Mobile Ad-Hoc Networks
|
|
|
- Amanda Gibson
- 9 years ago
- Views:
Transcription
1 Mobile Ad-Hoc Networks Andreas Tønnesen
2 Agenda A introduction to MANET Routing in MANETs Optimized LinkState Routing The UniK OLSR implementation Extensions to UniK olsrd MANET and free community networks
3 Mobile Ad-Hoc Networks - MANET Rapidly deployable, self configuring. No need for existing infrastructure. Wireless links. Nodes are mobile, topology can be very dynamic. Nodes must be able to relay traffic since communicating nodes might be out of range. A MANET can be a standalone network or it can be connected to external networks(internet).
4 Example of a MANET Internet
5 MANET usage areas Military scenarios Sensor networks Rescue operations Students on campus Free Internet connection sharing Conferences The main two characteristics are mobility and multihop.
6 IEEE b and MANET(1) b specifies two main operating modes.
7 IEEE b and MANET(2) So is Ad-hoc mode enough?
8 Mechanisms required in a MANET Multihop operation requires a routing mechanism designed for mobile nodes. Internet access mechanisms. Self configuring networks requires an address allocation mechanism. Mechanism to detect and act on, merging of existing networks. Security mechanisms.
9 Routing protocol requirements Self starting and self organizing Multi-hop, loop-free paths Dynamic topology maintenance Rapid convergence Minimal network traffic overhead Scalable to large networks
10 The IETF MANET working group Main purpose: To standarize IP routing in mobile ad-hoc networks. Three routing protocols accepted as experimental RFCs, and a fourth one coming up. These protocols fall into two categories: Re-active Pro-active
11 Re-active routing protocols Does not take initiative for finding routes Establishes routes on demand by flooding a query Pros and cons: Does not use bandwidth except when needed (when finding a route) Much network overhead in the flooding process when querying for routes Initial delay in traffic
12 Re-active routing - AODV(RFC3561) A wants to communicate with B B A
13 Re-active routing - AODV(RFC3561) A floods a route request RREQ RREQ RREQ B RREQ RREQ RREQ RREQ A
14 Re-active routing - AODV(RFC3561) A route reply is unicasted back RREQ RREQ RREQ B RREP RREQ RREP RREQ RREP RREQ RREP RREQ A
15 Pro-active routing protocols Routes are set up based on continuous control traffic All routes are maintained all the time Pros and cons: Constant overhead created by control traffic Routes are always available
16 Pro-active routing - OLSR(RFC3626) Developed by INRIA(France). The Optimized Link-State Routing protocol can be divided in to three main modules: Neighbor/link sensing Optimized flooding/forwarding(multipoint Relaying) Link-State messaging and route calculation
17 OLSR packet format
18 Link and neighbor sensing Neighbors and links are detected by HELLO messages. All nodes transmit HELLO messages on a given interval. These contain all heard-of neighbors grouped by status. A simplified neighbor detection scenario: HELLO(no neighbors) A HELLO(A type:asymmetric) HELLO(B type:symmetric) HELLO(A type:symmetric) B
19 Multipoint Relaying Reduce the number of duplicate retransmissions while forwarding a broadcast packet. Restricts the set of nodes retransmitting a packet from all nodes(regular flooding) to a subset of all nodes. The size of this subset depends on the topology of the network.
20 Multipoint Relay selection All nodes selects and maintains their own MPRs. Rule: For all 2 hop neighbors n there must exist a MPR m so that n can be contacted via m. m n n m n n
21 Forwarding of traffic All nodes registers and maintains their MPR selectors. Rule: If OLSR-packet is received from a MPR selector, then all messages contained in that packet are to be forwarded if TTL > 0. This goes for both known and unknown message types. n m n m n n
22 Multipoint Relaying - example
23 Multipoint Relaying - example Regular flooding 1
24 Multipoint Relaying - example Regular flooding 2
25 Multipoint Relaying - example Regular flooding 3
26 Multipoint Relaying - example Regular flooding 4
27 Multipoint Relaying - example MPR flooding 1
28 Multipoint Relaying - example MPR flooding 2
29 Multipoint Relaying - example MPR flooding 3
30 LinkState functionality In a classic link-state scheme all nodes flood the network with link-state information. OLSR has two link-state optimizations: Only MPR selectors are declared in link-state messages. This minimizes the size of link-state messages. Only nodes selected as MPRs will generate link-state messages. This minimizes the set of nodes emitting link-state messages.
31 LinkState Example Messages declaring link-state are called Topology Control messages(tc) TC MPR TC TC MPR TC TC MPR TC MPR TC TC
32 More functionality We have only looked at the basic functionality of OLSR. OLSR also features: Can run on multi-homed hosts using MID messages External network connectivity through HNA messages Node willingness to act as MPR. Link hysteresis Tuneable MPR selector scheme Tuneable TC generatoin...and more
33 Implementing OLSR
34 The project Goal: Develop a RFC3626 compliant implementation and look into possible extensions Based on draft3 compliant nolsrd1a10 by INRIA Drafts went from version 7 to 11 during spring -03 The last draft was version 11 - now experimental RFC(3626) Almost all code rewritten better to start from scratch?
35 Technical latest release Implementation for GNU/Linux systems(kernel >2.0) Implemented in pure C All areas of the RFC covered Supports IPv4 and IPv6 Plugin support Licensed under the General Public License(GPL)
36 Hardware on which OLSRd runs If it runs GNU/Linux it runs olsrd :-) Standard i386 and PPC based computer systems. The MIPS based WLAN accesspoint WRT54G from LinkSys(Cisco) and the MeshCube The strong-arm based ipaq from Compaq/HP
37 Basic overview Olsrd has a very modular design The scheduler runs in a thread of its own.
38 Loadable plugins A plugin(dynamically loaded library) is a piece of code that can be linked and loaded by an application in runtime. Example: Can use OLSRs MPR flooding for net-wide broadcasts for services like DNS/service discovery.
39 Loadable plugins No need to change any code in the olsr daemon to add custom packages. Users are free license plugins under whatever terms they like. Plug-ins can be written in any language that can be compiled as a dynamic library. GNU/Linux even allow scripts! No need for people with extended OLSR versions to rely on heavy patching to maintain functionality when new olsrd versions are released.
40 Extensions GUI front-end Address auto configuration Control traffic security Gateway tunneling
41 A GUI front-end A GUI front end is written using the GTK library It communicates with the daemon over IPC and does not interfere with OLSR operation in any way.
42 Pro-active autoconfig - PAA A IP address auto-configuration protocol for ad-hoc networks routed by a pro-active protocol. Developed at Thales Communications Norway(A. Tønnesen, A Hafslund and P. Englestad). A plugin for olsrd exists, but it is not yet publicly released. New nodes are assigned unused IP addresses through use of strong DAD, OLSRs MPR flooding is used to carry messages.
43 Secure routing OLSR itself is vulnerable to all sorts of attacks. A node advertises links to non-neighbor nodes. A node pretends to be another node. A node forwards altered control messages. A node does not forward messages as required by OLSR. A node forwards broadcast control messages unaltered, but does not forward unicast data traffic. A node replays previously recorded control traffic from another node. A Internet gateway can do all kinds of nasty stuff!
44 Secure routing Solution: Maintain control traffic data integrity by introducing a flexible security mechanism. Could also ensure confidentiality. All OLSR packets has a ending security message. The content is based on what scheme is used.
45 Secure routing Secure OLSR plugin: Available from the next olsrd release. A signature of the message and a shared key is added to every OLSR packet. A timestamp is also included to prevent replay attacks. A timestamp-exchange mechanism is included. This is a three way handshake. A key exchange and authentication mechanism could work on top of this solution.
46 Gateway tunneling Background: A node has no actual control of what gateway it uses if multiple gateways for the same network are available. Traffic is routed hop-by-hop D E EF G Internet O A B C Internet
47 Gateway tunneling Solution: Node A sets up A IP-in-IP tunnel to the desired gateway and uses it regardless of hop-count. Motivation: Avoid possible TCP session breakage Security Load balancing D E EF G Internet O A B C Internet
48 MANETs and free community networks Can free users be trusted to operate in a distributed manner (e.g. cheating in P2P networks)? Need for a credit enforcement mechanism? Only use MANET routing in dedicated relay stations (e.g. in cars) creating a backbone? Trust does not scale :-(
49 Further reading Unik olsrd homepage Uppsala University AODV implementation MANET IETF working group INRIA OLSR page Protean Forge - OLSR software (CRC and NRL) OpenWrt linux on WRT54G Lille Sans Fil, French free community network Penguin pixmap (c) everaldo.com illustrations by Lars Strand
50 Questions? Thank you Vielen dank! Penguin pixmap (c) everaldo.com illustrations by Lars Strand
51
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
Abstract. 1 Introduction. Aleksandr Huhtonen Helsinki University of Technology Telecommunication Software and Multimedia Laboratory [email protected].
Comparing AODV and OLSR Routing Protocols Aleksandr Huhtonen Helsinki University of Technology Telecommunication Software and Multimedia Laboratory [email protected] Abstract An ad hoc wireless network
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
A Link-state QoS Routing Protocol for Ad Hoc Networks
A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,
Wireless Mesh Networks under FreeBSD
Wireless Networks under FreeBSD Rui Paulo [email protected] The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much
Ad hoc On Demand Distance Vector (AODV) Routing Protocol
Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
An Extended AODV Protocol to Support Mobility in Hybrid Networks
An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Power Aware
Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals
Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
Performance comparison and analysis of routing strategies in Mobile ad hoc networks
2008 International Conference on Computer Science and Software Engineering Performance comparison and analysis of routing strategies in Mobile ad hoc networks Fu Yongsheng, Wang Xinyu, Li Shanping Department
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, [email protected]
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
An Efficient AODV-Based Algorithm for Small Area MANETS
An Efficient AODV-Based Algorithm for Small Area MANETS Jai Prakash Kumawat 1, Prakriti Trivedi 2 PG Student, Department of Computer Engineering & IT, Government Engineering College, Ajmer, India 1 Assistant
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing
Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 54-61 Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols
Performance of VoIP strategies for hybrid Mobile Ad Hoc Networks
Department of Computer Science Gonzalo Iglesias Aguiño Performance of VoIP strategies for hybrid Mobile Ad Hoc Networks Computer Networks D-level thesis (20p) Date: 061221 Supervisor: Andreas Kassler Examiner:
SURVEY OF OPTIMISTIC POWER AWARE ROUTING PROTOCOLS IN MOBILE DATACENTER NETWORKS
SURVEY OF OPTIMISTIC POWER AWARE ROUTING PROTOCOLS IN MOBILE DATACENTER NETWORKS Ganesan Veerappan 1 and C. Suresh Gnana Dhas 2 1 Research and Development Centre, Bharathiar University, Coimbatore, Tamil
Routing in Mobile Ad Hoc Networks
16 Routing in Mobile Ad Hoc Networks Fenglien Lee University of Guam Guam 96923, USA 1. Introduction A mobile ad hoc network (MANET), sometimes called a mobile mesh network, is a self- configuring network
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
CHAPTER 1 INTRODUCTION 1.1 MOBILE AD HOC NETWORK
CHAPTER 1 INTRODUCTION 1.1 MOBILE AD HOC NETWORK A Mobile Ad hoc Network (MANET) is a self configurable collection of any number of wireless mobile devices. All the nodes in a multi-hop wireless ad hoc
A Cooperative Security Scheme for Optimized Link State Routing in Mobile Ad-hoc Networks
A Cooperative Security Scheme for Optimized Link State Routing in Mobile Ad-hoc Networks João P. Vilela and João Barros Departament of Computer Science and Laboratory of Artificial Intelligence and Computer
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
Performance Evaluation and Investigation of Energy in AODV, OLSR Protocols through Simulation
Performance Evaluation and Investigation of Energy in AODV, OLSR Protocols through Simulation Dharam Vir 1, S.K Agarwal 2 and S.A. Imam 3 1 Research Scholar, Department of Electronics Engg. YMCA UST, Faridabad,
RESOURCE DISCOVERY IN AD HOC NETWORKS
RESOURCE DISCOVERY IN AD HOC NETWORKS Diane Tang Chih-Yuan Chang Kei Tanaka Mary Baker Technical Report No.: CSL-TR-98-769 August 1998 This project is in part supported by FX Palo Alto Laboratories and
www.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
Achieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).
OSPF Version 2 (RFC 2328) Interior gateway protocol (IGP). Routers maintain link-state database. Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs). Router
Hosts Address Auto Configuration for Mobile Ad Hoc Networks
Hosts Address Auto Configuration for Mobile Ad Hoc Networks Sudath Indrasinghe, Rubem Pereira, Hala Mokhtar School of Computing and Mathematical Sciences Liverpool John Moores University [email protected],
Internet Connectivity for Ad hoc Mobile Networks
Internet Connectivity for Ad hoc Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu Charles E. Perkins
PERFORMANCE BASED SECURE OPTIMIZED ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORK
Volume 3, No. 4, April 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info PERFORMANCE BASED SECURE OPTIMIZED ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORK
UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks
UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks a Mobile Ad hoc NETwork (MANET) is one that comes together as needed, not necessarily with any support from the existing infrastructure or any
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach
Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach E. Borgia, M. Conti, F.Delmastro, and E. Gregori Pervasive Computing & Networking
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Routing with OSPF. Introduction
Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption
Name Service in IPv6 Mobile Ad-hoc Network
Name Service in IPv6 Mobile Ad-hoc Network Jaehoon Jeong, Jungsoo Park, Hyoungjun Kim, and Kishik Park Protocol Engineering Center, ETRI, 161 Gajong-Dong, Yusong-Gu, Daejon 305-350, Korea {paul,pjs,khj,kipark}@etri.re.kr,
Routing Protocols for Wireless Mesh Networks
International Journal of Scientific & Engineering Research Volume 2, Issue 8, August-2011 1 Routing Protocols for Wireless Mesh Networks Venkat Mohan.S, Dr. Kasiviswanath.N Abstract Routing is a fundamental
Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
Name Resolution in On-Demand MANETs and over External IP Networks
Name Resolution in On-Demand MANETs and over External IP Networks Paal Engelstad, Do Van Thanh, Geir Egeland University of Oslo (UniK) / Telenor R&D, 1331 Fornebu, Norway {Paal.Engelstad, Thanh-van.Do,
Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks
Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks B. MALARKODI, B. VENKATARAMANI AND X.T. PRADEEP Department of Electronics and Communication Engineering National
Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks
Sensors 2015, 15, 17621-17648; doi:10.3390/s150717621 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks M.
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
MASTER'S THESIS. Routing Protocols in Wireless Ad-hoc Networks - A Simulation Study. Tony Larsson, Nicklas Hedman. Civilingenjörsprogrammet
1998:362 MASTER'S THESIS Routing Protocols in Wireless Ad-hoc Networks - A Simulation Study Tony Larsson, Nicklas Hedman Civilingenjörsprogrammet 1998:362 ISSN: 1402-1617 ISRN: LTU-EX--98/362--SE Master
PERFORMANCE ANALYSIS OF THE ROUTING PROTOCOLS FOR VIDEO STREAMING OVER MOBILE AD HOC NETWORKS
PERFORMANCE ANALYSIS OF THE ROUTING PROTOCOLS FOR VIDEO STREAMING OVER MOBILE AD HOC NETWORKS Muhammad Shaffatul Islam Md. Adnan Riaz Mohammed Tarique Khulna University of Engineering Technical University
Comparative Study of Routing Protocols for Mobile Ad-hoc NETworks
Comparative Study of Routing Protocols for Mobile Ad-hoc NETworks Thomas Heide Clausen *, Philippe Jacquet and Laurent Viennot INRIA Rocquencourt, Projet Hipercom, Domaine de Voluceau, B.P.5, 7853 Le Chesnay
POWER AWARE QOS MULTIPATH ROUTING PROTOCOL FOR DISASTER RECOVERY NETWORKS
POWER AWARE QOS MULTIPATH ROUTING PROTOCOL FOR DISASTER RECOVERY NETWORKS ABSTRACT S.Santhi 1, Dr.G.Sudha Sadasivam 2 1 Department of Information Technology,Dr.NGP Institute of Technology,Coimbatore,India
Security in Wireless Mesh Networks
Thesis report, IDE 0949, June 2009 Security in Wireless Mesh Networks Master s Thesis in Computer Network Engineering Presented By: Shakeel Ahmad Ghumman Supervisor: Per-Arne-Wiberg School of Information
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
Mitigation of Breaking Connections. (a.k.a. OLSRd v1 Multi-Gateway & BRDP)
Mitigation of Breaking Connections (a.k.a. OLSRd v1 Multi-Gateway & BRDP) About Me Ferry Huberts Self-Employed Open Source Entrepreneur Lead Committer for OLSRd v1 Committer in several other projects Mainly
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
Robust Routing in Wireless Ad Hoc Networks
Robust Routing in Wireless Ad Hoc Networks Seungjoon Lee, Bohyung Han, Minho Shin {slee, bhhan, mhshin}@cs.umd.edu Computer Science Department University of Maryland College Park, MD 2742 USA Abstract
Scalable Routing Protocols for Mobile Ad Hoc Networks
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, Mario Gerla Computer Science Department, University of California, Los Angeles, CA 90095 {hxy,xkx,gerla}@cs.ucla.edu Abstract
A Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks
A Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks Min-Kim, Jong-min Kim, Hwa-sung Kim Dept. of Electronics and Communications Engineering Kwangwoon University
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic
Routing in wireless networks
Routing in wireless networks. Pham Université de Pau et des Pays de l dour épartement Informatique http://www.univ-pau.fr/~cpham [email protected] Routing in wireless networks What s a wireless network?
Delay aware Reactive Routing Protocols for QoS in MANETs: a Review
Delay aware Reactive Routing Protocols for QoS in MANETs: a Review Saad M. Adam*, Rosilah Hassan Network and Communication Technology Research Group, Faculty of Information Science and Technology, Universiti
The Monitoring of Ad Hoc Networks Based on Routing
The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
Definition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
Load-Balance of Intra/Inter-MANET Traffic over Multiple Internet Gateways
Load-Balance of Intra/Inter-MANET Traffic over Multiple Internet Gateways Quan Le-Trung 1, Paal E. Engelstad 2, Tor Skeie 1, and Amirhosein Taherkordi 1 1 Department of Informatics, University of Oslo
Chapter 5. Simple Ad hoc Key Management. 5.1 Introduction
Chapter 5 Simple Ad hoc Key Management 5.1 Introduction One of the most important consequences of the nature of the MANET networks is that one cannot assume that a node that is part of a network will be
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
