Beacon Assisted Discovery Protocol (BEAD) for self-organizing hierarchical ad-hoc networks

L. Raju, S. Ganu, B. Anepu, Ivan Seskar, Dipankar Raychaudhuri

Research output: Contribution to conferencePaperpeer-review

14 Scopus citations

Abstract

This paper describes a beacon assisted discovery mechanism for self-organizing hierarchical ad-hoc networks. The discovery protocol, which operates between the medium access control (MAC) and network layers, is responsible for topology formation in the ad-hoc network taking into account performance objectives such as throughput, delay, energy consumption and robustness. The proposed discovery protocol operates by listening to augmented MAC-layer beacons from neighboring radio nodes and then selects a subset of these for routing associations based on specified criteria. A distributed heuristic algorithm for topology formation is considered and compared with upper-bound centralized algorithms with optimization objectives such as maximum throughput, minimum delay or minimum energy. Simulation results (based on ns-2 models) are given for the performance of proposed discovery methods, demonstrating significant improvements in routing overhead when compared to an ad-hoc network without discovery. A proof-of-concept prototype implementation for an 802.11b-based three-tier hierarchical ad-hoc network is briefly described in conclusion.

Original languageEnglish (US)
Pages1676-1680
Number of pages5
StatePublished - Dec 1 2004
EventGLOBECOM'04 - IEEE Global Telecommunications Conference - Dallas, TX, United States
Duration: Nov 29 2004Dec 3 2004

Other

OtherGLOBECOM'04 - IEEE Global Telecommunications Conference
CountryUnited States
CityDallas, TX
Period11/29/0412/3/04

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Keywords

  • Ad-hoc wireless networks
  • Discovery protocol
  • Hierarchical networks
  • Self-organization
  • Topology control

Fingerprint Dive into the research topics of 'Beacon Assisted Discovery Protocol (BEAD) for self-organizing hierarchical ad-hoc networks'. Together they form a unique fingerprint.

Cite this