Skip to main content

A Cross-Layer Protocol for Mobile Ad Hoc Network Based on Hexagonal Clustering and Hybrid MAC Access Approach

  • Conference paper
  • First Online:
Communications and Networking (ChinaCom 2019)

Abstract

Due to its flexible and convenient networking, Ad hoc net- works have been used in more and more scenarios. But, the features of mobility, constantly changing topologies and centerless architecture limit its applications. In order to improve the performance of Ad hoc, this paper proposes a cross-layer protocol for mobile Ad hoc network based on Hexagonal Clustering and Hybrid MAC Access (HCHMA) approach. Through the clustering algorithm, cluster heads are selected to form a backbone network for route discovery and establishment. And the MAC layer uses two different access mechanisms to ensure efficient transmission of routing packets and data packets. Benefiting from the above approaches, network overhead is greatly reduced and the through- put is improved. By doing simulations in the network simulator 2 (NS2) software, the HCHMA protocol shows better packet delivery rate, higher throughput and lower end-to-end delay compared with the Ad hoc On- demand Distance Vector Routing (AODV) protocol and the Optimized Link State Routing (OLSR) protocol.

Supported by the Key Research and Development Program of Shaanxi Province (Grant No. 2019ZDLGY09-02).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xu, H., Zhao, Y., Zhang, L., Wang, J.: A bio-inspired gateway selection scheme for hybrid mobile ad hoc networks. IEEE Access 7, 61997–62010 (2019). https://doi.org/10.1109/ACCESS.2019.2916189

    Article  Google Scholar 

  2. Agarkhed, J., Ainapure, A., Kulkarni, A.: Performance issues of routing protocols in ad hoc networks. In: 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC), Mysore, pp. 1178–1181 (2017). https://doi.org/10.1109/CTCEEC.2017.8455087

  3. Lin, C., Cai, X., Su, Y., Ni, P., Shi, H.: A dynamic slot assignment algorithm of TDMA for the distribution class protocol using node neighborhood information. In: 2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID), Xiamen, pp. 138–141 (2017). https://doi.org/10.1109/ICASID.2017.8285760

  4. Fu, Y., Ding, Z.: Hybrid channel access with CSMA/CA and SOTDMA to improve the performance of MANET. In: 2017 IEEE 17th International Conference on Communication Technology (ICCT), Chengdu, pp. 793–799 (2017). https://doi.org/10.1109/ICCT.2017.8359746

  5. Sureshbhai, T.H., Mahajan, M., Rai, M.K.: An investigational analysis of DSDV, AODV and DSR Routing Protocols in mobile ad hoc networks. In: 2018 International Conference on Intelligent Circuits and Systems (ICICS), Phagwara, pp. 281–285 (2018). https://doi.org/10.1109/ICICS.2018.00064

  6. Dogra, A.K.: Q-AODV: a flood control ad-hoc on demand distance vector routing protocol. In: 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), Jalandhar, India, pp. 294–299 (2018). https://doi.org/10.1109/ICSCCC.2018.8703220

  7. Sruthy, S., Geetha, G.: AODV based backup routing for optimized performance in mobile ad-hoc networks. In: 2017 International Conference on Computing Methodologies and Communication (ICCMC), Erode, pp. 684–688 (2017). https://doi.org/10.1109/ICCMC.2017.8282553

  8. Warrier, M.M., Kumar, A.: Energy efficient routing in wireless sensor networks: a survey. In: 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, pp. 1987–1992 (2016). https://doi.org/10.1109/WiSPNET.2016.7566490

  9. Savalkar, V.A.: Link prediction for identifying link failure using cross layer approach. In: 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, pp. 1120–1129 (2018). https://doi.org/10.1109/ICISC.2018.8398978

  10. Zuo, J., Dong, C., Ng, S.X., Yang, L., Hanzo, L.: Cross-layer aided energy-efficient routing design for ad hoc networks. IEEE Commun. Surv. Tutor. 17(3), 1214–1238 (2015). https://doi.org/10.1109/COMST.2015.2395378. Thirdquarter

    Article  Google Scholar 

  11. IEEE802.11n, Standard for information technology. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) - Amendment: Enhancements for Higher Throughput (2009)

    Google Scholar 

  12. Lee, J.S., Miller, L.E.: CDMA Systems Engineering Handbook. Artech House Inc., Boston (1998)

    Google Scholar 

  13. Wang, Q., He, X., Chen, N.: A cross-layer neighbor discovery algorithm in ad hoc networks based on hexagonal clustering and GPS. In: 6th Annual 2018 International Conference on Geo-Spatial Knowledge and Intelligence (2019). https://doi.org/10.1088/1755-1315/234/1/012050

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiandeng He .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, L., He, X., Wang, Q., Yao, H., Qiu, Y. (2020). A Cross-Layer Protocol for Mobile Ad Hoc Network Based on Hexagonal Clustering and Hybrid MAC Access Approach. In: Gao, H., Feng, Z., Yu, J., Wu, J. (eds) Communications and Networking. ChinaCom 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 312. Springer, Cham. https://doi.org/10.1007/978-3-030-41114-5_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-41114-5_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-41113-8

  • Online ISBN: 978-3-030-41114-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics