Você está na página 1de 14

Research Article

International Journal of Distributed


Sensor Networks
2017, Vol. 13(11)
A neighbor knowledge and velocity- Ó The Author(s) 2017
DOI: 10.1177/1550147717743699
based broadcast scheme for wireless journals.sagepub.com/home/ijdsn

ad hoc networks

Dingzhu Lu1,2 and Shoubin Dong2

Abstract
A neighbor knowledge-based broadcast scheme is proposed to reduce the latency for wireless ad hoc networks, yet
keeping the overhead at a reasonably low level and fulfilling the reliability. In the scheme, few Hello messages are inter-
changed to collect one-hop neighbor information. The collected information is used to calculate the neighbor density,
the ratio, and the number of one-hop uncovered neighbors, upon which the rebroadcast probability and delay are
adjusted adaptively. The way that the rebroadcast probability and delay are defined in neighbor knowledge-based broad-
cast scheme reduces the transmission overhead and restrains the traffic aggregation effectively. Next, a velocity-based
data distribution mechanism is proposed and extended to neighbor knowledge-based broadcast scheme to further
reduce the latency, forming neighbor knowledge and velocity-based broadcast scheme. It is stipulated that few higher-
velocity nodes are employed with bigger probability to rebroadcast the incoming message. The performance of the
schemes is evaluated by the simulation under diverse network configurations. The results show that they outperform
the existing broadcast schemes in overhead and especially in average end-to-end delay. Compared with flooding, they
reduce the overhead by 88.4% and the average end-to-end delay by 88.9% at most.

Keywords
Wireless ad hoc networks, rebroadcast probability, rebroadcast delay, normalized broadcast overhead, average end-to-
end delay, packet delivery ratio

Date received: 2 April 2017; accepted: 24 October 2017

Handling Editor: Daniel Gutierrez-Reina

Introduction decades, broadcasting has attracted much attention of


the research groups. Many kinds of broadcast schemes
Broadcasting is a communication primitive in wireless were proposed to minimize the number of transmis-
ad hoc networks. It is essential to resolve many issues sions while attempting to ensure a high reliability and a
such as route discovery, route maintenance for unicast low latency.
or multicast and emergency or warning message disse-
mination in disaster, battlefield, and VANET scenario.
In some harsh conditions, an efficient broadcast 1
School of Information & Engineering, The Open University of
mechanism is vital and may be the only possible way to Guangdong, Guangzhou, China
disseminate crucial information.1 Because radio signals 2
Computer Network and Communication Key Laboratory of
are likely to overlap with each other in a same geogra- Guangdong, South China University of Technology, Guangzhou, China
phical area, a straightforward broadcasting by flooding
Corresponding author:
is usually very costly and will result in serious redun- Dingzhu Lu, Guangdong Key Laboratory of Computer Network, South
dancy, contention, and collisions, to which is referred China University of Technology, Guangzhou 510006, China.
as the broadcast storm problem.2 Thus, during the past Email: dzlu@scut.edu.cn

Creative Commons CC-BY: This article is distributed under the terms of the Creative Commons Attribution 4.0 License
(http://www.creativecommons.org/licenses/by/4.0/) which permits any use, reproduction and distribution of the work without
further permission provided the original work is attributed as specified on the SAGE and Open Access pages (http://www.uk.sagepub.com/aboutus/
openaccess.htm).
2 International Journal of Distributed Sensor Networks

Besides blind flooding,3,4 a basic classification of use topological information to build a global forwarding
broadcast schemes divides them into two main categories: structure to reduce broadcast redundancy. They can be
probabilistic broadcast scheme and deterministic broad- proven to not degrade reachability compared with flood-
cast scheme.1,5,6 The probabilistic broadcast scheme ing and probabilistic schemes, provided communications
includes probability-based schemes,2,7–11 counter-based are perfectly reliable. However, they do not tolerate fre-
schemes,12–16 distance-based schemes,17–23 and location- quent topological changes well, because maintaining the
based schemes.24–27 forwarding structure in dynamic environment brings
Probabilistic schemes do not need any information excessive control overhead. In high mobile environment,
from the whole network and need not maintain a glo- deterministic schemes could not provide higher reachabil-
bal distributing topology, but, rather, start of building ity than probabilistic schemes do.
a network with each broadcast domain. In probabilistic First, we proposed a neighbor knowledge-based
schemes, all nodes are allowed to participate in the broadcast (NKB) scheme for wireless ad hoc networks.
broadcast process and forward the received broadcast In NKB scheme, few Hello messages are interchanged
message with some probability. Therefore, the traffic between one-hop neighbors to collect the neighbor infor-
load would not aggregate on a part of nodes. mation. The rebroadcast probability and the rebroadcast
Furthermore, the interest in probabilistic broadcasting delay on each node are adjusted adaptively according to
schemes is due to their inherent low transmission over- the obtained neighbor knowledge including the neighbor
head, low processing complexity, low delay, and high density, the ratio, and the number of one-hop uncovered
tolerance to frequent and rapid topological changes. neighbors. Second, a velocity-based data distribution
Balancing these benefits, though, is the disadvantage of mechanism is proposed and extended to NKB scheme to
inability to guarantee full network coverage and, still, reduce the latency further, forming neighbor knowledge
the presence of some redundant transmissions. and velocity-based broadcast (NKVB) scheme. In NKVB
Deterministic broadcast scheme includes tree-based scheme, few higher-velocity nodes are employed with big-
scheme,28–31 connected dominating set (CDS), and ger probability to forward the broadcast message, which
neighbor elimination-based scheme.32–41 Tree-based makes NKVB different from NKB scheme, and they do
schemes construct a routing tree on which broadcast accelerate the data transmission.
messages are forwarded. In tree-based scheme broad- The rest of the article is organized as follows. Section
cast redundancy minimization scheduling (BRMS),31 a ‘‘Related work’’ presents a brief review of broadcast
set of forwarding nodes are found first to minimize the schemes. Section ‘‘NKB scheme’’ presents NKB scheme.
number of broadcast transmissions. Then, the scheme The velocity-based data distribution mechanism and
constructs a forest of sub-trees based on the relation- NKVB scheme are presented in section ‘‘NKVB scheme.’’
ship between each forwarding node and its correspond- Performance evaluation of NKB and NKVB schemes by
ing receivers. Finally, a broadcast tree is constructed by simulations in the context of wireless ad hoc networks is
connecting all sub-trees with a minimum number of presented in section ‘‘Performance evaluation.’’ Finally,
connectors. CDS and neighbor elimination-based section ‘‘Conclusion’’ concludes the article.
schemes maintain state on the neighborhood of each
node, via ‘‘Hello’’ packets. Upon the collected neighbor
information, each node decides its role (forward node Related work
or non-forward node) in a specific broadcasting. For
example, in local broadcast algorithms (LBA)38 pro- Probabilistic broadcast schemes only need to maintain
posed by Majid Khabbazian, every broadcasting node rough local topology knowledge, which makes it more
selects at most one of its neighbors to rebroadcast the insensitive to node mobility than deterministic broad-
received message. A node has to rebroadcast the cast schemes. Probability-based schemes2,8 use some
received message if it is selected to do. Other nodes that basic understanding of the network topology to assign
are not selected have to decide whether to rebroadcast a constant forwarding probability to each node to
upon a self-pruning condition called the coverage con- rebroadcast. The fixed probability schemes do not need
dition. To evaluate the coverage condition, every node to collect the beacon information, including density,
u maintains a list Listucov (m) for every unique message speed, and energy, and so on, upon which the optimal
m. When node u receives a fresh message m for the first rebroadcast probability is calculated in the adaptive
time, Listucov (m) is initialized and filled with the IDs of probability schemes.1 GOSSIP1( p)8 is a pure gossip
all neighbors of u. Listucov (m) is updated before the scheme with the fixed rebroadcast probability. When a
rebroadcast delay ends, namely, the IDs of neighbors node first receives a route request, with probability p, it
covered by m are being removed from Listucov (m) during broadcasts the request to its neighbors and with prob-
the rebroadcast delay. Finally, if Listucov (m) is not ability 1 – p, it discards the request. If the node receives
empty, u will rebroadcast m and select one node still in the same route request again, it is discarded. The fixed
the list to be the next forwarder. Deterministic schemes probability schemes cost less control overhead. But the
Lu and Dong 3

constant rebroadcast probability makes the schemes stamp in advanced stamping scheme. When node r
function not so well in dynamic and asymmetrical net- receives a broadcast message m for the first time, it uses
work environment. In reliable gossip-based broadcast the stamp of m to check whether all its neighbors N(r)
protocol (RGB)7 and velocity and neighbor density- are already covered. If so, the rebroadcast is stopped;
based broadcast scheme (VDNB),11 the dynamic otherwise, node r appends id(r) and id(N(r)) to the
rebroadcast probability is calculated upon the immedi- stamp and schedules for rebroadcasting. Hybrid stamp-
ate number of neighbors of the node. Compared with ing utilizes two-hop neighbor information for pruning.
the fixed probability schemes, they are more suitable With hybrid stamping, each node further checks
for wireless ad hoc networks. whether some of its neighbors can also be reached by
In dynamic counter-based broadcasting scheme other nodes in the stamp. When node r receives a new
(DCB),15 the number of neighbors is used to determine message m, it checks whether its neighbors N(r) are all
whether the node is located within dense, medium distri- contained in the stamp of m first. For each neighbor n
bution or sparse regions and assign Cmin, Cmid, and Cmax not contained in the stamp, node r then tries to check
thresholds, respectively. Each node needs to wait for a whether a neighbor p in N(n) is in the stamp. If node p
random assessment delay. Within the delay, the number has a higher priority than node r, node r can assume
of copies of the message received by a node is compared node n will be covered by broadcasting from node p or
with Cmin, Cmid, and Cmax, and then the corresponding node with an even higher priority. If all uncovered
one of four different rebroadcast probabilities is assigned neighbors in N(r) will be covered by node with higher
to the node. In Humoud et al.,13 only two thresholds, priority, the rebroadcast is stopped by node r; other-
unlike in Yassein et al.,15 are used to evaluate the node wise, node r appends id(r) and id(N(r)) to the stamp
distribution and the rebroadcast probability is rougher. and schedules for rebroadcasting.
In Tseng et al.,12 the decision to forward the broadcast In neighbor coverage-based probabilistic rebroad-
message is determined by the function C(n) where n is cast (NCPR),27 the proportion of the common neigh-
the number of neighbors of the forwarding node. bors between node ni and its upstream node s uniquely
In distance-based broadcast scheme,17 whether a determines the rebroadcast delay Td(ni) of node ni, and
message is rebroadcasted or not is up to the relative dis- the rebroadcast delay of node ni is defined as follows
tance between the mobile node and the previous sender.
 
When a node receives a broadcast message from a jN (s) \ N (ni )j
neighbor node for the first time, its dmin is initialized Td (ni ) = MaxDelay 3 1  ð1Þ
jN (s)j
with the distance between them and the count is initia-
lized with 1. If dmin \ D (where D is the distance thresh- where MaxDelay is a small constant delay; N(s) and
old pre-defined), the node stops rebroadcasting. Else, N(ni) are the neighbor sets of node s and ni, respectively.
the node waits for a random number of slots, during the |.| is the number of elements in a set. In NCPR, another
waiting period, every time a copy of the broadcast mes- parameter, the connectivity factor, is defined to provide
sage is received, dmin and D are reassigned correspond- the node density adaptation. The connectivity factor
ingly. If dmin \ D, the node stops rebroadcasting. Else, Fc(ni) and the additional coverage ratio Ra(ni) of node
if the waiting time is expired, the node rebroadcasts the ni are defined as follows
received message. In distance and cooperation based
broadcast (DCBB),23 four neighbor nodes at most are NC
Fc (ni ) = ð2Þ
determined to forward broadcast packets based on the jN (ni )j
number of neighbors and the distance between neigh-
jU (ni )j
bors. The limited number of relay nodes is helpful to Ra (ni ) = ð3Þ
reduce the redundancy of the scheme. DCBB is applica- jN (ni )j
ble to densely distributed network environment. where Nc = 5.1774 log n, and n is the number of nodes
In location-based broadcast schemes,26,27 the in the network. |U(ni)| is the number of uncovered
rebroadcast probability of a node is in positive correla- neighbors of node ni. By combining the additional cov-
tion with its additional coverage ratio. In order to fig- erage ratio and the connectivity factor, the rebroadcast
ure out an accurate additional coverage ratio, the probability of node ni is calculated as follows
rebroadcast delay is set without exception on each node
to collect enough neighbor coverage information. In Pre (ni ) = Fc (ni )  Ra (ni ) ð4Þ
scalable broadcast algorithm (SBA),26 three node-
stamping broadcast algorithms, named basic stamping, The proposed rebroadcast delay is one of main con-
advanced stamping, and hybrid stamping, are pro- tributions of NCPR. It determines the rebroadcast
posed. Each node in advanced stamping algorithm col- order, and then the more accurate additional coverage
lects its one-hop neighbor information. IDs of each ratio is obtained.27 We found that, in NCPR, more
forwarding node and its neighbors are appended to neighbors a node has, more likely it is to rebroadcast
4 International Journal of Distributed Sensor Networks

the message in less time. Namely, the way that the


rebroadcast delay and the rebroadcast probability are
calculated is inclined to incur the traffic aggregation.
In NKB scheme, we focus on defining the rebroad-
cast delay and the rebroadcast probability more rea-
sonably to balance the traffic load, reduce the collisions
and lower the end-to-end delay, which improved the
reliability and the scalability of the scheme. For adapt-
ability purpose in mobile environment, for example in
disaster and battlefield scenario, few higher-velocity
nodes are employed with bigger probability to rebroad-
cast the message in enhanced NKVB scheme, which Figure 1. Neighbor set and uncovered neighbors set.
lowers the delay further.

NKB scheme Uncovered neighbors set


In NKB scheme, the rebroadcast probability is adjusted When node ni receives a fresh broadcast message from
adaptively at each node according to its neighbor the upstream node ns, their common neighbors receive
knowledge. The neighbor knowledge includes the ratio it too because of the broadcast nature of radio com-
of uncovered neighbors, the number of uncovered neigh- munication, as shown in Figure 1. Upon both node
bor, and the neighbor density. The neighbor knowledge ns’s neighbor list and its own neighbor list collected by
is obtained at each node by exchanging Hello message. the Hello message, node ni can figure out who are
In order to sufficiently pursue lower average end-to- their common neighbors and deduce its uncovered
end delay, exploit more accurate uncovered neighbors neighbors set. If node ni has more neighbors uncov-
set, and avoid channel collisions, a proper rebroadcast ered by the broadcast message, it is reasonable for
delay is set at each node. node ni to rebroadcast the message with a bigger
For research purpose, the network can be repre- probability. The uncovered neighbors set U(ni) of
sented by an undirected graph G = (V , E), where V is a node ni is defined as follows
set of vertices (nodes) and E is a set of undirected edges.
An undirected edge (ni, nj) denotes the connection U (ni ) = N (ni )  ½N (ni ) \ N (ns )  fns g ð5Þ
between two neighboring nodes ni and ni. The neighbor
set N(ni) of node ni is defined as fni j(ni , nj ) 2 Eg. |N(ni)| where N(ni) and N(ns) are the neighbor sets of node ni
denotes the number of elements in set N(ni). and ns, respectively.
In NKB scheme, each node sets a rebroadcast delay
Collection of neighbor information (defined in section ‘‘Rebroadcast delay’’) when it
receives a fresh broadcast message, to exploit its accu-
Hello message is used to collect a node’s one-hop
rate uncovered neighbors set. When node ni receives a
neighbor information in NKB scheme. To reduce the
duplicate message during the rebroadcast delay, for
overhead of Hello message, piggybacking is used.
example from its neighbor node nj, node ni should
Moreover, piggybacking of the Hello message by
update its uncovered neighbors set U(ni) according to
broadcast packet could make the neighbor information
formula (6). The uncovered neighbors set U(ni) is being
fresher. Only when the time elapsed from the last
broadcasting packet is greater than a Hello Interval, updated until the rebroadcast delay expires
the node needs to send a separate Hello message.
U ðni Þ = U ðni Þ  ½U ðni Þ \ N (nj )  fnj g ð6Þ
In NKB, Hello message of node ni includes the
following:
1. N(ni): a neighbor list of node ni;
Rebroadcast probability based on neighbor
2. M(ni): an ID list of broadcast messages received; knowledge
3. flag_leaf: if node ni is a leaf node, flag leaf is set In proposed broadcast scheme, the neighbor knowl-
to 1. Otherwise, this field is excluded from Hello edge, including the ratio of uncovered neighbors, the
message. number of uncovered neighbors, and the neighbor den-
Definitions sity, is used to calculate the rebroadcast probability at
each node.
leaf node: A leaf node has only one neighbor; it is a
special kind of node who locates at the boundary. Ratio of uncovered neighbors. As soon as the rebroadcast
secondary leaf node: It is a kind of node who is the delay expires, node ni will calculate the ratio of uncov-
neighbor of a leaf node. ered neighbors Ru(ni) as follows
Lu and Dong 5

jU (ni )j
Ru (ni ) = ð7Þ
jN (ni )j  1
where |.| is the number of elements in a set and
|N(ni)| – 1 is the number of node ni’s neighbors exclud-
ing the upstream node ns.
nj
If node ni has a big ratio of uncovered neighbors, it is
reasonable for ni to rebroadcast the received message ns ni U(n )
with a big probability to cover more fresh nodes. On i
the contrary, if node ni has a small ratio of uncovered
neighbors, the smallest possible rebroadcast probability
should be adopted by ni to reduce redundancy and col-
lisions without hurting the packet delivery ratio. Figure 2. Leaf node and secondary leaf node.

Density factor and absolute number of uncovered neighbor


where b and (1 – b) are the influence coefficients of
factor. We assume that node nh and ni are neighbors of
Ru(ni) and Fu(ni), respectively. If pk(ni) is greater than 1,
the upstream node ns and receive the same broadcast
we set pk(ni) to 1. The value of b is related to node den-
message from node ns. If they have the same ratio of
sity and node distribution. In even and dense network,
uncovered neighbors but the different numbers of uncov-
a big value of b assigned benefits reducing the colli-
ered neighbors, it is reasonable for the node with more
sions and the delay, and upgrading the reliability. A
uncovered neighbors to rebroadcast the message with a
small value of (1 – b) is helpful to improve the packet
bigger probability. Even when a node has a small ratio
delivery ratio in sparse area. A number of experiments,
of uncovered neighbors, but a big absolute number of
which are not emphases mentioned here, were done to
uncovered neighbors, it is worth rebroadcasting the
prove it. And as a result, the empirical value of b is
message with a big probability.
set to 0.8 in the following simulation in section
Besides the number of uncovered neighbors, the
‘‘Performance evaluation.’’
neighbor density also affects the rebroadcast probabil-
But, if node ni is an uncovered secondary leaf node,
ity. When node ni is in a denser area, a smaller rebroad-
whose leaf node is nj as shown in Figure 2, it should
cast probability adopted avails to reduce the redundancy
rebroadcast the message with probability 1 for node nj.
and the collisions. However, a bigger rebroadcast prob-
In addition, nj should give up the rebroadcast as a last
ability should be adopted to keep a higher packet deliv-
node on the forwarding path. Finally, we have the
ery ratio in a sparser area.
rebroadcast probability pk(ni) as follows
Xue and Kumar42 concluded that if each node con-
nects to more than 5.1774 logN of its neighbors, then pk (ni ) =
the probability of the network being connected is 8
>
> 0, U (ni ) = F
approaching 1 as N increases, where N is the number <
1, 9nj , nj 2 U (ni ) and N (nj ) = fni g
of nodes in the network. We use 5.1774 logN, denoted >  
>
: min 1, bRu (ni ) + (1b)Fu (ni )
by Nc, as a reference value to evaluate the absolute d(ni ) other
number of uncovered neighbors and the neighbor den-
sity. The density factor d(ni) and the absolute number of
ð11Þ
uncovered neighbor factor Fu(ni) are defined as follows

jN (ni )j
d(ni ) = ð8Þ Rebroadcast delay
NC
jU (ni )j The definition of the rebroadcast delay is critical for
Fu (ni ) = ð9Þ the scheme to achieve optimal performance. The com-
NC
mon neighbor ratio of node ns and node ni, denoted by
Rc(nsi), and the absolute number of uncovered neigh-
Rebroadcast probability based on neighbor knowledge.
bors influence the rebroadcast delay in a different way.
Combining the ratio of uncovered neighbors, the abso-
Rc(nsi) is defined as follows
lute number of uncovered neighbor factor, and the den-
sity factor, we have node ni’s rebroadcast probability jN (ns ) \ N (ni )j
pk(ni) based on its neighbor knowledge Rc (nsi ) = ð12Þ
jN (ns )j  1
b  Ru (ni ) + (1  b)  Fu (ni ) where |N(ns)| – 1 is the number of node ns’s neighbors
pk (ni ) = ð10Þ
d(ni ) excluding node ni.
6 International Journal of Distributed Sensor Networks

The rebroadcast delay ratio Rd(ni) and the rebroad-


cast delay Td(ni) are defined as follows

1  Fu (ni )  Rc (nsi ) N (ns ) \ N (ni ) 6¼ F
Rd (ni ) =
0 N (ns ) \ N (ni ) = F or 9nj , nj 2 U (ni ) and N (nj ) = fni g ð13Þ

D  Rd (ni ) N (ns ) \ N (ni ) 6¼ F
Td (ni ) =
0 N (ns ) \ N (ni ) = F or 9nj , nj 2 U (ni ) and N (nj ) = fni g ð14Þ

where D is a small constant delay. When there is no The first two points are obviously reasonable. We
common neighbor between node ni and ns or ni is a sec- present the proof for the rationality of the third point
ondary leaf node, Rd(ni) and Td(ni) are set to 0. If Rd(ni) in the following.
is smaller than 0, we set Rd(ni) to 0.
Next, the details that the rebroadcast delay is defined Proof 
are explained. Suppose node ni receives a fresh broad- Ru (ni ) = x
cast message from its upstream node ns, their common Ru (nj ) = y
neighbors receive the message too. 8
>
> jU (ni )j
>
< jN (n )j  1 = x
i
1. If node ni has more uncovered neighbors, )
namely a bigger Fu(ni), it should rebroadcast the >
> jU (nj )j
>
: =y ð15Þ
received message with a smaller rebroadcast jN (nj )j  1
8
delay to make the message cover more fresh > jU (ni )j
>
< jN (ni )j = 1 +
nodes as soon as possible. In this condition, the x
smaller delay is helpful to accelerate the mes- )
>
> jU (n j )j
sage propagation and reduce the average end- : jN (nj )j = 1 +
y
to-end delay.
2. If N(ns) \ N(ni) = F, namely there is no com- Note that
mon neighbor between node ns and node ni, 
jN (ni )j  jU (ni )j = jN (ns ) \ N (ni )j
node ni rebroadcasts the message without delay ð16Þ
jN (nj )j  jU (nj )j = jN (ns ) \ N (nj )j
(Td(ni) = 0) will not incur the collision. If
9 nj , N (nj ) = fni g, namely node ni is a secondary If Rc(nsi) . Rc(nsj), then
leaf node, node ni has to rebroadcast the mes- jN (ns ) \ N (ni )j jN (ns ) \ N (nj )j
sage for the boundary node nj, and that node ni .
jN (ns )j  1 jN (ns )j  1 ð17Þ
rebroadcasts the message without delay
(Td(ni) = 0) is helpful to accelerate the message ) jN (ns ) \ N (ni )j . jN (ns ) \ N (nj )j
propagation. Formula (18) can be derived from formulas (16)
3. If bigger the common neighbor ratio of node ns and (17).
and ni is, shorter the rebroadcast delay of node
ni should be. Suppose node ni and node nj are N (ni )j  jU (ni )j . jN (nj )j  jU (nj )j ð18Þ
neighbors of the upstream node ns. If the com- Formula (19) can be derived from formulas (15)
mon neighbor ratio of node ns and node ni is and (18).
bigger than the common neighbor ratio of node
ns and node nj (Rc (nsi ).Rc (nsj )), node ni should jU (ni )j jU (nj )j
1+  jU (ni )j . 1 +  jU (nj )j
rebroadcast the message earlier than node nj. x y
    ð19Þ
Then, more nodes, namely these common neigh- 1 1
)  1 jU (ni )j .  1 jU (nj )j
bors between ns and ni, can update their own x y
uncovered neighbors set upon the received 8
neighbor list from node ni. Next, their rebroad- < Ru (ni )  Ru (nj )
>
cast probability will be lowered to reduce redun- Ru (ni ) = x
>
:
dant messages. If Rc (nsi ).Rc (nsj ) and Ru (nj ) = y
Ru (ni )  Ru (nj ), the rebroadcast by node ni 
x\1, y\1 ð20Þ
within smaller delay will cover more additional )
fresh nodes in less time than by node nj. It is xy
   
helpful to improve the channel utilization and 1 1
) 0\  1  1
reduce the average end-to-end delay. x y
Lu and Dong 7

Combining formulas (19) and (20), we draw the con- big challenge for most of existing broadcast schemes to
clusion as follows minimize the harm of node mobility. This section pro-
poses a velocity-based data distribution mechanism. It
jU (ni )j . jU (nj ) ð21Þ stipulates that few higher-velocity nodes should be
selected to rebroadcast the message with a big probabil-
ity without delay to accelerate the data propagation.
NKB algorithm description The mechanism is extended to NKB scheme to reduce
In NKB algorithm, the rebroadcast probability of node average end-to-end delay further, forming NKVB
ni is determined by its neighbor knowledge. The formal scheme.
description of NKB scheme is shown in the following.
The algorithm consists of three phases. In the first Velocity-based data distribution mechanism
phase, U(ni) is initialized. If U(ni) = F, node ni refuses
to rebroadcast the received message, else, Td(ni) is cal- Suppose node ni has ki neighbors, denoted by
culated. Next, if U(ni) 6¼ F, U(ni) is being updated fnj j(ni , nj ) 2 E, j = 1, 2, . . . , ki g, whose velocities are
before Td(ni) expires. Finally, when Td(ni) expires and denoted by vj ( j = 1, 2,., ki). The minimum and max-
U(ni) 6¼ F, pk(ni) is calculated and the message is imum velocity of them are denoted by vmin and vmax,
rebroadcasted with probability pk(ni). respectively

vmax = max(v1 , v2 , . . . , vj )
j = 1, 2, . . . , ki ð22Þ
NKVB scheme vmin = min(v1 , v2 , . . . , vj )
Several studies43 draw the conclusion that the mobility The arithmetic mean of these neighbors’ velocities v
increases the capacity of networks. However, it still is a and the standard deviation of their velocities s are cal-
culated respectively as follows
Algorithm 1. Neighbor knowledge-based broadcast algorithm. !
1 X ki
v = vj + vi ð23Þ
Definitions: ki + 1 j = 1
m: the received broadcast message.
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi !
Timer(ni, m, Td(ni)): timer of node ni for m message, initialized X ki qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
1
with the value of Td(ni). s= (vj  v)2 + (vi  v)2 ð24Þ
random(0, 1): a random function whose range is the interval ki + 1 j = 1
from 0 to 1.
1: While ni receives a fresh message m from ns do The velocity-based data distribution mechanism sti-
2: U(ni ) = N(ni )  ½N(ni ) \ N(ns )  fns g
pulates strictly that node ni is allowed to rebroadcast
3: if U(ni ) = F then
4: pk(ni) = 0 and return the received message with the probability pv(ni) only if
5: endif vi is bigger than (v + s). The rebroadcast probability
6: if N(ns ) \ N(ni ) = F or 9nj , N(nj ) = fni g then pv(ni) is defined by formula (25) as follows
7: Td(ni) = 0
8: else vi  (v + s)
9: Td (ni ) = D3Rd (ni ) pv ð ni Þ = ð25Þ
10: Set a Timer(ni, m, Td(ni)) vmax  (v + s)
11: endif
12: endwhile
The overhead incurred by these employed high-
13: while ni receives a duplicate m from nj before velocity nodes is very limited. Assume that the node
Timer(ni,m,Td(ni)) expires do velocity obeys uniform distribution between vmin and
14: Uðni Þ = Uðni Þ  ½Uðni Þ \ N(nj )  fnj g vmax, the percentage PU of the nodes who take part in
15: if U(ni ) = F then computing the rebroadcast probability is 0.21 calcu-
16: pk(ni) = 0 and return
17: endif
lated by formula (27)
18: endwhile 8
19: While Timer(ni, m, Td(ni)) expires do > vmax + vmin
< vU =
20: if 9nj , N(nj ) = fni g then 2
rffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi

21: pk(ni) = 1 2 ð26Þ
>
: s = (vmax  vmin )
22: else U
23: pk (ni ) = min(1, (b:Ru (ni ) + (1  b):Fu (ni ))=d(ni ))
12
24: endif PU = 1  FU (vU + sU )
25: if random(0, 1)  pk(ni) then  
26: broadcast(m) and return vU + sU  vmin
=1  ð27Þ
27: endif vmax  vmin
28: endwhile
= 0:21
8 International Journal of Distributed Sensor Networks

Similarly, suppose the node velocity obeys normal Table 1. Simulation parameters.
distribution N(a, s2), the percentage PN of the nodes
who take part in computing the rebroadcast probability Simulation parameters Value
is 0.1587 calculated by formula (29) Mobility model RWM
 Topology size 1000 3 1000 m2
vN = a Numbers of nodes 50, 100, 150, 200, 250, 300
ð28Þ Transmission range 250 m
sN = s
Bandwidth 2 Mbps
PN = 1  FN (vN + sN ) Traffic type CBR
CBR connection 10, 20, 30, 40, 50, 60
= 1  Fa, s (vN + sN ) Packet size 512 bytes
= 1  Fa, s (a + s) Packet rate 4 packets/s
  Pause time 0s
(a + s)  a ð29Þ Max mobility velocity (m/s) 0, 5, 10, 15, 20, 25
=1  F
s MAC protocol 802.11 DCF CSMA/CA
Hello interval 0.1 s
= 1  F(1) Constant delay (D) 0.01 s
= 0:1587 Fixed probability(Gossip1(p)) 0.65

Note that ultimately, only few of nodes, who take DCF: distributed coordination function.
part in computing the rebroadcast probability, are
really employed to rebroadcast the message, so the pro-
posed velocity-based data distribution mechanism We have used the following performance metrics for
incurs little overhead. It is also reconfirmed by the comparison purposes:
simulation result in section ‘‘Performance evaluation.’’
 Normalized broadcast overhead: normalized
broadcast overhead indicates the normalized
NKVB algorithm description transmissions of the broadcast operation per
In order to collect the neighbor nodes’ velocity, a new node. It defines the ratio of the total transmis-
field vi, the velocity of node ni, needs to be added to sions, including the broadcast packets and extra
Hello message. In NKVB algorithm, the rebroadcast control packets to the broadcast packets per
probability of node ni is determined by both its velocity node. It is measured by bytes per broadcast byte
and its neighbor knowledge. The formal description of per node.
the NKVB algorithm is shown in the following.  Average end-to-end delay: the average delay of
The algorithm consists of three phases. In the first successfully delivered broadcast packets from
phase, U(ni) is initialized. If U(ni) 6¼ F and vi .(v + s), source to destinations.
node ni broadcasts the message with probability pv(ni)  Packet delivery ratio: the percentage of nodes
without delay. If the message is not broadcasted since received the broadcast message.
the random number does not fall in the rebroadcast
probability interval from 0 to pv(ni), Td(ni) is initialized. The simulation is divided to three parts, and in each
Next, if U(ni) 6¼ F, U(ni) is being updated before Td(ni) part, we evaluate the impact of one of the following fac-
expires. Finally, when Td(ni) expires and U(ni) 6¼ F, tors on the performance of broadcast schemes. In the
pk(ni) is calculated and the message is rebroadcasted simulation results, each data point represents the aver-
with probability pk(ni). age of 40 trials of experiments. The confidence level is
95%, and the confidence interval is shown as a vertical
bar in the figures:
Performance evaluation
In this section, NKB and NKVB schemes are com-  Mobility velocity. The max mobility velocity of
pared with flooding,4 Gossip1(p),8 DCB,15 NCPR,27 nodes is modulated in range of 0–25 m/s to eval-
and LBA,38 by simulation way using the NS-2(v2.35)44 uate how the node mobility affects the perfor-
simulator. The IEEE 802.11 MAC with distributed mance of the schemes. In this part, the number
coordination function (DCF) is used as the MAC pro- of nodes and the number of CBR connections
tocol. The mobility model is based on the random are set fixedly to 200 and 50, respectively.
waypoint model (RWM) in a square of size  Number of nodes. The number of nodes is modu-
1000 3 1000 m2. In the simulation of our schemes, lated in range of 50–300 in a fixed square to
the empirical value of b is set to 0.8. The rebroadcast evaluate how the node density affects the perfor-
probability p of Gossip1(p) is set to 0.65. The detailed mance of the schemes. In this part, the max
simulation parameters are listed in Table 1. mobility velocity of nodes and the number of
Lu and Dong 9

Algorithm 2. Neighbor knowledge and velocity-based broadcast


algorithm.

Definitions:
m: the received broadcast message.
Timer(ni, m, Td(ni)): timer of node ni for m message, initialized
with the value of Td(ni).
random(0, 1): a random function whose range is the interval
from 0 to 1.
1: While ni receives a fresh message m from ns do
2: U(ni ) = N(ni )  ½N(ni ) \ N(ns )  fns g
3: if U(ni ) = F then
4: p(ni) = 0 and return
5: endif
6: if vi . ðv + sÞ then
7: pv ðni Þ = (vi  (v + s))=(vmax  (v + s))
8: if random(0, 1)  pv(ni) then
9: broadcast(m) and return
10: endif
11: endif
12: if N(ns ) \ N(ni ) = F or 9nj , N(nj ) = fni g then Figure 3. Mobility velocity versus normalized broadcast
13: Td(ni) = 0 overhead.
14: else
15: Td (ni ) = D3Rd (ni )
16: Set a Timer(ni, m, Td(ni)) overhead curves are almost flat due to the fixed
17: endif rebroadcast probabilities which are not affected by the
18: endwhile node mobility. The normalized broadcast overhead of
19: while ni receives a duplicate m from nj before
Timer(ni,m,Td(ni)) expires do the other schemes increases proportional to the node
20: Uðni Þ = Uðni Þ  ½Uðni Þ \ N(nj )  fnj g mobility, namely, the node mobility has a negative
21: if U(ni ) = F then impact on the reduction of overhead. It is because the
22: p(ni) = 0 and return node mobility directly brings about more control pack-
23: endif
ets to repair the hurt communication link and to main-
24: endwhile
25: While Timer(ni, m, Td(ni)) expires do tain the changed network topology. Furthermore, the
26: if 9nj , N(nj ) = fni g then topological variation may incur some collisions fol-
27: pk(ni) = 1 lowed by the retransmissions. In some schemes, the
28: else node mobility as well gives rise to the imprecise neigh-
29: pk (ni ) = min(1, (b:Ru (ni ) + (1  b):Fu (ni ))=d(ni ))
30: endif
bor information collected and the unnecessary rebroad-
31: if random(0, 1)  pk(ni) then casts. As shown in Figure 3, when the mobility velocity
32: broadcast(m) and return is bigger than 15 m/s, there is a significant increase in
33: endif the normalized broadcast overhead, especially for LBA
34: endwhile and NCPR schemes.
In LBA scheme, a node refuses to rebroadcast the
received message only if it learned that all of its neigh-
CBR connections are set fixedly to 15 m/s and bors have been covered. In fact, it is almost impossible
20, respectively. for each node to acquire the intact neighbor coverage
 Number of CBR connections. The number of ran- knowledge in mobile environment. Then, many super-
domly chosen CBR connections is modulated in fluous rebroadcasts are executed, leading to some inci-
range of 10–60 with a fixed packet rate to evalu- dental collisions and retransmissions. Therefore, in
ate how the traffic load affects the performance LBA scheme, the redundant broadcast is the main
of the schemes. In this part, the max mobility composition of the normalized broadcast overhead. In
velocity of nodes and the number of nodes are mobile environment, DCB scheme tends to define a
set fixedly to 15 m/s and 200, respectively. rough threshold and count a wrong number of redupli-
cative packets received, which leads inevitably to the
redundant rebroadcasts and collisions. Compared with
Effects of node mobility LBA and DCB schemes, the normalized broadcast
Figure 3 shows that flooding and Gossip1(0.65) are overhead of NKB, NKVB, and NCPR schemes is
deserved a high normalized broadcast overhead. The affected more mildly by the node mobility since their
result is driven comprehensively by the high node den- rebroadcast probabilities do not rely on the precise
sity and their big rebroadcast probabilities. But their neighbor knowledge. Compared with Gossip1(0.65)
10 International Journal of Distributed Sensor Networks

Figure 4. Mobility velocity versus average end-to-end delay. Figure 5. Mobility velocity versus packet delivery ratio.

and flooding, NKVB scheme saves 57.5%–84.9% over-


head and 65.4%–88.4% overhead, respectively, as As shown in Figure 5, the node mobility almost has
shown in Figure 3. Compared with NCPR scheme, no impact on the packet delivery ratio of flooding.
NKVB scheme saves 16.2%–26.9% overhead. Flooding always keeps its reliability at a high level,
Figure 4 shows how the node mobility affects the even when nodes are at high velocity. But the packet
average end-to-end delay. Both Gossip1(0.65) and delivery ratio of the other schemes is affected in a nega-
flooding keep a stable and higher average end-to-end tive way. The inherent deterministic broadcast mechan-
delay. For the other schemes, as elaborated in Figure 3, ism makes LBA scheme obtain the best packet delivery
the topological change incurs more collisions and ratio when the node mobility velocity keeps lower than
retransmissions. Definitely, it leads to higher latency. 5 m/s and also makes it failed in high-velocity scenario.
The incomplete topology knowledge exceedingly ampli- For DCB scheme, the changing of the topology reduces
fies the rebroadcast probability in LBA scheme, and the accuracy of the threshold significantly, leading to
then many redundant messages are rebroadcasted, the serious declining in the packet delivery ratio. The
which leads to a mass of channel competitions and col- packet delivery ratio of NCPR, NKB, and NKVB
lisions. Definitely, LBA deserves the worst average schemes is influenced gently by the node mobility,
end-to-end delay among all schemes, especially when because their rebroadcast does not rely on the accurate
the nodes are moving at high velocity. neighbor knowledge. Compared with the other three
In DCB scheme, the average end-to-end delay schemes, except for in low velocity scenario, NKB and
increases with the node mobility due to the incremental NKVB scheme obtain a better packet delivery ratio in
redundant rebroadcasts and collisions incurred by the most scenarios. The simulation result above confirms
inaccurate threshold and count of reduplicative packets. that probabilistic broadcast schemes are more insensi-
The rest of three schemes only need to maintain rela- tive to node mobility than deterministic broadcast
tively rough topology knowledge, so, the node mobility schemes as mentioned before, since they only need to
has less influence on their average end-to-end delay maintain rough local topology knowledge.
than that of LBA and DCB. Both NKB and NKVB
schemes outperform NCPR scheme far in average end-
to-end delay, as shown in Figure 4, thanks to their rea- Effects of node density
sonable rebroadcast delay and probability. Compared How the node density affects the running of the broad-
with Gossip1(0.65) and flooding, NKVB scheme cast schemes is illustrated in this section. As shown in
reduces 53.4%–58.3% delay and 60.3%–63.6% delay, Figure 6, at the very start, the normalized broadcast
respectively. Compared with NCPR scheme, NKVB overhead of all schemes decreases with the increasing
scheme reduces 25.2%–42.3% delay. And, there is an number of nodes. It is because the network connectivity
apparent difference that the first half of the curve of is being enhanced by the joined nodes, and then every
NKVB scheme shows a downward trend, which thanks rebroadcast becomes more efficient to cover more fresh
to a part of higher-velocity nodes hired to rebroadcast nodes. However, the continued increasing nodes inevi-
the messages. These nodes do accelerate the propaga- tably bring about the collisions followed by retransmis-
tion of messages. sions, which leads to the increasing normalized
Lu and Dong 11

Figure 7. Number of nodes versus average end-to-end delay.


Figure 6. Number of nodes versus normalized broadcast
overhead.

broadcast overhead afterward. When the number of


nodes exceeds 200, the overhead curves of flooding,
LBA, and NCPR start a noticeable uptrend. The over-
head curves of NKB and NKVB schemes are relatively
flat for their self-adjusted rebroadcast probability upon
the network density. Compared with Gossip1(0.65) and
flooding, NKB and NKVB schemes save 49.2%–
67.5% overhead and 59.8%–75.8% overhead, respec-
tively, as shown in Figure 6. Compared with NCPR
scheme, NKB and NKVB schemes save 6.6%–41.4%
overhead.
Different from the other schemes, the normalized
broadcast overhead of DCB scheme almost decreases
with the increasing number of nodes all the time.
Because the value of threshold Cmax taken by DCB is
not big enough in dense scenario, so the messages are Figure 8. Number of nodes versus packet delivery ratio.
rebroadcasted with smaller probability, reducing the
collisions and the retransmissions. Accordingly, its
average end-to-end delay also decreases with the delay of flooding, compared with the other schemes, as
increasing number of nodes as shown in Figure 7. shown in Figure 7. But flooding still keeps a stable and
Unfortunately, the inaccurate threshold Cmax also leads high packet delivery ratio. In NCPR, NKB, and
directly to the lower packet delivery ratio, as shown in NKVB schemes, the node density is taken into consid-
Figure 8. eration when defining the rebroadcast probability and
Figures 7 and 8 show how the node density acts on the rebroadcast delay, so the changing node density has
the average end-to-end delay and the packet delivery less negative impact on their delay and delivery ratio.
ratio. As mentioned before, the overhead decreases In NKB and NKVB schemes, some special nodes such
with the increasing nodes in sparse network environ- as leaf node deserve a special treat in the process of
ment. The increasing nodes make the rebroadcast more broadcasting. Their rebroadcast parameters are defined
efficient, namely, lower delay and higher delivery ratio. more thoughtfully to deal with the node density than
In dense network environment, on the contrary, the the other schemes do, which makes both schemes more
increasing nodes incur more collisions and more reliable and efficient in complicated network environ-
retransmissions, increasing the end-to-end delay and ment. As shown in Figures 6–8, NKB and NKVB
deteriorating the delivery ratio. The increasing node schemes outperform the other schemes especially in
density has a more serious and negative impact on the average end-to-end delay by 88.9% at most.
12 International Journal of Distributed Sensor Networks

Figure 10. Number of CBR connections versus average end-


Figure 9. Number of CBR connections versus normalized
to-end delay.
broadcast overhead.

Effects of traffic load


How the traffic load affects the running of the broad-
cast schemes is illustrated in this section. As shown in
Figure 9, without exception, the normalized broadcast
overhead of all schemes increases with the growing traf-
fic load, since more traffic load leads to more conten-
tions and collisions. The high rebroadcast probability
adopted by flooding and Gossip1(0.65) brings about a
serious congestion, and the heavy traffic load aggra-
vates the congestion further. LBA scheme rebroadcasts
a great many redundant messages, so its overhead
experiences a noticeable increase as shown in Figure 9.
For DCB scheme, the main of the overhead originates
from the retransmission.
In NCPR scheme, the rebroadcast delay of a node is
inversely proportional to the common neighbors
between the upstream node and itself. Generally, it Figure 11. Number of CBR connections versus packet
means that the nodes with more neighbors will rebroad- delivery ratio.
cast the message more possibly after a smaller rebroad-
cast delay. Then, these nodes will forward more packets
in less time than the other nodes around. Namely, the rebroadcast delay and the rebroadcast probability in
way that the rebroadcast delay and the rebroadcast NKB and NKVB scheme. It makes the traffic load dis-
probability are defined is inclined to incur the traffic tribution relatively uniform and more reasonable. The
aggregation. The situation becomes worse as the traffic contentions and collisions are restrained effectively.
load increases. As shown in Figure 9, there is a remark- Therefore, the traffic load has less effect on NKB and
able overhead fluctuation arising when CBR connec- NKVB scheme than that on the other schemes.
tions of NCPR scheme rise from 50 to 60. At the same Compared with flooding, the propose schemes save
time, there is a remarkable increasing of the average 79.2% overhead and reduce 79.1% delay at most, as
end-to-end delay and an obvious decreasing of the shown in Figures 9 and 10.
packet delivery ratio as shown in Figures 10 and 11,
respectively.
Besides the ratio of uncovered neighbors and the Conclusion
neighbor density, the absolute number of uncovered We proposed NKB and NKVB schemes for wireless ad
neighbors is taken in consideration to calculate the hoc networks. In both schemes, the neighbor density
Lu and Dong 13

and coverage information are collected by Hello mes- 7. Wang G, Lu D, Jia W, et al. Reliable gossip-based
sage to calculate the rebroadcast parameters in near broadcast protocol in mobile ad hoc networks. In: Pro-
real-time at each node. To reduce the overhead of ceedings of the first international conference on mobile ad-
Hello message and upgrade the validity of neighbor hoc and sensor networks, Wuhan, China, 13–15 December
knowledge, piggybacking is used. One-hop neighbor 2005, pp.207–218. Berlin: Springer.
8. Haas ZJ, Halpern JY, Li L, et al. Gossip-based ad hoc
information collected keeps the control overhead at a
routing. IEEE ACM T Netw 2006; 14(3): 479–491.
low level. The flexible calculation of the rebroadcast 9. Slavik M and Mahgoub I. Stochastic broadcast for
probability and delay guarantees a low average end-to- VANET. In: 7th IEEE consumer communications and net-
end delay as well as a high packet delivery ratio in com- working conference, Las Vegas, NV, 9–12 January 2010,
plicated mobile environment. Moreover, the way we pp.205–209. New York: IEEE.
defined the rebroadcast delay and the rebroadcast 10. Zhou L, Cui G, Liu H, et al. NPPB: a broadcast scheme
probability is beneficial to balance the traffic load and in dense VANETs. Inf Technol J 2010; 9(2): 247–256.
improve the scalability of the schemes. In order to 11. Lu D, Dong S, Tao M, et al. A velocity and neighbor
reduce the latency further, few higher-velocity nodes density-based broadcast scheme in mobile ad hoc net-
are employed to rebroadcast the received message in works. J High Speed Netw 2015; 21(3): 221–235.
12. Tseng YC, Ni SY and Shih EY. Adaptive approaches to
NKVB scheme. It makes NKVB scheme more adapta-
relieving broadcast storms in a wireless multihop mobile
ble to mobile environment. The simulation results show
ad hoc network. IEEE T Comput 2003; 52(5): 545–573.
that the proposed schemes outperform the existing 13. Humoud S, Mackenzie L and Abdulai J. Neighbour-
broadcast schemes in both reliability and overhead, hood-aware counter-based broadcast scheme for wireless
especially in latency. ad hoc networks. In: IEEE GLOBECOM workshops,
New Orleans, LA, 30 November–4 December 2008, pp.1–
Declaration of conflicting interests 6. New York: IEEE.
14. Mohammed A, Ould-Khaoua M, Mackenzie LM, et al.
The author(s) declared no potential conflicts of interest with Probabilistic counter-based route discovery for mobile ad
respect to the research, authorship, and/or publication of this hoc networks. In: Proceedings of international conference
article. on wireless communications and mobile computing, Leip-
zig, 21–24 June 2009, pp.1335–1339. New York: ACM.
Funding 15. Yassein MB, Nimer SF and Al-Dubai AY. A new
The author(s) disclosed receipt of the following financial sup- dynamic counter-based broadcasting scheme for mobile
port for the research, authorship, and/or publication of this ad hoc networks. Simul Model Pract Th 2011; 19(1):
article: This work is supported by National Natural Science 553–563.
Foundation (NNSF) of China (61300198 and 61070092), and 16. Liarokapis D and Shahrabi A. Fuzzy-based probabilistic
by Guangdong Natural Science Foundation (2015A030 broadcasting in mobile ad hoc networks. In: IFIP wireless
308017) and Guangdong Science and Technology Key Project days, Niagara Falls, ON, Canada, 10–12 October 2011,
(2015B010131009). pp.1–6. New York: IEEE.
17. Liarokapis D, Shahrabi A and Komninos A. DibA: an
References adaptive broadcasting scheme in mobile ad hoc networks.
1. Reina DG, Toral SL and Johnson P. A survey on prob- In: Seventh annual communication networks and services
abilistic broadcast schemes for wireless ad hoc networks. research conference, Moncton, NB, Canada, 11–13 May
Ad Hoc Netw 2015; 25: 263–292. 2009, pp.224–231. New York: IEEE.
2. Tseng YC, Ni SY, Chen YS, et al. The broadcast storm 18. Gang W, Shigang W, Cai L, et al. Research and realiza-
problem in a mobile ad hoc network. Wirel Netw 2002; tion on improved MANET distance broadcast algorithm
8(2): 153–167. based on percolation theory. In: International conference
3. Obraczka K, Viswanath K, Tsudik G, et al. Flooding for on industrial control and electronics engineering, Xi’an,
reliable multicast in multi-hop ad hoc networks. Wirel China, 23–25 August 2012, pp.96–99. New York: IEEE.
Netw 2001; 7(6): 64–71. 19. Kokuti A and Simon V. Adaptive multihop broadcast
4. Jetcheva J, Hu Y, Maltz D, et al. A simple protocol for protocols for ad hoc networks. In: 8th international sym-
multicast and broadcast in mobile ad hoc networks posium on communication systems, networks & digital sig-
(internet-draft), IETF MANET working group, 2001, nal processing, Poznan, 18–20 July 2012, pp.1–6. New
https://tools.ietf.org/html/draft-ietf-manet-simple-mbcast-01 York: IEEE.
5. Williams B and Camp T. Comparison of broadcasting 20. Banerjee A, Foh CH, Yeo CK, et al. Performance
techniques for mobile ad hoc networks. In: Proceedings improvements for network-wide broadcast with instanta-
of the 3rd ACM international symposium on mobile ad hoc neous network information. J Netw Comput Appl 2012;
networking and computing, Lausanne, 9–11 June 2002, 35(3): 1162–1174.
pp.194–205. New York: ACM. 21. Slavik M and Mahgoub I. Spatial distribution and chan-
6. Ruiz P and Bouvry P. Survey on broadcast algorithms nel quality adaptive protocol for multihop wireless broad-
for mobile ad hoc networks. ACM Comput Surv 2015; cast routing in VANET. IEEE T Mobile Comput 2013;
48(1): 1–35. 12(4): 722–734.
14 International Journal of Distributed Sensor Networks

22. Mostafa A, Vegni AM and Agrawal DP. A probabilistic 33. Woon W and Yeung KL. Variable power broadcasting
routing by using multi-hop retransmission forecast with based on local information for source-dependent broad-
packet collision-aware constraints in vehicular networks. casting protocols. In: IEEE wireless communications and
Ad Hoc Netw 2014; 14(3): 118–129. networking conference, Cancun, Mexico, 28–31 March
23. Liu X, Yu Y, Zheng Y, et al. Distance and cooperation 2011, pp.796–801. New York: IEEE.
based broadcast in wireless ad hoc networks. L N Inst 34. Stojmenovic I, Khan A and Zaguia N. Broadcasting with
Comp Sci So 2017; 177: 168–178. seamless transition from static to highly mobile wireless
24. Bako B, Kargl F, Schoch E, et al. Advanced adaptive ad hoc, sensor and vehicular networks. Int J Parall Emer
gossiping using 2-hop neighborhood information. In: Distrib Syst 2012; 27(3): 225–234.
Global telecommunications conference, New Orleans, LO, 35. Schleich J, Thi H and Bouvry P. Solving the minimum
30 November–4 December 2008, pp.1–6. New York: M-dominating set problem by a continuous optimization
IEEE. approach based on DC programming and DCA. J Comb
25. Wang Q, Shi H and Qi Q. A dynamic probabilistic broad- Optim 2012; 24(4): 397–412.
casting scheme based on cross-layer design for manets. 36. Li D, Kim D, Zhu Q, et al. Minimum total communica-
Int J Mod Educ Comput Sci 2010; 2(1): 40–47. tion power connected dominating set in wireless net-
26. Wu C and Li C. Intelligent broadcast in wireless ad hoc works. In: 7th international conference on wireless
networks using live packet information. In: 9th interna- algorithms, systems, and applications, Yellow Mountains,
tional conference on information, communications and sig- China, 8–10 August 2012, pp.132–141. Berlin: Springer.
nal processing, Tainan, China, 10–13 December 2013, 37. Ros FJ, Ruiz PM and Stojmenovi I. Acknowledgment-
pp.1–5. New York: IEEE. based broadcast protocol for reliable and efficient data
27. Zhang X, Wang E, Xia J, et al. A neighbor coverage- dissemination in vehicular ad hoc networks. IEEE T
based probabilistic rebroadcast for reducing routing over- Mobile Comput 2012; 11(1): 33–46.
head in mobile ad hoc networks. IEEE T Mobile Comput 38. Khabbazian M, Blake I and Bhargava V. Local broad-
2013; 12(3): 424–433. cast algorithms in wireless ad hoc networks: reducing the
28. Banerjee S, Misra A, Yeo J, et al. Energy-efficient broad- number of transmissions. IEEE T Mobile Comput 2012;
cast and multicast trees for reliable wireless communica- 11(3): 402–413.
tion. In: IEEE wireless communications and networking 39. Haas ZJ and Nikolov MV. Towards optimal broadcast
conference, New Orleans, LA, 16–20 March 2003, in wireless networks. IEEE T Mobile Comput 2015; 14(7):
pp.660–667. New York: IEEE. 213–222.
29. Ruiz P, Dorronsoro B, Bouvry P, et al. Information dis- 40. Kok GX, Chow CO and Ishii H. Reducing broadcast
semination in VANETs based upon a tree topology. Ad redundancy in wireless ad-hoc networks with implicit
Hoc Netw 2012; 10(1): 111–127. coordination among forwarding nodes. Wireless Pers
30. Chen F and Kao J. Game-based broadcast over reliable Commun 2015; 81(1): 253–278.
and unreliable wireless links in wireless multihop net- 41. Nowak S, Nowak M and Grochla K. Global queue prun-
works. IEEE T Mobile Comput 2013; 12(8): 1613–1624. ing method for efficient broadcast in multihop wireless
31. Duc TL, Le DT, Zalyubovskiy VV, et al. Towards broad- networks. Commun Comput Inf Sci 2016; 659: 214–224.
cast redundancy minimization in duty cycled wireless sen- 42. Xue F and Kumar PR. The number of neighbors needed
sor networks. Int J Commun Syst 2017; 30(6): e3108. for connectivity of wireless networks Wirel Netw 2004;
32. Liu H, Wan P, Jia X, et al. Efficient flooding scheme 10(2): 169–181.
based on 1-hop information in mobile ad hoc networks. 43. Grossglauser M and Tse D. Mobility increases the capac-
In: 25th IEEE international conference on computer com- ity of ad hoc wireless networks. IEEE ACM T Netw 2002;
munications, Barcelona, 23–29 April 2006, pp.1–12. New 10(4): 477–486.
York: IEEE. 44. NS2, http://www.isi.edu/nsnam/ns

Você também pode gostar