Sie sind auf Seite 1von 5

See

discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/299849031

Decentralized topology management on mobile


ad hoc networks

Conference Paper · April 2015


DOI: 10.1109/GCCT.2015.7342635

CITATIONS READS

0 6

5 authors, including:

Jishan Mehedi Biplav Choudhury


National Institute of Technology, Silchar National Institute of Technology, Silchar
15 PUBLICATIONS 26 CITATIONS 6 PUBLICATIONS 15 CITATIONS

SEE PROFILE SEE PROFILE

Tameem Salman Choudhury Wasim Arif


Indian Institute of Technology Guwahati National Institute of Technology, Silchar
6 PUBLICATIONS 9 CITATIONS 17 PUBLICATIONS 18 CITATIONS

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Approaches for Classifying Languages into Tonal and Non-Tonal Categories View project

Spectrum handoff analysis in Cognitive Radio Networks View project

All content following this page was uploaded by Biplav Choudhury on 27 July 2016.

The user has requested enhancement of the downloaded file.


Proceedings of 2015 Global Conference on Communication Technologies(GCCT 2015)

Decentralized Topology Management on Mobile Ad


hoc Networks

Aniket Pramanik1 , Biplav Choudhury2 , Tameem S. Choudhury3 , Wasim Arif4 , J. Mehedi5


Department of Electronics and Communication Engineering
National Institute of Technology, Silchar
Silchar, Assam-788010, India
aniketpramanik@yahoo.co.in1 , biplav93@gmail.com2 , salmantameem360@gmail.com3 , arif.ece.nits@gmail.com4 ,
j.mehedi@gmail.com5

Abstract—In this paper, a new simulation tool is described radios collaborate to create their own network. When a user
which is used to present a decentralized approach on Mobile turns on his radio, that radio follows a protocol to announce
Ad Hoc Networks. The simulation is developed in Matlab using its own existence and to discover other radios. This approach
a decentralizing algorithm. The paper includes a distributed to networking is necessary for tactical networks that cannot
algorithm for adaptive movement of nodes in a MANET (Mobile rely on infrastructure, such as those used by military and
Ad hoc Network) to maintain the overall topology of the network.
The proposed algorithm assumes the presence of a GPS receiver
disaster relief organizations [2], [5], [6]. It is also appropriate
in each node so that every node is aware of the position of for sensor networks and inter-vehicular networks. MANETs
every other node. A node measures the relative position and present many challenges to networking protocols. In the ab-
velocity of its neighbours and checks whether a certain critical sence of centralised control by base stations and access points,
condition is satisfied or not. If the condition is satisfied, it keeps protocols must provide distributed solutions. The mobility of
its position unchanged; otherwise a rush call is made to that nodes causes those solutions to be fleeting, therefore inter-radio
node by its nearest neighbour to get it back within the range. communications for network maintenance persists throughout
The overall advantage here is that our new tool doesn’t involve the lifetime of the network. This is not more important than
any co-ordinator which significantly reduces the overhead on the routing protocols that track network topology. The plethora
network. The simulation of the algorithm has been carried out on of routing protocols proposed for MANET attests to the
a few synthetically generated network scenarios and the results
thus obtained show the effectiveness of the proposed algorithm.
challenge of this task. There is a direct correlation between
the effectiveness of a protocol to track topology and the
Keywords: MANET, Topology Management, Distributed Algorithm quantity of administrative traffic and this quantity increases
when either the size or volatility of the network increases.
However, wireless networks are capacity constrained.
I. I NTRODUCTION
III. P ROBLEM D EFINITION
Mobile Ad-hoc Networks (MANETs) are wireless net-
works consisting of mobile nodes that communicate on-the- The aim is to provide node movement in a decentralized
move without base stations [1]. Nodes in these networks manner, where there is no involvement of a leading coordina-
generate both user and application traffic and carry out network tor. The network movement should begin from a place, where
control and routing protocols. Rapidly changing connectivity, all nodes are in position and are ready to go in a random
network partitions, higher error rates, collision, interference, manner to the destination. Assumptions of the problem are
bandwidth and power constraints together pose new problems pointed below:
in network control, particularly in the design of higher level
protocols such as routing and in implementing applications • Four nodes are considered in the program keeping in
with Quality of Service requirements [2]. The simulation focus that the same algorithm is valid for more nodes
tool, Decentralized Hop Propagation Coordinator Independent too.
Algorithm provides node movement in a decentralized manner.
There is no need of any coordinator to call the nodes which are
• There is no coordinator considered in the algorithm.
going out of range. This paper is started with the description of
Each node has the ability to communicate to its
brief background of an ad hoc network and the motivation for
neighbours. This makes the network decentralized.
using decentralized approach. After that, the whole algorithm
is described, which involves calling of nodes without coordi-
nator. Finally, the stimulation results confirm the validity and • It is also assumed that the nodes present in the
proof of the algorithm in the network. network move in random directions but as a whole
they move towards a destination.
II. BACKGROUND
Mobile ad hoc networks (MANETs) are wireless networks • The calling mechanism used in the algorithm is such
without infrastructure [3], [4]. Rather than connecting to a that, the nodes get a call to come to range whenever
base station, as in wireless telephony or an access point, user they are out of the range of their neighbours. In the

978-1-4799-8553-1/15/$31.00 © 2015 IEEE 


Proceedings of 2015 Global Conference on Communication Technologies(GCCT 2015)

Fig. 1. Node positions for case 1 Fig. 2. Node positions for case 2

program, a centroid is considered to be the point will call up other nodes which are out of range. The
where a node is called which is going out of range. caller sends a Rush Message to the receiver. Assume
This makes the node communicable to other nodes that Node A is called; then the distance between
present in the network. Node A (Red) and Node C (Navy Blue) increases
which makes Node D out of range. So the node that
is closer to Node D sends a Rush Message to Node
• Centroid is calculated by taking individual mean of
D, and here it is Node A which sends the message.
X Coordinates and Y Coordinates (As the network is
not geometrical). Here as shown in Fig. 1 the one with
X Mark is the centroid while others are nodes in the
network. • After the first step the communication between all four
nodes is possible. Now, the nodes start moving in a
IV. A LGORITHM I MPLEMENTATION AND E XPLANATION random fashion. The random movement is followed by
a probability function that is introduced in the program
Given below are the steps followed by the network to in Matlab. It is assumed that the whole network moves
move towards the destination. Considering all the introduced towards Y direction so there should be increase in
assumptions we follow the steps given below: movement of nodes mostly towards the Y rather than
X. Movement of X is followed by
• Initially, four nodes are randomly placed at 10 X = X + Random(15; 15) (1)
percent closer to X coordinate, and Y coordinate
has a maximum value of 1500 from which random This random function obeys uniform distribution in
coordinate value is allocated for each node in Y. This the program. So, it gives them freedom to move in X
provides the initial random distribution of nodes. The direction. Similarly for Y direction,
network distribution comes out to be as Fig.2 where
X mark in the figure is the centroid of the network. Y = Y + Random(4; 4) (2)
After going through the figure it is found that either
pairwise Node A and Node C are out of range or This function makes the nodes move in upward
node pair, Node B and Node D are out of range . So Y - direction. This random function is unique for
if communication exists between Node A and Node each node. Hence the movement algorithm is totally
D (look at Red and Yellow in the Fig. 2), either Node randomized.
A is called by Node D or vice-versa to the centroid
marked by X. In case of more nodes, majority nodes


978-1-4799-8553-1/15/$31.00 © 2015 IEEE
Proceedings of 2015 Global Conference on Communication Technologies(GCCT 2015)

Fig. 5. Distance vs Critical Distance for Node B

Fig. 3. Node positions for case 3

Fig. 6. Distance vs Critical Distance for Node C

V. S IMULATIONS AND R ESULTS


The four different plots obtained as a result of the sim-
ulation are shown in Fig. 4,Fig. 5, Fig. 6 and Fig. 7 where
Fig. 4. Distance vs Critical Distance for Node A
each graph is plotted as a distance of other nodes from
itself. For example in the first plot, Fig. 4, distance of other
nodes from node A as measured during the simulation are
• After these nodes start moving with different plotted. In the figure, the Dark Blue line represents the distance
velocities, there may be possibility that these get out between node A and node D. Node D initially starts much
of range. As shown, the Node C (Navy Blue) gets closer to node A at time=0 second, but at time=500 seconds
out of range. The nearest to it is Node B which sends (approximately), it crosses the critical distance (marked by a
a message to Node C to get in range. Sky Blue line) which is considered as the maximum limit
to maintain the network’s connectivity. So, it gets a call
from Node B as shown in the calling result on Table 1, to
come within the neighbourhood following which the distance
• In this way, the nodes continue their movement between node A and D decreases as evident from the Fig.
towards the destination without getting diverted from 4. Similarly, Fig. 5 is for Node B. Here too, when the node
the network. Similarly, if the same algorithm is D, represented by Dark Blue, crosses the critical distance at
considered for n number of nodes, the result will be time=400 seconds(approximately), node A calls it and node D
identical. immediately comes within the neighbourhood. It is followed

978-1-4799-8553-1/15/$31.00 © 2015 IEEE 


Proceedings of 2015 Global Conference on Communication Technologies(GCCT 2015)

number of nodes surrounding a single node. The movement of


nodes implemented, follows Brownian motion and the whole
movement was plotted. It validates the algorithm on node
movement.

R EFERENCES
[1] C. S. R. Murthy and B. Manoj, Ad hoc wireless networks: Architectures
and protocols. Pearson education, 2004.
[2] S. Samanta, S. Ray, S. SenGupta, and M. Naskar, “A novel algorithm
for managing network configuration,” in Asian International Mobile
Computing Conference, 2006, pp. 04–07.
[3] T. S. Rappaport et al., Wireless communications: principles and practice.
prentice hall PTR New Jersey, 1996, vol. 2.
[4] E. M. Royer and C.-K. Toh, “A review of current routing protocols for ad
hoc mobile wireless networks,” Personal Communications, IEEE, vol. 6,
no. 2, pp. 46–55, 1999.
[5] K. Kim, Y. Cai, and W. Tavanapong, “Sharing location dependent
experiences in manet,” in Mobile Data Management, 2006. MDM 2006.
7th International Conference on. IEEE, 2006, pp. 69–69.
Fig. 7. Distance vs Critical Distance for Node D
[6] J. Liu, D. Sacchetti, F. Sailhan, and V. Issarny, “Group management
TABLE I. C ALLING R ESULT BASED ON S IMULATION for mobile ad hoc networks: design, implementation and experiment,”
in Proceedings of the 6th international conference on Mobile data
B calls D A calls D management. ACM, 2005, pp. 192–199.
B calls D C calls A
A calls D D calls B
D calls A C calls B
B calls D B calls A
D calls A C calls D
C calls B D calls A
A calls B C calls B
A calls B C calls B
C calls D A calls D
C calls A B calls A
B calls D B calls D
D calls B A calls D
B calls A B calls A
C calls D B calls D
A calls D A calls B
D calls A C calls D
A calls B D calls A
D calls B C calls B
C calls A A calls D
D calls B A calls D
B calls D B calls A
B calls D B calls A
B calls A A calls B
C calls B D calls A
A calls D C calls B
C calls A C calls B

by third and fourth plot for Node C and Node D respectively.


Whenever a node crosses the critical distance (assumed to
be 100 units throughout the simulation), it gets a call from
the node that is nearest to it. After getting the call, the node
crossing the critical distance gets within the neighbourhood
and in this way, the whole network maintains its connectivity
.The critical distance line is marked as a Sky Blue coloured
straight line (at x=100 units) on each of the plots. The calling
is done only when the node(s) are out of range, and these calls
are based on the same simulation result as shown.

VI. C ONCLUSION
Going through other decentralized network approach algo-
rithms, it is found that the calling mechanism is not appropriate
if the front node which goes out of the network is allowed to
stop and wait for other nodes to approach there. This problem
is totally eliminated in the proposed algorithm. Also, when the
number of nodes increases, the complexity depends only on the

978-1-4799-8553-1/15/$31.00 © 2015 IEEE 

View publication stats

Das könnte Ihnen auch gefallen