Topological Broadcasting Using Parameter
Sensitivity-Based Logical Proximity Graphs in Coordinated Ground-Flying Ad
Hoc Networks 1Computer Science and Engineering Department 2Computer Science and Engineering Department neerajrathore37@gmail.com Abstract Ad hoc networks have been used in wide range of applications. These networks have become versatile as far implementation is concerned. Such networks have been used from static deployment to mobile network formations. Apart from Mobile Ad Hoc Networks (MANETs) and Vehicular Ad Hoc Networks (VANETs), another ad hoc formation with mobile nodes is the aerial ad hoc networks also termed as Flying Ad Hoc Networks (FANETs). A coordinated network formation between the ground ad hoc network and aerial ad hoc network provides vast applications in both civilian and military activities. Various existing issues of mobile networks can easily be resolved using aerial network formations. However, these networks similar to the traditional ad hoc formations are having a major issue of broadcast storming and network partitioning. These issues hinder the performance of such networks. Broadcast storming refers to replication of similar data in the network that increases the overheads which ultimately leads to network failure. In this paper, broadcast storming is considered as a problem and a possible solution is provided for it by keeping control over network partitioning issues. The proposed approach uses parameter sensitivity which is derived over optimized value of nodes configurations to form a topological arrangement. This topological arrangement is formed using logical proximity graphs which operate over link weight and parameter sensitivity. The proposed route discovery strategy under the proposed approach is capable of handling issues related to broadcast storms without affecting the network performance. Keywords: FANETs, Broadcast storming, Parameter
sensitivity, Routing, Topology +: Corresponding author: Vishal Sharma Journal of Wireless
Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 6, No. 3, pp. 54-72, September 2015 [pdf] |