• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

A survey of reliable broadcast protocols for mobile ad-hoc networks (2003)

by E Vollset, P Ezhilchelvan
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 21
Next 10 →

MMSN: Multi-frequency media access control for wireless sensor networks

by Gang Zhou, Chengdu Huang, Ting Yan, Tian He, John A. Stankovic, Tarek F. Abdelzaher - In IEEE INFOCOM , 2006
"... Abstract — Multi-frequency media access control has been well understood in general wireless ad hoc networks, while in wireless sensor networks, researchers still focus on single frequency solutions. In wireless sensor networks, each device is typically equipped with a single radio transceiver and a ..."
Abstract - Cited by 74 (12 self) - Add to MetaCart
Abstract — Multi-frequency media access control has been well understood in general wireless ad hoc networks, while in wireless sensor networks, researchers still focus on single frequency solutions. In wireless sensor networks, each device is typically equipped with a single radio transceiver and applications adopt much smaller packet sizes compared to those in general wireless ad hoc networks. Hence, the multi-frequency MAC protocols proposed for general wireless ad hoc networks are not suitable for wireless sensor network applications, which we further demonstrate through our simulation experiments. In this paper, we propose MMSN, which takes advantage of multi-frequency availability while, at the same time, takes into account the restrictions in wireless sensor networks. In MMSN, four frequency assignment options are provided to meet different application requirements. A scalable media access is designed with efficient broadcast support. Also, an optimal non-uniform backoff algorithm is derived and its lightweight approximation is implemented in MMSN, which significantly reduces congestion in the time synchronized media access design. Through extensive experiments, MMSN exhibits prominent ability to utilize parallel transmission among neighboring nodes. It also achieves increased energy efficiency when multiple physical frequencies are available. I.
(Show Context)

Citation Context

...beacon period, each node gets its neighbors’ IDs within two communication hops. Currently, we do not consider radio irregularity and link asymmetry [37] [38] [39] [40]. Readers can refer to [41] [42] =-=[43]-=- for more information about reliability issues in broadcast. After nodes collect ID information of all neighbors within two hops, they make frequency decisions in the increasing order of their ID valu...

Pacifier: High-Throughput, Reliable Multicast without “Crying Babies” in Wireless Mesh Networks

by Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-chun Wang , 2009
"... In contrast to unicast routing, high-throughput reliable multicast routing in wireless mesh networks (WMNs) has received little attention. There are two primary challenges to supporting high-throughput, reliable multicast in WMNs. The first is no different from unicast: wireless links are inherently ..."
Abstract - Cited by 17 (0 self) - Add to MetaCart
In contrast to unicast routing, high-throughput reliable multicast routing in wireless mesh networks (WMNs) has received little attention. There are two primary challenges to supporting high-throughput, reliable multicast in WMNs. The first is no different from unicast: wireless links are inherently lossy due to varying channel conditions and interference. The second, known as the “crying baby ” problem, is unique to multicast: the multicast source may have varying throughput to different multicast receivers, and hence trying to satisfy the reliability requirement for poorly connected receivers can potentially result in performance degradation for the rest of the receivers. In this paper, we propose Pacifier, a new high-throughput reliable multicast protocol for WMNs. Pacifier seamlessly integrates four building blocks, namely, tree-based opportunistic routing, intra-flow network coding, source rate limiting, and roundrobin batching, to support high-throughput, reliable multicast routing in WMNs, while at the same time effectively addresses the “crying baby ” problem. Our evaluations show that Pacifier increases the average throughput over a practical, state-of-the-art reliable network coding-based protocol MORE by 171%, while improving the throughput of well-connected receivers by up to a factor of 20.
(Show Context)

Citation Context

...codes (e.g., [23]), the majority of the work on reliable multicast in multihop wireless networks have used the traditional ARQ techniques. A survey on reliable multicast protocols for ad hoc networks =-=[24]-=- classifies them into deterministic and probabilistic ones, depending on whether data delivery is fully reliable or not. Deterministic protocols (e.g., [10], [8], [12], [11]) provide deterministic gua...

SDJS: Efficient Statistics in Wireless Networks

by Albert Krohn, Michael Beigl, Sabin Wendhack
"... Synchronous Distributed Jam Signalling (SDJS) is a new transmission scheme targeted to highly mobile and ad hoc wireless systems. It is based on the synchronous, parallel and superimposing emission of jam signal on the physical layer. SDJS is intended to be implemented as a feature on existing stand ..."
Abstract - Cited by 15 (7 self) - Add to MetaCart
Synchronous Distributed Jam Signalling (SDJS) is a new transmission scheme targeted to highly mobile and ad hoc wireless systems. It is based on the synchronous, parallel and superimposing emission of jam signal on the physical layer. SDJS is intended to be implemented as a feature on existing standards. It enables those system with the ability to fast estimate statistical parameters. This paper presents SDJS in general and then focuses on the application to estimate the parameter number of devices in a mobile setting. We studied SDJS and its application through a mathematical model and simulations and proved the idea in a realworld implementation on a mobile network, where we estimated the number of devices in real time (within 5ms), increasing the estimation speed compared to traditional approaches by factor 1000.

Reliable Broadcast in ZigBee Networks

by Zafer Sahinoglu, Philip Orlik, Jinyun Zhang, Bharat Bhargava, Gang Ding , 2005
"... Due to scarce resources, such as transmission power, storage space and communication bandwidth, current broadcast approaches for general ad hoc networks can not be applied to IEEE 802.15.4 based ad hoc networks (e.g., ZigBee networks). This paper proposes a forward node selection algorithm that sign ..."
Abstract - Cited by 8 (1 self) - Add to MetaCart
Due to scarce resources, such as transmission power, storage space and communication bandwidth, current broadcast approaches for general ad hoc networks can not be applied to IEEE 802.15.4 based ad hoc networks (e.g., ZigBee networks). This paper proposes a forward node selection algorithm that significantly reduces broadcast redundancy. The algorithm exploits the hierarchical address space in ZigBee networks. Only one-hop neighbor information is needed: a partial list of two-hop neighbors is derived at a node without exchanging messages between neighboring nodes. The complexity of the proposed algorithm is polynomial in terms of both computation time and memory space. The localized algorithm provides an optimal and feasible solution of selecting the minimum number of rebroadcast nodes in ZigBee networks, which is an NP-hard problem for general ad hoc networks. The proposed algorithm is extended to deal with packet loss during data transmission. A ZigBee rebroadcast algorithm is also proposed to further reduce the number of rebroadcast nodes and cover the whole network faster by assigning a non-random rebroadcast timer determined by the number of neighbors to be covered, distance and link quality. Simulations are conducted to evaluate the broadcast redundancy, coverage time, and coverage ratio.

The case for fec-based reliable multicast in wireless mesh networks

by Dimitrios Koutsonikolas, Y. Charlie Hu - DSN ’07. 37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON , 2007
"... Many important applications in wireless mesh networks require reliable multicast communication. Previously, Forward Error Correction (FEC) techniques have been proved successful for providing reliability in the Internet, as they avoid the control packet implosion and scalability problems of ARQ-base ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
Many important applications in wireless mesh networks require reliable multicast communication. Previously, Forward Error Correction (FEC) techniques have been proved successful for providing reliability in the Internet, as they avoid the control packet implosion and scalability problems of ARQ-based protocols. In this paper, we examine if FEC can be equally efficient in wireless mesh networks. We implement four reliable schemes initially proposed for wired networks on top of ODMRP, a popular unreliable multicast routing protocol for wireless networks. We compare the performance of the four schemes using extensive simulations. Our results show that the use of pure FEC can offer significant improvements in terms of reliability, increasing PDR up to 100 % in many cases, but it can be very inefficient regarding the number of redundant packets it transmits. Moreover, a carefully designed hybrid protocol, such as RMDP, can maintain the same high level of reliability while improving the efficiency by up to 38 % compared to a pure FEC scheme.
(Show Context)

Citation Context

...e for wireless environments. 4. Related Work Recently, many protocols have been proposed for reliable multicast in mobile ad hoc networks. A survey on reliable multicast protocols for ad hoc networks =-=[16]-=- classifies them into deterministic and probabilistic ones, depending on whether the delivery is fully reliable or not. Deterministic protocols [17, 18, 19, 20, 15, 21] provide deterministic guarantee...

Exploring the design space of reliable multicast protocols for wireless mesh networks

by Dimitrios Koutsonikolas, Y. Charlie Hu , 2009
"... ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Abstract not found

MAC Layer Support for Group Communication in Wireless Sensor Networks

by R Zheng, L Sha , 2005
"... ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...one-to-many receivers can also incorporate knowledge of link characteristics. Two protocols to support reliable broadcast and manycast in ad hoc networks, Autograph and Scribble have been proposed in =-=[12]-=-, [13]. The Autograph protocol achieves a similar goal as the PIF protocol in Section V-B with the exception that it is designed for a potentially more dynamic network with constrained node mobility. ...

A comparison of reliable multicast protocols for mobile ad hoc networks

by Beini Ouyang, Xiaoyan Hong - in Proceedings of IEEE SoutheastCon , 2005
"... Reliable Multicast plays a significant role in many applications of Mobile Ad Hoc Networks (MANETs). In recent years, a number of protocols have been proposed to deliver multicast packets reliably. These protocols have shown distinguishing features and have used different recovery mechanisms. In ord ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Reliable Multicast plays a significant role in many applications of Mobile Ad Hoc Networks (MANETs). In recent years, a number of protocols have been proposed to deliver multicast packets reliably. These protocols have shown distinguishing features and have used different recovery mechanisms. In order to provide a comprehensive understanding of these protocols, we present in this paper a survey of the protocols and compare the advantages and disadvantages of different design features as well as protocol performance. The protocols being surveyed are classified into three categories, namely, ARQ-based, gossip-based and FEC-based. 1.
(Show Context)

Citation Context

...d the original data can be reconstructed using correctly received ones. Other researchers have used categories of deterministic and probabilistic protocols in classifying reliable broadcast protocols =-=[8]-=-. The two categories capture the performance goal of the protocols, namely, whether the delivery is full reliable. Our classification, on the hand, emphasizes the operational features. In our analyses...

Date de Soutenance: 13/10/2004 Composition du Jury:

by Shiyi Wu, Hal Id Pastel, De L’ecole Nationale Supérieure, Spécialité Réseaux Et Informatique, Shiyi Wu, Prof Andrzej, Prof Eric, Prof Guy, Pujolle Examinateur, Prof Gwendal, Le Grand Examinateur, Amarger Examinateur, Prof Christian, Bonnet Directeur Thèse , 2004
"... HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci-entific research documents, whether they are pub-lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte p ..."
Abstract - Add to MetaCart
HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci-entific research documents, whether they are pub-lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et a ̀ la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.
(Show Context)

Citation Context

...ery with a certain probability. Deterministic protocols have bad tradeoffs between reliability and scalability/mobility, while probabilistic protocols do not provide deterministic delivery guarantees =-=[84]-=-. Seeing the drawback of deterministic protocols, we focus our research interesting on retransmission method and design a reliable multicasting protocol, called Active Reliable Multicast Protocol with...

© IDOSI Publications, 2011 Location Based Dynamic Probabilistic Broadcasting for MANETs

by Imran Ali Khan, Sajjad Ahmad Madani, Waqas Anwar, Khizar Hayat
"... Abstract: Broadcasting has a central importance to Mobile Ad hoc Networks (MANETs) wherein it is frequently executed for the route discovery, address resolution, the application of paging a host and many other network services. Use of simple flooding, for broadcasts, causes redundant rebroadcasts an ..."
Abstract - Add to MetaCart
Abstract: Broadcasting has a central importance to Mobile Ad hoc Networks (MANETs) wherein it is frequently executed for the route discovery, address resolution, the application of paging a host and many other network services. Use of simple flooding, for broadcasts, causes redundant rebroadcasts and contention and collision issues that may lead to what is known as the broadcast storm problem. In this paper, we propose an angle-aware broadcasting algorithm as a contribution to address the broadcast storm problem. In this algorithm, rebroadcast probability is dynamically calculated, based on the angles covered (cover angles) by a node with respect to its neighbors, without using the latter’s knowledge information or any complex calculations thereof. A simulation based execution of the proposed algorithm and performance comparison with flooding and fixed probabilistic broadcasting schemes show that our angle-aware probabilistic broadcasting technique outperforms the other two, in term of both delivery ratio and number of retransmissions. Key words: Broadcasting • probabilistic • angle aware • simulation • routing
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University