- Open Access
Address allocation for MANET merge and partition using cluster based routing
© Singh et al.; licensee Springer. 2014
Received: 8 May 2014
Accepted: 1 October 2014
Published: 16 October 2014
Network merges and partitions occur quite often in MANET wherein address auto-configuration is a critical requirement. There are various approaches for address auto-configuration in MANETs which allocate address to the nodes in a dynamic and distributed manner in which HOST ID and MANET ID are assigned on the basis of their Base value. MANET merges and partitions employing Cluster Based Routing Protocol require a node to be assigned as the Cluster Head (CH). This paper presents the Election Algorithm which assigns a node as the Cluster Head on the basis of its weight. Through simulation using the NS-2, it has been shown that the Election Algorithm improves the packet delivery ratio (PDR) significantly and decreases the packet delay to a great extent in comparison to the existing AODV protocol.
Mobile Ad hoc Network (MANET) is dependent on the wireless technology and thus relies on the wireless transmitting devices. Wireless channels are used for communication among these devices without any assistance from fixed or structured infrastructure. The network consists of only nodes, and thus central management of the network is not necessary in guiding the nodes on how to communicate. The nodes act as routers and cooperate among themselves to facilitate communication. There are various applications in which the ad hoc networks can be used. These include the military operations, disaster situations etc. Additionally, MANET’s can be used in the local mobile connectivity, Educational applications and Wireless Sensor Networks among others.
Network interfaces for the deployment of MANET’s in various applications require the support of the network routing protocol. The primary requirement of any network is the delivery of correct message within time between the nodes and a routing protocol ensures the establishment of the route between them. Further, the functionalities of the network are completely dependent on the IP addresses of the nodes. It is also critical to ascertain if some nodes within the network have a similar IP address as it can inhibit the smooth functioning of the network.
There is a limitation of manual allocation of unique identifier due to random movement of nodes which leads to frequent changes in topology. This issue could be overcome through the address auto-configuration approach. (Indrasinghe et al.2007).
Topology change- In MANET’s nodes are mobile and could join and leave the network at any moment without notification. While designing an auto configuration mechanism this dynamism of network topology should be considered.
Network Partitioning and Merging- The movement of nodes of an ad hoc network could divide the network in two or more disconnected networks, which is called network partitioning. These partitions or other mobile networks could remerge later. The auto-configuration protocol should be able to deal with these situations and the resulting address conflicts or address leaks (Webhi 2005).
This paper considers address allocation through auto-configuration. It assigns IP addresses automatically and also gives the characteristic comparison of the stateless, stateful and hybrid protocols. For handling the frequent partitioning and merging of network due to high mobility of the nodes, a hybrid routing technique named Election Algorithm for selecting Cluster Head (CH) is proposed. It is also shown that clustering structure decreases routing control overhead, improve the network scalability, mobile coverage reliability and cluster head reliability. Results of our simulation show that there has been significant increase in PDR and considerable decrease in packet delay. Paper is organized as follows:
Section 2 gives the characteristic comparison on various address auto-configuration protocols. Section 3 describes the various addressing architectures for cluster based MANET merge and partition. Section 4 proposes the Election Algorithm for cluster head selection. Section 5 explains the proposed states transitions of nodes in NORMAL state address configuration through the flow charts. Section 6 shows the simulation results and also explains the reason for considering AODV for comparison. Section 7 concludes the work and briefs about the future work.
2 Characteristics comparison of address auto-configuration protocols
Address Evenness- An effective address distribution means better utilization of address space as the available address space is limited. An even distribution indicates low address duplication probability and better utilization of address space. Hence, this metric is the measurement of protocol effectiveness on address distribution. For all existing auto-configuration approaches, address evenness is achieved by design; the only exception is for the Buddy protocol. In Table 1, protocol that achieves evenness by design is indicated as "yes" and a protocol that shows unevenness or achieves evenness by additional measures is indicated as "no".
Routing protocol dependency – If any approach is dependent on any specific routing protocol then it is considered with better design and performance, however, independency leads to flexibility.
Distributed operation- In MANET’s distributed operation is always preferred. Accordingly, a certain level of centralization can be tolerated but at the same time the potential effects of such centralization should also be considered.
Address uniqueness- It is the factor which if not in working, may adversely affect the security and can cause network perturbation.
Address stability- Unnecessary address changes leads to instability in network and overhead for assigning new addresses. Address stability would lead to users’ satisfaction and prevent corruption of active communications.
Characteristics comparison between existing protocols
Agent based addressing (Günes and Reibel2002)
MANET Conf. (Nesargi and Prakash2002)
Prophet (Zhou et al.2003)
Buddy protocol (Mohsin and Prakash2002)
Strong duplicate address detection (Perkins et al.2001)
Weak duplicate address detection (Vaidya2002)
Guaranteed with high Probability
Passive duplicate address detection (Weniger2003)
Integrated within the routing protocol
Guaranteed with high Probability
Adhoc IP address autoconf. (Jeong et al.2005)
Guaranteed with high Probability
Hybrid centralized query based auto-configuration (Sun and Belding-Royer2003)
On the above mentioned parameters the protocols are compared in Table 1. On the basis of this comparison and considering the parameters addressing architecture is explained in section 3.
3 Addressing architecture for cluster based MANET merge and partition
The purpose of address is to provide identification. It does not provide any information about the topological location of a node within the network. The most fundamental property of a network is the way it assigns address to the nodes so as to facilitate communication among the nodes. As the movement of the nodes in MANET is independent of any other node in the network, so, the node also acts as an independent router.
Notably, one node can have numerous physical network interfaces. Generally, in an IP network, each node will have a different IP address. However, the need is to provide unique identifier to each node in MANET by which each node will be known to others within the network. Therefore, it is required to assign unique IP address to each of the participating node from the pool. As per the mobile IP terminology, this address is referred as a node’s home address. To distinguish the nodes between the multiple network interfaces, some other notation in the form of locally assigned interface index is also required in addition to the IP address.
a) Node address assignment
It should be noted that, since hosts from various MANETs can be in contact with one another, they have to indicate that they come from different MANETs mentioning the address used. Otherwise, there is the use of the tunnel in transferring data between the nodes belonging to various MANETs. Nonetheless, there is a possibility of two distinct MANETs having a similar MANET ID. In case there are incidences where two MANETs with a similar ID come into contact, there should be a distinct mechanism to distinguish them. Hence MANETs should also have a identification, distinct from their IP addresses. Here it is proposed that address space should be structured into MANET ID and Host ID.
The values obtained in Eq. (1) are then added to the first address in the host range to generate a new address.
Node ID assignment for base value 3
b) MANET partitioning
Network partition involves the movement of nodes for leaving the network. Partitioning could be abrupt or graceful. Abrupt partitioning has not been dealt in this paper. Partitioned networks need to update reachable host tables in the new network. Therefore, for correct and efficient network communication, the new network hosts are to perform addresses clean up through entire parent network as per the new topology changes. MANET when splits into partitions then they are called clusters and the cluster heads of these partitions are to be elected which initially will be the same for both but now is part of one only (possibly). These clusters may merge and leads to development of a bigger cluster/MANET. Partitioned networks need to act as an independent network so one partitioned network requires to alter its cluster head (Lee et al.2007). In the proposed addressing scheme, structured MANET ID is allocated with 8 bits. The possibilities of having unique MANET ID are 256 in case the MANET ID is of 8 bits.
On arrival, host requires a new address which is done by using broadcast method. It assigns addresses by detecting the missing host address in tree structure after receiving the acknowledgement of each existing host. Thus, the parent will also be informed of the missing host.
c) MANET merging
MANET merge is a frequent activity. It may involve the networks which are independent or had been partitioned earlier. Prior to merge, each network has independent configured addresses. When the networks merge, two or more networks might have the same addresses leading to address conflict. Hence, for efficient and correct communication, it is necessary to resolve this situation.
The importance of an alternative approach to redress this situation has also been identified in this research. When two distant nodes named N1 and N2 of different networks come within communication range of each other, they exchange their MANET identities. As the received and sent MANET identities are different, the larger MANET adopts the smaller one and starts allocating the new addresses for the newly created MANET. The protocol needs to be developed for assigning IP addresses without disrupting on-going communications. To resolve this situation, following mechanism has been developed.
When each MANET is named with, say, eight random characters then the probability sets close to 1 for the two merging MANET’s for not to have the same ID. The purpose of MANET ID is to differentiate the nodes belonging to different networks.
Now when two Clusters merge, which were earlier partitioned to different clusters must have the same MANET ID but have independent cluster heads (CH). When merging and partitioning occurs, CH has to be elected. Here the election algorithm for selecting the node as the cluster head (CH) is proposed and assign the cluster head ID as IDch to that node to inform all the neighbour nodes about their cluster head.
4 Cluster head selection
INDIVIDUAL: Node is INDIVIDUAL when it is not in proximity of any MANET and is in need of any of the cluster.
NORMAL: Node is said to be in NORMAL state when it is in proximity of one cluster head only and is part of one MANET/Cluster.
CLUSTERHEAD (CH): Node is CH when it is being selected through election algorithm as the head of a particular cluster.
GATEWAY: Node is GATEWAY when it is in proximity of more than one cluster and comes in contact with more than one cluster head.
N: It is the value which indicates the number of neighbors of that node.
R: It is the remaining battery lifetime of node.
T: It is the cumulative time, which indicates the life of that node in the previous cluster.
Pvi : It is the probability of each node to be selected as clusterhead.
α : It is relative importance of visibility measure.
β : It controls the number of times same path is used.
Wvi : It is the weight of the visible node i.
If a node does not receive LIVE message from any CH and its neighbour, where the node with higher parameter (W) than itself is searched within time Te.
Else it continues to send LIVE message until 2Te time and then declare itself as CH.
In this algorithm, when the two meeting Clusterheads nodes A and B come close within one hop then the cluster head change event is initiated. In this event, the node which gets the LIVE message first checks its neighbour table. If all member nodes are GATEWAYs, it changes the state to a NORMAL and sets IDch with address of B else it checks its W parameters. The node with lower W parameter is set as GATEWAY and the other one update itself as IDCH. If A finds that it has higher W parameters, it sends a unicast COVERLAP message to B. Then B terminates its clusterhead role and changes the state to GATEWAY and sets IDch with the address of A.
When a node S attempts to deliver data to another node D, which is not in its routing table then it first check its neighbor table, if node is found then it send the data to D and add this route into routing table. Else it initiates a path discovery process to locate D.
5 Node working in NORMAL mode
- a)A join request message is broadcasted to all the neighbouring nodes of the new node (N i ), which wants to join the network by activating the message, DISCOVER. Here it enters into the "select" state, where it waits for certain amount of time. Two outcomes are possible:
If the reply of this request is not received before expiry of this timer than the request is sent again. If a node doesn’t receive a response even after ‘n’ number of tries then node considers that it is the first node and announces itself as the root of MANET.
One or more offers can be received by the new node and thereafter it goes to the select stage.
In the select stage, a node with the smallest address and maximum weight is selected among the offered and sent with the REQUEST.
If node receives an acknowledgement (ACK) before the expiry of requested timer then it goes to bound stage, where it configures itself and starts various timers for further MANET communication.
Else if it receives negative acknowledgment (NAK) or timer expires then it restart the initialize process.
- e)If MANET merge and partitioning (EVENT_X) is detected then node activates a sense process to determine the merge or partition and sends a DETECT message to the bound node. To ensure detection of partitioning and merging, the oldest node in the MANET should start the DETECT process. There are two major cases in MANET partitioning:
When Ni wants to leave the network than it send the RELEASE message to the parent node. In case parent node is in the network then it responds back to the node Ni and keeps the address of Ni for recycle/reuse. But if parent has already left the network then the root node deals with the RELEASE request and keeps the address for recycle.
If the node has left the network abruptly than the address release is detected during the partition detection process.
If a node detect the DISCOVER message then it chooses an IP and send an OFFER message to the new node and wait for REQUEST message.
On REQUEST from the new node, it decides to accept or reject the request and accordingly sends acknowledgment (ACK) or negative acknowledgment (NAK). The assignment of the address depends upon the availability of address in the pool. After assigning the address accordingly the table is adjusted.
The proposed routing protocol is evaluated and compared with AODV routing protocol by simulation. The proposed algorithm is implemented on the NS-2 simulator in terms of packet delivery ratio (PDR) and the average end to end delay.
In AODV whenever a route is available from source to destination, it does not add any overhead to the packets. However, route discovery process is only initiated when routes are not used and/or they expired and consequently discarded.
It also has the ability to provide unicast, multicast and broadcast communication as it uses the broadcast route discovery algorithm and then the unicast route reply message.
Election Algorithm is compared on the basis of packet delivery ratio (PDR), which is the ratio of the number of packets received by the destination to the number of packets originated by the source. It specifies the packet loss rate, which limits the maximum throughput of the network. The higher the delivery ratio, better the routing protocol.
The input parameters are as listed in Table 3. The number of mobile nodes is set to 50 to 300 nodes. These nodes are spread randomly in a 500 m × 500 m area network.
Nodes number range
500 m × 500 m
Nodes average speed
Table 3 shows the EA parameters used. Node starts from a random location to a random destination point with its specific speed. As the node reaches its destination after pause time another destination is targeted.
Further, the formation of cluster with 200 nodes is shown here in Figure 6. The nodes blue in color are the Clusterheads.
Generally, the PDR decreases with the increase in number of nodes. Figure 7 compares the PDR of CRP with AODV. It can be seen that the PDR of CRP increases significantly in comparison to the AODV protocol and the proposed Election Algorithm can scale up to a larger network.
Figure 8 shows the comparison of PDR of CRP and AODV at different node speeds. Probability of link failure increases as the node speed increases and therefore, the number of packet drops increases. However, the delivery ratio of CRP decreases slowly, in comparison to the corresponding drop in AODV. Hence the proposed method performs better.
There is increase in the average end-to-end delay with the increasing number of nodes because of appearance of more connections and congestions. Also, it could be inferred that the average end-to-end delay for proposed approach is better than the AODV protocol (Figure 9).
Figure 10 shows the comparison of pause time and PDR. The PDR decreases due to the link breaks with increase in the node mobility. In this scenario also, the CRP performs better as compared to AODV.
7 Conclusion and future work
This paper proposes a new distributed algorithm (Election Algorithm for CRP) and a mechanism for assignment of unique address to new nodes joining a MANET. The working of the proposed model is shown through the flow chart in Figures 3 and4 considering the merges and partitions of MANETs. The mechanism has used the existing address space for allocation of reusable addresses. The mechanism is capable in re-allocating root address even if the root host is unavailable. Also, a solution for MANET merges specifically in the case when MANET ID which is a part of the IP address is same for the merging MANET. Assigning a unique identifier for each MANET, distinguish its own nodes among hosts of other networks, thus could resolve the issue of IP address duplication in case of MANETs merger. In the previous methods if a node fails within a route or become far from its neighboring nodes, it causes the route to fail and leads to the recreation of another path. But in the proposed method, since the route is expressed by CH, in case a node fails in a route, the CH of that node can use another node to forward a packet to the next existing node in the route (Figure 5). In this method, when a cluster fails or corrupts only then the need of recreating of the path arises, which is in regard of the attempt to create more stable clusters. When a CH node detects a link break for the next hop CH of active route, it sends a route error packet back to all precursors. When a CH node receives a route error packet from a neighbor CH for one or more active route, it forward the packet to precursors stored in its route table. When a source node receives a route error packet, it initiates a new route discovery if the route is still needed.
Proposed Election Algorithm for MANET provide more access to network services and speed up the creation of clusters, due to consideration of weight nodes. When two clusters are located within the same range, then one of them will change its state to the state of GATEWAY. If in an existing route one node fails then instead of recreating the route CH uses another node to forward the packet. Through simulation it has been proved that PDR and performance of EA is higher over traditional protocols.
Future work will include the evaluation on the basis of efficiency and performance at time of network partitioning and merging in address tree updating for different base values. A protocol is required for the clusters with same MANET ID to take the unique new IP address. This protocol is an issue for future endeavour in this research.
- Chatterjee M, Das SK, Turgut D: An on demand weighted clustering algorithm (WCA) for Ad Hoc networks. Proceedings of IEEE global telecommunications conference (GLOBECOM’00), 3 2000, 1697-1701.Google Scholar
- Chatterjee M, Das SK, Turgut D: WCA: a weighted clustering algorithm for mobile Ad Hoc networks. J Cluster Comput, Springer 2002, 5(2):193-204. 10.1023/A:1013941929408View ArticleGoogle Scholar
- Günes M, Reibel J: An IP address configuration algorithm for zeroconf mobile multihop Ad Hoc networks. Proceedings of int’l. workshop on broadband wireless Ad Hoc networks and services, Sophia Antipolis, France, Sept. 2002 2002.Google Scholar
- Indrasinghe S, Pereira R, Haggerty J: Protocol specification for conflict free MANET address allocation mechanism. Proceedings of IEEE computer society 22nd international conference on advanced information networking and applications 2008, 1434-1439. doi:10.1109/WAINA.2008.108Google Scholar
- Indrasinghe S, Pereira R, Haggerty J: Conflict free address allocation mechanism for mobile Ad Hoc networks. 2013.http://folk.uio.no/paalee/referencing_publications/ref-addrres-idrasinghe-ainaw07.pdfGoogle Scholar
- Jeong J, Park J, Kim H, Jeong H, Kim D: Ad Hoc IP address autoconfiguration. 2005. IETF draft,http://tools.ietf.org/pdf/draft-jeong-adhoc-ip-addr-autoconf-04.pdfGoogle Scholar
- Kumar H, Singla RK: Architecture for address auto-configuration in MANET based on extended prime number address allocation (EPNA). WSEAS Trans Comput 2009, 8(3):549-558.Google Scholar
- Lee J, Kim S, Yeom I: Advanced disjoint address allocation for mobile Ad Hoc networks. Proceedings of IEEE 66th vehicular technology conference, VTC-2007 Fall 2007, 304-308. ISBN 978-1-4244-0263-2View ArticleGoogle Scholar
- Mohsin M, Prakash R: IP address assignment in a mobile Ad Hoc network. Proceedings of IEEE military communications conference (MILCOM’02), Anaheim, California 2002, 856-861.Google Scholar
- Nesargi S, Prakash R: MANETconf: configuration of hosts in a mobile Ad Hoc network. Proceedings of IEEE INFOCOM 21st annual joint conference of IEEE computer and communications, IEEE Society, New York, NY 2002.Google Scholar
- Perkins C, Malinen JT, Wakikawa R, Nokia Research Center, Belding-Royer EM, Sun Y: IP address auto configuration for Ad Hoc networks. 2001. IETF draft,http://tools.ietf.org/html/draft-perkins-manet-autoconf-01Google Scholar
- Sun Y, Belding-Royer EM: Dynamic address configuration in mobile Ad Hoc networks. UCSB technical report 2003–11, Santa Barbara, CA; 2003.Google Scholar
- ul Huq SZ, Murthy KES, Narayana BS, Kavitha D: Study of detection of IP address conflicts in MANETs. Global J Comput Sci Tech 2010, 10(1):23-26.Google Scholar
- Vaidya NH: Weak duplicate address detection in mobile Ad Hoc networks. Proceedings of ACM MobiHoc 2002, Lausanne, Switzerland 2002, 206-216.Google Scholar
- Wang T, Hung WNN: Reliable node clustering for mobile adhoc networks. J Appl Math 2013. Hindawi Publishing Corporation, article ID 285967, Article ID 285967.http://dx.doi.org/10.1155/2013/285967Google Scholar
- Webhi B: Address auto-configuration in adhoc networks. Institut National des Telecommunications–INTDepartement Logiciels Reseaux–LOR; 2005. Internal Report, May, 2005Google Scholar
- Weniger K: Passive duplicate address detection in mobile Ad Hoc networks. Proceedings of IEEE transactions on wireless communications and networking, New Orleans, LA, 3 2003, 1504-1509.Google Scholar
- Zhou H, Ni L, Mutka M: Prophet address allocation for large scale MANETs. Proceedings of the 22nd annual joint conference of IEEE conference on computer communication (INFOCOM’03), San Francisco, CA 2003, 1304-1311.Google Scholar
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.