Skip to main content

Locally Proactive Routing Protocols

  • Conference paper
Ad-Hoc, Mobile and Wireless Networks (ADHOC-NOW 2010)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 6288))

Included in the following conference series:

Abstract

In a proactive routing protocol, each node periodically transmits control packets to distribute its local topology. Since the conditions of a mobile ad hoc network are rarely uniform, using the same period at each node may not result in the best performance. Therefore, we propose a protocol that is locally proactive, i.e., each node periodically transmits control packets using a time interval based on its local network conditions. Our objective is to simultaneously maximize the packet delivery ratio and minimize the control overhead. To accomplish it, we develop statistical models for each response for the OLSR routing protocol as a function of node speed and two timer intervals. In simulation we show that the locally proactive OLSR reduces the control overhead by 35-44% and obtains a packet delivery ratio that is statistically identical to that of the original OLSR protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barrett, C., Marathe, A., Drozda, M., Marathe, M.: Characterizing the interaction between routing and MAC protocols in ad-hoc networks. In: Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 92–103. ACM, New York (2002)

    Chapter  Google Scholar 

  2. Carnegie Mellon University – Monarch (Mobile Networking Architectures) Project, Wireless and mobility extensions to ns-2, http://www.monarch.cs.cmu.edu

  3. Clausen, T., Jacquet, P.: Optimized link state routing protocol, RFC 3626 (October 2003), http://hipercom.inria.fr/olsr/rfc3626.txt

  4. Johnson, D.B., Maltz, D.A., Hu, Y.-C., Jetcheva, J.G.: The dynamic source routing protocol for mobile ad hoc networks (DSR) (November 2001) (internet draft), http://www.ietf.org/ids.by.wg/manet.html

  5. McClary, D.W., Syrotiuk, V.R., Kulahci, M.: Steepest-ascent constrained simultaneous perturbation for multi-objective optimization. Transactions on Modeling and Computer Simulation 21(1) (January 2011)

    Google Scholar 

  6. Ming, L., Zhao, G., Xie, G., Kuang, X.: HOLSR: A novel routing scheme of ad hoc wireless networks for pervasive computing. In: Proceedings of the 2nd International Conference on Pervasive Computing and Applications (ICPCA 2007), pp. 661–666 (July 2007)

    Google Scholar 

  7. Montgomery, D.C.: Design and Analysis of Experiments, 7th edn. Wiley, Chichester (December 2009)

    Google Scholar 

  8. Navidi, W., Camp, T.: Stationary distributions for the random waypoint model. IEEE Transactions on Mobile Computing 3(1), 99–108 (2004)

    Article  Google Scholar 

  9. Ogier, R., Templin, F., Lewis, M.: Topology dissemination based on reverse-path forwarding, RFC 3684 (February 2004), http://rfc3686.x42.com/

  10. Pei, G., Gerla, M., Chen, T.-W.: Fisheye state routing: a routing scheme for ad hoc wireless networks. In: Proceedings of IEEE International Conference on Communications (ICC 2000), vol. 1, pp. 70–74 (2000)

    Google Scholar 

  11. Perkins, C.E., Royer, E.M.: Ad hoc on-demand distance vector routing (AODV). In: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, pp. 90–100 (February 1999)

    Google Scholar 

  12. Ros, F.J., Ruiz, P.M.: Cluster-based OLSR extensions to reduce control overhead in mobile ad hoc networks. In: Proceedings of the 2007 International Conference on Wireless Communications and Mobile Computing, pp. 202–207 (2007)

    Google Scholar 

  13. Shaukat, K., Syrotiuk, V.R.: Using monitoring to control a proactive routing protocol. Ad Hoc & Sensor Wireless Networks 6(3-4), 299–319 (2008)

    Google Scholar 

  14. The University of California, Berkeley, The network simulator – ns-2, http://www.isi.edu/nsname/ns/

  15. Totaro, M.W., Perkins, D.D.: Using statistical design of experiments for analyzing mobile ad hoc networks. In: Proceedings of the 8th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2005), pp. 159–168. ACM, New York (2005)

    Google Scholar 

  16. Vadde, K.K., Syrotiuk, V.R.: Factor interaction on service delivery in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications 22(7), 1335–1346 (2004)

    Article  Google Scholar 

  17. Vadde, K.K., Syrotiuk, V.R., Montgomery, D.C.: Optimizing protocol interaction using response surface methodology. IEEE Transactions on Mobile Computing 5(6), 627–639 (2006)

    Article  Google Scholar 

  18. Xue, Y., Jiang, H., Hu, H.: Rough Sets and Knowledge Technology. Springer Link, Heidelberg (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shaukat, K., Syrotiuk, V.R. (2010). Locally Proactive Routing Protocols. In: Nikolaidis, I., Wu, K. (eds) Ad-Hoc, Mobile and Wireless Networks. ADHOC-NOW 2010. Lecture Notes in Computer Science, vol 6288. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14785-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14785-2_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14784-5

  • Online ISBN: 978-3-642-14785-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics