Skip to main content
Top
Published in: Wireless Personal Communications 1/2017

25-05-2017

An Opportunistic Routing Protocol for Mobile Ad Hoc Networks Based on Stable Ideology

Authors: Yun-zheng Ding, Yi-cheng Li, Yuan-chun Xu, Yong-zheng Zhou, Yi-lai Zhang

Published in: Wireless Personal Communications | Issue 1/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In mobile ad hoc networks (MANETs), traditional routing protocols send packets along pre-determined paths which are vulnerable in dealing with unreliable and unpredictable wireless medium. The main difference between the opportunistic routing and the traditional routing is that the former can employ several lossy broadcast links to support a reliable transmission. In order to improve the performance of opportunistic routing, nowadays, the tendency is to blend the idea of stable routing into opportunistic routing algorithms more or less. Just based on this ideology, this paper presents a stable ideology-based opportunistic routing (SIOR) for MANETs. Different from the existing protocols for MANETs, in SIOR, the stable ideology is infused into every step. In this paper, SIOR is described in detail around three issues of opportunistic routing. The first issue is how to select the forwarders among the neighbors; the second one is how to communicate among these forwarders to select a relay; the last one is how and when to relay the packets. The novel contribution of this paper is in dealing with the third issue. The ultimate target is to adapt SIOR to the mobility of MANETs. And then, the theory analysis is depicted on the basis of probability theory to compare SIOR with several relevant mechanisms. Finally, we have implemented simulation experiments. The simulation results show SIOR has prominent performance than other relevant protocols.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ad, M., Perkins, C. E., & Das, S. R. (2000). Ad hoc on-demand distance vector (AODV) routing. In IETF RFC (p. 90). Ad, M., Perkins, C. E., & Das, S. R. (2000). Ad hoc on-demand distance vector (AODV) routing. In IETF RFC (p. 90).
2.
go back to reference Biswas, S., & Morris, R. (2005). ExOR: opportunistic multi-hop routing for wireless networks. In ACM SIGCOMM computer communication review (Vol. 35, pp. 133–144), ACM. Biswas, S., & Morris, R. (2005). ExOR: opportunistic multi-hop routing for wireless networks. In ACM SIGCOMM computer communication review (Vol. 35, pp. 133–144), ACM.
3.
go back to reference Cacciapuoti, A. S., Caleffi, M., & Paura, L. (2009). A theoretical model for opportunistic routing in ad hoc networks. In International conference on ultra modern telecommunications and workshops (pp. 1–7). Cacciapuoti, A. S., Caleffi, M., & Paura, L. (2009). A theoretical model for opportunistic routing in ad hoc networks. In International conference on ultra modern telecommunications and workshops (pp. 1–7).
4.
go back to reference Cacciapuoti, A. S., Caleffi, M., & Paura, L. (2010). Optimal constrained candidate selection for opportunistic routing. In Global telecommunications conference (pp. 1–5). Cacciapuoti, A. S., Caleffi, M., & Paura, L. (2010). Optimal constrained candidate selection for opportunistic routing. In Global telecommunications conference (pp. 1–5).
5.
go back to reference Cerdà-Alabern, L., Darehshoorzadeh, A., & Pla, V. (2013). Optimum node placement in wireless opportunistic routing networks. Ad Hoc Networks, 11(8), 2273–2287.CrossRef Cerdà-Alabern, L., Darehshoorzadeh, A., & Pla, V. (2013). Optimum node placement in wireless opportunistic routing networks. Ad Hoc Networks, 11(8), 2273–2287.CrossRef
6.
go back to reference Chachulski, S., Jennings, M., Katti, S., & Katabi, D. (2007). Trading structure for randomness in wireless opportunistic routing (vol. 37), ACM. Chachulski, S., Jennings, M., Katti, S., & Katabi, D. (2007). Trading structure for randomness in wireless opportunistic routing (vol. 37), ACM.
7.
go back to reference De Couto, D. S., Aguayo, D., Bicket, J., & Morris, R. (2005). A high-throughput path metric for multi-hop wireless routing. Wireless Networks, 11(4), 419–434.CrossRef De Couto, D. S., Aguayo, D., Bicket, J., & Morris, R. (2005). A high-throughput path metric for multi-hop wireless routing. Wireless Networks, 11(4), 419–434.CrossRef
8.
go back to reference Ding, Y., Xu, M., Tian, Y., Li, H., & Liu, B. (2016). A BER and 2-hop routing information-based stable geographical routing protocol in manets for multimedia applications. Wireless Personal Communications, 90(1), 3–32.CrossRef Ding, Y., Xu, M., Tian, Y., Li, H., & Liu, B. (2016). A BER and 2-hop routing information-based stable geographical routing protocol in manets for multimedia applications. Wireless Personal Communications, 90(1), 3–32.CrossRef
9.
go back to reference Dubois-Ferrière, H., Grossglauser, M., & Vetterli, M. (2011). Valuable detours: Least-cost anypath routing. IEEE/ACM Transactions on Networking, 19(2), 333–346.CrossRef Dubois-Ferrière, H., Grossglauser, M., & Vetterli, M. (2011). Valuable detours: Least-cost anypath routing. IEEE/ACM Transactions on Networking, 19(2), 333–346.CrossRef
10.
go back to reference Heissenbüttel, M., Braun, T., Bernoulli, T., & WäLchli, M. (2004). BLR: beacon-less routing algorithm for mobile ad hoc networks. Computer Communications, 27(11), 1076–1086.CrossRef Heissenbüttel, M., Braun, T., Bernoulli, T., & WäLchli, M. (2004). BLR: beacon-less routing algorithm for mobile ad hoc networks. Computer Communications, 27(11), 1076–1086.CrossRef
11.
go back to reference Hsu, C. J., Liu, H. I., & Seah, W. (2009). Economy: A duplicate free opportunistic routing. In Proceedings of the 6th international conference on mobile technology, application & systems (p. 17). ACM. Hsu, C. J., Liu, H. I., & Seah, W. (2009). Economy: A duplicate free opportunistic routing. In Proceedings of the 6th international conference on mobile technology, application & systems (p. 17). ACM.
12.
go back to reference Hsu, C. J., Liu, H. I., & Seah, W. K. G. (2011). Opportunistic routing—A review and the challenges ahead. Computer Networks, 55(15), 3592–3603.CrossRef Hsu, C. J., Liu, H. I., & Seah, W. K. G. (2011). Opportunistic routing—A review and the challenges ahead. Computer Networks, 55(15), 3592–3603.CrossRef
13.
go back to reference Jie, Z., Huang, C., Xu, L., Wang, B., Yang, W., & Chen, X. (2013). Opportunistic unicast and multicast routing protocol for vanet. Journal of Software Engineering and Applications, 06(6), 319–327.CrossRef Jie, Z., Huang, C., Xu, L., Wang, B., Yang, W., & Chen, X. (2013). Opportunistic unicast and multicast routing protocol for vanet. Journal of Software Engineering and Applications, 06(6), 319–327.CrossRef
14.
go back to reference Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In Mobile computing (pp. 153–181). Springer. Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In Mobile computing (pp. 153–181). Springer.
15.
go back to reference Karp, B., & Kung, H. T. (2000). GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 243–254). ACM. Karp, B., & Kung, H. T. (2000). GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 243–254). ACM.
16.
go back to reference Katti, S., Rahul, H., Hu, W., Katabi, D., Médard, M., & Crowcroft, J. (2006). XORs in the air: Practical wireless network coding. In: ACM SIGCOMM computer communication review (Vol. 36, pp. 243–254). ACM. Katti, S., Rahul, H., Hu, W., Katabi, D., Médard, M., & Crowcroft, J. (2006). XORs in the air: Practical wireless network coding. In: ACM SIGCOMM computer communication review (Vol. 36, pp. 243–254). ACM.
17.
go back to reference Ko, Y. B., & Vaidya, N. H. (2000). Location-aided routing (LAR) in mobile ad hoc networks. Wireless Networks, 6(4), 307–321.CrossRefMATH Ko, Y. B., & Vaidya, N. H. (2000). Location-aided routing (LAR) in mobile ad hoc networks. Wireless Networks, 6(4), 307–321.CrossRefMATH
18.
go back to reference Liu, H., Zhang, B., Mouftah, H., Shen, X., & Ma, J. (2009). Opportunistic routing for wireless ad hoc and sensor networks: Present and future directions. IEEE Communications Magazine, 47(12), 103–109.CrossRef Liu, H., Zhang, B., Mouftah, H., Shen, X., & Ma, J. (2009). Opportunistic routing for wireless ad hoc and sensor networks: Present and future directions. IEEE Communications Magazine, 47(12), 103–109.CrossRef
19.
go back to reference Lu, M., & Wu, J. (2009). Opportunistic routing algebra and its applications. In INFOCOM (pp. 2374–2382). Lu, M., & Wu, J. (2009). Opportunistic routing algebra and its applications. In INFOCOM (pp. 2374–2382).
20.
go back to reference Luk, C. P., Lau, W. C., & Yue, O. C. (2008). An analysis of opportunistic routing in wireless mesh network. In IEEE international conference on communications, 2008. ICC’08 (pp. 2877–2883), IEEE. Luk, C. P., Lau, W. C., & Yue, O. C. (2008). An analysis of opportunistic routing in wireless mesh network. In IEEE international conference on communications, 2008. ICC’08 (pp. 2877–2883), IEEE.
21.
go back to reference Mazumdar, A. P., & Sairam, A. S. (2013). TOAR: Transmission-aware opportunistic ad hoc routing protocol. EURASIP Journal on Wireless Communications and Networking, 2013(1), 1–19.CrossRef Mazumdar, A. P., & Sairam, A. S. (2013). TOAR: Transmission-aware opportunistic ad hoc routing protocol. EURASIP Journal on Wireless Communications and Networking, 2013(1), 1–19.CrossRef
22.
go back to reference Rozner, E., Seshadri, J., Mehta, Y., & Qiu, L. (2009). SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks. IEEE Transactions on Mobile Computing, 8(12), 1622–1635.CrossRef Rozner, E., Seshadri, J., Mehta, Y., & Qiu, L. (2009). SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks. IEEE Transactions on Mobile Computing, 8(12), 1622–1635.CrossRef
23.
go back to reference Tahooni, M., Darehshoorzadeh, A., & Boukerche, A. (2014). Mobility-based opportunistic routing for mobile ad-hoc networks. In: ACM symposium on performance evaluation of wireless ad hoc, sensor, ubiquitous networks (pp. 9–16). Tahooni, M., Darehshoorzadeh, A., & Boukerche, A. (2014). Mobility-based opportunistic routing for mobile ad-hoc networks. In: ACM symposium on performance evaluation of wireless ad hoc, sensor, ubiquitous networks (pp. 9–16).
24.
go back to reference Wang, Z., Chen, Y., & Li, C. (2011). A new loop-free proactive source routing scheme for opportunistic data forwarding in wireless networks. IEEE Communications Letters, 15(11), 1184–1186.CrossRef Wang, Z., Chen, Y., & Li, C. (2011). A new loop-free proactive source routing scheme for opportunistic data forwarding in wireless networks. IEEE Communications Letters, 15(11), 1184–1186.CrossRef
25.
go back to reference Wang, Z., Chen, Y., & Li, C. (2012). CORMAN: A novel cooperative opportunistic routing scheme in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 30(2), 289–296.CrossRef Wang, Z., Chen, Y., & Li, C. (2012). CORMAN: A novel cooperative opportunistic routing scheme in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 30(2), 289–296.CrossRef
26.
go back to reference Wang, Z., Li, C., & Chen, Y. (2011). PSR: Proactive source routing in mobile ad hoc networks. In IEEE Communications society (pp. 1–6). Wang, Z., Li, C., & Chen, Y. (2011). PSR: Proactive source routing in mobile ad hoc networks. In IEEE Communications society (pp. 1–6).
27.
go back to reference Yang, W., Yang, X., Yang, S., & Yang, D. (2011). A greedy-based stable multi-path routing protocol in mobile ad hoc networks. Ad Hoc Networks, 9(4), 662–674.CrossRef Yang, W., Yang, X., Yang, S., & Yang, D. (2011). A greedy-based stable multi-path routing protocol in mobile ad hoc networks. Ad Hoc Networks, 9(4), 662–674.CrossRef
28.
go back to reference Yu, K. M., Yu, C. W., & Yan, S. F. (2011). An ad hoc routing protocol with multiple backup routes. Wireless Personal Communications, 57(4), 533–551.CrossRef Yu, K. M., Yu, C. W., & Yan, S. F. (2011). An ad hoc routing protocol with multiple backup routes. Wireless Personal Communications, 57(4), 533–551.CrossRef
29.
go back to reference Zeng, K., Lou, W., & Zhai, H. (2008). Capacity of opportunistic routing in multi-rate and multi-hop wireless networks. IEEE Transactions on Wireless Communications, 7(12), 5118–5128.CrossRef Zeng, K., Lou, W., & Zhai, H. (2008). Capacity of opportunistic routing in multi-rate and multi-hop wireless networks. IEEE Transactions on Wireless Communications, 7(12), 5118–5128.CrossRef
30.
go back to reference Zhen, Y., Wu, M. Q., Su, J. F., Xu, C. X., et al. (2010). A priority based opportunistic routing mechanism for real-time voice service in mobile ad hoc networks. Wireless personal communications, 55(4), 501–523.CrossRef Zhen, Y., Wu, M. Q., Su, J. F., Xu, C. X., et al. (2010). A priority based opportunistic routing mechanism for real-time voice service in mobile ad hoc networks. Wireless personal communications, 55(4), 501–523.CrossRef
Metadata
Title
An Opportunistic Routing Protocol for Mobile Ad Hoc Networks Based on Stable Ideology
Authors
Yun-zheng Ding
Yi-cheng Li
Yuan-chun Xu
Yong-zheng Zhou
Yi-lai Zhang
Publication date
25-05-2017
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2017
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4506-7

Other articles of this Issue 1/2017

Wireless Personal Communications 1/2017 Go to the issue