Random Topology Generation for Ad-hoc Networks | ||||
Menoufia Journal of Electronic Engineering Research | ||||
Article 14, Volume 26, Issue 2, July 2017, Page 539-550 | ||||
Document Type: Original Article | ||||
DOI: 10.21608/mjeer.2017.63631 | ||||
View on SCiNiTO | ||||
Authors | ||||
Ibrahim Fayed; Mokhtar A. Mohamed; Gamal Attiya; Nawal El-Fishawy | ||||
Dept. of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Egypt | ||||
Abstract | ||||
The deployment of Ad-hoc network is crucial for confined area, military, and emergency application. So, topology generation of connected Ah-hoc network is vital for dealing with such networks. Simulation tool is very important for ad hoc networks topology generation due to the expensive and difficulty of real experiments. In this paper we reviewed some of the available methods that concerned with the generation of Ad-hoc random graphs indicating their weakness. Two proposals for topology generation are presented and discussed in this paper. The proposed algorithms enable the user to generate various graphs by deciding 1) the number of nodes, 2) the radio range and 3) the minimum distance between any two nodes in the graph. The results show that the proposed algorithms are faster, accurate, and dependable than the traditional method. | ||||
References | ||||
auto; -webkit-text-stroke-width: 0px; [1] M. Rath, B. K. Pattanayak, and B. Pati, “Energy Efficient MANET Protocol Using Cross Layer Design for Military Applications”, Defence Science Journal Def. Sc. Jl., vol. 66, no. 2, p. 146, 2016. [2] C. Cambra, S. Sendra, J. Lloret, and L. Parra, “Ad hoc Network for Emergency Rescue System based on Unmanned Aerial Vehicles”, Network Protocols and Algorithms, vol. 7, no. 4, p. 72, 2015. [3] S. Kaur, S. Kaur, and C. Sharma, “An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison of Routing Protocols.”, IOSR-JCE IOSR Journal of Computer Engineering, vol. 11, no. 5, pp. 7– 11, 2013. [4] R. Ramanathan and J. Redi, “A brief overview of ad hoc networks: challenges and directions.”, IEEE Commun. Mag. IEEE Communications Magazine, vol. 40, no. 5, pp. 20–22, 2002. [5] S. Kumar and K. Dutta, “Securing Mobile Ad Hoc Networks: Challenges and Solutions”, International Journal of Handheld Computing Research, vol. 7, no. 1, pp. 26–76, 2016. [6] K. Calvert, M. Doar, and E. Zegura, “Modeling Internet topology.”, IEEE Communications Magazine, vol. 35, no. 6, pp. 160–163, 1997. [7] A. Medina, A. Lakhina, I. Matta, and J. Byers, “BRITE: an approach to universal topology generation.”, In Proceedings of the International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), 2001. [8] D. P. Bertsekas, Data Networks, Chapter 5, pp. 401, Prentice Hall, 2nd ed., 1991. [9] M. Jorgic, I. Stojmenovic, M. Hauspie and D. Simplot-Ryl. "Localized algorithms for detection of critical nodes and links for connectivity in ad hoc networks.", Mediterranean Ad Hoc Networking Workshop,2004. [10] T. Camilo, J. Silva, A. Rodrigues, and F. Boavida, “GENSEN: A Topology Generator for Real Wireless Sensor Networks Deployment.”, Software 0px; "> Technologies for Embedded and Ubiquitous Systems Lecture Notes in Computer Science, pp. 436–445, 2007. [11] Furuzan Atay, and Ivan Stojmenovic "Generating random graphs for wireless actuator networks.", IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2007. [12] V. Shakhov, O. Sokolova, and A. Yurgenson, “A Fast Method for Network Topology Generating.”, Multiple Access Communications Lecture Notes in Computer Science, pp. 96–101, 2014. | ||||
Statistics Article View: 175 |
||||