Abstract
The quorum agreement has been used in static distributed systems for numerous applications like mutual exclusion, distributed commit, and replication. The article proposes a framework to use quorum agreement in mobile ad hoc networks. The correctness proof, complexity analysis, and simulation measurements have also been presented.
Similar content being viewed by others
References
Kshemkalyani AD, Singhal M (2008) Distributed computing: principles, algorithms, and systems. Cambridge University Press, NY, pp 327–336
Benchaiba M et al (2004) Distributed mutual exclusion algorithms in mobile ad hoc networks: an overview. ACM SIGOPS Oper Syst Rev 38(1):74–89
Sharma B, et al. (2011) DMX in MANETs: major research trends since 2004. ACM ACAI’11, pp 50–55
Park VD, Corson MS (1997) A highly adaptive distributed routing algorithm for mobile wireless networks. IEEE INFOCOM’97, pp 1405–1413
Barbara D, Garcia-Molina H (1986) Mutual exclusion in partitioned distributed systems. Distrib Comput 1(2):119–132
Junqueira F, Marzullo K (2005) Coterie availability in sites. In: 19th international symposium on distributed computing DISC’05, LNCS, 3724:3–17
Mizuno M, Neilsen ML, Rao R (1991) A token based distributed mutual exclusion algorithm based on quorum agreements. In: 11th international conference on distributed computing systems, pp 361–368
Okabe A et al (2000) Spatial tessellations: concepts and applications of Voronoi diagrams. Wiley, Chichester
Shamos MI, Hoey D (1975) Closest-point problems. In: 16th Annu IEEE Sympos Found Comput Sci, pp 151-162
Bentley JL, Ottmann TA (1979) Algorithms for reporting and counting geometric intersections. IEEE Trans Comput 28(9):643–647
Fortune SJ (1987) A sweepline algorithm for Voronoi diagrams. Algorithmica 2:153–174
Steenstrup M (2001) Cluster based networks, Chapter 4. In: Perkins CE (ed) Ad hoc networking. Addison-Wesley Longman Publishing Inc., Boston
Perkins CE, Belding-Royer EM, Das S (2003) Ad hoc on demand distance vector (AODV) routing. RFC 3561
Naor M, Wieder U (2003) Scalable and dynamic quorum systems. In: ACM PODC, pp 114–122
Ratnasamy S, et al. (2001) A scalable content-addressable network. ACM SIGCOMM, pp 161–172
Ghiasi S, Srivastava A, Yang X, Sarrafzadeh M (2002) Optimal energy aware clustering in sensor networks. Sensors 2(7):258–269
Jardosh A, Belding-Royer E, Almeroth K, Suri S (2003) Towards realistic mobility models for mobile ad hoc networks. In: ACM annual international conference on mobile computing and networking, MobiCom’03, pp 217–229
de Berg M, van Kreveld M, Overmars M, Schwarzkopf O (2000) Computational geometry: algorithms and applications. Springer, Berlin
Shamos M, Preparata F (1985) Computational geometry. Springer, Berlin
Cao M, Hadjicostis C (2003) Distributed algorithms for Voronoi diagrams and applications in ad-hoc networks. In: Technical report, UILU-ENG-03-2222-DC-210-UIUC, Coordinated Science Laboratory
Thorup M, Zwick U (2001) Compact routing schemes. In: ACM symposium on parallelism in algorithms and architectures, SPAA’01, pp 1–10
Honiden S, Houle M, Sommer C (2009) Balancing graph voronoi diagrams. In: 6th IEEE international symposium on Voronoi diagrams, pp 183–191
Dang H, Wu H (2009) Mobility models for delay-tolerant mobile networks. In: 3rd IEEE international conference on sensor technologies and applications, SENSORCOMM ‘09, pp 55–60
Doci A, Samakovitis G, Raju V (2009) Impact of mobility in ad hoc protocol design. In: 2009 WRI world congress on computer science and information engineering, 1:38–43
Ghosh J, Ngo H, Qiao C (2006) Mobility profile based routing within intermittently connected mobile ad hoc networks (ICMAN). In: ACM international conference on wireless communications and mobile computing, IWCMC’06, Vancouver, British Columbia, Canada, pp 551–556
Kim M, Kotz D, Kim S (2006) Extracting a mobility model from real user traces. In: 25th IEEE INFOCOM, pp 1–13
Lee J-K, Hou JC (2006) Modeling steady-state and transient behaviors of user mobility: formulation, analysis, and application. ACM MobiHoc’06, pp 85–96
Liu G, Maguire G Jr (1995) A predictive mobility management algorithm for wireless mobile computing and communications. In: IEEE international conference on universal personal communications (ICUPC’95), Tokyo, Japan, pp 268–272
Marlevi A, Danne A, Liu G (1994) Method and apparatus for detecting and predicting of mobile terminals. In: Ericsson patent No. 027500–969
Prasad PS, Agrawal P (2010) Movement prediction in wireless networks using mobility traces. In: 7th IEEE consumer communications and networking conference (CCNC), pp 1–5
Resta G, Santi P (2008) WiQoSM: an integrated QoS-aware mobility and user behavior model for wireless data networks. IEEE Trans Mobile Comput 7(2):187–198
Su J, Chin A, Popivanova A, Goel A, de Lara E (2004) User mobility for opportunistic ad-hoc networking. In: 6th IEEE workshop on mobile computing systems and applications (WMCSA), Lake District, England, pp 41–50
Tuduce C, Gross T (2005) A mobility model based on WLAN traces and its validation. In: 24th annual joint conference of the IEEE computer and communications societies, INFCOM, 1:664–674
Erbas F, Garcia J-E, Jobmann K (2004) Position-based QoS routing in mobile ad hoc networks: problem statement and a novel approach. In: 23rd IEEE international performance computing and communication conference, pp 619–624
Punde J, Pissinou N, Makki K (2003) On quality of service routing in ad-hoc networks. In: Proceedings of the 28th annual IEEE international conference on local computer networks (LCN’03), pp 276–278
Chen I-R, Verma N (2003) Simulation study of a class of autonomous host-centric mobility prediction algorithms for wireless cellular and ad hoc networks. In: 36th Annual Simulation Symposium (ANSS’03), pp. 65–72
Vetriselvi V, Parthasarathi R (2007) Trace based mobility model for ad hoc networks. In: 3rd IEEE international conference on wireless and mobile computing, networking and communications (WiMob’07), pp 1–8
Dabek F, Cox R, Kaashoek F, Morris R (2004) Vivaldi: a decentralized network coordinate system. In: ACM conference on applications, technologies, architectures, and protocols for computer communications, SIGCOMM’04, Portland, Oregon, USA. pp 15–26
Das S, Nandan A, Parker M, Pau G, Gerla M (2005) Grido—an architecture for a grid-based overlay network. In: 2nd IEEE international conference on quality of service in heterogeneous wired/wireless networks (QShine’05), pp 8–27
Ng TSE, Zhang H (2002) Predicting Internet network distance with coordinates-based approaches. IEEE INFOCOM, pp 170–179
Zhuo C, Kai L, Jun Z (2006) A novel location-based routing algorithm for mobile ad hoc networks. In: IEEE international conference on wireless communications, networking and mobile computing, WiCOM’06, pp 1–4
Al-Karaki J, Kamal A (2008) Efficient virtual-backbone routing in mobile ad hoc networks. Comput Netw Int J Comput Telecommun Netw 52(2):327–350
Suzuki I, Kasami T (1985) A distributed mutual exclusion algorithm. ACM Trans Comput Syst 3(4):344–349
Raynal M (1991) A simple taxonomy for distributed mutual exclusion algorithms. ACM SIGOPS 25(2):47–50
Raymond K (1989) A tree-based algorithm for distributed mutual exclusion. ACM Trans Comput Syst 7(1):61–77
Trehel M, Naimi M (1987) A distributed algorithm for mutual exclusion based on data structures and fault tolerance. In: 6th IEEE international conference on computers and communications, pp 35–39
Lamport L (1978) Time, clocks, and the ordering of events in a distributed system. Commun ACM 21(7):558–565
Ricart G, Agrawala AK (1981) An optimal algorithm for mutual exclusion in computer networks. Commun ACM 24(1):9–17
Maekawa M (1985) A √N algorithm for mutual exclusion in decentralized systems. ACM Trans Comput Syst 3(2):145–159
Makki K et al (2000) Using logical rings to solve the distributed mutual exclusion problem with fault tolerance issues. J Supercomput 16(1–2):117–132
Eugster P et al (2003) The many faces of publish/subscribe. ACM Comput Surv 35(2):114–131
Wang G et al (2005) Sensor relocation in mobile sensor networks. IEEE INFOCOM 4:2302–2312
Pei Y (2009) Hopping sensor relocation in rugged terrains. In: The 2009 IEEE/RSJ international conference on intelligent robots and systems, pp 3856–3861
Jiang J-R (1996) A framework for fault-tolerant distributed mutual exclusion and replica control using grid structures. In: 8th international conference on parallel and distributed systems, pp 311–315
Chinara S, Rath SK (2009) A survey on one-hop clustering algorithms in mobile ad hoc networks. J Netw Syst Manage 17(1–2):183–207
Choi W, Woo M (2006) A distributed weighted clustering algorithm for mobile ad hoc networks. In: Advanced international conference on telecommunications and international conference on internet and web applications and services (AICT/ICIW), pp 7378
Janakiraman TN, Thilak AS (2011) Design and analysis of SD_DWCA—a mobility based clustering of homogeneous MANETs. Int J Comput Netw Commun (IJCNC) 3(3):94–111
Konstantopoulos C, Gavalas D, Pantziou G (2008) Clustering in mobile ad hoc networks through neighborhood stability-based mobility prediction. Comput Netw 52(9):1797–1824
Xing Z, Gruenwald L, Phang KK (2008) A robust clustering algorithm for mobile ad hoc networks. In: Pierre S (ed) Handbook of research on next generation networks and ubiquitous computing, pp 1–18
Yu JY, Chong PHJ (2005) A survey of clustering schemes for mobile ad hoc networks. IEEE Commun Surv Tutor First Q 7(1):32–48
Chatterjee M, Das SK, Turgut D (2002) WCA: a weighted clustering algorithm for mobile ad hoc networks. Clust Comput 5(2):193–204
Author information
Authors and Affiliations
Corresponding author
Appendices
Rights and permissions
About this article
Cite this article
Sharma, B., Bhatia, R.S. & Singh, A.K. Mutual Exclusion in MANETs Using Quorum Agreements. Proc. Natl. Acad. Sci., India, Sect. A Phys. Sci. 86, 169–186 (2016). https://doi.org/10.1007/s40010-015-0246-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40010-015-0246-9