+ All Categories
Home > Documents > APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING...

APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING...

Date post: 27-Sep-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
240
APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING IN MOBILE AD HOC AND WIRELESS SENSOR NETWORKS THESIS Submitted by RAMALAKSHMI R (Register No: 200907210) in fulfillment for the award of the degree of DOCTOR OF PHILOSOPHY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING KALASALINGAM UNIVERSITY ANAND NAGAR, KRISHNANKOIL – 626 126 TAMILNADU, INDIA AUGUST 2015
Transcript
Page 1: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

APPLICATION OF CONNECTED DOMINATING

SET FOR ROUTING IN MOBILE AD HOC AND

WIRELESS SENSOR NETWORKS

THESIS

Submitted by

RAMALAKSHMI R(Register No: 200907210)

in fulfillment for the award of the degree

of

DOCTOR OF PHILOSOPHY

DEPARTMENT OF COMPUTER SCIENCE ANDENGINEERING

KALASALINGAM UNIVERSITYANAND NAGAR, KRISHNANKOIL – 626 126

TAMILNADU, INDIA

AUGUST 2015

Page 2: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based
Page 3: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based
Page 4: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based
Page 5: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based
Page 6: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

ABSTRACT

Wireless ad hoc networks are infra-structureless multi-hop networks

consists of mobile or wireless devices, which include Mobile Ad Hoc Networks

(MANETs), Mobile Opportunistic Networks (MON), Wireless Sensor Networks

(WSNs) and UnderWater Acoustic Sensor Networks (UWASN). The important

characteristics of these networks are: limited bandwidth and dynamic topology. In

these networks, energy is a precious resource since each node has a limited power

source. To extend the lifetime of these networks, it is essential to have an efficient

routing scheme.

A Connected Dominating Set (CDS) or Virtual Backbone (VB) is a subset

of nodes that is able to perform data communication tasks and to serve nodes that

are not in the backbone. A CDS can be selected as a communication layer, and

only the nodes in the CDS transmit data. It is greatly reducing the transmission

of redundant information, simplifying the topology of the network, saving the

energy for information gathering and filtering, routing and forwarding information

required.

In MANETs, the mobility of nodes may cause two problems: the source

node might have used the path that does not exist and the topology might have

changed during the forwarding of the packet. This results in failure of packet

Page 7: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

delivery. Therefore, a stable path is needed for routing. In the first study, the design

of Stability based Energy-efficient Link-state Hybrid Routing (S-ELHR) protocol

is presented. Here, a stability metric is proposed and a localized algorithm is

implemented to construct a CDS, which provides a stable and sustainable topology

for routing. The proposed S-ELHR is a hybrid routing protocol, which uses relay

based broadcasting to discover the topology and source routing for data packet

transmission. It uses a route recovery mechanism to adopt to changing network

topology. The performance of S-ELHR is compared with OLSR and EE-OLSR

in terms of packet delivery ratio, end-to-end delay, control overhead and energy

consumption.

Disasters create emergency situations and a MANET can be deployed

for rescue operations. In the second study, the design of Weighted

Connected Dominating Set based Routing (Weighted-CDSR) protocol for ad hoc

communications in emergency and rescue scenarios is described. It is a reactive

routing protocol and the route discovery is operated over the CDS. A weight

metric is proposed, which uses stability, mobility and energy of nodes. A localized

algorithm is implemented for Maximum Weight Minimum Connected Dominating

Set (MWMCDS) construction. The performance of Weighed-CDSR is compared

with DSR, AODV, DYMO and Wu(degree)-CDSR in terms of packet delivery ratio,

end-to-end delay, control message overhead, and energy consumption.

v

Page 8: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

In MON, mobile nodes are enabled with carry and forward mechanism to

communicate with each other even if there is no connecting path exist between

them. In the third study, the design of Ego-centrality Contact-duration based

Backbone Routing Protocol (BRP) is explained. It is an on-demand routing

protocol and message transmission is multi-hop through the CDS. The ego-

centrality metric identifies the important nodes and the contact-duration metric

selects the nodes that have more contact with other nodes in the network. A

localized algorithm is implemented based on accumulated node coverage condition

for backbone construction. The backbone nodes are enabled to buffer the message

when the network is disconnected. The performance of BRP is compared with

Adaptive-Routing, PRoPHET and CoMANDR in terms of packet delivery ratio,

end-to-end delay and number of forwarded messages.

A CDS based topology control in WSNs is a kind of hierarchical method to

ensure 1-coverage while reducing redundant connections. For applications related

to security and reliability, it is necessary to construct a fault-tolerant CDS that

continues to function during node or link failures. In the fourth study, the design of

k−Coverage Connected Dominating Set (k−CCDS) for connected area monitoring

is described. A Weighted Coverage Cost (WCC) is proposed and distributed

algorithms are implemented for k−CCDS construction. The concept of k−CCDS

is used to provide fault tolerance and routing flexibility, where non-dominating

vi

Page 9: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

nodes are covered even if k− 1 dominating nodes are dead. The performance of

k−CCDS is compared with A3Cov in terms of CDS size, CDS lifetime, number of

uncovered nodes, coverage area and residual energy.

Energy efficiency becomes more critical and challenging in UWASN

because of the much higher transmission and receiving power consumption

of acoustic channel. In the fifth study, the design of CDS based Energy-

efficient Pressure(depth)-aware Routing Protocol for UWASN, named CDS-EPRP,

is explained. An Ant Colony Optimization (ACO) is applied to form CDS, based

on energy and depth. CDS-EPRP is an on-demand routing protocol, neither path

maintenance nor recovery is required. In order to save energy, the data forwarding

is multi-hop and the connectivity of CDS is also maintained to adapt to dynamic

network topology. The performance of CDS-EPRP is compared with VBF and

DBR in terms of packet delivery ratio, energy consumption, and end-to-end delay.

This thesis focuses on application of CDS for routing in different ad hoc

and wireless networks. Here, a communication network is modeled as a graph and

a weight metric is assigned to each node and/or communication link. This thesis

proposes localized and distributed algorithms for CDS construction based on the

weight metric. The proposed protocols show better performance in packet delivery

ratio, end-to-end delay, control overhead and energy consumption.

vii

Page 10: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

ACKNOWLEDGEMENT

First of all, I thank Almighty God for His abundant blessings.

I express my heartfelt gratitude to Shri.K.Sridharan, Chancellor,

Kalasalingam University, for providing me with all the necessary facilities

for the research. I place on record, my sincere thanks to respected

Dr.S.Saravanasankar, Vice-Chancellor and Dr.V.Vasudevan, Registrar, for their

continuous encouragement. I wish to express my thanks to Dr.D.Devaraj,

Dean(Academics) and Head of the Department Dr.P.Deepalakshmi, Associate

Professor, for their guidance throughout this work.

I express my sincere thanks to my research supervisor,

Dr.S.Radhakrishnan, Senior Professor, Department of CSE for the constant

encouragement and constructive ideas he provided, without which this research

would never have been possible. I would like to thank him for encouraging my

research and for guiding me to grow as a research scientist. His advice on both

research as well as on my career have been invaluable. My special thanks are due

to Dr.S.Arumugam, Director, n-CARDMATH, for his help in understanding the

concepts of graph theory.

I would like to express my deepest gratitude to my mother, my husband, and

my kids for their understandings, sacrifices and supports. I also thank everyone for

their direct or indirect support to complete this research work.

R. Ramalakshmi

viii

Page 11: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

TABLE OF CONTENTS

CHAPTER NO. TITLE PAGE NO.

ABSTRACT iv

LIST OF FIGURES xv

LIST OF TABLES xviii

LIST OF ABBREVIATIONS xix

LIST OF SYMBOLS xxiv

1 INTRODUCTION 1

1.1 MOBILE AD HOC NETWORKS (MANETS) 1

1.1.1 Routing in MANETs 3

1.2 WIRELESS SENSOR NETWORKS (WSN) 5

1.2.1 Routing in WSN 7

1.3 CONNECTED DOMINATING SET (CDS) 8

1.3.1 Definitions 8

1.3.2 Algorithms for CDS construction 10

1.3.3 Applications of CDS 11

1.4 MOTIVATION 12

1.5 OBJECTIVES 14

1.6 CONTRIBUTIONS OF THIS THESIS 16

1.7 ORGNAIZATION OF THE THESIS 18

ix

Page 12: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

2 LITERATURE SURVEY 22

2.1 ROUTING PROTOCOLS IN MANET 22

2.2 CDS BASED BROADCASTING AND ROUTING IN MANETS 28

2.3 STABILITY AND ENERGY EFFICIENT ROUTING IN MANETS 37

2.4 ROUTING IN MOBILE OPPORTUNISTIC NETWORKS 42

2.5 CDS BASED ROUTING AND SCHEDULING IN WSN 50

2.6 CDS BASED COVERAGE IN WSN 54

2.7 ROUTING IN UWASN 60

2.8 OPTIMIZATION TECHNIQUES FOR CDS 65

2.9 SUMMARY 67

3 DESIGN OF STABILITY BASED ENERGY EFFICIENT LINK

STATE HYBRID ROUTING PROTOCOL FOR MOBILE AD

HOC NETWORKS 68

3.1 INTRODUCTION 68

3.1.1 Stability based Routing in MANETs 69

3.2 STABILITY BASED ENERGY-EFFICIENT LINK-STATE

HYBRID ROUTING (S-ELHR) 70

3.2.1 Network Model and Problem Statement 71

3.2.2 Stability Metric (SM) Calculation 72

3.2.2.1 Computation of Willingness 72

3.2.2.2 Link Connectivity Index (LCI) Metric 73

3.2.2.3 Energy Weight (EW) Metric 74

3.2.2.4 Degree Weight (DW) Metric 74

3.2.3 Algorithm for Stable CDS Construction 74

3.2.4 Routing in S-ELHR 76

3.2.4.1 Topology Discovery 76

x

Page 13: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

3.2.4.2 Route Computation and Route Recovery 77

3.3 SIMULATION STUDY 78

3.3.1 Simulation Parameters 78

3.3.2 Protocols used for comparison 80

3.3.3 Results and Discussion 81

3.4 CHAPTER SUMMARY 91

4 DESIGN OF WEIGHTED DOMINATING SET BASED ROUTING

PROTOCOL FOR AD HOC COMMUNICATIONS IN

EMERGENCY AND RESCUE SCENARIOS 92

4.1 INTRODUCTION 92

4.2 WEIGHTED CDS BASED ROUTING (WEIGHTED-CDSR) 93

4.2.1 Network Model and Problem Statement 94

4.2.2 Weight Calculation 94

4.2.2.1 Link Stability Metric 95

4.2.2.2 Mobility Metric 95

4.2.2.3 Energy Metric 96

4.2.3 Algorithm for Maximum Weighted CDS Construction 96

4.2.4 Routing in Weighted-CDSR 99

4.2.4.1 Route discovery and Maintenance 99

4.3 SIMULATION STUDY 102

4.3.1 Simulation Parameters 102

4.3.2 Protocols used for comparison 104

4.3.3 Results and Discussion 106

4.4 CHAPTER SUMMARY 116

xi

Page 14: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

5 DESIGN OF AN EGO CENTRALITY AND CONTACT

DURATION BASED BACKBONE ROUTING PROTOCOL FOR

MOBILE OPPORTUNISTIC NETWORKS 117

5.1 INTRODUCTION 117

5.1.1 Social-aware Routing in Mobile Opportunistic Networks 119

5.2 BACKBONE BASED ROUTING PROTOCOL (BRP) 121

5.2.1 Network model and Problem Statement 121

5.2.2 Ego-Centrality and Contact-Duration based Connected

Dominating Set (ECCDS) 122

5.2.2.1 Ego Centrality Calculation 122

5.2.2.2 Calculation of Average Inter-Contact time 123

5.2.2.3 Algorithm for ECCDS Construction 123

5.2.3 Routing in BRP 125

5.2.3.1 Message Forwarding 125

5.2.3.2 Forwarding of Buffered Messages 127

5.3 SIMULATION STUDY 127

5.3.1 Simulation Parameters 127

5.3.2 Protocols used for comparison 129

5.3.3 Results and Discussion 131

5.4 CHAPTER SUMMARY 141

6 DESIGN OF CONNECTED K−COVERAGE TOPOLOGY

CONTROL FOR AREA MONITORING IN WIRELESS SENSOR

NETWORKS 143

6.1 INTRODUCTION 143

6.1.1 CDS for Topology Control in WSN 144

6.2 k−Coverage Connected Dominating Set (k−CCDS) 145

xii

Page 15: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

6.2.1 Network model and Problem Statement 145

6.2.2 Weighted Coverage Cost Calculation 146

6.2.3 Distributed k−CCDS Construction Algorithm 148

6.2.3.1 CDS Construction 148

6.2.3.2 k−CCDS Construction 152

6.3 SIMULATION STUDY 152

6.3.1 Simulation Parameters 152

6.3.2 Protocols used for comparison 154

6.3.3 Results and Discussion 154

6.4 CHAPTER SUMMARY 161

7 DESIGN OF CONNECTED DOMINATING SET BASED

ENERGY EFFICIENT PRESSURE AWARE ROUTING FOR

UNDERWATER ACOUSTIC SENSOR NETWORKS 163

7.1 INTRODUCTION 163

7.1.1 Energy Efficient Routing in UWASN 165

7.2 CDS BASED ENERGY-EFFICIENT PRESSURE-AWARE

ROUTING PROTOCOL (CDS-EPRP) 167

7.2.1 Network model and Problem Statement 168

7.2.2 ACO based CDS Construction 169

7.2.3 Routing in CDS-EPRP 171

7.2.3.1 Data Packet forwarding 171

7.2.3.2 Connectivity Maintenance of CDS 172

7.3 SIMULATION STUDY 174

7.3.1 Simulation Parameters 174

7.3.2 Protocols used for comparison 176

7.3.3 Results and Discussion 177

xiii

Page 16: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

7.4 CHAPTER SUMMARY 185

8 CONCLUSION AND FUTURE WORK 186

8.1 SUMMARY OF CONTRIBUTIONS 186

8.2 CONCLUSION 189

8.3 SCOPE FOR FUTURE WORK 190

REFERENCES 191

LIST OF PUBLICATIONS 210

VITAE 212

xiv

Page 17: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

LIST OF FIGURES

3.1 No. of Nodes vs Percentage of Relay Nodes 82

3.2 No. of Nodes vs Average Path Length in Hops 83

3.3 No. of Nodes vs Topology Message Overhead 84

3.4 Mobility vs Topology Message Overhead 84

3.5 No. of Nodes vs Average Energy Consumption 85

3.6 Mobility vs Average Energy Consumption 86

3.7 No. of Nodes vs Control Overhead per Data Packet 87

3.8 Mobility vs Control Overhead per Data Packet 87

3.9 No. of Nodes vs Packet Delivery Ratio 88

3.10 Mobility vs Packet Delivery Ratio 89

3.11 No. of Nodes vs End-to-End Delay 90

3.12 Mobility vs End-to-End Delay 90

4.1 No. of Nodes vs CDS Size 107

4.2 No. of Nodes vs Average Route Length 108

4.3 Mobility vs Routing Overhead 108

4.4 Mobility vs Packet Delivery Ratio 109

4.5 Mobility vs Energy Consumption 110

4.6 No. of Nodes vs Routing Overhead 111

4.7 No. of Nodes vs End-to-End Delay 112

4.8 No. of Nodes vs Packet Delivery Ratio 113

4.9 No.of Nodes vs Energy Consumption 114

4.10 No. of Traffic Sources vs Packet Delivery Ratio 115

xv

Page 18: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

5.1 Accumulated Node Coverage Condition 124

5.2 No. of Nodes vs Message Delivery Ratio 132

5.3 Mobility vs Message Delivery Ratio 132

5.4 Message Lifetime vs Message Delivery Ratio 133

5.5 No. of Nodes vs End-to-End Delay 134

5.6 Mobility vs End-to-End Delay 135

5.7 Message Lifetime vs End-to-End Delay 136

5.8 No. of Nodes vs Hop Count 137

5.9 Mobility vs Hop Count 137

5.10 Message Lifetime vs Hop Count 138

5.11 No. of Nodes vs No. of Forwarded Messages 139

5.12 Mobility vs No. of Forwarded Messages 140

5.13 Message Lifetime vs No. of Forwarded Messages 140

5.14 No. of Messages vs No. of Forwarded Messages 141

6.1 Sensor’s Radius and Coverage Redundancy 147

6.2 Weighted Coverage Cost 148

6.3 No. of Nodes vs Average CDS Size 155

6.4 Communication Range vs Average CDS size 156

6.5 No. of Nodes vs CDS Lifetime 157

6.6 No. of Nodes vs Uncovered Nodes 157

6.7 No. of Nodes vs Residual Energy 158

6.8 No. of Nodes vs Coverage Area 159

6.9 No. of Nodes vs Convergence Time 160

6.10 Communication Range vs Convergence Time 161

7.1 CDS-EPRP for UWASN 167

7.2 No. of Nodes vs No. of Dominating Nodes with dth 178

xvi

Page 19: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

7.3 No. of Nodes vs Packet Delivery Ratio with varying Sinks 178

7.4 No. of Nodes vs End-to-End Delay with varying Sinks 179

7.5 No. of Nodes vs Packet Delivery Ratio 180

7.6 No. of Nodes vs End-to-End Delay 181

7.7 No. of Nodes vs Energy consumption 182

7.8 Offered Load vs Packet Delivery Ratio 183

7.9 Offered Load vs End-to-end Delay 183

7.10 Offered Load vs Energy Consumption 184

xvii

Page 20: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

LIST OF TABLES

3.1 Willingness Calculation in S-ELHR 73

3.2 S-ELHR Simulation Parameters 79

4.1 Route Discovery Packet Formats 99

4.2 Weighted-CDSR Simulation Parameters 103

5.1 BRP Simulation Parameters 128

6.1 k−CCDS Simulation Parameters 153

7.1 CDS-EPRP Simulation Parameters 175

xviii

Page 21: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

LIST OF ABBREVIATIONS

ABP - Adaptive Backbone Protocol

ABPL - Average Backbone Path Length

ACO - Ant Colony Optimization

ACO-TS - ACO with Tournament Selection

AHH-VBF - Adaptive Hop-by-Hop Vector-based Forwarding

ANCC - Accumulated Node Coverage Condition

AoA - Angle of Arrival

AODV - Ad-hoc On-demand Distance Vector

ASBIT - Adaptive Spraying Based Inter-contact Time

BDMST - Bounded Diameter Minimum Spanning Tree

BRP - Backbone Routing Protocol

CADS - Connected Area Dominating Set

CBR - Constant Bit Rate

CCDS - Coverage/Clique Connected Dominating Set

CDMA - Code Division Multiple Access

CDP - Connected Domatic Problem

CDS - Connected Dominating Set

CDS-EPRP - CDS based Energy-Efficient Pressure-Aware Routing Protocol

CEDAR - Core Extraction Distributed Ad-hoc Routing

CH - Cluster Head

CLaB - Cluster-Label-based Backbones

CMFDS - Connected Message Ferry Dominating Set

CNM - Color Notification Message

xix

Page 22: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

CoMANDR - Combined MANET-DTN Routing

CR - Coverage Redundancy

DBR - Depth Based Routing

DCDS - Degree-Constrained minimum-weight CDS

DP - Domatic Partition

DS - Dominating Set

DSDV - Destination Sequenced Distance Vector

DSR - Dynamic Source Routing

DSSS - Direct Sequence Spread Spectrum

DTLST - Delay Tolerant Link State Routing

DTN - Delay Tolerant Network

DTP - Dominating Tree Problem

DUCS - Distributed Underwater Clustering Scheme

DYMO - Dynamic MANET On-demand

E-PULRP - Energy optimized Path Unaware Layered Routing Protocol

EAP - Expected Allocation Probability

ECCDS - Ego-Centrality Contact-Duration Connected Dominating Set

ECSS - Energy Conservation Self Scheduling

EEDTC - Energy Efficient Dominating Tree Construction

EE-OLSR - Energy Efficient Optimized Link State Routing

ELDT - Expected Link Duration Time

FDDS - Fast Distributed Dominating Set

FND - Fidelity of NoDes

GPS - Global Positioning System

H2-DAB - Hop-by-Hop-Dynamic Addressing Based

HH-VBF - Hop-by-hop Vector Based Forwarding

ICT - Intermittently Connected Network

xx

Page 23: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

IETF - Internet Engineering Task Force

IS - Independent Set

L2-ABF - Layer by layer Angle-Based Flooding

LBCDS - Load Balanced Connected Dominating Set

LBVB - Load Balanced Virtual Backbone

LCI - Link Connectivity Index

LET - Link Expiration Time

MAC - Medium Access Control

MACA - Mobility Adaptive Clustering Algorithm

MANET - Mobile Ad-hoc Network

MCDS - Minimum Connected Dominating Set

MDMIS - MinMax Degree Maximal Independent Set

MDS - Minimal Dominating Set

MEMCDS - Maximum Energy Minimum CDS

MEWR - Modified Energy Weight Routing

MIS - Maximal Independent Set

MLBS - Maximum Lifetime Backbone Scheduling

MON - Mobile Opportunistic Network

MPR - Multi Point Relay

MP-OLSR - MultiPath Optimized Link-state Routing

MSE-CDS - Maximum Spectral-efficient Connected Dominating Set

MVBA - MinMax Valid-degree non-Backbone Allocation

MWDS - Minimum Weighted Dominating Set

MWMCDS - Maximum Weighted Minimum Connected Dominating Set

NCR - Neighbor-aware Contention Resolution

NS-2 - Network Simulator version 2

OLSR - Optimized Link State Routing

xxi

Page 24: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

PMAR - Power and Mobility Aware Routing

PROPHET - Probabilistic Routing Protocol using History of Encounters & Transitivity

QASP - QoS Aware Stable Path

QELAR - Q-learning-based Routing

QoS - Quality of Service

RAPLF - Routing with Adaptive Path and Limited Flooding

RDS-MPR - Realistic Dominating Set MPR

RERR - Route Error

RET - Route Expiration Time

RETC - Energy Efficient Topology Control

RF - Radio Frequency

RMQR - Reliable Multi-path QoS Routing

RREP - Route Reply

RREQ - Route Request

RSEA - Route Stability and Energy Aware

RRP - Route Reach Packet

RSP - Route Search Packet

RSQR - Route Stability based QoS Routing

RSS - Received Signal Strength

S-ELHR - Stability based Energy Efficient Hybrid Routing

SLABR - Social Link Awareness Based Routing

SM - Stability Metric

SND - Stability of NoDes

SOB-T - Self Organized Backbone Tree

SOB-M - Self Organized Backbone Marking

SONR - Social Opportunistic Network Routing

ST-OLSR - Stability Optimized Link State Routing

xxii

Page 25: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

SWORP - Stable Weight-based On-demand Routing Protocol

TC - Topology Control

TCDS - Two-hop Connected Dominating Set

TDMA - Time Division Multiple Access

THP - Three-hop Horizon Pruning

TMPO - Topology Management by Priority Ordering

TTL - Time To Live

UWASN - UnderWater Acoustic Sensor Network

VAPR - Void-aware Pressure Routing

VB - Virtual Backbone

VBF - Vector Based Forwarding

UBG - Unit Ball Graph

VBS - Virtual Backbone Scheduling

VGA - Virtual Grid Architecture

WCC - Weighted Coverage Cost

WSN - Wireless Sensor Network

xxiii

Page 26: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

LIST OF SYMBOLS

V - Set of nodes in a network

E - Set of communication links in a network

|V | - Size of set V

Nu1 - One-hop neighbors set of node u (Nu

1 = {v | (u,v) ∈ E})

Nu2 - Two-hop neighbors set of node u (Nu

2 = {w | v ∈ Nu1 ∧w /∈ Nu

1 ∧ (v,w) ∈ E})

Nt1(u) - One-hop neighbors set of u, Nu

1 at time t

Nt+11 (u) - One-hop neighbors set of u, Nu

1 at time t +1

|Nu1 | - Number of one-hop neighbors of u

Nuw - One-hop neighbors set of node u with Willingness DEFAULT or HIGH

Relay(u) - Subset of Nu1 chosen to relay

NC(u) - Subset of Nu2 not covered by nodes in Relay(u)

Euinit - Initial energy of node u

Eurm - Residual energy of node u

LCI(i, j) - Link connectivity index between the two nodes i and j

SM(i, j) - Stability metric of a node i with its neighbor j ( j ∈ Ni1)

γMOBmin - Minimum mobility factor with value 0.01

Ruv - Received signal strength (RSS) between node u and v

∆Ruv - Variation of RSS between node u and v

γLSu - Link stability metric of a node u with its neighbors

γMOBu - Mobility metric of a node u

γENu - Energy metric of a Node u

WT u - Weight of a node u

ϑu - Ego centrality value of node u

xxiv

Page 27: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

(u,v) - Communication link between node u and v ((u,v) ∈ E)

∆uv - Inter-contact time of node u with v during an encounter

∆′uv - The sum of the inter-contact time of node u to v before last encounter

σuv - Sum of inter-contact times between the nodes u and v

χuv - Number of encounters between the nodes u and v

ξuv - The average inter-contact time of the link (u,v)

σPi - Sum of the average inter-contact time of path Pi

ϖuv - Average of inter-contact time of paths between nodes u and v

tbuv - The start time of contact of node u with v

teuv - The end time of contact of node u with v

Rs - Sensing radius

Rc - Communication radius

A(si) - Sensing area of sensor si, is a disk of radius Rs, centered at location of si

d(u,v) - Euclidean distance between sensor nodes u and v

Nsi1 - Communication neighbors of sensor node si, Nsi

1 = {s j|d(si,s j)≤ Rc}

CR(si) - Coverage redundancy of sensor node si, CR(si) = {s j|d(si,s j)≤ Rs}

Esiinit - Initial energy of sensor node si

Esir - Residual energy of sensor node si

Esitot - Total energy level of the sensing neighbors of sensor node si

WCC(si) - Weighted Coverage Cost of sensor node si

Eth - Energy threshold

RSSud - Distance of u based on RSS

dth - Depth threshold

du - Depth of node u

d p(u,v) - Difference of depths between node u and node v, ( d p(u,v) = du−dv )

Ns - Number of surface sinks

Na - Number of ants

xxv

Page 28: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

τu - Pheromone at node u

τ0 - Initial pheromone

ηu - Energy weight of node u

Nuf - Feasible neighborhood of node u (Nu

f = {v | d p(u,v)> dth,∀v ∈ Nu1})

NuD - Dominating neighbors of node u (Nu

D = {x | dominating(x) = true,∀x ∈ Nu1})

NuE - Dominatee neighbors of node u (Nu

E = {x | dominating(x) = f alse,∀x∈Nu1})

xxvi

Page 29: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

CHAPTER 1

INTRODUCTION

1.1 MOBILE AD HOC NETWORKS (MANETS)

Mobile Ad-hoc networks (MANETs) are self-organizing and self-

configuring multi-hop wireless networks, where the structure of the network

changes dynamically (Macker et al. [97]). It consists of wireless devices that

interact among each other by means of wireless communications. The main

objective of MANET is to enable communication between senders and receivers

in a network where nodes are mobile and may not be within direct wireless

transmission range of each other. This type of networks does not relay on a fixed

infrastructure and any node can act as traffic source, destination or forwarder.

MANET is very flexible and resilient to node failures due to distributed nature.

Hence, MANETs are well suited to applications where rapid deployment and

dynamic reconfiguration are necessary. Some of the potential applications for

MANETs are [72, 98]:

- Military application: MANETs satisfy the needs of military applications

like battlefield survivability. Here, the MANET is deployed with wireless

electronic devices carried in soldiers, tanks, airplane and other military

equipment, to support communication among them in order to collaboratively

achieve military goals, since there is no any pre-defined infrastructure and

connectivity in battlefield environments.

1

Page 30: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

2

- Emergency services: Each year natural disasters destroy people’s lives around

the world. As network applications will become increasingly important for

emergency services, it will be important to find ways to enable the operations

of networks even when infrastructure elements have been disabled as part

of the effects of a disaster. For disaster recovery, field agents wish to

communicate their findings regarding, for example, environmental hazards

or survivors to other field agents as well as to a command post.

Delay Tolerant Networks (DTNs) were developed to allow communication

in scenarios where fixed infrastructure is not available and existing IP and

GSM/UMTS network protocols are unsuitable. Mobile Opportunistic Networks

(MONs) or Intermittently Connected Networks (ICT) are kind of DTN and highly

dynamic. In these networks, when nodes move away or turn off their power to

conserve energy, links may be disrupted or shut down periodically. These events

result in intermittent connectivity [77]. In such scenarios, where nodes often create

sparse network topologies and the contacts between them are intermittent, MONs

use a store-carry-forward strategy to allow communication when a path through the

network is not reliable, due to frequent disconnections. A node receiving a packet

from one of its contacts can buffer the message, carry it while moving, and forward

it to the encountered nodes which are at least as useful as itself in terms of delivery

[106].

Each node in MON after receiving a message, exploits local knowledge to

decide which is the best next hop, among its current neighbors, for the message to

reach the eventual packet destination. When no forwarding opportunity exists (no

other nodes are in the transmission range, etc), the nodes store the message and

waits for further contact opportunity with other devices to forward the information

[114]. Applications of MON include:

Page 31: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

3

- Vehicular networks: provide network and Internet connectivity to mobile

users in vehicles. The network is constituted by hot spots that are placed

along the roads providing thus intermittent connectivity to the users that can

connect within proximity.

- Mobile sensor networks: for environmental monitoring, e.g, Zebranet, which

is a wireless networking architecture designed to support wildlife tracking for

biology research. In ZebraNet, the network is constituted by sensor collars

that are attached to zebras, which log movement patterns of the zebras, and

by researchers base stations that are mounted on cars which move around

sporadically. When two zebras meet, the corresponding sensors exchange

collected data for a potential data delivery back to researchers base-stations.

1.1.1 Routing in MANETs

Routing is a fundamental issue for any network and routing protocols are

considered to be in charge of discovering and maintaining the routes. It is a

challenging task to find and maintain routing path in MANET with sudden topology

changes due to nodes mobility. Several routing protocols have been proposed

for MANETs, they are classified into proactive, reactive and hybrid according to

routing strategy. A survey of routing protocols in ad hoc networks was given by

Boukerche et al. [22].

Proactive routing protocols [33, 40] attempt to keep the freshest route

information from the whole network. These protocols use several tables to store

the messages and periodically update the tables, in order to maintain fresh route

information throughout the entire network. A different approach from proactive

routing is the reactive routing protocols, or on-demand protocols [73, 116].

Besides local links, these protocols initiate a flooding route discovery when

Page 32: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

4

requiring sending data to a specific destination and do not maintain the route

information periodically. They usually have two mechanisms, route discovery

and route maintenance, to create and maintain a route efficiently to prevent highly

overloading the whole network. Unlike proactive routing protocols, these protocols

can save the resource (e.g, node’s battery and network bandwidth) but not always

transmit data immediately. The last is hybrid routing which incorporates merits of

proactive and reactive routing. These protocols are designed to increase scalability

by allowing nodes with close proximity to work together. They can be formed by

some particular backbone to reduce the route discovery overheads and also by a

single point failure. Hybrid routing protocols can exhibit a better performance than

proactive and reactive schemes can. However, the memory requirement is greater

and the path to destination may be suboptimal.

In MONs, popular ad hoc routing protocols such as AODV [116] and DSR

[73] fail to establish routes. This is due to these protocols trying to first establish

a complete route and then, after the route has been established, forward the actual

data. However, when instantaneous end-to-end paths are difficult or impossible

to establish, routing protocols must take a “store and forward” approach, where

data is incrementally moved and stored throughout the network in hope that it

will eventually reach its destination. The routing in these networks are classified

into: Flooding based routing, History or prediction based routing and Sociality-

aware routing, based on whether the future movement and connection status of the

network is known or predictable [23, 106].

The basic concept of flooding based routing [159] is to flood the packets,

a node copies its message to all the nodes that come in contact with it, provided

the recipient node does not have a copy of it already. Several methods have been

proposed to control the flooding. Most of the routing strategies were designed with

Page 33: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

5

the aim to avoid flooding [28, 136, 148]. Even when flooding is adopted, care has

been taken to conserve the resources. Some approaches also take care to free the

buffer, after the message has been delivered. History or prediction based routing,

utilizes the history of encounters between nodes, to make a more informed routing

decision. Intuitively, a node that has encountered the destination many times, is

likely to encounter the destination again. This is the principle behind history based

routing protocols [21, 91, 94, 126]. Sociality-aware routing [29, 36, 95, 136],

works on two important observations from society: people with closer relationship

tend to reside in communities and people within a community may have different

popularity. As such, the increasingly “popular” or “central” nodes are more

probably chosen as carriers to relay messages between disconnected communities,

until a node belonging to the same community with the destination is reached.

1.2 WIRELESS SENSOR NETWORKS (WSN)

Wireless Sensor Networks (WSN) contain a number of sensor nodes

dispersed randomly onto a target field [4]. With the advance in microelectronic

technology, sensor nodes are developed with small size, low cost, and low power

consumption, communicate via radio frequency over short distances. Each sensor

might be deployed to collect one kind of data. It is capable of collecting the data

and to broadcast the selected data to the next hop or to the closest base station. The

particular property that differentiates a WSN from a MANET is the convergecast

(many-to-one) service mode. Therefore, the communication protocol developed

for WSNs much be energy-efficient. The main goal in WSN research is to find

a topology for a WSN which can both save energy usage to prolong a network

lifetime and enhance the data transfer. WSNs are coming into wider use today and

in the future. Some of the applications of WSN are:

Page 34: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

6

- Homeland Security: Motion sensors detect and report the possible incursions

on our border areas.

- Military: Robots are configured as a sensor network to scan the whole battle

filed.

- Healthcare: Patients can carry a small sensor which reports to the doctor via

a WSN.

- Environmental Monitoring: WSN helps to gather data for some species

studies or report weather in a dangerous area, such as near a volcano.

UnderWater Acoustic Sensor Networks (UWASN) consist of underwater

sensors that are deployed to perform collaborative monitoring tasks over a given

area [146, 179]. UWASN shares many properties with terrestrial sensor networks

such as the large number of nodes and energy issues, still these are different in many

aspects from terrestrial sensor technology. Communications in UWASN have to be

done through acoustic channels, because electromagnetic radio signals attenuate

quickly in water. The speed of sound in water is five-order slower than the speed

of light, which brings long propagation and end-to-end delay. The bandwidth of an

acoustic channel is low and the error rate is high. Most underwater sensor nodes,

except some fixed nodes equipped on surface level buoys have low or medium

mobility (move up to 1-3 m/sec) owing to water currents and other underwater

activities [2, 63]. UWASN can be used in a wide spectrum of aquatic applications,

such as oceanographic data collection, pollution monitoring, offshore exploration,

disaster prevention and coastline surveillance [3].

Page 35: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

7

1.2.1 Routing in WSN

The main task of sensor networks is to monitor and detect events, perform

quick local data processing and then transmit data to a base station. Based on

this main task, power consumption can be further divided into three domains:

Coverage, Communication and Data Processing.

The coverage problem is important in WSN. The goal is to have each

location within the sensing range of at least one sensor. The coverage problem also

reflects the quality of service that can be provided by a particular sensor network.

With the energy constraint, devising a method to prolong network lifetime while

successfully handling the coverage tasks becomes very important. In WSN, sensor

nodes are deployed densely. Therefore, it is possible to turn some sensor off while

the network is still able to handle its tasks [9, 10, 124, 129, 130, 156, 189, 198].

Communication protocols find an energy efficient routes based on the available

power in the nodes or the energy required for transmission in the links along the

nodes. The route that consumes minimum energy to transmit the data packets

between base station and the sensor nodes is preferred. To use this technique, one

must design an algorithm to find a minimum energy consumption route [83, 135].

In UWASN, because of the high attenuation of long range communication,

multi-hop relay is a common scheme to reduce energy consumption in the data

transmission process. When a node has a packet to transmit to the sink, this

packet will be routed through some intermediate nodes in the multi-hop relay

process. Because, the underwater sensor nodes will move due to the water current,

the network topology changes frequently. The routing protocols designed for

terrestrial wireless sensor network are not suitable for UWASN because the node

mobility is not considered in these protocols. These protocols usually require

Page 36: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

8

the processes of path construction, maintenance and recovery. However, these

processes are very expensive in high dynamic UWASN [14, 53]. The underwater

routing protocols flood the packets to the sink with geographic information

[6, 13, 32, 42, 55, 68, 110, 111, 119, 161, 180, 183].

1.3 CONNECTED DOMINATING SET (CDS)

A simple graph G = (V,E) can be used to represent a MANET or WSN,

where V represents a set of mobile or sensor nodes and E represents a set of

communication links between the nodes. An edge (u,v) indicates that in a

particular time, both nodes u and v are within their transmission range, hence,

connections of nodes are based on geographic distances among them. The topology

of this type of graphs vary over time due to node mobility.

1.3.1 Definitions

This section provides some preliminary definitions that are relevant to the

understanding of the rest of the chapters.

Definition 1.1. Graph: It is an ordered pair G = (V,E) comprising a set V of

vertices or nodes together with a set E of edges or links, which are 2-element

subsets of V .

Definition 1.2. Undirected Graph: A graph G = (V,E) is an undirected graph in

which edges have no orientation. The edge (a,b) is identical to the edge (b,a), i.e.,

they are not ordered pairs.

Definition 1.3. Connected Graph: In an undirected graph G = (V,E), two vertices

u and v are called connected if G contains a path from u to v. Otherwise, they are

Page 37: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

9

called disconnected. A graph is called connected if every pair of distinct vertices

in the graph is connected; otherwise, it is called disconnected.

Definition 1.4. Weighted Graph: A graph G = (V,E) is a weighted graph if a

number (weight) is assigned to each edge and/or vertices. Such weights might

represent, for example, costs, lengths or capacities, etc. depending on the problem

at hand.

Definition 1.5. k-connected Graph : A graph G = (V,E) is said to be k−vertex

connected or k−connected if for each pair of vertices there exists at least k mutually

independent paths connecting them. In other words, G is still connected even after

the removal of any k−1 vertices from G.

Definition 1.6. Dominating Set (DS): For a given graph G = (V,E), a DS is a

subset D⊆V , such that for every vertex v ∈V , either v ∈ D, or v has a neighbor in

D.

Definition 1.7. Connected Dominating Set (CDS): For a given graph G = (V,E), a

CDS is a subset D⊆V such that D is a DS and the graph induced by D is connected.

The nodes in a CDS are called dominators, the others are called dominatees.

Definition 1.8. Maximal Independent Set (MIS): For a given graph G = (V,E), an

Independent Set (IS) is a subset of nodes U ⊆ V , such that no two nodes in U are

adjacent (ie., ∀(x,y) ∈U | (x,y) /∈ E). An IS is maximal, if no node can be added

without violating independence.

Definition 1.9. Multi-Point Relay(MPR): For a given a graph G = (V,E) and a

node v ∈ V , let Nv1 and Nv

2 represent the set of 1-hop and 2-hop neighbors of v,

respectively. MPR asks for a minimum size subset of Nv1 such that Nv

2 is covered

by MPR (i.e., MPR(u) = {v|v ∈ Nu1} such that Nu

2 =⋃

v∈MPR(u)Nv1).

Page 38: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

10

Definition 1.10. Maximum Degree ∆: Let G = (V,E) be a graph. For a node v∈V ,

d(v) denotes the degree of v and Nv1 denotes the neighbor set of v. Nv

1 = {u | (u,v)∈

E} and d(v) =| Nv1 |. The maximum node degree of G is, ∆ = max{d(v) | v ∈V}.

The problem of finding the MCDS of a given graph is known to be NP-

complete. Therefore, only approximation algorithms running in polynomial-time

are practical for wireless ad hoc networks.

1.3.2 Algorithms for CDS construction

The existing CDS construction techniques for wireless ad hoc networks

can be classified into three categories, based on the network information they use:

centralized algorithms, distributed algorithms and localized algorithms. The CDS

construction algorithms are summarized in [20, 190].

Centralized algorithms [37, 45, 56, 81, 131], determine a CDS based on

global information. These algorithms usually have the best performance guarantee

and the minimal average CDS size. The major drawback are high overhead and

slow convergence. Collecting global information incurs large message cost and

high delay, which make centralized algorithms less attractive in ad hoc networks

that do not have centralized control.

Distributed algorithms [8, 24, 30, 71, 89, 132, 133, 151, 152, 162, 171,

193], do not need any geometric or topological information. Nodes exchange

hello messages to identify their neighbors. The computation is partitioned into

rounds, where the nodes receive the messages sent in the previous round, execute

local computations and send messages to the neighbors in the next round. All the

distributed algorithms for CDS construction require only local information and a

Page 39: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

11

constant number of iterative rounds of message exchanges among the neighboring

hosts. These algorithms are either prune-based or MIS based. In prune-based

algorithms, all nodes are CDS nodes at first, and then nodes become dominatee

according to some rules. The idea behind MIS-based algorithms is to find a

Maximal Independent Set (MIS) first, then find connectors to form a CDS. The

MIS-based algorithms are further can be divided into single initiator and multiple

initiator. For the single initiator algorithms, a unique initiator is elected and become

a CDS node firstly. Then CDS nodes are picked up according to their position

in this tree. Actually, in this kind of algorithms, a tree is built implicitly or

explicitly. In multiple initiator algorithms, many nodes claim themselves CDS

nodes simultaneously at first based on their local information.

Localized Algorithms [1, 34, 35, 59, 92, 107, 123], are distributed

algorithms, where each node determines its status based on its h−hop information

only. A localized algorithm converges in O(1) rounds, which makes it very robust

in dynamic networks such as MANET and WSN.

1.3.3 Applications of CDS

The communication methods and network topology maintenance are

challenging in MANETs and WSN, as there is no fixed or pre-defined

infrastructure. Inspired by the physical backbone in wired networks, many

researchers have been working on creating an effective virtual backbone in these

networks. It is possible to construct a virtual backbone (VB) by using a CDS. A

VB is a subset of nodes that is able to perform data communication tasks and to

serve nodes that are not in the backbone. It has been applied for the following

applications:

Page 40: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

12

Multicasting/broadcasting [12, 16–18, 87, 93, 105, 107, 123, 135, 141,

147, 152, 174]: Broadcasting is frequently used in on demand routing protocols

for route discovery. By using only CDS nodes to forward broadcast packets, full

delivery is guaranteed while the excessive broadcast redundancy can be avoided.

Routing [5, 16, 38, 39, 48, 95, 143, 144, 172, 186]: By using only nodes in

the CDS as routers, non-CDS nodes do not maintain a routing table. With the help

of CDS, routing is easier and can adapt quickly to network topology changes. In

addition, using the CDS can reduce the traffic during communication and simplify

the connectivity management.

Energy Efficient Scheduling [170, 172, 174, 198]: By making non-CDS

nodes into periodical sleep mode, the energy consumption is greatly reduced while

network connectivity will be maintained by CDS nodes.

Topology Control [26, 125, 129, 156, 167]: In densely deployed sensor

networks, the node coverage of a CDS is a good approximation to provide reduced

topology for area coverage. The deployment area is within the sensing range of

CDS nodes with high probability.

1.4 MOTIVATION

The mobility of nodes cause two problems in MANET: the source node

might use the links that do not exist and topology might change during the

forwarding of the packet. This will affect both the quality of the selected paths

and their durability. Thus, the route selection process should also consider the link

stability criterion (i.e. links durability), which allows to maintain the characteristics

of the selected paths.

Page 41: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

13

When a natural disaster like an earthquake or tsunami hits a region, it

frequently destroys the existing communications infrastructure. As the relief

agencies move onto the region, the services provided must be coordinated quickly

via a communication network. MANETs are suited for ubiquitous communication

during emergency rescue operations. Energy efficiency, quick response time and

stability are equally important for routing in emergency MANETs, since mobile

nodes have homogeneous lifetimes. The presence of dynamic and adaptive routing

protocols will enable ad hoc networks to be formed quickly, and then it ensures

efficient communications during the rescue operations.

Message transmission in MON is based on message replication or using

MANET routing protocol with DTN mechanism and social-aware routing. The

network overhead is high in MON when a flooding or replication based message

transmission is applied. The DTN extension on MANET routing routing protocol

needs a convergence layer to carry the bundle and social-aware routing needs global

network topology. Instead of allowing every node in the network to forward the

messages, it is better to choose a subset of nodes to do it. When only the nodes in

the subset forward data, the routing in opportunistic networks is achieved with the

optimal performance in terms of the expected end-to-end delay and delivery ratio.

This subset of nodes should be capable of delivering the packets to the destination.

As nodes in WSN prone to failures, nodes may have mobility and are

turned on and off frequently, fault tolerance and routing flexibility are necessary

for routing. Therefore, it is important to maintain a certain degree of redundancy

in CDS. Unfortunately, a CDS can preserve 1-connectivity and it is therefore very

vulnerable. The k−coverage of WSNs studies a methodology to ensure that every

point in a target area is covered by at least k different working nodes. The set of

redundant nodes, then, can sleep until one of the working nodes fails. As a result,

Page 42: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

14

the k−covered network can extend the network lifetime without loss of sensing

reliability.

The location or depth based flooding in UWASN increases the energy

consumption of network due to redundant packet transmissions, which in turn

increases an end-to-end delay in dense networks and reduces packet delivery in

sparse networks. Therefore, an energy-efficient routing with reduced overhead is

needed to increase the network performance.

1.5 OBJECTIVES

The high level objectives of this thesis work are:

1. To design a stable CDS and implement a Link-State Hybrid Routing Protocol

for Mobile Ad Hoc Networks.

2. To design a weighted CDS and implement an Energy Efficient Reactive

Routing Protocol for Ad Hoc Communications during Emergency and Rescue

Scenarios.

3. To design an Ego-centrality, Contact-duration based CDS and implement a

Reactive Routing Protocol for Mobile Opportunistic Networks.

4. To design a k−coverage CDS and implement a Fault Tolerant Topology

Control for Area Monitoring in Wireless Sensor Networks.

5. To design an Ant Colony optimization (ACO) based energy, pressure-aware

CDS and implement an Energy-Efficient Routing Protocol for UnderWater

Acoustic Sensor Networks.

Page 43: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

15

The first objective of this thesis is considering the expected connectivity

time of the communication links, energy and degree of nodes. These metrics help to

measure the stability of a link and to select nodes (dominating) which can provide

stable path for routing. The dissemination of link state information is restricted to

the dominating nodes, which will reduce the number of broadcast messages. It also

helps to find a routing path from the topology information and the end-to-end delay

will be reduced if no route calculation is done at intermediate nodes.

The second objective is also considers the stability of routing path that

accounts the link stability, mobility and energy of nodes. These metrics are used to

identify backbone nodes which can provide long lasting routing path. The nodes

which are responsible for routing are limited to the nodes in the backbone, which

will greatly reduce routing overhead and energy consumption.

The third objective focuses on selecting the most central nodes that have

more chances to meet the destination. Centrality is a mathematical measure

proposed by social network analysts to capture the structural properties of social

relationship. Here, an ego-centrality and the average duration of contact with other

nodes are considered to select the important nodes that meet more nodes. The

message transmission is restricted only to these selected nodes.

The fourth objective considers the requirement of k−coverage, to take care

of fault tolerance and robustness of dominatees, which ensure that every dominatee

has at least k adjacent dominator neighbors.

The fifth objective addresses the energy efficient communication

mechanism for UWASN. It focuses on providing a communication environment,

where the energy consumption is less and network performance is high. The energy

level and the depth of nodes are used to select the dominating nodes.

Page 44: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

16

1.6 CONTRIBUTIONS OF THIS THESIS

The contributions of this research work, which are elaborated throughout this

thesis, are summarized here,

1. Stability based Energy-Efficient Link-State Hybrid Routing (S-ELHR)

Protocol for Mobile Ad Hoc Networks

Proposes a hybrid routing protocol, S-ELHR for MANET and a localized

algorithm for CDS construction. The major contributions of this work are the

following:

- Introduces a weight based willingness calculation, which is computed as a

ratio between actual and initial energy.

- Proposes a stability metric, which takes into account the link connectivity

time, energy and degree of nodes.

- Develop a localized algorithm for CDS construction based on stability

metric.

- Implement a relay based broadcasting for topology discovery and source

routing for data transmission over CDS.

- Apply route recovery mechanism to adapt to changes in network topology.

- Evaluate the performance of S-ELHR and compare it with the existing

protocols.

2. Weighted Connected Dominating Set based Routing (Weighted-CDSR)

Protocol for Ad hoc Communications in Emergency and Rescue Scenarios

Proposes a reactive routing protocol Weighted-CDSR and a distributed

algorithm for weighted CDS construction. The main contributions of this work

are the following:

Page 45: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

17

- Proposes a weight metric, which considers link stability, mobility and

energy of nodes.

- Develop a distributed algorithm for Maximum Weight Minimum CDS

(MWMCDS) construction based on weight metric.

- Implement a route discovery and maintenance mechanism over

MWMCDS.

- Evaluate the performance of Weighted-CDSR and compare it with the

existing protocols.

3. Backbone Routing Protocol (BRP) for Mobile Opportunistic Networks

Proposes an on-demand routing protocol and a localized algorithm for CDS

construction. The main contributions of this work are the following:

- Define and Formulate Ego-Centrality Contact-Duration based CDS

(ECCDS).

- Design a localized algorithm for ECCDS construction.

- Develop a message forwarding mechanism over ECCDS.

- Implement a buffering mechanism to be used when the network is

partitioned.

- Evaluate the performance of BRP and compare it with the existing

protocols.

4. k−Coverge CDS for Fault Tolerant Topology Control in WSN

Proposes a k−coverage protocol and distributed algorithms for CDS

construction. The main contributions of this work are the following:

- Define and formulate k−Coverage Connected Dominating Set (k−CCDS).

Page 46: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

18

- Proposes a Weighted Coverage Cost (WCC), based on the coverage

redundancy of sensing area of sensors.

- Develop distributed algorithms for MIS and k−CCDS constructions.

- Evaluate the performance of k-CCDS and compare it with the existing

protocols.

5. CDS based Energy-Efficient Pressure-Aware Routing Protocol (CDS-

EPRP) for UWASN

Proposes an on-demand routing protocol and a distributed algorithm for CDS

construction. The main contributions of this work are the following:

- Application of ACO for CDS construction using energy and depth of

underwater sensors.

- Design of data forwarding over CDS.

- Implement a connectivity mechanism to maintain the CDS structure.

- Evaluate the performance of CDS-EPRP and compare it with the existing

protocols.

1.7 ORGNAIZATION OF THE THESIS

The thesis is organized in eight chapters.

Chapter 1, “Introduction” provides the required introductory concepts to

MANETs, WSN and CDS. The routing challenging in MANETs and WSN are

discussed in detail. The definition of CDS, algorithms for CDS construction and

the applications of CDS are also explained. This chapter also outlines motivation,

objectives, contributions and organization of thesis.

Page 47: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

19

Chapter 2, “Literature Survey” reviews related works on routing protocols

in MANET, WSN, MON and UWASN. It also presents the application of CDS

in MANET and WSN. Finally, CDS construction with optimization techniques is

discussed.

Chapter 3, “Design of Stability based Energy-Efficient Link-State Hybrid

Routing Protocol for Mobile Ad Hoc Networks” describes in detail the proposed

protocol S-ELHR, a stability based energy-efficient link-state hybrid routing

protocol. It gives an introduction to stability-based routing in MANETs. The

network model and problem statement are provided for S-ELHR. This chapter

also describes how the stability metric is calculated as combined metric from link

connectivity time, energy and degree. The design of localized algorithm for CDS

construction using stability metric is also explained. This chapter also elaborates

the process involved in discovering the topology, source route calculation and

the route recovery mechanism. The performance of S-ELHR in terms of packet

delivery ratio, end-to-end delay, control overhead and energy consumption is

discussed.

Chapter 4, “Design of Weighted Dominating Set based Routing Protocol

for Ad Hoc Communications in Emergency and Rescue Scenarios” describes

the proposed protocol Weighted-CDSR, a reactive routing protocol for ad

hoc communications during emergency and rescue scenarios. It provides an

introduction to energy-efficient routing in emergency communications. A model

of the network and problem statement are explained. This chapter explains the

computation of weight with link stability, mobility and energy metrics. It also

describes the design of a distributed algorithm for maximum weight connected

dominating set construction. The route discovery and maintenance are also

described. It also presents the simulation parameters and the protocols used for

Page 48: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

20

comparison. At the end, the performance of Weighted-CDSR is discussed in terms

of packet delivery ratio, control message overhead, end-to-end delay and energy

consumption.

Chapter 5, “Design of an Ego-Centrality and Contact-Duration based

Backbone Routing Protocol for Mobile Opportunistic Networks” presents the BRP,

a backbone based routing protocol using ego-centrality and contact-duration. An

introduction of social-aware routing in MON is given. The model of network and

the problem statement for BRP are explained. It also explains the computaion of the

ego-centrality, average contact-time calculation and a localized algorithm for CDS

construction. It also presents how the message forwarding is done over CDS. At

the end of the chapter, the simulation parameters, protocols used for performance

comparison and performance results of BRP in terms of packet delivery ratio, end-

to-end delay and routing overhead are presented.

Chapter 6, “Design of Connected k−Coverage Topology Control for Area

Monitoring in Wireless Sensor Networks” presents the k−CCDS, a coverage and

connectivity protocol for WSN based on k−CDS. An introduction of CDS based

coverage in WSN is discussed. It gives the network model and the problem

statement for k−CCDS. The computation of weighted coverage cost and distributed

algorithms for k−CCDS construction are described. The simulation parameters,

protocols used for comparison and the performance of k−CCDS in terms of CDS

size, coverage, energy consumption and lifetime of the network are presented at

the end of the chapter.

Chapter 7, “Design of Connected Dominating Set based Energy-Efficient

Pressure-Aware Routing for Underwater Acoustic Sensor Networks”, describes

the CDS-EPRP, a CDS based energy-efficient pressure-aware routing protocol for

underwater acoustic sensor network. First, an introduction of energy-efficient

Page 49: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

21

routing in UWASN is discussed. It presents the network model and the problem

statement. It also explains the ACO based CDS construction algorithm, data

forwarding and connectivity maintenance of CDS. The simulation parameters,

protocols used for comparison and the performance results of CDS-EPRP in

terms of packet delivery ratio, energy consumption and end-to-end delay are also

discussed.

Chapter 8, “CONCLUSION AND FUTURE WORK ” summarizes the

contributions of the research work and outlines the scope for future research.

Page 50: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

CHAPTER 2

LITERATURE SURVEY

This chapter reviews on various works carried out for providing routing in

mobile ad hoc and wireless sensor networks. The literature survey begins with

routing protocols in MANETs and WSN. The survey continues by describing

CDS based routing and energy efficient routing protocols in MANETs. Also,

routing protocols in MON, CDS based coverage in WSN and routing in UWASN

are discussed from various literature collections. The application of optimization

techniques for CDS construction is also described in this survey.

2.1 ROUTING PROTOCOLS IN MANET

Dynamic Source Routing (DSR) proposed by Johnson et al. [73], is a

reactive routing protocol, uses a concept of source routing. The sender knows

the complete hop-by-hop route to the destination. These routes are stored in a

route cache. The data packets carry the source route in the packet header. When a

node in the network attempts to send a data packet to a destination and it does not

know the route, it uses route discovery process to dynamically determine a route.

The route discovery process works by flooding the network with Route Request

(RREQ) packets. Each node receiving a RREQ rebroadcasts it, unless it is the

destination or it has route to the destination in its route cache. Such a node replies

to the RREQ with a Route Reply (RREP) packet that is routed back to the original

source. RREQ and RREP packets are also source routed. The route carried back

22

Page 51: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

23

by the RREP packet is cached at the source for future use. If any link on a source

route is broken, the source node is notified using a Route Error (RERR) packet. The

source removes any route using this link from its cache and a new route discovery

process is initiated if this route is still needed.

Ad hoc On-Demand Vector (AODV) proposed by Perkins et al. [116] is

a reactive routing protocol, also discovers routes on demand, using a similar route

discovery process like DSR. However, AODV adopts a very different mechanism to

maintain routing information. It uses routing tables with one entry per destination.

It relies on routing table entries to propagate a RREP back to the source and to

route data packets to the destination. It uses sequence numbers at each destination

to determine freshness of routing information and to prevent routing loops. These

sequence numbers are carried by all routing packets. Upon receiving the RREQ

packet, each intermediate node checks whether it has a valid route to the requested

destination. If the sequence number of the stored route is greater than the sequence

number in the RREQ packet, it notifies the source about the valid route by sending

RREP. If an intermediate node does not have a valid route to the destination, it

checks whether it has already forwarded a RREQ packet with the same sequence

number. If not, an intermediate node records its receipt of the RREQ packet and

broadcasts the packet to its neighbors. The destination node, upon receiving the

RREQ packets, chooses the desired route and notifies the selected route through

a RREP packet to the source. An important feature of AODV is the maintenance

of timer-based states in each node regarding utilization of individual routing table

entries. A routing table entry expires if it is not used recently. A set of predecessor

nodes is maintained for each routing table entry, indicating the set of neighboring

nodes that uses the entry to route data packets. These nodes are notified with RERR

packets when the next hop link breaks.

Page 52: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

24

Dynamic MANET On-demand (DYMO) proposed by Chakeres et al. [27]

is a reactive routing protocol, uses the same route discovery mechanism used in

AODV to construct the routing tables. During route discovery, the originating node

multicasts a RREQ to find a route toward some target destination. Using a hop-

by-hop retransmission algorithm, each node receiving the RREQ message records

a route toward the originator. When the target destination receives the RREQ, it

records a route and generates a RREP. Each node that receives the RREP stores a

route toward the target, and again unicasts the RREP toward the originator. When

the originator receives the RREP, routes have then been established between the

source and destination nodes, in both directions. Route maintenance consists of

two operations. In order to maintain active routes, DYMO routers extend route

lifetimes upon successfully forwarding a packet. When a data packet is received to

be forwarded downstream but there is no valid route for the destination, then the

DYMO router of the source of the packet is notified via a RERR message. Each

upstream router that receives the RERR marks the route as broken. Before such an

upstream DYMO router could forward a packet to the same destination, it would

have to perform route discovery again for that destination.

Optimized Link State Routing (OLSR) developed by Clausen et al. [33], is

a proactive routing protocol for mobile ad hoc networks. OLSR constructs and

maintains routing tables by diffusing partial link state information to all nodes

in the network, with the help of MPR. There are two types of control traffic in

OLSR: HELLO and TC packets. Each node collects the 2-hop neighborhood

information using HELLO packets. HELLO packets are sent periodically and are

never forwarded by any node. Each node maintains a MPR selector list, including

the nodes, which have elected this node as its MPR. Upon receiving a HELLO

message, a node examines the list of addresses. If its own address is included in the

Page 53: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

25

MPR list, the sender is added to the MPR selector list. A node upon receiving the

traffic, checks whether the sender is in the MPR selector list. If so, it will forward

the traffic. TC packets are also sent periodically. The purpose of this packet is to

transmit partial link state information on the network. A TC packet is generated by

a MPR node and it contains the MPR selector list. Upon receiving a TC packet, a

node knows that the sender is the next-hop node to reach all nodes listed in the TC

packet. Once the topology is constructed, shortest path algorithm is run to create

routing tables. All routing is done through MPR nodes .

Energy-Efficient OLSR (EE-OLSR) proposed by De et al. [40] is an

extension of OLSR for proactive routing. They investigated the effects of

applying energy-aware routing to the OLSR protocol, to evaluate the influence

of overhearing and idle activity on the energy consumption in a network using

the IEEE 802.11 technology and to check if these considerations could affect the

performance of a protocol that ensures a good QoS in terms of end-to-end delay. In,

EE-OLSR, the MPR selection mechanism was based on the Willingness concept, to

prolong the network lifetime without losses of performance in terms of throughput,

end-to-end delay or overhead. They tested the performance of EE-OLSR with

different well-known energy aware metrics and noticed that Minimum Drain Rate

(MDR) based EE-OLSR outperforms classical OLSR, and MDR confirms to be the

most performing metric to save battery energy in a dense mobile network with high

traffic loads.

Guo et al. [57, 58] developed a multi-objective routing decision-making

mechanism within OLSR, named Multi-Objective OLSR (OLSR MO). This

routing mechanism considered three objectives: minimizing average end-to-end

delay, maximizing network energy lifetime, and maximizing packet delivery ratio.

Therefore, they focused on three routing metrics: queuing delay, energy cost

Page 54: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

26

and link stability cost. First, OLSR MO predicts multiple dynamic networking

metrics in each measurement interval including mean local queuing delay, local

energy consumption, and residual link lifetime. Second, it combines the metrics

into a multi-objective routing metric of each known node-link pair based on the

predicted values. Third, it enables flexible settings for the relative importance of

the different routing objectives in the composite metric. This was achieved by a

normalized weighted additive utility function. To minimize the additional overhead

to the routing protocol, each node independently measured all the metrics locally

without any extra information exchange with the other nodes. These local metrics

were used to predict the corresponding future values, which are disseminated to

its neighboring nodes through normal periodical routing broadcasts. Each node

receives the predicted metric values of neighboring nodes and creates its routing

table using an extended version of Dijkstra’s algorithm. This algorithm calculates

the lowest-cost route to each known node using the composite metric as the link

cost.

Yi et al. [187] developed a hybrid multi-path routing protocol called

MultiPath OLSR (MP-OLSR). MP-OLSR works in two phases: topology sensing

and route computation. The topology sensing phase is used to make the nodes

aware of the topology information of the network. This part have used MPRs

like OLSR. The route computation phase used the Multi-path Dijkstra Algorithm

to calculate the multi-path, based on the information obtained from the topology

sensing. They applied two cost functions to generate node-disjoint or link-disjoint

paths. In MP-OLSR, the proactive behavior of OLSR is changed for an on-demand

computation. It becomes a source routing protocol. To support to the frequent

topology changes of the network, auxiliary functions, route recovery and loop

check, were implemented in MP-OLSR. The source route is saved in the header

Page 55: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

27

of the data packets. They also implemented route recovery and loop detection in

MP-OLSR to improve quality of service regarding OLSR. The contributions were

quantified in terms of quality of service parameters and compared with OLSR.

A Reliable Multi-path QoS routing protocol (RMQR) proposed by Wang

et al. [165], is an on-demand routing scheme. RMQR is a reliable multi-path QoS

routing protocol with mobility prediction for MANETs. It includes route discovery,

route reservation, and route maintenance. RMQR considered multiple QoS paths

from a source node to a destination node and the routes must also satisfy certain

bandwidth requirements. To calculate the path, the authors proposed two metrics:

Route Expiration Time (RET) and the number of hops, to select a routing path with

low latency and high stability. The RET is the minimum of the link expiration time

of the links that constitute the path. They considered a path as best path when the

ratio of RET to hop count is maximum. They used global positioning system (GPS)

to determine the RET between two connected mobile nodes.

Tan et al. [155] proposed an on-demand routing protocol, named Power

and Mobility Aware Routing (PMAR) using node location information. PMAR

is designed for choosing a route based on maximizing the minimum node

battery power and minimizing the total transmission power required to reach

the destination. PMAR was able to restrict control packet flooding during

route discovery and pre-empt link breakages because of node mobility. They

first formulated a power and mobility aware optimization problem. Then, they

presented a heuristic schmeme, PMAR protocol. They verified the performance of

PMAR in static and mobile networks.

Page 56: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

28

2.2 CDS BASED BROADCASTING AND ROUTING INMANETS

Wu et al. [170] proposed a method of calculating power-aware CDS,

based on a dynamic selection process. Specifically, in the selection process of a

gateway node, preference was given to a node with a higher energy level. The

CDS construction was based on the algorithm proposed by Wu et al. [171]. The

algorithm works by finding a CDS and then pruning certain redundant nodes from

the CDS. Initially, each of the nodes exchanges one-hop neighborhood information

with all its neighbors. First, every node determines if two of its neighbors are

mutually adjacent or not. All the nodes, which have two unconnected neighbors,

include themselves in the CDS. In the next step, some redundant nodes were

discarded from the CDS, thereby reducing the CDS size. The pruning rule states

that any node u in the CDS is considered as redundant and should be pruned if it

has either a neighbor in CDS with a larger ID, which dominates all other neighbors

of u or two adjacent neighbors with larger IDs that together, dominate all other

neighbors of u. The pruning rules were extended based on node degree and energy

level associated with each node.

The routing process proposed by Wu et al. [172], was based on a power-

aware connected dominating set in [170, 171]. A dominating node is also called

as a gateway host. The proposed dominating-set-based routing consists of three

steps: 1) If the source was not a gateway host, it forwarded the packets to a source

gateway, which is one of the adjacent gateway hosts. 2) This source gateway

acted as a new source to route the packets in the induced graph generated from

the CDS. 3) Eventually, the packets reached a destination gateway, which is either

the destination host itself or a gateway of the destination host. In the latter case, the

Page 57: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

29

destination gateway forwarded the packets directly to the destination host. Each

gateway host maintained gateway domain membership list and gateway routing

table. Gateway domain membership list is a list of non-gateway hosts which are

adjacent to gateway hosts. Gateway routing table includes one entry for each

gateway host, together with its domain membership list.

Stojmenovic et al. [151, 152] proposed a neighbor elimination based

broadcasting scheme with dominating sets. A localized algorithm is applied,

where cluster heads were selected to form a dominating set and border nodes

were identified to connect the cluster heads. They used highest key = (degree,x,y)

in selecting internal nodes, and retransmission after negative acknowledgements

scheme. The degree represents the number of neighbours and (x,y) represents

the position of a node. Internal node maintenance was incorporated into location

updates between neighboring nodes if GPS or another location method is available

to all the nodes in the network.

To minimize flooding traffic, Yen et al. [186] proposed a protocol named

routing with adaptive path and limited flooding (RAPLF). In the RAPLF, the

mobile hosts initially exchange their node sets of one-hop neighbor by the hello

message. Then, each mobile host selects a subset (MPR) of its one-hop neighbor

nodes in such a way that the subset can cover all the two-hop neighbor nodes when

forwarding its broadcast traffic. In this process, each mobile host builds a minimum

spanning tree consisting of all the neighbor nodes in its two-hop list. RAPLF

initiates the route discovery procedure, when the source host wants to transmit

a datagram to a destination. The source host first checks its two-hop list. If the

destination host is in its two-hop list, then the datagram is transmitted by following

the routing table’s path. If the destination host is not in its two-hop list, the source

host broadcasts the Route Search Packet (RSP) to the MPR-set. When the MPR-set

Page 58: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

30

receives this RSP packet, it also checks their two-hop list. If the destination host is

in their two-hop list, then the MRP-set forwards directly the RSP to the destination

host. The destination host replies with a Route Reach Packet (RRP) which follows

the RSP return path to the source host. If the destination host is not in their two-

hop list, then it modifies the sequence-number and hop-count, and re-broadcasts

this RSP. The process is repeated until it finds the destination host.

An efficient virtual-backbone routing proposed by Al-Karaki et al. [5] was

based on virtual grid architecture (VGA) clustering. They created a simple and

stable rectilinear virtual topology on which the routing and network management

functions were performed easily and efficiently. The clustering approach consists

of two major steps: network zoning and CH election inside zones. The zoning

strategy starts by dividing the network area into disjoint, adjacent, fixed size, and

regular (symmetric) shape zones. To create a simple rectilinear virtual topology,

they selected the zones to be square in shape with possible extension to other virtual

topologies like hexagon, line, or triangle. After the zoning operation was finished,

a CH election algorithm was executed in each zone.

Bao et al. [16] introduced a topology management by priority ordering

(TMPO) to solve the CDS problem. The priority computation integrates multiple

factors (energy and mobility) into a single metric for cluster election decisions.

TMPO applied the neighbor-aware contention resolution (NCR) algorithm to

provide fast convergence and load balancing with regard to the battery life and

mobility of mobile nodes. Based on NCR, TMPO assigned randomized priorities

to mobile stations, and elects a minimal dominating set (MDS) and the CDS of

an ad hoc network according to these priorities. TMPO requires only two-hop

neighbor information for the MDS elections. The dynamic priorities assigned to

nodes are derived from the node identifiers and their “willingness” to participate in

Page 59: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

31

the backbone formations. The willingness of a node is a function of the mobility

and battery life of the node.

Hassan et al. [60] developed a new distributed connected-dominated-set

clustering algorithm called Ring Clustering Algorithm (RCA). RCA is a heuristic

algorithm that had three phases: ring-formation phase, members-joining phase and

CDS-nodes selection phase. In the ring-formation phase, each ring consists of

three ring-nodes. The ring was formed if it has the highest priority. The priority of

the ring was based on the total ring-degree rather than the individual node-degree.

The degree of a ring is the number of neighbors that the three ring-nodes have all

together without repetition. Nodes that cannot form rings join neighboring rings

as members in the members-joining phase. In the CDS nodes selection phase, the

decision was made for a node to remain or leave the CDS.

Moulahi et al. [107] mentioned that the methods proposed to minimize

broadcast storm problem, such as MPR or DS-MPR (Connected Dominating Sets

with MPR) stipulated that a packet is correctly received if the receiver node is in

the transmission radius of the sender node. They suggested that this fact is not

always true, due to many factors like signal attenuation, noise and existence of

obstacles. They proposed a broadcasting mechanism based on DS-MPR, where

CDS is constructed from MPR based on weight of nodes. The weight is a function

of node remaining energy and node degree. They proposed realistic weight and

extended weight taking into account the reception probability according to the log-

normal mode. They also introduced a modification of DS-MPR, named Realistic

DS-MPR (RDS-MPR), to be applicable with a realistic physical layer.

Spohn et al. [147] introduced a three-hop horizon pruning (THP) algorithm

to make broadcast operations more efficient in ad hoc networks. THP builds a

two-hop connected dominating set (TCDS) of the network, which is a set of nodes

Page 60: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

32

such that every node in the network is within two hops from some node in the

dominating set. They adapted a virtual radio range (VR), shorter than the physical

radio range (RR), and considered as one-hop neighbors only those nodes within

VR. The gap between VR and RR works as a buffer zone, in which nodes can

move without loss of connectivity. Every node provides its one-hop neighbors with

a list specifying one or more tuples, each with the identifier of a one-hop neighbor

and a bit indicating if that neighbor dominates any two-hop neighbor. To forward a

broadcast packet, a node tries to obtain the smallest subset of forwarders, which are

one-hop neighbors that use some of the nodes two-hop neighbors to reach any node

that is three hops away. After such a selection of forwarders, the node broadcasts

its packet with a header specifying its forwarder list, and each forwarder in turn

repeats the process.

Duresi et al. [47] proposed a Adaptive Backbone Protocol (ABP) using

CDS. They derived a geometric based probabilistic model that described the

expected coverage of a one-hop broadcast as a function of range, sending rate and

density. They used an analytic model to predict the optimal range for maximizing

1-hop broadcast coverage using information like network density and node sending

rate. The selection of backbone was based on the extended covering problem.

In order to maximize the life span of all nodes, ABP periodically selects nearly

disjoint subset of nodes to form CDS.

Li et al. [88] presented a distributed mechanism called Cluster-Label-based

mechanism for Backbones (CLaB) on mobile ad hoc networks. The proposed

mechanism provided a distributed topology control and consists of three parts:

the part creating a backbone, the routing part, and the maintenance part on the

backbone. CLaB used the clustering approach in the generation and maintenance

of a backbone. A unique and virtual ID was assigned to each cluster, which

Page 61: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

33

was called a cluster label. The second part adapted existing routing protocols on

the backbone. The routes were constructed on the basis of cluster labels rather

than node IDs. The third part maintained links on the backbone to minimize

the influence of node movements, and needs no rerouting mechanism. The

mechanism especially concentrated on maintenance by introducing constantly

connected backbone elements based on cluster labels.

Samuel et al. [118] proposed a super-node system architecture based on the

DTN framework, as a solution for providing a continuous connection to mobile

nodes that experience intermittent connections. They introduced the concept of

virtual network topology, which is adaptation of the network topology in a DTN

context. They presented a new approach for calculating the probability of future

contacts in DTN and developed a routing technique that was based on calculating

the dominating set for the virtual network topology.

Shaukat et al. [139] controlled the TC message transmission of OLSR with

centrality measure. They defined that a node in a network is central to the extent

that it falls on the shortest path between pairs of other nodes. Rather than sending

TC messages periodically, at each interval a node: (1) monitors betweenness of its

two-hop neighbourhood graph; (2) if the measure is in-control no message is sent,

otherwise a TC message is sent.

Polat et al. [117] defined a Connected Message Ferry Dominating Set

(CMFDS) problem and developed heuristics to find a minimum-size CMFDS,

given a model for the connectivity between nodes over time. In message ferrying

technique, one or more mobile nodes are tasked with storing and carrying data, to

forward data between sources and destinations. Message ferries may need to relay

data to each other, to achieve connectivity between all nodes. This technique is

particularly useful in intermittently connected networks, where traditional MANET

Page 62: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

34

routing protocols are not usable. They presented a non-adaptive algorithm that uses

a heuristic approach to determine a CMFDS and an adaptive algorithm that uses the

recent past node to node interactions to derive a near future CMFDS.

Montolio-Aranda et al. [105] analyzed the multi-point relaying (MPR)

flooding mechanism, used by OLSR protocol, to distribute topology control (TC)

messages among all the system nodes. They proposed a new flooding method,

based on the fusion of two key concepts: distance-enabled multi-point relaying

and connected dominating set (CDS). They generalized the multi-point relaying

approach by adding distance knowledge, to improve the selection of an optimized

subset of forwarders. They implemented source-independent flooding of broadcast

messages, handling the problem of delayed forwards.

Levin et al. [87] proposed a MCDS based broadcasting. They analyzed

their work to two types of network settings: centralized and distributed. In the

centralized network setting, they assumed that each node has full knowledge about

the topology of the network, including size, distance, and the IDs of all nodes.

In the distributed network settings, they assumed that each node has only partial

information about the network such as the number of neighbors it has or the total

number of nodes. To handle message efficiency, backbone of smaller size was

constructed. To handle time efficiency, a backbone with relatively short diameter

was produced, which decreases the total time of the scheduling algorithm and

ensures all rumors arrive to their destination as soon as possible.

Hong et al. [65] investigated the throughput of virtual backbone in wireless

networks. They showed that a path with higher spectral efficiency is with higher

throughput than a shortest hop. They proposed a maximum spectral-efficient

Page 63: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

35

connected dominating set (MSE-CDS) algorithm incorporating their spectral-

efficiency metric to obtain a virtual backbone with higher throughput. The spectral-

efficiency was measured based on signal-to-noise ratio. Given two nodes vi, v j,

and Pi j is the set of paths between the two nodes in the network. MSE-CDS is

constructed such that P∗i j is the maximum spectral-efficient path between vi and v j.

Smys et al. [145] proposed two distributed localized self-organized

algorithms called SOB-T and SOB-M to construct and to maintain the network

backbone. SOB-T uses a dual tree-based strategy to form the virtual backbone and

SOB-M uses a marking scheme. A self-organized backbone was formed with a

set of marked nodes that form a self-organized connected dominating set. They

proposed that self-organized backbone network works in two modes: selfish mode

and fusion mode. In selfish mode, each node involve in the routing process or route

discovery and the rest of the time the nodes do not hear the information channel

and go to sleep mode. This process mainly supports the low energy consumption of

each node; it is also used to improve the network life time. The next fusion mode

entirely resides on backbones, i.e. whenever network abnormalities (congestion,

link and node failures) occurs, backbones are stimulated by the normal nodes in

short time duration to rectify the concern issue.

Sivakumar et al. [144] presented core-extraction distributed ad hoc routing

(CEDAR), a routing protocol that dynamically establishes a core set for route set

up, QoS provisioning, routing data, and route maintenance. A greedy algorithm

is used to proactively create an approximate minimum dominating set, whereby

all hosts in the network are either members of the core or one-hop neighbors

of core hosts. Only core hosts maintain local topology information, participate

in the exchange of topology and available bandwidth information, and perform

route discovery, route maintenance, and call admission on behalf of these nodes.

Page 64: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

36

Two assumptions are made in CEDAR. The first one is that MAC/link layer can

estimate available link bandwidth and second one is that small-to-medium-size ad

hoc networks consist of tens to hundreds of nodes. Although there are no specific,

redundant, reserved routes, the existence of cores provides a proactive approach to

offering partially-cached core routes. This was enhanced by Sinha et al. [142] to

operate routing protocols DSR and AODV over cores.

An energy-efficient dominating tree construction (EEDTC), proposed by

Yu et al. [192] consists of two phases: marking phase and connecting phase. The

marking phase constructs a maximal independent set (MIS) using k-hop neighbor’s

information (k ∈ [1,DG], where DG is the diameter of graph G), and meanwhile

forms a forest consisting of trees rooted at several initiators. In the connecting

phase, the forest was connected to a dominating tree by connecting some adjacent

trees. Compared with other tree-based algorithms, EEDTC simplifies the execution

process by combining MIS construction and forest formation together which are

separated in other schemes.

The Mobility Adaptive Clustering Algorithm (MACA) by Basagni S. [17],

formed Weakly-CDS with slow moving nodes using clustering process. A Weakly-

CDS induces a weakly connected subgraph, which is the graph induced by the

dominating nodes and its neighbors. A cluster-head is a node that acts as a

coordinator for the associated neighbors. When nodes move randomly, a fast

moving cluster-head is likely to encounter another cluster-head sooner than a slow

moving one. The open neighbor sets of fast moving nodes will exhibit more change

than those of slow moving nodes. Therefore, their algorithm had selected slow

moving nodes, which are more likely to have stable links.

Page 65: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

37

2.3 STABILITY AND ENERGY EFFICIENT ROUTING INMANETS

Sarma et al. [134] developed a route stability based QoS-aware routing

(RSQR) protocol with throughput and delay constraints. They proposed a model

for computing link stability based on measurements of received signal strengths

of two successively received packets from a neighbor. The route stability was

calculated as a product of link stability of all the links which constitute the route

under consideration. RSQR incorporated the stability model in route discovery

process to find QoS routes with the highest stability. It is based on an enhancement

of AODV and some extra fields were included in route request/reply packets. It also

incorporated admission control during route discovery and QoS violation detection

and recovery.

Moussaoui et al. [108] proposed a QoS routing protocol based on link

stability called ST OLSR. This protocol used a new probability based mechanism

by considering the variation in signal strength as a main indicator of the node’s

mobility. They claimed that the use of such metric allows to select effectively the

best path in terms of stability. They presented two metrics: Stability of NoDes

(SND) and Fidelity of NoDes (FND), to assess the link stability between two

adjacent nodes. SND was based on statistics collected by a node on its neighbor to

estimate the durability of the connection. To estimate this stability, they proposed

a function based on Bienayme–Chebyshev inequality. The FND was the degree of

reachability and it was the degree of reachability with only the stable nodes. These

metrics were used to elect the most stable MPR nodes set in the network.

Wang et al. [166] proposed a stable weight-based on-demand routing

protocol (SWORP) for MANETs. The proposed scheme used the weight-based

Page 66: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

38

route strategy to select a stable route in order to enhance system performance. The

weight of a route is decided by three factors: the route expiration time (RET),

the error count, and the hop count. The link expiration time (LET) represents the

duration of time for a packet to travel between two nodes. Then the RET was equal

to the minimum LET for the feasible path. The error count was used to indicate

the number of link failures caused by a mobile node. Hop count was used to prefer

the route that reaches the destination node first. Route discovery usually first finds

multiple routes from the source node to the destination node. Then the path with

the largest weight value for routing was selected.

Srinivasan et al. [150] proposed a Route Stability and Energy Aware Ad hoc

On-demand Distance Vector (RSEA-AODV) protocol, which is an enhancement of

AODV protocol. RSEA-AODV computes the reliability factor based on stability

and residual energy of nodes. The route with the highest reliability factor value

was selected for data transmission. It predicts the probability of link failures using

signal strengths and mobility of nodes. It takes the product of the residual battery

of the intermediate nodes to select a path that has nodes with maximum residual

energy among the path that just meet the basic energy requirement. To reduce the

probability of link failure, the path with higher path stability value contains more

stable links was selected.

Wu et al. [169] introduced an effective link lifetime estimation mechanism

based on received signal strength. They analyzed the relationship between the

reliability of end-to-end connection and the number of paths with number of paths

was restricted to two. They proposed an adaptive path establishment mechanism to

set up multiple paths according to the current network topology and the estimated

link lifetime. On the basis of the network coding method, a reliable packet

transmitting mechanism was also proposed to enhance network performance. They

Page 67: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

39

applied the link stability-aware intelligent trigger scheme to reduce the redundant

packets transmission.

Joshi et al. [74] proposed a modified protocol, including multi-path and

energy aware technique in OLSR, named OLSRM. The neighbor selection in

OLSRM was based on residual battery energy of a node and traffic conditions

that influence the drain rate of the node in the network. The authors have

considered the multi-path and source routing concept for route selection and a route

recovery technique to tackle mobility issue efficiently. In OLSRM, the load was

distributed fairly with even utilization of energy resources in the network so as to

increase network lifetime as well as individual node lifetime in various dynamic

conditions. The multi-path source routing approach was used in association with

the min–max lifetime as an improvement over the conventional hop-by-hop routing

in the original OLSR protocol.

El-Hajj et al. [48] presented a dominating set based routing scheme, named

fast distributed connected dominating set (FDDS) routing. In this protocol, each

node knows its own ID, residual energy, and traffic load. A node calculates

its mobility by measuring its own displacement with respect to its neighbors at

different time periods. At time t1, node X measures the average distance D1avg

between itself and its neighbors. X repeats the same calculation at time t2 in order

to obtain D2avg. X can then estimate its mobility by calculating (D2avg - D1avg).

Node X estimates the distance to its neighbors by measuring their received signal

strengths (RSS). FDDS is divided into four steps. The first step uses a simple

neighbor discovery protocol and assigns a weight for each node. The second step

elects an initial set of cluster heads. The third step connects the cluster heads

together to form a CDS. The last step eliminates some redundant cluster heads.

Page 68: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

40

Torkestani. [158] introduced a learning automata-based distributed

algorithm for constructing the most stable virtual backbone as a bounded diameter

minimum spanning tree (BDMST) problem. He stated that the duration of the

communication link, so called link duration time, is inversely proportional to

the relative mobility of the hosts that are connected by the link. The concept

of expected link duration time (ELDT) was defined to predict the real mobility

behavior of the host. A backbone diameter d was defined as the maximum number

of hops connecting every pair of hosts along the backbone and the network delay is

bounded by the backbone diameter d. BDMST algorithm constructed the most

stable delay bounded virtual backbone with the edge weight as ELDT of the

corresponding communication link and diameter d as the maximum backbone hop-

count.

Sheu et al. [140] proposed an efficient distributed algorithm to construct a

stable CDS based on received signal strength, by keeping a node with many weak

links from being selected as a member of CDS. They assumed that the transmitted

power strength of each mobile node is fixed and the same. Each node computes the

distances from its each neighbor since both the transmitted power strength and the

received power strength from its each neighbor are known. In their work, a link is

said to be weak if the strength of the beacon signals received on the link is below

a threshold. The nodes were considered in the decreasing order of the non-weak

links associated with that node. The proposed algorithm was based on the marking

process and rule k, operated in a distributed manner.

Wang et al. [163] proposed a localized backbone construction scheme,

namely connected maximal independent set with multiple initiators. The backbone

construction consists of two interleaved phases: forest construction and merging

on conflicts. Here, a node rank is defined as a tuple of stability, effective-degree,

Page 69: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

41

and ID. They constructed a stable backbone using this rank. The stability metric

is used for measuring the mobility and effective degree is used for estimating the

coverage of a node. They assumed that there is usually temporal and spatial locality

in node movement. Based on this, the stability of each node was estimated using its

previous location information. They also defined that the stability of a node is the

reciprocal of the sum of the distance between its initial location and the locations

for 10 consecutive seconds.

An energy efficient and scalable routing protocol is proposed by Ramrekha

et al. [128] for emergency ad hoc communications. They have designed an energy

consumption model for MANET nodes and used a packet delivery delay model to

explain the scalability and energy efficiency. The proposed energy consumption

model aimed at reducing energy consumption due to data packet transmission and

processing at critical nodes that are frequently solicited for data forwarding. The

energy efficient mechanism only focused on fairly distributing the forwarding load

of data packets whenever possible. This model was integrated with OLSR and

AODV protocols.

Macone et al. [98] developed a reinforcement learning based proactive

routing protocol name mobile Q-Routing (MQ-Routing) for disaster relief

scenarios. The routing strategy have chosen the next-hop node based on residual

energy of nodes. MQ-Routing also takes into consideration the mobility of each

node in choosing the route towards a destination, in order to rapidly adapt to

network changes. Three different metrics were reported, taking into account the

link availability prediction, the residual energy of the nodes and the node mobility.

These metrics were combined together to yield a time-varying discount factor.

A link availability metric was computed by assuming that the nodes were GPS-

enabled, and was used to compute the link availability factor. The mobility and

Page 70: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

42

residual energy metrics, lead to the computation of the mobility factor and of

the energy factor, respectively. Link availability and the mobility metrics provide

information on the link stability.

Xia et al. [178] proposed a new cluster based routing protocol FASTRoute

(FASTR) for highly mobile heterogeneous MANETs without group mobility. In

order to minimize the clustering delay, they applied pre-selection mechanism,

where all powerful nodes with multiple interfaces are selected as cluster heads.

Each cluster head will periodically gather the network topology of local cluster

and send out HEARTBEAT messages with the cluster topology embedded in the

messages. An ordinary node joins the cluster upon receiving the HEARTBEAT

messages. If the ordinary node receives multiple HEARTBEAT messages from

different cluster heads, it will attach to the cluster head with the minimum hop

distance. After joining a cluster, the node will increment the hop distance counter

in the HEARTBEAT message and re-broadcast the message to allow further nodes

to join the cluster.

2.4 ROUTING IN MOBILE OPPORTUNISTIC NETWORKS

Epidemic routing proposed by Vahdat et al. [159] works as follows.

The protocol relies upon the transitive distribution of messages through ad hoc

networks, with messages eventually reaching their destination. Each host maintains

a buffer consisting of messages that it has originated as well as messages that it is

buffering on behalf of other hosts. An epidemic protocol works by transferring its

data to each and every node it meets. As data is passed from node to node, it is

eventually passed to all nodes, including the target node. One of the advantages

of an epidemic protocol is that by trying every path, it is guaranteed to try the

Page 71: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

43

best path. One of the disadvantages of an epidemic protocol is the extensive use

of resources with every node needing to carry every packet and the associated

transmission costs.

The Spray and Wait protocol proposed by Spyropoulos et al. [148], bounds

the total number of copies and transmissions per message without compromising

performance. It consists of two phases: spray and wait. During the spray phase,

L packet copies are “sprayed” to relays in the network. Then these relays enter

the wait phase until they meet the destination and the message is delivered. Spray

and Wait is classified into source and binary spray. With source spray, the source

replicates a message to the first L nodes contacted. In binary spray the source keeps

dL/2e copies and distributes the remaining copies to the first node encountered.

The relay carries dL/2e copies. This distribution continues recursively for each

encounter until each node is left with one copy.

Wu et al. [175] proposed a hop-limited Epidemic Routing protocol for

DTN routing. Their method achieved better performance through controlling the

message hop count. In this approach, because of the energy constraint or other

factors, each node may forward only limited times, that is, both the message hop

count and the forwarding times may be limited. They conducted simulations based

on both synthetic and real motion traces to show the accuracy of the framework.

They also explored the impact of many parameters (e.g., message hop count)

through extensive numerical results. The numerical results showed that both the

message hop count and the forwarding times can have certain impact on the routing

performance, but their impact is related with many other factors (e.g., the number

of nodes).

PROPHET, a Probabilistic Routing Protocol using History of Encounters

and Transitivity, proposed by Lindgren et al. [94] is an epidemic protocol with

Page 72: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

44

strict pruning. PRoPHET’s goal was to gain the advantages of an epidemic protocol

without paying the price in storage and communication resources incurred by the

basic epidemic protocol. Instead of doing blind epidemic replication of bundles

through the network, it applies ”probabilistic routing”. To accomplish this, a metric

called ”delivery predictability”, 0<=P (A,B)<= 1, is established at every node A

for each known destination B. This metric is calculated so that a node with a higher

value for a certain destination is estimated to be a better candidate for delivering a

bundle to that destination (i.e., if P (A,B)>P (C,B), bundles for destination B are

preferable to forward to A rather than C). It is later used when making forwarding

decisions. As routes in a DTN are likely to be asymmetric, the calculation of the

delivery predictability reflects this, and P (A,B) may be different from P (B,A).

According to this protocol, nodes exchange and update the delivery predictability

when they meet other nodes. Also, a node exchanges all messages to a node when

the other node has a higher delivery probability.

Adaptive-Routing scheme proposed by Lakkakorpi et al. [84] uses only

local information to transmit the messages from source to destination using either

AODV or DTN routing, depending on current node density, message size, and

path length to destination. The Adaptive-Routing approach is to choose in the

sending node whether to use DTN (e.g., epidemic or spray and wait) or AODV

for message delivery. The benefit of the approach is that both routing protocols

can remain untouched, and intermediate node need to support only pure DTN or

AODV functionality. The decision on which protocol to use for transmitting a given

message from source to destination is made on application level. To evaluate the

proposed approach they used a simulation model that closely follows real world

use cases. The simulation models the effect of wireless physical layer congestion.

They conducted simulations with with synthetic and real life mobility traces, that

Page 73: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

45

model the proposed usage scenario. They confirmed that it is beneficial to integrate

MANET and DTN routing so that the method for the message delivery is chosen

for each message adaptively on a case-by-case basis when sending the message.

Raffelsberger et al. [126] developed a combined MANET/DTN Routing

(CoMANDR), works like a traditional routing protocol for MANETs when end-

to-end paths are available. It uses the routing table that is calculated by the

MANET protocol to route packets that can be reached instantly over a multi-hop

end-to-end path. To cope with disruptions, CoMANDR utilized two mechanisms

from delay/disruption-tolerant networking: packet buffering and utility-based

forwarding. If the routing table contains no valid entry for a packet’s destination,

CoMANDR buffers the packet instead of discarding it. There may be situations

where an end-to-end path between sender and receiver will never be available. To

handle such situations, CoMANDR may also forward packets to nodes that are

assumed to be closer to the destination. The decision to which node a buffered

packet should be forwarded is based on a utility function. CoMANDR used a

modified version of the PROPHET meeting probability calculation function to

calculate the utility of a node. In contrast to the PROPHET protocol, that only

considers when two nodes directly meet (i.e., there is a direct link between the

nodes), CoMANDR also considers multi-hop information from the routing table.

When a node i has a routing table entry for another node j (with a distance less than

infinite), CoMANDR considers node i and j to be in contact. This allows nodes to

exploit multi-hop paths to determine contacts with other nodes.

Pan et al. [113] proposed “SpecRouter”, a spray with prophet and epidemic

controlled routing protocol, where the transmission direction and the number of

the copies are dynamically controlled according to the information of the whole

distribution rate of the nodes. Similar to the process of the original PRoPHET

Page 74: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

46

routing, the delivery predictability was calculated. Addressing epidemic controlled

routing issue, each node recorded its location and context to a historical information

database. Nodes renew their routing passively and share their location and moving

information. Firstly, when a node encounters another node, it exchanges its

summary vector with the encountering node. If it finds out that there are some

new messages in the buffer of the encountering nodes, it then compares its delivery

predictability with that of the other, if its value of delivery predictability is lower

than that of its encountering node, then it enters the copy state, otherwise it enters

the forwarding state. Secondly, in the copy state, it compares the copy control

counter (CountC) of the message with that of threshold (NC), if CountC equals NC,

then CountC is set to 0, and the node copies the messages to others. If CountC is

less than NC, CountC will be added 1. The node does not exchange any messages

with other nodes until CountC equal NC. If it finds out that there isn’t any new

message for it, then it compares the delete control counter (CountD) with that of

the threshold (ND), if CountD equals ND, the node will delete the message in its

buffer, otherwise CountC is added 1 and the node waits until CountC reach ND.

Li et al. [91] stated that probabilistic forwarding with a higher delivery

utility enhances single-copy routing. They also described that the current

probabilistic forwarding methods only consider node contact frequency in

calculating the utility while neglecting the influence of contact duration on the

throughput, though both contact frequency and contact duration reflect the node

movement pattern in a social network. They theoretically proved that considering

both factors leads to higher throughput than considering only contact frequency.

To fully exploit a social network for high throughput and low routing delay, they

proposed a Social network oriented and duration utility-based distributed multi-

copy routing protocol (SEDUM) for DTNs. SEDUM has three distinguished

Page 75: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

47

features. First, it considered both contact frequency and duration in node movement

patterns of social networks. Second, it used multi-copy routing and discovered

the minimum number of copies of a message to achieve a desired routing delay.

Third, it used an effective buffer management mechanism to increase throughput

and decrease routing delay.

Luo et al. [96] presented a routing scheme for DTNs, called Adaptive

Spraying Based on the Inter-contact Time (ASBIT), based on inter-contact time

and degree centrality measure. They defined that a contact is a communication

opportunity in which a mobile node comes into communication range with another

node in DTNs. The inter-contact time between two nodes was defined as the

time elapsed between two successive contacts. They stated that a node with a

higher degree centrality maintains more contacts with other nodes in the network.

In this scheme each node dynamically chooses the right number of message

copies disseminated to respond to the current conditions of the network. When

forwarding, ASBIT selects the node with a higher centrality as the next hop, and

utilized a simple additive weighting algorithm for the division of the replication

number. They used three attributes: degree centrality, speed of current node and

free buffer. The weighted sum of these attributes were used to find the replication

number.

Wang et al. [164] proposed an improved routing algorithm based on social

link awareness (SLABR). In order to indicate the social relationship of the node’s

pair, two metrics were defined, social pressure metric and relative social pressure

metric. The social link of the node’s pair was calculated according to these two

metrics. Then the friendship community of the node was constructed based on its

social links. SLABR is composed of two parts, inter-community forwarding and

intra-community spreading. A single-copy based forwarding mechanism was used

Page 76: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

48

in the inter-community forwarding, where message is forwarded to the node with

stronger social link to the destination node. A multi-copy based binary forwarding

algorithm was executed in the intra-community spreading so that the message can

be diffused in the community quickly. According to whether the carrying node and

destination node are in the same friendship community, different algorithms were

implemented.

Miao et al. [101] presented the Community-based Adaptive Spray (CAS)

routing protocol for mobile delay tolerant networks. A community was defined as

a set of nodes which frequently co-exist and encounter. CAS is composed of two

major parts. First, a sub-protocol responsible for gathering mobility information

about nodes upon encountering each other. Second, a sub-protocol responsible for

the routing process. Routing is organized around the notion of gateways between

communities. Specifically, a gateway towards a community C, is the node in a

given community that has the highest probability to encounter any node in C. To

route a message towards a given destination node, the source of a message uses

the community topology to pre-compute multi-hop path that traverses the minimal

number of communities through their gateway nodes and that has the highest

delivery probability. Furthermore, once the routing process is engaged, the routing

protocol allocates a given number of message copies at each hop depending on the

remaining TTL of the message. The CAS protocol raises the number of message

copies in the network in proportion to the remaining TTL, in order to increase

the probability of message delivery before time runs out. This strategy keeps the

number of message copies in the network low while achieving a high delivery ratio.

Cheng et al. [29] proposed a social opportunistic networks routing (SONR)

which brings an adapted discrete Markov chain into node’s mobility model and

calculated the transition probability between successive status. The probability is

Page 77: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

49

defined as the occupation ratio of a node in steady of network state. In SONR, the

nodes are naturally divided into different communities. The purpose of community

detection is to improve the forwarding rate in condition of meeting forwarding

spending limitations. In order to improve routing performance in the opportunistic

networks, they used social characteristics such as centrality to assist message

forwarding. The degree centrality was for relay selections. The node degree

centrality is defined as the number of links incident upon a given node. A prediction

method of two node’s next transition probability is proposed.

Chen et al. [28] proposed a group aware cooperative routing protocol for

opportunistic networks called GAR, which aims to maximize the message delivery

probability under the resource constraints of both bandwidth and buffer space.

The proposed GAR protocol includes a cooperative message transfer scheme and

a buffer management strategy. In the cooperative message transfer scheme, the

limited bandwidth available for mobile nodes is considered and two encountering

nodes will exchange messages cooperatively to maximize the delivery probability.

In the buffer management strategy, they further considered the constraint of mobile

node’s buffer space, and proposed the cooperative message caching scheme, in

which the message dropping priorities were set to minimize the reduced delivery

probability. They also proposed an improved strategy to utilize the extra contact

duration of the encountering nodes to further improve the performance. They

adopted the quota-based routing scheme, in which each message initially has a

predefined number, which is denoted as k, of replicas in the network. A message is

considered as being successfully delivered when any replica of the message arrives

at the destination within the message’s time-to-live.

The Delay Tolerant Link State Routing (DTLSR) proposed by Demmer et

al. [41] was modeled on classic link state algorithms. As the network state changes,

Page 78: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

50

link state announcements are flooded throughout the network. Each node maintains

a graph representing its current view of the state of the network, and uses a shortest

path computation (e.g. Dijkstra) to find routes for messages. Each node in the

system was assigned to an administrative area, and a link state protocol instance

operates only within a single area. This helps to constrain the size of the network

graph and limits the scope of announcement messages, if required. Nodes that

have neighbors in other areas learn the set of endpoint identifiers reachable via

the other area and announce themselves as a gateway to those endpoint identifier.

The relay node selection was based on convergence layer. They implemented a

constrained flooding algorithm within the DTN bundle forwarding layer. Link state

announcement messages were sent as bundles.

2.5 CDS BASED ROUTING AND SCHEDULING IN WSN

He et al. [61] constructed a VB, based on the size and the load-

balance factors. They investigated three NP-hard problems namely, the MinMax

Degree Maximal Independent Set (MDMIS) problem, the Load-Balanced Virtual

Backbone (LBVB) problem, and the MinMax Valid-degree non-Backbone node

Allocation (MVBA) problem. They solved LBVB in two steps: First, they

proposed an approximation algorithm by using linear relaxation and random

rounding techniques to solve MDMIS problem. Subsequently, the minimal set

of nodes is found to make the MDMIS connected. They formulated MVBA as a

binary programming and presented a randomized approximation algorithm, which

produces a solution with the traffic load on each backbone.

He et al. [62] proposed a greedy algorithm for Load Balanced CDS

(LBCDS) construction based on dominator’s degree values. In LBAD problem,

Page 79: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

51

rather than allocating a dominatee to a dominator in a naive way, they introduced

a new term, Expected Allocation Probability (EAP), which represents, for any

connected dominatee and dominator pair, the expected probability that the

dominatee is allocated to the dominator. On the basis of the EAP value,

they formulated the LBAD problem into a constrained nonlinear programming

optimization problem. They also proposed a probability-based distributed

algorithm to dynamically allocate dominatees to dominators.

Zeng et al. [194] proposed an efficient distributed approximation algorithm

that computes a sub-optimal MCDS in polynomial time, for connectivity

maintenance of WSNs. The proposed algorithm was fully distributed, and the

constructed CDS had a small size, which reduced the overhead of maintaining

the backbone and the cost in communication. The constructed CDS achieved

load balancing, which extends the lifetime of the network. They also proposed

an energy conservation node self-scheduling algorithm (ECSS), for coverage

maintenance. Each sensor makes self-scheduling to separately control the states

of radio frequency and sensing unit based on dynamic coordinated reconstruction

mechanism. ECSS was based on a probabilistic sensing model, provided some

degree of redundancy according to application requirements. It considered the

residual energy and detection ability of nodes.

Zhao et al. [198] presented a sleep-scheduling technique called Virtual

Backbone Scheduling (VBS). VBS was designed for WSNs, has redundant sensor

nodes. VBS constructed multiple overlapping backbones which work alternatively

to prolong the network lifetime. In VBS, traffic was forwarded by backbone nodes,

and other sensor nodes turn off their radios to save energy. The energy consumption

of all sensor nodes was balanced with the rotation of multiple backbones, which

fully utilizes the energy and achieves a longer network lifetime. The scheduling

Page 80: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

52

problem of VBS was modeled as the Maximum Lifetime Backbone Scheduling

(MLBS) problem. They proposed approximation algorithms based on the schedule

transition graph and virtual scheduling graph, since the MLBS problem is NP-hard.

They also presented a distributed implementation of VBS using an iterative local

replacement scheme.

Kui et al. [83] investigated the problem of constructing an energy-balanced

CDS to effectively preserve the energy of nodes in order to extend the network

lifetime in data collection. An energy-balanced connected dominating set scheme

named DGA-EBCDS was proposed, and each node in the network can effectively

transmit its data to the sink through the virtual backbone. When constructing

the virtual backbone in DGA-EBCDS, they prioritized selecting those nodes with

higher energy and larger degree. This method makes the energy consumption

among nodes more balanced. Furthermore, the routing decision in DGA-EBCDS

considered both the path length and the remaining energy of nodes in the path to

further prolong the lifetime of nodes in the backbone.

Khedr et al. [79] proposed an algorithm to select a minimum number of

sensor nodes which can entirely cover a monitored region. The proposed algorithm

included the following four phases: initial, connectivity, finding minimum

connected cover, and mobility assistance. In the initial phase, the network was

organized into partitioned grids, where each grid contains a cluster head (CH)

and its members. The connectivity phase included the following operations: it

initializes setup phase by the CHs and finds the set of sensor nodes that can directly

communicate to each CH; determines the hop count for each sensor node; and

constructs the connected routing path for each sensor node within the network to

its CH. In finding a minimum connected cover phase, they used a greedy based

scheme and a sensor node selection method, to select a sensor node that has the

Page 81: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

53

largest benefit in terms of covers, the largest area with highest residual energy, and

minimum communications cost from the unselected sensor nodes.

Du et al. [46] devised an efficient algorithm that produces a CDS with

bounded CDS size and guaranteed routing cost in terms of routing path length.

The size of the resulting CDS can be slightly greater than that of the MCDS, but

the routing path length should have an upper bound. They proposed a centralized

algorithm, where MIS was constructed and nodes in the MIS were connected to

form a CDS. It was implemented with all pairs shortest paths sequential algorithm.

They also proposed a distributed algorithm with two stages: MIS construction and

connection, based on node ID. These algorithms produce a CDS D whose size |D |

is within a constant factor from that of the minimum CDS. For each node pair u

and v, there exists a routing path with all intermediate nodes in D and path length

at most 7.d(u,v), where d(u,v) is the length of the shortest path between u and v.

Yuanyuan et al. [193] proposed an energy efficient distributed connected

dominating set algorithm based on coordinated reconstruction mechanism to

prolong the network lifetime and balance energy consumption. The algorithm

consists of two phases. In the first phase, MIS was constructed and the second

phase of the algorithm chose a minimal number of nodes to make the DS connected,

i.e., a CDS. They considered dynamic reconstruction strategy to balance energy

consumption in the networks. Each time when a CDS is constructed as backbone,

the length of operating time of this CDS for this round was determined according to

the energy level of the CDS nodes. If the minimal residual energy of nodes in CDS

was cut down to a certain level (such as 50%) of the initial energy of current round,

the operating period of this round was due. When this operating period expires,

the next CDS operating round was computed. They assumed that each node u has

Page 82: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

54

a weight w(u) of being in the backbone. Here, w(u) was computed based on a

combination of its remaining battery power and its effective degree.

Yu et al. [191] addressed the domatic partition (DP) problem, which

partitions the set of nodes in networks into disjoint dominating sets. They stated

that through rotating each dominating set in the domatic partition periodically,

the energy consumption of nodes can be greatly balanced and the lifetime of the

network can be prolonged. In order to solve the domatic partition problem, they

presented a cell structure which was constructed as follows. Firstly, the network

was divided into clusters, and then a clique was constructed in each cluster. Based

on the cell structure, they proposed a distributed nucleus algorithm for DP using

the property of the skyline of uniform radius disks.

Torkestani et al. [157] designed a learning automata-based heuristic for

backbone formation in WSN, taking into account both energy consumption and

transmission delay issues. The proposed heuristic constructs the network backbone

by finding a near optimal solution to the proxy equivalent degree-constrained

connected dominating set problem. The degree-constrained minimum-weight CDS

problem was having the minimum expected weight subject to a given constraint on

the node degree. Then, a learning automata-based heuristic was proposed to find a

near optimal solution to the proxy equivalent CDS problem.

2.6 CDS BASED COVERAGE IN WSN

Pemmaaraju et al. [115] proposed three deterministic distributed algorithms

for k-domatic partition problem. The k-domatic partition problem seeks to partition

the network into maximum number of k-dominating sets. A k-dominating set is a

subset of nodes D such that every node in the network is at distance at most k

Page 83: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

55

from D. Their first algorithm works on Unit Ball Graph(UBG), assuming that all

nodes know their position in a global coordinate system. In the second algorithm,

it is assumed that pair wise distances between neighboring nodes are known. They

have applied the third algorithm on Growth-Bounded Graph, using the connectivity

information.

The Connected Domatic Problem (CDP), partitioning the nodes of the

graph G into node disjoint CDS, have been proposed by Misra et al. [102]. They

developed a distributed algorithm for CDP using MIS based heuristics which

depends on the connectivity information. They have shown that the size of a CDP

is at least b δ+1β (c+1)c− f , where δ is the maximum node degree; β ≤ 2 and c ≤ 11

is a constant for UDG; the expected value of f is εδ |V | where ε � 1 is a positive

constant and δ ≥ 48.

Misra et al. [103] proposed a distributed approximation algorithm for

MCDS problem with a known initiator. A new collaborative cover heuristic was

proposed using two principles: 1) domatic number of a connected graph is at

least two and 2) optimal substructure defined as subset of independent dominator

preferably with a common connector. This heuristic helped in identifying smaller

cardinality MIS of G as compared to ID-based or degree-based heuristics. A

Steiner tree was constructed in two phases: steiner nodes identified in the first

phase to drive the MIS construction by shifting independent set nodes to locate

the connectors in identifying Steiner nodes. The second phase becomes a post-

processing step of identifying the steiner nodes to construct the CDS tree satisfying

a standard bound. They have also shown that the CDS approach, when used for in-

network aggregation application, prolongs the network lifetime.

Yang et al. [184] addressed the k-(Connected) Coverage Set (k-CCS/k-CS)

problem using linear programming. They developed an approximation algorithm

Page 84: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

56

based on integer programming for the k-CS problem. They proposed two non-

global k-coverage solutions, one was quasi-local cluster-based with a deterministic

bound, the other was localized with a proven probabilistic bound. Two versions

of each solution were considered, one with connectivity for k-CCS and the other

without connectivity for k-CS.

Shang et al. [138] proposed three centralized approximation algorithms for

the minimum k-tuple dominating set problem and m-connected k-tuple dominating

set problem. They constructed (m,k)-CDS, the fault tolerant virtual backbone as

m-connected k-tuple dominating set. Every node in the network is dominated by

at least k backbone nodes. The backbone is m-connected if there are at least m

disjoint paths between each pairs of nodes.

Sausen et al. [135] proposed centralized and distributed solutions for

computing bounded-distance multi-coverage backbones in WSNs. This means that

any sensor node is covered by multiple backbone members within a bounded-

distance. To guarantee these properties, a (k,r)-CDS mechanism is employed

for computing a backbone. The multiple domination parameter, k, defines the

minimum number of backbone nodes covering any regular sensor node. The

bounded-distance parameter, r, defines the maximum distance to k backbone

nodes for any other sensor in the network. The centralized solution provides an

approximation to the optimum solution, and it is used as a lower bound when

evaluating the performance of the distributed solution. The distributed solution

is source-based in the sense that usually the base station (or sink) is the focus of

attention in a WSN. A broadcasting mechanism with dynamic power management

was applied on (k,r)-CDS.

Qureshi et al. [124] proposed a polygon based CDS formation for reliable

and energy-efficient topology. They found a polygenic backbone to turn-off the

Page 85: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

57

unnecessary nodes while keeping the network connected and covered. To achieve

energy efficiency, the protocol formed a CDS like polygenic network which in turn

provides reliability in the case of random link failures. Moreover, it adapted to

topological changes in the network based on the remaining energy of the nodes.

This allows topology maintenance among different set of nodes to increase the

network lifetime. They compared the CDS based topology control algorithms

in WSN [125]. They also proposed a clique based CDS (CCDS), where CDS

was formed according to the size of the network using single phase topology

construction process. The CCDS protocol formed cliques of size 2 based on first

come first serve basis. Since the CCDS does not select any node based on the

selection metric, the clique sets form a CDS backbone, which covers the whole

network.

Lee et al. [85] designed a distributed and reliable energy-efficient topology

control (RETC) algorithm for topology construction and maintenance in real

application environments. Particularly, many intermittent links and accidents may

result in packet loss. A reliable topology can ensure connectivity and energy

efficiency, prolonging network lifetime. Thus, in the topology construction phase,

a reliable topology was generated to increase network reachable probability. In

the topology maintenance phase, this work applied a novel dynamic topology

maintenance scheme to balance energy consumption using a multi-level energy

threshold. This topology maintenance scheme can trigger the topology construction

algorithm to build a new network topology with high reachable probability when

needed.

Carle et al. [26] developed a localized algorithm named Connected Area

Dominating Set (CADS) based on Surface Coverage Relays (SCR). SCR-CADS

algorithm is based on relay selection and self-decision. In SCR-CADS algorithm,

Page 86: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

58

each node computes a subset of its neighborhood, its relay set, which covers the

same surface as all the neighbors. Nodes apply a simple rule to decide whether

or not they should be active. This rule was based on a unique random priority

attributed to each sensor node of the network. Any node which has the highest

priority of its neighborhood or which has been selected as SCR relay by its neighbor

with the highest priority, will belong to CDS.

Li et al. [90] proposed three algorithms to construct kmCDS for general k

and m. The first one, CSAA, is a centralized sequentially augment algorithm which

is suitable for small wireless networks where the number of nodes in a network is

usually not large. DDA is a distributed deterministic algorithm. In DDA a kmCDS

grows from an inner core to the outer nodes. DPA is a distributed probabilistic

approach which is based on the fact that the whole network is surely k−connected

when the probability of the minimum degree being larger than k is almost 1. These

algorithms consist of two phases: CDS construction and MIS connection phase.

Anitha et al. [12] proposed a base station-controlled centralized algorithm

for static sensor networks and a distributed, weighted algorithm for dynamic sensor

networks. The solutions were based on a (k,r)-CDS, which were suitable for

cluster-based hierarchical routing. Every non-dominating node is dominated at

least by k dominating nodes within distance r in (k,r)−CDS. The cluster head

redundancy parameter k, improves reliability, the multi-hop parameter r, addresses

the scalability issue and the combined weight metric improves the network lifespan

and reduces the number of re-affiliations. To create a stable and efficient backbone

structure, the backbone sensor nodes are selected based on quality, which is

a function of the residual battery power, node degree, transmission range, and

mobility of the sensor nodes.

Page 87: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

59

Wu et al. [177] proposed one centralized algorithm CGA and one

distributed algorithm DDA, for k-connected m-dominating set. The main idea was

to construct an m-dominating set first and then augment this set for k-connectivity.

Firstly, nodes were sorted in non-increasing order based on tuple (Ni,ei, IDi).

Ni was given the highest preference because of the observation that the size of

C is smaller if nodes with larger degree are added first. Energy was another

consideration. Therefore, the nodes with more remaining energy were added to

the set instead of the ones with less remaining energy so that the total network

lifetime can be extended. Node ID was used to break ties. Initially, C is empty.

Then nodes were repeatedly added into C till C is an m−dominating set. After C

becomes an m−dominating set, check whether C is k−connected or not.

Wu et al. [176] presented a distributed kmCDS construction algorithm,

LDA, for general k and m. LDA is a totally distributed algorithm which is preferred

by WSNs, especially for large WSNs. It also has lower message complexity than

others. For small networks, centralized algorithms are more suitable since they may

have better results and may save communication cost compared with distributed

algorithms. Therefore, they proposed a centralized algorithm ICGA which is better

than CGA, since CGA cannot always guarantee obtaining a kmCDS.

Kim et al. [81] investigated the problem of constructing quality CDS

in terms of size, diameter, and Average Backbone Path Length (ABPL). They

presented two centralized algorithms having constant performance ratios for its

size and diameter of the constructed CDS. They gave its distributed version, which

not only can be implemented in real situation easily but also considers energy to

extend network lifetime. Both algorithms constructed CDS based on MIS.

Page 88: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

60

2.7 ROUTING IN UWASN

Depth-based-routing (DBR) proposed by Yan et al. [183], is a geographic

routing protocol, where each node knows the depth to the surface sink using

pressure sensors. On receiving a data packet, each node forwards it only if its

depth is less than that of the sender. Before forwarding the data packet, each node

calculates holding time for a packet that depends on the difference between its own

depth and that of the sender. In particular, the larger the depth, the smaller the

holding time, so that nodes that are closer to the surface sink are the first to forward

the data packet. While holding, a node if it overhears that the packet that it is about

to broadcast is transmitted by another node, then it drops the packet.

Void-aware Pressure Routing (VAPR) proposed by Noh et al. [111] is

a geographic routing protocol. VAPR uses surface reachability information to

set up each node’s next-hop direction toward the surface through which local

opportunistic directional forwarding can always be used for data packet delivery

even in the presence of voids. It builds a directional trail to the closest sonobuoy on

the surface. The idea of this protocol is similar to that of DBR: A node will forward

a packet only if other nodes closer to the sink cannot send it. VAPR neither requires

additional recovery path maintenance nor incurs any hop stretch caused by the

recovery fall-backs in existing solutions. They also provided a new framework of

attaining loop freedom using soft-state breadcrumb approach in mobile networks.

Domingo. [42] proposed a Distributed Underwater Clustering Scheme

(DUCS) based energy-aware routing protocol, for long-term non-time-critical

aquatic monitoring applications, with random node mobility and without global

positioning system support. This clustering protocol does not use flooding

techniques, minimizes the proactive routing message exchange and it uses data

Page 89: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

61

aggregation to eliminate redundant information before transmission to the sink.

He proposed TDMA and CDMA (Code Division Multiple Access) with DSSS

(Direct Sequence Spread Spectrum) using pseudo-orthogonal codes for intra-

cluster communication and only CDMA with DSSS using pseudo-orthogonal codes

for all other communications processes.

A vector based forwarding (VBF) proposed by Xie et al. [180] assumed

that the position information was calculated by measuring the angle of arrival

(AOA) and strength of the signal. In VBF, each packet carries the positions of

the sender, the target, and the forwarder. The forwarding path was specified by

the routing vector from the sender to the target. Upon receiving a packet, a node

computes its relative position to the forwarder. Recursively, all the nodes receiving

the packet compute their positions. If a node determines that it is sufficiently close

to the routing vector (e.g., less than a predefined distance threshold), it puts its own

computed position in the packet and continues forwarding the packet; otherwise,

it simply discards the packet. In this way, all the packet forwarders in the sensor

network form a “routing pipe”: the sensor nodes in this pipe are eligible for packet

forwarding, and those which are not close to the routing vector do not forward.

In the basic VBF protocol, all the nodes inside the routing pipe are qualified

to forward packets. In dense networks, too many nodes might be involved in the

data forwarding process. To save energy, Xie et al. [181] also proposed a self-

adaptation algorithm, based on the concept of desirableness factor, which estimates

the density of a node in its neighborhood using local information. This algorithm

aims to select the most desirable nodes as forwarders. In this algorithm, when a

node receives a packet, it first determines if it is close enough to the routing vector.

If yes, the node then holds the packet for a time period related to its desirableness

Page 90: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

62

factor. In other words, each qualified node delays forwarding the packet by a time

interval.

A Hop-by-hop Vector Based Forwarding (HH-VBF) proposed by Nicolaou

et al. [110] used the same concept of routing vector as VBF. However, instead of

using a single virtual pipe from the source to the sink, HH-VBF defined a different

virtual pipe around the per-hop vector from each forwarder to the sink. In this way,

each node can adaptively make packet forwarding decisions based on its current

location. This design directly brings the following benefits: (1) Since each node has

its own routing pipe, the maximum pipe radius is the transmission range. In other

words, there is no necessity to increase the pipe radius beyond the transmission

range in order to enhance routing performance; (2) In sparse networks, though the

number of eligible nodes may be small, HH-VBF finds a data delivery path as long

as there exists one in the network. Thus, HH-VBF enhances data delivery ratio in

sparse networks compared with VBF.

An adaptive hop-by-hop vector-based forwarding (AHH-VBF) proposed by

Yu et al. [188], is an extension of HH-VBF. In AHH-VBF, during the transmission

process, the radius of virtual pipeline was adaptively changed hop by hop to restrict

the forwarding range of packets, in order to guarantee the transmission reliability

in the sparse sensor region and to reduce duplicate packet transmissions in the

dense sensor region. They also adjusted the transmission power level hop by

hop in cross-layer fashion to improve energy-efficiency. The forwarding nodes

in AHH-VBF, were selected based on the distance from current node to destination

node so that the end-to-end delays is reduced effectively. They proposed two

metrics: propagation deviation factor and effective neighbor number, to evaluate

the network performance of AHH-VBF.

Page 91: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

63

A Hop-by-Hop-Dynamic Addressing Based (H2-DAB) routing protocol

proposed by Ayaz et al. [13], is a scalable and energy-efficient using multi-sink

architecture. They used surface buoys to collect the data at the surface and

anchored sensors at the bottom. Other sensors are deployed at different levels from

surface to bottom. Nodes near the surface sinks are assigned smaller addresses and

these addresses are increasing as the nodes go down towards the bottom. These

dynamic addresses are assigned using hello packets. Any node which collects the

information forwards it towards the upper layer nodes in a greedily fashion. They

have also used special nodes called courier nodes for better energy consumption

and to increase the reliability.

Pompili et al. [119] investigated the problem of data gathering by

considering the interactions between the routing functions and the characteristics

of the underwater acoustic channel. They proposed two bandwidth and energy-

efficient distributed geographical routing algorithms for delay-insensitive and

delay-sensitive applications in UWASN. In order to increase the efficiency of the

acoustic channel, the proposed algorithms allow a sender to transmit a short packets

back-to-back without releasing the channel. Specifically, the proposed routing

algorithms allowed each node to jointly select its best next hop, the optimal transmit

power, and the forward error correction rate for each packet, with the objective of

minimizing the energy consumption, while taking the condition of the underwater

channel and the application requirements into account.

Wahid et al. [161] proposed a reliable energy-efficient routing protocol

based on physical distance and residual energy (R-ERP2R) for UWASN. It is a

location-free routing protocol and considered into account multiple routing metrics.

The multiple routing metrics used in R-ERP2R are: physical distance, link quality

and residual energy. Physical distance is the distance of a sensor node from the

Page 92: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

64

sink node. It was used to select the next forwarding node that is closer to the sink

than the sender of a packet. The link quality information was utilized to select the

next forwarding node with more reliable link among all the candidate nodes. The

residual energy of nodes was considered to balance energy consumption among the

sensor nodes. In R-ERP2R, each node computes these metrics and communicates

it to all the nodes. During the data forwarding, a node that is closer to the sink than

the sender, having high residual energy and having good link quality were selected

as a next forwarding node.

Ali et al. [6] proposed a novel routing protocol called Layer by layer Angle-

Based Flooding (L2-ABF) for UWASN to address the issues of continuous node

movements, end-to-end delays and energy consumption. It used an angle-based

flooding architecture in which multi-sinks were anchored on the water’s surface to

collect data packets. The ordinary nodes were deployed on different depth levels

from the surface to the bottom in the form of layers. Each node forwards sensed

data towards the upper layer nodes, using the angle-based zone. The data packet

received on one of the sinks on water’s surface, was considered to be delivered

successfully. In L2-ABF, every node calculated its flooding angle to forward

data packets toward the sinks without using any explicit configuration or location

information. L2-ABF completes its task in two phases. In the first phase, a Layer-

ID was assigned to the sensor nodes by the sink node in the network. In the second

phase, the nodes forward sensed data.

Alves et al. [7] presented a controlled flooding routing mechanism inspired

by the route establishment phase of the OLSR protocol, termed MPR. MPR used

periodic control messages to collect (recent) historical information on link quality

and topology status in order to find the best route towards the destination. For

the envisioned scenarios where nodes periodically broadcast telemetry and status

Page 93: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

65

information, the contents of the control packets are simply piggybacked in the

data packets, incurring in no additional transmissions. MPR does not assume any

preliminary information on the network, e.g., where the sink is, and it is designed

to work in both scenarios where a common collection point is present or where

data has to be exchanged between any pair of nodes in the network. MPR was

also designed to work in DTN scenarios storing the packets when a reliable path is

not available and trying to forward it when updated and more favorable topology

information is received.

2.8 OPTIMIZATION TECHNIQUES FOR CDS

Jovanovic et al. [75, 76] proposed the first meta-heuristic solution based

on ACO to the the Minimum Weighted Dominating Set (MWDS) Problem. The

given graph is converted into a complete graph with edges having a weight 0 if

they are not present in the original graph and 1 otherwise. The uncovered neighbor

is represented by a value 1. A heuristic used in this problem takes into account the

weights of vertices being covered. In each iteration, the node with the maximum

ratio of the sum of weights of its uncovered neighbors to its weight is added to the

MWDS. This is used to initialize the pheromone values of the nodes in the ACO

algorithm. The state transition rule for an ant k to choose node i is determined

by the probability pki . It is calculated as pk

i =τiη

β

i

∑r∈Akτrη

βr

, where Ak represents the

set of nodes that are not in the dominating set and ηβr the heuristic component.

The global pheromone update rule used by the algorithm is τi = (1−ω)τi +ω∆τi,

where ω is the pheromone evaporation rate and ∆τi =1

∑ j∈D w( j) , D being the best

dominating set constructed by an ant in that iteration. In addition, the algorithm

also used a local pheromone update rule as τi = (1−φ)τi +φτ0, where φ ∈ (0,1)

and τ0 is the initial pheromone.

Page 94: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

66

A minimum weight dominating set construction algorithm proposed by

Potluri et al. [121] is based on ACO without heuristic. The state transition rule

for an ant is based solely on the pheromone values of the nodes not yet in the

dominating set. A local search mechanism is applied to reduce the weight of the

dominating set by removing any redundant nodes from the solution generated by

an ant. A dominating set where the number of dominated nodes assigned to each

dominating node does not exceed the capacity of the corresponding dominating

node, is called the capacitate dominating set. They also proposed meta heuristic

algorithms for minimum capacitate dominating set problem, where the capacity

represents the maximum number of nodes that a node can service at most [122].

Ho et al. [64] introduced a new way for encouraging the construction of

diverse solutions. This was achieved by having the ants not follow the standard

transition mechanism all the time. Rather, based on a specified probability, an ant

will first randomly select a set of allowable solution components, and then from

this set, select the most desirable one. This strategy was known as tournament

selection. Even though the proposed strategy used additional randomization as

an extension of pure random selection, they showed that the tournament selection

approach gives better performance than pure random selection. They justified the

proposed enhanced ACO meta-heuristic (ACO-TS) by comparing its performance

with the original ACO meta-heuristic, a standard genetic algorithm, and an ACO

that uses pure random selection for diversity control.

Sundar et al. [154] presented a heuristic, an artificial bee colony (ABC)

algorithm and an ant colony optimization (ACO) algorithm to solve the dominating

tree problem (DTP). The algorithm for DTP using ACO was referred as ACO DT.

In ACO DT, pheromone was laid on the vertices of the graph. This is due to the fact

that the choice of vertices plays more important role in the construction of good

Page 95: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

67

solutions than the choice of edges. Once they had a dominating tree containing

certain vertices, then a dominating tree of minimum cost was found, comprising

only these vertices by running Prim’s algorithm on the subgraph induced by these

vertices.

Chizari et al. [31] modeled the problem of MPR selection as set covering

problem. They proposed a new fitness function for the optimization techniques:

genetic algorithm, tabu search and simulated annealing. They also proposed a

new heuristic based MPR selection algorithm named EF-MPR, based on the hill

climbing method without local optima escaping function. In EF-MPR, the MPR

selection was similar to the the original MPR selection with two modifications. i)

At each step, the best operation that reduces the cost function was selected and ii)

MPR size was reduced by using the fitness function.

2.9 SUMMARY

From the literature, it is observed that a CDS based routing is an energy-

efficient mechanism for communication in MANETs and WSN. It is also found that

the message forwardings in MON are based on number of message copies and relay

selections. Also, it is found that the CDS based coverage protocols use the degree

or ID of nodes in its communication range, to increase the connectivity among

dominators or dominatees, in order to provide redundant coverage. Also, it is

observed that the routing protocols in UWASN, use flooding based communication

to increase the packet delivery, which leads to more energy consumption. The

survey also shows that the application of an ACO technique for CDS construction,

produces good results on CDS size.

Page 96: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

CHAPTER 3

DESIGN OF STABILITY BASED ENERGY EFFICIENT

LINK STATE HYBRID ROUTING PROTOCOL FOR

MOBILE AD HOC NETWORKS

3.1 INTRODUCTION

A MANET consists of wireless nodes that can self organize into arbitrary

and temporary network topologies by themselves. Due to the nature of wireless

network, the transmission in these networks is basically a one-hop broadcast, in

which a message transmitted by a node reaches all the nodes in its transmission

range. Two nodes not within the transmission range communicate through

intermediate nodes as relays. Based on the route discovery principle, routing

protocols are classified into either proactive or reactive. Proactive protocols

update routes for every pair of nodes at regular intervals. The reactive or on-

demand protocols, determine route only when there is a need using a broadcasting

procedure.

The network-wide broadcasting methods are classified into probability-

based, area-based and neighbor-knowledge-based (Montolio-Aranda et al. [105]).

They are highly resource consuming approaches and it is used in almost all routing

protocols like AODV (Perkins et al. [116]), DSR (Johnson et al. [73]) and OLSR

(Clausen et al. [33]). Among these protocols, OLSR uses neighbor-knowledge

based method MPR, where each node selects a subset of its one-hop neighbors as

68

Page 97: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

69

forwarding nodes to reduce redundant broadcasting. These MPR nodes guarantee

that all two-hop neighbors receive a copy of the broadcast packets and therefore

all nodes in the network can be covered without retransmission by every node

[123, 152, 186]. These MPRs form a CDS [92, 173]. Forwarding the data through

the backbone or CDS is a cost-efficient alternative to broadcasting in which the

backbone nodes are responsible for routing only.

The biggest challenge in MANETs is providing a stable route for packet

delivery [109]. Most of routing protocols use hop count as a selection metric

and found that the routes discovered are not stable. The node’s mobility may

clearly affect both the quality of the selected paths and their durability. Thus,

the route selection process should also consider the link stability criterion (i.e.

links’ durability), which allows to maintain the characteristics of the selected paths.

Recently, there is a growing interest in the research towards applying CDS to

support various network functions such as multi-hop communications [156, 172].

In MANET, link failures occur frequently due to node mobility, formation of a

long-lasting backbone or CDS significantly improves the network performance.

This study proposes an efficient way to form a stable CDS based on

stability metric, which avoids selecting a node with many links of low stability

as a dominator. It also implements a hybrid link-state routing protocol operating

over stable CDS, named stability based energy-efficient link-state hybrid routing

(S-ELHR).

3.1.1 Stability based Routing in MANETs

Since each node in a MANET is mobile, the topology of the MANET may

change dynamically. From the viewpoint of routing, communication between two

Page 98: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

70

nodes which are far away from each other may fail because of the link failure

between any two intermediate nodes which are adjacent. Thus, the provision

of stable links in a MANET becomes essential. Some routing protocols have

emphasized the need to find routing paths consisting of links with higher stability

[74, 108, 134, 150, 163, 169].

Basically, most of them rely on the received signal strength to estimate

the stability of a link. A link with greater received signal strength is referred

to as having a higher stability. Because each node in a MANET is mobile, the

CDS topology may change dynamically. Therefore, like the routing protocols

mentioned above, CDS-based routing protocols must also deal with the issue of

link stability. To be more specific, in order to reduce CDS’s maintenance overheads

and to provide a more stable CDS for other algorithms, the CDS stability should

be taken seriously. A CDS is more stable if it can hold for a longer period of time

during which no dominating node needs to update its routing table. The stable CDS

constructions were addressed in [48, 99, 140, 158, 163]

3.2 STABILITY BASED ENERGY-EFFICIENT LINK-STATEHYBRID ROUTING (S-ELHR)

The S-ELHR is a hybrid routing protocol using relay-based broadcasting

to discover the topology and on-demand source routing to send data packets. It

constructs CDS first and then performs routing over CDS. The CDS construction

uses a stability metric (SM), which is a function on link connectivity index, energy

and degree weights. The nodes with the greatest SM are selected as relays. The

topology discovery or broadcasting of S-ELHR uses the CDS nodes to disseminate

the topology information. The routing is done through the CDS nodes, where the

Page 99: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

71

routing path is established on-demand and each data packet carries a complete

routing path. The following sections explain the stability metric calculation, CDS

formation and routing in S-ELHR.

3.2.1 Network Model and Problem Statement

A MANET is modeled as a graph G(V,E), where V is the set of nodes in

the network and E is the communication links among the nodes. A homogeneous

network where nodes have same transmission range is assumed. An edge exists

between the two nodes if the distance between them is less than the transmission

range. A node learns about its own location through location service schemes such

as global positioning system or any other scheme. A node learns the velocity and

direction of movement of its neighbors through the beacon messages periodically

broadcast by the nodes in one-hop. Every node selects a relay set as in definition

3.1.

Definition 3.1. Relay(u): Given a graph G = (V,E), for a node u ∈ V,Relay(u) =

{v|v ∈ Nu1} such that Nu

2 =⋃

v∈Relay(u)Nv1 .

The problem can be modeled as finding a CDS C for an edge-weighted,

connected and an undirected graph G = (V,E,W ) with edge weight function W :

E → R+, where V = {v1,v2, ...,vn} denotes the set of mobile nodes of MANET,

E = {(vi,v j) | i ≤ n, j ≤ n} ⊆ V × V denotes the communication links between

the nodes, and W = {w(i, j) | ∀(vi,v j) ∈ E} denotes the set of weights (stability

metric) associated with the communication links. The objective of the problem is

to find C such that it can work for the longest time.

Page 100: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

72

3.2.2 Stability Metric (SM) Calculation

To estimate the stability of a link, a parameter called SM is proposed, which

takes into account the three different cost metrics, link connectivity index (LCI as

defined in section 3.2.2.2), energy weight (EW as defined in section 3.2.2.3) and

degree weight (DW as defined in section 3.2.2.4). The LCI metric computes the

predicted link expiration time between the two nodes. It is used to find more stable

nodes which can provide a long lasting route. The energy metric is used to increase

the lifetime of CDS, because nodes with more energy need to be selected. The

size of CDS will be smaller when nodes with more neighbors are selected. So,

the stability metric uses these three metrics to form a smaller CDS with increased

lifetime, which can work for the longest time. Every node in the network calculates

their energy and degree weights. This information is communicated to its one-hop

neighbors. Each node after receiving these informations, calculates the stability

metric to each of its one-hop neighbor. The SM of a node u to its neighbor v can

be defined as follows,

SM(u,v) = α ∗LCI(u,v)+β ∗EW (v)+ γ ∗DW (v) (3.1)

where α +β + γ = 1.

3.2.2.1 Computation of Willingness

Each node has a variable Willingness, specifies how willing a node is to be

forwarding traffic on behalf of other nodes. A node may dynamically change its

willingness as its conditions change. In S-ELHR, each node uses weight which is

a ratio between actual and initial energy, to set its Willingness. In this protocol,

a node declares a WILL LOW if the weight is less than 10%. If the weight is in

Page 101: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

73

the range 10% to 50%, Willingness is set to WILL DEFAULT. Otherwise, a node

declares WILL HIGH as its willingness. The weight based Willingness selection

is shown in Table 3.1.

Table 3.1: Willingness Calculation in S-ELHR

Weight < 10% ≥ 10% and < 50% ≥ 50%Willingness WILL LOW WILL DEFAULT WILL HIGH

A weight based selection of Willingness introduces an improvement in the

relay selection, allowing nodes to declare a willingness values of WILL HIGH, a

high willingness to act as relay for its neighbors or WILL LOW to signal a low

willingness to act as relay. In this protocol, the CDS selection will never include

a node with WILL LOW. The Willingness field in the HELLO message is used to

hold the weight value of the issuing node.

3.2.2.2 Link Connectivity Index (LCI) Metric

The LCI metric uses the concept of predicted link lifetime of two nodes i

and j as defined by Su et al. [153]. It is calculated as follows. Let the co-ordinates

of i and j be (Xi,Yi) and (X j,Yj) respectively. The two nodes are moving with

velocities vi and v j in directions θi and θ j. Let R be the transmission range of

the nodes. Then, the amount of time LCI(i, j), the mobile nodes i and j will stay

connected is

LCI(i, j) =−(ab+ cd)+

√(a2 + c2)R2− (ad−bc)2

(a2 + c2)(3.2)

Page 102: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

74

where a, b, c, d can be calculated by Eqs. (3.3–3.6), respectively.

a = vi ∗ cosθi− v j ∗ cosθ j (3.3)

b = Xi−X j (3.4)

c = vi ∗ sinθi− v j ∗ sinθ j (3.5)

d = Yi−Yj (3.6)

3.2.2.3 Energy Weight (EW) Metric

The EW of a node u is the remaining energy in u divided by the maximum

energy of nodes in Nu1 .

EW (u) =Eu

rm

Max{E irm;∀i ∈ Nu

1}(3.7)

3.2.2.4 Degree Weight (DW) Metric

The DW of a node u is the number of neighbors of u divided by the

maximum degree of nodes in Nu1 .

DW (u) =|Nu

1 |Max{|Ni

1|;∀i ∈ Nu1}

(3.8)

3.2.3 Algorithm for Stable CDS Construction

The proposed CDS construction algorithm does not need any knowledge of

the global network topology to generate a CDS. Every node in the network needs

to know the ID of one-hop and two-hop neighbors. All these information’s are

Page 103: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

75

piggybacked into HELLO messages and they are sent periodically by every node.

The CDS selection process can be summarized as follows: First, each node chooses

a set of one-hop neighbors as its relay nodes with respect to stability metric. Each

node then communicates their relay set to its one-hop neighbors. The pseudo-code

for CDS selection is given in Algorithm 3.1. Initially, each node sets its dominating

flag to f alse. A node v selects a one-hop neighbor say x as it relay, if x is the only

node to reach some of its neighbors (line 4). Otherwise, it chooses a one-hop

neighbor with the greatest SM value. This process is repeated until all the two-hop

neighbors are covered (lines 6 to 9). Finally, the dominating flag is set to true for

all nodes in the relay set (line 10). All the dominating nodes form a CDS for the

network.

Algorithm 3.1: Dominating Set Construction

1. Nvw = { Nv

1 with Willingness = DEFAULT or HIGH }

2. Relay(v) = φ

3. NC(v) = Nv2

4. Relay(v) = x, where x ∈ Nv1 are the only nodes to reach some nodes in

Nv2

5. NC(v) = NC(v)−NRelay(v)1

6. while NC(v)<> φ do

7. Choose x ∈ Nvw with maximum SM(v,x)

8. Relay(v) = x

9. NC(v) = NC(v)−Nx1

10. Mark Dominating(x)← true, ∀x ∈ Relay(v)

Algorithm Complexity

Let ∆ be the maximum degree of a node. It is assumed that O(∆) time is

needed to find out all one-hop neighbors that solely cover some two-hop nodes. The

Page 104: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

76

algorithm iteratively calculates the remaining one-hop neighbors until all two-hop

nodes are covered. This process needs O(∆) for each round and since the iteration

process takes M rounds to complete, the second step needs at most O(M∆) time in

total to finish. Therefore the overall time complexity is O(M∆).

Let n be the number of nodes in the network. Each node needs to send

HELLO messages to its one-hop neighbors to inform its one-hop neighborhood

information. After the relay selection, each node also sends out a message to inform

one-hop nodes that have been selected as relays. Therefore each node only sends

a constant number of messages during the CDS selection process and hence, the

message complexity is O(n).

3.2.4 Routing in S-ELHR

3.2.4.1 Topology Discovery

Each node maintains a local information base and topology information

base. The local link information base stores information about links with

neighbors. Each node maintains topology information about the network in the

topology information base. Each node, which has been selected as dominating,

regularly broadcasts Relay-Update messages to inform the network of its list of

nodes which has elected it as relay. Only the dominating nodes are involved in the

processing and the redistribution of the Relay-Update messages. These message

transmission help the dominating nodes to create and maintain the partial topology

information. The Relay-Update message forwarding in S-ELHR is according to

the following steps.

Page 105: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

77

(1) The node that originates the Replay-Update message sends it to all its

neighbors.

(2) A relay node which receives the message forwards it to all its neighbors when

the node from which it receives the message for the first time, belongs to the

list of Relay-Selector. Otherwise, the message will not be forwarded.

(3) Repeat (2), until no more forwards are needed for the message.

3.2.4.2 Route Computation and Route Recovery

A route computation is done when a node wants to send a packet. Nodes

do not maintain routing tables in S-ELHR. To construct a path, a shortest path

algorithm is executed for the specified destination address from the topology

information base. The dominating nodes are the only intermediate nodes in the

established path. To improve routing performance, source routing is applied in S-

ELHR for data retransmission instead of hop-by-hop routing. The whole route

is determined by the source node and all the intermediate nodes will only act

as routers to store and retransmit the packet. Every packet carries the complete

information of the route, from the source node to the destination node, including

all the intermediate nodes. So the intermediate nodes need not to maintain the

routing information and the routing nodes need not to calculate the next hop.

As the network is dynamic, there is a possibility of link breakages. The

S-ELHR also implements a route recovery scheme to adopt the changes in the

network topology. Algorithm 3.2 explains this process. As each packet in S-ELHR

carries the routing path, intermediate nodes check whether the next hop in the

source route of the packet is one of its neighbors. If so, it forwards the packet

Page 106: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

78

(lines 5 to 6). Otherwise, route re-computation is done to find a new route to the

destination and then forward the packets through the new route (lines 7 to 10).

Algorithm 3.2: DATA PACKET ProcessingInput: Node n receives a data packet p with destination d

1. if n == d then

2. receive(p)

3. else

4. nextHop = nextNodeAddress(p)

5. if neighborTable.lookU p(nextHop) 6= 0 then

6. f orward(p,nextHop)

7. newPath = routeRecovery(d)

8. p.sourceRoute = NewPath

9. nextHop = nextNodeAddress(p)

10. f orward(p,nextHop)

3.3 SIMULATION STUDY

3.3.1 Simulation Parameters

To evaluate the proposed protocol, the simulations are performed with NS-

2. CBR packets with 512 bytes are transmitted. The source and destination pairs

are selected randomly. The parameters of the simulation are summarized in Table

3.2.

The results are taken from 30 trails and the average of the results is

presented in error graphs with 95% confidence interval. Since the proposed work is

using CDS nodes for network-wide broadcasting and routing, the performance of

Page 107: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

79

Table 3.2: S-ELHR Simulation Parameters

Parameter Value

Simulation Time 600s

Traffic Type Constant Bit Rate(CBR)

Number of Connections 10

Packet Size 512 bytes

Packet Sending Rate 5 packets /second

MAC Protocol IEEE 802.11

Propagation Model Two-ray Ground

Transmission Range 250m

Bandwidth 2 Mbps

Queue Size 50 packets

Area Size 1000m x 1000m

Number of Nodes 20,30,40,50,60,70,80,90,100 (default:50)

Mobility Model Random Waypoint

Maximum Speed 5m/s to 35m/s in steps 5m/s (default:25m/s)

Transmission Power 0.666 W

Reception Power 0.395 W

Idle Power 0.1 W

S-ELHR is evaluated with the following performance metrics and is also compared

to OLSR and EE-OLSR.

- Number of Relay nodes: It measures the number of nodes in the CDS.

- Average path length: It defines the average length of path between source and

destination pairs.

- Number of Topology Message Forwarding: It measures the number of Relay-

Update packets forwarded by each node.

Page 108: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

80

- Average Energy Consumption: It defines the total energy consumed for the

routing operations during the simulation time.

- Control Packets per Data Packet: It is the ratio between the number of data

packets received and the total control packets.

- Packet Delivery Ratio: It is the ratio between number of data packets

successfully received and total data packets generated.

- Average End-to-End Delay: It is the amount of time to forward a data packet

from source node to destination node.

3.3.2 Protocols used for comparison

Since S-ELHR is based on link-state information, Optimized Link State

Routing (OLSR) protocol proposed by Clausen et al. [33] was used for performance

comparison. OLSR is a proactive routing protocol where each node periodically

broadcasts its routing table so that its neighbouring nodes can achieve a complete

view of the network state. Important to the operation of OLSR are MPR sets.

An MPR is a subset of the one-hop neighbors of a node selected to forward its

control packets. When each MPR forwards the message, a node is guaranteed

communication with each of its two-hop neighbours. This provides an efficient

implementation of network-wide broadcast. Each node discovers and maintains

topology information through the periodic exchange of HELLO and topology

control (TC) messages. A HELLO message, exchanged between a node and its

one-hop neighbours, contains a list of one-hop neighbours indicating those in the

MPR set, a list of two-hop neighbors, and a list of neighbours that have selected

this node as an MPR. The TC messages contain a list of all the nodes that have

selected the sender as MPR. The MPRs periodically exchange network topology

Page 109: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

81

information. When exchanging link-state information, each node lists only the

information of the nodes that have selected it as an MPR, that is, its multi-point

relay selector (MS) set.

As S-ELHR uses willingness concept, it was also compared with energy-

efficient OLSR (EE-OLSR) proposed by De et al. [40]. In EE-OLSR, each node

computed its own energetic status, can declare an appropriate willingness. The

willingness selection was based on both metrics: the battery capacity and the

predicted lifetime (based on the energy-drain rate) of a node. A heuristic function

was used to associate a willingness (“default”, “low” or “high”) to a pair (battery,

lifetime). For example, in condition of high battery value, if the predicted lifetime

is short, a node declares a W DEFAULT willingness. On the other hand, if a longer

node lifetime is predicted (because the node is experimenting low traffic), the node

can declare a W HIGH willingness. In the same way, if the battery charge is low

a node is less available to become MPR and declares a W LOW willingness value

(whatever lifetime it predicts). This permits a better load balancing to be obtained

and node with lower residual energy are not stressed.

3.3.3 Results and Discussion

Fig. 3.1. shows that the percentage of relay nodes drops, when the number

of nodes for the protocols increases. As the number of neighbors of a node

increases with the increasing network size, the percentage of nodes selected as

relays is decreased. The weight based willingness permits a better load balancing

to be obtained and node with lower residual energy are not stressed. The CDS

formation with stability metric significantly reduces the number of relay nodes.

Page 110: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

82

10

20

30

40

50

60

70

80

90

100

20 40 60 80 100 120

Pe

rcen

tage

of R

ela

y N

od

es

No.of Nodes

OLSRS-ELHR

EE-OLSR

Fig. 3.1: No. of Nodes vs Percentage of Relay Nodes

Moreover, the proposed protocol S-ELHR selects a stable CDS, which can

provide a long lasting routing path. The MPR selection algorithm of OLSR do not

take into consideration the route stability issues. But, an energetic status is used for

MPR construction process in EE-OLSR. The figure shows that the relay set size of

S-ELHR is the least compared to EE-OLSR and OLSR.

The length of the shortest path connecting the different sources and

destinations has a major impact on the performance of the networks. Longer paths

increase the delay, the jitter and the packet loss of the traffic flow. In order to

evaluate the impact on the path lengths, the average path lengths are calculated for

the protocols and it is shown in Fig. 3.2. S-ELHR shows better results compared

to OLSR and EE-OLSR since it selects less CDS nodes in sparse networks. The

probability to have shorter paths is higher when the network is denser. The average

path length in denser network is almost the same in S-ELHR, OLSR and EE-OLSR.

Page 111: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

83

2

2.25

2.5

2.75

3

3.25

3.5

3.75

4

20 40 60 80 100 120

Avera

ge

Path

Le

ngth

(Hop

s)

No.of Nodes

OLSREE-OLSR

S-ELHR

Fig. 3.2: No. of Nodes vs Average Path Length in Hops

But, the S-ELHR gives the least average path length compared to OLSR and EE-

OLSR.

Fig. 3.3. presents the average number of topology messages forwarded by

each node during the simulations against network density. There are increasing

topology messages, since the number of relay nodes grow when the network size

increases for the protocols. The connectivity index, degree and energy metrics

used in S-ELHR, take care of the stability of the CDS. Thus, the path through

these nodes experiences less link breakages than the path through MPR in OLSR.

As the EE-OLSR protocol uses the nodes energy consumption as MPR selection

metric, it provides an energy rich path than OLSR. Due to larger MPR set size, EE-

OLSR experiences more topology overhead than S-ELHR. Hence, S-ELHR has

less topology message overhead compared to OLSR and EE-OLSR.

Fig. 3.4 shows that the topology overhead of the protocols increases with

Page 112: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

84

200

400

600

800

1000

1200

1400

1600

10 20 30 40 50 60 70 80 90 100 110

Top

olo

gy M

essa

ge O

ve

rhe

ad p

er

Nod

e (

pkts

)

Number of Nodes

OLSRS-ELHR

EE-OLSR

Fig. 3.3: No. of Nodes vs Topology Message Overhead

600

650

700

750

800

850

900

950

1000

1050

1100

1150

1200

0 5 10 15 20 25 30 35

Topolo

gy M

essag

e O

verh

ea

d p

er

Node (

pkts

)

Max. Speed (m/s)

OLSRS-ELHR

EE-OLSR

Fig. 3.4: Mobility vs Topology Message Overhead

Page 113: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

85

the varying speed. The more topology change due to nodes speed has an impact

in the increasing topology overhead for the protocols. Both OLSR and EE-OLSR

experience frequent changes in the MPR set when the node speed is more than

25m/s. This leads to more topology message forwarding. However, topology

overhead of S-ELHR is the least among the protocols, because the DS set is not

changing frequently due to stability metric.

10

20

30

40

50

60

70

80

90

100

10 20 30 40 50 60 70 80 90 100 110

Avg. E

ne

rgy C

onsum

ption p

er

Nod

e (

J)

Number of Nodes

OLSRS-ELHR

EE-OLSR

Fig. 3.5: No. of Nodes vs Average Energy Consumption

Due to less control overhead, the S-ELHR consumes the least energy

compared to EE-OLSR and OLSR. As the network is sparse with minimum number

of nodes, the energy consumption of nodes is high due to mobility of nodes. The

percentage of relay nodes drops with the increasing network size as shown in Fig.

3.1., the energy consumption of nodes drops and it is shown in Fig. 3.5.

Fig. 3.6 shows that energy consumption of nodes increases with the

increasing speed. When the speed is more than 20m/s, EE-OLSR and OLSR

Page 114: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

86

25

30

35

40

45

50

55

60

65

70

75

0 5 10 15 20 25 30 35

Avg.

Ene

rgy C

onsu

mptio

n p

er

No

de (

J)

Max. Speed (m/s)

OLSRS-ELHR

EE-OLSR

Fig. 3.6: Mobility vs Average Energy Consumption

consume more energy due to more route breakage. With minimum topology

message forwarding through lesser and stable nodes, S-ELHR consumes the least

energy compared to EE-OLSR and OLSR.

The number of control packets transmitted for each successful data packet

transmission with varying network size is shown in Fig. 3.7. S-ELHR generates

less control packets because less number of nodes is selected as relays compared to

EE-OLSR and OLSR. It can be seen that the control overhead of the protocols

increase as the node mobility increases. Due to less link breakages, S-ELHR

generates much less overhead compared to EE-OLSR and OLSR, despite the

increase in node mobility. Also, a new route is reconstructed with route recovery

mechanism. Hence, routing overhead of S-ELHR is the least compared to EE-

OLSR and OLSR. This is shown in Fig. 3.8.

The performance of the protocols is evaluated under varying network size.

Page 115: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

87

0

2

4

6

8

10

12

14

10 20 30 40 50 60 70 80 90 100 110

Co

ntr

ol O

ve

rhe

ad (

pkts

)

Number of Nodes

OLSRS-ELHR

EE-OLSR

Fig. 3.7: No. of Nodes vs Control Overhead per Data Packet

1.5

2

2.5

3

3.5

4

4.5

5

5.5

0 5 10 15 20 25 30 35

Contr

ol O

ve

rhe

ad

(pkts

)

Max. Speed (m/s)

OLSRS-ELHR

EE-OLSR

Fig. 3.8: Mobility vs Control Overhead per Data Packet

Page 116: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

88

In the simulation, the maximum node speed is set to 25m/s and five CBR packets

are generated every second from 10 random source and destination nodes. As

shown in Fig. 3.9, the performance of OLSR drops as the network size increases

and this shows that OLSR does not scale with growing network size. The results

in Fig. 3.9 show that the S-ELHR maximizes the packet delivery ratio when the

number of nodes grows in the network. The source routing mechanism of S-ELHR

reduces the packet loss with more stable routes.

40

50

60

70

80

90

100

10 20 30 40 50 60 70 80 90 100 110

Pa

cket

Deliv

ery

Ratio(%

)

Number of Nodes

OLSRS-ELHR

EE-OLSR

Fig. 3.9: No. of Nodes vs Packet Delivery Ratio

The performance under varying nodes speed is shown in Fig. 3.10. The

maximum speed of nodes has been increased from 5m/s to 30m/s in steps of 5m/s.

The protocols show similar delivery ratio when the node speed is low, but the

delivery ratio drops as node speed increases. The source routing and route recovery

mechanism of S-ELHR enable more packet delivery than the others. Thus, the

Page 117: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

89

20

30

40

50

60

70

80

90

100

0 5 10 15 20 25 30 35

Pa

cket

De

live

ry R

atio

(%

)

Max Speed (m/s)

OLSRS-ELHREE-SOLSR

Fig. 3.10: Mobility vs Packet Delivery Ratio

packet delivery ratio of S-ELHR is higher when compared to EE-OLSR and OLSR,

exhibiting better resistance to node mobility.

Fig. 3.11 depicts the average end-to-end delay experienced by data packet

transmitted from source to destination against the maximum node speed 25m/s

with varying network size. S-ELHR has the lowest average end-to-end delay than

OLSR and EE-OLSR, as packets routed by S-ELHR experience a smaller path.

The generation of excessive control packets in OLSR and EE-OLSR consume a

large network capacity which in turn leads to larger delay.

Fig. 3.12 depicts the end-to-end delay against maximum node speed for a

network with 50 nodes. The figure shows that the delay incurred by the protocols

increases with increased node speed. This is due to frequent path breaks which

are associated with increased node mobility. However, S-ELHR minimizes the

Page 118: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

90

0

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

10 20 30 40 50 60 70 80 90 100 110

Ave

rag

e E

nd-t

o-E

nd D

ela

y(s

)

Number of Nodes

OLSRS-ELHR

EE-OLSR

Fig. 3.11: No. of Nodes vs End-to-End Delay

0

0.05

0.1

0.15

0.2

0.25

0 5 10 15 20 25 30 35

Avera

ge E

nd-t

o-E

nd D

ela

y (

s)

Max. Speed (m/s)

OLSRS-ELHR

EE-OLSR

Fig. 3.12: Mobility vs End-to-End Delay

Page 119: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

91

delay with route recovery mechanism by allowing the nodes to start forwarding the

packet through new route, after the path break.

3.4 CHAPTER SUMMARY

This chapter investigates the design of hybrid routing protocol S-ELHR, to

provide a stable and sustainable topology for routing in MANET. S-ELHR uses

CDS nodes for routing and it is selected based on stability metric which takes into

account the link connectivity time, energy and degree of nodes, to elect stable relay

nodes as dominating nodes. The selected dominating nodes perform the topology

discovery and data transmission. The S-ELHR computes routes on-demand and

follows a source-routing mechanism. To adapt to network topology changes, a

route recovery mechanism is also introduced.

The performance of the proposed protocol is evaluated under various

network sizes, node speed and compared to EE-OLSR and OLSR. The simulation

results show that the packet delivery ratio of S-ELHR is the highest in large

networks. As the proposed protocol uses the dominating nodes for relaying the

messages, the control overhead of S-ELHR is minimum, which in turn reduces

the energy consumption of the network. S-ELHR exhibits good scalability under

varying network sizes. The average end-to-end delay of S-ELHR is also the

least with route recovery mechanism. The source-routing mechanism with route

recovery of S-ELHR exhibits better performance with high node mobility. This

shows that S-ELHR protocol is suitable for dense mobile network with high traffic

loads.

Page 120: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

CHAPTER 4

DESIGN OF WEIGHTED DOMINATING SET BASED

ROUTING PROTOCOL FOR AD HOC

COMMUNICATIONS IN EMERGENCY AND RESCUE

SCENARIOS

4.1 INTRODUCTION

As a consequence of disasters, emergency rescue team can deploy and

use MANET for emergency communications. A MANET deployed in such

emergency rescue operations is named as emergency MANET (e-MANET). e-

MANET consists of collection of wireless mobile nodes such as PDA, Notebook,

mobile phone or hand-held devices etc, communicating among them through

wireless channels. The important characteristics of this network are battery power,

low bandwidth and dynamic topology. It can provide an instant and distributed

peer-to-peer ad hoc communication solution for the rescue workers [72]. In

emergency scenarios, it is assumed that it is not possible to recharge the battery

powered devices.

Two nodes can communicate directly with each other if they are within

each other’s transmission range, otherwise intermediate nodes have to route the

messages for them. Energy efficiency, quick response time and stability are equally

important for routing in e-MANETs, since mobile nodes have homogeneous

lifetimes. The presence of dynamic and adaptive routing protocols will enable ad

92

Page 121: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

93

hoc networks to be formed quickly, and then it ensures efficient communications

during the rescue operations [98, 128].

The on-demand routing protocols in MANET commonly use a route

discovery approach, to find a path from the source node to destination node. The

route control messages are broadcasted during the route discovery process. The

flooding of route request leads to congestion and also consumes more battery

power. Frequent route changes also result in frequent route computation process.

Therefore, it is crucial that MANET routing protocols must include information

on mobility and residual energy into the algorithm design to adapt the network and

node changes. The stability of path is an important design criterion to be considered

while developing multi-hop ad hoc communication protocols for e-MANET.

4.2 WEIGHTED CDS BASED ROUTING (WEIGHTED-CDSR)

From the literature review, it is observed that the major design objective of

the CDS approach is the construction of virtual backbone with minimum number

of nodes. The quality of the node to act as a dominating member is not at all

considered. There is a need for a generic protocol which is stable, scalable and

power efficient.

This chapter proposes a novel approach that integrates multiple factors

like link stability, mobility and energy into a single metric for Maximum Weight

Minimum CDS (MWMCDS) formation. An energy efficient reactive routing

protocol named Weighted-CDSR, is also proposed that takes advantage of the

MWMCDS. This protocol works in two stages, MWMCDS formation and Routing.

In this protocol, a node can play one of two roles: non-dominating or dominating

Page 122: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

94

node. A non-dominating node just receives the packet, while a dominating node

rebroadcasts or relays the messages that it receives.

4.2.1 Network Model and Problem Statement

An emergency MANET is modeled as a vertex-weighted, connected and

an undirected graph G = (V,E,WT ) with vertex weight function WT : V → R+,

where V = {v1,v2, ...,vn} denotes the set of mobile nodes of e-MANET, E =

{(vi,v j) | i ≤ n, j ≤ n} ⊆ V × V denotes the communication links between the

nodes, and WT= {WTi | ∀i ∈ V} denotes the set of weights associated with the

nodes. A homogeneous network deployed in 2D plane, where nodes have same

transmission range is assumed. An edge exists between the two nodes if they are

within the transmission range of each other.

Definition 4.1. Maximum Weighted Minimum CDS (MWMCDS): Given a graph

G = (V,E,WT ) with node weight function W : V → R+, MWMCDS problem is to

find a minimum size CDS of G such that its total weight is maximum.

The problem is to find a MWMCDS which can work for the longest time.

4.2.2 Weight Calculation

The proposed weight WTu for a node u consists of three metrics, taking

into account the link stability (γLSu ), energy of the node (γEN

u ) and the node

mobility (γMOBu ). A link stability metric is used to compute the stability of the

communication with its neighbors. The energy metric is to choose the one with

more energy among the stable nodes. The mobility metric predicts the speed of

a node. A minimum mobility factor γMOBmin is assumed and is assigned with value

Page 123: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

95

0.01. The WTu calculation includes γMOBmin if the mobility metric γMOB

u is 0. The

weight of a node u is defined as,

WTu =

γLS

u .γENu

γMOBu

, if γMOBu >0

γLSu .γEN

uγMOB

min, Otherwise

(4.1)

To compute the weight in (4.1), the following subsections explain the calculation

of the link stability (section 4.2.2.1), mobility metric (section 4.2.2.2) and energy

metric (section 4.2.2.3).

4.2.2.1 Link Stability Metric

The link stability (γLSu ) is calculated based on the Received Signal

Strength(RSS). Assume ∆Ruv is the variation of the RSS between nodes u and v

with ∆Ruv =(Rt+1

uv −Rtuv)

t . The distance between the two nodes is unchanged, when

∆Ruv = 0. When ∆Ruv>0, it means that the distance between the two nodes is

closing. When ∆Ruv<0, it means that distance between the two nodes is increasing.

The link stability between nodes u and v is defined as luv =1

(1−∆Ruv)and the stability

of a node u is,

γLSu = ∑

∀v∈Nu1

luv = ∑∀v∈Nu

1

1(1−∆Ruv)

(4.2)

4.2.2.2 Mobility Metric

The mobility (γMOBu ) of nodes can be considered in terms of neighbor

sets. Let A\B denote the symmetric difference between two sets A and B. Let

A∪ B denote the union of these sets. The mobility factor is then calculated as

Page 124: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

96

the percentage of neighbors which remains the same between the sending of two

consecutive Hello packets:

γMOBu =

|Nt+11 (u)\Nt

1(u)||Nt+1

1 (u)∪Nt1(u)|

(4.3)

The main importance of this metric is to let the algorithm prefer more stable nodes

which are not likely to change their neighbor sets rapidly.

4.2.2.3 Energy Metric

The energy metric (γENu ) of a node is calculated as

γENu =

Eurm

Euinit

(4.4)

where γENu gives the ratio of energy currently available at u to its initial energy. It is

necessary to balance the traffic through the network nodes in order to increase the

minimum lifetime of the nodes. By using this metric, the most energy-rich nodes

are selected.

4.2.3 Algorithm for Maximum Weighted CDS Construction

Each node has a two-hop neighbor table for keeping the topology

information about the nodes that are at one-hop and two hops away. This local

topology information is used in selecting the dominating nodes. Every mobile node

transmits a hello message to its neighbors. The hello message of node u includes

<WTu, Nu1>. When a node receives a hello message from one of its neighbor, it

updates the two-hop neighbor table.

Page 125: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

97

Initially all nodes are marked in WHITE color. After hello message

transmission, a node marks itself as a dominating node in BLACK color, according

to the marking procedure as described in Algorithm 4.1. A node is an intermediate

node if it has two unconnected neighbors (lines 2 to 4). A node u is covered by

another node v, when each neighbor of u is also neighbor of v, and WTu ≤WTv.

An intermediate node becomes an intergateway node if it is not covered by

any neighbor (lines 5 to 9). An intergateway node not covered by any pair of

connected neighboring nodes becomes a gateway node (lines 10 15). A gateway or

intergateway node is marked in BLACK color (line 16 and 17). All nodes marked

in BLACK forms the MWMCDS of the network. This process needs only two

messages. The first message allows the node to collect information about their two-

hop neighbors and the second is used by the node to inform its neighbors about its

final decision.

Theorem 4.1: Let S be the set of BLACK nodes and S is a Connected Dominating

Set.

Proof: The algorithm marks gateway and intergateway nodes in BLACK color. It

is necessary to prove the property for gateway node since gateway node is also an

intergateway node. Suppose that, on the contrary, the created set S is not a CDS.

Then, there exist some nodes which are not in S, and which have no neighbors with

nodes in S. Among such nodes, let x be the node with the largest weight value. If

all neighbors of x are non-intermediate, the graph is a complete graph. Otherwise,

let y be an intermediate neighbor of x with the largest weight value. Since, y is not a

gateway node, it is covered by one (u) or two ( u and w) of its neighbors and has the

lowest weight among them. Note that, if the cover set contains two nodes and one

of them w is non-intermediate, then u alone covers y and is an intermediate node.

Node x must be neighbor of u by the coverage condition. However, WTy<WTu

Page 126: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

98

Algorithm 4.1: MARKING PhaseData: Marking of node u

Result: u is marked with BLACK or WHITE

1. intermediate(u) = intergateway(u) = gateway(u) = f alse

2. foreach v,w ∈ Nu1 do

3. if v 6= w && w /∈ Nv1 then

4. intermediate(u) = true

5. if intermediate(u) then6. intergateway(u) = true

7. foreach v ∈ Nu1 do

8. if Nu1 ⊆ Nv

1 && WTu ≤WTv then9. intergateway(u) = f alse

10. if intergateway(u) then11. gateway(u) = true

12. foreach v,w ∈ Nu1 do

13. if v 6= w && v ∈ Nw1 && Nu

1 ⊆ Nv1 ∪Nw

1 then14. if WTu ≤WTv && WTu ≤WTw then15. gateway(u) = f alse

16. if gateway(u) ‖ intergateway(u) then17. Color(u)← BLACK

contradicts the choice of y. Therefore, the set of nodes not in S and not neighbors

of any nodes from S is empty. Hence S is CDS. �

Page 127: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

99

4.2.4 Routing in Weighted-CDSR

4.2.4.1 Route discovery and Maintenance

The proposed protocol uses three control messages namely Weighted-

RREQ, Weighted-RREP and Weighted-RERR for the route discovery. The

Weighted-RREQ is a broadcast message originated by the source node to find a

path to the destination. The Weighted-RREP is a unicast message, originated by

the destination to notify the route to the source node. The nodes are notified through

the Weighted-RERR message when the next hop link breaks. The formats of these

packets are shown in Table 4.1.

Table 4.1: Route Discovery Packet Formats

Packet Name FieldsWeighted-RREQ Type Hop Count

bcast id: Broadcast IDdest addr: Destination Node IDdest seq#: Destination Sequence Numbersrc addr: Source Node IDsrc seq#: Source Sequence Number

Weighted-RREP Type Hop Countdest addr: Destination Node IDdest seq#: Destination Sequence Numbersrc addr: Source Node IDlife time: Life Time

Weighted-RERR Type Dest Countdest addr: Unreachable Destination Node IDdest seq#: Unreachable Destination Seq#

The Weighted-RREQ packet includes address, sequence number of the

source and the destination nodes. It also includes the broadcast id and the hop

count. When a node wants to transmit a packet to a destination, it first checks its

Page 128: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

100

two-hop table. If the destination node is in the two-hop table, then it is forwarded

directly. Every node, after receiving a Weighted-RREQ, processes the packet as

explained in Algorithm 4.2.

Algorithm 4.2: WEIGHTED-RREQ PACKET ProcessingInput: Node ′n′ receives a Weighted-RREQ packet ′p′

Output: Forwarding of Weighted-RREQ or Sending of

Weighted-RREP packet

1. if n == p.dest addr then

2. sendReply(Weighted−RREP)

3. else

4. if isDominatingNode(n) then

5. if nextHop = twoHopTable.lookU p(p.dest addr) 6= 0 then

6. send(p,nextHop) ;

7. else

8. if rt.lookU p(p.dest addr) then

9. seqNum = rt.getSeqNum(p.dest addr)

10. if seqNum ≥ p.dest seq# then

11. sendReply(Weighted−RREP)

12. else

13. rt.addEntry(p.src addr)

14. p.hop cnt ++

15. f orward(p)

16. else

17. drop(p)

The destination node replies with Weighted-RREP which follows the return

Page 129: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

101

path to the source host (lines 1 and 2). A mobile host broadcasts the Weighted-

RREQ when it has to find a route to a destination. This happens when the

destination node is not in the two-hop table. When a dominating node receives this

request packet, it also checks its two-hop table. It directly sends the packet to the

destination if the destination is in the two-hop table (lines 3 to 6). If the destination

is not in the two-hop table, it first creates or updates a route to the previous hop

without a valid sequence number. It checks to determine whether it has received

this packet with the same source address and request id. If so, it discards the packet.

It creates a Weighted-RREP packet, when the destination sequence number in its

routing table entry is greater than or equal to the destination sequence number

in Weighted-RREQ (lines 7 to 11). Otherwise, it increases the hop cnt value in

the Weighted-RREQ by one and rebroadcasts RREQ to the network (lines 12 to

15). It also updates the routing table for forward route entry with last hop address

from which it has received the request packet. This packet is dropped by a non-

dominating node (lines 16 and 17). This process is repeated until it finds the

destination node.

The destination prepares the Weighted-RREP packet. The src addr is the

destination node address and dest addr is the source node address which initiates

the route discovery. The destination node copies these details from the Weighted-

RREQ packet. Every node after receiving a Weighted-RREP, processes the packet

as explained in Algorithm 4.3. When a node receives a Weighted-RREP packet,

it searches for a route to the previous hop. If needed, a route is created for the

previous hop, without a valid sequence number (lines 4 to 8). The node increases

the hop count value in the Weighted-RREP packet by one, in order to account

the new hop through the intermediate node (line 9). The forward route for this

destination is created if it does not already exist. The hop cnt field is incremented

Page 130: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

102

Algorithm 4.3: WEIGHTED-RREP PACKET ProcessingInput: node ′n′ receives EAR-RREP packet ′q′

1. // If reply is for me, discard it

2. if n == q.dest addr then

3. f ree(q)

4. else

5. // forward route entry

6. if rt.lookU p(q.src addr) == 0 then

7. rt.addEntry(q.src addr)

8. nextHop = rt.lookU p(q.dest addr)

9. q.hop cnt ++

10. send(q,nextHop)

by one when it is forwarded by the dominating nodes in the established path. The

originator node knows the distance to the destination from this hop cnt field. The

life time denotes how long the route is valid. The Weighted-RERR message is sent

whenever a link break causes one or more destinations to become unreachable from

some of the node’s neighbors.

4.3 SIMULATION STUDY

4.3.1 Simulation Parameters

This section explains the performance of proposed routing protocol

Weighted-CDSR through simulation using the network simulator NS-2.34 [50].

A MANET is assumed with N mobile nodes moving in the simulation area. The

simulation parameters are listed in Table 4.2.

Page 131: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

103

Table 4.2: Weighted-CDSR Simulation Parameters

Parameter Value

Area Size 1000 x 1000 m2

Simulation Time 900s

Traffic Type Constant Bit Rate (CBR)

Packet Size 512 bytes

MAC Protocol IEEE 802.11

Propagation Model Two-way Ground

Transmission Range 250m

Bandwidth 2 Mbps

Queue Size 50 packets

Mobility Model Random Waypoint

Transmitting Power 0.667W

Receiving Power 0.365W

Idle Power 0.1W

No. of Nodes 60,70,80,90,100,110,120 (default:75)

No. of Connections 1, 3, 5, 7, 9, 12, 15, 18, 20 (4 pkts/sec) (default:10)

Maximum Speed (m/s) 5, 10, 15, 20, 25, 30, 35 (default:20)

Experiments are repeated for 30 trials with different network sizes, load

conditions and mobility. The performance of Weighted-CDSR was compared to

the well-known on-demand routing protocols : DSR (Johnson et al. [73]), AODV

(Perkins et al. [116]) and DYMO (Chakeres et al. [27]). The reason for choosing

these protocols for comparison is that they have been adopted by IETF and a lot of

existing ad hoc routing protocols use these protocols as their measuring yardstick.

To verify the performance of the proposed protocol, the routing process over the

degree-based CDS proposed by Wu et al. [170], named Wu(Degree)-CDSR was

Page 132: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

104

also considered.

To see the performance of MWMCDS construction algorithm, the

following metrics have been used.

- Average CDS Size: the fraction of the network nodes in the CDS.

- Average Route Length: the average number of hops in the established path

between each source-destination pair.

In rescue scenarios, the communication protocol must be energy efficient

with fast response time. It should also be scalable and reachable as more nodes

are added during these scenarios. To measure these requirements, the following

performance metrics have been used.

- Routing Overhead:(measure energy efficiency) the total number of routing

packets transmitted during the simulation time.

- End-to-End Delay:(measure response time) the average time for a data packet

to reach the destination from the source.

- Packet Delivery Ratio:(measure scalability and reachability) the ratio of data

packets received at the destination to the total packets transmitted.

- Energy Consumption:(measure energy efficiency) the total energy consumed

for sending and receiving the packets.

4.3.2 Protocols used for comparison

AODV proposed by Perkins et al. [116], is an on-demand routing protocol.

A source node initiates a route discovery process, when it wants to send a message

Page 133: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

105

to a destination node and it does not already have a valid route to that destination

node. During route discovery, a source node broadcasts a RREQ packet to

its neighboring nodes. The neighboring nods then forward the request to their

neighboring nodes, and so on, until either the destination node or an intermediate

node that has a fresh route to the destination node is found. To ensure that all routes

are loop free, AODV uses destination sequence numbers. Before a node forwards

a RREQ packet to its neighboring nodes, it also records the node information in its

routing table. This information is used to construct the reverse route for the RREP

packet. If a link breaks and is detected, a RERR packet is used to notify other nodes

that the loss of that link has occurred.

DSR proposed by Johnson et al.[73], is an on-demand routing protocol

based on source routing. In DSR, mobile nodes maintain route caches that contain

the source routes of which the mobile node is aware. The route cache entries are are

continually updated as new routes are learned. When a source node wants to send

a message to a destination node, it looks up its route cache to determine whether

it already has a route to the destination node. If it has a route to the destination

node, it will use this route to send the message. But if the node does not have such

a route, it initiates the route discovery process by broadcasting a RREQ packet.

Each node receiving the RREQ packet checks whether it knows of a route to the

destination node. If it does not, it adds its own address to the route record of the

packet and then forwards the packet along its outgoing links. A RREP packet is

generated when either the RREQ packet reaches the destination node, or when it

reaches an intermediate node that contains in its route cache an unexpired route to

the destination node. If any link on a source route is broken, the source node is

notified using a RERR packet. The source node removes any route using this link

from its route cache. Then a new route discovery process must be initiated if this

Page 134: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

106

route is still needed.

Dynamic MANET On-demand (DYMO) developed by Chakeres et al.

[27], is an on-demand routing protocol based on AODV. DYMO consists of

two operations: route discovery and management. During route discovery, the

originating node causes dissemination of a Routing Element (RE) throughout the

network to find the target node. Each intergateway node creates a route to the

originating node during dissemination. When the target node receives the RE

it responds with RE unicast toward originating node. During propagation, each

node creates a route to the target node. The routes have been established between

the originating node and the target node in both directions, when RE reached the

originating node. In DYMO, nodes also maintain their routes and links, in order

to react quickly to changes in the network topology. When a packet is received

for a route that is no longer available, the source of the packet is notified with

RERR packet. When the source nodes receives the RERR, it will re-initiate route

discovery if it still has packets to deliver.

4.3.3 Results and Discussion

Fig. 4.1. shows the average CDS size with varying network sizes. A

degree-based CDS is considered as an optimum size since it gives preference to

the nodes that have larger number of uncovered neighbors. The CDS constructed

based on degree is unstable, because it includes nodes with lowest energy or highest

speed. The weight calculation in the proposed work combines multiple metrics

such as link stability, node mobility and energy for forming a Stable CDS, which

can work for a longer time than degree-CDS. So, the CDS size in Weighted-CDS

is larger than Wu(degree)-CDS.

Page 135: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

107

0

5

10

15

20

25

30

35

25 50 75 100 125 150 175 200 225

Avera

ge

CD

S S

ize

No.of Nodes

Wu(Degree)-CDSWeighted-CDS

Fig. 4.1: No. of Nodes vs CDS Size

The average route length metric gives a measure of how well a routing

protocol can perform over CDS. As expected, the higher the CDS size, the shorter

the routes. This is presented in Fig. 4.2. As the Weighted-CDS results in larger

size CDS than Wu(Degree)-CDS, the routes are shorter than the routes obtained in

Wu(Degree)-CDS. The graph induced by Wu(Degree)-CDS is sparse, this results

in longer routes.

The results in Fig. 4.3. show the generated routing overhead against node

mobility. The overhead of the all routing protocols increases with the increasing

node speed. This is because when node mobility increases, existing path may be

broken and more RREQ packets fail to reach their destinations. As a consequence,

more RREQ packets are generated and transmitted. The reduction in the routing

overhead is achieved in Weighted-CDSR as it constructs the most stable routes

Page 136: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

108

2

2.25

2.5

2.75

3

3.25

3.5

3.75

4

25 50 75 100 125 150 175 200 225

Avera

ge

Rou

te L

eng

th

No.of Nodes

Wu(Degree)-CDSWeighted-CDS

Fig. 4.2: No. of Nodes vs Average Route Length

15

30

45

60

75

90

105

120

135

0 5 10 15 20 25 30 35 40

Ro

utin

g O

verh

ead x

10

3 (

packe

ts)

maximum speed (meters/sec)

AODVDSR

DYMOWeighted-CDSR

Wu(Degree)-CDSR

Fig. 4.3: Mobility vs Routing Overhead

Page 137: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

109

with the longest duration in contrast with AODV, DSR and DYMO. Weighted-

CDSR reduces the rate of route reconstruction due to link breakage. Clearly the

reduction in route reconstruction rate in Weighted-CDSR reduces the rate of extra

control messages. Although Wu(Degree)-CDS results in minimum size CDS, it

does not guarantee an optimal network performance because the routing path is

broken frequently due to mobility of the nodes. Thus the routing overhead of

Wu(Degree)-CDSR is higher than Weighted-CDSR.

50

60

70

80

90

100

0 5 10 15 20 25 30 35 40

Packet D

eliv

ery

Ratio

(%

)

maximum speed (meters/sec)

AODVDSR

DYMOWeighted-CDSR

Wu(Degree)-CDSR

Fig. 4.4: Mobility vs Packet Delivery Ratio

Fig. 4.4. plots the packet delivery ratio of the routing protocols against

the maximum node speed. The results show that the delivery ratio decreases with

the increased node mobility. This is due to the fact that the routes are highly

prone to breakage as the host speed increases. The weight based CDS construction

algorithms use a mobility metric to let the algorithm prefer more stable nodes which

are not likely to change their neighbor sets rapidly. Comparing the obtained results,

Weighted-CDSR has the highest delivery ratio as it establishes routes with stable

Page 138: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

110

nodes. The packet delivery ratio of Wu(Degree)-CDSR is close to Weighted-CDS

when the maximum speed is less than 5m/s. The performance of Wu(Degree)-

CDSR degrades when the speed is more than 5m/s. This is due to the loss of

connection with the neighbors as only nodes with more neighbors are added in

Wu(Degree)-CDSR.

20

25

30

35

40

45

50

0 5 10 15 20 25 30 35 40

Avera

ge E

nerg

y C

on

sum

ed x

10

2 (

J)

maximum speed (meters/sec)

AODVDSR

DYMOWeighted-CDSR

Wu(Degree)-CDSR

Fig. 4.5: Mobility vs Energy Consumption

Fig. 4.5. depicts the average energy consumption of the nodes against node

mobility. The energy consumption of the protocols increases with the increased

node speed. More energy is consumed due to the frequent route reconstruction

process resulting from link breakage. The Weighted-CDSR consumes less energy

compared to others because of the reduction in routing overhead. The energy

consumption of Wu(Degree)-CDSR is minimum among all the protocols when the

maximum speed is less than 5m/s. This is due to less number of nodes participate

in routing and the mobility does not affect the routing path frequently. When the

Page 139: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

111

speed is greater than 5m/s, the frequent route breakage in Wu(Degree)-CDSR leads

to high energy consumption than Weighted-CDSR.

0

10

20

30

40

50

60

70

80

90

100

110

120

130

20 30 40 50 60 70 80 90 100 110 120 130

Routin

g O

ve

rhea

d x

10

3 (

packets

)

Number of nodes

AODVDSR

DYMOWeighted-CDSR

Wu(Degree)-CDSR

Fig. 4.6: No. of Nodes vs Routing Overhead

Fig. 4.6. shows the performance of the protocols in terms of routing

overhead versus network density. As shown in the figure, the routing overhead

generated by each of the protocols increases as the network density increases.

At high density with more than 100 nodes, the overhead generated by DSR and

Weighted-CDSR is reduced. The route cache mechanism of DSR reduces the

number of RREQ transmissions. In the case of Weighted-CDSR, the transmission

of RREQ is restricted only to the CDS nodes. As a consequence, the routing

overhead is reduced. When the network is sparse with less than 40 nodes,

Wu(Degree)-CDSR incurs more routing overhead as mobility of the nodes affect

the routing path. Since the CDS size grows with the increasing network size, the

routing overhead of Wu(Degree)-CDSR is least compared to AODV, DYMO and

DSR.

Page 140: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

112

0

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

0.45

0.5

20 30 40 50 60 70 80 90 100 110 120 130

End

-to-E

nd

Dela

y (

sec)

Number of nodes

AODVDSR

DYMOWeighted-CDSR

Wu(Degree)-CDSR

Fig. 4.7: No. of Nodes vs End-to-End Delay

Fig. 4.7. demonstrates the performance of all the protocols in terms of end-

to-end delay. When the network density increases, the transmitted RREQ packets

fail to reach the destinations due to high collisions and channel contention that have

been caused by excessive redundant transmissions. Therefore, the waiting time of

data packets is increased. The figure also reveals that, in sparse network with 30 or

40 nodes, especially when the network is poorly connected, the end-to-end delay

is higher in AODV, DSR and Weighted-CDSR. The end-to-end delay gets reduced

when the network connectivity increases with the increasing network density. But,

in dense network with more than 80 nodes, the complexity of the network increases

and hence the end-to-end delay increases. DSR needs to put the route information

in the data packets which creates longer delay as the network density increases.

The path accumulation of DYMO stores the routes to all nodes while processing

RREQ packets. Thus the delay is always less in DYMO. The number of nodes

in CDS increases when the network density increases. The denser CDS provides

Page 141: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

113

shorter routes. Thus delay in Weighted-CDSR is less than AODV and DSR, when

the network density is high with more than 50 nodes. The end-to-end delay in

Wu(Degree)-CDSR is the highest among DYMO, AODV and Weighted-CDSR, as

minimum number of nodes experience heavy load.

50

60

70

80

90

100

20 30 40 50 60 70 80 90 100 110 120 130

Packet D

eliv

ery

Ratio

(%

)

Number of nodes

AODVDSR

DYMOWeighted-CDSR

Wu(Degree)-CDSR

Fig. 4.8: No. of Nodes vs Packet Delivery Ratio

Fig. 4.8. depicts the packet delivery ratio of all the protocols against

network density. When the network density is low, the network connectivity is

poor. The performance of AODV, DSR, DYMO and Weighted-CDSR drops when

the network density is set to low with 30 or 40 nodes. However, when the network

density is increased, the performances of AODV and Weighted-CDSR are good.

In DSR, both the route-reply cycle and data packet transmissions carry the source

route information. As a consequence, long delay is experienced by the packets

when the network density increases. Due to the long delay, the performance of

DSR drops with high network density. The path accumulation policy in DYMO

shows increased performance at low network density. The packet delivery ratio of

Page 142: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

114

Wu(Degree)-CDSR is least among DSR, AODV and Weighted-CDSR due to heavy

load on less number of nodes. Also, the nodes in Wu(Degree)-CDSR experience

frequent route breakage due to mobility and energy. This leads to more packet

dropping.

10

15

20

25

30

35

40

45

50

55

60

65

20 30 40 50 60 70 80 90 100 110 120 130

Avera

ge E

ne

rgy C

onsu

med

x 1

02 (

J)

Number of nodes

AODVDSR

DYMOWeighted-CDSR

Wu(Degree)-CDSR

Fig. 4.9: No.of Nodes vs Energy Consumption

Fig. 4.9. shows the average energy consumption of all the protocols with

increasing node density. The route discovery operation works with less number

of nodes in the forwarding of the RREQ packets and the route re-computation is

less in Weighted-CDSR. As a consequence, the energy consumption is minimum

in Weighted-CDSR compared to others. The energy consumption of Wu(Degree)-

CDSR is the least among DYMO, DSR and AODV, when the network is dense

with more than 60 nodes. This is due to least number of nodes involved in routing.

As explained earlier, the routing overhead of Wu(Degree)-CDSR is high when the

network is sparse, which leads to the highest energy consumption.

Page 143: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

115

50

60

70

80

90

100

1 3 5 7 9 12 15 18 20

Pa

cke

t D

eliv

ery

Ra

tio (

%)

Number of connections (4 pkts/sec)

AODVDSR

DYMOWeighted-CDSR

Wu(Degree)-CDSR

Fig. 4.10: No. of Traffic Sources vs Packet Delivery Ratio

The results in Fig. 4.10. show the packet delivery ratio for all the

protocols with the increasing traffic sources. When the number of flows increases,

the number of nodes initiating route discovery operation also increases. As a

consequence, more RREQ packets are generated and transmitted which lead to

a high consumption of the communication bandwidth. This leads to the delivery

of fewer data packets at the destinations, thereby degrading the delivery ratio. At

offered load of 20 flows, the high delivery ratio is achieved by Weighted-CDSR

with more stable nodes, when compared with others. The is due to the reduction of

the number of nodes involved in the dissemination of RREQ packets, which leads

to the reduction of routing overhead and packet collisions. As a consequence more

communication bandwidth is freed for data transmission. When the offered load is

minimum with 1pkt/sec, Wu(Degree)-CDSR provides the highest packet delivery

ratio. Due to energy depletion, the performance of Wu(Degree)-CDSR decreases

when the offered load increases.

Page 144: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

116

4.4 CHAPTER SUMMARY

This chapter discusses the design of a stable, scalable and an energy

efficient, reactive routing protocol named Weighted-CDSR, suitable for MANETs.

A novel approach is introduced that integrates multiple factors like link stability,

mobility and energy into a single metric for maximum weighted CDS formation.

The proposed protocol uses CDS for the broadcast and data transmission. The

CDS selection based on combined metrics, increases the path availability for a

longer period. The performance of the proposed work is compared to degree-based

and well known reactive routing protocols with different mobility speed, network

density and number of connections. Simulation results show that the number of

control packet transmission is reduced because only the dominating nodes act as

routers to route the messages of other nodes. The energy consumption is also less

due to the reduction in route re-computation. With stable backbones, Weighted-

CDSR gives high packet delivery ratio in all the cases. As the network congestion

is reduced, more bandwidth is available for data transmission in Weighted-CDSR,

it performs well when the number of flows increases. As more nodes are added to

the backbone when the network density is high, the end-to-end delay is minimum

in Weighted-CDSR. Based on the increased packet delivery ratio, improved energy

efficiency, lesser routing overhead and lesser end-to-end delay, the proposed

protocol Weighted-CDSR, is well suited for the requirements of emergency and

rescue scenarios.

Page 145: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

CHAPTER 5

DESIGN OF AN EGO CENTRALITY AND CONTACT

DURATION BASED BACKBONE ROUTING

PROTOCOL FOR MOBILE OPPORTUNISTIC

NETWORKS

5.1 INTRODUCTION

Recently, there is a growing interest in the research towards mobile

opportunistic networks or intermittently connected networks (e.g., vehicular ad

hoc networks, mobile sensor networks, and pocket switched networks), in which

the communication between mobile nodes is opportunistic. Mobile Opportunistic

Networks are kind of Delay Tolerant Network (DTN), which offers support for

communication scenarios where the nodes are sparse and the connectivity between

them are short-lived due to high node mobility. The routing approach in DTN uses

store-carry-forward mechanism that allows intermediate nodes to store messages

for an extended period of time (called carry) and to deliver messages towards

destination when an opportunity to forward a message becomes available. Thus,

in contrary to MANET approach, the DTN can deliver messages also when an

instantaneous end-to-end path between the nodes does not exist. However, many

protocols in this network aim to ensure delivery by creating multiple message

copies, which can lead to congestion and decreased performance especially in

dense networks [23, 77, 106, 114, 149].

117

Page 146: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

118

The consideration of social characteristics present a new direction in

the design of data routing for DTN [136]. Centrality is one of the most

useful mathematical measure developed by social network analysts to capture the

structural properties of social relationship. It aims to identify the most important

vertices within the graph that represents a network [78]. Centrality metrics could

be based on degree of a vertex [51] or geodesic distance between them [52].

Betweenness centrality measures the proportion of shortest paths between any

pair of nodes passing through a specific node [52]. In the context of DTN, ego

network is defined as a network consists of single node and its 1-hop neighbors

with which the ego has direct contact [49]. Ego Centrality for an ego network is

the representation of the nodes with which the ego node has come into contact

[49]. In DTN routing, the utility of a node is a measure of the contribution of the

node to enhance a routing metric such as throughput or an end-to-end delay. In

probabilistic routing, the messages are forwarded to mobile nodes that have higher

probabilities of meeting the destination nodes named contact frequency utility. A

duration utility can reflect the transmission capacity between a pair of nodes with

higher accuracy than a contact frequency utility [91].

Most of the works only consider the single feature of the node’s behavior,

such as centrality, interest, encounter frequency. But these works have some

difficulties in representing the social relations. The numerical features, like

centrality and the number of interest, cannot reflect the node’s forwarding ability.

Since the successful delivery not only depends on the number of connections,

but also the encounter time and frequency. So, in this study, a backbone routing

protocol named BRP is proposed, considering both contact frequency and contact

duration to achieve high throughput and low end-to-end delay. Also, to improve

the forwarding performance in a sparse network, BRP uses a buffer mechanism.

Page 147: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

119

5.1.1 Social-aware Routing in Mobile Opportunistic Networks

This section presents the routing protocols based on centrality, contact

duration and frequency.

Daly et al. [36] proposed the concepts of node’s centrality and the social

similarity to be used as the link metric. Centrality indicates the number of

connections of the node to other nodes. Social similarity is the number of common

friends with the destination. A node with higher centrality and social similarity

was chosen as the relay node. Hui et al. [70] presented Bubble Rap Forwarding,

where forwarding decision was made based on the node’s centrality. The message

is forwarded to the node with higher global centrality in the global network,

and then forwarded to the node with higher local centrality in the destination

node’s community. Vazquez et al. [160] proposed both centralized and distributed

algorithms based on the centrality metrics. They constructed a CDS that includes

the most central nodes. They evaluated the resulting performance using the three

most common centrality measures: degree, closeness and betweenness.

Liu et al. [95] proposed three algorithms for computing mobile backbone

in mobile opportunistic network. Two of the algorithms exploit the sociality

feature of mobile opportunistic networks by computing node betweenness, which

counts the times that a node appears in all shortest paths. They proposed

centralized algorithms for backbone formation using betweenness measure and

delay weighted betweenness. For a given opportunistic network G and an integer

k, their algorithms construct a backbone of size k with the objective of minimizing

the total packet delivery cost of the network. Yang et al. [185] developed an

adaptive backbone based routing approach with diverse connection predication

characteristics. According their approach, when the past meeting frequency of two

Page 148: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

120

nodes is known, an edge between these two nodes use the frequency as the weight

of this edge. In this way, a weighted graph is derived with a certain degree of

knowledge on node movements. The edge weights were used to predict expected

delivery latency. They proposed a localized algorithm for the delay tolerant CDS

(DTCDS) for DTNs. They designed an accumulated node coverage condition for

the minimum equally effective DTCDS problem, where each node after obtaining

the meeting frequency with other nodes, decides whether to serve as DTCDS

node and help with forwarding or withdraw, in a localized manner. Kim et al.

[82] defined an expanded ego network by comprising the ego’s 2-hop neighbor

nodes as well as the ego’s 1-hop ones. In DTN, the expanded ego network can be

easily self-configured at a node and it can contain more network information than

the ego network. Therefore, it is expected that the effectiveness of the expanded

ego network will be higher than the one of the ego network in terms of data

routing and dissemination. They examined the relationship among the expanded

ego betweenness, the ego betweenness, and the betweenness of the entire network

for a node.

According to the related works, the issues of the available socially aware

routing protocols in DTN can be summarized as the following two aspects: (1)

Multi-copy based routing generates a lot of message copies, which leads to great

system overhead. (2) Most of the socially aware single-copy based routing only

considers the single feature of the node’s behavior. So, an improved single-copy

forwarding protocol is needed that reduces the overhead and considers multiple

social features of the node’s behavior. This study proposes an efficient way to form

a CDS based on ego-centrality, contact duration and frequency. It also explains a

backbone routing protocol that uses the backbone (dominating) nodes for single-

copy forwarding of a message.

Page 149: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

121

5.2 BACKBONE BASED ROUTING PROTOCOL (BRP)

The proposed protocol BRP does not need any distributed knowledge

of the global network topology to generate a backbone. Each node u in the

network maintains one-hop neighbor table, contact table, ego centrality value and

the dominating status. The one-hop neighbor table contains the ID and the ego

centrality value (as explained in section 5.2.2.1) of its neighbors. The contact table

of node u contains the following fields for each encountered node v: the node ID

of v, the sum of inter-contact times between the nodes u and v denoted by σuv, the

number of encounters χuv, the end time of the last encounter teuv and the start time

of the ongoing encounter tbuv. These fields are used to calculate the average inter-

contact time of links (explained in section 5.2.2.2). The dominating status of node

is either true (dominating) or false (non-dominating).

5.2.1 Network model and Problem Statement

A mobile opportunistic network is considered that consists of N mobile

nodes, denoted by a set V = {n1,n2, ...,nN}. Each node in the network is mobile

and any pair of nodes can communicate with each other when their distance is

within their communication range. The set E = (u,v) denotes the communication

link between the nodes. An opportunistic network is modeled as a graph G(V,E),

where V is the set of nodes in the network and E is the set of communication

links between any pair of nodes. Each edge (u,v) has a weight ξuv representing an

average inter-contact time of the link. A homogeneous network where nodes have

same transmission range is assumed. A subset of network nodes can construct a

backbone, which is called as CDS. Only the nodes in the CDS can act as relay for

multi-hop communication to send a message from source to destination.

Page 150: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

122

Definition 5.1. Ego-Centrality Contact-Duration Connected Dominating Set

(ECCDS): Given a vertex weighted, edge weighted, and an undirected graph

G(V,E,VW,EW ) representing a mobile opportunistic network, where V denotes

the nodes in the network, E denotes the communication links, VW = {ϑ1,ϑ2, ...ϑn}

is the set of weights associated with the vertices (i.e., ϑx is ego-centrality of x)

and EW = {ξ1,ξ2, ...ξm} is the set of weights associated with the edges ( i.e., ξi

is average inter-contact time of link i). Consider a subset of nodes S ⊆ V and

E ′ = {(u,v) | u,v ∈ S,(u,v) ∈ E}, S is said to be ECCDS if

- S is CDS,

- ∑∀v∈S

ϑv is maximum and

- ∑∀e∈E ′

ξe is minimum.

5.2.2 Ego-Centrality and Contact-Duration based ConnectedDominating Set (ECCDS)

5.2.2.1 Ego Centrality Calculation

An efficient algorithm to compute ego centrality is proposed by Everett et

al. [49]. Each node represents its ego network (one-hop neighbors) by means of the

adjacency matrix A. The elements of this matrix are given by

A[i, j] =

1, if there is a link between i and j

0, Otherwise

In an ego network, every pair of non-adjacent nodes must have a geodesic

of length 2 which passes through ego. Therefore, when i 6= j, and being 1 the

Page 151: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

123

matrix with all its elements equal to 1, the expression A2[1−A]i, j gives the number

of shortest paths with length 2 that links nodes i and j. Thus, the ego centrality is

the sum of the reciprocal of the resulting non-zero elements. Since the matrix is

symmetric ego-centrality calculations need to consider only the zero entries above

the leading diagonal and calculate A2[1− A]i, j for those entries [49]. Thus the

egocentric value of node v is

ϑu = ∑j>i ∧ [1−Ai j]6=0

1A2

i j, A2

i j 6= 0 (5.1)

5.2.2.2 Calculation of Average Inter-Contact time

When two nodes u and v go out of the transmission range of each other, the

last inter-contact time between nodes u and v is set to ∆uv = teuv - tb

uv. The sum of

inter-contact time between nodes u and v is σuv = ∆′uv + ∆uv, where ∆′uv is the sum

of the inter-contact time of node u to v before last encounter. Then the number of

encounters χuv is increased by 1. The average inter-contact time between nodes u

and v is expressed as

ξuv =

+∞, if χuv = 1

σuvχuv−1 , if χuv > 1

(5.2)

5.2.2.3 Algorithm for ECCDS Construction

Yang et al. [184] have proposed an adaptive backbone based routing

protocol with delay tolerant connected dominating set. They used the contact

frequency to measure the delivery latency of a link. They have also formulated

accumulated delivery latency and accumulated node coverage condition for a node

Page 152: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

124

to mark or unmark its dominating status. Similar to that, accumulated average inter-

contact time and accumulated node coverage condition are proposed, considering

the average inter-contact time of links (instead of contact freqency) and ego

centrality of nodes (instead of node ID).

Accumulated Average Inter-contact Time: Assume that there are t node

disjoint paths connecting nodes u and v, Pi with sum of average inter-contact

time of σP1,σP1, ...σPt . The average of inter-contact time between u and v

through these paths is

ϖuv =1t∗

t

∑i=1

σPi. (5.3)

Accumulated Node Coverage Condition (ANCC): As in Fig. 5.1, node v is

unmarked if for any two neighbors of v, u and w, a group of replacement

paths, P1,P2.....Pt exists connecting u and w such that

1. each intermediate node on any replacement path Pi, (i = 1,2, ..., t), has a

higher Ego-centrality than v and

2. the accumulated average inter-contact time of the group of replacement

paths is smaller than or equal to the average inter-contact time of path

u,v,w. i.e.,

ϖuw ≤ (ξuv +ξvw

2) (5.4)

twvus

P1

P2

Fig. 5.1: Accumulated Node Coverage Condition

Page 153: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

125

Based on ANCC, Algorithm 5.1 is applied to form ECCDS.

Each node in the network runs this localized algorithm when a new or

updated information is collected during the contact. All marked nodes form a

ECCDS of a network and are responsible for relaying the messages.

Algorithm 5.1: ECCDS ConstructionData: Each Node u decides its dominating status

Result: ECCDS as Backbone

1. Node u applies accumulated node coverage condition

2. if ANCC(u) == true then

3. u.dominating = f alse

4. else

5. u.dominating = true

5.2.3 Routing in BRP

5.2.3.1 Message Forwarding

The pseudo-code for message forwarding in BRP is given in Algorithm

5.2. The message is received by a node, when it is the destination of the message

(lines 1 to 2). When the receiving node is a dominating node, it checks whether

the destination is a one-hop neighbor and sends the message if so (lines 4 to 6).

Otherwise it checks whether any new or updated information is collected in the

contact table during the last Hello message transmission. There may be situations

where a node is disconnected or stable for a longer period, no new or updated

information is collected in such cases. The packet delivery ratio can be increased

Page 154: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

126

if the possibility of reaching the destination is checked and packets are buffered in

case of stale routes (lines 8 to 9).

Algorithm 5.2: MESSAGE PACKET ProcessingInput: Node n receives a message p to destination d

Output: Forwarding or buffering of p

1. if n == d then

2. receive(p)

3. else

4. if isDominating(n) == true then

5. if oneHopNeighbor.lookU p(d) 6= 0 then

6. send(p,d)

7. else

8. if no new entry or udpate in Contact Table then

9. bu f f erMessage(p)

10. else

11. if isDuplicate(p) == f alse then

12. broadcast(p)

13. else

14. drop(p)

To cope with disruptions, BRP buffers the message instead of discarding

it. The rationale behind this behavior is that a buffered message may be sent later

when a connection becomes available. Otherwise, nodes broadcast the message if

it is not already transmitted (lines 11 to 12). The message is dropped when the

receiving node is not a dominating node (lines 13 to 14) .

Page 155: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

127

5.2.3.2 Forwarding of Buffered Messages

The pseudo-code for buffered message forwarding is given in Algorithm

5.3. Each node, apart from buffering a packet, also decides when a buffered packet

can be sent. Whenever the contact table is updated, a node sends a packet if the

destination is a one-hop neighbor (lines 1 to 4). Otherwise, it broadcasts all the

messages and removes them from the buffer to save transmission bandwidth and

storage (lines 5 to 7).

Algorithm 5.3: BUFFERED MESSAGE ProcessingInput: Dominating node n has messages in its Buffer

Output: Forwarding of buffered messages

1. if contactTable is updated then

2. foreach message p with destination d in Buffer do

3. if oneHopNeighbor.lookU p(d) 6= 0 then

4. send(p,d)

5. else

6. broadcast(p)

7. removeMessage(p)

5.3 SIMULATION STUDY

5.3.1 Simulation Parameters

To evaluate the performance of proposed protocol, simulations are

conducted for the protocols PROPHET [94], Adaptive-Routing [84] and

Page 156: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

128

Table 5.1: BRP Simulation Parameters

Parameter Value

Area Size 3000 x 3000 m2

Simulation Time 3600s

Traffic Type TCP

Message Size 10kB

MAC Protocol IEEE 802.11g

Propagation Model Free Space

Transmission Range 100m

Bandwidth 54 Mbps

Queue Size 1000

Mobility Model Random Waypoint

Transmitting Power 0.667W

Receiving Power 0.365W

Idle Power 0.1W

No. of Nodes 30, 40, 50, 60, 70, 80 (default:40)

Pause time 10s

Maximum Speed (m/s) 1, 5, 10, 15, 20, 25 (default:10)

Message Sending Rate/Node 1, 3, 5, 7, 9, 11, 13, 15 (default:25)

Message Lifetime(sec) 100 to 1000 (default:750s)

CoMANDR [126]. All the simulations are performed in NS-2 [50]. The simulation

parameters are listed in Table 5.1.

In the simulation, N mobile nodes are deployed in 3000 x 3000 m2 area.

The wireless channel model is similar to Adaptive-Routing [84]. The mobility

model used in the simulation is random waypoint. The source and destination

nodes are selected randomly and each node generates 25 messages. All messages

Page 157: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

129

have a lifetime of 750s. The default bundle size is set to 10kB for DTN routing. All

experiments are repeated 30 times for a simulation time of 3600s. The results show

the mean values of all simulation runs and error-bars denote the 95% confidence

interval.

The following metrics have been used to evaluate the performances of the

protocols.

- Message Delivery Ratio: It shows the ratio of successfully received messages

at the destination to the number of created messages.

- End-to-End Delay: It represents the time that is needed to transfer a message

from the source to the destination.

- Hop Count: It gives the length of a path (number of nodes) for a message to

reach the destination from the source.

- Number of forwarded messages : It denotes the average number of messages

forwarded by a node during the simulation time.

5.3.2 Protocols used for comparison

The PRoPHET algorithm proposed by Lindgren et al. [94] studied pairwise

contacts to make routing decisions. PRoPHET reduces the overhead by calculating

a node’s delivery predictability for a specific destination. This metric is calculated

so that a node with a higher value for a certain destination is estimated to be a better

candidate for delivering a bundle to that destination. It is later used when making

forwarding decisions. According to this protocol, nodes exchange and update the

delivery predictability when they meet other nodes. Also, a node exchanges all

messages to a node when the other node has a higher delivery probability. The

Page 158: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

130

delivery predictability for a node was based on the number of encounters, the

age of these encounters, and the existence of a transitive property for mutually

encountered nodes.

Adaptive-Routing, a routing scheme proposed by Lakkakorpi et al. [84],

uses only local information to transmit the messages from source to destination

using either AODV or DTN routing, depending on current node density, message

size, and path length to destination. The Adaptive-Routing approach is to choose in

the sending node whether to use DTN (e.g., epidemic or spray and wait) or AODV

for message delivery. The benefit of the approach is that both routing protocols

can remain untouched, and intermediate node need to support only pure DTN or

AODV functionality. The decision on which protocol to use for transmitting a

given message from source to destination is made on application level. They have

used the TCP-Convergence layer as described in RFC7242 [112] to support bundle

protocol.

CoMANDR, a combined MANET/DTN Routing proposed by

Raffelsberger et al. [126], uses the routing table that is calculated by the

MANET protocol to route packets over a multi-hop end-to-end path. To cope

with disruptions, CoMANDR utilized two mechanisms: packet buffering and

utility-based forwarding. If the routing table contains no valid entry for a packet’s

destination, CoMANDR buffers the packet instead of discarding it. The decision

to which node a buffered packet should be forwarded is based on a utility function.

CoMANDR used a modified version of the PROPHET meeting probability

calculation function to calculate the utility of a node. In contrast to the PROPHET

protocol, that only considers when two nodes directly meet (i.e., there is a direct

link between the nodes), CoMANDR also considers multi-hop information from

the routing table. When a node i has a routing table entry for another node j (with

Page 159: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

131

a distance less than infinite), CoMANDR considers node i and j to be in contact.

This allows nodes to exploit multi-hop paths to determine contacts with other

nodes.

5.3.3 Results and Discussion

The results in Fig. 5.2 to Fig 5.4 demonstrate the message delivery ratio

of the protocols with varying network size, node’s speed and message lifetime.

Fig. 5.2 presents that the proposed work achieves high message delivery ratio

in both sparse and densely connected networks. In BRP, as relay nodes with

minimum average inter-contact time and maximum ego-centrality are selected,

messages are forwarded quickly to the destination due to more contacts of nodes.

The proposed protocol BRP also buffers messages during network disconnections

to increase the packet delivery ratio. Thus it delivers more messages even when

the network is sparse. The connectivity between the nodes increases with the

network size, BRP delivers more messages through the backbone nodes. Being an

extended PROPHET routing protocol with buffering scheme, CoMANDR achieves

high message delivery ratio than PROPHET. The epidemic approach of Adaptive-

Routing leads to high delivery ratio with more network overhead.

The results in Fig. 5.3 demonstrate that message delivery performance of

the protocols increases with the increasing speed. The probability of reaching the

destination is high when node’s speed is high. Thus the delivery ratio is increasing

with the increasing node speed. As the backbone nodes are selected with ego

centrality and inter-contact time of links, the possibility of delivering the packets

to destination is high in BRP than the other protocols. Due to more contacts during

high mobility, more messages are delivered than low mobility. The buffering

scheme of CoMANDR enables it to achieve high delivery ratio with increasing

Page 160: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

132

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

20 30 40 50 60 70 80 90

Me

ssage

De

live

ry R

atio

Number of Nodes

PROPHETAdaptive-Routing

CoMANDRBRP

Fig. 5.2: No. of Nodes vs Message Delivery Ratio

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

1 5 10 15 20 25

Messa

ge

Deliv

ery

Ra

tio

Max. Speed (m/s)

PROPHETAdaptive-Routing

CoMANDRBRP

Fig. 5.3: Mobility vs Message Delivery Ratio

Page 161: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

133

node’s speed. When the node’s speed is less, the probability of a node to reach the

destination is also less, thus both PROPHET and Adaptive-Routing achieve lower

delivery ratio. This is reverse when node’s speed is high.

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 100 200 300 400 500 600 700 800 900 1000 1100

Message

Deliv

ery

Ra

tio

Message lifetime(TTL) in seconds

PROPHETAdaptive-Routing

CoMANDRBRP

Fig. 5.4: Message Lifetime vs Message Delivery Ratio

The results in Fig. 5.4 illustrate that more messages are delivered with the

increasing message lifetime. As more messages are dropped with less lifetime,

all the protocols achieve less message delivery ratio. The BRP protocol uses few

nodes for relaying the messages, which results in less congestion, thus achieves the

highest delivery ratio. With buffering scheme, the CoMANDR protocol achieves

higher delivery ratio than Adaptive-Routing and PROPHET. When the message

lifetime is high (more than 700s), more messages are alive in the network due

to multiple copies created by both Adaptive-Routing and PROPHET. Due to high

message congestion, these two protocols achieve less delivery ratio compared to

BRP and CoMANDR.

Page 162: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

134

0

50

100

150

200

250

300

350

400

450

500

20 30 40 50 60 70 80 90

En

d-t

o-E

nd D

ela

y (

s)

Number of Nodes

PROPHETAdaptive-Routing

CoMANDRBRP

Fig. 5.5: No. of Nodes vs End-to-End Delay

Fig. 5.5 illustrates that the end-to-end delay of the four protocols increases

as the number of nodes increases in the network. The number of nodes in the

backbone is increasing with network density which leads to the increasing end-to-

end delay. The BRP achieves the lowest end-to-end delay because nodes with the

most centrality value are selected and fewer nodes participate in routing. End-

to-end delay of CoMANDR protocol is lesser compared to Adaptive-Routing

and PROPHET, because it buffers the messages. Both Adaptive-Routing and

PROPHET create multiple message copies, results in more congestion and longer

delays.

Fig. 5.6 shows the end-to-end delay of the protocols with respect to varying

node speed. The BRP protocol achieves the lowest end-to-end delay compared to

PROPHET and CoMANDR, because of message forwarding through short contact

links and single copy forwarding. The end-to-end delay of probability based

Page 163: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

135

protocols PROPHET and CoMANDR is longer because the message redundancy

would be serious as the messages are flooded in the network. The epidemic

approach of Adaptive-Routing forward the message throughout the network until

each node has a copy. The chances of meeting the destination are more with the

increasing node’s speed, thus Adaptive-Routing results in the lowest end-to-end

delay.

0

50

100

150

200

250

300

350

400

450

500

1 5 10 15 20 25

End-t

o-E

nd

Dela

y (

s)

Max. Speed (m/s)

PROPHETAdaptive-Routing

CoMANDRBRP

Fig. 5.6: Mobility vs End-to-End Delay

As the message lifetime increases, all protocols deliver more messages

to the destinations. Thus an end-to-end delay is increasing with the increasing

message lifetime as shown in Fig. 5.7. As expected, the epidemic and probability

based routing scheme leads to congestion, thus longer delays in Adaptive-Routing,

PROPHET and CoMANDR.

Fig. 5.8 to Fig. 5.10 show the average number of hops per message with

respect to varying network size, node’s speed and message lifetime. The results in

Page 164: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

136

0

50

100

150

200

250

300

350

400

450

500

0 100 200 300 400 500 600 700 800 900 1000 1100

En

d-t

o-E

nd D

ela

y (

s)

Message lifetime(TTL) in seconds

PROPHETAdaptive-Routing

CoMANDRBRP

Fig. 5.7: Message Lifetime vs End-to-End Delay

Fig. 5.8 show that the average number of hops achieved by BRP is the least due to

single copy forwarding through relay nodes. The multi-copy protocols Adaptive-

Routing and PROPHET have a higher hop count as they are able to deliver more

messages via long paths. The CoMANDR’s utility-based forwarding technique

finds more paths but it needs more hops.

Fig. 5.9 shows the average hop count of the protocols with varying node

speed. Frequent path breaks happen when the maximum speed is more than 10m/s.

Thus the end-to-end path breaks while the message is on its way to the destination,

which leads to the increasing average hop count. The average hop count of BRP

is the least when compared to PROPHET and CoMANDR, because the chances

of meeting the destination node is high with the increasing speed. The epidemic

approach of Adaptive-Routing protocol creates a copy of the message when it meets

new nodes. A node will have new neighbors when node’s speed is high. Thus it

Page 165: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

137

0

0.5

1

1.5

2

2.5

3

3.5

4

4.5

5

20 30 40 50 60 70 80 90

Ho

p C

oun

t

Number of Nodes

PROPHETAdaptive-Routing

CoMANDRBRP

Fig. 5.8: No. of Nodes vs Hop Count

1

1.25

1.5

1.75

2

2.25

2.5

2.75

3

3.25

3.5

3.75

4

1 5 10 15 20 25

Hop C

ount

Max. Speed (m/s)

PROPHETAdaptive-Routing

CoMANDRBRP

Fig. 5.9: Mobility vs Hop Count

Page 166: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

138

replicates the messages and the copies will reach the destination quickly when

the speed is high. Thus Adaptive-Routing protocol shows less hop count with the

increasing node’s speed.

1

1.25

1.5

1.75

2

2.25

2.5

2.75

3

3.25

3.5

3.75

4

0 100 200 300 400 500 600 700 800 900 1000 1100

Hop

Cou

nt

Message lifetime(TTL) in seconds

PROPHETAdaptive-Routing

CoMANDRBRP

Fig. 5.10: Message Lifetime vs Hop Count

The average hop count with varying message lifetime is shown in Fig. 5.10.

The number of messages alive in the network depends on its lifetime. When the

message lifetime is high, more messages are buffered or forwarded. As the message

congestion is more with the increasing lifetime, other protocols experience longer

hop count. The results show that BRP has the least hop count with relay nodes and

reduced overhead.

Fig. 5.11 to Fig. 5.13 show the total number of message forwards of nodes

against network density and maximum node’s speed. The results in Fig. 5.11 show

that BRP performs the best. The reduced number of forwarded messages is due

to the shorter paths through relay nodes found by BRP. The message forwarding

Page 167: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

139

0

200

400

600

800

1000

1200

1400

1600

1800

2000

20 30 40 50 60 70 80 90

No.o

f F

orw

ard

ed M

essag

es(p

kts

)

No. of Nodes

PROPHETAdaptive-Routing

CoMANDRBRP

Fig. 5.11: No. of Nodes vs No. of Forwarded Messages

is higher in Adaptive-Routing where the message continues to be forwarded

throughout the network until each node has a copy. The number of forwarded

messages by PROPHET and CoMANDR are lesser than Adaptive-Routing.

Fig. 5.12 shows the number of forwarded messages against node’s speed.

The BRP protocol achieves the least number of forwarded messages as it forwards

the messages through the short lived links. The epidemic and probability approach

based protocols create a copy of the message when it meets new nodes. A node

will have new neighbors when node’s speed is high. Thus the number of forwarded

messages by other protocols is higher than BRP with the increasing node’s speed.

The results in Fig. 5.13 demonstrate that the replication based protocols

PROPHET and Adaptive-Routing have higher number of forwarded messages

when message lifetime is increased. Due to single copy forwarding, the forwarded

messages are lesser in CoMANDR compared to Adaptive-Routing and PROPHET.

Page 168: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

140

0

50

100

150

200

250

300

350

400

450

500

1 5 10 15 20 25

No

. of

Fo

rward

ed

Me

ssag

es(p

kts

)

Max. Speed (m/s)

PROPHETAdaptive-Routing

CoMANDRBRP

Fig. 5.12: Mobility vs No. of Forwarded Messages

0

50

100

150

200

250

300

350

400

450

500

0 100 200 300 400 500 600 700 800 900 1000 1100

No.o

f F

orw

ard

ed M

essag

es(p

kts

)

Message lifetime(TTL) in seconds

PROPHETAdaptive-Routing

CoMANDRBRP

Fig. 5.13: Message Lifetime vs No. of Forwarded Messages

Page 169: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

141

Instead of allowing all nodes to do routing, BRP uses the backbone nodes. Thus

BRP achieves the lowest number of forwarded messages when compared to the

others.

0

20

40

60

80

100

120

140

160

180

200

1 3 5 7 9 11 13 15

No.o

f F

orw

ard

ed M

essag

es(p

kts

)

No. of Message/node

PROPHETAdaptive-Routing

CoMANDRBRP

Fig. 5.14: No. of Messages vs No. of Forwarded Messages

Fig. 5.14 illustrates the number of forwarded messages with the number

of messages. The number of forwarded messages is high in Adaptive-Routing as it

replicates the messages until each node gets a copy. The probability based protocols

PROPHET and CoMANDR have lesser forwards compared to Adaptive-Routing.

The proposed protocol BRP achieves the least number of forwarded messages as

the messages are forwarded to the destination within short duration.

5.4 CHAPTER SUMMARY

This chapter addresses the feasibility of using the ego centrality metric

and average inter-contact time between the nodes to select relays that serve

Page 170: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

142

as a backbone for routing. A localized algorithm is proposed to select an

efficient backbone. A routing protocol named BRP has been proposed for

mobile opportunistic network. In BRP, the selected backbone nodes forwards

a single copy or buffers the messages. The performance of BRP has been

verified through extensive simulations and compared with well known protocols

PROPHET, Adaptive-Routing and CoMANDR. The centrality and inter-contact

time based relay selection works well in most cases even if a minimum density of

nodes exist. BRP delivers more messages with well and intermittently connected

networks. The reduction of the number of relays involved in the path selection

results in minimum hop count and end-to-end-delay. The number of forwarded

messages of BRP is also minimum compared to other protocols due to single copy

transmission and relay based forwarding. The proposed protocol BRP achieves the

performance as like epidemic routing without redundantly forwarding the message.

In addition, BRP performs better when compared to PRoPHET, Adaptive-Routing

and CoMANDR.

Page 171: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

CHAPTER 6

DESIGN OF CONNECTED K−COVERAGE

TOPOLOGY CONTROL FOR AREA MONITORING IN

WIRELESS SENSOR NETWORKS

6.1 INTRODUCTION

WSN consists of large number of sensor nodes deployed to cover a

Field of Interest (FoI). The applications of WSN include monitoring, control and

surveillance. Each sensor node has a sensing radius within which it can sense data.

It has a communication radius within which it can communicate with another node.

Each of these nodes will collect raw data from the environment, do local processing

and communicate possibly with each other in a multi-hop fashion to transmit the

data to the sink. Coverage addresses on how well the sensor nodes cover the FoI.

Sensor nodes are prone to failure unexpectedly due to the interference and energy

depletion. Due to the severe resource limitations, coverage is the most fundamental

and challenging issue in WSN [68, 104, 199].

Coverage can be classified into area and point. The monitoring area is

fully covered by a set of sensor nodes in area coverage, whereas in point (target)

coverage, every point in the area is covered. Multiple coverage is needed for the

purpose of reliability in case of failure. In densely deployed sensor networks, it

will be useful to select a subset of sensor nodes to keep active at any given time

to conserve energy and prolonging the sensor network lifetime. The set of active

143

Page 172: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

144

nodes must be connected to transmit the data to the sink. It is desirable to have

several sensor nodes monitor the same area and let each sensor node report via

different routes to avoid losing an important event. Thus energy efficiency and

reliability are equally important design challenges in WSN [25, 54].

A CDS based topology control in WSNs is a kind of hierarchical method

to ensure sufficient coverage while reducing redundant connections in a relatively

crowded network. A CDS can preserve 1-coverage [9, 10, 184, 188]. However,

fault tolerant coverage is necessary in WSN because nodes prone to failure and

turn on or off frequently [19, 80]. Thus, it is important to maintain a certain

degree of redundancy in a CDS. This study proposes a k−coverage CDS, where the

k−coverage property takes care of fault-tolerance and robustness of dominatees,

which ensure that every dominatee has atleast k adjacent dominator neighbors.

6.1.1 CDS for Topology Control in WSN

Wightman et al. [167] proposed four topology contruction and maintenance

algorithms based on the received signal strength, named A3, A3Lite, A3Cov, and

A3CovLite. Rizvi et al.[129] proposed a CDS based topology control algorithm

named A1 which constructs an energy-efficient virtual backbone. The topology

construction phases of A1, uses fewer messages and it achieves good connectivity

under topology maintenance for better sensing coverage. J.A.Torkestani [156]

proposed a degree-constrained minimum-weight CDS (DCDS) construction

algorithm to improve the network coverage and lifetime. DCDS seeks for a set

of the most energetic connected sensor nodes whose maximum degree is bounded

by d (degree). Mahjoub et al. [100] constructed disjoint connected backbones using

graph coloring and localized rules for connected coverage. Rong-rong et al. [130]

developed a fault-tolerant topology control algorithm based on higher fault-tolerant

Page 173: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

145

degree. Each backbone node has backup nodes for promoting the energy efficiency

and fault-tolerant capability of the network.

6.2 k−Coverage Connected Dominating Set (k−CCDS)

As the applications of WSN are becoming more complicated, a CDS

can preserve only 1-coverage. Meanwhile, fault tolerance and robustness of

dominatees should also be considered. The k− coverage condition ensures that

every dominatee has k− dominator neighbors in the CDS. Therefore, a dominatee

node can be connected still with the CDS even if its k−1 dominator neighbors are

dead. This k−Coverage CDS provides multi-path redundancy for load balancing

and transmission error tolerance. A CDS constructed with these requirements is

called k−CCDS.

6.2.1 Network model and Problem Statement

A homogeneous WSN is assumed with N sensor nodes deployed randomly

to cover the monitoring area A. Each sensor node has an initial energy,

communication radius Rc and sensing radius Rs with Rs ≤ Rc. All the sensor nodes

have the same Rs and Rc. Each sensor node is capable of monitoring the events

within Rs distance and it communicates with other sensor nodes within Rc distance.

Once the sensor nodes are deployed, dominators are selected and the sensed data is

communicated to the Base Station(BS) through the dominating nodes.

Definition 6.1. Coverage and k−Coverage: Given a set of sensor nodes,

S={s1,s2, ...sn}, in a 2D area A, each sensor node si,(i = 1,2, ...n), is located at

coordinate (xi,yi) inside A. Any point x = (xi,yi) in A is said to be covered by si if

x ∈ A(si), and x is said be k−covered if x ∈ A(s j),( j = 1,2, ...k).

Page 174: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

146

Definition 6.2. k−Coverage Connected Dominating Set (k−CCDS): A graph

G(V,E) is said to be connected if each pair of vertices is connected by a path.

A set D ⊆ V is said to be k−Coverage set if every vertex in V\D is adjacent to

atleast k vertices in D. A set C ⊆ V is a k−Coverage Connected Dominating Set,

if the induced sub graph G(C,E ′) is connected. The set C is also a k−Coverage set

of G.

6.2.2 Weighted Coverage Cost Calculation

Each sensor node broadcasts an update packet with information about its

remaining energy to all its neighbors. In order to reduce packet collisions, the

nodes use random back-offs before sending the update packets. Upon receiving the

update packets from all its neighbors, a node calculates its weighted coverage cost

as follows. Let Etot(si) denotes the total energy of si from its sensing neighbors.

Esitot = ∑

∀x∈CR(si)

Exr , if Ex

r>Eth (6.1)

The Weighted Coverage Cost (WCC) of a sensor node si is

WCC(si) =

0, if Esir <Eth

Esir +Esi

tot , Otherwise

When WCC is calculated, sensor node with low remaining energy is

considered as overlapping sensor. This will cause the loss of coverage and it can

be avoided by preventing those sensor nodes that have remaining energy below a

certain threshold Eth (10% of Esiinit) from taking part in WCC calculation process.

Sensor node si compares the residual energy with the threshold energy. The

Page 175: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

147

coverage weight is set to 0, when the remaining energy of sensor node si falls below

the threshold energy Eth. Otherwise, the weight is set to sum of the remaining

energy of sensor node si and Etot(si). This WCC is communicated to its neighbors

through an update message.

Fig. 6.1 shows the coverage redundancy of a sample network with five

sensor nodes. An initial energy of 5J is assumed on each sensor node and the

remaining energy is given in parenthesis. Sensor node A has three overlapping

sensor nodes namely B, C and D. As the remaining energy of A is greater than Eth ,

the WCC of A is sum of the remaining energy of the overlapping sensor nodes and

its own remaining energy. Thus sensor node A has WCC 10. The WCC of all the

nodes is illustrated in Fig. 6.2.

ARs

Rc

A(4) B(3)

C(2)

D(1)

E(2)

Fig. 6.1: Sensor’s Radius and Coverage Redundancy

Page 176: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

148

WCCWCC(A) = 10

WCC(B) = 7

WCC(C) = 6

WCC(D) = 5

WCC(E) = 2

Fig. 6.2: Weighted Coverage Cost

6.2.3 Distributed k−CCDS Construction Algorithm

In densely deployed WSN, it is more practical to apply distributed

algorithms, by simultaneously executing the algorithm on all nodes. This

approach can conserve energy and a k−CCDS is formed faster compared to

centralized algorithms. This motivated to design a distributed algorithm for

constructing k−CCDS. The proposed algorithm begins with Maximal Independent

Set (MIS) construction, followed by connection phase. Any vertex outside of

the maximal independent set must be adjacent to some node in the set. The

MIS construction phase of k−CCDS algorithm produces a set which satisfies the

coverage requirement. The MIS is a dominating set of a graph G, but it is not

connected. The connection phase of the algorithm chooses the required number of

connectors (dominators) to make the set connected.

6.2.3.1 CDS Construction

A MIS is constructed first and minimum number of connectors are added to

make MIS, a CDS. Initially all nodes are in Non-MIS member (NMIS) state. After

completion of MIS phase, each node is in one of two states: MIS, or GATEWAY

(may become connector).

Page 177: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

149

Algorithm 6.1: DISTRIBUTED MIS CONSTRUCTION

1. if State(s) == MIS ‖ GAT EWAY then2. drop(Message)

3. if State(s) == NMIS then4. switch on Message do5. case CNM(1):

6. State(s)←− GAT EWAY

7. broadcast(CNM(0))

8. case UPDATE:

9. Reply(State(s), WCC(s))

10. case CNM(0):

11. broadcast(UPDATE)

12. set a timeout

13. if timer expires then14. if WCC(s) is highest among its neighbors then15. State(s)←−MIS

16. broadcast(CNM(1))

17. else18. if received CNM(1) Message then19. State(s)←− GAT EWAY

20. broadcast(CNM(0))

21.

Page 178: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

150

There are two types of messages in MIS construction phase: Color

Notification Message (CNM) and UPDATE. The CNM message indicates the state

of a node. CNM(1) is sent out when a node becomes a MIS node and CNM(0) is

sent out when a node becomes a GATEWAY. The UPDATE message is used when

a node inquires the weight and state of its neighbors. CNM(2) and CNM(3) are

used by DOMINATOR and DOMINATEE nodes respectively.

First, the sink node changes its state to MIS and it broadcasts the CNM(1)

message. The MIS construction procedure is explained in Algorithm 6.1. A node

in NMIS state changes its state to GATEWAY, when a CNM(1) message is received

(lines 3 to 7). This node may become connector to form connected dominating set.

When a CNM(0) message is received by the node in NMIS state, it changes to MIS

if it has the highest coverage weight among its one-hop neighbors (lines 10 to 20).

Algorithm 6.2, explains the selection of connectors to form CDS. Each

GATEWAY node maintains a list of its MIS neighbors and it begins the connection

phase when all its neighbors become MIS or GATEWAY. A MIS node starts the

connection phase by entering the MIS-Transition, when all its neighbors are in

GATEWAY state.

During the connection phase, a node broadcasts a DOMINATOR message

when it becomes the member of CDS (lines 4 to 14). Assume that all messages are

delivered in order. Nodes in MIS-Transition state select the connectors. A node in

this state, sets up a timeout. When it receives a DOMINATOR message during the

timeout, it stops the timeout because one of its neighbor becomes CONNECTOR.

Otherwise, the node will choose the neighbor with the best weight and sends the

CONNECT message.

Page 179: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

151

Algorithm 6.2: DISTRIBUTED CDS CONSTRUCTION

1. switch on State(si) do

2. case DOMINATOR:

3. drop(message)

4. case MIS-Transition

5. set a timeout

6. if timeout expires then

7. Let x ∈ Nsi1 has the highest WCC

8. send CONNECT message to x

9. State(s)←− DOMINATOR

10. broadcast(CNM(2))

11. else

12. if received CNM(2) message then

13. State(s)←− DOMINTOR

14. broadcast(CNM(2))

15. case NMIS-Transition

16. broadcast(UPDATE)

17. if Received CONNECT Message then

18. if ∃x ∈ Nsi1 |State(x) == DOMINATOR then

19. State(s)←− DOMINATOR

20. broadcast(CNM(2))

21. if Received CNM(2) Message then

22. State(s)←− DOMINAT EE

23. broadcast(CNM(3))

24.

Page 180: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

152

A GATEWAY node, after receiving GATEWAY and MIS messages from

all its neighbors, begins the connection phase by entering into NMIS-Transition

(lines 15 to 22). This node may receive three types of messages: DOMINATOR,

CONNECT and DOMINATEE. It ignores the DOMINATEE message. As

mentioned in Kim et al. [81], a GATEWAY is also allowed to receive the

CONNECT message and to change the state to DOMINATOR.

6.2.3.2 k−CCDS Construction

A k−CCDS algorithm consists of two phases:

1. Phase I:1-Coverage CDS Construction. Construct a CDS C of G by using

Algorithm 6.1 and 6.2. All nodes in C are DOMINATOR.

2. Phase II: k−Coverage CDS Construction. Construct k - 1 disjoint MISs

{M2, ...,Mk} of G\C using Algorithm 6.1. These k - 1 disjoint MISs are

added to the CDS C, to form k−CCDS.

6.3 SIMULATION STUDY

6.3.1 Simulation Parameters

To evaluate the performance of k-CCDS, simulations are conducted using

Atarraya Simulator [168]. It is designed specifically for the evaluation of topology

control protocols in WSN. All the simulations assumed that the nodes are deployed

randomly on a 2D plane. The nodes can communicate with each other using full

duplex wireless radio that conform to 802.15.4 wireless standard. The simulation

Page 181: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

153

setup is presented in Table 6.1. The reported results are averaged over 100

simulation runs with 95% of confidence interval.

Table 6.1: k−CCDS Simulation Parameters

Parameter Value

Deployment Area 200m x 200m

Node Distribution Random

Number of Sensors 100 to 400 (default:200)

Communication Range 40m to 70m (default:40m)

Initial Energy 1J

Transmitter/Receiver Circuit( Eelec ) 50 x 10−9 J/bit

Transmit Amplifier( εamp) 100 x 10−12 J/bit/m2

No.of trails 100

Data packet size 100 bytes

Control packet size 25 bytes

The following performance metrics have been used to validate the performance of

the k−CCDS protocol.

- Average CDS Size: This metric is defined as the average number of nodes

that are activated to cover the monitoring area (number of dominators in the

CDS).

- Lifetime of the CDS: It is defined as the average period of time during which

the set of active sensors remain connected.

- Number of Uncovered Nodes: It refers to the number of nodes, which are not

covered by at least one active node at the end of the simulation.

Page 182: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

154

- Residual Energy: It is the average remaining energy of the sensor nodes at

the end of simulation round.

- Coverage Area: It is the percentage of covered area against the total

deployment area.

- Convergence Time: It measures the time taken for the execution of a protocol

to construct a CDS.

6.3.2 Protocols used for comparison

Wightman et al. [167] have proposed four topology construction and

maintenance algorithms named A3, A3Lite, A3Cov, and A3CovLite. In A3,

authors assume that the sensor nodes have no information about the position and

the distance is estimated based on the received signal strength. The residual energy

of the child node and its distance from the parent are two metrics that A3 uses

to construct CDS. A3 uses four messages for topology construction. They have

proposed the A3Lite with two messages. A3Cov and A3CovLite are combination

of A3 and coverage problem. A3Cov first checks whether an unconnected node

is sensing-covered by another active node. If so, the node is sent directly to the

sleeping mode. A3CovLite is a combination of A3Lite and A3Cov.

6.3.3 Results and Discussion

The coverage and connectivity requirements need minimum number of

dominating nodes. Fig. 6.3. shows the size of CDS against the total number of

network nodes. The A3Cov algorithm uses a selection metric giving priority to the

farther nodes from the parent having higher energy level. It also uses extra nodes

Page 183: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

155

to increase the coverage area. In k−CCDS, the number of dominating nodes is

controlled by k parameter. Larger value of k increases the number of active nodes

and smaller value of k leads to smaller CDS.

0

10

20

30

40

50

60

70

80

90

100

50 100 150 200 250 300 350 400 450

Avera

ge C

DS

Siz

e

No.of Nodes

A3Cov1-CCDS2-CCDS

Fig. 6.3: No. of Nodes vs Average CDS Size

The results imply that the CDS size gets bigger when the network density

increases. This is because when the network density increases, the number of

neighbors of each node increases as well. Thus the CDS size needs to be larger

to dominate all nodes in a network. As revealed by Fig. 6.3., k−CCDS still

outperforms A3Cov. Specifically, the CDS size obtained from k−CCDS is less

than that of A3Cov.

Simulations were also conducted to compare the performance of the

algorithms when changing the communication or sensing range ( Rc = 2.Rs) as

well as to see how it affects the size of the resulting CDS. In this simulation, 100

nodes were randomly deployed into a fixed area of size 200m x 200m. Fig. 6.4.,

Page 184: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

156

0

5

10

15

20

25

30

35

40

45

50

35 40 45 50 55 60 65 70 75

Avera

ge C

DS

Siz

e

Communication Range (m)

A3Cov2-CCDS

Fig. 6.4: Communication Range vs Average CDS size

illustrates that the CDS size decreases as the range increases. It is due to the fact

that the larger the range is, more nodes can communicate.

The performances of the algorithms are evaluated in terms of CDS lifetime.

N nodes were randomly distributed in a 200m x 200m region. The communication

range was set to 40m. The number of nodes varied from 100 to 400. Fig. 6.5.,

reveals that CDS life time in k−CCDS is much longer than A3Cov and the lifetime

reduces as the network size increases in both algorithms. As CDS size grows

with increasing network size, more nodes are active and energy depletion occurs

frequently. The proposed algorithm k−CCDS provides the longer lifetime because

k−CCDS uses the coverage cost to activate the nodes with the maximum coverage

weight. A3Cov adds extra nodes to increase the coverage area without selection

metric. Thus, the CDS lifetime in A3Cov is less than k−CCDS.

The number of uncovered nodes at the end of simulation time 18000s with

Page 185: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

157

100

200

300

400

500

600

700

800

900

1000

1100

50 100 150 200 250 300 350 400 450

Life

tim

e o

f C

DS

(sec)

No.of Nodes

A3Cov2-CCDS

Fig. 6.5: No. of Nodes vs CDS Lifetime

0

20

40

60

80

100

120

50 100 150 200 250 300 350 400 450

Ave

rage N

o. of U

ncove

red

Nod

es

Number of Nodes

A3Cov2-CCDS

Fig. 6.6: No. of Nodes vs Uncovered Nodes

Page 186: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

158

increasing network is presented in Fig. 6.6. The results reveal that the number

of uncovered nodes increases as the network size gets bigger. In comparison,

k−CCDS results in less number of uncovered nodes due to the reason that it forms a

CDS with more connected nodes covering the area much better than A3Cov. Also,

k−CCDS never includes node with energy less than Eth. As additional nodes are

added without any selection metric in A3Cov to increase the coverage, the energy

depletion occurs more frequently.

0

10

20

30

40

50

60

70

80

90

100

50 100 150 200 250 300 350 400 450

Re

sid

ual E

nerg

y (

%)

No.of Nodes

A3Cov2-CCDS

Fig. 6.7: No. of Nodes vs Residual Energy

Fig. 6.7. presents the residual energy of the network at the end of

simulation for 7200s with increasing network size. The result shows that the

average residual energy of the network with k−CCDS is higher than the other

approaches. The reason is that the proposed method reduces the number of nodes

covering the same points of the area based on the energy threshold Eth. The

k−CCDS approach never activates a node with energy less than Eth. Thus, this

Page 187: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

159

approach avoids the rapid exhaustion of the active sensors. The result also reveals

that A3Cov has lowest residual energy because nodes farther from the parent are

activated to minimize the number of dominating nodes. This causes a non-uniform

distribution of the overhead and places heavy load on the active nodes. Therefore,

nodes exhaust energy rapidly in A3Cov and reconstruction of backbone occurs

frequently when nodes use 90% of its energy.

0

10

20

30

40

50

60

70

80

90

100

50 100 150 200 250 300 350 400 450

Covere

d A

rea (

%)

No.of Nodes

A3Cov2-CCDS

Fig. 6.8: No. of Nodes vs Coverage Area

The k−CCDS protocol requires fewer dominating nodes than A3Cov,

hence less energy is used in the network at a given moment. Also, it selects as

dominators those with more coverage weight, so they will not die immediately

after being selected. The coverage ratio is presented with varying network size

in Fig. 6.8. It shows that, k−CCDS and A3Cov provide less coverage when the

network is sparse. As nodes with more sensing neighbors are added in k−CCDS,

it is able to provide more coverage than A3Cov.

Page 188: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

160

100

150

200

250

300

350

400

450

500

0 50 100 150 200 250 300 350 400

Con

verg

en

ce T

ime (

se

c)

No.of Nodes

A3Cov2-CCDS

Fig. 6.9: No. of Nodes vs Convergence Time

Fig. 6.9 presents the convergence time with respect to the network density

for the two algorithms. A node in dense networks is likely to have more neighbors.

A3Cov takes longer time to form CDS than k−CCDS. This is due to more time for

processing the neighbor information and informing the details to all its neighbors.

It is clear that k−CCDS creates CDS faster than A3Cov as the outcome of MIS

construction is faster than tree construction.

Fig. 6.10 shows the convergence time of the two algorithms with increasing

communication range. The number of neighbors of a node increases when

communication range increases. As stated earlier A3Cov communicates its

neighbor details to all its neighbors. Due to the increased neighbors, the processing

time of neighbor details is increased for A3Cov. This leads to overall increase in

the execution time of A3Cov algorithm. In k−CCDS, a node decide its state with

WCC. Hence, less convergence time in k−CCDS.

Page 189: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

161

100

110

120

130

140

150

160

170

180

190

200

35 40 45 50 55 60 65 70 75

Con

verg

en

ce T

ime (

se

c)

Communication Range (meters)

A3Cov2-CCDS

Fig. 6.10: Communication Range vs Convergence Time

6.4 CHAPTER SUMMARY

This chapter investigates the application of connected dominating set for

topology control in WSN. Topology control mechanisms build reduced topology

using CDS, to select number of active nodes. Those nodes which are not part of

CDS can go to sleep state. The constructed CDS can provide only 1-coverage (i.e.,

every sleep is covered by at least one active node). In this chapter, a k−Coverage

topology control problem for connected area coverage is addressed. In this

problem, the area of sleep node is covered by atleast k sensor nodes. A weight based

coverage cost metric named Weighted Coverage Cost (WCC) has been introduced.

A node calculates its WCC based on its energy and the energy of its sensing

neighbors. A distributed algorithm is developed for k−CCDS construction, where

the nodes are selected based on weight. The performance of the proposed work is

also compared with the recent coverage protocol A3Cov with varying network size

Page 190: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

162

and communication range. As nodes with more WCC is added in k−CCDS, it can

provide a topology control with fewer nodes using fewer resources. It is observed

from the results that, the CDS size grows with increased network. The results

also demonstrate that the lifetime of CDS is longer than A3Cov which results in

more residual energy in the network and less number of uncovered nodes. It is

also observed that the convergence time of k−CCDS is lesser than A3Cov with

increasing neighbors and network density. As a future extension, a k−connected

k−coverage topology control can be developed for mobile sensor networks.

Page 191: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

CHAPTER 7

DESIGN OF CONNECTED DOMINATING SET BASED

ENERGY EFFICIENT PRESSURE AWARE ROUTING

FOR UNDERWATER ACOUSTIC SENSOR

NETWORKS

7.1 INTRODUCTION

UnderWater Acoustic Sensor Networks (UWASN) consists of sensors

that are deployed to perform collaborative monitoring tasks over a given area

[4, 146, 179]. UWASN can be used in a wide spectrum of aquatic applications,

such as oceanographic data collection, pollution monitoring, offshore exploration,

disaster prevention and coastline surveillance [3]. UWASN shares many properties

with terrestrial sensor networks such as the large number of nodes and energy

issues, still these are different in many aspects from terrestrial sensor technology.

Communications in UWASN have to be done through acoustic channels, because

electromagnetic radio signals attenuate quickly in water. The speed of sound in

water is five-order slower than the speed of light, which brings long propagation

and end-to-end delay. The bandwidth of an acoustic channel is low and the error

rate is high. Most underwater sensor nodes, except some fixed nodes equipped on

surface level buoys have low or medium mobility (move up to 1-3 m/sec) owing to

water currents and other underwater activities [2, 63].

163

Page 192: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

164

Routing is a challenging task in UWASN with energy constraint and sudden

topology changes due to some node failures. Several routing protocols have

been proposed for underwater sensor networks. A review of underwater routing

protocols is presented in [14, 53, 119, 120]. These protocols are classified into:

location based [110, 180, 188], pressure (depth) based [13, 111, 183]. The location

based protocols require full-dimensional location information. This is difficult

to get since localization in UWASN is another challenging research issue. The

pressure based protocols use depth information which can be obtained easily with

a depth sensor. In comparison, obtaining full-dimensional location information is

more difficult than depth. These routing protocols flood the packets to the sink

with geographic information, which leads to more energy consumption. Energy

efficiency becomes more critical and challenging in UWASN because of the much

higher transmission and receiving power consumption of acoustic channel. So, an

energy efficient routing algorithm is to be provided for underwater communication.

Ant Colony Optimization (ACO) [43, 44] is a population-based meta-

heuristic approach using the intelligent foraging behavior of ants, which has been

applied to NP-hard combinatorial optimization problems successfully like Subset

Selection, Traveling Salesman, Vertex Cover Problem, Minimum Spanning Tree

and Connected Dominating Set [64, 75, 76, 121, 122, 154, 195]. In ACO, artificial

ants walk the graph, to find a solution to the problem. The behavior of the ants

is inspired by that of real ants: they deposit pheromone on the path in a quantity

proportional to the quality of the solution represented by that path. The ants choose

probabilistically the paths with strong pheromone concentration. This indirect form

of communication, known as stigmergy, intensifies the search around the most

promising parts of the search space. On the other hand, there is also a degree

of pheromone evaporation, which allows to diversifying the search to new and

Page 193: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

165

hopefully more successful areas of the search space.

This chapter proposes an energy efficient pressure (depth) aware routing

protocol named Connected Dominating Set based Energy-Efficient Pressure-Aware

Routing Protocol (CDS-EPRP), for UWASN. In CDS-EPRP, CDS concept is

adapted for maintaining connectivity among the sensor nodes and surface sink.

CDS has been used for many applications such as routing [46, 61, 62, 65, 83,

87, 127, 156] and topology control [15, 129] in WSN. A review of applications

of CDS can be found in [190]. Recently, a CDS based coverage protocol has

been proposed by Senel et al. [137], for guaranteed connectivity in UWASN. They

applied heuristics for CDS construction and the depths of dominating nodes are

adjusted to give minimal overlap among the sensors and to provide the full coverage

and connectivity. The proposed CDS-EPRP selects CDS based on node’s energy

using an ACO technique. These selected CDS form a backbone for routing. When

a sensor node wants to communicate an information to surface sink, it uses these

CDS nodes. The pressure of these CDS nodes are used during the forwarding of

packet.

7.1.1 Energy Efficient Routing in UWASN

Modified Energy Weight Routing (MEWR) proposed by Zhang et al. [196],

is a low flooding routing protocol for delay sensitive UWASN. This protocol

consists of two phases. In the first phase, the senders discover their neighbor nodes.

In the second phase, the senders select part of their neighbors as the intermediate

nodes and flood the packets to the intermediate nodes. They formulated a mixed

metric based on energy consumption and delay, to evaluate the cost of link. An

energy-efficient protocol based on estimating quality of link is proposed by Zhao

et al. [197], considering both node’s residual energy and link quality. This protocol

Page 194: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

166

chose forwarding nodes by node’s residual energy, position and transmission

quality of link. QELAR proposed by Hu et al. [67] is an adaptive, energy-

efficient and lifetime-aware routing protocol based on reinforcement learning.

They suggested that the residual energy of sensor nodes and the energy distribution

among a group of nodes during the calculation of reward function will extend the

network lifetime.

Gopi et al. [55] proposed an Energy optimized Path Unaware Layered

Routing Protocol (E-PULRP) where sensor nodes report events to a stationary

sink node using on the fly routing. E-PULRP consists of two phases: layering

phase and communication phase. In the layering phase, nodes occupy different

layers in the form of concentric shells, around a sink node. The layer widths and

transmission energy of nodes in each layer are chosen taking into consideration the

probability of successful packet transmission and minimization of overall energy

expenditure in packet transmission. During the communication phase, intermediate

relay nodes are selected on the fly, for delivering packets from the source node to

sink node. Huang et al. [68] proposed a power-efficient routing protocol where

a forwarding node selector is employed to determine the appropriate sensors

to forward the packets to the destination. A fuzzy-logic based forwarding tree

trimming mechanism is adopted to prevent excess spread of forwarded packets. A

routing schemes developed by Zorzi et al. [200], considered both the propagation

delay and energy consumption to select the forwarding nodes in UWASN.

Page 195: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

167

7.2 CDS BASED ENERGY-EFFICIENT PRESSURE-AWAREROUTING PROTOCOL (CDS-EPRP)

Because the replenishment of batteries in underwater environment might

be impossible, an energy-efficient routing scheme is needed for UWASN. When a

sensor wants to send a packet to the sink, a multi-hop path should be determined to

minimize the packet energy consumption during the packet relay. In this chapter,

an energy-efficient routing named CDS-based Energy-Efficient Pressure-Aware

Routing Protocol (CDS-EPRP) is proposed, which provides a minimum energy

routing path.

Fig. 7.1: CDS-EPRP for UWASN

The proposed protocol CDS-EPRP first marks subset of network nodes

called CDS as forwarders set, next a multi-hop path is established through these

CDS nodes. The proposed protocol also applies a connectivity maintenance

mechanism for the CDS, to adapt to changing network topology due to water

current. The working of CDS-EPRP is illustrated in Fig. 7.1.

Page 196: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

168

Every node in UWASN has a flag to indicate its dominating status and

it is set to false initially. Every nodes communicate its depth value to their

neighbors. Each node u calculates the feasible neighborhood Nuf by comparing

depth difference with depth threshold dth. The CDS construction phase of CDS-

EPRP selects 10 nodes randomly, each node sends an ant packet and these ants

perform a random walk over the network. As it walks, selects dominating node

from the feasible neighborhood. In the proposed approach, pheromone is updated

once at the end of each iteration, when all ants have constructed their dominating

sets. The ant that constructed the best solution of the iteration updates the

pheromone trails on the nodes. The dominating flag of those nodes is set to true.

The pheromone is decreased for nodes which are not part of CDS. All dominating

nodes will inform the status to their neighbors. A non-dominating node is called

as dominatee node. An ACO based CDS formation is explained in section 7.2.2.

Section 7.2.3.1 explains the data packet forwarding through multi-hop path. The

connectivity maintenance of CDS is described in section 7.2.3.2.

7.2.1 Network model and Problem Statement

In UWASN, the sensor nodes are deployed at different depth levels. The

deployment of UWASN can be either 2-D or 3-D. In 3-D UWASN, the surface

sinks are equipped with radio and acoustic modems, where radio frequency (RF)

modems will be used to communicate with each other and to communicate with

the final on-shore station, while acoustic modems are used to communicate with

the sensor nodes. In horizontal directions, these sensor nodes can move freely

with water currents (1 - 3m/s) but vertically a node may have small variations,

which are negligible [110]. A homogeneous UWASN is assumed with N sensor

nodes deployed randomly to cover the monitoring area. Each underwater sensor

Page 197: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

169

node u has an initial energy Euinit , communication radius Rc and sensing radius

Rs with Rs ≤ Rc. All the sensor nodes have the same Rs and Rc. Each sensor

node is capable of monitoring the events within Rs distance and it communicates

with other sensor nodes within Rc distance. The CDS-EPRP protocol is based on

multi-sink architecture, which not only helpful for increasing the delivery ratios but

also increases the network life by decreasing the energy consumption of the sensor

nodes around the sink. Furthermore, CDS-EPRP assumes that each underwater

sensor node knows its depth information, which is the vertical distance from itself

to the water surface. In practice, this information can be easily obtained with an

inexpensive depth sensor that can be equipped with each sensor node.

A 3-D underwater acoustic sensor network can be represented as a graph

G(V,E), where V = {v1,v2, ...vN} is a finite set of sensor nodes deployed in 3-D

space, with N = |V |, and E is the set of communication links among the nodes.

A communication link exists between vi and v j (i.e., (vi,v j) ∈ E ) if nodes vi

and v j are within the each other’s communication range (Rc). Let S be the set

of traffic sources. This set represents the sensor nodes that sense information in the

underwater environment and communicate the information to the surface sink.

Definition 7.1. Maximum Energy Minimum CDS (MEMCDS) : Given an

undirected graph G = (V,E) with node energy weight function W : V → R+,

MEMCDS problem is to find a minimum size CDS among the CDSs with

maximum total energy weight.

7.2.2 ACO based CDS Construction

In the proposed algorithm, each node has an initial pheromone value of τ0.

This pheromone is evaporated with time based on the pheromone persistence rate,

Page 198: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

170

0 ≤ ρ ≤ 1. If the pheromone value falls below a pheromone-threshold τmin, the

value is set is τmin. The state transition rule for an ant is based on the pheromone

value and a heuristic component which is based on energy of uncovered nodes. In

order to construct CDS by an ant, at each step, an ant k selects the next node. The

probability pkj of selecting j by an ant k at node i is as follows.

pkj =

[τ j]α [η j]

β

j∈Nif

[τ j]α [η j]β(7.1)

where pkj is the probability of selecting the next hop node j by an ant k. τ j denotes

the pheromone value of node j. η j is the energy weight of node j. It is calculated

as follows

η j =E j

rm

E jinit

(7.2)

α and β are the parameters used to control the relative weight of pheromone trail

and heuristic functions respectively. Nif is the feasible neighborhood of node i.

Nif is the set of neighbors of i whose depth difference is greater than the depth

threshold dth. It also excludes nodes already visited in the partial tour of ant k and

it may be further restricted to a candidate set of next hop neighbor of a node i.

The pheromone update rule plays an important role and it is used to increase

the pheromone values on the solution components. In the proposed approach,

pheromone is updated once at the end of each iteration, when all ants have

constructed their dominating sets. The ant that constructed the best solution of

the iteration updates the pheromone trails on the nodes in the following way.

τi = ρτi +∆τibi (7.3)

where ρ is the persistence rate and ∆τ ibi is the amount of reinforcement on the node

Page 199: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

171

i due to iteration best solution Sib. |Sib| is the number of nodes in the iteration best

solution. ∆τ ibi is computed using the following expression

∆τibi =

0, if i /∈ Sib

1|Sib| , if i ∈ Sib

(7.4)

As the pheromone evaporation takes place on all nodes in the network at a fixed

rate, the dominating nodes of iteration best solution Sib receive reinforcement. If

the pheromone value of any node reduces below a minimum pheromone value, τmin,

the pheromone value is set to τmin to ensure that this node has a small probability

of getting selected. There is no maximum value on the pheromone.

The pseudo-code for CDS construction is explained in Algorithm 7.1. The main

idea of the algorithm is as follows: At first, pheromone, solution space and

dominating set are initialized (lines 1 to 3). Then, an ant constructs the CDS

according to equation 7.1 (lines 4 to 10). Next, the best solution of the iteration

is selected (lines 11 to 13). Finally, the pheromone update according to equation

7.3 is done (line 15).

7.2.3 Routing in CDS-EPRP

7.2.3.1 Data Packet forwarding

Once the CDS of the network is computed, data forwarding can be done

through these nodes. CDS-EPRP is an on-demand routing protocol. Neither path

maintenance nor recovery is required in CDS-EPRP. In order to save energy, the

data forwarding will use multi-hop relay. In the multi-hop relay, the packets are

routed from source sensor node to the surface sink through the dominating nodes.

Page 200: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

172

Algorithm 7.1: ACO for Connected Dominating Set Construction

1. Initialize pheromone value (τ0) on each node

2. f =|V |3. D = φ

4. foreach i← 1 to Na do5. S = φ

6. while S 6= CDS do7. Calculate pk

j as in equation (7.1)

8. j = argmax{pkj}

9. S = S∪ j

10. coverNeighbors(G, j)

11. if | S | < f then12. f = | S |13. D = S

14. Update the pheromone for D using equation (7.3)

Each node maintains a list of its dominating nodes. Every node knows the depth of

their neighbors. Data packet forwarding is explained in Algorithm 7.2. Because the

sinks are located above the water, the packet should be routed to a dominating node

with a smaller depth. A node calculates the depth difference with its dominating

neighbors whose depth is smaller than the node’s depth (lines 1 to 3). Then, it

chooses a dominating node with minimum difference as its next-hop (lines 4 to 6).

In this way, the packet is routed until it reaches one of the surface sinks.

7.2.3.2 Connectivity Maintenance of CDS

As the dominating nodes are playing a key role in data forwarding, the

connectivity among the dominating nodes should be maintained. The connectivity

Page 201: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

173

Algorithm 7.2: Next-Hop Determination for Data PacketsInput: Node ′i′ receives a data packet ′p′

Output: Sending of p to next-Hop

1. foreach j ∈ NiD do

2. if d j < di then3. Calculate d p(i, j)

4. Choose j = argmin j∈NiD

d p(i, j)

5. next−Hop = j

6. send(p,next−Hop)

Algorithm 7.3: Connectivity Maintenance of CDS

1. NuD← neighborDominatorsOf(u)

2. NuE ← neighborDominateesOf(u)

3. Nu1 ← Nu

D∪NuE

4. if (isDominating(u) == true) and (Eurm < Eth) then

5. Communicate the Nu1 list to it neighbors

6. foreach i, j ∈ NuD do

7. if (NiD == φ ) and ( (N j

D == φ ) then8. x = argmaxx∈(Ni

1∩N j1)∧[(d p(x,i)>dth)∨(d p(x,i)>dth)]

Exrm

9. dominating(x)← true

10. if (RSSud > Rs) then

11. if (NuD == φ) and (Nu

1 6= φ ) then12. x = argmaxx∈Nu

1∧(d p(x,u)>dth)Exrm

13. dominating(x)← true

14. if (isDominating(u) == true then15. dominating(x)← f alse

Page 202: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

174

maintenance algorithm should preserve the CDS structure as much as possible

even when the nodes are moving around and the topology is changing slowly.

In UWASN the mobility is very little or a few nodes fail due to low power, the

computation of the CDS for whole network will waste energy and it is better

to use an incremental approach. In order to maintain connectivity, dominatee-

dominator and dominator-dominator edges have to be preserved. The connectivity

maintenance is given in Algorithm 7.3. When the remaining energy of dominating

node is below Eth (20% of Euinit), it sends neighbor list to all its neighbors, so that

they can get attached with the next best dominating nodes (lines 4 to 9). Each node

upon receiving beacon packets, measures the distance ( RSSd ) based on received

signal strength as in [66]. When the distance is greater than sensing radius (Rs),

sensor nodes make a decision. A sensor node may change it’s dominating status to

false or selects a neighbor with more energy based on the depth threshold (lines 10

to 15).

7.3 SIMULATION STUDY

7.3.1 Simulation Parameters

In this section, the simulation results of proposed routing protocol CDS-

EPRP are presented with an underwater sensor network simulation package Aqua-

sim [182], which is extended on the network simulator-NS2. In the simulations,

sensor nodes are deployed randomly in a 800m x 800m x 500m 3-D area. The

transmission range was set to 100m and 8 surface sinks were deployed at a distance

of 100m. The mobility due to water current was set to 1-3m/s and vertical

movements are not considered during the simulation. Any node in the network can

generate data packet and it is selected randomly. For ACO, the parameters were set

Page 203: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

175

to: Na = 10, α = 1 , β = 1, ρ = 0.97, and τmin = 0.005. The initial pheromone was

set to τ0 = 10. The width was set to 100m for VBF. The simulation parameters are

listed in Table 7.1. The reported results are averaged over 100 simulation runs with

95% of confidence interval.

Table 7.1: CDS-EPRP Simulation Parameters

Parameters Value

Area Size 800m x 800m x 500m

Simulation Time 1000s

Traffic Type Constant Bit Rate(CBR)

Number of Traffic Sources 1 to 10 ( default:5)

Packet Size 50 bytes

Transmission Range 100m

Number of Nodes 200 to 500 (default:400)

Mobility Model Random-walk Mobility

Maximum Speed 3m/s (default:1m/s)

Transmission Power 2 W

Reception Power 0.1 W

Idle Power 10mW

The following metrics have been used to evaluate the performance of

routing protocols.

- Packet Delivery Ratio (PDR): It is the ratio of the number of data packets

received successfully at the sinks to the total number of packets generated by

the source nodes.

Page 204: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

176

- Average End-to-end Delay: It represents the average time for a data packet to

travel from the source node to any one of the surface sinks.

- Total Energy Consumption: It is the total energy consumed for packet

delivery, including transmitting, receiving, and idling energy consumption

of all nodes in the network during the simulation.

7.3.2 Protocols used for comparison

Vector-based-forwarding (VBF) proposed by Xie et al. [180], is a

geographic routing approach where each packet carries the position information

of source, sink and intermediate forwarders. Sensor nodes forward the packets by

broadcasting them to nodes residing in a constrained ’pipe’ of given width in the

direction of the sink. On receiving a packet, each node calculates its own position

based on the location of the predecessor node embedded in the packet and the

angle of arrival of signal. Only the sensor nodes that fall in a routing pipe, centered

around the source-sink vector are eligible for forwarding. The efficiency of the

protocol depends on the critical determination of the radius of the pipe: If the

radius is too small, few or no relays can be found in the pipe; if it is too large, too

many nodes might receive the packet, whose retransmission increases interference,

overhead, and duplicate packets.

Depth-based-routing (DBR) proposed by Yan et al. [183], is a geographic

routing protocol, where each nodes knows the depth to the surface sink using

pressure sensors. On receiving a data packet, each node forwards it only if its

depth is less than that of the sender. Before forwarding the data packet, each node

calculates holding time for a packet that depends on the difference between its own

depth and that of the sender. In particular, the larger the depth, the smaller the

Page 205: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

177

holding time, so that nodes that are closer to the surface sink are the first to forward

the data packet. While holding, a node if it overhears that the packet that it is about

to broadcast is transmitted by another node, then it drops the packet.

7.3.3 Results and Discussion

The parameter dth determines the feasible neighborhood of nodes. The

dominating nodes were selected based on energy weight from the feasible

neighborhood. The number of dominating nodes (size) selected by ACO based

CDS is plotted in Fig. 7.2. The communication radius (Rc)and sensing radius (Rs)

were set to 100m and 70m respectively. So, the dth is set to a value larger than Rs.

The network size was varied from 70m to 100m. The results show that the larger

dth, the smaller the size. This is due to increasing feasible neighborhood with larger

dth and the increasing number of dominatees of a dominating node. Thus reduction

in the number of dominating nodes.

As CDS-EPRP is based on multi-sink architecture, the performance of

CDS-EPRP was compared by varying the number of sinks. The packet delivery

ratio CDS-EPRP is plotted in Fig. 7.3. CDS-EPRP involves the dominating nodes

for forwarding the data packets and the packet delivery ratio increases with the

increasing number of sinks. The packets will be dropped due to congestion with

only one sink. The packet delivery ratio is high with multi-sink, as packets can

follow different paths to reach any one of the sinks. When the network is sparse

( number of sensors less than 250) CDS-EPRP delivers less packets than denser

networks, because the CDS maintenance is required frequently for nodes in sparse

network.

Page 206: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

178

50

100

150

200

250

300

150 200 250 300 350 400 450 500 550

No

. of D

om

inatin

g N

ode

s

Number of Nodes

dth=100dth=90dth=80dth=70

Fig. 7.2: No. of Nodes vs No. of Dominating Nodes with dth

0

10

20

30

40

50

60

70

80

90

100

150 200 250 300 350 400 450 500 550

Packet D

eliv

ery

Ratio (

%)

Number of Nodes

No. of Sink=1No. of Sink=4No. of Sink=8

Fig. 7.3: No. of Nodes vs Packet Delivery Ratio with varying Sinks

Page 207: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

179

Fig. 7.4 shows the end-to-end delivery of CDS-EPRP for multi-sink

architecture with varying network size. When the network is sparse, nodes check

the status of dominating neighbors by measuring the distance (RSSd). The CDS

connectivity mechanism will be executed by nodes when the distance is greater

than the sensing radius. Thus packets experience more delay with single sink. If

multiple sinks are available, they can reach any one of the sink, which results in

lower end-to-end delay. As the number of neighbors of a node increases with dense

network, the number of nodes involved for data forwarding in CDS-EPRP is less

which results in reduced delay with the increasing network size.

0

0.5

1

1.5

2

150 200 250 300 350 400 450 500 550

End-t

o-E

nd D

ela

y (

s)

Number of Nodes

No. of Sink=1No. of Sink=4No. of Sink=8

Fig. 7.4: No. of Nodes vs End-to-End Delay with varying Sinks

The performance of CDS-EPRP was also compared with VBF and DBR.

Both VBF and DBR are flooding routing protocols and use holding time for each

node to reduce flooding. The holding time of VBF is determined by the adaptive

factor and DBR uses a global parameter δ .

Page 208: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

180

0

10

20

30

40

50

60

70

80

90

100

150 200 250 300 350 400 450 500 550

Packe

t D

eliv

ery

Ratio(%

)

Number of Nodes

VBFDBR

CDS-EPRP

Fig. 7.5: No. of Nodes vs Packet Delivery Ratio

The packet delivery ratio of the protocols with varying network size is

plotted in Fig. 7.5. The results show that the delivery ratio is increasing with

dense network for all the protocols. In VBF and DBR, the number of neighbors

is increasing with dense network and the nodes in the communication radius can

hear the broadcast packet which results in more packet delivery by spending more

energy. In CDS-EPRP, each dominatee is associated with at least one dominating

node and these dominating nodes are always connected. As each dominating node

selects a neighbor dominator with lower depth, a single copy of data packet is

forwarded. Thus it achieves high packet delivery ratio due to less congestion and

CDS connectivity maintenance.

Fig. 7.6 shows the end-to-end delay for all protocols. Here, DBR shows the

worst performance due to congestion in the acoustic channel and failure of packet

retransmissions. VBF finds the shortest path from the source node to the sink along

Page 209: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

181

the virtual pipe between them. But, DBR uses the depth information and it is used

for holding time calculation. Thus the delay in VBF is shorter than DBR. As CDS-

EPRP forward a single copy of data packet, it has less end-to-end delay.

0

0.5

1

1.5

2

2.5

3

150 200 250 300 350 400 450 500 550

End-t

o-E

nd

Dela

y(s

)

Number of Nodes

VBFDBR

CDS-EPRP

Fig. 7.6: No. of Nodes vs End-to-End Delay

Fig. 7.7 shows the energy consumption of the protocols. The results show

that CDS-EPRP has the least energy consumption compared with DDR and VBF.

The VBF consumes more energy due to flooding of packets through the virtual

pipe between the source and destination. The energy consumption of DBR is

less compared to VBF due to the redundant packet suppression technique with

two-queue mechanism adapted by DBR. As energy consumption is related to

distance, to minimize energy consumption CDS-EPRP selects the next hop node

with minimum depth among the dominating neighbors. Also, a single copy of the

packet is forwarded to the network, resulting in reduced congestion. Thus CDS-

EPRP consumes less energy than the others.

Page 210: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

182

0

1000

2000

3000

4000

5000

6000

7000

8000

150 200 250 300 350 400 450 500 550

To

tal E

nerg

y C

on

sum

ption

(W

)

Number of Nodes

VBFDBR

CDS-EPRP

Fig. 7.7: No. of Nodes vs Energy consumption

In order to check the performance of CDS-EPRP with different offered

load, the delivery ratios and end-to-end delays were analyzed, with the increasing

data packets by different sensor nodes. Assumed that a network was deployed with

400 nodes, varied the load from one to 10 and each source sensor node generates

a data packet for every 10 seconds. The results in Fig. 7.8 show that the packet

delivery ratio decreases with the increasing load. The network is congested with

more data packets when the offered load is high. As DBR and VBF flood the

packets which result in more packet loss. The multi-sink architecture and redundant

packet suppression technique of DBR increase the packet delivery. Thus the packet

delivery ratio of DBR is higher than VBF. As CDS-EPRP is based on multi-sink

and a single copy forwarding of data packets through subset of nodes, more packets

are delivered compared to DBR and VBF.

Fig. 7.9 presents the results of end-to-end delay of the protocols with the

Page 211: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

183

0

10

20

30

40

50

60

70

80

90

100

0 1 2 3 4 5 6 7 8 9 10 11

Packe

t D

eliv

ery

Ratio(%

)

Offered Load (traffic sources)

VBFDBR

CDS-EPRP

Fig. 7.8: Offered Load vs Packet Delivery Ratio

0

0.5

1

1.5

2

2.5

3

0 1 2 3 4 5 6 7 8 9 10 11

End-t

o-E

nd D

ela

y (

s)

Offered Load (traffic sources)

VBFDBR

CDS-EPRP

Fig. 7.9: Offered Load vs End-to-end Delay

Page 212: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

184

increasing load. Due to broadcasting, both DBR and VBF transmit the multiple

copies of the same data packet. In such cases, when nodes receive more data

packets, then for every receiving node, the depth or AoA is checked in DBR and

VBF respectively. Thus the delay is decreasing with the increasing load. But,

CDS-EPRP does not follow flooding and packets will be delivered to any of the

sink, which results the lowest delay compared to the others. As dominating nodes

are heavily loaded when it receives more data packets, resulting in increasing end-

to-end delay.

0

1000

2000

3000

4000

5000

6000

0 1 2 3 4 5 6 7 8 9 10 11

Tota

l E

nerg

y C

on

sum

ed (

W)

Offered Load (traffic sources)

VBFDBR

CDS-EPRP

Fig. 7.10: Offered Load vs Energy Consumption

The energy consumption of the protocols with offered load is presented

in Fig. 7.10. At high offered load, the network is more congested, consuming

more energy. Thus the energy consumption is increasing with the increasing load.

With CDS connectivity maintenance and forwarding of a singly copy, CDS-EPRP

achieves the lowest energy consumption.

Page 213: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

185

7.4 CHAPTER SUMMARY

This chapter discusses the design of an on-demand routing protocol for

energy-efficient routing in UWASN based on connected dominating set, named

CDS-EPRP. CDS-EPR does not require global location information and neither

route discovery nor maintenance is needed. The dominating nodes are selected

based on node’s energy using ACO. The data forwarding in CDS-EPRP is multi-

hop relay where the next hop is selected based on depth and energy. It takes

advantage of multi-sink architecture, where data packets can reach any one of the

sinks. The connectivity of dominating nodes is also maintained by energy threshold

and distance. The performance of CDS-EPRP was compared with VBF and DBR.

As the dominating nodes are responsible for data forwarding, the network is less

congested with varying network size when compared to VBF and DBR. Thus it can

achieve the highest packet delivery ratio and the lowest energy consumption and

end-to-end delay. At higher offered load, with multi-sink architecture, dominating

nodes are delivering the packets to any of the sinks, resulting in highest packet

delivery ratio, lowest end-to-end delay and energy consumption. As a future work,

coverage of the area can also be maintained by the dominating nodes through the

self deployment strategies.

Page 214: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

CHAPTER 8

CONCLUSION AND FUTURE WORK

8.1 SUMMARY OF CONTRIBUTIONS

This thesis focused on defining five new concepts based on CDS and

designing algorithms for the new concepts. With new applications (MANETs,

MON, WSN and UWASN), the concept of CDS is modified or extended and still

serves as network backbone for communication.

The first study of this thesis presents S-ELHT, a stability based energy-

efficient link-state hybrid routing protocol to meet the stable path requirement

of mobile ad hoc networks. As link-state routing propagates the link state

information into the network using CDS (also called MPR), the number of message

transmission depends on the link disconnections. In addition to reducing the

number of forwarding nodes with node degrees, the stability of nodes is measured

based on energy and link connectivity time. These measures provide an indication

of how much a link is stable while deciding about dominating nodes for propagating

link state informations. Unlike link-state routing, S-ELHR do not maintain routing

tables. From a given source to destination, a source route is computed based on

the local topology information base. The data packets carry a complete routing

path. S-ELHR also performs a route recovery when the next hop in the source

route is not a one-hop neighbor. The proposed algorithm, S-ELHR, has been

compared with OLSR and EE-OLSR in terms of delay, packet delivery ratio, energy

consumption with various network size and node mobility. It is also observed

186

Page 215: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

187

that the proposed algorithm provides good packet delivery ratio, shorter delay and

energy consumption compared to OLSR and EE-OLSR in all cases.

The second study of this thesis presents Weighted-CDSR, a reactive routing

protocol for ad hoc communications to meet the requirements of emergency and

rescue scenarios. During emergency situations, due to battery concerns and the

wide physical dispersement of individual agents, full wireless connectivity needs to

be continuously maintained among all mobile hosts. The application of traditional

MANET routing protocol in these situations consume more energy due to route

discovery mechanism, caused by frequent path disconnections. To handle path

disconnections, the stability and mobility of nodes are considered in Weighted-

CDSR. The stability is calculated based on received signal strength of a node with

all its neighbors. The mobility is computed as the ratio of new neighbors to the

total number of neighbors during the last two HELLO message transmissions.

To further reduce the CDS size, the degree of nodes is also considered in

weight calculation of a node. Like on-demand routing protocols, Weighted-CDSR

maintains routing tables at dominating nodes. The route discovery and data packet

forwarding involved only dominating nodes. The performance of Weighted-CDSR

is compared with AODV, DSR, DYMO and Weighted(Degree)-CDSR in terms of

end-to-end delay, packet delivery ratio, energy consumption with various network

size, node mobility and number of traffic sources. It is observed that the Weighted-

CDSR provides good packet delivery ratio, shorter delay and minimum energy

consumption.

The third study of this thesis presents BRP, a backbone routing protocol

based on node’s inter-contact time and ego-centrality, for mobile opportunistic

networks. As multi-copy based routing protocols generate lot of message copies,

which leads higher system overhead. Although, a single-copy based routing

Page 216: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

188

reduces the overhead, the relay selection considered the single feature of the node’s

behavior. BRP is an improved single-copy forwarding protocol that reduces the

overhead and considered multiple social features of the node’s behavior such as

contact time and centrality. The successful delivery of message not only depends

on the number of connections, but also the encounter time and frequency. So, the

backbone nodes in BRP are selected based on the accumulated coverage condition,

where each node checks for the replacement path between pair of its neighbors

with higher centrality value and less inter-contact time. The backbone nodes are

involved in message forwarding and it also buffers the messages when the network

is disconnected. The performance of BRP was compared with Adaptive-Routing,

CoMANDR and PRoPHET in terms of various network size, mobility speed,

message lifetime and number of messages. It is found that, a single forwarding of

messages through nodes with more centrality and less inter-contact time reduced

the delay, energy consumption and increased the packet delivery ratio.

The fourth study of this thesis presents k−CCDS, a fault-tolerant coverage

control protocol based on sensing coverage of nodes for WSN. In dense WSN,

the sensing areas of sensor nodes may overlap with each other. In general, the

larger the overlap of the sensing range, the more redundant data generated, leads

to more energy consumption. The lifetime of WSN can be extended by doing

network operations with a subset of nodes and make the other nodes in sleep

state. A weight based coverage cost based on remaining energy of nodes, is

proposed to select a subset of nodes with more weight. These selected active nodes

need to be connected to reduce the delay during the communication. To further

provide reliability during communication, redundant nodes are added in k−CCDS.

The performance of k−CCDS was compared with A3Cov in terms of CDS size,

coverage, energy consumption, number of uncovered nodes and lifetime of the

Page 217: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

189

network, with various network size and communication range. As coverage and

connectivity are maintained in k−CCDS with subset of nodes providing network

wide operations, the proposed protocol performed better than A3Cov in all the

cases.

The fifth study of this thesis presents CDS-EPRP, an energy-efficient

pressure-aware routing protocol for UWASN. Energy efficiency becomes more

critical and challenging in UWASN because of much higher transmission and

receiving power consumption of acoustic channel. When an underwater sensor

wants to send a packet to the surface sink, a multi-hop minimum energy consuming

path need to be determined. CDS-EPRP applied an ACO technique to select the

relay nodes with more energy and these relays provide a full coverage of the

network. The connectivity of these relays need to be maintained during the lifetime

of the network. Therefore, CDS-EPRP implemented a maintenance mechanism to

maintain the CDS structure inspite of node’s energy depletion and node’s mobility.

In order to save energy, node chooses the nearest neighbor as next-hop based on the

depth information. The performance of CDS-EPRP was compared with DBR and

VBF in terms of packet delivery ratio, energy consumption, and end-to-end delay.

It is observed that it provides good packet delivery ratio, less delay and energy

consumption.

8.2 CONCLUSION

An extensive study on routing is done for MANETs, MON, WSN and

UWASN. Specifically, a link stability based routing mechanism is studied for

MANETs as it has an effect in performance of routing protocols. The feasibility of

using CDS as communication layer is studied for efficient broadcasting, reducing

Page 218: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

190

routing overhead, and energy-efficient routing in MANETs. The computation of

stability in terms of received signal strength, energy, link connectivity index and

mobility speed, are analyzed. The effect of these metrics on CDS for routing is

also verified. Also, the application of CDS as backbone for message relaying is

studied in MON.

The application of CDS for connected coverage is addressed for WSN.

Although, a CDS can preserve 1-coverage, the applicability of CDS for fault-

tolerant coverage is also studied. But, the redundant connectivity among the

dominating nodes are not considered. The use of ACO for CDS construction is

studied and an energy efficient routing is designed over CDS for UWASN.

8.3 SCOPE FOR FUTURE WORK

The proposed protocols of this research work can be extended in the

following ways:

- The proposed stability based routing protocols can be extended to meet the

QoS requirements of multimedia communications.

- A multicast routing protocol based on Weighted-CDSR can be designed for

cooperative communications in MANETs.

- The performance of centrality based forwarding can be analyzed for MONs.

- A k-connected k-coverage topology control can be developed for mobile

sensor networks.

- A data aggregation based CDS-EPRP can be developed to further reduce the

redundant packet transmissions in UWASN.

Page 219: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

REFERENCES

[1] Adjih, C., Jaquet, P., and Viennot, L., Computing connected dominated setswith multipoint relays, International Journal Ad Hoc & Sensor WirelessNetworks, (2005), 27–39.

[2] Akyildiz, I. F., Pompili, D., and Melodia, T., Underwater acoustic sensornetworks: research challenges, Ad hoc networks, 3(3), (2005), 257-279.

[3] Akyildiz, I. F., Pompili, D., and Melodia, T., State-of-the-art in protocolresearch for underwater acoustic sensor networks, In Proceedings of the 1stACM international workshop on Underwater networks, (2006), 7-16.

[4] Akyildiz, I. F., and Vuran, M. C., Wireless Sensor Networks, John Wiley &Sons, (2010).

[5] Al-Karaki, J. N., and Kamal, A. E., Efficient Virtual Backbone Routing inMobile Ad Hoc Networks, Computer Networks, 52(2), (2008), 327-350.

[6] Ali, T., Jung, L. T., and Faye, I., End-to-End Delay and Energy EfficientRouting Protocol for Underwater Wireless Sensor Networks, WirelessPersonal Communications, 79(1), (2014), 339-361.

[7] Alves, J., Petroccia, R., and Potter, J. R., MPR: Multi-Point Relay protocolfor Underwater Acoustic Networks, In Proceedings of ACM InternationalConference on Underwater Networks & Systems, (2014).

[8] Alzoubi, K. M., Wan, P. J., and Frieder, O., Message-optimal connecteddominating sets in mobile ad hoc networks, In Proceedings of the 3rdACM international symposium on Mobile ad hoc networking & computing,(2002), 157-164.

[9] Ammari, H. M., On the problem of k-coverage in mission-oriented mobilewireless sensor networks, Computer Networks, 56, (2012), 1935–1950.

[10] Ammari, H. M., and Das, S. K., Centralized and Clustered k-CoverageProtocols for Wireless Sensor Networks, IEEE Transactions on Computers,61(1), (2012), 118–133.

[11] An, B., and Papavassiliou, S., A Mobility based clustering approach tosuuport mobility management and multicast routing in mobile ad hoc

191

Page 220: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

192

wireless networks, International Journal of Network Management, 11,(2001), 387-395.

[12] Anitha, V. S., and Sebastian, M. P., Application oriented connecteddominating set-based cluster formation in wireless sensor networks, Journalof the Brazilian Computer Society, 17, (2011), 3–18.

[13] Ayaz, M., Abdullah, A., Faye, I., and Batira, Y., An efficient dynamicaddressing based routing protocol for underwater wireless sensor networks,Computer Communications, 35, (2012), 475-486.

[14] Ayaz, M., Baig, I., Abdullah, A., and Faye, I., A survey on routingtechniques in underwater wireless sensor networks, Journal of Network andComputer Applications, 34(6), (2011), 1908-1927.

[15] Aziz, A. A., Sekercioglu, Y. A., Fitzpatrick, P., and Ivanovich, M., A surveyon distributed topology control techniques for extending the lifetime ofbattery powered wireless sensor networks, IEEE Communications Surveys& Tutorials, , 15(1), (2013), 121-144.

[16] Bao, L., and Garcia-Luna-Aceves, J. J., Stable energy aware topologymanagement in ad hoc networks, Pervasive and Mobile Computing, 8(3),(2010), 313-327.

[17] Basagni, S., Distributed and Mobility-adaptive clustering for multimediasupport in multi-hop wireless networks, In Proceedings of IEEE 50thVehiclular Technology Conference, (1999), 889-893.

[18] Basagni, S., Mastrogiovanni, M., Panconesi, A., and Petrioli, C., LocalizedProtocols for Ad Hoc Clustering and Backbone Formation: A PerformanceComparison, IEEE Transactions on Parallel and Distributed Systems, 17(4),(2006), 292-306.

[19] Bian, Y., Yu, H. and Zeng, P., Construction of a fault tolerance connecteddominating set in wireless sensor network, In Proceedings of IEEEInternational Conference on Measuring Technology and MechatronicsAutomation (ICMTMA 2009), (2009), 1, 610–614.

[20] Blum, J., Ding, M., Thaeler, A., and Cheng, X., Connected dominating set insensor networks and MANETs, In Handbook of combinatorial optimization,(2005), 329-369.

[21] Boice, J., Garcia-Luna-Aceves, J. J., and Obraczka, K., Combining on-demand and opportunistic routing for intermittently connected networks, AdHoc Networks, 7(1), (2009), 201-218.

Page 221: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

193

[22] Boukerche, A., Turgut, B., Aydin, N., Mohammad, Z.A., Boloni, L., andTurgut D., Routing protocols in ad hoc networks: A survey, ComputerNetworks, 55, (2011), 3032–3080.

[23] Cao, Y., and Sun, Z., Routing in delay/disruption tolerant networks: Ataxonomy, survey and challenges, IEEE Communications Surveys &Tutorials, 15(2), (2013), 654-677.

[24] Cardei, M., Cheng, M. X., Cheng, X., and Du, D. Z., Connected Dominationin Multihop Ad Hoc Wireless Networks, In JCIS, (2002), 251-255.

[25] Cardei, M., and Wu, J., Energy-efficient coverage problems in wireless ad-hoc sensor networks, Computer Communications, 29, (2006), 413–420.

[26] Carle, J., Gallais, A., and Simplot-Ryl, D., Preserving Area Coverage inWireless Sensor Networks by using Surface Coverage Relay DominatingSets, In Proceedings of the 10th IEEE Symposium on Computers andCommunications (ISCC 2005), (2005), 347–352.

[27] Chakeres, I., and Perkins, C., Dynamic MANET on-demand (DYMO)routing, http://tools.ietf.org/html/draft-ietf-manet-dymo-21, (2010).

[28] Chen, H., and Lou, W., GAR: Group aware cooperative routing protocol forresource-constraint opportunistic networks, Computer Communications, 48,(2014), 20-29.

[29] Cheng, G., Song, M., Zhang, Y., Xing, Y. H., and Bao, X. Y., Routingprotocol based on social characteristics for opportunistic networks, TheJournal of China Universities of Posts and Telecommunications, 21(1),(2014), 67-103.

[30] Cheng, X., Ding, M., Hongwei, D., and Jia, X., Virtual backboneconstruction in multihop ad hoc wireless networks, International Journalof Wireless Communications and Mobile Computing, 6, (2006), 183–190.

[31] Chizari, H., Hosseini, M., Salleh, S., Razak, S. A., and Abdullah, A. H.,EF-MPR, a new energy eFficient multi-point relay selection algorithm forMANET, The Journal of Supercomputing, 59(2), (2012), 744-761.

[32] Chun-Hao, Y., Kuo-Feng, S., An energy-efficient routing protocol inunderwater sensor networks, In Proceedings of the 3rd internationalconference on sensing technology, ICST, (2008).

[33] Clausen, T., and Jacquet, P., Optimized link state routing protocol (OLSR),Internet Draft www.ietf.org/rfc/rfc3626.txt, (2003).

Page 222: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

194

[34] Czyzowicz, J., Dobrev, S., Fevens, T., Gonzalez-Aguilar, H., Kranakis, E.,Opatrny, J., and Urrutia, J., Local algorithms for dominating and connecteddominating sets of unit disk graphs with location aware nodes, In LATIN2008: Theoretical Informatics, (2008), 158-169.

[35] Dai, F., and Wu, J., An extended localized algorithm for connecteddominating set formation in ad hoc wireless networks, IEEE Transactionson Parallel and Distributed Systems, 15(10), (2004), 908-920.

[36] Daly, E. M., and Haahr, M., Social network analysis for information flowin disconnected delay-tolerant MANETs, IEEE Transactions on MobileComputing, 8(5), (2009), 606-621.

[37] Das, A., Mandal, C., Reade, C., and Aasawat, M. An improved greedyconstruction of minimum connected dominating sets in wireless networks, InProceedings of IEE Wireless Communications and Networking Conference(WCNC), (2011), 790-795.

[38] Das, B., and Bharghavan, V., Routing in ad-hoc networks usingminimum connected dominating sets, In Proceedings of IEEE InternationalConference on Communications, ICC’97 Montreal, Towards the KnowledgeMillennium, 1, (1997), 376-380.

[39] Datta, S., Stojmenovic, I., and Wu, J., Internal node and shortcut basedrouting with guaranteed delivery in wireless networks, Cluster computing,5(2), (2002), 169-178.

[40] De Rango, F., Fotino, M., and Marano, S., EE-OLSR: energy efficientOLSR routing protocol for mobile ad-hoc networks, In Proceedings of IEEEMilitary Communications Conference, MILCOM 2008, (2008), 1-7.

[41] Demmer, M., and Fall, K., DTLSR: delay tolerant routing for developingregions, In Proceedings of the 2007 ACM workshop on Networked systemsfor developing regions, (2007).

[42] Domingo, M. C., A distributed energy-aware routing protocol for underwaterwireless sensor networks, Wireless Personal Communications, 57(4),(2011), 607-627.

[43] Dorigo, M., Birattari, M., and Stutzle, T., Ant colony optimization, IEEEComputational Intelligence Magazine, 1(4), (2006), 28-39.

[44] Dorigo, M., and Stutzle, T., The ant colony optimization metaheuristic:Algorithms, applications, and advances, In Handbook of metaheuristics,(2003), 250-285.

Page 223: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

195

[45] Du, D. Z., Thai, M. T., Li, Y., Liu, D., and Zhu, S., Strongly connecteddominating sets in wireless sensor networks with unidirectional links, InProceedings of Frontiers of WWW Research and Development-APWeb 2006,(2006), 13-24.

[46] Du, H., Wu, W., Ye, Q., Li, D., Lee, W., and Xu, X., CDS-based virtualbackbone construction with guaranteed routing cost in wireless sensornetworks, IEEE Transactions on Parallel and Distributed Systems, 24(4),(2013), 652-661.

[47] Duresi, A., and Paruchuri, V., Adaptive backbone protocol for heterogeneouswireless networks, Telecommunication Systems, 38(3-4), (2008), 83-97.

[48] El-Hajj, W., Trabelsi, Z., and Kountanis, D., Fast distributed dominatingset based routing in large scale MANETs, Computer Communications, 30,(2007), 2880–2891.

[49] Everett, M., and Borgatti, S. P., Ego network betweenness, Social networks,27(1), (2005), 31-38.

[50] Fall, K., and Varadhan, K., The ns Manual,www.isi.edu/nsnam/ns/doc/ns doc.pd f , (2011).

[51] Freeman, L. C., A set of measures of centrality based on betweenness,Sociometry, (1977), 35-41.

[52] Freeman, L. C., Centrality in social networks conceptual clarification, Socialnetworks, 1(3), (1979), 215-239.

[53] Gao, T., Ji, T., Jin, R., Ding, J., and Zou, J., A survey of routing protocol inunderwater sensor networks, Future Computer and Information Technology,86, (2014), 437-445.

[54] Ghosh, A., and Das, S.K., Coverage and connectivity issues in wirelesssensor networks: A survey, Pervasive and Mobile Computing, 4, (2008),303–334.

[55] Gopi, S., Govindan, K., Chander, D., Desai, U. B., and Merchant,S. N., E-PULRP: Energy optimized path unaware layered routingprotocol for underwater sensor networks, IEEE Transactions on WirelessCommunications, 9(11), (2010), 3391-3401.

[56] Guha, S., and Khuller, S., Approximation algorithms for connecteddominating sets, Algorithmica, 20(4), (1999).

Page 224: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

196

[57] Guo, Z., Malakooti, S., Sheikh, S., Al-Najjar, C., Lehman, M., andMalakooti, B., Energy aware proactive optimized link state routing in mobilead-hoc networks, Applied Mathematical Modelling, 35(10), (2011), 4715-4729.

[58] Guo, Z., Malakooti, S., Sheikh, S., Al-Najjar, C., and Malakooti, B., Multi-objective OLSR for proactive routing in MANET with delay, energy, andlink lifetime predictions, Applied Mathematical Modelling, 35(3), (2011),1413-1426.

[59] Han, B., and Jia, W., Clustering wireless ad hoc networks with weaklyconnected dominating set, Journal of Parallel and Distributed Computing,67(6), (2007), 727-737.

[60] Hassan, D. S., Fahmy, H. M., and Bahaa-ElDin, A. M., RCA: Efficientconnected dominated clustering algorithm for mobile ad hoc networks,Computer Networks, 75, (2014), 177-191.

[61] He, J. S., Ji, S., Pan, Y., and Cai, Z., Approximation algorithms forload-balanced virtual backbone construction in wireless sensor networks,Theoretical Computer Science, 507, (2013), 2-16.

[62] He, J. S., Ji, S., Pan, Y., and Li, Y., Greedy construction of load-balancedvirtual backbones in wireless sensor networks, Wireless Communicationsand Mobile Computing, 14(7), (2014), 673-688.

[63] Heidemann, J., Ye, W., Wills, J., Syed, A., and Li, Y., Research challengesand applications for underwater sensor networking, In Proceedings of IEEEWireless Communications and Networking Conference, 1, (2006), 228-235.

[64] Ho, C. K., Singh, Y. P., and Ewe, H. T., An enhanced ant colony optimizationmetaheuristic for the minimum dominating set problem, Applied ArtificialIntelligence, 20(10), (2006), 881-903.

[65] Hong, Y., Bradley, D., Kim, D., Li, D., Tokuta, A. O., and Ding, Z.,Construction of higher spectral efficiency virtual backbone in wirelessnetworks, Ad Hoc Networks, 25, (2015), 228-236.

[66] Hosseini, M., Chizari, H., Soon, C. K., and Budiarto, R., RSS-based distancemeasurement in underwater acoustic sensor networks: An application ofthe lambert w function, In Proceedings of 4th International Conference onSignal Processing and Communication Systems (ICSPCS), (2010), 1-4.

Page 225: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

197

[67] Hu, T., and Fei, Y., QELAR: A machine-learning-based adaptive routingprotocol for energy-efficient and Lifetime-extended underwater sensornetworks, IEEE Transactions on Mobile Computing, 9(6), (2010), 796-809.

[68] Huang, C. F., and Tseng, Y. C., A survey of solutions to the coverageproblems in wireless sensor networks, Journal of Internet Technology, 6,(2005), 1–8.

[69] Huang, C. J., Wang, Y. W., Liao, H. H., Lin, C. F., Hu, K. W., and Chang,T. Y., A power-efficient routing protocol for underwater wireless sensornetworks, Applied Soft Computing, 11(2), (2011), 2348-2355.

[70] Hui, P., Crowcroft, J., and Yonek, E., BUBBLE Rap: Social-basedforwarding in delay-tolerant networks, IEEE Transactions on MobileComputing, 10(11), (2011), 1576–1589.

[71] Islam, K., Akl, S. G., and Meijer, H., A Constant Factor Localized Algorithmfor Computing Connected Dominating Sets in Wireless Sensor Networks,In Proceedings of 14th IEEE International Conference on Parallel andDistributed Systems ICPADS’08, (2008), 559-566.

[72] Jang, H. C., Lien, Y. N., and Tsai, T. C., Rescue information systemfor earthquake disasters based on MANET emergency communicationplatform, In Proceedings of the 2009 International Conference on WirelessCommunications and Mobile Computing (IWCMC 09): Connecting theWorld Wirelessly , (2009), 623-627.

[73] Johnson, D., Hu, Y., and Maltz, D., The dynamic source routingprotocol for Mobile ad hoc networks for IPv4, In Internet draftwww.ietf.org/rfc/rfc4728.txt, (2007).

[74] Joshi, R. D., and Rege, P. P., Implementation and analytical modellingof modified optimised link state routing protocol for network lifetimeimprovement, IET communications, 6(10), (2012), 1270-1277.

[75] Jovanovic, R., and Tuba, M., Ant colony optimization algorithm withpheromone correction strategy for the minimum connected dominating setproblem, Computer Science and Information Systems, 10(1), (2013), 133-149.

[76] Jovanovic, R., Tuba, M., and Simian, D., Ant colony optimizationapplied to minimum weight dominating set problem, In Proceedings ofthe 12th WSEAS international conference on Automatic control, modelling

Page 226: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

198

& simulation,, World Scientific and Engineering Academy and Society(WSEAS), (2010), 322-326.

[77] Karkkainen, T., Pitkanen, M., and Ott, J., Applications in Delay-Tolerantand Opportunistic Networks, Mobile Ad Hoc Networking: The Cutting EdgeDirections, Second Edition, Wiley Publications, (2013), 315-359.

[78] Katsaros, D., Dimokas, N., and Tassiulas, L., Social network analysisconcepts in the design of wireless ad hoc network protocols, IEEE Network,24(6), (2010), 23-29.

[79] Khedr, Ahmed M., and Osamy, W., Mobility-assisted minimum connectedcover in a wireless sensor network, Journal of Parallel DistributedComputing, 72, (2012), 827–837.

[80] Kim, D., Wang, W., Li, X., Zhang, Z., and Wu, W., A New ConstantFactor Approximation for Computing 3-Connected m-Dominating Sets inHomogeneous Wireless Networks, In Proceedings of IEEE (INFOCOM2010), (2010), 1–9.

[81] Kim, D., Wu, Y., Li, Y., Zou, F., and Du, D.-Z., Constructing minimumconnected dominating sets with bounded diameters in wireless networks,IEEE Transactions on Parallel and Distributed Systems, 20(2), (2009), 147-157.

[82] Kim, Y. H., Kim, C. M., Han, Y. H., Jeong, Y. S., and Park, D. S.,Betweenness of Expanded Ego Networks in Sociality-Aware Delay TolerantNetworks, In Ubiquitous Information Technologies and Applications,(2013), 499-505.

[83] Kui, X., Sheng, Y., Du, H., and Liang, J., Constructing a CDS-based networkbackbone for data collection in wireless sensor networks, InternationalJournal of Distributed Sensor Networks, 2013, (2013), 1-12.

[84] Lakkakorpi, J., Pitkanen, M., and Ott, J., Adaptive routing in mobileopportunistic networks, In Proceedings of the 13th ACM internationalconference on Modeling, analysis, and simulation of wireless and mobilesystems, (2010), 101-109.

[85] Lee, C. Y., Shiu, L. C., Lin, F. T., and Yang, C. S., Distributed topologycontrol algorithm on broadcasting in wireless sensor network, Journal ofNetwork and Computer Applications, 36(4), (2013), 1186-1195.

Page 227: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

199

[86] Leu, S., and Chang, R., A weight-value algorithm for finding connecteddominating set in a MANET, Journal of Network and ComputerApplications, 35, (2012), 1615-1619.

[87] Levin, L., Kowalski, D. R., and Segal, M., Message and time efficient multi-broadcast schemes, Theoretical Computer Science, 569, (2015), 13-23.

[88] Li, V., Park, H. S., and Oh, H., A cluster-label-based mechanism forbackbones on mobile ad hoc networks, In Lecture notes in computer science,3970, (2006), 26–36.

[89] Li, Y., Thai, M. T., Wang, F., Yi, C. W., Wan, P. J., and Du, D. Z., On greedyconstruction of connected dominating sets in wireless networks, WirelessCommunications and Mobile Computing, 5(8), (2005), 927-932.

[90] Li, Y., Wu, Y., Ai, C., and Beyah, R., On the construction of k-connected m-dominating sets in wireless networks, Journal of combinatorialoptimization, 23, (2012), 118–139.

[91] Li, Z., and Shen, H., SEDUM: Exploiting Social Networks in Utility-BasedDistributed Routing for DTNs, IEEE Transactions on Computers, 62(1),(2013), 83-97.

[92] Liang, O., Sekercioglu, Y. A., and Mani, N., A survey of multipointrelay based broadcast schemes in wireless ad hoc networks, IEEECommunications Surveys and Tutorials, 8(1-4), (2006), 30-46.

[93] Lim, H., and Kim, C., Flooding in wireless ad hoc networks, ComputerCommunications, 24(3), (2001), 353-363.

[94] Lindgren, A., Davies, E., Grasic, S., and Doria, A., Probabilisticrouting protocol for intermittently connected networks,http://tools.ietf.org/html/rfc6693.txt, (2012).

[95] Liu, T., Zhu, Y., Jiang, R., and Li, B., A sociality-aware approach tocomputing backbone in mobile opportunistic networks, Ad Hoc Networks,24, (2015), 46-56.

[96] Luo, G., Zhang, J., Huang, H., Qin, K., and Sun, H., Exploiting intercontacttime for routing in delay tolerant networks, Transactions on EmergingTelecommunications Technologies, 24(6), (2013), 589-599.

[97] Macker, J., and Corson, S., Mobile Ad hoc Networks (MANET). IETFWorking Group Charter, (1997).

Page 228: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

200

[98] Macone, D., Oddi, G., and Pietrabissa, A., MQ-Routing: Mobility-, GPS-and energy-aware routing protocol in MANETs for disaster relief scenarios,Ad Hoc Networks , 11(3), (2013), 861-878.

[99] Meghanathan, N., and Farago, A., On the stability of paths, Steiner trees andconnected dominating sets in mobile ad hoc networks, Ad Hoc Networks, 6,(2008), 744–769.

[100] Mahjoub, D., and Matula, D. W., Constructing efficient rotatingbackbones in wireless sensor networks using graph coloring, ComputerCommunications, 35, (2012), 1086-1097.

[101] Miao, J., Hasan, O., Mokhtar, S. B., Brunie, L., and Gianini, G., A delayand cost balancing protocol for message routing in mobile delay tolerantnetworks, Ad Hoc Networks, 25, (2015), 430-443.

[102] Misra, R., and Mandal, C., Rotation of CDS via Connected DomaticPartition in Ad hoc Sensor Networks, IEEE Transactions on Mobilecomputing, 8(4), (2009), 488-499.

[103] Misra, R., and Mandal, C., Minimum connected dominating set using acollaborative cover heuristic for ad hoc sensor networks, IEEE Transactionson Parallel and Distributed Systems, (2010), 21(3), 292-302.

[104] Misra, S., Kumar, M.P., and Obaidat, M.S., Connectivity preservinglocalized coverage algorithm for area monitoring using wireless sensornetworks, Computer Communications, 34, (2011), 1484-1496.

[105] Montolio-Aranda, P., Garcia-Alfaro, J., and Megıas, D., Improved floodingof broadcast messages using extended multipoint relaying, Journal ofNetwork and Computer Applications, 34(2), (2011), 542-550.

[106] Mota, V. F., Cunha, F. D., Macedo, D. F., Nogueira, J., and Loureiro, A. A.,Protocols, mobility models and tools in opportunistic networks: A survey,Computer Communications , 48, (2014), 5–19.

[107] Moulahi, T., Nasri, S., and Guyennet, H., Broadcasting based on dominatedconnecting sets with MPR in a realistic environment for WSNs and ad hoc,Journal of Network and Computer Applications, 35, (2012), 1720-1727.

[108] Moussaoui, A., Semchedine, F., and Boukerram, A., A link-state QoSrouting protocol based on link stability for Mobile Ad hoc Networks, Journalof Network and Computer Applications, 39, (2014), 117-125.

Page 229: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

201

[109] Moussaoui, A., and Boukeream, A., A survey of routing protocols based onlink-stability in mobile ad hoc networks, Journal of Network and ComputerApplications, 47, (2015), 1-10.

[110] Nicolaou, N., See, A., Xie, P., Cui, H. J., and Maggiorini, D., Improvingthe robustness of location-based routing for underwater sensor networks, InProceedings of IEEE OCEANS’07, (2007), 1–6.

[111] Noh, Y., Lee, U., Wang, P., Choi, B. S. C., and Gerla, M., VAPR: Void-AwarePressure Routing for Underwater Sensor Networks, IEEE Transactions onMobile Computing, 12(5), (2013), 895-908.

[112] Ott, J., Demmer, M., and Perreault, S., Delay-Tolerant Networking TCPConvergence-Layer Protocol, http://tools.ietf.org/html/rfc7242, (2014).

[113] Pan, D. R., Cao, W., Liu, X., Sun, J. J., and Shi, X. J., A performance-guarantee routing algorithm in complex distributed opportunistic networks,The Journal of China Universities of Posts and Telecommunications, 19,(2012), 87-93.

[114] Pelusi, L., Passarella, A., and Conti, M., Opportunistic networking: dataforwarding in disconnected mobile ad hoc networks, IEEE CommunicationsMagazine, 44(11), (2006), 134-141.

[115] Pemmaaraju, S.V., and Piwani, I.A., Energy Conservation via DomaticPartitions, In Proceedings of the 7th ACM international symposium onMobile ad hoc networking and computing, (2006), 143–154.

[116] Perkins, C., Belding-Royer, E., and Das, S., Ad hoc On-Demand DistanceVector Routing, Internet Draft www.ietf.org/rfc/rfc3561.txt, (2003).

[117] Polat, B. K., Sachdeva, P., Ammar, M. H., and Zegura, E. W., Messageferries as generalized dominating sets in intermittently connected mobilenetworks, Pervasive and Mobile Computing, 7(2), (2011), 189-205.

[118] Samuel, H., Zhuang, W., and Preiss, B., DTN based dominating set routingfor MANET in heterogeneous wireless networking, Mobile Networks andApplications, 14(2), (2009), 154-164.

[119] Pompili, D., Melodia, T., and Akyildiz, I. F., Distributed routing algorithmsfor underwater acoustic sensor networks, IEEE Transactions on WirelessCommunications, 9(9), (2010), 2934-2944.

Page 230: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

202

[120] Pompili, D., and Akyildiz, I. F., Overview of networking protocols forunderwater wireless communications, IEEE Communications Magazine,47(1), (2009), 97-102.

[121] Potluri, A., and Singh, A., Hybrid metaheuristic algorithms for minimumweight dominating set, Applied Soft Computing, 13(1), (2013), 76-88.

[122] Potluri, A., and Singh, A., Metaheuristic algorithms for computingcapacitated dominating set with uniform and variable capacities, Swarm andEvolutionary Computation, 13, (2013), 22-33.

[123] Qayyum, A., Viennot, L., and Laouiti, A., Multipoint relaying for floodingbroadcast messages in mobile wireless networks, In Proceedings of the35th Annual Hawaii International Conference on System Sciences (HICSS),(2002), 3866-3875.

[124] Qureshi, H. K., Rizvi, S., Saleem, M., Ali Khayam, S., Rakocevic, V.,and Rajarajan, M., Poly: A reliable and energy efficient topology controlprotocol for wireless sensor networks, Computer Communications, 34,(2011), 1235–1242.

[125] Qureshi, H. K., Rizvi, S., Saleem, M., Ali Khayam, S., Rakocevic, V., andRajarajan, M., Evaluation and improvement of CDS-based topology controlfor wireless sensor networks, Wireless Networks, 19(1), (2013), 31–46.

[126] Raffelsberger, C., and Hellwagner, H., Combined Mobile Ad-hoc andDelay/Disruption-tolerant Routing, Lecture Notes in Computer Science,8487, (2014), 1-14.

[127] Rai, M., Verna, S., and Tapaswi, S., A Power Aware Minimum ConnectedDominating Set for Wireless Sensor Networks, Journal of Networks, 6(6),(2009), 511-519.

[128] Ramrekha, T. A., Talooki, V. N., Rodriguez, J., and Politis, C., EnergyEfficient and Scalable Routing Protocol for Extreme Emergency Ad HocCommunications, Mobile Network and Applications, 17, (2012), 312-324.

[129] Rizvi, S., Qureshi, H. K., Khayam, S. A., Rakocevic, V., and Rajarajan,M., A1: An energy efficient topology control algorithm for connected areacoverage in wireless sensor networks, Journal of Network and ComputerApplications, 35(2), (2012), 597-605.

[130] Rong-rong, Y., Bin, L., Ya-qian, L., and Xiaoe-chen, H., Adaptivelyfault-tolerant topology control algorithm for wireless sensor networks, The

Page 231: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

203

Journal of China Universities of Posts and Telecommunications, 19, (2012),13–18.

[131] Ruan, L., Du, H., Jia, X., Wu, W., Li, Y., and Ko, K. I., Agreedy approximation for minimum connected dominating sets, TheoreticalComputer Science, 329(1), (2004), 325-330.

[132] Sakai, K., Sun, M. T., and Ku, W. S., Maintaining CDS in Mobile ad hocnetworks, Lectuere Notes in Computer Scicence, 5258, (2008), 141-153.

[133] Sakai, K., Sun, M. T., Ku, W. S., and Huang, S. C. H., On mobility handlingof sub-optimal timer-based CDS construction, Ad Hoc Networks, 29, (2015),1-14.

[134] Sarma, N., and Nandi, S., Route Stability Based QoS Routing in Mobile AdHoc Networks, Wireless Personal Communications, 54, (2010), 203-224.

[135] Sausen, P. S., Spohn, M. A., and Perkusich, A., Broadcast routing inwireless sensor networks with dynamic power management and multi-coverage backbones, Information Sciences, 180, (2010), 653–663.

[136] Schurgot, M. R., Comaniciu, C., and Jaffres-Runser, K., Beyond traditionalDTN routing: social networks for opportunistic communication, IEEECommunications Magazine, 50(7), (2012), 155-162.

[137] Senel, F., Akkaya, K., Erol-Kantarci, M., and Yilmaz, T., Self-deployment of mobile underwater acoustic sensor networks formaximized coverage and guaranteed connectivity, Ad Hoc Networks,doi:doi:10.1016/j.adhoc.2014.09.013, (2014).

[138] Shang, W., Wan, P., Yao, F., and Hu, X., Algorithms for minimum m-connected k-tuple dominating set problem, Theoretical Computer Science,381, (2007), 241–247.

[139] Shaukat, K., and Syrotiuk, V. R., Statistical monitoring to control a proactiverouting protocol, In Ad-Hoc, Mobile, and Wireless Networks, (2007), 46-58.

[140] Sheu, P. R., Tsai, H. Y., Lee, Y. P., and Cheng, J. Y., On calculatingstable connected dominating sets based on Link stability for Mobile ad hocnetworks, Tamkang Journal of Science and Engieering, 12(4), (2009), 417-228.

[141] Shukla, K. K., and Sah, S., Construction and maintenance of virtualbackbone in wireless networks, Wireless Networks, 19(5), (2013), 969-984..

Page 232: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

204

[142] Sinha, P., Sivakumar, R., and Bharghavan, V., Enhancing ad hoc routing withdynamic virtual infrastructures, In Proceedings of the 20th IEEE INFOCOMConference, 3, (2001), 1763-1772.

[143] Sivakumar, R., Das, B., and Bharghavan, V., An improved spine-basedinfrastructure for routing in ad hoc networks, IEEE Transaction on Paralleland Distributed Systems, 13, (2001), 14-25.

[144] Sivakumar, R., Sinha, P., and Bharghavan, V., CEDAR: a core extractiondistributed ad hoc routing algorithm, IEEE Journal on Selected Areas inCommunications, 17, (1999), 1454-1465.

[145] Smys, S., and Josemin, B. G., Efficient self-organized backbone formation inmobile ad hoc networks (MANETs), Computers & Electrical Engineering,(2011), doi:10.1016/j.compeleceng.2011.03.006

[146] Sozer, E. M., Stojanovic, M., and Proakis, J. G., Underwater acousticnetworks, IEEE Journal of Oceanic Engineering, 25(1), (2000), 72-83.

[147] Spohn, M. A., and Garcia-Luna-Aceves, J. J., Improving route discoveryin on-demand routing protocols using tow-hop connected dominating sets,Pervasive and Mobile Computing, 4, (2006), 509-531.

[148] Spyropoulos, T., Psounis, K., and Raghavendra, C. S., Spray and wait:an efficient routing scheme for intermittently connected mobile networks,In Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerantnetworking, (2005), 252-259.

[149] Spyropoulos, T., Rais, R. N., Turletti, T., Obraczka, K., and Vasilakos, A.,Routing for disruption tolerant networks: taxonomy and design, Wirelessnetworks, 16(8), (2010), 2349-2370.

[150] Srinivasan, P., and Kamalakkannan, P., RSEA-AODV: Route Stability andEnergy Aware Routing for Mobile Ad Hoc Networks, International Journalof Computers, Communications and Control, 8(6), (2013), 891-900.

[151] Stojmenovic, I., Comments and Corrections to “Dominating Setsand Neighbor Elimination-Based Broadcasting Algorithms in WirelessNetworks”, IEEE Transactions on Parallel and Distributed Systems, 15(11),(2004).

[152] Stojmenovic, I., Seddigh, M., and Zunic, J., Dominating sets and neighborelimination-based broadcasting algorithms in wireless networks, IEEETransactions on Parallel and Distributed Systems, 13(1), (2002), 14-25.

Page 233: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

205

[153] Su, W., Lee, S. J., and Gerla, M., Mobility prediction and routing in ad hocwireless networks, International Journal of Network Management, 11(1),(2001), 3-30.

[154] Sundar, S., and Singh, A., New heuristic approaches for the dominating treeproblem, Applied Soft Computing, 13(12), (2013), 4695-4703.

[155] Tan, W. C. W., Bose, S. K., and Cheng, T. H., Power and mobility awarerouting in wireless ad hoc networks, IET communications, 6(11), (2012),425-1437.

[156] Torkestani, J. A., An Adaptive energy-efficient area coverage algorithm forwireless sensor networks, Ad Hoc Networks, 11(6), (2013), 1655–1666.

[157] Torkestani, J. A., Energy-efficient backbone formation in wireless sensornetworks, Computers & Electrical Engineering, 39(6), (2013), 1800-1811.

[158] Torkestani, J. A., A stable virtual backbone for wireless MANETS,Telecommunication Systems, 55(1), (2014), 137-148.

[159] Vahdat, A., and Becker, D., Epidemic routing for partially connected ad hocnetworks, Technical Report CS-200006, Duke University, (2000).

[160] Vazquez-Rodas, A., and Luis, J., A centrality-based topology controlprotocol for wireless mesh networks, Ad Hoc Networks, 24, (2015), 34-54.

[161] Wahid, A., Leel, S., and Kim, D., A reliable and energy-efficient routingprotocol for underwater wireless sensor networks, International Journal ofCommunication Systems, 27, (2014), 2048–2062

[162] Wan, P. J., Alzoubi, K. M., and Frieder, O., Distributed construction ofconnected dominating set in wireless ad hoc networks, Mobile Networks andApplications, 9(2), (2004), 141-149.

[163] Wang, F., Min, M., Li, Y., and Du, D., On the construction of stable virtualbackbones in Mobile ad hoc networks, In Proceedings of IEEE internationalPerformance Computing and Communicaions Conference (IPCCC 2005),(2005), 355-362.

[164] Wang, K., and Guo, H., An improved routing algorithm based on social linkawareness in delay tolerant networks, Wireless personal communications,75(1), (2014), 397-414.

Page 234: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

206

[165] Wang, N. C., and Lee, C. Y., A reliable QoS aware routing protocol with slotassignment for mobile ad hoc networks, Journal of Network and ComputerApplications, 32(6), (2009), 1153-1166.

[166] Wang, N., Huang, Y., and Chen, J., A stable weight-based on-demandrouting protocol for mobile ad hoc networks, Information Sciences, 177,(2007), 5522–5537.

[167] Wightman, P. M., and Labrador, M. A., A family of simpledistributed minimum connected dominating set-based topology constructionalgorithms, Journal of Network and Computer Applications, 34, (2011),1997–2010.

[168] Wightman, P.M., and Labrador, M.A., Atarraya: A Simulation Tool to Teachand Research Topology Control Algorithms for Wireless Sensor Networks,In Proceedings of the 2nd International Conference on Simulation Tools andTechniques. ICST (Institute for Computer Sciences, Social-Informatics andTelecommunications Engineering), (2009).

[169] Wu, D., Wang, R., and Zhen, Y., Link stability-aware reliable packettransmitting mechanism in mobile ad hoc network, International Journalof Communication Systems, 25(12), (2012), 1568-1584.

[170] Wu, J., Dai, F., Gao, M., and Stojmenovic, I., On calculating power-awareconnected dominating sets for efficient routing in ad hoc wireless networks,IEEE/KICS Journal of Communications and Networks, 4, (2002), 59-70.

[171] Wu, J., and Li, H., On Calculating connected dominating set forefficient routing in ad hoc wireless networks, In Proceedings of ACM 3rdinternational workshop on Discrete algorithms and methods for mobilecomputing and communications, (1999), 7-14.

[172] Wu, J., and Li, H., A dominating-set-based routing scheme in ad hoc wirelessnetworks, Telecommunication Systems, 18(1-3), (2001), 13-36.

[173] Wu, J., Lou, W., and Dai, F., Extended multipoint relays to determineconnected dominating sets in MANETs, IEEE Transactions on Computers,55(3), (2006), 334-347.

[174] Wu, J., Wu, B., and Stojmenovic, I., Power-aware broadcasting and activityscheduling in ad hoc wireless networks using connected dominating sets,Wireless Communications and Mobile Computing, 3(4), (2003), 425-438.

Page 235: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

207

[175] Wu, Y., Deng, S., and Huang, H., Performance analysis of hop-limitedepidemic routing in DTN with limited forwarding times, InternationalJournal of Communication Systems, DOI: 10.1002/dac.2845, (2014).

[176] Wu, Y., and Li, Y., Construction Algorithms for k-Connected m-DominatingSets in Wireless Sensor Networks, In Proceedings of the 9th ACMinternational symposium on Mobile ad hoc networking and computing,(2008), 83-90.

[177] Wu, Y., Wang, F., Thai, My T., and Li, Y., Constructing k-connected m-dominating set in wireless sensor networks, In Proceedings of IEEE MilitaryCommunicatons Conference (MILCOM 2007), (2007), 1–7.

[178] Xia, Y., and Yeo, C. K., Mitigating the impact of node mobility using mobilebackbone for heterogeneous MANETs, Computer Communications, 35(10),(2012), 1217-1230.

[179] Xiao, Y. (Ed.)., Underwater acoustic sensor networks, CRC Press, (2010).

[180] Xie, P., Cui, J. H., and Lao, L., VBF: vector-based forwarding protocolfor underwater sensor networks, In NETWORKING 2006. NetworkingTechnologies, Services, and Protocols; Performance of Computer andCommunication Networks; Mobile and Wireless Communications Systems,(2006), 1216-1221.

[181] Xie, P., Zhou, Z., Nicolaou, N., See, A., Cui, J. H., and Shi, Z., Efficientvector-based forwarding for underwater sensor networks, EURASIP Journalon Wireless Communications and Networking, (2010), 1-13.

[182] Xie, P., Zhou, Z., Peng, Z., Yan, H., Hu, T., Cui, J. H., and Zhou, S.,Aqua-Sim: an NS-2 based simulator for underwater sensor networks, InProceedings of IEEE OCEANS 2009, MTS/ Biloxi-Marine Technology forOur Future: Global and Local Challenges, (2009), 1-7.

[183] Yan, H., Shi, Z. J., and Cui, J. H., DBR: depth-based routing for underwatersensor networks. In Proceedings of NETWORKING 2008 Ad Hoc and SensorNetworks, Wireless Networks, Next Generation Internet, (2008), 72-86.

[184] Yang, S., Dai, F., Cardei, M., Wu, J., and Patterson, F., On ConnectedMultiple Point Coverage in Wireless Sensor Networks, InternationalJournal of Wireless Information Networks, 13(4), (2006), 289–301.

[185] Yang, S., and Wu, J., Adaptive backbone-based routing in delay tolerantnetworks, In Proceedings of 2013 IEEE 10th International Conference onMobile Ad-Hoc and Sensor Systems (MASS), (2013), 356-364.

Page 236: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

208

[186] Yen, Y. S., Chang, H. C., Chang, R. S., and Chao, H. C., Routing withadaptive path and limited flooding for mobile ad hoc networks, Computers& electrical engineering, 36(2), (2010), 280-290.

[187] Yi, J., Adnane, A., David, S., and Parrein, B., Multipath optimized link staterouting for mobile ad hoc networks, Ad Hoc Networks, 9(1), (2011), 28-47.

[188] Yu, H., Yao, N., and Liu, J., An adaptive routing protocolin underwater sparse acoustic sensor networks, Ad Hoc Network,http://dx.doi.org/10.1016/j.adhoc.2014.09.016, (2014).

[189] Yu, J., Deng, X., Yu, D., Wang, G., and Gu, X., CWSC:Connectedk-Coverage Working Sets Construction Algorithm in WirelessSensor Networks, AEUE - International Journal of Electronics andCommunications, 67(11), (2013), 937–946.

[190] Yu, J., Wang, N., Wang, G., Yu, D., Connected dominating sets inwireless ad hoc and sensor networks – A comprehensive survey, ComputerCommunications, 36, (2013), 121–134.

[191] Yu, J., Zhang, Q., Yu, D., Chen, C., and Wang, G., Domatic partition inhomogeneous wireless sensor networks, Journal of Network and ComputerApplications, 37, (2014), 186–193.

[192] Yu, R., Wang, X., and Das, K., EEDTC: energy efficient dominatingtree construction in multi-hop wireless networks, Pervasive and MobileComputing, 5, (2009), 318-333.

[193] Yuanyuan, Z., Jia, X., and Yanxiang, H., Energy efficient distributedconnected dominating sets construction in wireless sensor networks,In Proceedings of the 2006 international conference on Wirelesscommunications and mobile computing, (2006), 797-802.

[194] Zeng, Y., Sreenan, C. J., Xiong, N., Yang, L. T., and Park, J. H.,Connectivity and coverage maintenance in wireless sensor networks,Journal of Supercomputing, 52, (2010), 23–46.

[195] Zhang, H. L., Xiong, Y., and Miao, F. Y., Minimum MPR Set Selection:an Improved Ant Colony Optimization Approach, Journal of ChineseComputer Systems, 33(1), (2012), 126-129.

[196] Zhang, S., Wang, Z., Liu, M., and Qiu, M., Energy-aware routing for delay-sensitive underwater wireless sensor networks, Science China InformationSciences, 57(10), (2014), 1-14.

Page 237: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

209

[197] Zhao, J. X., and Sun, G. Z., Energy-Efficient Routing Protocol forUnderwater Acoustic Sensor Networks, Journal of Jilin University(Information Science Edition), 3, (2008), 17.

[198] Zhao, Y., Wu, J., Li, F., and Lu, S., On maximizing the lifetime of wirelesssensor networks using virtual backbone scheduling, IEEE Transactions onParallel and Distributed Systems, 23(8), (2012), 1528-1535.

[199] Zhu, C., Zheng, C., Shu, L., and Han, G., A survey on coverage andconnectivity issues in wireless sensor networks, Journal of Network andComputer Applications, 35, (2012), 619–632.

[200] Zorzi, M., Casari, P., Baldo, N., and Harris, A. F., Energy-efficient routingschemes for underwater acoustic networks, IEEE Journal on Selected Areasin Communications, 26(9), (2008), 1754-1766.

Page 238: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

LIST OF PUBLICATIONS

I - International Journal Publications

1. Ramalakshmi R and Radhakrishnan S, “Improving Route Discovery Using

Stable Connected Dominating Set in MANETS”, International Journal

on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor

Networks (GRAPH-HOC), Volume 4, Number 1, March 2012.

2. R. Ramalakshmi and S. Radhakrishnan, “Weighted Dominating Set based

Routing for Ad Hoc Communications in Emergency and Rescue Scenarios”,

Wireless Networks - Springer, Volume 21, Issue 2, Feb 2015. (IF: 1.055)

3. R. Ramalakshmi and S. Radhakrishnan, “Connected k−Coverage Topology

Control for Area Monitoring in Wireless Sensor Networks”, Wireless

Personal Communications - Springer, doi:10.1007/s11277-015-2675-9.

(IF: 0.979)

II - International Conference Publications

1. R.Ramalakshmi and S. Radhakrishnan, “Energy Efficient Stable Connected

Dominating Set Construction in Mobile Ad hoc Networks”, Lecture

Notes of the Institute for Computer Sciences, Social Informatics and

Telecommunications Engineering, Volume 84, Part 1, 63-72, 2012.

(Scopus Indexed)

2. R.Ramalakshmi and S. Radhakrishnan, “Coverage and

Connectivity Guaranteed Deployment Pattern for WSN”, Lecture

Notes in Electrical Engineering, Volume 131, 341-347, 2013.

(Scopus Indexed)

210

Page 239: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

211

III - Communicated to International Journals

1. Ramalakshmi R and Radhakrishnan S, “Stability based Energy-Efficient

Link-State Hybrid Routing Protocol for Mobile Ad Hoc Networks”,

International Journal of Networks and Computer Applications - Elsevier.

(Under Review)

2. R. Ramalakshmi and S. Radhakrishnan, “An Ego-Centrality and Contact-

Duration based Backbone Routing Protocol for Mobile Opportunistic

Networks”, Ad Hoc Networks - Elsevier. (Under Review)

3. R. Ramalakshmi and S. Radhakrishnan, “ACO-based Connected

Dominating Set for Energy-Efficient Pressure-Aware Routing in Underwater

Acoustic Sensor Networks”, Computer Communications - Elsevier. (Under

Review)

Page 240: APPLICATION OF CONNECTED DOMINATING SET FOR ROUTING …shodhganga.inflibnet.ac.in/bitstream/10603/78520/1/thesis.pdf · 2.5 cds based routing and scheduling in wsn50 2.6 cds based

VITAE

Mrs.R.Ramalakshmi was born on 16th April 1976 to Mr.S.Ramar and

Mrs.R.Krishnammal, at M.Pudupatti in Virudhunagar district. She completed her

schooling in the year 1993. Mrs.R.Ramalakshmi received her under graduate

degree B.Sc (Computer Science) from Madurai Kamaraj University (Tamilnadu,

India) in the year 1996 and got 14th University rank. She received her first post

graduate degree, MCA (Computer Applications) from Madurai Kamaraj University

and obtained first class with distinction in the year 1999. She also received

her second P.G degree in M.E (CSE) in the year 2007 from Anna University

(Tamilnadu, India) and obtained first class with distinction.

Mrs.R.Ramalakshmi worked at Election Department, Secretariat,

Tamilnadu as a Programmer from June 1999 to May 2000. She then worked at

Ayya Nadar Janaki Ammal College, Sivakasi as a lecturer in the Department of

Computer Applications from June 2000 to May 2001. She joined at Arulmigu

Kalasalingam College of Engineering, Srivilliputhur as a lecturer in the Department

of Information Technology in June 2001 and continuing her service in Computer

Science and Engineering Department from December 2006, as Senior Assistant

Professor, after the college has got the deemed university status (Kalasalingam

University). During these 15 years of teaching, she has successfully taken up a

number of teaching and administrative assignments. She has received a Young

Scientist Fellowship and she is also a life member of ISTE and CSI.

Currently she is specializing in the area of routing in Mobile Ad hoc

networks, Wireless Sensor Networks and focusing on application of connected

dominating set for her doctoral work.

212


Recommended