Course Hero Logo

Protocols a 100 reliable broadcast is unnecessary in

This preview shows page 104 - 107 out of 663 pages.

protocols), a 100% reliable broadcast is unnecessary.In addition, we assume that a MH can detect duplicate broadcastmessages, as this is essential to prevent endless flooding of a message.One way to do so is to associate a tuple (source ID, sequence number)with each broadcast message as in the case of DSR and AODV.Here, we focus on the flooding behavior in a MANET - thephenomenon where the transmission of a packet will trigger othersurrounding MHs to transmit the same (or modified) packet. We shallshow that if flooding is used blindly, many redundant messages will besent and serious contention/collision will be incurred.3.2.2 Flooding-Generated Broadcast StormAstraightforward approach to perform broadcast is by flooding. AMH, on receiving a broadcast message for the first time, has theobligation to rebroadcast the message. Clearly, this costsntransmissionsin a network ofnMHs. In a CSMA/CA network, drawbacks of floodinginclude:Redundant rebroadcasts:When a MH decides to rebroadcast abroadcast message to its neighbors, all its neighbors already have themessage;Contention:After a MH broadcasts a message, if many of itsneighbors decide to rebroadcast the message, these transmissions(which are all from nearby MHs) may severely contend with eachother;Collision:Because of the deficiency of backoff mechanism, the lackof RTS/CTS handshake in broadcasts, and the absence of collisiondetection (CD), collisions are more likely to occur and cause moredamage.
Chapter 3: Broadcasting, Multicasting and Geocasting85Figure 3.1 - The broadcast storm problem in a MANET with 13 nodes(average degree is 2.6)As we have mentioned before, the collection of these drawbacks isreferred to as thebroadcast storm problem.Figure 3.1 exemplifies thebroadcast storm problem, where node S initiates a route request to nodeD through a flooding. As we can see, flooding is highly redundant. Eachnode receives the route requestdegreetimes, and the route requestpropagates far beyond node D. Because nearby nodes will receive andrebroadcast the route request at nearly the same time, contention (whensenders can hear each other) and collision (when senders cannot heareach other) will be common.3.2.3 Redundancy AnalysisThe main reason for redundancy is that radio signals from differenttransceivers may negatively overlap with each other. Let us consider twoexamples to illustrate the effects of redundancy, where we denote node Sis the source of the broadcast and node D as the "last" node to receive thebroadcast. In Figure 3.2(a), it only takes two transmissions for node D tobroadcast a message whereas four transmissions will be carried out if noattempt is made to reduce this redundancy. Figure 3.2(b) presents a more
86AD HOC & SENSOR NETWORKS(a)(b)Figure 3.2 - Two optimal broadcasts in a MANET. The links represent the connectivityamong the nodes. Node S is the source and node D is the "last" network node[Taken from Nil999]serious scenario where only two transmissions are sufficient to completea broadcast as opposed to a total of seven transmissions generated if

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 663 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
N/A
Tags
Computer network, Ad Hoc Networks

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture