Full Paper View Go Back

A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks

Deepesh Tamrakar1 , Sreshtha Bhattacharya2 , Shitanshu Jain3

Section:Research Paper, Product Type: Journal
Vol.2 , Issue.2 , pp.1-5, Mar-2014

Online published on Apr 30, 2014


Copyright © Deepesh Tamrakar, Sreshtha Bhattacharya , Shitanshu Jain . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Deepesh Tamrakar, Sreshtha Bhattacharya , Shitanshu Jain, “A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks,” International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.2, pp.1-5, 2014.

MLA Style Citation: Deepesh Tamrakar, Sreshtha Bhattacharya , Shitanshu Jain "A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks." International Journal of Scientific Research in Network Security and Communication 2.2 (2014): 1-5.

APA Style Citation: Deepesh Tamrakar, Sreshtha Bhattacharya , Shitanshu Jain, (2014). A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks. International Journal of Scientific Research in Network Security and Communication, 2(2), 1-5.

BibTex Style Citation:
@article{Tamrakar_2014,
author = {Deepesh Tamrakar, Sreshtha Bhattacharya , Shitanshu Jain},
title = {A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {3 2014},
volume = {2},
Issue = {2},
month = {3},
year = {2014},
issn = {2347-2693},
pages = {1-5},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=132},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=132
TI - A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Deepesh Tamrakar, Sreshtha Bhattacharya , Shitanshu Jain
PY - 2014
DA - 2014/04/30
PB - IJCSE, Indore, INDIA
SP - 1-5
IS - 2
VL - 2
SN - 2347-2693
ER -

3582 Views    3425 Downloads    3436 Downloads
  
  

Abstract :
Ad-hoc wireless network is a Collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Neighbor discovery is an important part of many protocols for wireless adhoc networks, including localization and routing. When neighbor discovery fails, communications and protocols performance deteriorate. Broadcasting is a common operation in a network to resolve many issues. In a mobile ad hoc network (MANET) in particular, due to host mobility, such operations are expected to be executed more frequently such as finding a route to a particular host, paging a particular host. Probabilistic broadcasting is best suited in terms of ad hoc network which is well known for its decentralized network nature and Binary exponential Back off (BEB) algorithm stated in the 802.11 standard plays an important role in the distributed coordinate function (DCF), which is provided at the medium access control (MAC) layer of the IEEE 802.11 standard. BEB might introduce long transmission delays without any significant benefit in respect of contention resolution due to node mobility. In fact, contending mobiles are likely to move to a different location during a large waiting time for retransmission after a packet collision and might get involved into another independent collision process elsewhere. Thus, the large growth rate in waiting time might not be appropriate in a mobile scenario as in a WLAN. Bearing this in mind, we propose certain modifications to BEB algorithm suitable for WLANs.

Key-Words / Index Term :
DCF, MAC, CSMA/CA, BEB, MANET, Broadcast Redundancy, Flooding, Probability Based Scheme

References :
[1]. The Broadcast Storm Problem in a Mobile Ad Hoc Network, Sze-Yao Ni, Yu-Chee Tseng, Yuh-Shyan Chen, and Jang-Ping Sheu,1999.
[2]. A Probabilistic Algorithm for Reducing Broadcast Redundancy in Ad Hoc Wireless Networks, Md. Nazrul Islam 2013.
[3]. Sakshi Suhane, Dr. Sanjeev Sharma, Prof. Varsha Sharma. Performance Analysis of Backoff Algorithm in IEEE 802.11 Networks,June 2011.
[4]. Probabilistic Broadcasting Protocol In AD HOC Network And Its Advancement: A Review Tasneem Bano1, Jyoti Singhai2, November 2010.
[5]. Secure neighbor discovery and wormhole localization in mobile ad hoc networks,
Radu Stoleru, Haijie Wu, Harsha Chenji, 2012.
[6]. Dynamic Security Scheme for Multicast Source Authentication (Karan Singh, Rama Shankar Yadav, 2010.
[7]. Secure neighbor discovery and wormhole localization in mobile ad hoc networks (Radu Stoleru, Haijie Wu, Harsha Chenji, 2006.
[8]. Routing Security in Ad Hoc Wireless Network (Scott Huang, DavidMacCallum, 2005.
[9]. S. Chang, M. Dworkin, Workshop Report, The First Cryptographic Hash Workshop, Report prepared, NIST 2005.
[10]. S.Vaudenay “A Classical Introduction to Cryptography Applications for Communications Security” Springer, 2006.
[11]. E. Biham, R. Chen, A. Joux, P. Carribault, W. Jalby and C. Lemuet. “Collisions in SHA-0 and Reduced SHA-1- In Advances in Cryptology” – Eurocrypt’05, Springer-Verlag, 2005.
[12]. IEEE 802.11 standard, “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,” IEEE Std,June 1999.
[13]. C. Rama Krishna, Saswat Chakrabarti, and Debasish Dutta, “A modified backoff algorithm for IEEE 802.11 DCF based MAC protocol in a Mobile Ad-Hoc Network”, TENCON 2004.
[14]. Yunli Chen, Qing-An Zeng, Dharma P. Agrawal, “Performance analysis and enhancement for IEEE 802.11 MAC protocol”, ICT2003. 10th International Conference on Telecommunications, 2003, Volume 1, 23 Feb. - 1 March 2003.
[15]. Broadcast in Ad Hoc Networks, ustin Lipman, Hai Liu, and Ivan Stojmenovic, 2009.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation