An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison of Routing Protocols
|
|
|
- Ezra Knight
- 9 years ago
- Views:
Transcription
1 IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: , p- ISSN: Volume 11, Issue 5 (May. - Jun. 2013), PP An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison of Routing Protocols Sukhpreet Kaur (M.Tech Student),Sukhpreet kaur (Asstt. Prof. of CSE Dept) Chandan Sharma (Ph.D. Candidate) Sri Guru Granth Sahib World University Fatehgarh Sahib, Guru Nanak Dev University of,amritsar, india (pb.) Abstract: In the past few years, we have seen a rapid expansion in the field of mobile computing due to the proliferation of inexpensive, widely available wireless devices A mobile ad hoc network (MANET) consists of mobile wireless nodes in which the communication between nodes is carried out without any centralized control. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router. In this paper provides insight into the potential applications of ad hoc networks and discusses the technological challenges that protocol designers and network developers are faced with. In this paper also present the impact of comparison of different routing protocol in term of different parameters. I. Introduction A wireless network is a growing new technology that will allow users to access services and information electronically, irrespective of their geographic position. Wireless networks can be classified in two types infrastructure network and infrastructure less (ad hoc) networks. Infrastructure network consists of a network with fixed and wired gateways. A mobile host interacts with a bridge in the network (called base station) within its communication radius. The mobile unit can move geographically while it is communicating. When it goes out of range of one base station, it connects with new base station and starts communicating through it. This is called handoff. Recent advancements such as Bluetooth introduced a fresh type of wireless systems which is frequently known as mobile ad-hoc networks. Mobile ad-hoc networks or "short live" networks control in the nonexistence of permanent infrastructure. Mobile ad-hoc network offers quick and horizontal network deployment in conditions where it is not possible. Ad-hoc is a Latinword, which means "for this or for this only." Early Ad-hoc network only designed for the military application. In 1990 s this method will combined with the wireless LAN and Bluetooth internet engineering group launched MANET with the routing protocols. They implement routing protocols because to improve the data rate and the efficiency. At present there are more than fifty protocols are implemented in the wireless environment. Mobile ad-hoc network is an autonomous system of mobile nodes connected by wireless links; each node operates as an end system and a router for all other nodes in the network. Mobile ad hoc network is a group of wireless mobile computers (or nodes); in which nodes collaborate by forwarding packets for each other to allow them to communicate outside range of direct wireless transmission. Ad hoc networks require no centralized administration or fixed network infrastructure such as base stations or access points, and can be quickly and inexpensively set up as needed Advantages of MANET There are several advantages of using mobile ad hoc network:- Setting up a wireless system is easy and fast and it eliminates the need for pulling out the cables through walls and ceilings. Network can be extended to places, which cannot be wired. Multiple paths increase reliability. Wireless network offers more flexibility and adapt easily to changes in the configuration of the network. Disadvantages of MANETS Asymmetric links: Most of the wired networks rely on the symmetric links, which are always fixed. But this is not a case with ad-hoc networks as the nodes are mobile and constantly changing their position within network. For example consider a MANET (Mobile Ad-hoc Network) where node B sends a signal to node A but this does not tell anything about the quality of the connection in the reverse direction. 7 Page
2 Routing Overhead: In wireless ad hoc networks, nodes often change their location within network. So, some out-of-date routes are generated in the routing table, which leads to unnecessary routing overhead.interference: This is the major problem with mobile ad-hoc networks as links come and go depending on the transmission characteristics, one transmission might interfere with another one and node might overhear transmissions of other nodes and can corrupt the total transmission. Dynamic Topology: This is also the major problem with ad-hoc routing since the topology is not constant. The mobile node might move or medium characteristics might change. In ad-hoc networks routing tables must somehow reflect these changes in topology and routing algorithms have to be adapted. For example in a fixed network routing table updating takes place for every 30sec. This updating frequency might be very low for ad-hoc networks. Characteristics of Mobile Ad Hoc Networks:- Does not rely on a fixed infrastructure for its operation autonomous transitory association of mobile nodes. It can be rapidly deployed with user intervention. Need not to operate in a standalone fashion but can be attached to the Internet or Cellular networks. Devices are free to join or leave the network and they may randomly, possibly Resulting in rapid and unpredictable changes. Working of MANET In mobile ad-hoc networks where there is no infrastructure support and since a destination node might be out of range of a source node transmitting packets, a routing procedure is always needed to find a path so as to forward the packets appropriately between the source and the destination. A base station can reach all mobile nodes without routing via broadcast in common wireless networks. In the case of ad-hoc networks, each node must be able to forward data for other nodes. Applications of MANETS Table 1 Application Tactical networks Emergency services Commercial and civilian Environment Home and enterprises Networking Educations Entertainment Sensor network Context aware services Mobile ad hoc network applications Possible scenarios Military communication and operations Automated battlefields Search and rescue operations Disaster recovery Replacement of fixed infrastructure in case of environmental disasters Policing and fire fighting Supporting doctors and nurses in hospitals E-commerce: electronic payments anytime and anywhere environments Business: dynamic database access, mobile offices Vehicular services: road or accident guidance, transmission of road and weather conditions, taxi cab network, inter-vehicle networks Sports stadiums, trade fairs, shopping malls Networks of visitors at airports Home/office wireless networking Conferences, meeting rooms Personal area networks (PAN), Personal networks (PN) Networks at construction sites Universities and campus settings Virtual classrooms Ad hoc communications during meetings or lectures Universities and campus settings Virtual classrooms Ad hoc communications during meetings or lectures Home applications: smart sensors and actuators embedded in consumer electronics Body area networks (BAN) Data tracking of environmental conditions, animal movements, chemical/biological detection Follow-on services: call-forwarding, mobile workspace Information services: location specific services, time dependent services Infotainment: touristic information 8 Page
3 Coverage extension Extending cellular network access Linking up with the Internet, intranets, etc. Challenges in Mobile Adhoc Network Regardless of the attractive applications of MANET introduce several challenges that must be studied carefully before a wide commercial deployment can be expected. Routing: Since the topology of the network is constantly changing, the issue of routing packets between any pair of nodes becomes a challenging task. Most protocols should be based on reactive routing instead of proactive. Multi cast routing is another challenge because the multi cast tree is no longer static due to the random movement of nodes within the network. Routes between nodes may potentially contain multiple hops, which is more complex than the single hop communication. Security and Reliability: In addition to the common vulnerabilities of wireless connection, an ad hoc network has its particular security problems due to e.g. nasty neighbor relaying packets. The feature of distributed operation requires different schemes of authentication and key management. Further, wireless link characteristics introduce also reliability problems, because of the limited wireless transmission range, the broadcast nature of the wireless medium (e.g. hidden terminal problem), mobility-induced packet losses, and data transmission errors. Quality of Service (QoS): Providing different quality of service levels in a constantly changing environment will be a challenge. The inherent stochastic feature of communications quality in a MANET makes it difficult to offer fixed guarantees on the services offered to a device. An adaptive QoS must be implemented over the traditional resource reservation to support the multimedia services. Inter-networking: In addition to the communication within an ad hoc network, inter-networking between MANET and fixed networks (mainly IP based) is often expected in many cases. The coexistence of routing protocols in such a mobile device is a challenge for the harmonious mobility management. Power Consumption: For most of the light-weight mobile terminals, the communication-related functions should be optimized for lean power consumption. Conservation of power and power-aware routing must be taken into consideration. Multicast: Multicast is desirable to support multiparty wireless communications. Since the multicast tree is no longer static, the multicast routing protocol must be able to cope with mobility including multicast membership dynamics (leave and join). Location-aided Routing: Location-aided routing uses positioning information to define associated regions so that the routing is spatially oriented and limited. This is analogous to associatively-oriented and restricted broadcast in ABR. Routing in Mobile Ad hoc Networks Mobile Ad-hoc networks are self-organizing and self-configuring multihop wireless networks, where the structure of the network changes dynamically. In mobile ad-hoc networks there is no infrastructure support as is the case with wireless networks, and since a destination node might be out of range of a source node transferring packets; so there is need of a routing procedure. This is always ready to find a path so as to forward the packets appropriately between the source and the destination. In the case of ad-hoc networks, each node must be able to forward data for other nodes. This creates additional problems along with the problems of dynamic topology which is unpredictable connectivity changes Problems in routing with Mobile Ad hoc Networks Asymmetric links: Most of the wired networks rely on the symmetric links which are always fixed. But this is not a case with ad-hoc networks as the nodes are mobile and constantly changing their position within network. Routing Overhead: In wireless ad hoc networks, nodes often change their location within network. So, some stale routes are generated in the routing table which leads to unnecessary routing overhead. Interference: This is the major problem with mobile ad-hoc networks as links come and go depending on the transmission characteristics, one transmission might interfere with another one and no de might overhear transmissions of other nodes and can corrupt the total transmission. Dynamic Topology: This is also the major problem with ad-hoc routing since the topology is not constant. The mobile node might move or medium characteristics might change. In ad-hoc networks, routing tables must somehow reject these changes in topology and routing algorithms have to be adapted. Classification of Routing Protocols in MANET:- Routing protocol in MANET are classified into three different categories according to their functionality. A. Proactive B. Reactive C. Hybrid 9 Page
4 Proactive Protocols:- In contrast to table driven routing protocols, on demand compute the route to a specific destination only when needed, so a routing table containing all the nodes as entries does not have to be maintained in each node. When a source wants to send packet to a destination, it invokes a route discovery mechanism to find the path to the destination. The route remains valid till the destination is reachable or until the route is no longer needed. Table 2 Proactive Routing protocols Proactive protocols Predecessor Protocol Enhancement regarding predecessor DSDR DBF Provide single shortest path WRP DBF Performance/Count-to-infinity problem FSR FS Improved Flooding CGSR DSDR Reduces network traffic load Reactive protocols:-these protocols are also called reactive protocols since they don't maintain routing information or routing activity at the network nodes if there is no communication. If a node wants to send a packet to another node then this protocol searches for the route in an on-demand manner and establishes the connection in order to transmit and receive the packet. The route discovery usually occurs by flooding the route request packets throughout the network. Table: 3 Reactive Routing Protocols Reactive protocols Predecessor Protocols Enhancement regarding predecessor AODV DSDV Minimize broadcast message TORA LMR Converges quicker in portioned network DSR SSR ABR Enhance stability Hybrid protocols: - Since proactive and reactive protocols each work best in oppositely different scenarios, hybrid method uses both. It is used to find a balance between both protocols. Proactive operations are restricted to small domain, whereas, reactive protocols are used for locating nodes outside those domains. Table 4 Summary of wireless mobile adhoc routing protocols classification Proactive Reactive Hybrid Network organization Flat / Hierarchical flat Hierarchical Topology dissemination periodical On-demand Both Route letancy Always Availble Available when needed Both Communication overhead High low Medium II. Comparison Of Routing Protocols Based on imperative parameters and features of routing protocol, a variety of table-driven (Proactive) routing protocols are compared in Table 5 Table 5 COMPARISON TABLE FOR PROACTIVE ROUTING PROTOCOL DSDV WRP FSR CGSR Route selection Link state Shortest path Shortest path Shortest path Route single single Single or multiple Single or multiple Topoloagy structure flat flat hierarachical Hierarchical Route computation distributed distributed distributed Distributed method broadcast broadcast broadcast Broadcast Loop free yes Yes, but not instantaneous yes Yes 10 Page
5 Based on imperative parameters and features of routing protocol, a variety of On Demand (Reactive) routing protocols are compared in Table 6 Table 6 COMPARISON TABLE FOR REACTIVE ROUTING PROTOCOL AODV TORA DSR SSR route selection Shortest and Shortest path Shortest and Associativity updated path updated path Stability and Route multiple multiple multilple Single Topology flat flat flat Flat Route computation Broadcast Broadcast Broadcast Broadcast Method Unicast Broadcast Unicast Broadcast Loop free Yes NO (not short Yes Yes lived loop) III. Conclusion Mobile ad hoc network is decentralised, self-organised, anytime, anywhere network and provide cheap communications. In this paper discuss the an overview of different aaplication of the mobile adhoc metwork and various challenges faced by the developer and designer. As there are still many challenges facing wireless ad hoc networks, it is not clear that any particular algorithm or class of algorithm is the best for all scenarios, each protocol has their own merits and demerits and is well suited for certain situations. In this paper also discuss the classification of routing protocols and done comparative analysis for wireless ad hoc networks routing protocols viz. AODV, CGSR, DSR, WRP,DSDV and SSR etc. All the routing protocols are doing good performance in wireless network but reactive protocol doing better performance. Because this reactive protocol path finding protocol perform new path discovery and path maintenance. References [1]. Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester, An Overview of Mobile Ad Hoc Networks: Applications and Challenges [2]. Chander Diwaker and Anju Gill Comparative Analysis of Routing in MANET International Journal of Advanced Research in Computer Science and Software Engineering, july [3]. Sankalp Bahadur Singh, Bharat Pesswani A Performance Analysis Between AODV & DSR Routing Protocol IJCTA July-August 2012 [4]. Anju yadav, Simulation Study and Implementation on Routing Protocols in MANET International Journal of Computer Science & Management Studies, 2012 [5]. P. Misra, Routing Protocols for Ad Hoc Mobile Wireless Networks, [6]. Shweta, Vinit Kumar, Anish Mittal, Dr. Pankaj Gupta, Deepak Goel Analysis of Routing in Mobile Ad-hoc Networks, International Journal of Computer Science & Management Studies, 2012 [7]. A.K. Gupta, Dr. H. Sadawarti and Dr. A. K. Verma, Performance analysis of AODV, DSR & TORA Routing Protocols in proceeding of IACSIT International Journal of Engineering and Technology, Vol.2, No.2, April 2010 [8]. Swati Saxena, Birbal Saran, Mr. Vijendra Singh, SIMULATION AND PERFORMANCE ANALYSIS OF DSDV, OLSR, DSR AND ZRP ROUTING PROTOCOLS IN MANETs, International Journal of Computer Trends and Technology-2012 [9]. C. Siva Ram Murthy and B.S Manoj, Mobile Ad Hoc Networks- Architectures & Protocols, Pearson Education, New Delhi, 2004 [10]. Chlamtac, I., Conti, M., and Liu, J. J.-N. Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks, 1(1), 2003, pp [11]. HaoYang, Haiyun & Fan Ye Security in mobile ad-hoc networks : Challenges and solutions,, Pg , Vol 11, issue 1, Feb Page
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing
Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing Jun-Zhao Sun MediaTeam, Machine Vision and Media Processing Unit, Infotech Oulu P.O.Box 4500, FIN-90014 University of Oulu, Finland
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs
International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS [email protected] D. C. VASILIADIS [email protected] E. STERGIOU [email protected] Abstract: In this paper,
Study of Network Characteristics Incorporating Different Routing Protocols
Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab
Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 54-61 Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS
`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS Divya Sharma CSE Dept, ITM Guargoan [email protected] Ashwani Kush Computer Dept, University College Kurukshetra University India [email protected]
Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks
www.ijcsi.org 118 -Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks Vijayalakshmi P 1, Dr.V.Saravanan 2, Dr. P. Ranjit Jeba Thangiah 3, Abraham Dinakaran.J 4 1 Karunya
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
SECURITY ISSUES: THE BIG CHALLENGE IN MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks
UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks a Mobile Ad hoc NETwork (MANET) is one that comes together as needed, not necessarily with any support from the existing infrastructure or any
A Survey of Mobile Ad Hoc network Routing Protocols*
Technical Report (Nr. 2003-08) A Survey of Mobile Ad Hoc network Routing Protocols* Changling Liu, Jörg Kaiser {changling.liu, joerg kaiser}@informatik.uni-ulm.de Department of Computer Structures University
10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
e-learning Using Wireless Ad-Hoc Networks to Support Teaching and Learning in Rural Zambia
e-learning Using Wireless Ad-Hoc Networks to Support Teaching and Learning in Rural Zambia Nchimunya CHAAMWE 1 and Langstone SHUMBA 2 Computer Science Department, School of Mathematics and Natural Sciences,
Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2
Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2 1 Research Scholar, Department of Computer Science, Doaba Group of Colleges, Kharar, Punjab,
IJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Power Aware
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,
Remote Home Security System Based on Wireless Sensor Network Using NS2
Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: [email protected] #D.Upender 2, Asst.Professor, E mail: [email protected] #Department
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks
Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks T. Jagadeepak 1, Dr. B. Prabhakara Rao 2, B. A. S. Roopa Devi 3 PG Student, Dept. of ECE, UCEK, JNTU,
Cross Layer TCP Congestion Control Load Balancing Technique in MANET
Cross Layer TCP Congestion Control Load Balancing Technique in MANET Nidhi Shukla 1, Neelesh Gupta 2, Naushad Parveen 3 1 M.Tech Scholar (ECE), 2 Prof & Head (ECE), 3 Asst. Prof. ( ECE), Department of
Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
Keywords: MAC, QoS, MRP, CEDAR, OLSR
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Routing in
Location-Aided Routing (LAR) in mobile ad hoc networks
Location-Aided Routing (LAR) in mobile ad hoc networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science, Texas A&M University, College Station, TX 77843-3112, USA 2000 Abstract A mobile
Saleh Ali K.Al-Omari 1, Putra Sumari 2
Saleh Ali K.Al-Omari 1, Putra Sumari 2 School of Computer Science, Universiti Sains Malaysia, 11800 Penang, Malaysia [email protected], [email protected] ABSTRACT Mobile Ad Hoc Network (MANET)
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
A Survey on Load Balancing Techniques in Wireless Networks
A Survey on Load Balancing Techniques in Wireless Networks Priyanka sachdeva 1, Kamal Kumar Sharma 2, Sharad Chauhan 3 1 Student, M. Tech, ESEAR, Ambala 2 Professor, Dept. of ECE, E-Max group of Institutions,
Congestion control in Mobile Ad-Hoc Networks (MANETs)
Congestion control in Mobile Ad-Hoc Networks (MANETs) A REPORT SUBMITTED TO SADIA HAMID KAZI OF COMPUTER SCIENCE AND ENGINEERING DEPARTMENT OF BRAC UNIVERSITY IN FULFILLMENT OF THE REQUIREMENTS FOR THESIS
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
A REVIEW: MOBILE AD-HOC NETWORK PROTOCOLS AND SECURITY ISSUES
A REVIEW: MOBILE AD-HOC NETWORK PROTOCOLS AND SECURITY ISSUES Ankit Mehto, Hitesh Gupta Department of Computer Science & Engineering, PIT, Bhopal, India ABSTRACT The instant growth of communication takes
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
Keywords: DSDV and AODV Protocol
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparison
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
A Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs Protocols
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 may, 2014 Page No. 6196-6201 A Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs
MASTER THESIS REPORT MSc IN ELECTRICAL ENGINEERING WITH EMPHASIS ON TELECOMMUNICATION
MEE 09: 17 MASTER THESIS REPORT MSc IN ELECTRICAL ENGINEERING WITH EMPHASIS ON TELECOMMUNICATION TRASMISSION CONTROL PROTOCOL (TCP) PERFORMANCE EVALUATION IN MANET BLEKINGE INSTITUTE OF TECHNOLOGY MARCH
PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, [email protected]
PERA: Ad-Hoc Routing Protocol for Mobile Robots
PERA: Ad-Hoc Routing Protocol for Mobile Robots Carlos Agüero Vicente Matellán Pedro de-las-heras-quirós José M. Cañas DIET (Departamento de Informática, Estadística y Telemática) Universidad Rey Juan
CHAPTER 1 INTRODUCTION 1.1 MOBILE AD HOC NETWORK
CHAPTER 1 INTRODUCTION 1.1 MOBILE AD HOC NETWORK A Mobile Ad hoc Network (MANET) is a self configurable collection of any number of wireless mobile devices. All the nodes in a multi-hop wireless ad hoc
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
SURVEY OF OPTIMISTIC POWER AWARE ROUTING PROTOCOLS IN MOBILE DATACENTER NETWORKS
SURVEY OF OPTIMISTIC POWER AWARE ROUTING PROTOCOLS IN MOBILE DATACENTER NETWORKS Ganesan Veerappan 1 and C. Suresh Gnana Dhas 2 1 Research and Development Centre, Bharathiar University, Coimbatore, Tamil
2. Related protocols. 1. Introduction
Virtual Cellular Infrastructure For Mobile Ad hoc Network Muthu Chidambaranathan.P, Sundaresan S [email protected] Department of electronics and communication engineering National institute of technology,
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
POWER AWARE QOS MULTIPATH ROUTING PROTOCOL FOR DISASTER RECOVERY NETWORKS
POWER AWARE QOS MULTIPATH ROUTING PROTOCOL FOR DISASTER RECOVERY NETWORKS ABSTRACT S.Santhi 1, Dr.G.Sudha Sadasivam 2 1 Department of Information Technology,Dr.NGP Institute of Technology,Coimbatore,India
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
Scalable Routing Protocols for Mobile Ad Hoc Networks
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, Mario Gerla Computer Science Department, University of California, Los Angeles, CA 90095 {hxy,xkx,gerla}@cs.ucla.edu Abstract
Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5
Volume 6, Issue 4, April 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Study
A Survey: High Speed TCP Variants in Wireless Networks
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:
