Abstract
Aims and Objectives: Mobile Ad hoc Networks (MANET) hold a set of numerous mobile computing devices useful for communication with one another with no centralized control. Due to the inherent features of MANET such as dynamic topology, constrained on bandwidth, energy and computing resources, there is a need to design the routing protocols efficiently. Flooding is a directive for managing traffic since it makes use of only chosen nodes for transmitting data from one node to another. This paper intends to develop a new Cluster-Based Flooding using the Fuzzy Logic Scheme (CBF2S).
Methods: To construct clusters and choose proper cluster heads (CHs), the fuzzy logic approach is applied with the use of three parameters namely link quality, node mobility, and node degree. The presented model considerably minimizes the number of retransmissions in the network.
Results: The presented model instructs the cluster members (CM) to flood the packets inside a cluster which is known as intra-cluster flooding and CHs to flood the packets among the clusters which is known as inter-cluster flooding. In addition, the gateway sends a packet to another gateway for minimizing unwanted data retransmissions when it comes under different CH. The presented CBF2S is simulated using the NS2 tool under the presence of varying hop count.
Conclusion: The CBF2S model exhibits maximum results over the other methods in terms of overhead, communication overhead, traffic load, packet delivery ratio, and the end to end delay.
Keywords: MANET, flooding, clustering, fuzzy logic, mobility, CBF2S.
Graphical Abstract
[http://dx.doi.org/10.1023/A:1020712802004]
[http://dx.doi.org/10.1145/313239.313291]
[http://dx.doi.org/10.1109/MCSA.1999.749281]
[http://dx.doi.org/10.1145/313451.313525]
[http://dx.doi.org/10.1109/TR.2019.2915800]
[http://dx.doi.org/10.1016/j.jpdc.2004.09.006]
[http://dx.doi.org/10.1109/JSAC.2007.070119]
[http://dx.doi.org/10.1109/LCOMM.2013.040213.130076]
[http://dx.doi.org/10.1109/ACCESS.2016.2623238]
[http://dx.doi.org/10.1109/ACCESS.2017.2707537]
[http://dx.doi.org/10.1109/JSAC.2004.829353]
[http://dx.doi.org/10.1002/dac.3953]
[http://dx.doi.org/10.1007/s12083-019-00805-4]
[http://dx.doi.org/10.1109/JSYST.2015.2406756]
[http://dx.doi.org/10.1007/978-3-030-20816-5_8]
[http://dx.doi.org/10.1049/iet-net.2017.001]]
[http://dx.doi.org/10.1093/comjnl/bxn051]
[http://dx.doi.org/10.1109/ICC.2006.255626]
[http://dx.doi.org/10.1109/JCN.2009.6391330]
[http://dx.doi.org/10.1049/iet-net.2013.0050]
[http://dx.doi.org/10.1109/CC.2015.7224693]
[http://dx.doi.org/10.1109/INVENTIVE.2016.7823290]
[http://dx.doi.org/10.1109/TELFOR.2016.7818741]
[http://dx.doi.org/10.1002/dac.3811]