A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks
Keywords:
DCF, MAC, CSMA/CA, BEB, MANET, Broadcast Redundancy, Flooding, Probability Based SchemeAbstract
Ad-hoc wireless network is a Collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Neighbor discovery is an important part of many protocols for wireless adhoc networks, including localization and routing. When neighbor discovery fails, communications and protocols performance deteriorate. Broadcasting is a common operation in a network to resolve many issues. In a mobile ad hoc network (MANET) in particular, due to host mobility, such operations are expected to be executed more frequently such as finding a route to a particular host, paging a particular host. Probabilistic broadcasting is best suited in terms of ad hoc network which is well known for its decentralized network nature and Binary exponential Back off (BEB) algorithm stated in the 802.11 standard plays an important role in the distributed coordinate function (DCF), which is provided at the medium access control (MAC) layer of the IEEE 802.11 standard. BEB might introduce long transmission delays without any significant benefit in respect of contention resolution due to node mobility. In fact, contending mobiles are likely to move to a different location during a large waiting time for retransmission after a packet collision and might get involved into another independent collision process elsewhere. Thus, the large growth rate in waiting time might not be appropriate in a mobile scenario as in a WLAN. Bearing this in mind, we propose certain modifications to BEB algorithm suitable for WLANs.
References
The Broadcast Storm Problem in a Mobile Ad Hoc Network, Sze-Yao Ni, Yu-Chee Tseng, Yuh-Shyan Chen, and Jang-Ping Sheu,1999.
A Probabilistic Algorithm for Reducing Broadcast Redundancy in Ad Hoc Wireless Networks, Md. Nazrul Islam 2013.
Sakshi Suhane, Dr. Sanjeev Sharma, Prof. Varsha Sharma. Performance Analysis of Backoff Algorithm in IEEE 802.11 Networks,June 2011.
Probabilistic Broadcasting Protocol In AD HOC Network And Its Advancement: A Review Tasneem Bano1, Jyoti Singhai2, November 2010.
Secure neighbor discovery and wormhole localization in mobile ad hoc networks,Radu Stoleru, Haijie Wu, Harsha Chenji, 2012.
Dynamic Security Scheme for Multicast Source Authentication (Karan Singh, Rama Shankar Yadav, 2010.
Secure neighbor discovery and wormhole localization in mobile ad hoc networks (Radu Stoleru, Haijie Wu, Harsha Chenji, 2006.
Routing Security in Ad Hoc Wireless Network (Scott Huang, DavidMacCallum, 2005.
S. Chang, M. Dworkin, Workshop Report, The First Cryptographic Hash Workshop, Report prepared, NIST 2005.
S.Vaudenay “A Classical Introduction to Cryptography Applications for Communications Security” Springer, 2006.
E. Biham, R. Chen, A. Joux, P. Carribault, W. Jalby and C. Lemuet. “Collisions in SHA-0 and Reduced SHA-1- In Advances in Cryptology” – Eurocrypt’05, Springer-Verlag, 2005.
IEEE 802.11 standard, “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,” IEEE Std,June 1999.
C. Rama Krishna, Saswat Chakrabarti, and Debasish Dutta, “A modified backoff algorithm for IEEE 802.11 DCF based MAC protocol in a Mobile Ad-Hoc Network”, TENCON 2004.
Yunli Chen, Qing-An Zeng, Dharma P. Agrawal, “Performance analysis and enhancement for IEEE 802.11 MAC protocol”, ICT2003. 10th International Conference on Telecommunications, 2003, Volume 1, 23 Feb. - 1 March 2003.
Broadcast in Ad Hoc Networks, ustin Lipman, Hai Liu, and Ivan Stojmenovic, 2009.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.