Escolar Documentos
Profissional Documentos
Cultura Documentos
ad hoc networks
Abstract
A neighbor knowledge-based broadcast scheme is proposed to reduce the latency for wireless ad hoc networks, yet
keeping the overhead at a reasonably low level and fulfilling the reliability. In the scheme, few Hello messages are inter-
changed to collect one-hop neighbor information. The collected information is used to calculate the neighbor density,
the ratio, and the number of one-hop uncovered neighbors, upon which the rebroadcast probability and delay are
adjusted adaptively. The way that the rebroadcast probability and delay are defined in neighbor knowledge-based broad-
cast scheme reduces the transmission overhead and restrains the traffic aggregation effectively. Next, a velocity-based
data distribution mechanism is proposed and extended to neighbor knowledge-based broadcast scheme to further
reduce the latency, forming neighbor knowledge and velocity-based broadcast scheme. It is stipulated that few higher-
velocity nodes are employed with bigger probability to rebroadcast the incoming message. The performance of the
schemes is evaluated by the simulation under diverse network configurations. The results show that they outperform
the existing broadcast schemes in overhead and especially in average end-to-end delay. Compared with flooding, they
reduce the overhead by 88.4% and the average end-to-end delay by 88.9% at most.
Keywords
Wireless ad hoc networks, rebroadcast probability, rebroadcast delay, normalized broadcast overhead, average end-to-
end delay, packet delivery ratio
Creative Commons CC-BY: This article is distributed under the terms of the Creative Commons Attribution 4.0 License
(http://www.creativecommons.org/licenses/by/4.0/) which permits any use, reproduction and distribution of the work without
further permission provided the original work is attributed as specified on the SAGE and Open Access pages (http://www.uk.sagepub.com/aboutus/
openaccess.htm).
2 International Journal of Distributed Sensor Networks
Besides blind flooding,3,4 a basic classification of use topological information to build a global forwarding
broadcast schemes divides them into two main categories: structure to reduce broadcast redundancy. They can be
probabilistic broadcast scheme and deterministic broad- proven to not degrade reachability compared with flood-
cast scheme.1,5,6 The probabilistic broadcast scheme ing and probabilistic schemes, provided communications
includes probability-based schemes,2,7–11 counter-based are perfectly reliable. However, they do not tolerate fre-
schemes,12–16 distance-based schemes,17–23 and location- quent topological changes well, because maintaining the
based schemes.24–27 forwarding structure in dynamic environment brings
Probabilistic schemes do not need any information excessive control overhead. In high mobile environment,
from the whole network and need not maintain a glo- deterministic schemes could not provide higher reachabil-
bal distributing topology, but, rather, start of building ity than probabilistic schemes do.
a network with each broadcast domain. In probabilistic First, we proposed a neighbor knowledge-based
schemes, all nodes are allowed to participate in the broadcast (NKB) scheme for wireless ad hoc networks.
broadcast process and forward the received broadcast In NKB scheme, few Hello messages are interchanged
message with some probability. Therefore, the traffic between one-hop neighbors to collect the neighbor infor-
load would not aggregate on a part of nodes. mation. The rebroadcast probability and the rebroadcast
Furthermore, the interest in probabilistic broadcasting delay on each node are adjusted adaptively according to
schemes is due to their inherent low transmission over- the obtained neighbor knowledge including the neighbor
head, low processing complexity, low delay, and high density, the ratio, and the number of one-hop uncovered
tolerance to frequent and rapid topological changes. neighbors. Second, a velocity-based data distribution
Balancing these benefits, though, is the disadvantage of mechanism is proposed and extended to NKB scheme to
inability to guarantee full network coverage and, still, reduce the latency further, forming neighbor knowledge
the presence of some redundant transmissions. and velocity-based broadcast (NKVB) scheme. In NKVB
Deterministic broadcast scheme includes tree-based scheme, few higher-velocity nodes are employed with big-
scheme,28–31 connected dominating set (CDS), and ger probability to forward the broadcast message, which
neighbor elimination-based scheme.32–41 Tree-based makes NKVB different from NKB scheme, and they do
schemes construct a routing tree on which broadcast accelerate the data transmission.
messages are forwarded. In tree-based scheme broad- The rest of the article is organized as follows. Section
cast redundancy minimization scheduling (BRMS),31 a ‘‘Related work’’ presents a brief review of broadcast
set of forwarding nodes are found first to minimize the schemes. Section ‘‘NKB scheme’’ presents NKB scheme.
number of broadcast transmissions. Then, the scheme The velocity-based data distribution mechanism and
constructs a forest of sub-trees based on the relation- NKVB scheme are presented in section ‘‘NKVB scheme.’’
ship between each forwarding node and its correspond- Performance evaluation of NKB and NKVB schemes by
ing receivers. Finally, a broadcast tree is constructed by simulations in the context of wireless ad hoc networks is
connecting all sub-trees with a minimum number of presented in section ‘‘Performance evaluation.’’ Finally,
connectors. CDS and neighbor elimination-based section ‘‘Conclusion’’ concludes the article.
schemes maintain state on the neighborhood of each
node, via ‘‘Hello’’ packets. Upon the collected neighbor
information, each node decides its role (forward node Related work
or non-forward node) in a specific broadcasting. For
example, in local broadcast algorithms (LBA)38 pro- Probabilistic broadcast schemes only need to maintain
posed by Majid Khabbazian, every broadcasting node rough local topology knowledge, which makes it more
selects at most one of its neighbors to rebroadcast the insensitive to node mobility than deterministic broad-
received message. A node has to rebroadcast the cast schemes. Probability-based schemes2,8 use some
received message if it is selected to do. Other nodes that basic understanding of the network topology to assign
are not selected have to decide whether to rebroadcast a constant forwarding probability to each node to
upon a self-pruning condition called the coverage con- rebroadcast. The fixed probability schemes do not need
dition. To evaluate the coverage condition, every node to collect the beacon information, including density,
u maintains a list Listucov (m) for every unique message speed, and energy, and so on, upon which the optimal
m. When node u receives a fresh message m for the first rebroadcast probability is calculated in the adaptive
time, Listucov (m) is initialized and filled with the IDs of probability schemes.1 GOSSIP1( p)8 is a pure gossip
all neighbors of u. Listucov (m) is updated before the scheme with the fixed rebroadcast probability. When a
rebroadcast delay ends, namely, the IDs of neighbors node first receives a route request, with probability p, it
covered by m are being removed from Listucov (m) during broadcasts the request to its neighbors and with prob-
the rebroadcast delay. Finally, if Listucov (m) is not ability 1 – p, it discards the request. If the node receives
empty, u will rebroadcast m and select one node still in the same route request again, it is discarded. The fixed
the list to be the next forwarder. Deterministic schemes probability schemes cost less control overhead. But the
Lu and Dong 3
constant rebroadcast probability makes the schemes stamp in advanced stamping scheme. When node r
function not so well in dynamic and asymmetrical net- receives a broadcast message m for the first time, it uses
work environment. In reliable gossip-based broadcast the stamp of m to check whether all its neighbors N(r)
protocol (RGB)7 and velocity and neighbor density- are already covered. If so, the rebroadcast is stopped;
based broadcast scheme (VDNB),11 the dynamic otherwise, node r appends id(r) and id(N(r)) to the
rebroadcast probability is calculated upon the immedi- stamp and schedules for rebroadcasting. Hybrid stamp-
ate number of neighbors of the node. Compared with ing utilizes two-hop neighbor information for pruning.
the fixed probability schemes, they are more suitable With hybrid stamping, each node further checks
for wireless ad hoc networks. whether some of its neighbors can also be reached by
In dynamic counter-based broadcasting scheme other nodes in the stamp. When node r receives a new
(DCB),15 the number of neighbors is used to determine message m, it checks whether its neighbors N(r) are all
whether the node is located within dense, medium distri- contained in the stamp of m first. For each neighbor n
bution or sparse regions and assign Cmin, Cmid, and Cmax not contained in the stamp, node r then tries to check
thresholds, respectively. Each node needs to wait for a whether a neighbor p in N(n) is in the stamp. If node p
random assessment delay. Within the delay, the number has a higher priority than node r, node r can assume
of copies of the message received by a node is compared node n will be covered by broadcasting from node p or
with Cmin, Cmid, and Cmax, and then the corresponding node with an even higher priority. If all uncovered
one of four different rebroadcast probabilities is assigned neighbors in N(r) will be covered by node with higher
to the node. In Humoud et al.,13 only two thresholds, priority, the rebroadcast is stopped by node r; other-
unlike in Yassein et al.,15 are used to evaluate the node wise, node r appends id(r) and id(N(r)) to the stamp
distribution and the rebroadcast probability is rougher. and schedules for rebroadcasting.
In Tseng et al.,12 the decision to forward the broadcast In neighbor coverage-based probabilistic rebroad-
message is determined by the function C(n) where n is cast (NCPR),27 the proportion of the common neigh-
the number of neighbors of the forwarding node. bors between node ni and its upstream node s uniquely
In distance-based broadcast scheme,17 whether a determines the rebroadcast delay Td(ni) of node ni, and
message is rebroadcasted or not is up to the relative dis- the rebroadcast delay of node ni is defined as follows
tance between the mobile node and the previous sender.
When a node receives a broadcast message from a jN (s) \ N (ni )j
neighbor node for the first time, its dmin is initialized Td (ni ) = MaxDelay 3 1 ð1Þ
jN (s)j
with the distance between them and the count is initia-
lized with 1. If dmin \ D (where D is the distance thresh- where MaxDelay is a small constant delay; N(s) and
old pre-defined), the node stops rebroadcasting. Else, N(ni) are the neighbor sets of node s and ni, respectively.
the node waits for a random number of slots, during the |.| is the number of elements in a set. In NCPR, another
waiting period, every time a copy of the broadcast mes- parameter, the connectivity factor, is defined to provide
sage is received, dmin and D are reassigned correspond- the node density adaptation. The connectivity factor
ingly. If dmin \ D, the node stops rebroadcasting. Else, Fc(ni) and the additional coverage ratio Ra(ni) of node
if the waiting time is expired, the node rebroadcasts the ni are defined as follows
received message. In distance and cooperation based
broadcast (DCBB),23 four neighbor nodes at most are NC
Fc (ni ) = ð2Þ
determined to forward broadcast packets based on the jN (ni )j
number of neighbors and the distance between neigh-
jU (ni )j
bors. The limited number of relay nodes is helpful to Ra (ni ) = ð3Þ
reduce the redundancy of the scheme. DCBB is applica- jN (ni )j
ble to densely distributed network environment. where Nc = 5.1774 log n, and n is the number of nodes
In location-based broadcast schemes,26,27 the in the network. |U(ni)| is the number of uncovered
rebroadcast probability of a node is in positive correla- neighbors of node ni. By combining the additional cov-
tion with its additional coverage ratio. In order to fig- erage ratio and the connectivity factor, the rebroadcast
ure out an accurate additional coverage ratio, the probability of node ni is calculated as follows
rebroadcast delay is set without exception on each node
to collect enough neighbor coverage information. In Pre (ni ) = Fc (ni ) Ra (ni ) ð4Þ
scalable broadcast algorithm (SBA),26 three node-
stamping broadcast algorithms, named basic stamping, The proposed rebroadcast delay is one of main con-
advanced stamping, and hybrid stamping, are pro- tributions of NCPR. It determines the rebroadcast
posed. Each node in advanced stamping algorithm col- order, and then the more accurate additional coverage
lects its one-hop neighbor information. IDs of each ratio is obtained.27 We found that, in NCPR, more
forwarding node and its neighbors are appended to neighbors a node has, more likely it is to rebroadcast
4 International Journal of Distributed Sensor Networks
jU (ni )j
Ru (ni ) = ð7Þ
jN (ni )j 1
where |.| is the number of elements in a set and
|N(ni)| – 1 is the number of node ni’s neighbors exclud-
ing the upstream node ns.
nj
If node ni has a big ratio of uncovered neighbors, it is
reasonable for ni to rebroadcast the received message ns ni U(n )
with a big probability to cover more fresh nodes. On i
the contrary, if node ni has a small ratio of uncovered
neighbors, the smallest possible rebroadcast probability
should be adopted by ni to reduce redundancy and col-
lisions without hurting the packet delivery ratio. Figure 2. Leaf node and secondary leaf node.
jN (ni )j
d(ni ) = ð8Þ Rebroadcast delay
NC
jU (ni )j The definition of the rebroadcast delay is critical for
Fu (ni ) = ð9Þ the scheme to achieve optimal performance. The com-
NC
mon neighbor ratio of node ns and node ni, denoted by
Rc(nsi), and the absolute number of uncovered neigh-
Rebroadcast probability based on neighbor knowledge.
bors influence the rebroadcast delay in a different way.
Combining the ratio of uncovered neighbors, the abso-
Rc(nsi) is defined as follows
lute number of uncovered neighbor factor, and the den-
sity factor, we have node ni’s rebroadcast probability jN (ns ) \ N (ni )j
pk(ni) based on its neighbor knowledge Rc (nsi ) = ð12Þ
jN (ns )j 1
b Ru (ni ) + (1 b) Fu (ni ) where |N(ns)| – 1 is the number of node ns’s neighbors
pk (ni ) = ð10Þ
d(ni ) excluding node ni.
6 International Journal of Distributed Sensor Networks
where D is a small constant delay. When there is no The first two points are obviously reasonable. We
common neighbor between node ni and ns or ni is a sec- present the proof for the rationality of the third point
ondary leaf node, Rd(ni) and Td(ni) are set to 0. If Rd(ni) in the following.
is smaller than 0, we set Rd(ni) to 0.
Next, the details that the rebroadcast delay is defined Proof
are explained. Suppose node ni receives a fresh broad- Ru (ni ) = x
cast message from its upstream node ns, their common Ru (nj ) = y
neighbors receive the message too. 8
>
> jU (ni )j
>
< jN (n )j 1 = x
i
1. If node ni has more uncovered neighbors, )
namely a bigger Fu(ni), it should rebroadcast the >
> jU (nj )j
>
: =y ð15Þ
received message with a smaller rebroadcast jN (nj )j 1
8
delay to make the message cover more fresh > jU (ni )j
>
< jN (ni )j = 1 +
nodes as soon as possible. In this condition, the x
smaller delay is helpful to accelerate the mes- )
>
> jU (n j )j
sage propagation and reduce the average end- : jN (nj )j = 1 +
y
to-end delay.
2. If N(ns) \ N(ni) = F, namely there is no com- Note that
mon neighbor between node ns and node ni,
jN (ni )j jU (ni )j = jN (ns ) \ N (ni )j
node ni rebroadcasts the message without delay ð16Þ
jN (nj )j jU (nj )j = jN (ns ) \ N (nj )j
(Td(ni) = 0) will not incur the collision. If
9 nj , N (nj ) = fni g, namely node ni is a secondary If Rc(nsi) . Rc(nsj), then
leaf node, node ni has to rebroadcast the mes- jN (ns ) \ N (ni )j jN (ns ) \ N (nj )j
sage for the boundary node nj, and that node ni .
jN (ns )j 1 jN (ns )j 1 ð17Þ
rebroadcasts the message without delay
(Td(ni) = 0) is helpful to accelerate the message ) jN (ns ) \ N (ni )j . jN (ns ) \ N (nj )j
propagation. Formula (18) can be derived from formulas (16)
3. If bigger the common neighbor ratio of node ns and (17).
and ni is, shorter the rebroadcast delay of node
ni should be. Suppose node ni and node nj are N (ni )j jU (ni )j . jN (nj )j jU (nj )j ð18Þ
neighbors of the upstream node ns. If the com- Formula (19) can be derived from formulas (15)
mon neighbor ratio of node ns and node ni is and (18).
bigger than the common neighbor ratio of node
ns and node nj (Rc (nsi ).Rc (nsj )), node ni should jU (ni )j jU (nj )j
1+ jU (ni )j . 1 + jU (nj )j
rebroadcast the message earlier than node nj. x y
ð19Þ
Then, more nodes, namely these common neigh- 1 1
) 1 jU (ni )j . 1 jU (nj )j
bors between ns and ni, can update their own x y
uncovered neighbors set upon the received 8
neighbor list from node ni. Next, their rebroad- < Ru (ni ) Ru (nj )
>
cast probability will be lowered to reduce redun- Ru (ni ) = x
>
:
dant messages. If Rc (nsi ).Rc (nsj ) and Ru (nj ) = y
Ru (ni ) Ru (nj ), the rebroadcast by node ni
x\1, y\1 ð20Þ
within smaller delay will cover more additional )
fresh nodes in less time than by node nj. It is xy
helpful to improve the channel utilization and 1 1
) 0\ 1 1
reduce the average end-to-end delay. x y
Lu and Dong 7
Combining formulas (19) and (20), we draw the con- big challenge for most of existing broadcast schemes to
clusion as follows minimize the harm of node mobility. This section pro-
poses a velocity-based data distribution mechanism. It
jU (ni )j . jU (nj ) ð21Þ stipulates that few higher-velocity nodes should be
selected to rebroadcast the message with a big probabil-
ity without delay to accelerate the data propagation.
NKB algorithm description The mechanism is extended to NKB scheme to reduce
In NKB algorithm, the rebroadcast probability of node average end-to-end delay further, forming NKVB
ni is determined by its neighbor knowledge. The formal scheme.
description of NKB scheme is shown in the following.
The algorithm consists of three phases. In the first Velocity-based data distribution mechanism
phase, U(ni) is initialized. If U(ni) = F, node ni refuses
to rebroadcast the received message, else, Td(ni) is cal- Suppose node ni has ki neighbors, denoted by
culated. Next, if U(ni) 6¼ F, U(ni) is being updated fnj j(ni , nj ) 2 E, j = 1, 2, . . . , ki g, whose velocities are
before Td(ni) expires. Finally, when Td(ni) expires and denoted by vj ( j = 1, 2,., ki). The minimum and max-
U(ni) 6¼ F, pk(ni) is calculated and the message is imum velocity of them are denoted by vmin and vmax,
rebroadcasted with probability pk(ni). respectively
vmax = max(v1 , v2 , . . . , vj )
j = 1, 2, . . . , ki ð22Þ
NKVB scheme vmin = min(v1 , v2 , . . . , vj )
Several studies43 draw the conclusion that the mobility The arithmetic mean of these neighbors’ velocities v
increases the capacity of networks. However, it still is a and the standard deviation of their velocities s are cal-
culated respectively as follows
Algorithm 1. Neighbor knowledge-based broadcast algorithm. !
1 X ki
v = vj + vi ð23Þ
Definitions: ki + 1 j = 1
m: the received broadcast message.
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi !
Timer(ni, m, Td(ni)): timer of node ni for m message, initialized X ki qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
1
with the value of Td(ni). s= (vj v)2 + (vi v)2 ð24Þ
random(0, 1): a random function whose range is the interval ki + 1 j = 1
from 0 to 1.
1: While ni receives a fresh message m from ns do The velocity-based data distribution mechanism sti-
2: U(ni ) = N(ni ) ½N(ni ) \ N(ns ) fns g
pulates strictly that node ni is allowed to rebroadcast
3: if U(ni ) = F then
4: pk(ni) = 0 and return the received message with the probability pv(ni) only if
5: endif vi is bigger than (v + s). The rebroadcast probability
6: if N(ns ) \ N(ni ) = F or 9nj , N(nj ) = fni g then pv(ni) is defined by formula (25) as follows
7: Td(ni) = 0
8: else vi (v + s)
9: Td (ni ) = D3Rd (ni ) pv ð ni Þ = ð25Þ
10: Set a Timer(ni, m, Td(ni)) vmax (v + s)
11: endif
12: endwhile
The overhead incurred by these employed high-
13: while ni receives a duplicate m from nj before velocity nodes is very limited. Assume that the node
Timer(ni,m,Td(ni)) expires do velocity obeys uniform distribution between vmin and
14: Uðni Þ = Uðni Þ ½Uðni Þ \ N(nj ) fnj g vmax, the percentage PU of the nodes who take part in
15: if U(ni ) = F then computing the rebroadcast probability is 0.21 calcu-
16: pk(ni) = 0 and return
17: endif
lated by formula (27)
18: endwhile 8
19: While Timer(ni, m, Td(ni)) expires do > vmax + vmin
< vU =
20: if 9nj , N(nj ) = fni g then 2
rffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
ffi
21: pk(ni) = 1 2 ð26Þ
>
: s = (vmax vmin )
22: else U
23: pk (ni ) = min(1, (b:Ru (ni ) + (1 b):Fu (ni ))=d(ni ))
12
24: endif PU = 1 FU (vU + sU )
25: if random(0, 1) pk(ni) then
26: broadcast(m) and return vU + sU vmin
=1 ð27Þ
27: endif vmax vmin
28: endwhile
= 0:21
8 International Journal of Distributed Sensor Networks
Similarly, suppose the node velocity obeys normal Table 1. Simulation parameters.
distribution N(a, s2), the percentage PN of the nodes
who take part in computing the rebroadcast probability Simulation parameters Value
is 0.1587 calculated by formula (29) Mobility model RWM
Topology size 1000 3 1000 m2
vN = a Numbers of nodes 50, 100, 150, 200, 250, 300
ð28Þ Transmission range 250 m
sN = s
Bandwidth 2 Mbps
PN = 1 FN (vN + sN ) Traffic type CBR
CBR connection 10, 20, 30, 40, 50, 60
= 1 Fa, s (vN + sN ) Packet size 512 bytes
= 1 Fa, s (a + s) Packet rate 4 packets/s
Pause time 0s
(a + s) a ð29Þ Max mobility velocity (m/s) 0, 5, 10, 15, 20, 25
=1 F
s MAC protocol 802.11 DCF CSMA/CA
Hello interval 0.1 s
= 1 F(1) Constant delay (D) 0.01 s
= 0:1587 Fixed probability(Gossip1(p)) 0.65
Note that ultimately, only few of nodes, who take DCF: distributed coordination function.
part in computing the rebroadcast probability, are
really employed to rebroadcast the message, so the pro-
posed velocity-based data distribution mechanism We have used the following performance metrics for
incurs little overhead. It is also reconfirmed by the comparison purposes:
simulation result in section ‘‘Performance evaluation.’’
Normalized broadcast overhead: normalized
broadcast overhead indicates the normalized
NKVB algorithm description transmissions of the broadcast operation per
In order to collect the neighbor nodes’ velocity, a new node. It defines the ratio of the total transmis-
field vi, the velocity of node ni, needs to be added to sions, including the broadcast packets and extra
Hello message. In NKVB algorithm, the rebroadcast control packets to the broadcast packets per
probability of node ni is determined by both its velocity node. It is measured by bytes per broadcast byte
and its neighbor knowledge. The formal description of per node.
the NKVB algorithm is shown in the following. Average end-to-end delay: the average delay of
The algorithm consists of three phases. In the first successfully delivered broadcast packets from
phase, U(ni) is initialized. If U(ni) 6¼ F and vi .(v + s), source to destinations.
node ni broadcasts the message with probability pv(ni) Packet delivery ratio: the percentage of nodes
without delay. If the message is not broadcasted since received the broadcast message.
the random number does not fall in the rebroadcast
probability interval from 0 to pv(ni), Td(ni) is initialized. The simulation is divided to three parts, and in each
Next, if U(ni) 6¼ F, U(ni) is being updated before Td(ni) part, we evaluate the impact of one of the following fac-
expires. Finally, when Td(ni) expires and U(ni) 6¼ F, tors on the performance of broadcast schemes. In the
pk(ni) is calculated and the message is rebroadcasted simulation results, each data point represents the aver-
with probability pk(ni). age of 40 trials of experiments. The confidence level is
95%, and the confidence interval is shown as a vertical
bar in the figures:
Performance evaluation
In this section, NKB and NKVB schemes are com- Mobility velocity. The max mobility velocity of
pared with flooding,4 Gossip1(p),8 DCB,15 NCPR,27 nodes is modulated in range of 0–25 m/s to eval-
and LBA,38 by simulation way using the NS-2(v2.35)44 uate how the node mobility affects the perfor-
simulator. The IEEE 802.11 MAC with distributed mance of the schemes. In this part, the number
coordination function (DCF) is used as the MAC pro- of nodes and the number of CBR connections
tocol. The mobility model is based on the random are set fixedly to 200 and 50, respectively.
waypoint model (RWM) in a square of size Number of nodes. The number of nodes is modu-
1000 3 1000 m2. In the simulation of our schemes, lated in range of 50–300 in a fixed square to
the empirical value of b is set to 0.8. The rebroadcast evaluate how the node density affects the perfor-
probability p of Gossip1(p) is set to 0.65. The detailed mance of the schemes. In this part, the max
simulation parameters are listed in Table 1. mobility velocity of nodes and the number of
Lu and Dong 9
Definitions:
m: the received broadcast message.
Timer(ni, m, Td(ni)): timer of node ni for m message, initialized
with the value of Td(ni).
random(0, 1): a random function whose range is the interval
from 0 to 1.
1: While ni receives a fresh message m from ns do
2: U(ni ) = N(ni ) ½N(ni ) \ N(ns ) fns g
3: if U(ni ) = F then
4: p(ni) = 0 and return
5: endif
6: if vi . ðv + sÞ then
7: pv ðni Þ = (vi (v + s))=(vmax (v + s))
8: if random(0, 1) pv(ni) then
9: broadcast(m) and return
10: endif
11: endif
12: if N(ns ) \ N(ni ) = F or 9nj , N(nj ) = fni g then Figure 3. Mobility velocity versus normalized broadcast
13: Td(ni) = 0 overhead.
14: else
15: Td (ni ) = D3Rd (ni )
16: Set a Timer(ni, m, Td(ni)) overhead curves are almost flat due to the fixed
17: endif rebroadcast probabilities which are not affected by the
18: endwhile node mobility. The normalized broadcast overhead of
19: while ni receives a duplicate m from nj before
Timer(ni,m,Td(ni)) expires do the other schemes increases proportional to the node
20: Uðni Þ = Uðni Þ ½Uðni Þ \ N(nj ) fnj g mobility, namely, the node mobility has a negative
21: if U(ni ) = F then impact on the reduction of overhead. It is because the
22: p(ni) = 0 and return node mobility directly brings about more control pack-
23: endif
ets to repair the hurt communication link and to main-
24: endwhile
25: While Timer(ni, m, Td(ni)) expires do tain the changed network topology. Furthermore, the
26: if 9nj , N(nj ) = fni g then topological variation may incur some collisions fol-
27: pk(ni) = 1 lowed by the retransmissions. In some schemes, the
28: else node mobility as well gives rise to the imprecise neigh-
29: pk (ni ) = min(1, (b:Ru (ni ) + (1 b):Fu (ni ))=d(ni ))
30: endif
bor information collected and the unnecessary rebroad-
31: if random(0, 1) pk(ni) then casts. As shown in Figure 3, when the mobility velocity
32: broadcast(m) and return is bigger than 15 m/s, there is a significant increase in
33: endif the normalized broadcast overhead, especially for LBA
34: endwhile and NCPR schemes.
In LBA scheme, a node refuses to rebroadcast the
received message only if it learned that all of its neigh-
CBR connections are set fixedly to 15 m/s and bors have been covered. In fact, it is almost impossible
20, respectively. for each node to acquire the intact neighbor coverage
Number of CBR connections. The number of ran- knowledge in mobile environment. Then, many super-
domly chosen CBR connections is modulated in fluous rebroadcasts are executed, leading to some inci-
range of 10–60 with a fixed packet rate to evalu- dental collisions and retransmissions. Therefore, in
ate how the traffic load affects the performance LBA scheme, the redundant broadcast is the main
of the schemes. In this part, the max mobility composition of the normalized broadcast overhead. In
velocity of nodes and the number of nodes are mobile environment, DCB scheme tends to define a
set fixedly to 15 m/s and 200, respectively. rough threshold and count a wrong number of redupli-
cative packets received, which leads inevitably to the
redundant rebroadcasts and collisions. Compared with
Effects of node mobility LBA and DCB schemes, the normalized broadcast
Figure 3 shows that flooding and Gossip1(0.65) are overhead of NKB, NKVB, and NCPR schemes is
deserved a high normalized broadcast overhead. The affected more mildly by the node mobility since their
result is driven comprehensively by the high node den- rebroadcast probabilities do not rely on the precise
sity and their big rebroadcast probabilities. But their neighbor knowledge. Compared with Gossip1(0.65)
10 International Journal of Distributed Sensor Networks
Figure 4. Mobility velocity versus average end-to-end delay. Figure 5. Mobility velocity versus packet delivery ratio.
and coverage information are collected by Hello mes- 7. Wang G, Lu D, Jia W, et al. Reliable gossip-based
sage to calculate the rebroadcast parameters in near broadcast protocol in mobile ad hoc networks. In: Pro-
real-time at each node. To reduce the overhead of ceedings of the first international conference on mobile ad-
Hello message and upgrade the validity of neighbor hoc and sensor networks, Wuhan, China, 13–15 December
knowledge, piggybacking is used. One-hop neighbor 2005, pp.207–218. Berlin: Springer.
8. Haas ZJ, Halpern JY, Li L, et al. Gossip-based ad hoc
information collected keeps the control overhead at a
routing. IEEE ACM T Netw 2006; 14(3): 479–491.
low level. The flexible calculation of the rebroadcast 9. Slavik M and Mahgoub I. Stochastic broadcast for
probability and delay guarantees a low average end-to- VANET. In: 7th IEEE consumer communications and net-
end delay as well as a high packet delivery ratio in com- working conference, Las Vegas, NV, 9–12 January 2010,
plicated mobile environment. Moreover, the way we pp.205–209. New York: IEEE.
defined the rebroadcast delay and the rebroadcast 10. Zhou L, Cui G, Liu H, et al. NPPB: a broadcast scheme
probability is beneficial to balance the traffic load and in dense VANETs. Inf Technol J 2010; 9(2): 247–256.
improve the scalability of the schemes. In order to 11. Lu D, Dong S, Tao M, et al. A velocity and neighbor
reduce the latency further, few higher-velocity nodes density-based broadcast scheme in mobile ad hoc net-
are employed to rebroadcast the received message in works. J High Speed Netw 2015; 21(3): 221–235.
12. Tseng YC, Ni SY and Shih EY. Adaptive approaches to
NKVB scheme. It makes NKVB scheme more adapta-
relieving broadcast storms in a wireless multihop mobile
ble to mobile environment. The simulation results show
ad hoc network. IEEE T Comput 2003; 52(5): 545–573.
that the proposed schemes outperform the existing 13. Humoud S, Mackenzie L and Abdulai J. Neighbour-
broadcast schemes in both reliability and overhead, hood-aware counter-based broadcast scheme for wireless
especially in latency. ad hoc networks. In: IEEE GLOBECOM workshops,
New Orleans, LA, 30 November–4 December 2008, pp.1–
Declaration of conflicting interests 6. New York: IEEE.
14. Mohammed A, Ould-Khaoua M, Mackenzie LM, et al.
The author(s) declared no potential conflicts of interest with Probabilistic counter-based route discovery for mobile ad
respect to the research, authorship, and/or publication of this hoc networks. In: Proceedings of international conference
article. on wireless communications and mobile computing, Leip-
zig, 21–24 June 2009, pp.1335–1339. New York: ACM.
Funding 15. Yassein MB, Nimer SF and Al-Dubai AY. A new
The author(s) disclosed receipt of the following financial sup- dynamic counter-based broadcasting scheme for mobile
port for the research, authorship, and/or publication of this ad hoc networks. Simul Model Pract Th 2011; 19(1):
article: This work is supported by National Natural Science 553–563.
Foundation (NNSF) of China (61300198 and 61070092), and 16. Liarokapis D and Shahrabi A. Fuzzy-based probabilistic
by Guangdong Natural Science Foundation (2015A030 broadcasting in mobile ad hoc networks. In: IFIP wireless
308017) and Guangdong Science and Technology Key Project days, Niagara Falls, ON, Canada, 10–12 October 2011,
(2015B010131009). pp.1–6. New York: IEEE.
17. Liarokapis D, Shahrabi A and Komninos A. DibA: an
References adaptive broadcasting scheme in mobile ad hoc networks.
1. Reina DG, Toral SL and Johnson P. A survey on prob- In: Seventh annual communication networks and services
abilistic broadcast schemes for wireless ad hoc networks. research conference, Moncton, NB, Canada, 11–13 May
Ad Hoc Netw 2015; 25: 263–292. 2009, pp.224–231. New York: IEEE.
2. Tseng YC, Ni SY, Chen YS, et al. The broadcast storm 18. Gang W, Shigang W, Cai L, et al. Research and realiza-
problem in a mobile ad hoc network. Wirel Netw 2002; tion on improved MANET distance broadcast algorithm
8(2): 153–167. based on percolation theory. In: International conference
3. Obraczka K, Viswanath K, Tsudik G, et al. Flooding for on industrial control and electronics engineering, Xi’an,
reliable multicast in multi-hop ad hoc networks. Wirel China, 23–25 August 2012, pp.96–99. New York: IEEE.
Netw 2001; 7(6): 64–71. 19. Kokuti A and Simon V. Adaptive multihop broadcast
4. Jetcheva J, Hu Y, Maltz D, et al. A simple protocol for protocols for ad hoc networks. In: 8th international sym-
multicast and broadcast in mobile ad hoc networks posium on communication systems, networks & digital sig-
(internet-draft), IETF MANET working group, 2001, nal processing, Poznan, 18–20 July 2012, pp.1–6. New
https://tools.ietf.org/html/draft-ietf-manet-simple-mbcast-01 York: IEEE.
5. Williams B and Camp T. Comparison of broadcasting 20. Banerjee A, Foh CH, Yeo CK, et al. Performance
techniques for mobile ad hoc networks. In: Proceedings improvements for network-wide broadcast with instanta-
of the 3rd ACM international symposium on mobile ad hoc neous network information. J Netw Comput Appl 2012;
networking and computing, Lausanne, 9–11 June 2002, 35(3): 1162–1174.
pp.194–205. New York: ACM. 21. Slavik M and Mahgoub I. Spatial distribution and chan-
6. Ruiz P and Bouvry P. Survey on broadcast algorithms nel quality adaptive protocol for multihop wireless broad-
for mobile ad hoc networks. ACM Comput Surv 2015; cast routing in VANET. IEEE T Mobile Comput 2013;
48(1): 1–35. 12(4): 722–734.
14 International Journal of Distributed Sensor Networks
22. Mostafa A, Vegni AM and Agrawal DP. A probabilistic 33. Woon W and Yeung KL. Variable power broadcasting
routing by using multi-hop retransmission forecast with based on local information for source-dependent broad-
packet collision-aware constraints in vehicular networks. casting protocols. In: IEEE wireless communications and
Ad Hoc Netw 2014; 14(3): 118–129. networking conference, Cancun, Mexico, 28–31 March
23. Liu X, Yu Y, Zheng Y, et al. Distance and cooperation 2011, pp.796–801. New York: IEEE.
based broadcast in wireless ad hoc networks. L N Inst 34. Stojmenovic I, Khan A and Zaguia N. Broadcasting with
Comp Sci So 2017; 177: 168–178. seamless transition from static to highly mobile wireless
24. Bako B, Kargl F, Schoch E, et al. Advanced adaptive ad hoc, sensor and vehicular networks. Int J Parall Emer
gossiping using 2-hop neighborhood information. In: Distrib Syst 2012; 27(3): 225–234.
Global telecommunications conference, New Orleans, LO, 35. Schleich J, Thi H and Bouvry P. Solving the minimum
30 November–4 December 2008, pp.1–6. New York: M-dominating set problem by a continuous optimization
IEEE. approach based on DC programming and DCA. J Comb
25. Wang Q, Shi H and Qi Q. A dynamic probabilistic broad- Optim 2012; 24(4): 397–412.
casting scheme based on cross-layer design for manets. 36. Li D, Kim D, Zhu Q, et al. Minimum total communica-
Int J Mod Educ Comput Sci 2010; 2(1): 40–47. tion power connected dominating set in wireless net-
26. Wu C and Li C. Intelligent broadcast in wireless ad hoc works. In: 7th international conference on wireless
networks using live packet information. In: 9th interna- algorithms, systems, and applications, Yellow Mountains,
tional conference on information, communications and sig- China, 8–10 August 2012, pp.132–141. Berlin: Springer.
nal processing, Tainan, China, 10–13 December 2013, 37. Ros FJ, Ruiz PM and Stojmenovi I. Acknowledgment-
pp.1–5. New York: IEEE. based broadcast protocol for reliable and efficient data
27. Zhang X, Wang E, Xia J, et al. A neighbor coverage- dissemination in vehicular ad hoc networks. IEEE T
based probabilistic rebroadcast for reducing routing over- Mobile Comput 2012; 11(1): 33–46.
head in mobile ad hoc networks. IEEE T Mobile Comput 38. Khabbazian M, Blake I and Bhargava V. Local broad-
2013; 12(3): 424–433. cast algorithms in wireless ad hoc networks: reducing the
28. Banerjee S, Misra A, Yeo J, et al. Energy-efficient broad- number of transmissions. IEEE T Mobile Comput 2012;
cast and multicast trees for reliable wireless communica- 11(3): 402–413.
tion. In: IEEE wireless communications and networking 39. Haas ZJ and Nikolov MV. Towards optimal broadcast
conference, New Orleans, LA, 16–20 March 2003, in wireless networks. IEEE T Mobile Comput 2015; 14(7):
pp.660–667. New York: IEEE. 213–222.
29. Ruiz P, Dorronsoro B, Bouvry P, et al. Information dis- 40. Kok GX, Chow CO and Ishii H. Reducing broadcast
semination in VANETs based upon a tree topology. Ad redundancy in wireless ad-hoc networks with implicit
Hoc Netw 2012; 10(1): 111–127. coordination among forwarding nodes. Wireless Pers
30. Chen F and Kao J. Game-based broadcast over reliable Commun 2015; 81(1): 253–278.
and unreliable wireless links in wireless multihop net- 41. Nowak S, Nowak M and Grochla K. Global queue prun-
works. IEEE T Mobile Comput 2013; 12(8): 1613–1624. ing method for efficient broadcast in multihop wireless
31. Duc TL, Le DT, Zalyubovskiy VV, et al. Towards broad- networks. Commun Comput Inf Sci 2016; 659: 214–224.
cast redundancy minimization in duty cycled wireless sen- 42. Xue F and Kumar PR. The number of neighbors needed
sor networks. Int J Commun Syst 2017; 30(6): e3108. for connectivity of wireless networks Wirel Netw 2004;
32. Liu H, Wan P, Jia X, et al. Efficient flooding scheme 10(2): 169–181.
based on 1-hop information in mobile ad hoc networks. 43. Grossglauser M and Tse D. Mobility increases the capac-
In: 25th IEEE international conference on computer com- ity of ad hoc wireless networks. IEEE ACM T Netw 2002;
munications, Barcelona, 23–29 April 2006, pp.1–12. New 10(4): 477–486.
York: IEEE. 44. NS2, http://www.isi.edu/nsnam/ns