A cooperative multicast routing protocol for mobile ad hoc networks

被引:3
|
作者
Lee, I-Ta [1 ]
Chiou, Guann-Long [1 ]
Yang, Shun-Ren [1 ,2 ]
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Tsing Hua Univ, Inst Commun Engn, Hsinchu 300, Taiwan
关键词
Cluster; Cooperative transmission; Cross layer; Hierarchical tree; Multicast routing; COMMUNICATION;
D O I
10.1016/j.comnet.2011.03.019
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many multicast routing protocols and algorithms have been proposed to support different group-oriented applications in mobile ad hoc networks. However, the conventional tree-based and mesh-based multicast routing protocols generally suffer from frequent link breakage and high communication overhead, respectively. In this paper, we propose a cooperative multicast routing protocol. COMRoute, that incurs low communication overhead while guaranteeing reliable network connectivity. COMRoute utilizes cross-layer design by physical-layer cooperative transmission, MAC-layer clustering, and network-layer multicast routing. Specifically, the physical-layer multi-node decode-and-forward cooperative transmission provides reliable transmission links. At MAC layer, nodes are classified into clusters. In each cluster, the cluster head, serving as a gateway, is responsible for inter-cluster transmission, while other nodes perform cooperative reception. Based on the clustered architecture, we design an on-demand source-based multicast routing protocol at network layer, which takes diversity into account for route establishment. Moreover, COMRoute implements a mechanism to mitigate the asymmetric cooperative transmission problem. Our simulation results show that COMRoute outperforms the representative multicast routing protocols in terms of traffic overhead, delivery ratio, and energy consumption. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:2407 / 2424
页数:18
相关论文
共 50 条
  • [41] On-demand multicast routing protocol with constrained flooding for mobile Ad hoc networks
    Jiang G.-X.
    Mei R.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (02): : 278 - 283
  • [42] A distributed multicast routing protocol for ad-hoc (flat) mobile wireless networks
    Bhattacharya, R
    Ephremides, A
    PIMRC '97 - EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS: WAVES OF THE YEAR 2000+, TECHNICAL PROGRAM, PROCEEDINGS, VOLS 1-3, 1997, : 877 - 881
  • [43] Secure Multicast Routing Protocol against Internal Attacks in Mobile Ad Hoc Networks
    Pushpa, A. Menaka
    Kathiravan, K.
    2013 7TH IEEE GCC CONFERENCE AND EXHIBITION (GCC), 2013, : 245 - 250
  • [44] Mobile agents aided multicast routing in mobile ad hoc networks
    Shekhar, HMP
    Kumar, A
    Ramanatha, KS
    7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 765 - 770
  • [45] A multicast routing protocol with mobility prediction in ad hoc networks
    Yang, Peng
    Chen, Lei
    DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, : 306 - 309
  • [46] An Energy Constrained Multicast Routing Protocol in Ad Hoc Networks
    Yuan Peiyan
    Zhang Junna
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 2476 - +
  • [47] Distributed QoS multicast routing protocol in ad hoc networks
    Sun Baolin~ 1
    2. Dept. of Mathematics and Physics
    JournalofSystemsEngineeringandElectronics, 2006, (03) : 692 - 698
  • [48] Design and simulation of multicast routing protocol for ad hoc networks
    Zhou, Yuan
    Li, Guangsheng
    Zhan, Yongzhao
    Hou, Yibin
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2005, 39 (04): : 368 - 372
  • [49] EFFICIENT MULTICAST ROUTING IN MOBILE AD-HOC NETWORKS
    Chuang, Po-Jen
    Chu, Ting-Yi
    2013 IEEE 17TH INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS (ISCE), 2013, : 149 - 150
  • [50] QoS Constrained Multicast Routing For Mobile Ad Hoc Networks
    Latha, P.
    Ramachandran, R.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (07): : 66 - 70