Size: px
Start display at page:

Download ""

Transcription

1

2

3

4

5

6

7

8

9

10 m p k

11

12

13 A E N 1..N 6 A E k = 5m, 1m, 15m, 2m

14 Φ Φ minbe

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30 Operating Mode Current (mah) ATMega1281V, full operation 6 (7.37 MHz) ATMega1281V, sleep.1 Radio, receive 16 Radio, transmit (1 mw power) 17 Radio, sleep.1 Serial flash memory, write 15 Serial flash memory, read 4 Serial flash memory, sleep.2 Table 2.1: Current consumption of various system components and operations for an IRIS OEM Crossbow node.

31

32

33

34 source attacker destination RREQ RREP Figure 2.1: Illustration of a black-hole attack. The malicious node, in red, claims to have a shorter route to the destination compared to the ones offered by its neighbors. So, the malicious node attracts the traffic from the source to the destination.

35 source attacker destination RREQ RREP Figure 2.2: Illustration of a Sybil attack in multi-path routing. The malicious node, in red, presents two different identities, giving the impression to the source node that there exist two different paths to the destination. So, the malicious node will attract all the traffic from source to destination.

36

37

38

39 TBO A = K A(src) TBO B = K B(N B, K A (src)) TBO C = K C(N C, K B (N B, K A (src))) TBO D = K D (N D, K C (N C, K B (N B, K A (src)))) TBO A TBO B TBO C TBO D A B C D E TBO A TBO B TBO C TBO D Figure 2.3: ANODR TBO: Anonymous route discovery from node A to node E. A < RREQ, tr dest, onion > tr dest onion X N X K X N X K X X D N D < RREP, N D, onion >

40 X N X N P revioushop N X N P revioushop N X N N A B C D E N 1 N 2 N 3 N 4 N 5 N 6 N 1 N 2 N 2 N 3 N 3 N 4 N 4 N 5 N 5 N 6 Figure 2.4: ANODR TBO: Using route pseudonyms N 1..N 6 to route messages from A to E.

41

42 i < K A (A, data), ID Ai, checksum > K A (A, data) A K A ID Ai A i checksum A B t A m B id At A K A B

43 t A id At B A m B B id At B A m A B A δ t δ t

44

45

46 n m (n 1) m n (n 1) m 1,.16 16,

47

48

49 p p c < 1 p > p c p < p c p c p

50 p p C T max

51 d d min = d d min

52

53 T max T max

54 p p

55 m k p = 1 m = 1 k = 1 p =.65 m p k

56 5m, 1m, 15m, 2m

57 Avg. Internode Distance Avg. Neighbors Network Diameter MAC TX Success Ratio = 5m = 1m = 15m = 2m Table 3.1: Characteristics of the considered network configurations. m p p {%, 1%, 2%,..., 1%} m {, 1, 2, 3} p m {5m, 1m, 15m, 2m} k p m p m m = p p

58 1 Receivers (% Nodes).8.6 5m.4 1m.2 15m 2m m 1m 15m 2m m 1m 15m 2m m 1m 15m 2m Forwarders (% Nodes) m.4 1m.2 15m 2m m 1m 15m 2m m 1m 15m 2m m 1m 15m 2m dissemination time (sec) m 1m 15m 2m m 1m 15m 2m m 1m 15m 2m m 1m 15m 2m Fwd. p Fwd. p Fwd. p Fwd. p (i): m= (j): m=1 (k): m=2 (l): m=3 Figure 3.1: Performance of Gossip3. We vary the parameters p and m in networks with inter-node distance: 5m, 1m, 15m, 2m. Latency represents the time, in seconds, to cover 9% of the nodes. m 1 p = 2m m = 1 p = 1 p = m = 3

59 p m p p p p p = p =.1 p =.2 p =.3 p =.1 m = 1 p m p p

60 p p = 5m = 1m p p k k k = 1 k k = k = 1 = 5m : p =.1, m = 1 = 1m : p =.2, m = 1 = 15m : p =.3, m = 1 = 2m : p =.6, m = 3 k = 1 = 5m k = 1 k = k = 1

61 k= k=1 k= k=1 1 1 Receivers (% Nodes) Forwarders (% Nodes) Avg. Node Distance (Δ) Avg. Node Distance (Δ) (a): Coverage (b): Forwarders k= k=1 Latency (s) Avg. Node Distance (Δ) (c): Latency to reach 9% coverage Figure 3.2: Evaluation of parameter k for uniform networks of various densities.

62 Receivers (% Nodes) m 1m.2 15m 2m Forwarding Ratio m 1m 15m 2m Delay Factor Delay Factor (a): Coverage (b): Forwarding ratio Latency (s) m 1m 15m 2m Delay Factor (c): Latency Figure 3.3: Performance of Gossip3 for various values of delay factor.

63 p =.65, m = 1, k = 1 = 5m p =.1 = 2m m = 3 m = 1

64 p p p m > k = p < 1m p =.1 1m 15m p =.2 > 15m p =.4 m = 1 15m m = 3 > 15m

65 Final Forwarding Probability m 6m 7m 8m 9m 1m 15m 2m p(n) Neighborhood Size, N Figure 3.4: The resulting forwarding ratio per node of Gossip3 with optimal parameters in function of neighborhood size. Dots represent nodes and colors represent the network density. p p p p(n) = 1.87 e 5 N 2.3 N p(n) p

66 p curr = p(n curr ) N curr p curr p(n) N j i P RR(i, j) k N(i) = P RR(i, k) k {nodes in i s radio range} m m = 1 m = 1 m 3 = 2m

67 m = 3 = 1m m N N i i i 3 i N i N j N i N j N min i N N min N min = 8 N min

68 = 5m = 1m = 15m = 2m p m k Table 3.2: Parameters of optimal Gossip3 configuration for the considered uniform networks. N min (i) (ii) p =.65 m = 1 k = 1 = 5m, 1m, 15m, 2m k =

69 Adaptive Optimal Default Adaptive Optimal Default 1 1 Receivers (% nodes) Forwarders (% nodes) Avg. Node Distance (Δ) Avg. Node Distance (Δ) (a): Coverage (b): Forwarders Adaptive Optimal Default Adaptive Optimal Default Forwarding ratio Time (s) Avg. Node Distance (Δ) Avg. Node Distance (Δ) (c): Forwarding ratio (d): Latency Figure 3.5: Performance of various Gossip3 configurations in uniform networks with inter-node distance = 5m, 1m, 15m, 2m. = 2m 8% m = 1.65 = 2m

70 % nodes % nodes % nodes Number of Neighbors Number of Neighbors Number of Neighbors (a): N=64 (b): N=128 (c): N= % nodes % nodes Number of Neighbors (d): N=512 Number of Neighbors (e): N=124 Figure 3.6: Histogram of degree distribution for various network sizes. p =.65 = 2m = 1m = 15m = 2m

71 Adaptive Default Adaptive Default 1 1 Receivers (% Nodes) Forwarders (% Nodes) Network Size (N) Network Size (N) (a): Coverage (b): Forwarders Adaptive Default Adaptive Default 1 2 Forwarding Ratio Time (s) Network Size (N) Network Size (N) (c): Forwarding ratio (d): Latency Figure 3.7: Performance of default and adaptive Gossip3 for various network sizes. N =

72 35 Y 3 25 B 2 15 A C Figure 3.8: Non-uniform network topology. Nodes A, B and C act as sources while the rest of the nodes generate continuously synthetic packets to emulate high traffic at the MAC layer. X 128 N = 256 N = p =.65 p =.1

73 Adaptive Default Adaptive Default Receivers (% Nodes) A B C latency (s) A B C Source Node Source Node (a): Coverage (b): Latency Figure 3.9: Performance of default and adaptive Gossip3 in a non-uniform network. Latency represents the average time it takes to reach 8% coverage. Y X (a): Gossip3 Y X (b): Adaptive Gossip3 Figure 3.1: Resulting forwarding ratio of nodes in a non-uniform network represented as color-coded circles.

74 Adaptive Default Forwarders (% Nodes) A B C Source Node Figure 3.11: Fraction of forwarders, grouped by source node, for default and adaptive Gossip3 in a non-uniform network.

75 p

76

77

78 Packets delivered Packets sent Figure 4.1: Representation of the congestion problem at the MAC layer.

79 B A C A C A B C A B A B B

80 A B C Figure 4.2: Hidden terminal problem. B B A

81

82

83

84 Type Collision Avoidance Energyaware Data rate Adaptive to mobility Adaptive to density IEEE CSMA RTS-CTS/ None No High Yes Yes, limited Sift CSMA RTS-CTS No High No Yes CSMA- ARC CSMA Implicit No Low No Yes B-MAC CSMA RTS-CTS/ Implicit Yes Low Yes Yes S-MAC CSMA RTS-CTS Yes Low No No LMAC TDMA Scheduling Yes Fixed No No MLMAC TDMA Scheduling Yes Fixed Yes No GMAC TDMA None Yes Low Yes Yes Z-MAC TDMA/ CSMA Scheduling Yes Low No No Table 4.1: Comparative summary of MAC protocols.

85 ρ s = N/ρ N

86 Parameter Value Topology APP Layer NET Layer MAC Layer Network Size (N) 1 Nodes Distribution random Network Diameter 4 Number of Messages 1 Message Generation Rate (ρ) 1-1 mps Protocol Gossip3 Fwd. Probability (p).3 Compensation factor (m) 1 Flooding Hops (k) Protocol CSMA exp. back-off MinBE 3, 8 Table 4.2: Experimental settings divided by protocol stacks = 15m 2 BE 1 BE

87 Receivers (% Nodes) minbe = 3.2 minbe = Forwarding Ratio.6 minbe = 3 minbe = Message Generation Rate (mps) Message Generation Rate (mps) (a): Coverage (b): Forwarding Ratio Figure 4.3: Performance of Gossip3 configured with optimal parameters Evaluation of two different MAC configurations in function of message generation rate. 32µs BE minbe BE minbe minbe minbe = 3 minbe = 8 minbe = 3 minbe = 8 p =.3

88 p =.3 minbe = 3 minbe = 8 minbe = 3 minbe = 8 minbe = 3 minbe = 8 minbe = 8 minbe = 3 minbe = 8 minbe = 3 minbe

89 4 probabilistic compensation # Rebroadcasts (x1) Message Generation Rate (mps) (a): minbe = 3 4 probabilistic compensation # Rebroadcasts (x1) Message Generation Rate (mps) (b): minbe = 8 Figure 4.4: Distribution of rebroadcasts in function of message generation rate. In Gossip3 newly received packets are either rebroadcast probabilistically, at first, or, shortly after, if found to be not redundant enough. We have adopted Gossip3 with optimal parameters, p=.3,m=1,k= and network size N = 1.

90 1 1 Time (s) 1.1 minbe = minbe = Message Generation Rate (mps) Figure 4.5: Latency of Gossip3 to disseminate messages to 9% of the nodes. minbe = 3 minbe = 8 minbe = 3 minbe = 8 minbe = 3 minbe = 8 minbe = 3 minbe = 8

91 4 4 # Packets (x1) transmissions collisions # Packets (x1) transmissions collisions Message Generation Rate (mps) Message Generation Rate (mps) (a): minbe=3 (b): minbe=8 Figure 4.6: Number of transmissions and collisions at the MAC layer Evaluation of two different MAC configurations in function of message generation rate # Packets minbe = 3 minbe = Message Generation Rate (mps) Figure 4.7: Number of packet overflow at the MAC layer in function of message generation rate. minbe

92 minbe

93 i j Q opt ij = RX ij T X i RX ij j i T X i i i j Q opt ij q ij = Q ij Q opt ij Q ij = RX ij T X i i j Q opt ij i j G G = i N G i G i i G i = T X i q i q i i n(i) q i = 1 n(i) j n(i) q ij

94 Φ Φ = ( N i=1 r i ) 2 N N i=1 r i 2 r i i r i = simulation time = 5, 1, 15, 2m minbe minbe minbe G i

95 Goodput (x1) constant exponential MinBE MinBE MinBE MinBE (a): = 5m (b): = 1m (c): = 15m (d): = 2m Figure 4.8: Network goodput for grid topologies. minbe minbe minbe minbe minbe = 5m = 5m = 5m minbe = 7

96 Time (s) constant exponential MinBE MinBE MinBE MinBE (a): = 5m (b): = 1m (c): = 15m (d): = 2m Figure 4.9: One-hop packet latency for grid topology. Φ constant exponential MinBE MinBE MinBE MinBE (a): = 5m (b): = 1m (c): = 15m (d): = 2m Figure 4.1: Fairness Index Φ for grid topologies. Φ minbe = 5m minbe = 7, 8, 9 = 5m = 5m

97 % Nodes Exponential CW % Nodes Exponential CW % Nodes Constant CW % Nodes Constant CW Number of Transmissions (a): = 5m Number of Transmissions (b): = 1m % Nodes Exponential CW % Nodes Exponential CW % Nodes Constant CW % Nodes Constant CW Number of Transmissions (c): = 15m Number of Transmissions (d): = 2m Figure 4.11: Distribution of transmitted packets in grid topologies.

98 Number of Nodes Grid Random Neighbors Neighbors Neighbors Neighbors (a): = 5m (b): = 1m (c): = 15m (d): = 2m Figure 4.12: Degree distribution of nodes for grid and random topologies of various densities. minbe minbe = 1.5 minbe = 7

99 Goodput (x1) constant exponential MinBE MinBE MinBE MinBE (a): = 5m (b): = 1m (c): = 15m (d): = 2m Figure 4.13: Network goodput for random topologies. Time (sec) constant exponential MinBE MinBE MinBE MinBE (a): = 5 (b): = 1 (c): = 15 (d): = 2 Figure 4.14: One-hop packet latency for random topologies. minbe = 1.5 minbe = 7 minbe minbe minbe minbe

100 % Nodes Exponential CW % Nodes Exponential CW % Nodes Constant CW Goodput (a): = 5m % Nodes Constant CW Goodput (b): = 1m % Nodes Exponential CW % Nodes Exponential CW % Nodes Constant CW % Nodes Constant CW Goodput (c): = 15m Goodput (d): = 2m Figure 4.15: Goodput distribution for random topologies.

101 Φ constant exponential MinBE MinBE MinBE MinBE (a): = 5m (b): = 1m (c): = 15m (d): = 2m Figure 4.16: Fairness index Φ for random topologies. minbe minbe minbe

102 Δ = 5m Δ = 2m 3 2 Y X Figure 4.17: Non-uniform random topology. = 5m = 2m

103 16 14 Δ=5m Δ=2m 12 Goodput (x1) MinBE Combinations (sparse, dense) Figure 4.18: Network goodput for dual CSMA configuration. minbe minbe minbe minbe minbe minbe = 9.5 minbe minbe = 8.5 minbe = 12.5

104 % Nodes % Nodes MinBE = 11.5, 8 MinBE = 11.5, 8.5 Δ = 5m Δ = 2m Δ = 5m Δ = 2m % Nodes % Nodes MinBE = 11.5, 9 MinBE = 11.5, 9.5 Δ = 5m Δ = 2m Δ = 5m Δ = 2m Goodput Figure 4.19: Goodput distribution for dual CSMA configuration. Varying the minbe of the nodes in the sparse area. minbe = 9.5 minbe minbe minbe minbe = 8

105 % Nodes MinBE = 1, 9 dense sparse % Nodes MinBE = 1.5, 9 dense sparse % Nodes MinBE = 11, 9 dense sparse % Nodes MinBE = 11.5, 9 dense sparse % Nodes MinBE = 12, 9 dense sparse Goodput Figure 4.2: Goodput distribution for dual CSMA configuration. Varying the minbe of the nodes in the dense area. minbe

106 16 14 Δ=5m Δ=2m 12 Goodput (x1) MinBE Figure 4.21: Network goodput for single CSMA configuration. minbe minbe minbe minbe minbe = 1 minbe minbe minbe

107 % Nodes MinBE = 8 dense sparse % Nodes MinBE = 8 dense sparse % Nodes MinBE = 9 dense sparse % Nodes MinBE = 9 dense sparse % Nodes MinBE = 1 dense sparse % Nodes MinBE = 1 dense sparse % Nodes MinBE = 11 dense sparse % Nodes MinBE = 11 dense sparse % Nodes MinBE = 12 dense sparse % Nodes MinBE = 12 dense sparse Goodput (a): Goodput distribution TX Success Ratio (b): TX Success ratio Figure 4.22: Distribution of goodput and transmission success ratio for single CSMA configuration.

108 minbe minbe = 8 minbe minbe = 11.5 minbe = 9

109 A B C Figure 4.23: Illustration of the problem of interference. The interference range is depicted with dashed lines whereas the transmission range with filled circle.

110 B A C B B A C

111

112

113

114

115 Parameter Value Uniform Topology Network Size (N) 529 Nodes Distribution random Inter-node Distance ( ) 15m APP Layer Number of Messages 1 NET Layer Config 1 Protocol Gossip3 Fwd. Probability (p).. 1 Compensation factor (m) 1 Flooding Hops (k) NET Layer Config 2 Protocol Adaptive Gossip3 MAC Layer Protocol CSMA Backoff constant MinBE Table 5.1: Experimental settings divided by protocol stacks

116 GOSSIP3: Fwd Probability GOSSIP3: Fwd Probability CSMA: MinBE (a): Coverage CSMA: MinBE (b): Fraction of forwarders GOSSIP3: Fwd Probability GOSSIP3: Fwd Probability CSMA: MinBE (c): Forwarding Ratio CSMA: MinBE (d): Latency 9% coverage Figure 5.1: Impact of CSMA and default Gossip3 parameters on message dissemination with synthetic traffic. Network size is 529 and nodes are distributed randomly with average inter-node distance = 15m. minbe = 15m = 5m, 1m, 2m minbe p minbe 1 p p.7 minbe = 8.5

117 minbe minbe 1 p p =.1 p =.2 p =.3 minbe minbe minbe p p p minbe minbe p minbe p minbe = 1, 1.5 p =.3 minbe minbe < 9 minbe minbe

118 Fraction coverage forwarders avg.fwd.ratio Time (s) coverage 7% coverage 8% coverage 9% MAC: minbe MAC: minbe (a): Dissemination Performance (b): Dissemination latency Figure 5.2: Impact of CSMA parameter, minbe, on message dissemination through adaptive Gossip3. Network size is 529 and nodes are distributed randomly with average inter-node distance = 15m. minbe minbe minbe minbe = 1 minbe = 1.5 = 15m

119 Parameter Value Topology Network Size (N) 529 Nodes Distribution random Inter-node Distance ( ) 15m APP Layer Source nodes 529 Messages sent by each source 5 Message Insertion Rate (network) 1, 5, 1, 15 msg/s Period of inserting new message 52.9, 1.6, 5.3, 3.5 s NET Layer Protocol Adaptive Gossip3 MAC Layer Protocol CSMA Backoff constant MinBE Buffer Size 2 Table 5.2: Experimental settings divided by protocol stacks. = 15m minbe minbe >= 1

120 minbe=8 minbe=9 minbe=1 minbe=11 minbe=12 minbe=8 minbe=9 minbe=1 minbe=11 minbe= coverage (% nodes) fwd ratio msg insertion rate (mps) msg insertion rate (mps) (a): Coverage (b): Fwd probability # rebroadcasts (x1) time (s) msg insertion rate (mps) msg insertion rate (mps) (c): Num. Rebroadcasts (d): Dissemination Latency # buffer overflow (x1) msg insertion rate (mps) (e): Buffer overflow Figure 5.3: Performance of adaptive Gossip3. Evaluation of various configurations of the CSMA with various message generation rates. Nodes are randomly distributed with average inter-node distance = 15m.

121 minbe minbe = 8 minbe = 1 minbe minbe minbe minbe minbe = 12 minbe = 9 minbe = 12 minbe = 9 minbe = 9 minbe = 12 minbe = 9 minbe = 1 2 minbe

122 GOSSIP3: fwd probability FILE u 5:($8/1): GOSSIP3: fwd probability FILE using 5:($8/1): CSMA: minbe CSMA: minbe (a): Coverage (b): Forwarders GOSSIP3: fwd probability FILE using 5:($8/1): GOSSIP3: fwd probability FILE using 5:($8/1): CSMA: minbe CSMA: minbe (c): Forwarding Ratio (d): Latency 9% coverage Figure 5.4: Impact of CSMA and Gossip3 parameters on message dissemination. Message generation rate is fixed to 5 mps. Network size is 529 and nodes are distributed randomly with inter-node distance = 15m.

123 p p = p minbe minbe = 1 p =.2 minbe = 12 p =.2 p minbe p

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142 WhitePaper_271211_low-res.pdf/

143

144

145

146

147

148

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Dynamic Source Routing in Ad Hoc Wireless Networks

Dynamic Source Routing in Ad Hoc Wireless Networks Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Introduction to Wireless Sensor Network Security

Introduction to Wireless Sensor Network Security Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith y, and Louise E. Moser y Department of Computer Science y Department of Electrical and Computer

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Medium Access Layer Performance Issues in Wireless Sensor Networks

Medium Access Layer Performance Issues in Wireless Sensor Networks Medium Access Layer Performance Issues in Wireless Sensor Networks Ilker S. Demirkol ilker@boun.edu.tr 13-June-08 CMPE, Boğaziçi University Outline Background: WSN and its MAC Layer Properties Packet Traffic

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

Analysis of Denial of Service Attack Using Proposed Model

Analysis of Denial of Service Attack Using Proposed Model Chapter 5 Analysis of Denial of Service Attack Using Proposed Model 5.0 Introduction An Adhoc network is a collection of nodes that are capable of forming dynamically a temporary network without the support

More information

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

Ad hoc On Demand Distance Vector (AODV) Routing Protocol Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Real-Time Traffic Support in Heterogeneous Mobile Networks

Real-Time Traffic Support in Heterogeneous Mobile Networks Real-Time Traffic Support in Heterogeneous Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara {suny, ebelding}@cs.ucsb.edu Xia Gao

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,

More information

Introduction to Z-Wave. An Introductory Guide to Z-Wave Technology

Introduction to Z-Wave. An Introductory Guide to Z-Wave Technology Introduction to Z-Wave An Introductory Guide to Z-Wave Technology Table of Contents Z-Wave Overview and Functionality... 3 Z-Wave Technology Quick Overview... 3 Radio Specifications... 3 Network and Topology...

More information

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Network Architecture and Topology

Network Architecture and Topology 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches and routers 6. End systems 7. End-to-end

More information

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,

More information

Multi-Channel Wireless Networks: Capacity, Protocols, and Experimentation (with Net-X) Nitin Vaidya

Multi-Channel Wireless Networks: Capacity, Protocols, and Experimentation (with Net-X) Nitin Vaidya Multi-Channel Wireless Networks: Capacity, Protocols, and Experimentation (with Net-X) Nitin Vaidya University of Illinois at Urbana-Champaign www.crhc.uiuc.edu/wireless Joint work with Pradeep Kyasanur,

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

Spatially Limited Contention for Multi-Hop Wireless Networks

Spatially Limited Contention for Multi-Hop Wireless Networks Spatially Limited Contention for Multi-Hop Wireless Networks Fikret Sivrikaya, Sahin Albayrak DAI-Labor / TU Berlin, Germany Bülent Yener Rensselaer Polytechnic Institute, NY, USA Abstract With rapid developments

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networks

Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networks Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networks Mahesh K. Marina Department of ECECS University of Cincinnati Cincinnati, OH 1- USA mmarina@ececs.uc.edu Samir

More information

Halmstad University Post-Print

Halmstad University Post-Print Halmstad University Post-Print Wireless Sensor Networks for Surveillance Applications - A Comparative Survey of MAC Protocols Mahmood Ali, Annette Böhm and Magnus Jonsson N.B.: When citing this work, cite

More information

Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks

Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks Abstract. As many radio chips used in today s sensor mote hardware can work at different frequencies, several multi-channel

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

II RELATED PROTOCOLS. Dynamic Source Routing (DSR)

II RELATED PROTOCOLS. Dynamic Source Routing (DSR) ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra

More information

Optimized Load Balancing Mechanism Using Carry Forward Distance

Optimized Load Balancing Mechanism Using Carry Forward Distance Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,

More information

Research Article Ant Colony and Load Balancing Optimizations for AODV Routing Protocol

Research Article Ant Colony and Load Balancing Optimizations for AODV Routing Protocol Ashdin Publishing International Journal of Sensor Networks and Data Communications Vol. 1 (2012), Article ID X110203, 14 pages doi:10.4303/ijsndc/x110203 Research Article Ant Colony and Load Balancing

More information

A Transport Protocol for Multimedia Wireless Sensor Networks

A Transport Protocol for Multimedia Wireless Sensor Networks A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless

More information

Design of Wireless Sensor Networks

Design of Wireless Sensor Networks Energy-Efficiency Efficiency Issues in Cross-Layer Design of Wireless Sensor Networks Sergio Palazzo palazzo@diit.unict.it Sensor Networks: : a small world Main Features small in size small transmission

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at

More information

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257 Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks

Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks Sensors 2015, 15, 16162-16195; doi:10.3390/s150716162 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted

More information

Delay aware Reactive Routing Protocols for QoS in MANETs: a Review

Delay aware Reactive Routing Protocols for QoS in MANETs: a Review Delay aware Reactive Routing Protocols for QoS in MANETs: a Review Saad M. Adam*, Rosilah Hassan Network and Communication Technology Research Group, Faculty of Information Science and Technology, Universiti

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN)

ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN) ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN) Yao, Yanjun 1 Papers Real-time Power-Aware Routing in Sensor Networks Real-Time Traffic Management in Sensor

More information

Energy Efficiency of Load Balancing in MANET Routing Protocols

Energy Efficiency of Load Balancing in MANET Routing Protocols Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing protocols and workload balancing techniques

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing

More information

A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks

A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks Natarajan Meghanathan 1 and Leslie C. Milton 2 1 Jackson State University, 1400 John Lynch

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

IP Multicasting. Applications with multiple receivers

IP Multicasting. Applications with multiple receivers IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data

More information

... neither PCF nor CA used in practice

... neither PCF nor CA used in practice IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)

FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) FORTH-ICS / TR-375 March 26 Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) Vasilios A. Siris 1 and George Stamatakis 1 Abstract We investigate the operation and performance of WMM (WiFi

More information

THE development of media access control (MAC) protocols

THE development of media access control (MAC) protocols 710 IEEE JOURNAL OF OCEANIC ENGINEERING, VOL. 32, NO. 3, JULY 2007 UWAN-MAC: An Energy-Efficient MAC Protocol for Underwater Acoustic Wireless Sensor Networks Min Kyoung Park, Member, IEEE, and Volkan

More information

Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks

Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks Vikram Gupta +, Srikanth Krishnamurthy, and Michalis Faloutsos Abstract Department of Computer Science and Engineering, UC Riverside,

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node

More information

other. A B AP wired network

other. A B AP wired network 1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer

More information

Effective Link Operation Duration: a New Routing Metric for Mobile Ad Hoc Networks

Effective Link Operation Duration: a New Routing Metric for Mobile Ad Hoc Networks Effective Link Operation Duration: a New Routing Metric for Mobile Ad Hoc Networks Xiaoqin Chen, Haley M. Jones, A.D.S. Jayalath Department of Information Engineering, CECS Department of Engineering, CECS

More information

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks a Mobile Ad hoc NETwork (MANET) is one that comes together as needed, not necessarily with any support from the existing infrastructure or any

More information

Metrics for Detection of DDoS Attacks

Metrics for Detection of DDoS Attacks Chapter 3 Metrics for Detection of DDoS Attacks The DDoS attacks are trying to interfere with the physical transmission and reception of wireless communications. Attacks are caused by jamming, exhaustion,

More information

A SURVEY OF MAC PROTOCOLS FOR SENSOR NETWORKS

A SURVEY OF MAC PROTOCOLS FOR SENSOR NETWORKS Chapter 5 A SURVEY OF MAC PROTOCOLS FOR SENSOR NETWORKS Piyush Naik and Krishna M. Sivalingam Dept. of CSEE, University of Maryland, Baltimore County, Baltimore, MD 21250 piyush.naik@umbc.edu,krishna@umbc.edu

More information

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering

More information

Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks

Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks Department of Electrical Engineering, Mathematics and Computer Science Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks Master Thesis Thijs Mutter 439 Supervisors

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Performance Evaluation of Unicast and Broadcast Mobile Ad-hoc Networks Routing Protocols

Performance Evaluation of Unicast and Broadcast Mobile Ad-hoc Networks Routing Protocols Vol. 7, No., 200 Performance Evaluation of Unicast and Broadcast Mobile Ad-hoc Networks Routing Protocols Sumon Kumar Debnath, Foez Ahmed 2, and Nayeema Islam 3 Dept. of Computer Science and Telecommunication

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Tema 5.- Seguridad. Problemas Soluciones

Tema 5.- Seguridad. Problemas Soluciones Tema 5.- Seguridad Problemas Soluciones Wireless medium is easy to snoop on Routing security vulnerabilities Due to ad hoc connectivity and mobility, it is hard to guarantee access to any particular node

More information

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS M. Tamilarasi 1, T.G. Palanivelu 2, 1, 2 Department of ECE, Pondicherry Engineering College, Puducherry-605014. Email:

More information

Study of Network Characteristics Incorporating Different Routing Protocols

Study of Network Characteristics Incorporating Different Routing Protocols Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab

More information