A mobility aware protocol synthesis for efficient routing in ad hoc mobile networks

被引:24
|
作者
Bamis, Athanasios [2 ]
Boukerche, Azzedine [3 ]
Chatzigiannakis, Loannis [1 ,4 ]
Nikoletseas, Sofiris [1 ,4 ]
机构
[1] Univ Patras, Res Acad Comp Technol Inst, Res Unit 1, GR-26500 Patras, Greece
[2] Yale Univ, ENALAB, New Haven, CT 06520 USA
[3] Univ Ottawa, SITE, Ottawa, ON K1N 6N5, Canada
[4] Univ Patras, CEID, GR-26500 Patras, Greece
基金
加拿大创新基金会; 加拿大自然科学与工程研究理事会;
关键词
wireless ad hoc; mobile networks; mobility classification; routing; algorithmic design; simulation; performance evaluation;
D O I
10.1016/j.comnet.2007.09.023
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In mobile ad hoc networks (MANETs), the mobility of the nodes is a complicating factor that significantly affects the effectiveness and performance of the routing protocols. Our work builds upon recent results on the effect of node mobility on the performance of available routing strategies (i.e., path-based, using support) and proposes a protocol framework that exploits the usually different mobility rates of the nodes by adapting the routing strategy during execution. We introduce a metric for the relative mobility of the nodes, according to which the nodes are classified into mobility classes. These mobility classes determine, for any pair of origin and destination, the routing technique that best corresponds to their mobility properties. Moreover, special care is taken for nodes remaining almost stationary or moving with high (relative) speeds. Our key design goal is to limit the necessary implementation changes required to incorporate existing routing protocols into our framework. We provide extensive evaluation of the proposed framework, using a well-known simulator (NS2). Our first findings demonstrate that the proposed framework improves, in certain cases, the performance of existing routing protocols. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:130 / 154
页数:25
相关论文
共 50 条
  • [1] An Efficient Security Aware Routing Protocol for Mobile Ad Hoc Networks
    VinothKumar, K.
    Rajaram, A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (12): : 66 - 73
  • [2] Mobility-Aware Routing Protocol For Mobile Ad-Hoc Networks
    Ju, Suyang
    Evans, Joseph B.
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOPS, VOLS 1 AND 2, 2009, : 360 - 365
  • [3] Predictive mobility and location-aware routing protocol in mobile ad hoc networks
    Lu, TE
    Feng, KT
    [J]. GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 899 - 903
  • [4] Mobility and Load aware Routing protocol for ad hoc networks
    Khamayseh, Yaser
    Obiedat, Ghadeer
    Yassin, Munner Bani
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2011, 23 (02) : 105 - 113
  • [5] A power-aware multicast routing protocol for mobile ad hoc networks with mobility prediction
    Wang, NC
    Su, YL
    [J]. LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2005, : 408 - 415
  • [6] A power-aware multicast routing protocol for mobile ad hoc networks with mobility prediction
    Wang, Nen-Chung
    Chen, Jong-Shin
    Huang, Yung-Fa
    Su, Yu-Li
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2007, 43 (04) : 1479 - 1497
  • [7] A Power-Aware Multicast Routing Protocol for Mobile Ad Hoc Networks With Mobility Prediction
    Nen-Chung Wang
    Jong-Shin Chen
    Yung-Fa Huang
    Yu-Li Su
    [J]. Wireless Personal Communications, 2007, 43 : 1479 - 1497
  • [8] Mobility and QoS aware anycast routing in Mobile ad hoc Networks
    Basarkod, P. I.
    Manvi, S. S.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2015, 48 : 86 - 99
  • [9] Mobility-Aware Routing Algorithm for Mobile Ad Hoc Networks
    Sirmollo, Chalew Zeynu
    Bitew, Mekuanint Agegnehu
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [10] An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks
    Li, Xiaoqing
    Li, Hui
    Ma, Jianfeng
    Zhang, Weidong
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 287 - 290