The Multi-Cast Packet Loss in Mobile Ad-hoc Networks

被引:0
|
作者
Liu, Siyang [1 ]
Wang, Jingchao [2 ]
Gan, Xiaoying [1 ]
Tian, Xiaohua [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai, Peoples R China
[2] Inst China Elect Syst Engn Corp, Beijing, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the last two decades, Multi-Cast schemes in mobile ad-hoc networks have been widely studied and lots of research results have been put into use and changed our everyday life. However, packet loss for Multi-Cast schemes in mobile ad-hoc networks has not been well studied yet. The influence of node density and relay schemes on packet loss is not clear. Thus, we study the packet loss problem for Multi-Cast schemes in MANETs in this paper. First, we present a general Multi-Cast probabilistic model to get a better understanding of the packet loss problem. Second, based on the general model and Chernoff Bounds, we prove that the upper bound of the general packet loss for Multi-Cast is Omega(m epsilon(-n/2)), where.. is the node number and.. denotes number of hops. Thus we can conclude that large node density decreases the packet loss rate by exponential factor, and bigger hops increase packet loss rate linearly. In addition, we present a reliable Multi-Cast protocol(RMP). Through an ACK Aware Tree to complete packet acknowledgement and repair host selection, RMP is able to minimize the impact of packet loss on the Multi-Cast throughput in the simulation.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Network forensics on mobile ad-hoc networks
    Otaka, Akira
    Takagi, Tsuyoshi
    Takahashi, Osamu
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2008, 5179 : 175 - 182
  • [32] Cluster Maintenance in Mobile Ad-hoc Networks
    Lan Wang
    Stephan Olariu
    [J]. Cluster Computing, 2005, 8 : 111 - 118
  • [33] Group Monitoring in Mobile Ad-Hoc Networks
    Gaba, Albana
    Voulgaris, Spyros
    van Steen, Maarten
    [J]. NEXT GENERATION SOCIETY: TECHNOLOGICAL AND LEGAL ISSUES, 2010, 26 : 441 - 451
  • [34] A PERCOLATION MODEL OF MOBILE AD-HOC NETWORKS
    Mohammadi, Hossein
    Oskoee, Ehsan Nedaaee
    Afsharchi, Mohsen
    Yazdani, Nasser
    Sahimi, Muhammad
    [J]. INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2009, 20 (12): : 1871 - 1902
  • [35] Quantifying trust in mobile ad-hoc networks
    Virendra, M
    Jadliwala, M
    Chandrasekaran, M
    Upadhyaya, S
    [J]. 2005 International Conference on Integration of Knowledge Intensive Multi-Agent Systems: KIMAS'05: MODELING, EXPLORATION, AND ENGINEERING, 2005, : 65 - 70
  • [36] SECURITY IN MULTICAST MOBILE AD-HOC NETWORKS
    Visu, P.
    Chembian, W. T.
    Koteeswaran, S.
    [J]. FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 38 - 44
  • [37] Interference Criteria for Mobile Ad-Hoc Networks
    Boksiner, Jeffrey
    Posherstnik, Yuriy
    Yeager, Richard O.
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1427 - 1432
  • [38] An Optimization Strategy for Mobile Ad-hoc Networks
    Luo, Jianlu
    Yang, Juan
    Cheng, Fang
    Fu, Dandan
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 921 - 925
  • [39] Wormhole Attack in Mobile Ad-hoc Networks
    Sharma, Madhu
    Jain, Ashish
    Shah, Shweta
    [J]. 2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [40] Routing protocols in mobile Ad-hoc networks
    Gilaberte, RL
    Herrero, LP
    [J]. Proceedings of the Fourth IASTED International Conference on Communication Systems and Networks, 2005, : 196 - 201