Mobile Ad Hoc Networks (MANETs)

MANETs are made up of mobile devices that move in different directions at random speeds. These types of networks do not have any infrastructure and repeatedly configure themselves to connect with different devices in their communication range. MANETs are known for their dynamic behavior. Vehicular Ad Hoc Networks (VANETs), Smart Phone Ad Hoc Networks (SPANs), and Internet-Based Mobile Ad Hoc Networks (IMANETs) are different kinds of MANETs currently being used. As mobile devices move to different places, their resources and communication ranges vary.

Peer to Peer Communication

A group of networking devices that share information when interconnected to each other through a physical (cables) or a virtual (Bluetooth, Wi-Fi, infrared, and RF) medium is called peer to peer communication. In peer to peer architecture, every node has similar capabilities (such as communication range and storage space). Peer to peer communication is used for file sharing without a central server. Accessing the data from the neighboring nodes or replicating a file on other nodes can be marked as the best feature of peer to peer communication

Content Distribution in Normal MANETs

There are many protocols to access and send a file from one node to another node in their communication range. In a normal MANET, when a file is requested by the neighboring node, the query is satisfied by sending a replica of the requested file to the requesting node. When multiple nodes request the same file, the replica of the file is sent to all the requesting nodes. The request is sent as a broadcast by the requesting nodes, and the nodes that have the requested file will send the replica of the file to the requesting node, irrespective to other nodes. This causes redundancy and multiple copies of the same file in the requesting node. To avoid redundancy, every node periodically updates its list of files and arranges them according to their priority value. Furthermore, to effectively utilize the limited resources on every node, one or more groups of nodes maintain a list of files that are frequently requested. As specified in the book Handbook of Peer to Peer Networking, the replication protocols for normal MANETS can be listed below .· Static Access Frequency (SAF): In this file replication protocol, every node stores all the frequently queried files until the memory is full. As a result, duplicate replicas of the same file are formed among the neighboring nodes.· Dynamic Access Frequency and Neighborhood (DAFN): This protocol eliminates the formation of duplicate files among neighbors.· Dynamic Connectivity Based Grouping (DCG): The frequency of querying a file is called its priority value. In this protocol, duplication of the same file by neighboring nodes is eliminated, and the files are arranged in the descending order of their priority value.Node mobility disables the availability of the file that is replicated by both DAFN and DCG protocols. Managing the groups formed due to node mobility and avoiding the duplicates is the major challenge for the DCG protocol. As a result, traffic is high between the nodes following this protocol. Collecting the information from the neighboring nodes before replicating the file is a way to avoid the formation of duplicate files. K. Zheng et al. propose a protocol for addressing the file request . Every node should exchange the list of files before the replication of the requested file. The list of files is compared to check for the file availability and whether or not to replicate the file.

Content Sharing in Disconnected MANETs

As discussed in Chapter 1, disconnected MANETs have nodes that are randomly distributed among different areas. Y. Huang et al. propose a protocol to improve file availability in disconnected MANETs . The popularity of the file, node mobility, and Access Point (AP) topology are considered to optimize the file availability in a Wi-Fi environment. The corporativ caching method in disconnected MANETs helps store replicated files in a central node or server that are frequently visited by the nodes in that area. Due to node mobility, the central location of the node keeps varying constantly. To maintain the set of files at a central location, files are transferred from an old central node to a newly formed central node. This file transfer leads to
overhead.

Analyzing Optimal File Sharing in Peer to Peer Communication

The average number of time intervals needed to meet a file is calculated by  \stackrel\frown{T} in Equation (1)

blank

blank

X_i_f= probability of the node i  containing filef,

andN=  the total number of nodes.

The average number of time intervals required to satisfy the request   is given by Equation (2)

blank

Where,
q_f= Probability of requesting file f
and F=Number of files in the network.
The Random Waypoint Model (RWP) and the Community-Based Mobility Model (CBMM) are normal and disconnect MANETs respectively. For theoretical analysis, both node movement models are considered.

Theoretical Analysis of RWP for Normal MANETs

The Random Waypoint Model (RWP) contains nodes that move at random speeds. Theoretically, the probability of meeting different nodes is the same, but practically, this is not possible as nodes with greater speeds encounter more nodes. For optimal file replication, nodes follow exponential distribution to meet other nodes. Therefore, a previously encountered node does not determine the probability of meeting the next node. The average number of nodes a node meets in a unit time is referred as the meeting

ability (M_i ) of that node. The probability of encountering the next node is node i  , (p_i), is given by Equation (3).

blank

Where,

M_i = Meeting ability of the node i ,

and N = The total number of nodes.

\overline{M} = Meeting ability of all nodes in the network (average meeting ability),

When vectorsM_f_1 , M_f_2 , M_f_3 , .... , M_f_n are assumed to contain file f, the probability of the next encountering node holding the filef(p_f) is given by Equation (4). As  p_f considers the vectors, probability of encountering node I, (M_i), is equated to 1 and is replaced with M_f_k .

blank

Where,
X_i_f = probability of node ! holding file f,
n_f = number of nodes holding file f and its replicas,
and    M_f_k = probability of  k_t_h node holding the file f or its replica.
In Equation (4), the resource allocated to the system (R) is given by the sum of the product of the storage space of node i(Si) and M_i , depicted in Equation (5).

blank

Resources allocated to file f are given byR_f, depicted in Equation (6).

blank

b_f = size of file f.
By multiplying and dividing with b_f and substituting Equation (6) in Equation (4),  p_f can be expressed as Equation (7).

blank

The RWP mobility pattern follows binomial distribution to meet other nodes. The average number of time intervals required to meet the node with file f denoted by \overline{T_f} is seen in Equation (8).

blank

Where,

(1-p_f) ^{k-1}pf =  probability of meeting the file f after k time intervals.

Therefore, the average time intervals to satisfy the request (\overline{T}) is given by Equation (9).

blank

According to Equation (9), the average query delay is dependent on q_f,b_f, and R_f. As the values q_f and b_f are predefined by the system, optimal resource allocation should be implemented to reduce the average query delay. Replace q_fb_f with B_f for simplification.

blank

Therefore, the amount of resources allocated to the file f should be large to minimize (\overline{T}) as seen
in Equation (10). To satisfy Equation (10), the resources allocated to file (R_f) should be equal to the resources of the network (R) as depicted in Equation (11).

blank

Substituting the values of Equation (11) in the Equation (10), Min (\overline{T})  can be written as Equation (12).

blank

To find the value of R_f(1\ll f\ll F-1), Equation (12) is differentiated with respect to R_f and the resultant is equated to 0.

blank

By equating Equation (13) and Equation (14), Equation (15) is achieved.

blank

When the second order derivative is applied to Equation (12), the value should be greater than 0 to achieve minimum query delay.

blank

Equation (15) satisfies the maximum resource allocation condition, Equations (16) and (17) can also be represented as Equation (18) and Equation (19).

blank

blank

If resource allocated to the file f is greater than the resource allocated to the rest of the
files R_f\gt R_F(R_f\in [1,F-1]), Equations (18) and (19) are satisfied. If the value of the resource for
the k_t_h file is substituted in place of R_f, the equations holds well only if R_f\gt R_k(f\in [1,F],f\notin k)
So, it is concluded that if the first condition is true, then the second condition is automatically satisfied. This happens only because there is always a file that has lesser resources allocated to it. Therefore, the resource allocated to the file f can be written as

blank

From Equation (20), it is acknowledged that the resource allocated to the file f is directly proportional to the square root of B_f

blank

Since B_f = b_f q_f, the value of b_f q_f is replaced byB_f in Equation (21).

blank

From Equation (22), the sum of meeting abilities of all the nodes holding file f is proportional to priority value (P_f). This condition should be satisfied to achieve a minimum query delay.