TLT-2756 Ad Hoc Networks

Size: px
Start display at page:

Download "TLT-2756 Ad Hoc Networks"

Transcription

1 TLT-2756 Ad Hoc Networks Dmitri A. Moltchanov

2 1. Why this course? What is ad hoc? nodes that may self-configure creating temporal topologies. We have several reasons to consider ad-hoc networks: ad hoc is the prominent paradigm for mobile communications; the major breakthrough may occur in ad-hoc networking; note: most challenges of ad-hoc networking are still unsolved. Some facts: there are few test installations of ad hoc networks; some products are available at the market; sensor networks are special type of ad hoc networks; mesh networks are special type of ad hoc networks. Lecture: Course overview 2

3 2. What we consider? This course serves as an introduction to ad-hoc networking: basics and challenges of wireless networking; challenges of ad-hoc networks; basics of ad-hoc networking; problems and current solutions to these problems; research directions and open problems in ad-hoc networking. The structure of the course: part I: introduction and background information; part II: access and networking for devises; part III: special issues. Lecture: Course overview 3

4 3. Credit points In overall 3 5 CPs can be obtained: pass of exam is required to get base of 3 CP. 70% of lecture attendance is required to get additional 1 CP; correct completion of assignments is required to get 1 CP; Important: if you do not pass exam you get nothing. Lecture: Course overview 4

5 4. Recommended reading Some facts about protocols in ad hoc networks: more than 50 different MAC proposals... more than 50 different routing protocols... more than 10 different TCP modifications... Why? no well-defined solutions, technology is still developed... The following reading is recommended: C. Siva Ram Murthy, B.S. Manoj, Ad-hoc wireless networks, Prentice Hall, 2004; Journals and conference papers: Journals and conference papers: Journals and conference papers: Lecture: Course overview 5

6 5. Arrangements Important: lectures will be given once a week during periods 1 and 2: Every Tuesday starting from ; Room TB223, time 16:00 17:45. two assignments: contain tasks related to simulation of ad hoc environment; will be available at the course page soon. exam date:??? usually there are three attempts to pass exam; check the POP system; you have to sign for exam at least one week before!. Lecture: Course overview 6

7 6. Persons in charge Lecturers: D. Moltchanov, moltchan[at]cs.tut.fi. Y. Koucheryavy, yk[at]cs.tut.fi. Assistant: J. Jakibiak, jakub.jakubiak[at]tut.fi. Lecture: Course overview 7

8 7. Expected knowledge Topics: TLT-2106 Basic Course on Networking; TLT-2306 Communications Protocols; knowledge of wireless networking is appreciated. Those who are interested in the topic are always welcome! Lecture: Course overview 8

9 8. Overview of lectures Lecture 2: Basics of wireless communications Why we are talking about wireless? The electromagnetic spectrum Radio propagation Modulation techniques Error control over wireless channels Centralized access Distributed access Lecture: Course overview 9

10 Lecture 3: Challenges, specifics and applications Historic aspects Cellular vs. ad hoc Applications of ad hoc networks Example of MAC protocol Example of routing protocol Example of transport layer protocol Lecture: Course overview 10

11 Lectures 4 and 5: MAC protocols Problems we have to deal with Design goals Contention-based protocols Contention-based with reservation Contention-based with scheduling MAC for directional antennas Special MAC protocol. Lecture: Course overview 11

12 Lectures 6 and 7: Routing protocols Problems we have to deal with Design goals IETF MANET working group Proactive routing protocols Reactive routing protocols Hybrid routing protocols Hierarchial routing protocols Power aware routing protocols Lecture: Course overview 12

13 Lectures 8: Transport layer protocols Problems we have to deal with Design goals TCP or UDP for MANETs? TCP modifications Other protocols Lecture: Course overview 13

14 Lectures 9: Energy management in ad hoc network Why is this an issue? Power-aware terminals Energy draining patterns When and how to save? Examples of schemes Lecture: Course overview 14

15 Lectures 10: Security in ad hoc networks Why is this an issue? Wireless and ad hoc specifics Types of attacks Common attacks Specific attacks Lecture: Course overview 15

16 Lectures 11: Quality of service Do we really need it? Traffic classes Ad hoc specifics Enabling traffic forwarding Compensation strategies Possible solutions Lecture: Course overview 16

17 Lectures 12: Wireless sensor networks Specifics of wireless sensor networks Difference between ad hoc and sensor networks Design goals Applications Examples of solutions Lecture: Course overview 17

18 Lectures 13: Wireless mesh networks Special challenges of wireless mesh networks why is it so successful? Design goals Applications Car-2-car and vehicular communications Examples of solutions Lecture: Course overview 18

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

www.mindteck.com 6LoWPAN Technical Overview

www.mindteck.com 6LoWPAN Technical Overview www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Problems of Security in Ad Hoc Sensor Network

Problems of Security in Ad Hoc Sensor Network Problems of Security in Ad Hoc Sensor Network Petr Hanáček * hanacek@fit.vutbr.cz Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

OPNET Network Simulator

OPNET Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

Horizon: Balancing TCP over multiple paths in wireless mesh networks

Horizon: Balancing TCP over multiple paths in wireless mesh networks Horizon: Balancing TCP over multiple paths in wireless mesh networks Bozidar Radunovic, Christos Gkantsidis, Dinan Gunawardena, Peter Key Microsoft Research Cambridge, UK Wireless Mesh Networks Goals 1.

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

OPNET - Network Simulator

OPNET - Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET - Network Simulator Jarmo Prokkola Project Manager, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor

More information

Cross Layer TCP Congestion Control Load Balancing Technique in MANET

Cross Layer TCP Congestion Control Load Balancing Technique in MANET Cross Layer TCP Congestion Control Load Balancing Technique in MANET Nidhi Shukla 1, Neelesh Gupta 2, Naushad Parveen 3 1 M.Tech Scholar (ECE), 2 Prof & Head (ECE), 3 Asst. Prof. ( ECE), Department of

More information

Mesh Networks. Abdus Salam ICTP, February 2004 Schoolon DigitalRadio Communications for Research and Training in Developing Countries

Mesh Networks. Abdus Salam ICTP, February 2004 Schoolon DigitalRadio Communications for Research and Training in Developing Countries Mesh Networks Abdus Salam ICTP, February 2004 Schoolon DigitalRadio Communications for Research and Training in Developing Countries Ermanno Pietrosemoli Escuela Latinoamericana de Redes (Latin American

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Modern Wireless Communication

Modern Wireless Communication Modern Wireless Communication Simon Haykin, Michael Moher CH01-1 Chapter 1 Introduction CH01-2 1 Contents 1.1 Background 1.2 Communication Systems 1.3 Physical Layer 1.4 The Data-Link Layer 1.4.1 FDMA

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of

More information

T-79.7001 Postgraduate Course in Theoretical Computer Science T-79.5401 Special Course in Mobility Management: Ad hoc networks (2-10 cr) P V

T-79.7001 Postgraduate Course in Theoretical Computer Science T-79.5401 Special Course in Mobility Management: Ad hoc networks (2-10 cr) P V T-79.7001 Postgraduate Course in Theoretical Computer Science T-79.5401 Special Course in Mobility Management: Ad hoc networks (2-10 cr) P V professor Hannu H. Kari Laboratory for Theoretical Computer

More information

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

An Implementation of Secure Wireless Network for Avoiding Black hole Attack An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

Preface. Book Origin and Overview

Preface. Book Origin and Overview Preface The field of wireless sensor networks continues to evolve and grow in both practical and research domains. More and more wireless sensor networks are being used to gather information in real life

More information

About the Authors Preface Acknowledgements List of Acronyms

About the Authors Preface Acknowledgements List of Acronyms Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

ITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007

ITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007 Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007 James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications

More information

Technology White Paper Capacity Constrained Smart Grid Design

Technology White Paper Capacity Constrained Smart Grid Design Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

Network Edge Services

Network Edge Services ONR BAA 10-018 Industry Day: 2010-May-21 Joseph Macker Brian Adamson Nathan Smith Naval Research Laboratory Information Technology Division, Code 5522 Joseph.Macker@nrl.navy.mil Brian.Adamson@nrl.navy.mil

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL

CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL Courses must be submitted by October 15, 2013, and finalized by the end of the fall semester to make the next catalog (2014-15)

More information

Optimized Load Balancing Mechanism Using Carry Forward Distance

Optimized Load Balancing Mechanism Using Carry Forward Distance Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

A survey on Wireless Mesh Networks

A survey on Wireless Mesh Networks A survey on Wireless Mesh Networks IF Akyildiz, X Wang - Communications Magazine, IEEE, 2005 Youngbin Im ybim@mmlab.snu.ac.kr 2007.10.15. Contents Introduction to WMNs Network architecture Critical design

More information

Multi-Channel Wireless Networks: Capacity, Protocols, and Experimentation (with Net-X) Nitin Vaidya

Multi-Channel Wireless Networks: Capacity, Protocols, and Experimentation (with Net-X) Nitin Vaidya Multi-Channel Wireless Networks: Capacity, Protocols, and Experimentation (with Net-X) Nitin Vaidya University of Illinois at Urbana-Champaign www.crhc.uiuc.edu/wireless Joint work with Pradeep Kyasanur,

More information

DIRAC: A Software-based Wireless Router System Petros Zerfos, Gary Zhong, Jerry Cheng, Haiyun Luo, Songwu Lu, Jefferey Jia-Ru Li

DIRAC: A Software-based Wireless Router System Petros Zerfos, Gary Zhong, Jerry Cheng, Haiyun Luo, Songwu Lu, Jefferey Jia-Ru Li DIRAC: A Software-based Wireless Router System Petros Zerfos, Gary Zhong, Jerry Cheng, Haiyun Luo, Songwu Lu, Jefferey Jia-Ru Li Presented by: Stephen Kazmierczak Overview Background Issues Motivation

More information

CS 218 Advanced Computer Networks Quarter: Fall 2003 Course ID : CS218 Class hour : MW 8:00-10:00 pm Classroom : BH 5273

CS 218 Advanced Computer Networks Quarter: Fall 2003 Course ID : CS218 Class hour : MW 8:00-10:00 pm Classroom : BH 5273 CS 218 Advanced Computer Networks Quarter: Fall 2003 Course ID : CS218 Class hour : MW 8:00-10:00 pm Classroom : BH 5273 Course Admin Details Prof Mario Gerla: BH 3732 F gerla@cs.ucla.edu Office Hrs: MW

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

CSC4290: Introduction to Computer Networking. Hongwei Zhang http://www.cs.wayne.edu/~hzhang

CSC4290: Introduction to Computer Networking. Hongwei Zhang http://www.cs.wayne.edu/~hzhang CSC4290: Introduction to Computer Networking Hongwei Zhang http://www.cs.wayne.edu/~hzhang Objectives of the course Ultimate goal: you can build any network (including the Internet) from scratch up! Humble

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Routing in Mobile Ad Hoc Networks

Routing in Mobile Ad Hoc Networks 1 of 5 Routing in Mobile Ad Hoc Networks N. Schult, M. Mirhakkak D. LaRocca The MITRE Corporation The MITRE Corporation 1820 Dolley Madison Blvd 145 Wyckoff Road McLean, VA 22102 Eatontown, NJ 07724 J.

More information

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks International Journal of Computer Applications (975 7) Volume 5 No.1, June 11 Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks Soni Sweta Arun Nahar Sanjeev Sharma ABSTRACT

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Technical Document on Vehicular Networks

Technical Document on Vehicular Networks Technical Document on Vehicular Networks GDD-06-18 GENI: Global Environment for Network Innovations September 15, 2006 Status: Draft (Version 2.0) Note to the reader: this document is a work in progress

More information

ROBUST AND SECURE DYNAMIC CHANNEL ALLOCATION AND LOAD BALANCED ROUTING IN MANETS

ROBUST AND SECURE DYNAMIC CHANNEL ALLOCATION AND LOAD BALANCED ROUTING IN MANETS ROBUST AND SECURE DYNAMIC CHANNEL ALLOCATION AND LOAD BALANCED ROUTING IN MANETS Chaitra k c Dr. N.K Cauvery M. Tech in Software Engineering Professor and HOD Dept. of ISE, Dept. of ISE, R. V. College

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

The Optimal Methods of IVC Routing Protocol for VANET

The Optimal Methods of IVC Routing Protocol for VANET The Optimal Methods of IVC Routing Protocol for VANET Bin TIAN, Kun-Mean HOU, Hongling SHI, Jianjin LI LIMOS Laboratory CNRS UMR 6158 Blaise Pascal University Clermont-Ferrand, France NICST2013: International

More information

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,

More information

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications The Master Degree in Electrical Engineering/Wireless Communications, is awarded by the Faculty of Graduate Studies

More information

IPv6 Based Sensor Home Networking

IPv6 Based Sensor Home Networking KRNET 2005 IPv6 Based Sensor Home Networking KRNET 2005 Soohong Daniel Park Mobile Platform Laboratory, SAMSUNG Electronics. soohong.park@samsung.com KRNET 2005 2/29 Trend of Home Networking Digital World

More information

Computer Networks. Secure Systems

Computer Networks. Secure Systems Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to

More information

A Novel Technique to Isolate and Detect Jamming Attack in MANET

A Novel Technique to Isolate and Detect Jamming Attack in MANET International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 A Novel Technique to Isolate and Detect Jamming Attack in MANET Harkiranpreet Kaur

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

Location-Aided Routing (LAR) in mobile ad hoc networks

Location-Aided Routing (LAR) in mobile ad hoc networks Location-Aided Routing (LAR) in mobile ad hoc networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science, Texas A&M University, College Station, TX 77843-3112, USA 2000 Abstract A mobile

More information

Energy Consumption analysis under Random Mobility Model

Energy Consumption analysis under Random Mobility Model DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network

More information

Research Projects in the Mobile Computing and Networking (MCN) Lab

Research Projects in the Mobile Computing and Networking (MCN) Lab Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University http://www.cse.psu.edu/~gcao Mobile Computing

More information

TAA: Introduction to Wide Area Networks online course specification

TAA: Introduction to Wide Area Networks online course specification Illuminating Technology Course aim: TAA: Introduction to Wide Area Networks online course specification To explain the principles of operation, capabilities and features of various types of wide area network

More information

CWNA Instructor Led Course Outline

CWNA Instructor Led Course Outline CWNA Instructor Led Course Outline Enterprise Wi-Fi Administration, Outline v7.0 Introduction The Enterprise Wireless LAN Administration 7.1 course (which prepares students for the CWNA-106 exam), whether

More information

Hardware/Software Solution to Improve Security in Mobile Ad-hoc Networks

Hardware/Software Solution to Improve Security in Mobile Ad-hoc Networks Hardware/Software Solution to Improve Security in Mobile Ad-hoc Networks Sirisha Medidi and José G. Delgado-Frias School of Electrical Engineering and Computer Science Washington State University Pullman,

More information

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT. COURSE CURRICULUM COURSE TITLE: INFORMATION COMMUNICATION TECHNOLOGY (Code: 3341601)

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT. COURSE CURRICULUM COURSE TITLE: INFORMATION COMMUNICATION TECHNOLOGY (Code: 3341601) GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT COURSE CURRICULUM COURSE TITLE: INFORMATION COMMUNICATION TECHNOLOGY (Code: 3341601) Diploma Program in which this course is offered Information Technology

More information

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &

More information

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA coursemonster.com/uk Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA View training dates» Overview This new market-leading course from us delivers the best in Wireless LAN training,

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012

Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Background While IP protocols are widely spread over broadband wireline and wireless communication means, transferring

More information

Data Communication Networks Introduction

Data Communication Networks Introduction Data Communication Networks Introduction M. R. Pakravan Department of Electrical Engineering Sharif University of Technology Data Networks 1 Introduction The course introduces the underlying concepts and

More information

Release: 1. ICTTEN5217A Plan a wireless mesh network

Release: 1. ICTTEN5217A Plan a wireless mesh network Release: 1 ICTTEN5217A Plan a wireless mesh ICTTEN5217A Plan a wireless mesh Modification History Not Applicable Approved Page 2 of 10 Unit Descriptor Unit descriptor This unit describes the performance

More information

SJBIT, Bangalore, KARNATAKA

SJBIT, Bangalore, KARNATAKA A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,

More information

Security in Wireless Mesh Networks

Security in Wireless Mesh Networks Thesis report, IDE 0949, June 2009 Security in Wireless Mesh Networks Master s Thesis in Computer Network Engineering Presented By: Shakeel Ahmad Ghumman Supervisor: Per-Arne-Wiberg School of Information

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Prefix COMP Course# 429 Title Computer Networks Units (3) 3 hours lecture per week 3 hours lecture per week

Prefix COMP Course# 429 Title Computer Networks Units (3) 3 hours lecture per week 3 hours lecture per week CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL Courses must be submitted by October 15, 2010, to make the next catalog (2011-12) production DATE (CHANGE DATE EACH TIME REVISED):

More information

Wireless Mesh Networks under FreeBSD

Wireless Mesh Networks under FreeBSD Wireless Networks under FreeBSD Rui Paulo rpaulo@freebsd.org The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

Computer Networks and the Internet

Computer Networks and the Internet ? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna

More information

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana

More information

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar

More information

Underlying Technology As already described, one of the key aspects of wireless mobility is mobility management; how to keep track of the address of,

Underlying Technology As already described, one of the key aspects of wireless mobility is mobility management; how to keep track of the address of, Wireless Mobility Introduction Whether its vehicle tracking or teleoperation or even just connecting people on the move, mobile wireless communication enables a wide variety of applications. A key aspect

More information

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed Dmitrii Dugaev, Eduard Siemens Anhalt University of Applied Sciences - Faculty of Electrical,

More information

Study Guide CompTIA A+ Certification, Domain 2 Networking

Study Guide CompTIA A+ Certification, Domain 2 Networking Study Guide CompTIA A+ Certification, Domain 2 Networking Brought to you by RMRoberts.com Introduction to CSR Domain - 2 (220-801) The CompTIA A+ 220-801 Domain 2 Networking has expanded a lot since the

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Network Layers. CSC358 - Introduction to Computer Networks

Network Layers. CSC358 - Introduction to Computer Networks Network Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined Data Exchange Between Application Processes TCP Connection-Setup

More information

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross Introduction Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Goals of This Course v Be familiar with Fundamental network topics Some advanced topics State-of-the-art

More information

JOINT EXPERT GROUP AND 5G VISION WORKING GROUP WORKSHOP. The Killer Application of Millimeter Wave

JOINT EXPERT GROUP AND 5G VISION WORKING GROUP WORKSHOP. The Killer Application of Millimeter Wave JOINT EXPERT GROUP AND 5G VISION WORKING GROUP WORKSHOP V2X Communications: The Killer Application of Millimeter Wave Nuria González-Prelcic Robert W. Heath Jr. Jorge M. El MalekVázquez nuria@gts.uvigo.es

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 11, November 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automated

More information

IJMIE Volume 2, Issue 7 ISSN: 2249-0558

IJMIE Volume 2, Issue 7 ISSN: 2249-0558 Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)

More information

Impact of Mobility Management on Heterogeneous Wireless Network

Impact of Mobility Management on Heterogeneous Wireless Network Impact of Mobility Management on Heterogeneous Wireless Network Mrs.Viddhulata Mohite 1,Research Scholar, Bharati Vidyapeeth University College of Enginnering, Pune,India Email:viddhulata.mohite@gmail.com

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

A Distributed Cluster Scheme For Bandwidth Management In Multi-hop MANETs

A Distributed Cluster Scheme For Bandwidth Management In Multi-hop MANETs 220 A Distributed Cluster Scheme For Bandwidth Management In Multi-hop MANETs Binod Kumar Pattanayak, Alok Kumar Jagadev, Manoj Kumar Mishra, Manoj Ranjan Nayak, Siksha O Anusandhan University, Bhubaneswar,

More information

COURSE CATALOG. BS Networking and System Administration

COURSE CATALOG. BS Networking and System Administration COURSE CATALOG BS Networking and System Administration Program Overview Networking, the technology of interconnecting computing devices so information can flow between them, includes the design, deployment,

More information