ArticlePDF Available

Load-Balancing Clusters in Wireless Ad Hoc Networks

Authors:

Abstract

Ad hoc networks consist of a set of identical nodes that move freely and independently and communicate with other node via wireless links. Such networks may be logically represented as a set of clusters by grouping together nodes that are in close proximity with one another. Clusterheads form a virtual backbone and may be used to route packets for nodes in their cluster. Nodes are assumed to have non-deterministic mobility pattern. Clusters are formed by diffusing node identities along the wireless links. Different heuristics employ different policies to elect clusterheads. Several of these policies are biased in favor of some nodes. As a result, these nodes shoulder greater responsibility and may deplete their energy faster, causing them to drop out of the network. Therefore, there is a need for load-balancing among clusterheads to allow all nodes the opportunity to serve as a clusterhead. We propose a loadbalancing heuristic to extend the life of a clusterhead to the maximum budget b...
Load-Balancing Clusters in Wireless Ad Hoc Networks
Alan D. Amis Ravi Prakash
Department of Computer Science
University of Texas at Dallas
Richardson, Texas 75083-0688
Email: aamis@telogy.com, ravip@utdallas.edu
Abstract
Ad hoc networks consist of a set of identical nodes that
move freely and independently and communicate with other
node via wireless links. Such networks may be logically
represented as a set of clusters by grouping together nodes
that are in close proximity with one another. Clusterheads
form a virtual backbone and may be used to route pack-
ets for nodes in their cluster. Nodes are assumed to have
non-deterministic mobility pattern. Clusters are formed
by diffusing node identities along the wireless links. Dif-
ferent heuristics employ different policies to elect cluster-
heads. Several of these policies are biased in favor of some
nodes. As a result, these nodes shoulder greater respon-
sibility and may deplete their energy faster, causing them
to drop out of the network. Therefore, there is a need for
load-balancing among clusterheads to allow all nodes the
opportunity to serve as a clusterhead. We propose a load-
balancing heuristic to extend the life of a clusterhead to the
maximum budget before allowing the clusterhead to retire
and give way to another node. This helps to evenly dis-
tribute the responsibility of acting as clusterheads among
all nodes. Thus, the heuristic insures fairness and stabil-
ity. Simulation experiments demonstrate that the proposed
heuristic does provide longer clusterhead durations than
with no load-balancing.
1. Introduction
Ad hoc networks (also referred to as packet radio net-
works) consist of nodes that move freely and communicate
with other nodes via wireless links. One way to support ef-
ficient communication between nodes is to develop a wire-
less backbone architecture [1, 2, 3, 6]. While all nodes are
identical in their capabilities, certain nodes are elected to
form the backbone. These nodes are called clusterheads and
gateways. Clusterheads are nodes that are vested with the
responsibility of routing messages for all the nodes within
their cluster. Gateway nodes are nodes at the fringe of a
cluster and typically communicate with gateway nodes of
other clusters. The wireless backbone can be used either
to route packets, or to disseminate routing information, or
both.
Nodes in ad hoc networks are powered by batteries be-
cause of their mobile nature. Communications or trans-
missions cause the batteries to be depleted. Therefore, the
amount of communications should be kept to a minimum
to avoid a node dropping out of the network prematurely.
Clusterhead batteries are depleted faster because they are
usually involved in every communication within their clus-
ter. Therefore, there is a need to distribute the responsibility
of being a clusterhead to all nodes (load-balancing). The
proposed heuristic provides load balancing among cluster-
heads to insure a fair distribution of load among cluster-
heads.
2. System Model
In an ad hoc network all nodes are alike and all are mo-
bile. There are no base stations to coordinate the activities
of subsets of nodes. Therefore, all the nodes have to collec-
tively make decisions. All communication is over wireless
links. A wireless link can be established between a pair of
nodes only if they are within wireless range of each other.
We will only consider bidirectional links. It is assumed
the MAC layerwill mask unidirectionallinks and pass only
bidirectional links. Beacons could be used to determine the
presence of neighboring nodes. After the absence of some
number of successive beacons from a neighboring node, it
is concluded that the node is no longer a neighbor. Two
nodes that have a wireless link will, henceforth, be said to
be
1
wireless hop away from each other. They are also said
to be immediate neighbors. Communication between nodes
is over a single shared channel. The Multiple Access with
Collision Avoidance (MACA) protocol [13] may be used
to allow asynchronous communication while avoiding col-
lisions and retransmissions over a single wireless channel.
MACA utilizes a Request To Send/ClearTo Send(RTS/CTS)
handshaking to avoid collision between nodes.
Other protocols such as spatial TDMA [7] may be used
to provide MAC layer communication. Spatial TDMA pro-
vides deterministic performance that is good if the number
of nodes is kept relatively small. However, spatial TDMA
requires that all nodes be known and in a fixed location to
operate. In ad hoc networks the nodes within each neigh-
borhood are not known apriori. Therefore, spatial TDMA
is not a viable solution initially. We suggest that MACA be
used initially for this heuristic to establish clusterheads and
their associated neighborhoods. Then the individualcluster
may transition to spatial TDMA for inter-cluster and intra-
cluster communication.
All nodes broadcast their node identity periodically to
maintain neighborhood integrity. Due to mobility, a node’s
neighborhood changes with time. As the mobility of nodes
may not be predictable, changes in network topology over
time are arbitrary. However, nodes may not be aware of
changes in their neighborhood. Therefore, clusters and
clusterheads must be updated frequently to maintain accu-
rate network topology.
3. Previous Work and Design Choices
There are two heuristic design approaches for manage-
ment of ad hoc networks. The first choice is to have
all nodes maintain knowledge of the network and manage
themselves [5, 9, 10]. This circumvents the need to se-
lect leaders or develop clusters. However, it imposes a sig-
nificant communication responsibility on individual nodes.
Each node must dynamically maintain routes to the rest of
the nodes in the network. With large networks the number
of messages needed to maintain routing tables may cause
congestion in the network. Ultimately this traffic may gen-
erate huge delays in message propagation from one node
to another. This approach will not be considered in the re-
mainder of this paper.
The second approach is to identify a subset of nodes
within the network and vest them with the extra respon-
sibility of being a leader (clusterhead) of certain nodes in
their proximity. The clusterheads are responsible for man-
aging communication between nodes in their own neighbor-
hood as well as routing information to other clusterheads in
other neighborhoods. Typically, backbones are constructed
to connect neighborhoodsin the network. Past solutions of
this kind have created a hierarchy where every node in the
network was no more than
1
hops away from a clusterhead
[1,3,7].
Furthermore, some of the previous clustering solutions
have relied on synchronousclocks for exchange of data be-
tween nodes. In the Linked Cluster Algorithm [1], LCA,
nodes communicate using TDMAframes. Each frame has a
slot for each node in the network to communicate, avoiding
collisions. For every node to have knowledge of all nodes
in it neighborhood it requires
2
n
TDMA time slots, where
n
is the number of nodes in the network. A node
x
be-
comes a clusterhead if at least one of the following condi-
tions is satisfied: (i)
x
has the highest identity among all
nodes within
1
wireless hop of it, (ii)
x
does not have the
highest identity in its
1
-hop neighborhood, but there exists
at least one neighboring node
y
such that
x
is the highest
identity node in
y
’s
1
-hop neighborhood. Thus, LCA has a
definite bias towards higher id nodes while electing cluster-
heads. A pathological case exists for LCA where a group of
nodes are aligned in monotonically increasing order. In this
case all of the nodes in the ordered sequence will become a
clusterhead, generating a large number of clusterheads.
Later the LCA heuristic was revised [4] to decrease the
number of clusterheads produced in the original LCA and to
decrease the number of clusterheads generated in the patho-
logical case. In this revised edition of LCA (LCA2) a node
is said to be covered if it is in the
1
-hop neighborhood of
a node that has declared itself to be a clusterhead. Starting
from the lowest id node to the highest id node, a node de-
clares itself to be a clusterhead if among the non-covered
nodes in its
1
-hop neighborhood, it has the lowest id. So,
LCA2 favorslower id node while electing clusterheads.
Definition 1 (
d
-hop Clusters) -A
d
-hop cluster is one
where no node in a cluster is more than
d
hops away from
its clusterhead.
The LCA heuristics were developed to generate
1
-hop
clusters and intended to be used with small networks of
less than
100
nodes. In this case the delay between node
transmissions is minimal and may be tolerated. However,
as the number of nodes in the network grows larger, LCA
will impose greater delays between node transmissions in
the TDMA communication scheme and may be unaccept-
able. Additionally, it has been shown [11] that as com-
munications increase the amount of skew in a synchronous
timer also increases, thereby degrading the performance of
the overall system or introducing additional delay and over-
head.
The Max-Min heuristic [12] was developed to extend the
notion of
1
-hop clusters and generalizes cluster formation to
d
-hop clusters. The rules for Max-Min heuristic are similar
to those for LCA but converges on a clusterhead solution
much faster at the network layer,
2
d
rounds of messages
exchanges. Once again a node
x
becomes a clusterhead if
at least one of the following conditions is satisfied: (i)
x
has the highest identity among all nodes within
d
wireless
hop of it, (ii)
x
does not have the highest identity in its
d
-
hop neighborhood, but there exists at least one neighboring
node
y
such that
x
is the highest identity node in
y
’s
d
-hop
neighborhood. Max-Min and LCA generate different solu-
tions because in case (ii) for Max-Min if a node becomes
a clusterhead it will consume all nodes that are closer to it
than any other elected clusterhead. This is a major differ-
ence between the two heuristics. However, like LCA, Max-
Min also favors higher id nodes while electing clusterheads.
Other solutions base the election of clusterheads on de-
gree of connectivity [8], not node id. Each node broadcasts
the nodes that it can hear, including itself. A node is elected
as a clusterhead if it is the highest connected node in all of
the uncovered neighboring nodes. In the case of a tie, the
lowest or highest id may be used. As the network topol-
ogy changes this approach can result in a high turnover of
clusterheads [6]. This is undesirable due to the high over-
head associated with clusterhead change over. Data struc-
tures have to be maintained for each node in the cluster. As
new clusterheads are elected these data structures must be
passed from the old clusterhead to the newlyelected cluster-
head. Re-election of clusterheads could minimize this net-
work traffic by circumventing the need to send these data
structures. So Degree based heuristic has no bias towards
any particular nodes while electing clusterheads.
We would like to combine the non-biased selection of
Degree based heuristics with the stability of Max-Min and
LCA(2) heuristics.
4. Contributions
The main objective was to develop an enhancement for
existing heuristics to provide a contiguous balance of load-
ing on the elected clusterheads. Once a node is elected a
clusterhead it is desirable for it to stay as a clusterhead up to
some maximum specified amount of time, or budget. The
budget is a user defined constraint placed on the heuristic
and can be modified to meet the unique characteristics of
the system, i.e., the battery life of individual nodes. Some
of the goals of the heuristic are:
1. Minimize the number and size of the data structures
required to implement the heuristic,
2. Extend the clusterhead duration budget based on an in-
put parameter,
3. Allow every node equal opportunity to become a clus-
terhead in time,
4. Maximize the stability in the network,
5. Load-Balancing (Node ID)
5.1. Data Structures
The data structures necessary for the heuristic consist
of two local variables: Physical ID (PID), and Virtual ID
(VID). The PID is the initial id given and is unique for each
individual node. Initially, the VID is set equal to the PID for
each node. However, this changeswith time to represent the
electability of a node. The VIDs for various nodes may be
the same at certain times.
5.2. Basic Idea
The node id load-balancing heuristic operates on the
principle of a circular queue. That is, the virtual ids of each
non-clusterhead node cycles through the circular queue at a
rate of 1 unit per run of the load-balancing heuristic1.The
circular queue has a minimum value of 1 and a maximum
value of MAX COUNT. Upon reaching MAX COUNT a
node will rotate to a value of 1 on the next cluster election
heuristic run. As the cluster election heuristics run they will
use the VIDs to determine the clusterheads of the network.
In cases where the VIDs are the same the PID is used as a
tie breaker. Once a node is determined to be a clusterhead,
its VID is promoted to a value larger than MAX COUNT
(MAX COUNT + VID). A clusterhead will maintain this
value until it has exhausted its clusterhead duration budget.
At this point it will set its VID to 0, i.e., less than any other
node, and become a normal node.
There are cases where two elected clusterheads
A
and
B
may move within close range of each other causing
B
to give way to
A
prior to
B
exhausting its clusterhead bud-
get. In this case clusterhead
B
lowers its VID to the value it
would have achieved had it not become a clusterhead. That
is,
B
’s VID just prior to becoming elected a clusterhead +
the number of times the cluster election heuristic has run
since
B
became a clusterhead. This will place
B
back into
a place of high electability to insure a quick return as a clus-
terhead. One would probably immediately notice that this
may not be the desired response. One of the main goals of
this heuristic is to provide stability in the network. There-
fore, we may not want node
B
to make a quick return as a
clusterhead. Alternately, node
B
’s VID maybe set to 0 just
as if it had successfully used its clusterhead budget. This
should provide a more dampened response than having the
clusterheads bounce back simply to use up their clusterhead
budget.
5.3. Load-Balancing Pseudo Code
**********************************************
Clusterhead Load-Balancing
If a node is a clusterhead check to see if the budget is
exceeded. If it is then set the VID to 0 and become and
ordinary node, otherwise increment the VID value.
**********************************************
1For clarity, the load-balancing heuristic is an enhancement to the clus-
ter election heuristic and will run whenever the cluster election heuristic is
triggered to run.
cluster load balance()
if (Clusterhead == My Node Id)
if (Budget
>
=MaxBudget)
VID = 0;
Clusterhead = FALSE;
Budget = 0;
elseBudget += Work;
else ++VID;
6. Load-Balancing (Degree)
6.1. Data Structures
The data structures necessary for the heuristic consist
of one local variable: Elected Degree. The Elected De-
gree represents the degree of the node when it was initially
elected a clusterhead. This value will be used for compari-
son purposes described below.
6.2. Basic Idea
Because the Degree based heuristic elects clusterheads
with a different policy than LCA and Max-Min heuristics,
we must use a different load-balancing policy. The degree
load-balancing heuristic monitors the amount of change, or
delta, in the degree of an elected clusterhead from the time
it is elected a clusterhead. That is, on each run of the heuris-
tic the difference is take between the current degree of the
clusterhead and the Elected Degree. If the absolute value of
the difference exceeds an input value MAX DELTA, then
the clusterhead is demoted to an ordinary node. The De-
gree based heuristic, much like the LCA2 heuristic, does
not allow for adjacent clusterheads. Therefore, there may be
cases where an elected clusterhead will give way to another
clusterhead based on the heuristic and noton exceeding the
MAX DELTA par ameter.
6.3. Load-Balancing Pseudo Code
**********************************************
Clusterhead Load-Balancing
If a node is a clusterhead check to see if it has exceeded
MAX DELTA. If it has then set it to and ordinary node.
**********************************************
cluster load balance()
if (Clusterhead == My Node Id)
if (ABS(My Degree-Elected Degree)
>
=MAX DELTA)
Clusterhead = FALSE;
7. Simulation Experiments and Results
We conducted simulation experiments to evaluate the
performance of the proposed heuristic. The load-balancing
heuristic was implemented into 4 cluster election heuris-
tics: the Max-Min heuristic [12], the Linked Cluster Al-
gorithm (LCA) [1], the revised LCA (LCA2) [4], and the
Highest-Connectivity (Degree) [8, 6] heuristic. These sim-
ulation results were then compared against similar results
produced by the cluster election heuristics running without
load-balancing. We assumed a variety of systems running
with 100, 200, 400, and 600 nodes to simulate ad hoc net-
works with varying levels of node density. Two nodes are
said to have a wireless link between them if they are within
communication range of each other. The performance was
simulated with the communicationrange of the nodes set to
20, 25 and 30 length units. Additionally, the span of a clus-
ter,
i:e:
, the maximum number of wireless hops between a
node and its clusterhead (
d
) was set to 2 and then 3 for each
of the simulation combinations above. The entire simula-
tion was conducted in a
200
200
unit region. Initially, each
node was assigned a unique node id and (
x
,
y
) coordinates
within the region. The nodes were then allowed to move at
random in any direction at a speed of not greater than 1/2
the wireless range of a node per second. The simulation ran
for 2000 seconds, and the network was sampled every 2 sec-
onds. At each sample time the proposed load-balancing and
cluster election heuristic was run to determine clusterheads
and their associated clusters. For every simulation run a
number of performance metrics were measured for the 2000
seconds of simulation. The main simulation metric mea-
sured was Clusterhead Duration, and provided a basis for
evaluating the performance of the proposed load-balancing
heuristic.
Definition 2 (Clusterhead Duration) - The mean time for
which once a node is elected as a clusterhead, it stays as
a clusterhead. This statistic is a measure of stability, the
longer the duration the more stable the system.
As described in Section 5.2, the load-balancingheuristic
has several customizable approaches. For example, once
a clusterhead loses its leadership role before exhausting its
clusterhead budget, it may set the node’s new virtual id to
0
,
or its Old Virtual id + Number of runs of the heuristic since
it was elected a clusterhead. Additionally, the clusterhead
budget may be a function of (i) contiguous times elected as
a clusterhead, (ii) maximum amount of work performed or
load, (iii) minimum amount of work performed or idle, (iv)
or any combination of these. Work is calculated to be the
summation of the number of nodes in the cluster times the
sample period. That is,
Work
=
n
X
i
=1
sample period dur ation
i
cluster size
i
For the purposes of these simulations we have set the
clusterhead budget to be a function of the maximum amount
of work it performs (5000 units of Work). That is, once a
clusterhead becomes a clusterhead it will remain a cluster-
head until it has exhausted it maximum work load, or until
it loses out to another clusterhead based on the rules of the
cluster election heuristic. Once a clusterhead does lose its
leadership role to another clusterhead its new virtual id is
set to its old virtual id + the number of runsof the heuristic
since becoming a clusterhead.
Figure 1 shows the clusterhead durations for the Max-
Min heuristic with and without load-balancingapplied. The
load-balancing makes a noticeable difference in the cluster-
head duration (ranging from
14%
to
28%
). Furthermore, the
variance of the clusterhead duration without load-balancing
applied is more than
500%
greater than with load-balancing.
This shows that while the load-balancing heuristics gen-
erates longer clusterhead durations, it also produces much
tighter and more deterministic responses (stability). These
results are not surprising, as mentioned earlier the Max-
Min heuristic favors the election of larger ids. Therefore,
once a clusterhead is elected it will stay a clusterhead for
a maximum of the programmed budget. This will provide
the longer clusterhead durations that we see. The load-
balancing heuristic is continuously rotating ordinary nodes
into the position of becoming a clusterhead. Therefore,
once a clusterhead budget is exceeded, a different cluster-
head is elected and the process repeats. This provides the
load-balancing effect of distributing the responsibility of
being a clusterhead among all nodes.
Figure 2 shows the clusterhead durations for the LCA
heuristic with and without load-balancing applied. The
clusterhead duration for LCA is only slightly greater with-
out load-balancing than with it. At first glance this may
appear that the load-balancing is a hindrance rather than
a help. However, we see that the variance of clusterhead
duration for LCA without load-balancing is
400%
larger
than with load-balancing. Therefore, while LCA with load-
balancing produces slightly shorter clusterhead durations,
load-balancing once again, provides a much tighter and
more deterministic response (stability).
Figure 3 shows the clusterhead durations for the revised
LCA heuristic (LCA2) with and withoutload-balancing ap-
plied. The clusterhead duration with load-balancing show
a
25%
improvement over without load-balancing. Further-
more, the variance with load-balancing applied is greatly
improved over without load-balancing, showing an im-
provement of better than
500%
. Therefore, load-balancing
once again, provides a larger clusterhead duration and a
much tighter and more deterministic response (stability).
Again, just as with the Max-Min heuristic, the LCA2
heuristic is biased towards certain node ids (lower node ids).
Therefore, it is not surprising that the LCA2 heuristic pro-
duces results quite similar to that of the Max-Min heuristic.
Figure 4 shows the clusterhead durations for the Degree
based heuristic with and without load-balancing applied.
For this simulation we have set the MAX DELTA value
to
10
. The load-balancing has produced a noticeable im-
provement in the clusterhead duration (better than
200%
).
However, the variance of the clusterhead duration without
load-balancing is less than that with load-balancing. By ex-
amining the clusterhead duration without load-balancing we
see that it is between 2 and 3. This happens to be approx-
imately equal to the sample rate of the simulation, 2 sec-
onds. Therefore, what we are observing is that clusterheads
exist for only a single snapshot of the simulation and then
give way to another node. The variance will be small be-
cause each clusterhead is only serving as a clusterhead for
one snapshot, on the average. While we want each node to
serve as a clusterhead, we would like for each node to stay
a clusterhead for some period of time. In this case longer
than one snapshot. With this knowledge, the variance of
the Degree based heuristic with load-balancing is actually
quite good and provides a much needed larger clusterhead
duration.
8. Conclusion
Two clusterhead load-balancing heuristics have been
proposed for ad hoc networks. The first heuristic is for clus-
ter election heuristics that favor the election ofclusterheads
based on node id. Here the heuristic places a budget on the
contiguous amount of time that a node stays a clusterhead.
As seen from the simulation results, this heuristic produces
larger clusterhead durations while decreasing the variance,
increased stability. The second heuristic is for cluster elec-
tion heuristics that favor the election of clusterheads based
on the degree of connectivity. A clusterhead stays a clus-
terhead as long as its degree of connectivity is within a spe-
cific range. The Degree based heuristic was simulated with
this load-balancing heuristic. The simulation results show
a much needed increase in clusterhead duration while still
maintaining a low variance.
6.5
7
7.5
8
8.5
9
9.5
10
10.5
100 150 200 250 300 350 400 450 500 550 600
Average Cluster Head Duration (seconds)
Number of Nodes in the System
Cluster Head Duration in 2 Hop Count, 25 Range System
max
max_lb
0
200
400
600
800
1000
1200
1400
1600
1800
100 150 200 250 300 350 400 450 500 550 600
Cluster Head Duration Variance
Number of Nodes in the System
Cluster Head Duration in 2 Hop Count, 25 Range System
max
max_lb
Figure 1. Clusterhead duration and variance, Max-Min.
2.6
2.8
3
3.2
3.4
3.6
3.8
4
4.2
4.4
4.6
4.8
100 150 200 250 300 350 400 450 500 550 600
Average Cluster Head Duration (seconds)
Number of Nodes in the System
Cluster Head Duration in 2 Hop Count, 25 Range System
lca
lca_lb
0
50
100
150
200
250
300
350
400
100 150 200 250 300 350 400 450 500 550 600
Cluster Head Duration Variance
Number of Nodes in the System
Cluster Head Duration in 2 Hop Count, 25 Range System
lca
lca_lb
Figure 2. Clusterhead duration and variance, LCA.
3.5
4
4.5
5
5.5
6
6.5
100 150 200 250 300 350 400 450 500 550 600
Average Cluster Head Duration (seconds)
Number of Nodes in the System
Cluster Head Duration in 2 Hop Count, 25 Range System
lca2
lca2_lb
0
100
200
300
400
500
600
700
100 150 200 250 300 350 400 450 500 550 600
Cluster Head Duration Variance
Number of Nodes in the System
Cluster Head Duration in 2 Hop Count, 25 Range System
lca
lca_lb
Figure 3. Clusterhead duration and variance, LCA2.
2
2.5
3
3.5
4
4.5
5
5.5
6
6.5
7
100 150 200 250 300 350 400 450 500 550 600
Average Cluster Head Duration (seconds)
Number of Nodes in the System
Cluster Head Duration in 2 Hop Count, 25 Range System
degree
degree_lb
0
5
10
15
20
25
30
35
40
100 150 200 250 300 350 400 450 500 550 600
Cluster Head Duration Variance
Number of Nodes in the System
Cluster Head Duration in 2 Hop Count, 25 Range System
degree
degree_lb
Figure 4. Clusterhead duration and variance, Degree.
References
[1] D. J. Baker and A. Ephremides. The Architectural Or-
ganization of a Mobile Radio Network via a Distributed
Algorithm. IEEE Transactions on Communications,
COM-29(11):1694–1701,November 1981.
[2] D.J. Baker, A. Ephremides, and J. A. Flynn. The De-
sign and Simulation of a Mobile Radio Network with
Distributed Control. IEEE Journal on Selected Areas
in Communications, pages 226–237, 1984.
[3] B. Das and V. Bharghavan. Routing in Ad-Hoc Net-
works Using Minimum Connected DominatingSets. In
Proceedings of ICC, 1997.
[4] A. Ephremides, J. E. Wieselthier, and D. J. Baker. A
Design Concept for Reliable Mobile Radio Networks
with Frequency Hopping Signaling. Proceedings of
IEEE, 75(1):56–73, 1987.
[5] E. Gafni and D. Bertsekas. Distributed Algorithms for
Generating Loop-free Routes in Networks with Fre-
quently Changing Topology. IEEE Transactions on
Communications, pages 11–18, January 1981.
[6] M. Gerla and J. T.-C. Tsai. Multicluster, mobile, multi-
media radio network. ACM Baltzer Journal of Wireless
Networks, 1(3):255–265, 1995.
[7] L. Kleinrock and J. Silvester. Spatial Reuse in Multi-
hop Packet Radio Networks. Proceedings of the IEEE,
75(1):156–167, January 1987.
[8] Abhay K. Parekh. Selecting Routers in Ad-Hoc Wire-
less Networks. In ITS, 1994.
[9] V. D. Park and M. S. Corson. A Highly Adaptive Dis-
tributed Routing Algorithm for Mobile Wireless Net-
works. In Proceedings of IEEE INFOCOM, April 1997.
[10] C.E. Perkins and P. Bhagwat. Highly Dy-
namic Destination-Sequenced Distance-Vector Routing
(DSDV) for Mobile Computers. In Proceedings of
ACM SIGCOMM Conference on Communication Ar-
chitectures, Protocols and Applications, pages 234–
244, August 1994.
[11] Jennifer Lundelius and Nancy Lynch. An Upper and
Lower Bound for Clock Synchronization. Information
and Control, Vol. 62 1984.
[12] A. Amis, R. Prakash, T. Vuong, and D.T. Huynh. Max-
Min D-Cluster Formation in Wireless Ad Hoc Net-
works. In Proceedings of IEEE INFOCOM, March
1999.
[13] A. Tanenbaum. Computer Networks(
3
rd
Edition).
Prentice Hall, Upper Saddle River, N.J., 1996.
... Load Balancing Clustering [13][14], which believe that there is an optimum number of mobile nodes that a cluster can handle. This algorithm is replace the current cluster head with a new cluster head if the current cluster head cannot satisfy the node degree requirement. ...
Article
Full-text available
The mobile ad hoc networks (MANETs) are gaining popularity in recent years due to their flexibility and they can be deployed at any location without pre-existing infrastructure. They are used in various contexts such as collaborative, military application or in emergency services. Now a days clustering is a challenging issue in MANETs for addressing efficient resource utilization and must strike a balance between mobility, battery power, node degree, etc. In this paper, we consider the various approaches for clustering have been presented and different approaches focus on different performance metrics. Each cluster contain a particular node called as cluster head which is elected as cluster head according to the specific metric or combination of metrics such as mobility, energy, degree, density, weight etc. In this survey paper we study some clustering schemes such as Mobility based clustering, Energy efficient clustering, Load balancing clustering, and Combined-metrics based clustering.
Article
Full-text available
Wireless Body Area networks (WBANs) have been adopted extensively in academic and industrial research and development in recent years. WBANs promise to provide a suitable environment for remote patient monitoring and enable caregivers to intervene in case of abnormal health conditions. However, WBANs sensors are resource-constrained and face challenges, including, for instance, sensor energy harvesting, efficient routing, parent node selection in case of two hubs links, and data security. The stringent healthcare requirements burden managing WBAN resources and sensor functionality. In this research work, we tackle the issue of total energy consumption, communication overhead, and the lifespan of WBAN. We study the effect of routing and parent node selection on the network lifespan. The study considers a cluster-based routing protocol to establish a WBAN. This approach divides the network into clusters, where each cluster consists of a cluster head called a Relay Node (RN) and a set of functional sensors. Each RN collects data from its sensor nodes and sends it to a base station. However, the relay nodes are susceptible to failures at any time due to the challenging deployment environments and resource constraints of the nodes. In addition, the network sensors are dynamic in positions due to user body movements. Therefore, improving the robustness, fault management, and reliability at different postures becomes necessary. We propose a mobility-aware, energy-efficient Hybrid Fault-Management Clustering Algorithm (HFMCA) adopting the Weighted Bipartite Graph (WBG) to handle the vulnerable RNs prone to failure. The WBG helps find the optimum path between the vulnerable RN and its members to the sink node while maintaining minimum energy consumption and transmission costs. Finally, we conducted extensive experiments, and the simulation results illustrate the proposed algorithm’s efficiency in WBANs regarding energy consumption, network lifespan, and communication overhead.
Article
A tactical network facilitates the secret of communication and information sharing among military intelligence force units where they are located in different locations in the problem area. In that environment, soldiers are moved from one place to another, making its challenge to maintain reliable communication and route establishment between military tactical force groups. To resolve this problem, We suggested the Intelligent Water Drops(IWD) Algorithm, however, this research can sometimes reduce its clustering quality in terms of energy there in form of higher cluster number creation, and an efficient routing path is not executed successfully. As a result, we proposed Modified-IWD(M-IWD) address these issues. To maintain a healthy balance of energy between clusters, the mobile sink is used. The recluster phase is proposed, which is entirely predicated mostly on the residual level of energy of network nodes to balance the energy of the inner clusters. This suggested research work focuses on optimum clustering while taking into account various QoS parameters. The cluster head was chosen depending on the fitness parameters although it first chose the optimum cluster. The experimental results of this research are examined through a Network simulator 2(NS 2), yet it is demonstrated also the presented work outperforms the existing algorithm IWD.
Article
This article has been withdrawn: please see Elsevier Policy on Article Withdrawal (https://www.elsevier.com/about/our-business/policies/article-withdrawal). This article has been withdrawn as part of the withdrawal of the Proceedings of the International Conference on Emerging Trends in Materials Science, Technology and Engineering (ICMSTE2K21). Subsequent to acceptance of these Proceedings papers by the responsible Guest Editors, Dr S. Sakthivel, Dr S. Karthikeyan and Dr I. A. Palani, several serious concerns arose regarding the integrity and veracity of the conference organisation and peer-review process. After a thorough investigation, the peer-review process was confirmed to fall beneath the high standards expected by Materials Today: Proceedings. The veracity of the conference also remains subject to serious doubt and therefore the entire Proceedings has been withdrawn in order to correct the scholarly record.
Article
Full-text available
Mobile applications have been increasingly adopted in monitoring and tracking systems such as health tracking systems for elderly and chronic patients. Due to the ubiquitous nature of smartphones, using smartphones in such tracking systems would be time and cost-effective. However, the limited battery capacity in smartphones could cause an interruption in reporting the tracking information, especially when users spend a long time without recharging batteries. Continuous tracking could be critically important, especially for the elderly and patients with serious illnesses. In this paper, we develop a mobile application for Android smartphones that report the location and health information cooperatively using the CEET clustering protocol. On the server-side, we exploited the Google Firebase real database that receives the users’ tracking information and can notify the data changes within milliseconds. We present a performance evaluation of the system through real experiments using the developed application. The results show the outstanding performance of the proposed approach in reducing the tracking energy (by around 55%). The developed app does not require any modification neither to the manufacturing specifications of the smartphones nor to the established wireless environment. The user just needs to install the app to his/her smartphones using apk file or from the Google play.
Article
Full-text available
محدوديت انرژي يكي از چال شهاي اساسي در شبك ههاي حسگر بي سيم است كه طول عمر شبكه را به صورت مستقيم تحت تأثير قرار مي دهد. يك راه حل بهبود كارايي عمومي شبكه و توزيع يكنواخت انرژي در آن، خوشه بندي گره هاي شبكه است. انتخاب تعداد خوش هها براي رسيدن به يك گذردهي كاراي شبكه كاري بس دشوار است زيرا با افزايش تعداد سرخوشه ها، براي رسيدن بسته از مبدأ به مقصد، تعداد پرش هاي زيادي مي بايست صورت گيرد. افزايش تعداد پر شها باعث پردازش بيشتر اطلاعات و افزايش مصرف انرژي مي گردد. اين مقاله، يك روش خوشه بندي را با آگاهي از مكان و انرژي گره ها ارائه م ينمايد كه سعي در تشكيل خوش ههايي با اندازه بهينه و انتخاب سرخوشه بر اساس سطح انرژي گره ها به منظور كاهش مصرف انرژي دارد. روش پيشنهادي محيط شبكه را به دواير متحدالمركزي تقسيم كرده و تعداد خوشه بهينه هر دور را به نحوي كه مصرف انرژي شبكه بهبود يابد محاسبه مي كند. در همين رأستا از الگوريتم شايعه پراكني به منظور تبادل انرژي بين گره ها استفاده مي نمايد. كارايي بهتر اين روش از لحاظ افزايش طول عمر مفيد شبكه از طريق شبي هسازي بررسي شده ASH در مقايسه با رو شهاي پيشين نظير ASH است. روش پيشنهادي از نظر طول عمر شبكه در حدود 25 % تا 40 % روش را بهبود بخشيده است.
Article
Cloud computing and smart gadgets are the need of smart world these days. This often leads to latency and irregular connectivity issues in many situations. In order to overcome this issue, an emerging technique of fog computing is used for cloud and smart devices. A decentralized computing infrastructure in which all the elements, that is, storage, compute, data and the applications in use, are passed in an efficient and logical place between cloud and the data source, is called Fog computing. The cloud computing and services are generally extended by fog computing, which brings the power and advantages of data creation and data analysis at the network edge. Real‐time location based services and applications with mobility support are enabled due to the physical proximity of users and high speed internet connection to the cloud. Fog computing is promoted with leveraging load balancing techniques so as to balance the load which is done in two ways, that is, static load balancing and dynamic load balancing. In this paper, different load balancing algorithms are discussed and their comparative analysis has been carried out. Round Robin load balancing is the simplest and easiest load balancing technique to be implemented in fog computing environments. The major problem of Source IP Hash load balancing algorithm is that each change can redirect to anyone with a different server, and thus, is least preferred in fog networks. The mechanisms to make energy efficient load balancing are also considered as the part of this paper.
Article
Full-text available
We consider the problem of maintaining communication between the nodes of a data network and a central station in the presence of frequent topological changes as, for example, in mobile packet radio networks. We argue that flooding schemes have significant drawbacks for such networks, and propose a general class of distributed algorithms for establishing new loop-free routes to the station for any node left without a route due to changes in the network topology. By virtue of built-in redundancy, the algorithms are typically activated very infrequently and, even when they are, they do not involve any communication within the portion of the network that has not been materially affected by a topological change.
Article
In this paper we consider the problem of organizing a set of mobile, radio-equipped nodes into a connected network. We require that a reliable structure be acquired and maintained in the face of arbitrary topological changes due to node motion and/or failure. We also require that such a structure be achieved without the use of a central controller. We propose and develop a self-starting, distributed algorithm that establishes and maintains such a connected architecture. This algorithm is especially suited to the needs of the HF Intra-Task Force (ITF) communication network, which is discussed in the paper.
Article
The problem of synchronizing clocks of processes in a fully connected network is considered. It is proved that, even if the clocks all run at the same rate as real time and there are no failures, an uncertainty of ε in the message delivery time makes it impossible to synchronize the clocks of n processes any more closely than ε(1−1/n). A simple algorithm is given that achieves this bound.
Conference Paper
An ad hoc network may be logically represented as a set of clusters. The clusterheads form a d-hop dominating set. Each node is at most d hops from a clusterhead. Clusterheads form a virtual backbone and may be used to route packets for nodes in their cluster. Previous heuristics restricted themselves to 1-hop clusters. We show that the minimum d-hop dominating set problem is NP-complete. Then we present a heuristic to form d-clusters in a wireless ad hoc network. Nodes are assumed to have a non-deterministic mobility pattern. Clusters are formed by diffusing node identities along the wireless links. When the heuristic terminates, a node either becomes a clusterhead, or is at most d wireless hops away from its clusterhead. The value of d is a parameter of the heuristic. The heuristic can be run either at regular intervals, or whenever the network configuration changes. One of the features of the heuristic is that it tends to re-elect existing clusterheads even when the network configuration changes. This helps to reduce the communication overheads during transition from old clusterheads to new clusterheads. Also, there is a tendency to evenly distribute the mobile nodes among the clusterheads, and evently distribute the responsibility of acting as clusterheads among all nodes. Thus, the heuristic is fair and stable. Simulation experiments demonstrate that the proposed heuristic is better than the two earlier heuristics, namely the LCA and degree-based solutions
Conference Paper
We present a new distributed routing protocol for mobile, multihop, wireless networks. The protocol is one of a family of protocols which we term “link reversal” algorithms. The protocol's reaction is structured as a temporally-ordered sequence of diffusing computations; each computation consisting of a sequence of directed link reversals. The protocol is highly adaptive, efficient and scalable; being best-suited for use in large, dense, mobile networks. In these networks, the protocol's reaction to link failures typically involves only a localized “single pass” of the distributed algorithm. This capability is unique among protocols which are stable in the face of network partitions, and results in the protocol's high degree of adaptivity. This desirable behavior is achieved through the novel use of a “physical or logical clock” to establish the “temporal order” of topological change events which is used to structure (or order) the algorithm's reaction to topological changes. We refer to the protocol as the temporally-ordered routing algorithm (TORA)
Conference Paper
We impose a virtual backbone structure on the ad-hoc network, in order to support unicast, multicast, and fault-tolerant routing within the ad-hoc network. This virtual backbone differs from the wired backbone of cellular networks in two key ways: (a) it may change as nodes move, and (b) it is not used primarily for routing packets or flows, but only for computing and updating routes. The primary routes for packets and flows are still computed by a shortest-paths computation; the virtual backbone can, if necessary provide backup routes to handle interim failures. Because of the dynamic nature of the virtual backbone, our approach splits the routing problem into two levels: (a) find and update the virtual backbone, and (b) then find and update routes. The key contribution of this paper is to describe several alternatives for the first part of finding and updating the virtual backbone. To keep the virtual backbone as small as possible we use an approximation to the minimum connected dominating set (MCDS) of the ad-hoc network topology as the virtual backbone. The hosts in the MCDS maintain local copies of the global topology of the network, along with shortest paths between all pairs of nodes
Article
A new architecture for mobile radio networks, called the linked cluster architecture, is described, and methods for implementing this architecture using distributed control techniques are presented. We illustrate how fully distributed control methods can be combined with hierarchical control to create a network that is robust with respect to both node loss and connectivity changes. Two distributed algorithms are presented that deal with the formation and linkage of clusters and the activation of the network links. To study the performance of our network structuring algorithms, a simulation model was developed. The use of Simula to construct, software simulation tools is illustrated. Simulation results are shown for the example of a high frequency (HF) intratask force (ITF) communication network.
Article
The design of a packet radio network must reflect the operational requirements and environmental constraints to which it is subject. In this paper, we outline those features that distinguish the High Frequency (HF) Intra Task Force (ITF) Network from other packet radio networks, and we present a design concept for this network that encompasses organizational structure, waveform design, and channel access. Network survivability is achieved through the use of distributed network control and frequency hopping spread-spectrum signaling. We demonstrate how the execution of the fully distributed Linked Cluster Algorithm can enable a network to reconfigure itself when it is affected by connectivity changes such as those resulting from jamming. Additional resistance against jamming is provided by frequency hopping, which leads naturally to the use of code division mutiple access (CDMA) techniques that permit the simultaneous successful transmission by several users. Distributed algorithms that exploit CDMA properties have been developed to schedule contention-free transmissions for much of the channel access in this network. Contention-based channel access protocols can also be implemented in conjunction with the Linked Cluster network structure. The design concept presented in this paper provides a high degree of survivability and flexibility, to accommodate changing environmental conditions and user demands.
Article
Multihop packet radio networks present many challenging problems to the network analyst and designer. The communication channel, which must be shared by all of the network users, is the critical system resource. In order to make efficient use of this shared resource, a variety of channel access protocols to promote organized sharing have been investigated. Sharing can occur in three domains: frequency, time, and space. This paper is mostly concerned with sharing and channel reuse in the spatial domain. A survey of results on approaches to topological design and associated channel access protocols that attempt to optimize system performance by spatial reuse of the communication channel is presented.