Probabilistic counter-Based route discovery for mobile Ad hoc networks

Aminu Mohammed, Mohamed Ould-Khaoua, Lewis M. Mackenzie, Colin Perkins, Jamal Deen Abdulai

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

21 Citations (Scopus)

Abstract

Conventional on-demand route discovery for ad hoc routing protocols extensively use simple flooding, which could potentially lead to high channel contention, causing redundant retransmissions and thus excessive packet collisions in the network. This phenomenon has been shown to greatly increase the network communication overhead and end to end delay. This paper proposes a new probabilistic counter-based method that can significantly reduce the number of RREQ packets transmitted during route discovery operation. Our simulation results reveal that equipping AODV routing protocol with the proposed probabilistic counter-based route discovery method can result in significant performance improvements in terms of routing overhead, MAC collisions and end-to-end delay while still achieving a good throughput.

Original languageEnglish
Title of host publicationProceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009
Pages1335-1339
Number of pages5
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009 - Leipzig
Duration: 21 Jun 200924 Jun 2009

Publication series

NameProceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009

Conference

Conference2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009
Country/TerritoryGermany
CityLeipzig
Period21/06/0924/06/09

Keywords

  • ANETs
  • Broadcast storm
  • Flooding
  • Reactive routing
  • Route discovery
  • Simulation

Fingerprint

Dive into the research topics of 'Probabilistic counter-Based route discovery for mobile Ad hoc networks'. Together they form a unique fingerprint.

Cite this