SlideShare a Scribd company logo
A SIMULATION-BASED PERFORMANCE
COMPARISON OF MANETS CDS CREATION
ALGORITHMS USING IDEAL MAC AND IEEE
802.11 MAC
Khalid A. Almahorg1, Mohamed S. Elbuni2, Elmahdi M. Abousetta3,
Ahmed Arara4
1

Department of Computer Engineering, University of Tripoli, Tripoli-Libya

2

Department of Computer Engineering, University of Tripoli, Tripoli-Libya

3

Department of Computer Engineering, University of Tripoli, Tripoli-Libya

4

Department of Computer Engineering, University of Tripoli, Tripoli-Libya

khalid.almahrog@gmail.com
mselbuni@gmail.com
drelmahdiabousetta@gmail.com
ahmedarara@yahoo.fr

ABSTRACT
Mobile Ad Hoc networks (MANETs) are gaining increased interest due to their wide range of
potential applications in civilian and military sectors. The self-control, self-organization,
topology dynamism, and bandwidth limitation of the wireless communication channel make
implementation of MANETs a challenging task. The Connected Dominating Set (CDS) has been
proposed to facilitate MANETs realization. Minimizing the CDS size has several advantages;
however, this minimization is NP complete problem; therefore, approximation algorithms are
used to tackle this problem. The fastest CDS creation algorithm is Wu and Li algorithm;
however, it generates a relatively high signaling overhead. Utilizing the location information of
network members reduces the signaling overhead of Wu and Li algorithm. In this paper, we
compare the performance of Wu and Li algorithm with its Location-Information-Based version
under two types of Medium Access Control protocols, and several network sizes. The MAC
protocols used are: a virtual ideal MAC protocol, and the IEEE 802.11 MAC protocol. The use
of a virtual ideal MAC enables us to investigate how the real-world performance of these
algorithms deviates from their ideal-conditions counterpart. The simulator used in this research
is the ns-2 network simulator.

KEYWORDS
Network Protocols, Ad Hoc Networks, Mobile Networks, Network Simulator

1. INTRODUCTION
The multi-hop radio packet networks, also known as mobile Ad Hoc networks (MANETs), are
proposed by researchers to allow for the instantaneous creation of reconfigurable temporary
wireless communications networks. As the name implies, MANETs are created by the mobile
hosts, a.k.a. nodes, on an Ad Hoc basis without any support or administration provided by any
Sundarapandian et al. (Eds) : ICAITA, SAI, SEAS, CDKP, CMCA-2013
pp. 55–64, 2013. © CS & IT-CSCP 2013

DOI : 10.5121/csit.2013.3806
Computer Science & Information Technology (CS & IT)

56

fixed or pre-installed communications infrastructure. The self-control, self-organization, and Ad
Hoc properties make MANETs applicable in both civilian and military sectors. Their applications
range from providing temporary and instantly deployable communications networks in
conference rooms, class rooms, and exhibitions to providing reliable inter-vehicle
communications, and communications networks in rural areas, devastated areas, and battle fields
[1].
Along with their attractive properties, MANETs have other properties that make their realization
a challenging task. Due to the mobile nature and the limited transmission ranges of MANETs’
nodes, communication links between nodes are established and torn down in unpredictable
fashion; therefore, MANETs are characterized by dynamic topologies. The self- control property,
a powerful feature of MANETs, obliges nodes to perform routing and other network
administrative tasks cooperatively. The routing algorithms used in traditional wired networks
generate a huge amount of overhead traffic in order to discover and maintain routes in such
dynamic topologies. The limited bandwidth of the wireless channel renders all these algorithms
non-feasible for MANETs routing.
The Connected Dominating Set (CDS), a.k.a. virtual backbone or spine, is a proposed solution for
routing, broadcasting, and establishing a dynamic infrastructure for distributed location databases
in MANETs [5], [8], [11], [12]. Minimizing the CDS cardinality simplifies the MANET’s
abstracted topology, allows for using shorter routes, and reduces the total number of
retransmissions in broadcasting scenarios. It is proven that finding the minimum CDS (MCDS) in
general graphs is NP-complete [7]; therefore, approximation algorithms and heuristics are used to
tackle this problem.
The literature is rich of many CDS approximation algorithms competing in terms of CDS size,
running time, and signaling overhead [3], [6], [9], [10], [12], [14], [16]. It has been reported that,
among all competing algorithms, localized CDS creation algorithms are the fastest and the
lightest in terms of signaling overhead [2]. Examples of these algorithms are Wu and Li algorithm
[9], the MPR algorithm [13], and Alzoubi algorithm [4]. The simplest and the fastest among all
these algorithms is Wu and Li algorithm; however, this algorithm has a relatively high signalling
overhead. To reduce the signaling overhead, proposals were made that are based on utilizing
nodes’ location information [11], [20].
In this paper we compare the performance of the original Wu and Li algorithm [9] with that of its
Location-Information-Based version given in [20] under two different types of Medium Access
Control protocols (MAC protocols) and several network sizes. The MAC protocols used are: a
virtual ideal MAC protocol, and the IEEE 802.11 MAC protocol [21]. While the ideal MAC
protocol adheres to the design assumption made by the algorithms designers regarding the
guaranteed delivery of broadcasted packets, the IEEE 802.11 MAC violates this assumption since
broadcasted packets may not be correctly delivered due to packet collisions. The use of a virtual
ideal MAC gives us the ability to investigate how the real-world performance of these algorithms
deviates from their ideal-conditions counterpart.
The rest of this paper is organized as follows: Section 2 gives a description of the working
mechanics of Wu and Li algorithm [9] and its Location-Information-Based version [20]. Section
3 deals with the experiment setup. In section 4, the results are presented and discussed. Finally,
section 5 concludes this paper.
57

Computer Science & Information Technology (CS & IT)

2. ALGORITHMS DESCRIPTION
This section gives a description of the CDS creation and maintenance mechanisms of the studied
algorithms.

2.1. Wu and Li Algorithm
Initially the CDS is empty. Every node starts by broadcasting a list that contains the identities of
its 1-hop neighbors. Exchanging this information with neighbors allows every node to know the
identities of all nodes in its 2-hop neighborhood and the connections among its 1-hop neighbors.
Based on this knowledge, every node decides whether to join the CDS or not and it informs its
neighbors about this decision. A node, आ, joins the CDS if it has at least two neighbors that are
not directly connected to each other. After receiving the decisions of all its neighbors, a CDS
member, υ, makes its final decision regarding whether to withdraw from the CDS or not, and it
informs its neighbors about this decision. υ withdraws from the CDS in one of two cases; the first
case is when υ has a neighbor u such that N[υ] ⊆ N[u] and id(υ) < id(u), where N[υ] is the closed
1-hop neighborhood of node υ and id(υ) is υ’s ID; the other case is when υ has two neighbors u
and w such that u and w are directly connected and N[υ] ⊆ N[u] ∪ N[w] and id(υ) = min(id(υ),
id(u), id(w)). To maintain the CDS in face of topology changes, every node, आ, exchanges its 1hop neighborhood information with its neighbors whenever it discovers a topology change. Every
node u ∈ N[आ] updates its role according to the connectivity of its current 1-hop neighborhood by
applying the rules explained above.

2.2. Location-Information-Based Wu and Li Algorithm
To reduce the signaling overhead of Wu and Li algorithm, Stojmenovic et al. proposed that nodes
have to broadcast their location information, i.e. X and Y coordinates, instead of broadcasting
their lists of neighbors [11]. Using the location information of its neighbors, a node, आ, can
discover if any two of its neighbors are directly connected or not; nodes u and w are directly
connected if the Euclidean distance between them is shorter than the transmission range;
otherwise, they are not connected; however, in [20], it was shown that utilizing the location
information does not guarantee the reduction of signaling overhead. The argument made in [20] is
that since the node ID is a four-byte integer number while its location information, i.e. its X and
Y coordinates, is two eight-byte floating point numbers, broadcasting the location information of
a given node is more costly, in terms of signaling overhead, than broadcasting its list of neighbors
if this node has three neighbors or less. Based on this argument, it was shown that in order to
reduce the signaling overhead of Wu and Li algorithm every node has to broadcast its X and Y
coordinates only if it has more than four neighbors; otherwise, it must broadcast its neighbors list.

3. EXPERIMENT SETUP
The simulator used in this study is the ns-2 network simulator [17], a widely used discrete event
simulator targeted at network research. Nodes use Hello messages to discover their neighborhood;
every node broadcasts a Hello message every second. The transmission range of every node is set
to 250 meters. To reduce the effect of the short-live connections that are formed when fast
moving nodes come into the transmission range of each other for very short periods of time, node
υ does not add node u to its neighbors list until it receives the third consecutive Hello message
from u.
The network sizes simulated range from 30 nodes to 100 nodes with increments of 10. The
mobility model used is the Random Waypoint mobility model [18] and a field of 2000 m × 2000
m was used with this model. The speed of movement was uniformly distributed between 20 and
Computer Science & Information Technology (CS & IT)

58

25 m/s. For every network size, two different MAC protocols were used: a virtual ideal MAC
protocol, and the IEEE 802.11 MAC protocol. For every network size and MAC protocol, fifteen
different movement scenarios were simulated. Every simulation lasted for 300 seconds. The
average of the results of every set of fifteen simulations is calculated and used to represent the
algorithm’s performance under the given network size and MAC protocol.

4. EXPERIMENT RESULTS
The results obtained from the conducted simulations are presented in the following figures. These
results include the CDS size, the unicast signaling overhead, the broadcast signaling overhead, the
CDS establishment time, and the total running time.

4.1. The CDS size
The average size of the CDS produced by each algorithm as a function of the network size for
each MAC protocol is given in figures 1 and 2. It can be seen that, in both algorithms, using the
IEEE 802.11 MAC leads to creating smaller CDS compared to that created by using the virtual
ideal MAC. The fact that in broadcasting scenarios the IEEE 802.11 MAC does not eliminate
collisions is the reason for this decrease in CDS size. Losing packets due to collisions prevents
nodes from having accurate knowledge about changes in their 1-hop neighborhood and this
inaccurate knowledge prevents nodes that are supposed to join the CDS from joining it and
decreases the CDS size.

Figure 1. Size of the CDS created by Wu and Li algorithm for different number of nodes and MAC
protocols.
59

Computer Science & Information Technology (CS & IT)

Figure 2. Size of the CDS created by Location-Information-Based Wu and Li algorithm for different
number of nodes and MAC protocols.

4.2. Unicast Signaling Overhead
Unicast signaling refers to messages sent from a sender to a specific receiver. In this type of
signaling, the IEEE 802.11 MAC uses a handshaking mechanism between the sender and the
receiver to avoid collisions; however, this handshaking mechanism does not eliminate collisions
completely, since unicasted packets may collide with packets broadcasted by hidden nodes [19].
Figures 3 and 4 show the average number of bytes unicasted by every node during the CDS
creation and maintenance phases of each algorithm as a function of the network size for each
MAC protocol. It can be noticed that, in both algorithms, using the IEEE 802.11 MAC leads to
generating less unicast signaling compared to that generated by using the virtual ideal MAC. The
fact that the IEEE 802.11 MAC does not eliminate collisions completely is the reason for this
decrease in unicast signaling. Due to collisions, nodes may not get updated about changes in their
1-hop neighborhood; therefore, they do not react to these changes and this leads to generating less
unicast signaling overhead.

4.3. Broadcast Signaling Overhead
Broadcast signaling refers to messages sent from a sender to all its neighbors. In this type of
signaling, the IEEE 802.11 MAC does not use a handshaking mechanism between the sender and
the receiver so that the chances of collisions are high; hence, broadcast signaling is considered a
problematic type of signaling. Figures 5 and 6 show the average number of bytes broadcasted by
every node during the CDS creation and maintenance phases of each algorithm as a function of
the network size for each MAC protocol. It can be noticed that, in both algorithms, using the
IEEE 802.11 MAC leads to generating less broadcast signaling compared to that generated by
using the virtual ideal MAC. This decrease in broadcast signaling overhead is due to lack of
updates about neighborhood changes that results from losing of packets because of collisions.

5. THE CDS ESTABLISHMENT TIME
The CDS establishment time is the time at which every node knows whether it is a CDS member
or not. Figures 7 and 8 show the average CDS establishment time for each algorithm as a
function of network size for each MAC protocol. It can be noticed from these figures that, in both
Computer Science & Information Technology (CS & IT)

60

algorithms, using the IEEE 802.11 MAC leads to longer CDS establishment time compared to the
time spent in CDS establishment by using the virtual ideal MAC. Losing of packets due to
collisions forces nodes to keep waiting for retransmissions of the lost packets and this results in
longer CDS establishment time.

Figure 3. Unicast signaling overhead generated by Wu and Li algorithm for different number of nodes and
MAC protocols.

Figure 4. Unicast signaling generated by Location-Information-Based Wu and Li algorithm for different
network sizes and MAC protocols.
61

Computer Science & Information Technology (CS & IT)

Figure 5. Broadcast signaling overhead generated by Wu and Li algorithm for different number of nodes
and MAC protocols.

6. THE TOTAL RUNNING TIME
The total running time is the time spent during CDS creation and maintenance phases. The
average total time of each algorithm as a function of the network size for each MAC protocol is
shown in figures 9 and 10. Again, we notice that using the IEEE 802.11 MAC leads to longer
total time compared to the time spent by using the virtual ideal MAC, and the reason for this is
the loss of packets due to collisions that keeps nodes waiting for retransmissions of the lost
packets.

Figure 6. Broadcast signaling generated by Location-Information-Based Wu and Li algorithm for different
network sizes and MAC protocols.
Computer Science & Information Technology (CS & IT)

62

Figure 7. Time to establish the CDS by Wu and Li algorithm for
different number of nodes and MAC protocols.

7. CONCLUSION
In this paper the performance of the original Wu and Li algorithm is compared with that of its
Location-Information-Based version under a virtual ideal MAC protocol and the IEEE 802.11
MAC protocol. The performance is measured in terms of CDS size, signaling overhead, and run
time. The results obtained showed that using the IEEE 802.11 MAC protocol leads to smaller
CDS size, lighter signaling overhead, and longer run times compared to those obtained by using
the virtual ideal MAC protocol. The reason of these deviations is the loss of packets due to
collisions. This loss of packets deprives nodes of acquiring accurate knowledge and fast updates
about changes of their 1-hop neighborhoods, this lack of accurate and up-to-date information may
lead nodes to refrain from joining the CDS erroneously, not broadcast information unaware of
neighborhood changes, and spend longer time waiting for information.

Figure 8. Time to establish the CDS by Location-Information-Based Wu and Li algorithm for
different number of nodes and MAC protocols.
63

Computer Science & Information Technology (CS & IT)

Figure 9. Total running time by Wu and Li algorithm for different
number of nodes and MAC protocols.

Figure 10. Total running time by Location-Information-Based Wu and Li algorithm for different number of
nodes and MAC protocols.

REFERENCES
[1]
[2]

[3]
[4]
[5]

C. E. Perkins (2001) Ad Hoc Networking, Addison-Wesley.
S. Basagni, M. Mastrogiovanni, A. Panconesi and C. Petrioli , (2006) “Localized Protocols for Ad
Hoc clustering and Backbone Formation: A Performance Comparison”, IEEE Trans. Parallel Distrib.
Syst., Vol. 17, No. 4, pp292–306.
P. Wan, K. Alzoubi, and O. Frieder, (2004) “Distributed Construction of Connected Dominating Set
in Wireless Ad Hoc Networks”, MONET Vol. 9, No. 2, pp141–149.
K. Alzoubi, (2002) “Virtual Backbones in Wireless Ad Hoc Networks”, PhD thesis, Illinois Institute
of Technology.
R. Sivakumar, P.Sinha, and V. Bharghavan, (1999) “CEDAR: A Core-Extraction Distributed Ad Hoc
Routing Algorithm”, IEEE Journal on Selected Areas in Communications, Vol. 17, pp1454–1465.
Computer Science & Information Technology (CS & IT)
[6]

[7]
[8]
[9]
[10]

[11]

[12]
[13]
[14]

[15]

[16]

[17]
[18]
[19]
[20]
[21]

64

Jeremy, B. M. Ding, A. Thaeler, and X. Cheng, (2004) “Connected Dominating Set in Sensor
Networks and MANETs”, Handbook of Combinatorial Optimization D.-Z. Du and P. Pardalos (Eds.),
pp329–369, Kluwer Academic Publishers.
S. Guha, and S. Khuller, (1998), “Approximation algorithms for connected dominating sets,
Algorithmica”, Vol. 20, pp374–387.
B. Das, and V. Bharghavan, (1997), “Routing in Ad Hoc Networks Using Minimum Connected
Dominating Sets”, International Conference on Communications, Montreal, Canada.
J. Wu and H. Li, (1999), “On calculating connected dominating set for efficient routing in Ad Hoc
wireless networks”, in DIAL M’99, Seattle, pp7–14.
L. Jia, R. Rajaraman, and T. Suel (2001), “An Efficient Distributed Algorithm for Constructing Small
Dominating Sets”, in Proceedings of the 20th ACM Symposium on Principles of Distributed
Computing (PODC’01).
I. Stojmenovic, M. Seddigh, and J. Zunic, (2002), “Dominating Sets and Neighbor Elimination-Based
Broadcasting Algorithms in Wireless Networks”, IEEE Transactions on Parallel and Distributed
Systems, Vol. 13, pp14–25.
B. Liang and Z. J. Haas, (2000), “Virtual Backbone Generation and Maintenance in Ad Hoc Network
Mobility Management”, in INFOCOM, pp1293–1302.
J. Wu, (2003), “An Enhanced Approach to Determine A Small Forward Node Set Based on
Multipoint Relays”, in Proc. of IEEE VTC, Vol. 4, pp2774–2777.
D. Dubhashi, A. Mei, A. Panconesi, J. Radhakrishnan, and A. Srinivasan, (2003), “Fast Distributed
Algorithms for (Weakly) Connected Dominating Sets and Linear-Size Skeletons”, in Proc. ACMSIAM Symposium on Discrete Algorithms (SODA), pp717–724.
K. M. Alzoubi, P.-J. Wan, and O. Frieder, (2002), “Message-Optimal Connected Dominating-Set
Construction for Routing in Mobile Ad Hoc Networks”, in 3rd ACM International Symposium on
Mobile Ad Hoc Networking and Computing (MobiHoc02).
S. Parthasarathy and R. Gandhi, (2004), “Fast Distributed Well Connected Dominating Sets for Ad
Hoc Networks, Technical Report CS-TR-4559, University of Maryland, Computer Science
Department.
K. Fall and K. Varadhan: The ns Manual (formerly ns Notes and Documentation),The VINT Project.
D. Johnson, D. Maltz, J. Jetcheva, (2002), “The Dynamic Source Routing Protocol for Mobile Ad
Hoc Networks”, Internet Draft, draft-ietf-manet-dsr-07.txt, work in progress,.
https://en.wikipedia.org/wiki/Hidden node problem
K. Almahorg, S. Naik, and X. Shen, (2010), “Efficient Localized Protocols to Compute Connected
Dominating Sets for Ad Hoc Networks”, IEEE GLOBECOM,.
http://grouper.ieee.org/groups/802/11/main.html.

More Related Content

PDF
Ijebea14 272
PDF
Iterative network channel decoding with cooperative space-time transmission
PDF
Improving thrpoughput and energy efficiency by pctar protocol in wireless
PDF
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
PDF
Minimizing mobiles communication time using modified binary exponential backo...
PDF
A genetic algorithm for constructing broadcast trees with cost and delay cons...
PDF
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
PDF
International Journal of Engineering Research and Development
Ijebea14 272
Iterative network channel decoding with cooperative space-time transmission
Improving thrpoughput and energy efficiency by pctar protocol in wireless
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
Minimizing mobiles communication time using modified binary exponential backo...
A genetic algorithm for constructing broadcast trees with cost and delay cons...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
International Journal of Engineering Research and Development

What's hot (15)

PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
PDF
5113jgraph01
PDF
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...
PDF
Iaetsd game theory and auctions for cooperation in
PDF
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
PDF
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
PDF
F04503057062
PDF
Bandwidth guaranteed
PDF
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
PDF
Ijcnc050207
PDF
Ax24329333
PDF
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
PDF
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
PDF
Bn25384390
DOCX
Routing in Opportunistic Networks
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
5113jgraph01
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...
Iaetsd game theory and auctions for cooperation in
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
F04503057062
Bandwidth guaranteed
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
Ijcnc050207
Ax24329333
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
Bn25384390
Routing in Opportunistic Networks
Ad

Similar to A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS USING IDEAL MAC AND IEEE 802.11 MAC (20)

PDF
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
PDF
A generic algorithm to determine connected dominating sets for mobile ad hoc ...
PDF
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...
PDF
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...
PDF
Constructing Minimum Connected Dominating Set in Mobile Ad Hoc Networks
PDF
Cv31424430
PDF
Impact of static nodes and pause
PDF
A QoS Based MAC Protocol For Wireless Ad-hoc Network
PDF
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
PDF
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
PDF
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
PDF
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
PDF
International Journal of Engineering and Science Invention (IJESI)
PDF
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PDF
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
PDF
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
PDF
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
PDF
Connected Dominating Set Construction Algorithm for Wireless Sensor Networks ...
PDF
Implementation and analysis of multiple criteria decision routing algorithm f...
PDF
Effective broadcasting in mobile ad hoc networks using grid
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A generic algorithm to determine connected dominating sets for mobile ad hoc ...
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...
Constructing Minimum Connected Dominating Set in Mobile Ad Hoc Networks
Cv31424430
Impact of static nodes and pause
A QoS Based MAC Protocol For Wireless Ad-hoc Network
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
International Journal of Engineering and Science Invention (IJESI)
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Connected Dominating Set Construction Algorithm for Wireless Sensor Networks ...
Implementation and analysis of multiple criteria decision routing algorithm f...
Effective broadcasting in mobile ad hoc networks using grid
Ad

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
KodekX | Application Modernization Development
Dropbox Q2 2025 Financial Results & Investor Presentation
NewMind AI Weekly Chronicles - August'25 Week I
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Empathic Computing: Creating Shared Understanding
20250228 LYD VKU AI Blended-Learning.pptx
NewMind AI Monthly Chronicles - July 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The AUB Centre for AI in Media Proposal.docx
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Chapter 3 Spatial Domain Image Processing.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mobile App Security Testing_ A Comprehensive Guide.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The Rise and Fall of 3GPP – Time for a Sabbatical?

A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS USING IDEAL MAC AND IEEE 802.11 MAC

  • 1. A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS USING IDEAL MAC AND IEEE 802.11 MAC Khalid A. Almahorg1, Mohamed S. Elbuni2, Elmahdi M. Abousetta3, Ahmed Arara4 1 Department of Computer Engineering, University of Tripoli, Tripoli-Libya 2 Department of Computer Engineering, University of Tripoli, Tripoli-Libya 3 Department of Computer Engineering, University of Tripoli, Tripoli-Libya 4 Department of Computer Engineering, University of Tripoli, Tripoli-Libya [email protected] [email protected] [email protected] [email protected] ABSTRACT Mobile Ad Hoc networks (MANETs) are gaining increased interest due to their wide range of potential applications in civilian and military sectors. The self-control, self-organization, topology dynamism, and bandwidth limitation of the wireless communication channel make implementation of MANETs a challenging task. The Connected Dominating Set (CDS) has been proposed to facilitate MANETs realization. Minimizing the CDS size has several advantages; however, this minimization is NP complete problem; therefore, approximation algorithms are used to tackle this problem. The fastest CDS creation algorithm is Wu and Li algorithm; however, it generates a relatively high signaling overhead. Utilizing the location information of network members reduces the signaling overhead of Wu and Li algorithm. In this paper, we compare the performance of Wu and Li algorithm with its Location-Information-Based version under two types of Medium Access Control protocols, and several network sizes. The MAC protocols used are: a virtual ideal MAC protocol, and the IEEE 802.11 MAC protocol. The use of a virtual ideal MAC enables us to investigate how the real-world performance of these algorithms deviates from their ideal-conditions counterpart. The simulator used in this research is the ns-2 network simulator. KEYWORDS Network Protocols, Ad Hoc Networks, Mobile Networks, Network Simulator 1. INTRODUCTION The multi-hop radio packet networks, also known as mobile Ad Hoc networks (MANETs), are proposed by researchers to allow for the instantaneous creation of reconfigurable temporary wireless communications networks. As the name implies, MANETs are created by the mobile hosts, a.k.a. nodes, on an Ad Hoc basis without any support or administration provided by any Sundarapandian et al. (Eds) : ICAITA, SAI, SEAS, CDKP, CMCA-2013 pp. 55–64, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3806
  • 2. Computer Science & Information Technology (CS & IT) 56 fixed or pre-installed communications infrastructure. The self-control, self-organization, and Ad Hoc properties make MANETs applicable in both civilian and military sectors. Their applications range from providing temporary and instantly deployable communications networks in conference rooms, class rooms, and exhibitions to providing reliable inter-vehicle communications, and communications networks in rural areas, devastated areas, and battle fields [1]. Along with their attractive properties, MANETs have other properties that make their realization a challenging task. Due to the mobile nature and the limited transmission ranges of MANETs’ nodes, communication links between nodes are established and torn down in unpredictable fashion; therefore, MANETs are characterized by dynamic topologies. The self- control property, a powerful feature of MANETs, obliges nodes to perform routing and other network administrative tasks cooperatively. The routing algorithms used in traditional wired networks generate a huge amount of overhead traffic in order to discover and maintain routes in such dynamic topologies. The limited bandwidth of the wireless channel renders all these algorithms non-feasible for MANETs routing. The Connected Dominating Set (CDS), a.k.a. virtual backbone or spine, is a proposed solution for routing, broadcasting, and establishing a dynamic infrastructure for distributed location databases in MANETs [5], [8], [11], [12]. Minimizing the CDS cardinality simplifies the MANET’s abstracted topology, allows for using shorter routes, and reduces the total number of retransmissions in broadcasting scenarios. It is proven that finding the minimum CDS (MCDS) in general graphs is NP-complete [7]; therefore, approximation algorithms and heuristics are used to tackle this problem. The literature is rich of many CDS approximation algorithms competing in terms of CDS size, running time, and signaling overhead [3], [6], [9], [10], [12], [14], [16]. It has been reported that, among all competing algorithms, localized CDS creation algorithms are the fastest and the lightest in terms of signaling overhead [2]. Examples of these algorithms are Wu and Li algorithm [9], the MPR algorithm [13], and Alzoubi algorithm [4]. The simplest and the fastest among all these algorithms is Wu and Li algorithm; however, this algorithm has a relatively high signalling overhead. To reduce the signaling overhead, proposals were made that are based on utilizing nodes’ location information [11], [20]. In this paper we compare the performance of the original Wu and Li algorithm [9] with that of its Location-Information-Based version given in [20] under two different types of Medium Access Control protocols (MAC protocols) and several network sizes. The MAC protocols used are: a virtual ideal MAC protocol, and the IEEE 802.11 MAC protocol [21]. While the ideal MAC protocol adheres to the design assumption made by the algorithms designers regarding the guaranteed delivery of broadcasted packets, the IEEE 802.11 MAC violates this assumption since broadcasted packets may not be correctly delivered due to packet collisions. The use of a virtual ideal MAC gives us the ability to investigate how the real-world performance of these algorithms deviates from their ideal-conditions counterpart. The rest of this paper is organized as follows: Section 2 gives a description of the working mechanics of Wu and Li algorithm [9] and its Location-Information-Based version [20]. Section 3 deals with the experiment setup. In section 4, the results are presented and discussed. Finally, section 5 concludes this paper.
  • 3. 57 Computer Science & Information Technology (CS & IT) 2. ALGORITHMS DESCRIPTION This section gives a description of the CDS creation and maintenance mechanisms of the studied algorithms. 2.1. Wu and Li Algorithm Initially the CDS is empty. Every node starts by broadcasting a list that contains the identities of its 1-hop neighbors. Exchanging this information with neighbors allows every node to know the identities of all nodes in its 2-hop neighborhood and the connections among its 1-hop neighbors. Based on this knowledge, every node decides whether to join the CDS or not and it informs its neighbors about this decision. A node, आ, joins the CDS if it has at least two neighbors that are not directly connected to each other. After receiving the decisions of all its neighbors, a CDS member, υ, makes its final decision regarding whether to withdraw from the CDS or not, and it informs its neighbors about this decision. υ withdraws from the CDS in one of two cases; the first case is when υ has a neighbor u such that N[υ] ⊆ N[u] and id(υ) < id(u), where N[υ] is the closed 1-hop neighborhood of node υ and id(υ) is υ’s ID; the other case is when υ has two neighbors u and w such that u and w are directly connected and N[υ] ⊆ N[u] ∪ N[w] and id(υ) = min(id(υ), id(u), id(w)). To maintain the CDS in face of topology changes, every node, आ, exchanges its 1hop neighborhood information with its neighbors whenever it discovers a topology change. Every node u ∈ N[आ] updates its role according to the connectivity of its current 1-hop neighborhood by applying the rules explained above. 2.2. Location-Information-Based Wu and Li Algorithm To reduce the signaling overhead of Wu and Li algorithm, Stojmenovic et al. proposed that nodes have to broadcast their location information, i.e. X and Y coordinates, instead of broadcasting their lists of neighbors [11]. Using the location information of its neighbors, a node, आ, can discover if any two of its neighbors are directly connected or not; nodes u and w are directly connected if the Euclidean distance between them is shorter than the transmission range; otherwise, they are not connected; however, in [20], it was shown that utilizing the location information does not guarantee the reduction of signaling overhead. The argument made in [20] is that since the node ID is a four-byte integer number while its location information, i.e. its X and Y coordinates, is two eight-byte floating point numbers, broadcasting the location information of a given node is more costly, in terms of signaling overhead, than broadcasting its list of neighbors if this node has three neighbors or less. Based on this argument, it was shown that in order to reduce the signaling overhead of Wu and Li algorithm every node has to broadcast its X and Y coordinates only if it has more than four neighbors; otherwise, it must broadcast its neighbors list. 3. EXPERIMENT SETUP The simulator used in this study is the ns-2 network simulator [17], a widely used discrete event simulator targeted at network research. Nodes use Hello messages to discover their neighborhood; every node broadcasts a Hello message every second. The transmission range of every node is set to 250 meters. To reduce the effect of the short-live connections that are formed when fast moving nodes come into the transmission range of each other for very short periods of time, node υ does not add node u to its neighbors list until it receives the third consecutive Hello message from u. The network sizes simulated range from 30 nodes to 100 nodes with increments of 10. The mobility model used is the Random Waypoint mobility model [18] and a field of 2000 m × 2000 m was used with this model. The speed of movement was uniformly distributed between 20 and
  • 4. Computer Science & Information Technology (CS & IT) 58 25 m/s. For every network size, two different MAC protocols were used: a virtual ideal MAC protocol, and the IEEE 802.11 MAC protocol. For every network size and MAC protocol, fifteen different movement scenarios were simulated. Every simulation lasted for 300 seconds. The average of the results of every set of fifteen simulations is calculated and used to represent the algorithm’s performance under the given network size and MAC protocol. 4. EXPERIMENT RESULTS The results obtained from the conducted simulations are presented in the following figures. These results include the CDS size, the unicast signaling overhead, the broadcast signaling overhead, the CDS establishment time, and the total running time. 4.1. The CDS size The average size of the CDS produced by each algorithm as a function of the network size for each MAC protocol is given in figures 1 and 2. It can be seen that, in both algorithms, using the IEEE 802.11 MAC leads to creating smaller CDS compared to that created by using the virtual ideal MAC. The fact that in broadcasting scenarios the IEEE 802.11 MAC does not eliminate collisions is the reason for this decrease in CDS size. Losing packets due to collisions prevents nodes from having accurate knowledge about changes in their 1-hop neighborhood and this inaccurate knowledge prevents nodes that are supposed to join the CDS from joining it and decreases the CDS size. Figure 1. Size of the CDS created by Wu and Li algorithm for different number of nodes and MAC protocols.
  • 5. 59 Computer Science & Information Technology (CS & IT) Figure 2. Size of the CDS created by Location-Information-Based Wu and Li algorithm for different number of nodes and MAC protocols. 4.2. Unicast Signaling Overhead Unicast signaling refers to messages sent from a sender to a specific receiver. In this type of signaling, the IEEE 802.11 MAC uses a handshaking mechanism between the sender and the receiver to avoid collisions; however, this handshaking mechanism does not eliminate collisions completely, since unicasted packets may collide with packets broadcasted by hidden nodes [19]. Figures 3 and 4 show the average number of bytes unicasted by every node during the CDS creation and maintenance phases of each algorithm as a function of the network size for each MAC protocol. It can be noticed that, in both algorithms, using the IEEE 802.11 MAC leads to generating less unicast signaling compared to that generated by using the virtual ideal MAC. The fact that the IEEE 802.11 MAC does not eliminate collisions completely is the reason for this decrease in unicast signaling. Due to collisions, nodes may not get updated about changes in their 1-hop neighborhood; therefore, they do not react to these changes and this leads to generating less unicast signaling overhead. 4.3. Broadcast Signaling Overhead Broadcast signaling refers to messages sent from a sender to all its neighbors. In this type of signaling, the IEEE 802.11 MAC does not use a handshaking mechanism between the sender and the receiver so that the chances of collisions are high; hence, broadcast signaling is considered a problematic type of signaling. Figures 5 and 6 show the average number of bytes broadcasted by every node during the CDS creation and maintenance phases of each algorithm as a function of the network size for each MAC protocol. It can be noticed that, in both algorithms, using the IEEE 802.11 MAC leads to generating less broadcast signaling compared to that generated by using the virtual ideal MAC. This decrease in broadcast signaling overhead is due to lack of updates about neighborhood changes that results from losing of packets because of collisions. 5. THE CDS ESTABLISHMENT TIME The CDS establishment time is the time at which every node knows whether it is a CDS member or not. Figures 7 and 8 show the average CDS establishment time for each algorithm as a function of network size for each MAC protocol. It can be noticed from these figures that, in both
  • 6. Computer Science & Information Technology (CS & IT) 60 algorithms, using the IEEE 802.11 MAC leads to longer CDS establishment time compared to the time spent in CDS establishment by using the virtual ideal MAC. Losing of packets due to collisions forces nodes to keep waiting for retransmissions of the lost packets and this results in longer CDS establishment time. Figure 3. Unicast signaling overhead generated by Wu and Li algorithm for different number of nodes and MAC protocols. Figure 4. Unicast signaling generated by Location-Information-Based Wu and Li algorithm for different network sizes and MAC protocols.
  • 7. 61 Computer Science & Information Technology (CS & IT) Figure 5. Broadcast signaling overhead generated by Wu and Li algorithm for different number of nodes and MAC protocols. 6. THE TOTAL RUNNING TIME The total running time is the time spent during CDS creation and maintenance phases. The average total time of each algorithm as a function of the network size for each MAC protocol is shown in figures 9 and 10. Again, we notice that using the IEEE 802.11 MAC leads to longer total time compared to the time spent by using the virtual ideal MAC, and the reason for this is the loss of packets due to collisions that keeps nodes waiting for retransmissions of the lost packets. Figure 6. Broadcast signaling generated by Location-Information-Based Wu and Li algorithm for different network sizes and MAC protocols.
  • 8. Computer Science & Information Technology (CS & IT) 62 Figure 7. Time to establish the CDS by Wu and Li algorithm for different number of nodes and MAC protocols. 7. CONCLUSION In this paper the performance of the original Wu and Li algorithm is compared with that of its Location-Information-Based version under a virtual ideal MAC protocol and the IEEE 802.11 MAC protocol. The performance is measured in terms of CDS size, signaling overhead, and run time. The results obtained showed that using the IEEE 802.11 MAC protocol leads to smaller CDS size, lighter signaling overhead, and longer run times compared to those obtained by using the virtual ideal MAC protocol. The reason of these deviations is the loss of packets due to collisions. This loss of packets deprives nodes of acquiring accurate knowledge and fast updates about changes of their 1-hop neighborhoods, this lack of accurate and up-to-date information may lead nodes to refrain from joining the CDS erroneously, not broadcast information unaware of neighborhood changes, and spend longer time waiting for information. Figure 8. Time to establish the CDS by Location-Information-Based Wu and Li algorithm for different number of nodes and MAC protocols.
  • 9. 63 Computer Science & Information Technology (CS & IT) Figure 9. Total running time by Wu and Li algorithm for different number of nodes and MAC protocols. Figure 10. Total running time by Location-Information-Based Wu and Li algorithm for different number of nodes and MAC protocols. REFERENCES [1] [2] [3] [4] [5] C. E. Perkins (2001) Ad Hoc Networking, Addison-Wesley. S. Basagni, M. Mastrogiovanni, A. Panconesi and C. Petrioli , (2006) “Localized Protocols for Ad Hoc clustering and Backbone Formation: A Performance Comparison”, IEEE Trans. Parallel Distrib. Syst., Vol. 17, No. 4, pp292–306. P. Wan, K. Alzoubi, and O. Frieder, (2004) “Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks”, MONET Vol. 9, No. 2, pp141–149. K. Alzoubi, (2002) “Virtual Backbones in Wireless Ad Hoc Networks”, PhD thesis, Illinois Institute of Technology. R. Sivakumar, P.Sinha, and V. Bharghavan, (1999) “CEDAR: A Core-Extraction Distributed Ad Hoc Routing Algorithm”, IEEE Journal on Selected Areas in Communications, Vol. 17, pp1454–1465.
  • 10. Computer Science & Information Technology (CS & IT) [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] 64 Jeremy, B. M. Ding, A. Thaeler, and X. Cheng, (2004) “Connected Dominating Set in Sensor Networks and MANETs”, Handbook of Combinatorial Optimization D.-Z. Du and P. Pardalos (Eds.), pp329–369, Kluwer Academic Publishers. S. Guha, and S. Khuller, (1998), “Approximation algorithms for connected dominating sets, Algorithmica”, Vol. 20, pp374–387. B. Das, and V. Bharghavan, (1997), “Routing in Ad Hoc Networks Using Minimum Connected Dominating Sets”, International Conference on Communications, Montreal, Canada. J. Wu and H. Li, (1999), “On calculating connected dominating set for efficient routing in Ad Hoc wireless networks”, in DIAL M’99, Seattle, pp7–14. L. Jia, R. Rajaraman, and T. Suel (2001), “An Efficient Distributed Algorithm for Constructing Small Dominating Sets”, in Proceedings of the 20th ACM Symposium on Principles of Distributed Computing (PODC’01). I. Stojmenovic, M. Seddigh, and J. Zunic, (2002), “Dominating Sets and Neighbor Elimination-Based Broadcasting Algorithms in Wireless Networks”, IEEE Transactions on Parallel and Distributed Systems, Vol. 13, pp14–25. B. Liang and Z. J. Haas, (2000), “Virtual Backbone Generation and Maintenance in Ad Hoc Network Mobility Management”, in INFOCOM, pp1293–1302. J. Wu, (2003), “An Enhanced Approach to Determine A Small Forward Node Set Based on Multipoint Relays”, in Proc. of IEEE VTC, Vol. 4, pp2774–2777. D. Dubhashi, A. Mei, A. Panconesi, J. Radhakrishnan, and A. Srinivasan, (2003), “Fast Distributed Algorithms for (Weakly) Connected Dominating Sets and Linear-Size Skeletons”, in Proc. ACMSIAM Symposium on Discrete Algorithms (SODA), pp717–724. K. M. Alzoubi, P.-J. Wan, and O. Frieder, (2002), “Message-Optimal Connected Dominating-Set Construction for Routing in Mobile Ad Hoc Networks”, in 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc02). S. Parthasarathy and R. Gandhi, (2004), “Fast Distributed Well Connected Dominating Sets for Ad Hoc Networks, Technical Report CS-TR-4559, University of Maryland, Computer Science Department. K. Fall and K. Varadhan: The ns Manual (formerly ns Notes and Documentation),The VINT Project. D. Johnson, D. Maltz, J. Jetcheva, (2002), “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks”, Internet Draft, draft-ietf-manet-dsr-07.txt, work in progress,. https://en.wikipedia.org/wiki/Hidden node problem K. Almahorg, S. Naik, and X. Shen, (2010), “Efficient Localized Protocols to Compute Connected Dominating Sets for Ad Hoc Networks”, IEEE GLOBECOM,. http://grouper.ieee.org/groups/802/11/main.html.