A limited flooding scheme for mobile ad hoc networks

Tzu Chiang Chiang, Po Yi Wu, Yueh Min Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Broadcasting is an elementary operation to support many applications in a mobile ad hoc network. However, naively broadcasting by flooding may cause serious redundancy, contention, and collision in the network, which we refer to as the broadcast storm problem. In this paper we propose a limited flooding scheme which takes the advantage of the cluster structure and which only requires clusterheads, initial nodes and selected gateways to forward the broadcast packets. Our approach reduces control overhead of ad hoc routing protocols significantly and introduces many benefits, including efficient flooding, density adaptation and mobility adaptation. As a result, our approach enables routing scheme in a dense and high mobility mobile ad hoc networks. Simulation shows that our approach outperforms conventional AODV in the dense network, and overmatches some existing cluster schemes such as Lowest-ID or Highest-Connectivity Cluster Algorithm in the aspect of mobility adaptability.

Original languageEnglish
Title of host publication2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2005
Pages473-478
Number of pages6
DOIs
Publication statusPublished - 2005 Dec 1
Event2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2005 - Montreal, QC, Canada
Duration: 2005 Aug 222005 Aug 24

Publication series

Name2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2005
Volume3

Other

Other2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2005
CountryCanada
CityMontreal, QC
Period05-08-2205-08-24

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint Dive into the research topics of 'A limited flooding scheme for mobile ad hoc networks'. Together they form a unique fingerprint.

Cite this