Beruflich Dokumente
Kultur Dokumente
discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/299849031
CITATIONS READS
0 6
5 authors, including:
Some of the authors of this publication are also working on these related projects:
Approaches for Classifying Languages into Tonal and Non-Tonal Categories View project
All content following this page was uploaded by Biplav Choudhury on 27 July 2016.
Abstract—In this paper, a new simulation tool is described radios collaborate to create their own network. When a user
which is used to present a decentralized approach on Mobile turns on his radio, that radio follows a protocol to announce
Ad Hoc Networks. The simulation is developed in Matlab using its own existence and to discover other radios. This approach
a decentralizing algorithm. The paper includes a distributed to networking is necessary for tactical networks that cannot
algorithm for adaptive movement of nodes in a MANET (Mobile rely on infrastructure, such as those used by military and
Ad hoc Network) to maintain the overall topology of the network.
The proposed algorithm assumes the presence of a GPS receiver
disaster relief organizations [2], [5], [6]. It is also appropriate
in each node so that every node is aware of the position of for sensor networks and inter-vehicular networks. MANETs
every other node. A node measures the relative position and present many challenges to networking protocols. In the ab-
velocity of its neighbours and checks whether a certain critical sence of centralised control by base stations and access points,
condition is satisfied or not. If the condition is satisfied, it keeps protocols must provide distributed solutions. The mobility of
its position unchanged; otherwise a rush call is made to that nodes causes those solutions to be fleeting, therefore inter-radio
node by its nearest neighbour to get it back within the range. communications for network maintenance persists throughout
The overall advantage here is that our new tool doesn’t involve the lifetime of the network. This is not more important than
any co-ordinator which significantly reduces the overhead on the routing protocols that track network topology. The plethora
network. The simulation of the algorithm has been carried out on of routing protocols proposed for MANET attests to the
a few synthetically generated network scenarios and the results
thus obtained show the effectiveness of the proposed algorithm.
challenge of this task. There is a direct correlation between
the effectiveness of a protocol to track topology and the
Keywords: MANET, Topology Management, Distributed Algorithm quantity of administrative traffic and this quantity increases
when either the size or volatility of the network increases.
However, wireless networks are capacity constrained.
I. I NTRODUCTION
III. P ROBLEM D EFINITION
Mobile Ad-hoc Networks (MANETs) are wireless net-
works consisting of mobile nodes that communicate on-the- The aim is to provide node movement in a decentralized
move without base stations [1]. Nodes in these networks manner, where there is no involvement of a leading coordina-
generate both user and application traffic and carry out network tor. The network movement should begin from a place, where
control and routing protocols. Rapidly changing connectivity, all nodes are in position and are ready to go in a random
network partitions, higher error rates, collision, interference, manner to the destination. Assumptions of the problem are
bandwidth and power constraints together pose new problems pointed below:
in network control, particularly in the design of higher level
protocols such as routing and in implementing applications • Four nodes are considered in the program keeping in
with Quality of Service requirements [2]. The simulation focus that the same algorithm is valid for more nodes
tool, Decentralized Hop Propagation Coordinator Independent too.
Algorithm provides node movement in a decentralized manner.
There is no need of any coordinator to call the nodes which are
• There is no coordinator considered in the algorithm.
going out of range. This paper is started with the description of
Each node has the ability to communicate to its
brief background of an ad hoc network and the motivation for
neighbours. This makes the network decentralized.
using decentralized approach. After that, the whole algorithm
is described, which involves calling of nodes without coordi-
nator. Finally, the stimulation results confirm the validity and • It is also assumed that the nodes present in the
proof of the algorithm in the network. network move in random directions but as a whole
they move towards a destination.
II. BACKGROUND
Mobile ad hoc networks (MANETs) are wireless networks • The calling mechanism used in the algorithm is such
without infrastructure [3], [4]. Rather than connecting to a that, the nodes get a call to come to range whenever
base station, as in wireless telephony or an access point, user they are out of the range of their neighbours. In the
Fig. 1. Node positions for case 1 Fig. 2. Node positions for case 2
program, a centroid is considered to be the point will call up other nodes which are out of range. The
where a node is called which is going out of range. caller sends a Rush Message to the receiver. Assume
This makes the node communicable to other nodes that Node A is called; then the distance between
present in the network. Node A (Red) and Node C (Navy Blue) increases
which makes Node D out of range. So the node that
is closer to Node D sends a Rush Message to Node
• Centroid is calculated by taking individual mean of
D, and here it is Node A which sends the message.
X Coordinates and Y Coordinates (As the network is
not geometrical). Here as shown in Fig. 1 the one with
X Mark is the centroid while others are nodes in the
network. • After the first step the communication between all four
nodes is possible. Now, the nodes start moving in a
IV. A LGORITHM I MPLEMENTATION AND E XPLANATION random fashion. The random movement is followed by
a probability function that is introduced in the program
Given below are the steps followed by the network to in Matlab. It is assumed that the whole network moves
move towards the destination. Considering all the introduced towards Y direction so there should be increase in
assumptions we follow the steps given below: movement of nodes mostly towards the Y rather than
X. Movement of X is followed by
• Initially, four nodes are randomly placed at 10 X = X + Random(15; 15) (1)
percent closer to X coordinate, and Y coordinate
has a maximum value of 1500 from which random This random function obeys uniform distribution in
coordinate value is allocated for each node in Y. This the program. So, it gives them freedom to move in X
provides the initial random distribution of nodes. The direction. Similarly for Y direction,
network distribution comes out to be as Fig.2 where
X mark in the figure is the centroid of the network. Y = Y + Random(4; 4) (2)
After going through the figure it is found that either
pairwise Node A and Node C are out of range or This function makes the nodes move in upward
node pair, Node B and Node D are out of range . So Y - direction. This random function is unique for
if communication exists between Node A and Node each node. Hence the movement algorithm is totally
D (look at Red and Yellow in the Fig. 2), either Node randomized.
A is called by Node D or vice-versa to the centroid
marked by X. In case of more nodes, majority nodes
978-1-4799-8553-1/15/$31.00 © 2015 IEEE
Proceedings of 2015 Global Conference on Communication Technologies(GCCT 2015)
R EFERENCES
[1] C. S. R. Murthy and B. Manoj, Ad hoc wireless networks: Architectures
and protocols. Pearson education, 2004.
[2] S. Samanta, S. Ray, S. SenGupta, and M. Naskar, “A novel algorithm
for managing network configuration,” in Asian International Mobile
Computing Conference, 2006, pp. 04–07.
[3] T. S. Rappaport et al., Wireless communications: principles and practice.
prentice hall PTR New Jersey, 1996, vol. 2.
[4] E. M. Royer and C.-K. Toh, “A review of current routing protocols for ad
hoc mobile wireless networks,” Personal Communications, IEEE, vol. 6,
no. 2, pp. 46–55, 1999.
[5] K. Kim, Y. Cai, and W. Tavanapong, “Sharing location dependent
experiences in manet,” in Mobile Data Management, 2006. MDM 2006.
7th International Conference on. IEEE, 2006, pp. 69–69.
Fig. 7. Distance vs Critical Distance for Node D
[6] J. Liu, D. Sacchetti, F. Sailhan, and V. Issarny, “Group management
TABLE I. C ALLING R ESULT BASED ON S IMULATION for mobile ad hoc networks: design, implementation and experiment,”
in Proceedings of the 6th international conference on Mobile data
B calls D A calls D management. ACM, 2005, pp. 192–199.
B calls D C calls A
A calls D D calls B
D calls A C calls B
B calls D B calls A
D calls A C calls D
C calls B D calls A
A calls B C calls B
A calls B C calls B
C calls D A calls D
C calls A B calls A
B calls D B calls D
D calls B A calls D
B calls A B calls A
C calls D B calls D
A calls D A calls B
D calls A C calls D
A calls B D calls A
D calls B C calls B
C calls A A calls D
D calls B A calls D
B calls D B calls A
B calls D B calls A
B calls A A calls B
C calls B D calls A
A calls D C calls B
C calls A C calls B
VI. C ONCLUSION
Going through other decentralized network approach algo-
rithms, it is found that the calling mechanism is not appropriate
if the front node which goes out of the network is allowed to
stop and wait for other nodes to approach there. This problem
is totally eliminated in the proposed algorithm. Also, when the
number of nodes increases, the complexity depends only on the