Efficient and Reliable Dissemination inMobile Ad Hoc Networks by Location Extrapolation

Data dissemination is an important service in mobile ad hoc networks (MANETs). The main objective of this paper is to present a dissemination protocol, called locBcast, which utilizes positioning information to obtain efficient dissemination trees with lowcontrol overhead. This paper includes an extensive simulation study that compares locBast with selfP, dominantP, fooding, and a couple of probabilistic-/counter-based protocols. It is shown that locBcast behaves similar to or better than those protocols and is especially useful in the following challenging environments: the message sizes are large, the network is dense, and nodes are highly mobile.


Introduction
Disseminating data from any given node to all other nodes is a basic service in wireless mobile ad hoc networks.In ad hoc networks, data dissemination is more challenging because of the high mobility and instability of the network.For example, a fire-fighter in a search and rescue application (or a soldier in a military application) may wish to send a video stream from his helmet to all other fire-fighters (or soldiers).Alternatively, a child's mobile phone may wish to send a search request for a given video clip to all other devices in the school in an ad hoc file-sharing application.In addition, many wireless routing protocols need a dissemination service in order to search for the destination nodes.For example, many unicast routing protocols such as dynamic source routing (DSR), ad hoc on demand distance vector (AODV), and location aided routing (LAR) rely on disseminating to establish routes.
Two important, and sometimes conflicting, aspects of data dissemination are reliability and efficiency.Reliability measures the likelihood that a message will be received by all nodes in the network.Yet, in order to ensure high reliability, it may be necessary to send redundant messages.These messages increase the load on the network and therefore reduce its effective capacity, hence, the significance of the efficiency of the protocol.
The simplest way to implement data dissemination is by flooding.That is, the sender broadcasts its message to all its neighbors.Each of them, when it receives the message for the first time, rebroadcast the message.This repeats iteratively until all nodes have received and rebroadcasted the message at least once.Clearly, in flooding, a message is propagated along all possible paths in the networks, and therefore it can ensure high reliability.However, flooding is highly inefficient.Moreover, under high load, the large number of redundant messages generated by flooding results in many collisions, which ultimately also degrades its reliability.
Consequently, many works have been published on developing protocols that ensure high reliability in a much more efficient manner than flooding.Some of these protocols attempt to build an overlay and only disseminate messages along the overlay's edges, for example, [1][2][3], whereas others have resorted to probabilistic and counter based pruning techniques [4][5][6].
It is well known that the most efficient way to disseminate a message in a network is along the edges of a sourcebased spanning tree [7].On the other hand, the cost of maintaining such a tree for each source can be prohibitively expensive.This is especially true for opportunistic networks, in which the network topology is constantly changing, disconnections and reconnections may frequently occur, there is no central authority, and often network and power resources are limited.
In this paper, we refer to two techniques for implementing source-based dissemination trees: self pruning (selfP) and dominant pruning (dominantP) [2].Specifically, selfP uses periodic "Hello" messages to learn their immediate (1-hop) neighborhood, and from that decide which nodes should forward a message.On the other hand, in dominantP, the "Hello" messages include information about the 2hop neighborhood (i.e., each node can learn who are the neighbors of its neighbors).Hence, the forwarding decisions in dominantP generate a dissemination tree that is much closer to the optimal tree, meaning that dominantP obtains higher reliability and better efficiency compared to selfP.However, its "Hello" messages can become very large when the network is large and dense.
As many new smartphones are equipped with positioning capabilities, for example, GPS and GSM triangulation, we are motivated to explore whether these capabilities can be used to improve dissemination protocols.In particular, we seek a protocol that only relies on 1-hop neighborhood information and can still be at least as reliable and efficient as dominantP.In this paper, we present a new approach in which locations of a node's 1-hop neighbors are extrapolated in order to disseminate a message efficiency and reliably.We demonstrate this idea by presenting a new broadcast protocol, called locBcast.Furthermore, we compare the performance of locBcast by simulations with selfP, dominantP, flooding, and a couple of probabilistic-/counter-based protocols.The results of the simulations show that locBcast is indeed more efficient and reliable than most other protocols we have checked and much faster than counter-based dissemination.locBcast particularly excels when messages are large, the network is dense, and nodes move fast.

Related Work
Several approaches for providing broadcast routing in mobile ad hoc networks have been proposed in the literature.In Section 5, we compare results from our new broadcast protocol with other five broadcast protocols, which are flooding, gossip, counterb, selfP, and dominantP.The comparison results show that our protocol achieves both high reliability and low latency, while the other protocols achieve either reliability or low latency.
Williams and Camp presented in [8] a classification of wireless broadcast protocols into four categories.The simple flooding protocol has its own category.The other protocols belong to the following classes: probability-based methods, location-based methods, and neighbor knowledge methods.Then, they showed a comparison between selected protocols from the four classes.The comparison showed that the protocols of neighbor knowledge achieve the best results in low latency, delivery ratio, and number of retransmitting nodes.
Our protocol (locBcast) belongs to the neighbor knowledge class rather than the location-based class.This is because in locBcast we only extend the neighbor knowledge to include positioning information, where most of the location-based methods require global positioning information.Tseng et al. [5] presented a location-based broadcast approach where every node attaches its location with the messages.As shown in [5], this approach can help a node whether to forward a message or not only if it has received the message from other nodes that are existing in specific locations.On other hand, our approach combines locationbased and neighbor knowledge to let every node decides immediately if it needs to forward a message or not.
In Section 5, we considered the two neighbor knowledge protocols selfP and dominantP.Our results show how locBcast obtains higher reliability and lower latency than these protocols.The other neighbor knowledge protocols mentioned in [8] are similar to the dominantP protocol.The multipoint relaying protocol [9] and ad hoc broadcast protocol [10] are similar to dominantP in that rebroadcasting nodes are explicitly chosen by upstream senders and every node knows the network topology within a 2-hop radius.In addition, the Lightweight and Efficient Network-Wide Broadcast (LENWB) protocol [11] belongs to the neighbor knowledge class.This protocol relies on 2-hop neighbor knowledge obtained from "Hello" packets.However, instead of a node explicitly choosing nodes to rebroadcast, the decision is implicit.In LENWB, each node decides to rebroadcast based on the knowledge of which of its other one and two-hop neighbors are expected to rebroadcast.
We can summarize here that most of the neighbor knowledge protocols require 2-hop knowledge.To the best of our findings, the only two protocols that require 1hop knowledge are selfP and locBcast.No doubt that the overhead of control messages is greater in the case of 2-hop knowledge, where a control message of node M i needs to be transmitted |N i | times (N i is the neighbor set of M i ).In our protocol, however, every control message is transmitted  only once.This overhead of control messages affects the reliability and latency of the broadcast protocol.Moreover, since locBcast uses the location knowledge of the neighbors, it achieves a low number of transmitting nodes (see the results in Section 5).
From the probability-based class, we considered two protocols which are counterb that achieves good reliability results but incurs high latency and gossip protocols that disseminate messages fast, but this is not reliable enough.The advantage of these protocols is the low number of control messages they generate.RAPID [12] is another protocol in this class which improves the reliability more than counterb and gossip at the expense of periodic active gossip messages.
El Fawal et al. [13] presented a probability-based broadcast approach.Their work defines several functions to decide whether to forward a message or not.The most  important functions are the inhibition and the spreadcontrol functions.The inhibition function is identical to the gossip protocol.The spread control function depends on the TTL (time to live) value and some environment parameters that are provided by the user (or administrator).Therefore, this approach is considered as an improvement of the gossip protocol when some knowledge of the environment exists.
A podcasting system for delay tolerant networks has been presented in [14].Podcasting requires dissemination capabilities.Yet, the model and goal are different compared to our case as they deal with delay-tolerant content and networking.Hence, in [14], nodes use opportunistic forwarding when they meet each other.Also, the content is assumed to be large media files, whereas in our case, messages are often relatively short and self-contained.
Most of the efficient routing protocols for MANETs were developed for point-to-point routing (unicast).Similar to our approach, Shah and Nahrstedt [15] present a predictive location-based QoS unicast routing protocol for MANETs.In addition, Hughes et al. describe event-based real-time middleware for VANET [16].They use a proximity-based event-propagation technique to guarantee real-time constraints within the defined proximities only.The proposed RT-STEAM identifies and delivers events of interest based on location.Unlike our work that guarantees real-time communication between any two mobile nodes, RT-STEAM provides real-time delivery support only within predefined cells.
Sun et al. [17] propose a cross-layer QoS framework between MAC and IP for utilizing prioritization support in MAC.This paper assumes stability or low node mobility.In [18], Friedman and Kliot present a comprehensive survey of location services in MANETs.Cerdà et al. [19] present a mechanism for bandwidth management and distribution in MANETs to support the QoS guarantees.

System Model
We assume an opportunistic network, which is a wireless ad hoc network consisting of a set of mobile nodes that may communicate with each other using omnidirectional antennas.As presented in Figure 1(a), we denote the mobile nodes by M 1 , . . ., M i , . ... We assume that all mobile nodes have the same transmission range of r.Two nodes M i and M j can communicate directly with each other if M i is within the transmission range of M j and vice versa.Let d() be the Euclidean distance function, we say that M i is a neighbor of another node We impose no limit on the maximum number of mobile nodes in the system, but we assume that the mobile nodes are scattered in a given finite size area.A node can physically move within this area.It may move at any time in any direction and at any speed.New nodes may join and existing nodes may leave at any time.Therefore, the link connectivity and network topology change with nodes' movement.We model the dynamic changes in the network by a sequence of graphs indexed by time instances.We first decompose the time horizon T = [0, ∞) into a set of time instances T = {t 1 , t 2 , . ..} such that during the time [t i , t i+1 ) the network topology remains unchanged.So, at time t, we define the network connectivity graph as G(t) = (V , E(t)), where E(t) represents the set of wireless links at time t ∈ T .We denote the connectivity graph by G if the time t is irrelevant.Figure 1(b) shows the corresponding connectivity graph of the system presented in Figure 1(a).
We assume that every node has access to a location service such as global positioning system (GPS).Such a service provides position, velocity, and time (PVT) information about the node.In addition, we assume the standard communication stack for the mobile nodes, where the MAC layer works with CSMA/CA transceiver.We assume that every mobile node has a unique address for routing.

Extrapolation-Based Dissemination
Given a mobile node M i , to extrapolate the location of every neighbor node in N i at any time, M i needs to know the initial location and the updated velocity vector of N i [15].Therefore, in our approach, periodically, every mobile node M i sends its location (denoted by L i ), velocity (denoted by V i ), and the number of 1-hop neighbors (denoted by |N i |) to its 1-hop neighbors.Notice here that M i can extrapolate when another node leaves N i without extra information.
The nodes determine their location and velocity vectors using an external location service, for example, GPS.If the location service does not provide velocity vector information, it can be calculated from two consecutive location measurements.
In our approach, when a mobile node M i decides to broadcast a packet P, it computes a forwarding set (denoted by F i ) and a candidates set (denoted by C i ) from N i .It then attaches F i (with the location of every node in F i ) and C i to the transmitted packet.Furthermore, when a node M j ∈ N i receives P for the first time, it checks F i and C i .If M j is in F i , then it transmits P after computing F j and C j , recursively.Otherwise, if M j is in C i , it might still decide to transmit P depending on whether the transmission of F i and M i reach all the nodes in N j or not, as explained below.
We now turn to the details of the locBcast protocol, implementing our new approach.Suppose now that M i wishes to broadcast a packet P. The handling of such a message is divided among the following three phases: This graph is generated by the set of nodes   if there is a path between M l and M h in G i that does not pass through M i .Figure 2 presents an example of a graph G 1 .Notice that the node M 1 has a direct connection to every other node in the graph.Phase 2 (determining F i and C i ).In this phase, M i determines the forwarding and candidates sets.Consider the graph H i of Phase 1.The forwarding set F i contains the node from every D i, j that has the maximum number of neighbors that are not in N i (breaking symmetry arbitrarily).Namely, the node from D i, j whose transmission can reach the largest number of new nodes.The candidates set C i contains all the remaining nodes of D i, j that also have neighbors that are not in N i .Namely, their transmission still contribute to the dissemination of P to reach additional new nodes.
Formally, for every D i, j ∈ D i and for every That is, n k is the number of mobile nodes that are in N k , but are not neighbors of M i .Notice here that M i has enough information to compute n k even though it does not know the entire composition of N k .This is because M i knows the value of |N k | for every M k ∈ N i .Moreover, since M i knows the location of all of its own neighbors and the transmission range, it can determine which of its neighbors is also a neighbor of M k .In other words, it knows the set of joint neighbors N k ∩ N i .
Let M h ∈ D i, j be the node such that n h = max{n k | ∀M k ∈ D i, j }.Then, update F i and C i as follows: (1) if n h > 0, add M h with its extrapolated location to the forwarding set F i ; (2) then, add every node M k ∈ D i, j such that n k > 0 to the candidates set C i .
Algorithm 1 presents a pseudocode of the determine function for determining F i and C i at M i .
In Line 1 of Algorithm 1, we initialize F i and C i to be empty.Line 2 starts with the main loop that ends at Line 16.In this loop, we examine every set D i, j ∈ D i .For every set D i, j , n h will have the maximum value of n k .In Line 3, we initialize n h to be −1 and its corresponding node to be unknown.We start an inner loop at Line 4 that computes n k for every M k ∈ D i, j (Line 5).Then, we set n h to be n k and remember its node if n k has a greater value than n h (Line 9).We add n k (Line 11) or the previous value if n h (Line 8) to C i if they are greater than zero.Namely, if there are nodes in N k \ N i .After the inner loop, we examine if n h > 0 (Line 13).If yes, we extrapolate the new location of the node with the value of n h (Line 14).Then, we add this node with the extrapolated location to F i (Line 15).
Last, after determining the forwarding and candidates sets, M i sends the packet P attached with these sets.Moreover, for each node M j in F i , M i also attaches the location information of M j to the message.
Phase 3 (upon receiving the packet P).Let M j be a mobile node in N i .Upon receiving the packet P from M i (for the first time), M j behaves as follows: (i) if M j ∈ F i , then it transmits the packet P after determining F j and C j , as described in Phase 2, with the exception that M i cannot appear in either C j or F j ; (ii) otherwise, if M j ∈ C i , then it checks if there is a node in N j that might not receive the packet P from M i nor from any of the nodes in F i .If there is a such node, then M j transmits the packet P after determining F j and C j .
Notice that M j can detect such nodes since it has the location information of all nodes in F i .Hence, if M j ∈ C i , it transmits P only if the following condition is satisfied:

A Running Example.
Let us explain the locBcast protocol with an example.Consider the graph, which is generated from a network system, presented in Figure 4. Assume that M 4 wishes to disseminate a packet P to all the other nodes.We describe here the three phases of our protocol on this example.
Phase 1 (determining the disjoint sets in N 4 ).The mobile node M 4 has five neighbors, So the graph G 4 has six vertices and the graph H 4 has three disjoint connected components.The collection D 4 has the following three sets: Phase 2 (determining the forwarding set F 4 and the candidates set in C 4 ).For every node M k ∈ D 4, j , j = 1, 2, 3, we compute n k .
At the end of this phase, we have F 4 = {M 1 , M 5 , M 7 } and C 4 = {M3}.Then, M 4 transmits the message P, F, C 4 , where Phase 3 (upon receiving the packet message of M 4 ).When a node M i ∈ N 4 receives the message, it verifies if M i ∈ F 4 .If yes, M i transmits P with the new F i and C i .Notice here that M i , F i , and C i as described above with excluding M 4 .However, if M i ∈ C 4 but not in F 4 , M i needs to decide whether to transmit P or not.M i decides to transmit P only if the transmission of F 4 does not all the neighbors of M i .In our example, M 3 (the only node in the candidate set) can see that its only neighbor M 6 will receive the transmission of M 7 , which is in F 4 .Therefore, M 3 does transmit P. Notice here that since the location of M 7 is attached to P, M 3 can verify if M 6 belongs to N 7 or not.

Discussion of Protocol
Properties.Since our protocol requires that every node sends its information to the immediate neighbors, by the classification of Williams and Camp [8], our protocol is considered a "neighbor knowledge" scheme.Therefore, the correctness of the protocol greatly depends on each node having accurate knowledge of its neighbors.In locBcast, every node sends a control message periodically or upon a significant velocity change, which ensures up-to-date neighborhood knowledge.
In terms of control messages overhead, locBcast only relies on periodic sending of a small amount of data: the number of node's neighbors, the ids of the nodes in F i and their locations, and the ids of nodes in C i (F i and C i are attached with data messages).In particular, the sizes of F i and C i are expected to be small.If the network is sparse, then each node only has a small number of neighbors in any case, and the combined size of F i and C i is bounded by the size of the 1-hop neighborhood.If the network is dense, then there is a great overlap between the areas covered by the transmission ranges of neighbors.Hence, most nodes do not participate neither in F i nor in C i , so their size is kept small.This is demonstrated in Figure 5, which summarizes the results of the following experiment.We have placed varying numbers of mobile nodes uniformly at random in a square area of 1000 × 1000 m 2 and measured the maximum and average sizes of the C i and F i fields generated by locBcast.The number of nodes ranged from 1 to 700.As can be seen, both the maximum and average sizes of F i remain constant.This can be expected, since the denser the network becomes, the more coverage we get from each single transmission.As for C i , it appears that its size grows sublinearly with the density, and the latter roughly grows as O( √ n).Finally, as locBcast builds a source-based dissemination tree with little overlap, the dissemination of data messages themselves is also very efficient.As we report in Section 5, empirically, locBcast is indeed quite parsimonious compared to other "neighbor knowledge" approaches.We now turn our attention to the reliability of locBcast.We start by showing that every node in the 2-hop neighborhood of the sender of a message receives the message, unless it moves away too quickly.By applying this claim recursively, we prove that locBcast disseminates messages reliably to the entire network, at least when the rate of change in the network is slower than the propagation speed of a message.
Claim 1.If a mobile node M i transmits a packet P and there are no message losses, then every node M j that is in P's 2-hop neighborhood at the time of transmission will either receive P or move out of M i 's 2-hop neighborhood.
Proof.If a node M j moves out of the 2-hop neighborhood of M i , then the claim is satisfied immediately.Hence, we concentrate on the situation in which M j remains in the 2hop neighborhood of M i .Notice that if a node M j is in the 1-hop neighborhood of M i , then M j will receive the message.As for a node M j that is not in the 1-hop neighborhood, by the protocol's code, one of the joint neighbors of M i and M j will rebroadcast P, and M j will receive it.
Message losses may occur mainly due to collisions.However, by jittering broadcasts [20], it is possible to eliminate most of them.Additional remedy may include rebroadcasting each message more than once, or periodic gossip [12].At any event, this problem is common in all neighbor knowledge protocols, and the same solutions can be applied to all of them.As reported in Section 5, our experimental results have shown that locBcast is at least as reliable as any other neighbor knowledge protocol we compared with.In some situations, counter-based protocols, such as [5], can be more reliable, but at the cost of much higher latency.

Performance Evaluation
In this section, we evaluate the performance of locBcast and compare it with the performance of five other broadcast protocols.In our simulations we have mainly measured the percentage of received messages (reliability) and the average latency to disseminate a message to all the nodes.

Simulation Setup.
We have used the JiST/SWANS simulator [21] to evaluate the protocols.In JiST/SWANS, nodes use two-ray ground radio propagation model with IEEE 802.11MAC protocol and 54 Mb/sec bandwidth.Two concurrent transmissions can collide, in which case, the messages will not be received by some of the nodes.The collision may occur without the transmitting node detecting the problem, a phenomenon known as the hidden terminal problem.The transmission range was set to roughly 200 meters.The nodes were placed at uniformly random locations in a square area of 500 × 500 m 2 in some measurements and 1000 × 1000 m 2 in others.Mobility was modelled by the Random-Waypoint model [22] with the speed of movement picked from the range 1-10 m/s.(Notice that by setting the minimal speed to a positive value, we avoid the known problem of Random-Waypoint of eventually ending up with a static network.)For high mobility, we set the speed from the range 20-50 m/s.In our simulations, we vary the number of nodes, the number of broadcasting nodes (senders), and size of data messages.In every run, each broadcasting node sends 10 messages and then after a cool-down period the simulation is being terminated.Namely, in every round there are 10 × n messages, where n is the number of nodes.Each data point was generated as an average of 10 runs.
In addition to our locBcast protocol, we have simulated the following protocols: Flooding.This is the basic flooding protocol where every node transmits a packet upon receiving it for the first time.Probabilistic Flooding (Gossip).In this protocol, when a node M i receives a packet for the first time, it transmits it with probability p and with probability 1− p it discards the packet.
Counterb.This is the counter-based scheme presented by Tseng et al. [5].In counterb, upon receiving a new packet by M i , M i initiates a counter with a value of one and sets a random assessment delay (RAD), which is randomly chosen between 0 and Tmax seconds.During the RAD, the counter is incremented by one for each redundant packet received.If the counter is less than a threshold value when the RAD expires, the packet is transmitted.Otherwise, it is simply dropped.
SelfP.This is the self-pruning protocol presented by Lim and Kim [2].This protocol requires that each node have knowledge of its 1-hop neighbors, which is obtained via periodic "Hello" packets.A node includes its list of known neighbors in the header of each broadcast packet.A node receiving a broadcast packet compares its neighbor list to the senders neighbor list.If the receiving node would not reach any additional nodes, it refrains from transmitting; otherwise the node transmits the packet.
DominantP.This is the dominant pruning protocol presented by Lim and Kim [2].dominatP requires 2-hop neighbor knowledge.Here, the sender determines the forwarding nodes from its 1-hop neighbors.Only those chosen nodes are allowed to transmit.When a node receives a packet, it checks the header to see if its address is part of the list.

Results
. We conducted our simulation on different environments to demonstrate most of the different environments in MANETs.In the following section, we describe each environment and show the results.

Small Area with High
Load.We start with the challenge environment of small area with highly message transmission.
We consider here the behavior of our protocol comparing with the others.Figure 6 shows the percentage of received messages (reliability) versus the number of nodes with high load of data messages, where the number of senders is 20.The area size is 500 × 500 m 2 and the message size is 50 B. Notice that when the number of nodes is only 4, the network is disconnected, which is why all protocols achieve low delivery ratio.As the number of nodes increases and the network becomes connected, so the reliability also improves.Yet, as the network becomes too dense, collisions occur, thereby reducing the reliability of all protocols.Still, counterb degrades the most graceful, since it has builtin mechanism to adjust its overhead to density.Moreover, counterb includes a jitter mechanism, by which nodes delay their transmissions for a random period of time, which further helps to reduce collisions.Next are locBcast and dominantP, which build a fairly efficient dissemination tree.Their main overhead comes from their control message overhead (the "Hello" messages).locBcast is better here because it imposes less overhead than dominantP.Flooding, gossip, and selfP perform the worst, since they are too verbose, thereby generating too many collisions.
The latency of the various protocols, under the same settings as above, is depicted in Figure 7.As can be seen, couterb has the worst latency.This is due to the same jitter that enables counterb to be so reliable.On the other hand, dominantP and locBcast exhibit the shortest latency, as they both build highly efficient dissemination trees.
Figure 8 presents the total number of transmitted messages versus the number of nodes, using the same settings as above.As expected, counterb and locBcast generate the smallest number of messages transmissions, followed closely by dominantP.On the other hand, flooding, gossip, and selfP generate a large number of message transmissions.Notice that although dominantP has the full knowledge of the 2hop neighborhood, locBcast generates fewer transmissions than dominantP.This is because in locBcast, the sender does not decide about all the forwarding nodes.Rather, it has a candidate set where a receiving node can make a better decision about whether to transmit or not.
Similarly, Figure 9 shows the total number of generated control messages versus the number of nodes.Flooding and gossip do not send any control messages.Since every control message needs to propagate within the 2-hop distance, dominantP has the highest number of control messages.Counterb and locBcast have few control messages to indicate the neighbors.Recall that in selfP control messages are generated periodically.

Small Area with Low Load.
In this environment, we considered an area of 500 × 500 m 2 and low message transmissions.We present here another experiment with the same settings described above.We vary the density of the network (number of nodes) while the data message load is low.Figure 10 presents the reliability versus number of nodes with low load, where the number of senders is only five.We can see that every protocol achieves high reliability.This is because under low load, collisions between messages are very rare.Nevertheless, counterb and locBcast achieve the highest reliability among the others.Now we vary the message size to examine its effect on the results.
Figures 11 and 12 present the reliability and latency versus message size, respectively.In this simulation, we have 30 mobile nodes in an area of 500 × 500 m 2 , and the number of senders is 5.We can see here that, especially for large messages, our protocol achieves the best reliability and latency results among all the protocols.As in the other simulations, counterb has the worst latency.Notice here that dominantP achieves good results since there is a small number of nodes, so its control messages rarely collide.
Additionally, in this environment, we would like to check the effect of high mobility on the results.Figures 13 and 14 present the reliability and latency versus the number of nodes with high mobility, where every node moves within a speed of 20-50 m/s.The message load is low and the message size is 50 B.We can see here that counterb and locBcast achieve the highest reliability.Regarding latency, locBcast achieves the lowest latency after dominantP.These results indicate the benefit of locBcast in the high-mobility environments, where every node can extrapolate the location of its neighbors without the need for control messages.

Large Area with Low
Load.We now consider the environment of 1000 × 1000 m 2 with low message transmission.
Figure 15 presents the reliability versus the number of senders with 100 mobile nodes in an area of 1000 × 1000 m 2 , where the message size is 50 B. Regardless of the number of senders, dominatP has the worst reliability.This is because when the network is dense, dominatP generates many large control messages that mostly collide.Therefore, every node has an incomplete view of its 2-hop neighbors.All other protocols achieve much better results, with counterb being the best, followed closely by locBcast.
With the same settings of Figures 15 and 16 presenting the latency versus the number of senders, as expected, counterb has the worst latency where every message is delayed before any further transmission.On the other hand, dominantP has the lowest latency with the bad reliability results.This is because the small number of transmissions in the incomplete view of its 2-hop neighbors.As in the reliability case, locBcast achieves the second best latency (after dominantP).Therefore, in many different simulations we notice that our protocol, locBcast, obtains a good tradeoff between reliability, latency, and message overhead compared to the other protocols.

Conclusions
In this paper, we have investigated the benefits of utilizing location information in dissemination protocols for MANETs.In particular, we have presented a new approach that utilizes positioning information in order to generate an efficient dissemination tree while only maintaining 1-hop neighborhood information.
Our simulation results have shown that this approach obtains a good tradeoff between reliability, latency, and message overhead.In particular, locBcast obtains good results in all these metrics.In contrast, for any other scheme we have compared with, if that scheme excels in one of these metrics, it performs poorly in another metric.Moreover, the performance of locBcast is especially in opportunistic networks, where mobility is high, network may be dense, and message size can be larger than 1 KB.

Figure 4 :
Figure 4: An example of ad hoc system with ten mobile nodes.

× 1000 m 2 Figure 5 :
Figure 5: Size of F i and C i as a function of network density.

Figure 6 :
Figure 6: Reliability versus number of nodes with high load.

Figure 7 :
Figure 7: Latency versus number of nodes with high load.

Figure 9 :
Figure 9: The number of generated control messages.

Figure 10 : 5 Figure 11 :
Figure 10: Reliability versus number of nodes with low load.

Figure 3
Figure 3 presents the graph H 1 , which is obtained from the graph of Figure 2 by extracting the node M 1 .There are three disjoint connected sets in H 1 .
16) enddo / * end of the external loop * / Algorithm 1: The determination of F i and C i at M i .the maximum value is 1.So we choose either M 1 or M 3 to be in F 4 and the other in C 4 .Let us choose M 1 to be in F 4 and M 3 to be in C 4 .

Figure 13 :
Figure 13: Reliability versus number of nodes with high mobility.

Figure 14 :
Figure 14: Latency versus number of nodes with high mobility.
in N i ; the vertices are the mobile nodes of N i and an edge of E i exists between two vertices in G i only if they are neighbors.Notice that M i has an edge in G i to every other node.Consider now the subgraph H i , which is obtained from G i by extracting the node M i .Since some neighbors of N i may become disconnected without M i , the subgraph H i consists of disjoint connected components.Assume that we have m disjoint connected components in H i .Let D i = {D i,1 , . . ., D i,m } be the collection of the disjoint connected sets in H i .Namely, two nodes M l , M h ∈ N i belong to D i, j