbours, i.e. all nodes residing within its radio-range. Receiving the broadcast message all
those downlink neighbours reply with an acknowledgement. Since in an ad hoc network a node
may have multiple uplink neighbours, in ordinary flooding procedure, a node is supposed to
receive the broadcast message from all those uplink neighbours and send acknowledgement to
all of them, generating huge message contention and collision. This is popularly referred to as
the broadcast storm problem. The present article is focused to remove the broadcast
redundancy within 2-hop neighbourhood and beyond, as much as possible by prioritizing the 1-
hop downlink neighbours of a node. Priority of a 1-hop downlink neighbour of a node ni
increases if it is equipped with a large number of 1-hop downlink neighbours, large radio-
range, high remaining battery power and very small number of uplink neighbours closer to the
broadcast source than ni. ni waits a predefined amount of time to receive proactive
acknowledgements from the 1-hop downlink neighbours having less priority. If it does not
receive acknowledgement from those downlink neighbours within the waiting time, it sends the
broadcast message to them. A fuzzy controller named Priority Assignor (PA) is embedded in
every node that determines the priority of a 1-hop downlink neighbour. Simulation results firmly
establish that the proposed protocol FP2
B produces high broadcast delivery ratio at much
lesser message cost, compared to other state-of-the-art broadcast algorithms.
KEYWORDS
Ad hoc network, broadcast redundancy, flooding, priority assignor, proactive
acknowledgement.
1. INTRODUCTION
A mobile ad hoc network is a wireless network that is self-organized with many mobile nodes. No
static infrastructure such as a wired backbone is available. All nodes are free to move around and
the network topology may change frequently. Due to limited transmission range of wireless
network interface, nodes are required to forward messages for those located outside the radio
coverage, thereby forming a multi-hop network. Possible applications include emergency rescue
in disaster situations, communication between mobile robots, exchanging information in the
26 Computer Science & Information Technology (CS & IT)
battlefield etc. [1-5]. Broadcast is useful in delivering messages to users with unknown location
or group of users whom the source need not exactly know. Broadcast plays an important role in
routing, network management etc. Many on-demand or reactive routing protocols (dynamic
source routing (DSR) [2], ad hoc on-demand distance vector routing (AODV) [3], on-demand
multicast routing protocol (ODMRP) [4] etc.) rely on broadcast to discover a route between two
nodes or to update group status and multicast routes. Broadcast is also a viable candidate for
multicast in ad hoc networks with rapid changing topology.
A density based innovative flooding (DBF) algorithm is proposed in [6]. In this algorithm, each
node forwards a message based on its neighbour density and neighbour density of its previous
node from which the broadcasted message. In a cluster of loosely couples nodes with few
intermediate nodes as neighbours, the probability of forwarding the broadcasted message will be
high. On the other hand, if a node is having high density of neighbours, then there will be lots of
chances of packet collision at that point. Density based flooding tries to avoid that situation by
assigning low priority at that point. The article in [7] proposes a tree based broadcast (TBB)
method that maintains a spanning tree in the network. The algorithm is fully distributed,
decentralized and resource-efficient. Broadcast operation is performed using a tree by forwarding
the message not to all neighbours, but only those neighbours in the tree structure. Since the tree is
acyclic, each message is received only once by each node, giving two advantages over the
existing methods. Firstly it is needless to store the previous broadcasts in order to avoid endless
multiplications of broadcast messages along a cycle of links. Only the originator of a broadcast
message needs to store it and pay attention to whether its broadcast was successful or not if it is of
great importance. Secondly, it is very economical considering how many times a broadcast
message should be forwarded.
A reliable broadcast (RB) method is proposed in [8], which combines area based and neighbour-
based technique of broadcast. Each node gains knowledge of neighbours and maintains neighbour
list. The algorithm calculates the relative position of the nodes with respect to broadcast source
node. The nodes that are farthest from the source rebroadcasts next. The algorithm tries to
minimize the number of rebroadcasts by intermediate nodes and thus reduces message cost.
Reference [9] proposes a method for reduction of broadcast traffic (RBT) in mobile ad hoc
networks. It focuses on the fact that communication links in ad hoc networks break frequently due
to node mobility. As the nodes move, a node receiving a packet on the boundary of
communication range of a transmitter node is allowed to drop the packet, as the receiver may
soon move out of the radio range of the transmitter. To approximate the distance between receiver
and transmitter, receiver signal strength information is used.
The proposed algorithm FP2
B eliminates much more redundancy than these algorithms. It
considers the then topological situation of the network up to 2-hop neighbourhoods of a node (in
terms of the number and positions of uplink and downlink neighbours’ w.r.t. the geographical
locations of the broadcast source) , the radio-ranges and residual energy of involved nodes (this is
very important from the point of view of ad hoc networks because there is no point to send the
broadcast messages to the nodes which are about to be inoperable). All these greatly improve the
network throughput by reducing the message cost through tackling the broadcast storm problem.
2. OVERVIEW OF FP2
B
According to the study of discharge curve of the batteries heavily used in ad hoc networks, at
least 40% of total charge is required to remain in operable condition, the range from 40% to 60%
is satisfactory, 60% to 80% is good whereas the next higher range is considered to be more than
sufficient [13]. A node with residual energy 40%-60% will be termed as operational whereas a
node with residual energy more than 60% will be called power-efficient in rest of the article. In
Computer Science & Information Technology (CS & IT) 27
FP2
B, a node nj drops a message immediately after receiving it from an uplink neighbour ni at
time t, provided its residual energy at that time is less than 40%. Otherwise nj tries to find out a
pair of 1-hop uplink neighbour and 1-hop downlink neighbours (ni, nk) of nj at time t s.t. nj∈Di(t),
nk∈Di(t) and nk∈Dj(t) where Di(t) denotes the set of 1-hop downlink neighbours of ni at time t. In
this situation, nj won’t send the broadcast message to nk because nk has automatically received
that after ni has sent the message. If all the 1-hop downlink neighbours of nj at time t, are also 1-
hop downlink neighbours of some uplink neighbour nl of nj at that time s.t. nj has received the
broadcast message from nl, then nj wont forward the broadcast message after receiving it. This
eliminates the redundancy between 1-hop and 2-hop downlink neighbourhood of a node. But if
there exists at least one 1-hop downlink neighbour of nj that is not the 1-hop downlink neighbour
of any uplink neighbour of nj, then nj will need to prioritize those 1-hop downlink neighbours.
This is performed by a fuzzy controller named priority assignor (PA). Priority of a node nk which
is a downlink neighbour of nj, depends upon its number of 1-hop downlink neighbours, radio-
range, residual battery power, total number of power-efficient uplink neighbours (residual energy
is more than 60%) and the number of power-efficient uplink neighbours that are closer to the
broadcast source. nj waits a predefined amount of time to receive proactive acknowledgements
from the 1-hop downlink neighbours having less priority. If it does not receive acknowledgement
from those downlink neighbours within the waiting time, it sends the broadcast message to them.
The waiting time is equal to the amount of time that is required by nj to forward (Mj-1) number of
messages where Mj is the number of locations in message queue of nj.
3. INPUT PARAMETERS OF PA OF na
Here it is assumed that na is an uplink neighbour of ni at time t that is evaluating the priority of ni
at that time. Below I describe the input parameters of the PA of na.
Residual Energy Index
The residual energy index αi(t) of ni at time t is defined as,
αi(t) =1 – ei(t)/Ei (1)
Where ei(t) and Ei indicate the consumed battery power of ni at time t and the maximum battery
capacity of the same node, respectively. It is clear from the formulation in (1) that αi(t) ranges
between 0 and 1. Values of it close to 1 increase the priority of ni as a downlink neighbour. It
indicates that if ni receives the broadcast message, then it is well-equipped from the point of view
of battery power to forward it to its 1-hop downlink neighbours.
Radio-range Index
Assuming that Rmin and Rmax denote the minimum and maximum possible radio-ranges of the
network, radio-range index rr(i) of node ni is given by,
rr(i) = (Ri-Rmin+1) / (Rmax-Rmin+1) (2)
where Ri is the radio-range of node ni. From (2), it is evident that rr(i) ranges between 0 and 1. As
Ri approaches Rmax, rr(i) approaches 1. 1 is added to the denominator in (2) to avoid 0 value in the
denominator when Rmax=Rmin. In order to maintain the fractional nature of radio-range index, 1 is
added to the numerator also. High radio-range index of a node denotes that it has got high
encapsulating capability. So, the number of its 1-hop downlink neighbours may increase any
time.
28 Computer Science & Information Technology (CS & IT)
Downlink Cardinality Index
The downlink cardinality index βi(t) of ni at time t is defined as,
βi(t) =(1- 1/(|Di(t)|+1)) exp (1/(|Di(t)|+1)) (3)
From the formulation in (3), βi(t) ranges between 0 and 1. Please note that 1 is added to | Di(t)| to
avoid 0 value in the denominator when | Di(t)|=0. Values of βi(t) close to 1 increase the priority of
ni as a downlink neighbour. It indicates that if ni receives the broadcast message, then it may send
that to a huge number of 1-hop downlink neighbours.
Uplink Cardinality Index
The uplink cardinality index γi(t) of ni at time t is defined as,
γi(t) = 1-√(f1i(t) × f2i(t)) (4)
f1i(t) = (1-1/(|U′i(t)|+1))exp(1/(|U′i(t)|+1))
f2i(t) = (1-1/(|Ui(t)|+1))
Where Ui(t) is the set of power-efficient uplink neighbours of ni at time t and U′i(t) is a subset of
Ui(t) containing those uplink neighbours of ni at time t which are closer to the broadcast source
than na. 1 is added to both |Ui(t)| and |U′i(t)| to avoid 0 value in the denominator in (5) and (6)
when |Ui(t)| and |U′i(t)| are 0. From the formulation in (4), γi(t) ranges between 0 and 1. Values of
it close to 0 decrease the priority of ni as a downlink neighbour of na. It indicates that for ni, na is
not the only uplink neighbour from where it can receive broadcast message at time t, several other
uplink neighbours are there. Priority of ni decreases even more if some of those uplink neighbours
are closer to the broadcast source than na.
4. RULE BASES OF PA
The range divisions of the parameters of PA are shown in table 1.
Table 1: Range division of parameters
Name of
parameter
Range division Fuzzy premise
variables
α 0-0.40 A1
0.40-0.60 A2
0.60-0.80 A3
0.80-1.00 A4
rr, β, γ 0-0.25 A1
0.25-0.5 A2
0.5-0.75 A3
0.75-1.00 A4
Table 2 shows the fuzzy composition of α and rr producing a temporary variable t1. α is given
more weight because high residual energy is indispensable for smooth operation of a node. Table
3 combines t1 and β generating another temporary output t2. The fuzzy combination of t2 and γ
produces the ultimate output X of PA. If X=A3 or X=A4, then that downlink neighbour directly
receives the broadcast message. Otherwise, the uplink neighbours wait for a specific amount of
Computer Science & Information Technology (CS & IT) 29
time (this time is equal to the time of receiving acknowledgement from the farthest downlink
neighbour) before sending the broadcast message.
Table 2: Fuzzy combination of α and rr producing t1
αααα →→→→
rr →→→→
A1 A2 A3 A4
A1 A1 A1 A2 A2
A2 A1 A1 A2 A3
A3 A1 A2 A3 A4
A4 A1 A2 A3 A4
Table 3: Fuzzy combination of t1 and β producing t2
t1 →→→→
ββββ →→→→
A1 A2 A3 A4
A1 A1 A2 A3 A3
A2 A1 A2 A3 A4
A3 A1 A2 A3 A4
A4 A1 A2 A3 A4
Table 4: Fuzzy combination of t2 and γ producing X
t2 →→→→
γγγγ →→→→
A1 A2 A3 A4
A1 A1 A2 A3 A4
A2 A1 A2 A3 A4
A3 A1 A2 A3 A4
A4 A1 A2 A3 A4
5. SIMULATION RESULTS
I evaluate the performance of FLB, using the network simulator ns-2 [10]. Except FP2
B, I
implement the protocols tree-based broadcasting (TBB), reduction of broadcast traffic (RBT)
approach, and density-based flooding (DBF). The simulation parameters are shown in table 5.
The simulation metrics are broadcast cost (total no. of messages transmitted by all nodes in the
network / (total no. of messages generated by broadcast sources × total no. of nodes in the
network)) and packet delivery ratio ((total no. of data packets actually delivered / total no. of data
packets actually transmitted) × 100). These are measured with respect to the total number of
nodes in the network and total number of broadcast sources. The graphical results are illustrated
in figures 1, 2, 3 and 4. When the measurements are performed with respect to the number of
nodes, the number of broadcast cost is kept constant at 10. Similarly, when the measurement is
performed with respect to the broadcast sources, the number of nodes is kept constant at 200.
30 Computer Science & Information Technology (CS & IT)
Table 5: Simulation Parameters
Name of parameter Value
Network area 500 m × 500 m
Number of nodes 50-300
Transmission range 10 m -50 m in first ten runs,
30 m – 100 m in second ten runs
10 m – 100 m in last ten runs
Packet size 128 bytes
MAC layer IEEE 802.11g
Traffic type Constant bit rate
Mobility model Random waypoint
Bandwidth 1-4 mbps in first ten runs, 2-7 mbps
in second ten runs and 3-10 mbps in
last ten runs
Simulation time 1000 seconds
Broadcast cost vs number of nodes
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
50 100 200 300
Number of nodes
Broadcastcost
TBB
RBT
DBF
FP2B
Figure 1: Broadcast cost vs number of nodes
Data packet delivery ratio vs number of nodes
0
0.2
0.4
0.6
0.8
1
1.2
50 100 200 300
Number of nodes
Datapacketdeliveryratio
TBB
RBT
DBF
FP2B
Figure 2: Data packet delivery ratio vs number of nodes
Computer Science & Information Technology (CS & IT) 31
Broadcast cost vs number of broadcast sources
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
5 10 15 25
Number of broadcast sources
Broadcastcost
TBB
RBT
DBF
FP2B
Figure 3: Broadcast cost vs number of broadcast sources
Data packet delivery ratio vs number of broadcast sources
0
0.2
0.4
0.6
0.8
1
1.2
5 10 15 25
Number of broadcast sources
Datapacketdeliveryratio
TBB
RBT
DBF
FP2B
Figure 4: Data packet delivery ratio vs number of broadcast sources
Figures 1 and 2 measure the improvements produced by the proposed scheme in terms of
broadcast cost and data packet delivery ratio with respect to the number of nodes whereas figures
3 and 4 measure the similar parameters with respect to the number of broadcast sources. It may be
noted that the improved data packet delivery ratio produced by FP2
B is actually the result of much
lesser broadcast cost that is produced by FP2
B compared to the others, due to less signal
contention and collision. Broadcast cost for all the schemes increase when the number of nodes in
the network increase or number of broadcast sources increase. The reason is that if the number of
nodes in the network increases keeping the number of broadcast sources constant, then the
number of recipients for each broadcast operation increase yielding a higher broadcast cost. On
the other hand, if the number of broadcast sources increase then for each broadcast operation
number of senders increase keeping the number of recipients constant. So, in both cases the
broadcast cost increases and data packet delivery ratio decreases for all the protocols.
Since the proposed scheme FP2
B is power-aware, load-balanced and much more rigorous in
decreasing redundancy than all other competitor protocols, the broadcast cost is much lesser in it
than others. Less message cost generates less signal contention and collision increasing the data
packet delivery ratio. As a result, the energy consumption in nodes decreases by a huge amount.
This saved energy prevents some link breakages that take place due to complete exhaustion of
battery of certain nodes. Therefore, the route-request messages that would have been otherwise
injected into the network for repairing the broken links is not required in the proposed scheme.
Please note that in the proposed scheme redundancy is eliminated up to 2 hops. This improvement
is significant from the point of view of today’s wireless networks where the density of nodes is
high, i.e. redundancy is high even if only 2-hop neighbours are considered. So, elimination of this
redundancy saves a lot of broadcast cost as shown in figure 1.
32 Computer Science & Information Technology (CS & IT)
It is seen from figure 2 that for all the protocols, the data packet delivery ratio increases with
increase in the number of nodes due to better network connectivity until the network gets
overloaded or saturated with nodes. But since FP2
B is more efficient than others in confronting
the broadcast storm problem, it suffers least from the node overload as well as message overload
due to a huge number of broadcast sources.
6. CONCLUSIONS
This paper presents a new approach for efficient broadcasting in mobile ad hoc networks. The
proposed protocol called FP2
B is power and topology aware (up to 2 hops) and very efficiently
reduces the cost of messages in the network by increasing the broadcast throughput. Design of the
fuzzy controller Priority Assignor is based on real life observations and heuristics and it
intelligently tackles the broadcast storm.
REFERENCES
[1] Anuradha Banerjee & Paramartha Dutta (2010), A Survey of Unicast Routing Protocols in Mobile Ad
Hoc Networks”, International Journal of Advances in Science and Technology, vol. 2, no. 10
[2] D David & B. Johnson.(1994), Routing in Ad Hoc Networks of Mobile Host. Proceedings of the
Workshop on Mobile Computing Systems and Applications, pp. 158–163, IEEE Computer Society,
Santa Cruz, CA
[3] Ian D. Chakeres et. Al (2005), AODV routing protocol implementation design”, In Proceedings of
2nd International Workshop on Wireless Ad Hoc Networking, Notification (WWAN)
[4] Lee Sung-Ju, Su W. & M. Gerla,(1999), On-demand Multicast Routing Protocol (ODMRP) for Ad
Hoc Networks
[5] Ho. C, Obraczka K & Tsudil G. (1999), Flooding for Reliable Multicast in Multi-hop Ad Hoc
Networks, In Proceedings of 3rd International Workshop on Discrete Algorithms and Methods for
Mobile Computing and Communications (DIAL M’99)
[6] N. Karthikeyan, V. Palanisamy & K. Duraiswamy (2010), Optimum Density Based Model for
probabilistic Flooding Protocol in Mobile Ad Hoc Network, European Journal of Scientific Research,
vol. 39 no.4, pp. – 577-588
[7] L. Tan, X. Zhan, J. Lie & F. Zhao (2006), A Novel Tree-based Broadcast Algorithm for Wireless Ad
Hoc Networks”, International Journl of Wireless and Mobile Computing, vol. 1 no. 2, pp. 156 – 162
[8] S.V.M.G. Bavithiraja & R. Radhakrishnan (2009), “A New Reliable Broadcasting Method in Mobile
Ad Hoc Networks”, International Journal of Computer Science and Network Security, vol. 9, no. 4,
pp. 340-349, 2009
[9] A.Shukla (2007), On the Reduction of Broadcast Traffic in Mobile Ad Hoc Networks”, In
Proceedings of the International Conference on Wireless Communications, Networking and Mobile
Computing
[10] http://isi.edu/nsnam/ns
AUTHORS
Anuradha Banerjee is currently working as a assistant professor in Kalyani Govt. Engg.
College. She completed her B.E. in Computer Science And Technology from Bengal
Engineering College (Deemed University), Sibpur, West Bengal, India in the year
2001. She has 19 publications till date, including National and International
conferences and journals. Her research area includes Ad Hoc Networks, Neural
Networks and Artificial Intelligence.

Mais conteúdo relacionado

Mais procurados

A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...ijasuc
 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
 
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...ijtsrd
 
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...IJCNCJournal
 
An approach to control inter cellular interference using load matrix in multi...
An approach to control inter cellular interference using load matrix in multi...An approach to control inter cellular interference using load matrix in multi...
An approach to control inter cellular interference using load matrix in multi...eSAT Journals
 
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
MAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksMAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksPolytechnique Montreal
 
Rate Adaptation for Time Varying Channels Using Distributed Relay Selection
Rate Adaptation for Time Varying Channels Using Distributed Relay SelectionRate Adaptation for Time Varying Channels Using Distributed Relay Selection
Rate Adaptation for Time Varying Channels Using Distributed Relay Selectionpaperpublications3
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedDebesh Sadhukhan
 
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsAn Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsVignesh DJ Viki
 
Improving QoS of VANET using Network Coding
Improving QoS of VANET using Network CodingImproving QoS of VANET using Network Coding
Improving QoS of VANET using Network CodingDr. Amarjeet Singh
 
M.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsM.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsVijay Karan
 
Csit54201
Csit54201Csit54201
Csit54201csandit
 
Multicasting in DTN Networks
Multicasting in DTN Networks Multicasting in DTN Networks
Multicasting in DTN Networks Nagendra Posani
 
Distributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity SchemeDistributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 

Mais procurados (20)

A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
 
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
 
Ks3618311836
Ks3618311836Ks3618311836
Ks3618311836
 
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...
 
An approach to control inter cellular interference using load matrix in multi...
An approach to control inter cellular interference using load matrix in multi...An approach to control inter cellular interference using load matrix in multi...
An approach to control inter cellular interference using load matrix in multi...
 
Channel capacity
Channel capacityChannel capacity
Channel capacity
 
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
MAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksMAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio Networks
 
Rate Adaptation for Time Varying Channels Using Distributed Relay Selection
Rate Adaptation for Time Varying Channels Using Distributed Relay SelectionRate Adaptation for Time Varying Channels Using Distributed Relay Selection
Rate Adaptation for Time Varying Channels Using Distributed Relay Selection
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
 
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsAn Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
 
23
2323
23
 
Improving QoS of VANET using Network Coding
Improving QoS of VANET using Network CodingImproving QoS of VANET using Network Coding
Improving QoS of VANET using Network Coding
 
1004.0152v1
1004.0152v11004.0152v1
1004.0152v1
 
M.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsM.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing Projects
 
Csit54201
Csit54201Csit54201
Csit54201
 
Multicasting in DTN Networks
Multicasting in DTN Networks Multicasting in DTN Networks
Multicasting in DTN Networks
 
Distributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity SchemeDistributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity Scheme
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 

Semelhante a FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP2B) FOR MOBILE AD HOC NETWORKS

Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSijircee
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...ijasuc
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...ijeei-iaes
 
Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorIRJET Journal
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energyijp2p
 
Z02417321735
Z02417321735Z02417321735
Z02417321735IJMER
 
Energy efficiency optimization of IEEE 802.15.6 ir uwb wban
Energy efficiency optimization of IEEE 802.15.6 ir uwb wbanEnergy efficiency optimization of IEEE 802.15.6 ir uwb wban
Energy efficiency optimization of IEEE 802.15.6 ir uwb wbanaravind m t
 
Avoid Collision And Broadcasting Delay In Multi-Hop CR Ad Hoc Network Using S...
Avoid Collision And Broadcasting Delay In Multi-Hop CR Ad Hoc Network Using S...Avoid Collision And Broadcasting Delay In Multi-Hop CR Ad Hoc Network Using S...
Avoid Collision And Broadcasting Delay In Multi-Hop CR Ad Hoc Network Using S...IJSRD
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetseSAT Publishing House
 
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...BRNSSPublicationHubI
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...IJMER
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...cscpconf
 
A Novel Message Driven Local Repair Algorithm for MANET
A Novel Message Driven Local Repair Algorithm for MANETA Novel Message Driven Local Repair Algorithm for MANET
A Novel Message Driven Local Repair Algorithm for MANETEditor IJMTER
 

Semelhante a FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP2B) FOR MOBILE AD HOC NETWORKS (20)

Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
 
Collision Avoidance Asymptotic Challenging of Ubiquitous in WSN
Collision Avoidance Asymptotic Challenging of Ubiquitous in WSNCollision Avoidance Asymptotic Challenging of Ubiquitous in WSN
Collision Avoidance Asymptotic Challenging of Ubiquitous in WSN
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)
 
Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulator
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energy
 
Z02417321735
Z02417321735Z02417321735
Z02417321735
 
Energy efficiency optimization of IEEE 802.15.6 ir uwb wban
Energy efficiency optimization of IEEE 802.15.6 ir uwb wbanEnergy efficiency optimization of IEEE 802.15.6 ir uwb wban
Energy efficiency optimization of IEEE 802.15.6 ir uwb wban
 
Avoid Collision And Broadcasting Delay In Multi-Hop CR Ad Hoc Network Using S...
Avoid Collision And Broadcasting Delay In Multi-Hop CR Ad Hoc Network Using S...Avoid Collision And Broadcasting Delay In Multi-Hop CR Ad Hoc Network Using S...
Avoid Collision And Broadcasting Delay In Multi-Hop CR Ad Hoc Network Using S...
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manets
 
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
 
F41023946
F41023946F41023946
F41023946
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
 
A Novel Message Driven Local Repair Algorithm for MANET
A Novel Message Driven Local Repair Algorithm for MANETA Novel Message Driven Local Repair Algorithm for MANET
A Novel Message Driven Local Repair Algorithm for MANET
 

Mais de cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

Mais de cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Último

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Último (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP2B) FOR MOBILE AD HOC NETWORKS

  • 1. Rupak Bhattacharyya et al. (Eds) : ACER 2013, pp. 25–32, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3203 FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP2 B) FOR MOBILE AD HOC NETWORKS Anuradha Banerjee Department of Computer Applications, Kalyani Govt. Engineering College, West Bengal, India anuradha79bn@gmail.com ABSTRACT Network-wide broadcasting is a fundamental operation for mobile ad hoc networks. In broadcasting, a source node sends a message to all other nodes in the network. Under ordinary flooding procedure, each node transmits the broadcast message to all of its 1-hop downlink neighbours, i.e. all nodes residing within its radio-range. Receiving the broadcast message all those downlink neighbours reply with an acknowledgement. Since in an ad hoc network a node may have multiple uplink neighbours, in ordinary flooding procedure, a node is supposed to receive the broadcast message from all those uplink neighbours and send acknowledgement to all of them, generating huge message contention and collision. This is popularly referred to as the broadcast storm problem. The present article is focused to remove the broadcast redundancy within 2-hop neighbourhood and beyond, as much as possible by prioritizing the 1- hop downlink neighbours of a node. Priority of a 1-hop downlink neighbour of a node ni increases if it is equipped with a large number of 1-hop downlink neighbours, large radio- range, high remaining battery power and very small number of uplink neighbours closer to the broadcast source than ni. ni waits a predefined amount of time to receive proactive acknowledgements from the 1-hop downlink neighbours having less priority. If it does not receive acknowledgement from those downlink neighbours within the waiting time, it sends the broadcast message to them. A fuzzy controller named Priority Assignor (PA) is embedded in every node that determines the priority of a 1-hop downlink neighbour. Simulation results firmly establish that the proposed protocol FP2 B produces high broadcast delivery ratio at much lesser message cost, compared to other state-of-the-art broadcast algorithms. KEYWORDS Ad hoc network, broadcast redundancy, flooding, priority assignor, proactive acknowledgement. 1. INTRODUCTION A mobile ad hoc network is a wireless network that is self-organized with many mobile nodes. No static infrastructure such as a wired backbone is available. All nodes are free to move around and the network topology may change frequently. Due to limited transmission range of wireless network interface, nodes are required to forward messages for those located outside the radio coverage, thereby forming a multi-hop network. Possible applications include emergency rescue in disaster situations, communication between mobile robots, exchanging information in the
  • 2. 26 Computer Science & Information Technology (CS & IT) battlefield etc. [1-5]. Broadcast is useful in delivering messages to users with unknown location or group of users whom the source need not exactly know. Broadcast plays an important role in routing, network management etc. Many on-demand or reactive routing protocols (dynamic source routing (DSR) [2], ad hoc on-demand distance vector routing (AODV) [3], on-demand multicast routing protocol (ODMRP) [4] etc.) rely on broadcast to discover a route between two nodes or to update group status and multicast routes. Broadcast is also a viable candidate for multicast in ad hoc networks with rapid changing topology. A density based innovative flooding (DBF) algorithm is proposed in [6]. In this algorithm, each node forwards a message based on its neighbour density and neighbour density of its previous node from which the broadcasted message. In a cluster of loosely couples nodes with few intermediate nodes as neighbours, the probability of forwarding the broadcasted message will be high. On the other hand, if a node is having high density of neighbours, then there will be lots of chances of packet collision at that point. Density based flooding tries to avoid that situation by assigning low priority at that point. The article in [7] proposes a tree based broadcast (TBB) method that maintains a spanning tree in the network. The algorithm is fully distributed, decentralized and resource-efficient. Broadcast operation is performed using a tree by forwarding the message not to all neighbours, but only those neighbours in the tree structure. Since the tree is acyclic, each message is received only once by each node, giving two advantages over the existing methods. Firstly it is needless to store the previous broadcasts in order to avoid endless multiplications of broadcast messages along a cycle of links. Only the originator of a broadcast message needs to store it and pay attention to whether its broadcast was successful or not if it is of great importance. Secondly, it is very economical considering how many times a broadcast message should be forwarded. A reliable broadcast (RB) method is proposed in [8], which combines area based and neighbour- based technique of broadcast. Each node gains knowledge of neighbours and maintains neighbour list. The algorithm calculates the relative position of the nodes with respect to broadcast source node. The nodes that are farthest from the source rebroadcasts next. The algorithm tries to minimize the number of rebroadcasts by intermediate nodes and thus reduces message cost. Reference [9] proposes a method for reduction of broadcast traffic (RBT) in mobile ad hoc networks. It focuses on the fact that communication links in ad hoc networks break frequently due to node mobility. As the nodes move, a node receiving a packet on the boundary of communication range of a transmitter node is allowed to drop the packet, as the receiver may soon move out of the radio range of the transmitter. To approximate the distance between receiver and transmitter, receiver signal strength information is used. The proposed algorithm FP2 B eliminates much more redundancy than these algorithms. It considers the then topological situation of the network up to 2-hop neighbourhoods of a node (in terms of the number and positions of uplink and downlink neighbours’ w.r.t. the geographical locations of the broadcast source) , the radio-ranges and residual energy of involved nodes (this is very important from the point of view of ad hoc networks because there is no point to send the broadcast messages to the nodes which are about to be inoperable). All these greatly improve the network throughput by reducing the message cost through tackling the broadcast storm problem. 2. OVERVIEW OF FP2 B According to the study of discharge curve of the batteries heavily used in ad hoc networks, at least 40% of total charge is required to remain in operable condition, the range from 40% to 60% is satisfactory, 60% to 80% is good whereas the next higher range is considered to be more than sufficient [13]. A node with residual energy 40%-60% will be termed as operational whereas a node with residual energy more than 60% will be called power-efficient in rest of the article. In
  • 3. Computer Science & Information Technology (CS & IT) 27 FP2 B, a node nj drops a message immediately after receiving it from an uplink neighbour ni at time t, provided its residual energy at that time is less than 40%. Otherwise nj tries to find out a pair of 1-hop uplink neighbour and 1-hop downlink neighbours (ni, nk) of nj at time t s.t. nj∈Di(t), nk∈Di(t) and nk∈Dj(t) where Di(t) denotes the set of 1-hop downlink neighbours of ni at time t. In this situation, nj won’t send the broadcast message to nk because nk has automatically received that after ni has sent the message. If all the 1-hop downlink neighbours of nj at time t, are also 1- hop downlink neighbours of some uplink neighbour nl of nj at that time s.t. nj has received the broadcast message from nl, then nj wont forward the broadcast message after receiving it. This eliminates the redundancy between 1-hop and 2-hop downlink neighbourhood of a node. But if there exists at least one 1-hop downlink neighbour of nj that is not the 1-hop downlink neighbour of any uplink neighbour of nj, then nj will need to prioritize those 1-hop downlink neighbours. This is performed by a fuzzy controller named priority assignor (PA). Priority of a node nk which is a downlink neighbour of nj, depends upon its number of 1-hop downlink neighbours, radio- range, residual battery power, total number of power-efficient uplink neighbours (residual energy is more than 60%) and the number of power-efficient uplink neighbours that are closer to the broadcast source. nj waits a predefined amount of time to receive proactive acknowledgements from the 1-hop downlink neighbours having less priority. If it does not receive acknowledgement from those downlink neighbours within the waiting time, it sends the broadcast message to them. The waiting time is equal to the amount of time that is required by nj to forward (Mj-1) number of messages where Mj is the number of locations in message queue of nj. 3. INPUT PARAMETERS OF PA OF na Here it is assumed that na is an uplink neighbour of ni at time t that is evaluating the priority of ni at that time. Below I describe the input parameters of the PA of na. Residual Energy Index The residual energy index αi(t) of ni at time t is defined as, αi(t) =1 – ei(t)/Ei (1) Where ei(t) and Ei indicate the consumed battery power of ni at time t and the maximum battery capacity of the same node, respectively. It is clear from the formulation in (1) that αi(t) ranges between 0 and 1. Values of it close to 1 increase the priority of ni as a downlink neighbour. It indicates that if ni receives the broadcast message, then it is well-equipped from the point of view of battery power to forward it to its 1-hop downlink neighbours. Radio-range Index Assuming that Rmin and Rmax denote the minimum and maximum possible radio-ranges of the network, radio-range index rr(i) of node ni is given by, rr(i) = (Ri-Rmin+1) / (Rmax-Rmin+1) (2) where Ri is the radio-range of node ni. From (2), it is evident that rr(i) ranges between 0 and 1. As Ri approaches Rmax, rr(i) approaches 1. 1 is added to the denominator in (2) to avoid 0 value in the denominator when Rmax=Rmin. In order to maintain the fractional nature of radio-range index, 1 is added to the numerator also. High radio-range index of a node denotes that it has got high encapsulating capability. So, the number of its 1-hop downlink neighbours may increase any time.
  • 4. 28 Computer Science & Information Technology (CS & IT) Downlink Cardinality Index The downlink cardinality index βi(t) of ni at time t is defined as, βi(t) =(1- 1/(|Di(t)|+1)) exp (1/(|Di(t)|+1)) (3) From the formulation in (3), βi(t) ranges between 0 and 1. Please note that 1 is added to | Di(t)| to avoid 0 value in the denominator when | Di(t)|=0. Values of βi(t) close to 1 increase the priority of ni as a downlink neighbour. It indicates that if ni receives the broadcast message, then it may send that to a huge number of 1-hop downlink neighbours. Uplink Cardinality Index The uplink cardinality index γi(t) of ni at time t is defined as, γi(t) = 1-√(f1i(t) × f2i(t)) (4) f1i(t) = (1-1/(|U′i(t)|+1))exp(1/(|U′i(t)|+1)) f2i(t) = (1-1/(|Ui(t)|+1)) Where Ui(t) is the set of power-efficient uplink neighbours of ni at time t and U′i(t) is a subset of Ui(t) containing those uplink neighbours of ni at time t which are closer to the broadcast source than na. 1 is added to both |Ui(t)| and |U′i(t)| to avoid 0 value in the denominator in (5) and (6) when |Ui(t)| and |U′i(t)| are 0. From the formulation in (4), γi(t) ranges between 0 and 1. Values of it close to 0 decrease the priority of ni as a downlink neighbour of na. It indicates that for ni, na is not the only uplink neighbour from where it can receive broadcast message at time t, several other uplink neighbours are there. Priority of ni decreases even more if some of those uplink neighbours are closer to the broadcast source than na. 4. RULE BASES OF PA The range divisions of the parameters of PA are shown in table 1. Table 1: Range division of parameters Name of parameter Range division Fuzzy premise variables α 0-0.40 A1 0.40-0.60 A2 0.60-0.80 A3 0.80-1.00 A4 rr, β, γ 0-0.25 A1 0.25-0.5 A2 0.5-0.75 A3 0.75-1.00 A4 Table 2 shows the fuzzy composition of α and rr producing a temporary variable t1. α is given more weight because high residual energy is indispensable for smooth operation of a node. Table 3 combines t1 and β generating another temporary output t2. The fuzzy combination of t2 and γ produces the ultimate output X of PA. If X=A3 or X=A4, then that downlink neighbour directly receives the broadcast message. Otherwise, the uplink neighbours wait for a specific amount of
  • 5. Computer Science & Information Technology (CS & IT) 29 time (this time is equal to the time of receiving acknowledgement from the farthest downlink neighbour) before sending the broadcast message. Table 2: Fuzzy combination of α and rr producing t1 αααα →→→→ rr →→→→ A1 A2 A3 A4 A1 A1 A1 A2 A2 A2 A1 A1 A2 A3 A3 A1 A2 A3 A4 A4 A1 A2 A3 A4 Table 3: Fuzzy combination of t1 and β producing t2 t1 →→→→ ββββ →→→→ A1 A2 A3 A4 A1 A1 A2 A3 A3 A2 A1 A2 A3 A4 A3 A1 A2 A3 A4 A4 A1 A2 A3 A4 Table 4: Fuzzy combination of t2 and γ producing X t2 →→→→ γγγγ →→→→ A1 A2 A3 A4 A1 A1 A2 A3 A4 A2 A1 A2 A3 A4 A3 A1 A2 A3 A4 A4 A1 A2 A3 A4 5. SIMULATION RESULTS I evaluate the performance of FLB, using the network simulator ns-2 [10]. Except FP2 B, I implement the protocols tree-based broadcasting (TBB), reduction of broadcast traffic (RBT) approach, and density-based flooding (DBF). The simulation parameters are shown in table 5. The simulation metrics are broadcast cost (total no. of messages transmitted by all nodes in the network / (total no. of messages generated by broadcast sources × total no. of nodes in the network)) and packet delivery ratio ((total no. of data packets actually delivered / total no. of data packets actually transmitted) × 100). These are measured with respect to the total number of nodes in the network and total number of broadcast sources. The graphical results are illustrated in figures 1, 2, 3 and 4. When the measurements are performed with respect to the number of nodes, the number of broadcast cost is kept constant at 10. Similarly, when the measurement is performed with respect to the broadcast sources, the number of nodes is kept constant at 200.
  • 6. 30 Computer Science & Information Technology (CS & IT) Table 5: Simulation Parameters Name of parameter Value Network area 500 m × 500 m Number of nodes 50-300 Transmission range 10 m -50 m in first ten runs, 30 m – 100 m in second ten runs 10 m – 100 m in last ten runs Packet size 128 bytes MAC layer IEEE 802.11g Traffic type Constant bit rate Mobility model Random waypoint Bandwidth 1-4 mbps in first ten runs, 2-7 mbps in second ten runs and 3-10 mbps in last ten runs Simulation time 1000 seconds Broadcast cost vs number of nodes 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 50 100 200 300 Number of nodes Broadcastcost TBB RBT DBF FP2B Figure 1: Broadcast cost vs number of nodes Data packet delivery ratio vs number of nodes 0 0.2 0.4 0.6 0.8 1 1.2 50 100 200 300 Number of nodes Datapacketdeliveryratio TBB RBT DBF FP2B Figure 2: Data packet delivery ratio vs number of nodes
  • 7. Computer Science & Information Technology (CS & IT) 31 Broadcast cost vs number of broadcast sources 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 5 10 15 25 Number of broadcast sources Broadcastcost TBB RBT DBF FP2B Figure 3: Broadcast cost vs number of broadcast sources Data packet delivery ratio vs number of broadcast sources 0 0.2 0.4 0.6 0.8 1 1.2 5 10 15 25 Number of broadcast sources Datapacketdeliveryratio TBB RBT DBF FP2B Figure 4: Data packet delivery ratio vs number of broadcast sources Figures 1 and 2 measure the improvements produced by the proposed scheme in terms of broadcast cost and data packet delivery ratio with respect to the number of nodes whereas figures 3 and 4 measure the similar parameters with respect to the number of broadcast sources. It may be noted that the improved data packet delivery ratio produced by FP2 B is actually the result of much lesser broadcast cost that is produced by FP2 B compared to the others, due to less signal contention and collision. Broadcast cost for all the schemes increase when the number of nodes in the network increase or number of broadcast sources increase. The reason is that if the number of nodes in the network increases keeping the number of broadcast sources constant, then the number of recipients for each broadcast operation increase yielding a higher broadcast cost. On the other hand, if the number of broadcast sources increase then for each broadcast operation number of senders increase keeping the number of recipients constant. So, in both cases the broadcast cost increases and data packet delivery ratio decreases for all the protocols. Since the proposed scheme FP2 B is power-aware, load-balanced and much more rigorous in decreasing redundancy than all other competitor protocols, the broadcast cost is much lesser in it than others. Less message cost generates less signal contention and collision increasing the data packet delivery ratio. As a result, the energy consumption in nodes decreases by a huge amount. This saved energy prevents some link breakages that take place due to complete exhaustion of battery of certain nodes. Therefore, the route-request messages that would have been otherwise injected into the network for repairing the broken links is not required in the proposed scheme. Please note that in the proposed scheme redundancy is eliminated up to 2 hops. This improvement is significant from the point of view of today’s wireless networks where the density of nodes is high, i.e. redundancy is high even if only 2-hop neighbours are considered. So, elimination of this redundancy saves a lot of broadcast cost as shown in figure 1.
  • 8. 32 Computer Science & Information Technology (CS & IT) It is seen from figure 2 that for all the protocols, the data packet delivery ratio increases with increase in the number of nodes due to better network connectivity until the network gets overloaded or saturated with nodes. But since FP2 B is more efficient than others in confronting the broadcast storm problem, it suffers least from the node overload as well as message overload due to a huge number of broadcast sources. 6. CONCLUSIONS This paper presents a new approach for efficient broadcasting in mobile ad hoc networks. The proposed protocol called FP2 B is power and topology aware (up to 2 hops) and very efficiently reduces the cost of messages in the network by increasing the broadcast throughput. Design of the fuzzy controller Priority Assignor is based on real life observations and heuristics and it intelligently tackles the broadcast storm. REFERENCES [1] Anuradha Banerjee & Paramartha Dutta (2010), A Survey of Unicast Routing Protocols in Mobile Ad Hoc Networks”, International Journal of Advances in Science and Technology, vol. 2, no. 10 [2] D David & B. Johnson.(1994), Routing in Ad Hoc Networks of Mobile Host. Proceedings of the Workshop on Mobile Computing Systems and Applications, pp. 158–163, IEEE Computer Society, Santa Cruz, CA [3] Ian D. Chakeres et. Al (2005), AODV routing protocol implementation design”, In Proceedings of 2nd International Workshop on Wireless Ad Hoc Networking, Notification (WWAN) [4] Lee Sung-Ju, Su W. & M. Gerla,(1999), On-demand Multicast Routing Protocol (ODMRP) for Ad Hoc Networks [5] Ho. C, Obraczka K & Tsudil G. (1999), Flooding for Reliable Multicast in Multi-hop Ad Hoc Networks, In Proceedings of 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIAL M’99) [6] N. Karthikeyan, V. Palanisamy & K. Duraiswamy (2010), Optimum Density Based Model for probabilistic Flooding Protocol in Mobile Ad Hoc Network, European Journal of Scientific Research, vol. 39 no.4, pp. – 577-588 [7] L. Tan, X. Zhan, J. Lie & F. Zhao (2006), A Novel Tree-based Broadcast Algorithm for Wireless Ad Hoc Networks”, International Journl of Wireless and Mobile Computing, vol. 1 no. 2, pp. 156 – 162 [8] S.V.M.G. Bavithiraja & R. Radhakrishnan (2009), “A New Reliable Broadcasting Method in Mobile Ad Hoc Networks”, International Journal of Computer Science and Network Security, vol. 9, no. 4, pp. 340-349, 2009 [9] A.Shukla (2007), On the Reduction of Broadcast Traffic in Mobile Ad Hoc Networks”, In Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing [10] http://isi.edu/nsnam/ns AUTHORS Anuradha Banerjee is currently working as a assistant professor in Kalyani Govt. Engg. College. She completed her B.E. in Computer Science And Technology from Bengal Engineering College (Deemed University), Sibpur, West Bengal, India in the year 2001. She has 19 publications till date, including National and International conferences and journals. Her research area includes Ad Hoc Networks, Neural Networks and Artificial Intelligence.