A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS
|
|
|
- Martina Wilkinson
- 10 years ago
- Views:
Transcription
1 A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, Abstract The main work of this research work is to overcome a problem of address configuration in MANET. Address configuration in MANET is very difficult because it is multi-hop wireless network and topology of the network can change randomly due to unpredictable mobility of nodes and propagation characteristics. This paper introduce a Ubiquitous protocol for dynamic IP address assignment to nodes in MANETs which provide a guaranteed unique IP address assignment under a variety of network conditions including message losses, network partitioning and merging. The selection of some parameters in the algorithm is investigated, leading to different address tree structures. Index Terms: Ad Hoc Networks, IP Address Auto configuration, IP-networks, Routing Protocols *** INTRODUCTION Mobile Ad Hoc Networks are collections of mobile hosts dynamically establishing short lived networks in the absence of fixed infrastructure. MOBILE ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes without any fixed or pre-existing infrastructure. Nodes within the wireless range of each other can communicate directly. Nodes outside each other s wireless range must communicate indirectly, using a multi-hop route through other nodes in the network. This multi-hop route may change if the network topology changes. Several routing protocols like DSR [5], CBR [6], DSDV [9], AODV [10], etc. have been proposed for MANETs. MANETs may operate in a stand-alone mode, or may have gateways to interconnect to a fixed network. In the stand-alone mode, the network is spontaneously formed by nodes gathering at a remote location with no network infrastructure. Such a network can also be formed when the gateways to the external world fail or when all the existing network infrastructure goes down due to natural/man-made disasters. In the presence of a gateway, a MANET is envisioned to operate as a stub network connected to a fixed internetwork. In most networks, including MANETs, each node needs a unique identifier to communicate. It may be argued that the MAC address or the home IP address of the node should be sufficient for this purpose. However, use of the MAC address as a unique identifier has the following limitations: 1) MANET nodes are not restricted to using network interface cards (NICs) with a 48-bit IEEE-assigned unique MAC address. In fact, the TCP/IP protocol stack should work on a variety of data-link layer implementations. So, if this approach were to be employed, specific implementations would be required for each type of hardware. 2) The uniqueness of a MAC address cannot always be guaranteed, as it is possible to change the MAC address using commands like ifconfig. 3) There are known instances of multiple NIC cards from the same vendor having the same MAC addresses [11] [12]. The home IP address of the mobile node may not be usable as a unique identifier at all times. The home IP address may not be permanent, for example when the node acquires an IP address during boot up through DHCP and releases it when it leaves the network. It is possible that two nodes belonging to the same home network, at different times, may join the MANET with the same home IP address. Moreover, even if a node owns a unique home IP address, it needs a unique care-of IP address in the MANET if it is to be addressable from the Internet. Static IP address assignment for MANET nodes is difficult as it needs to be done manually with prior knowledge about the MANET s current network configuration. Dynamic configuration protocols like Dynamic Host Configuration Protocol (DHCP) [1] require the presence of centralized servers. MANETs may not have such dedicated servers. Hence, centralized protocols cannot be used to configure nodes in MANETs. In this paper present a distributed protocol for dynamic IP address assignment. The proposed solution is targeted towards the stand-alone mode of operation. Available 461
2 It may also be used in situations where the gateway only provides connectivity to external network(s) with no support for IP address assignment. While limit the examples to IPv4, the proposed protocol is applicable to both IPv4 and IPv6 networks. 2. The Prophet Allocation Protocol In this scheme, every host in the network maintains a function f(x) and has a state value to generate IP addresses to new hosts. This function f(x) seems to satisfy the following two properties: f(x) generates the same address in the same sequence at very large intervals. The probability of same address generated by function f(x) in different sequences is very low. When a new host requests an address, the initiator generates the address in two steps: Initiator updates its state value as the state value provided to requester. Function f(x) generates a free address and provides new state value to requester. Every initiator in the network acts the same manner to generate free addresses for new hosts. Regarding MANETs merger, two alternative mechanisms have been proposed. The first mechanism performs with high overheads and does not provide an answer regarding what function to use in future allocations. The second mechanism requires giving up all addresses in one network obtaining new addresses according to other network address sequence. This leads to unnecessary address changes. Every configured host in the network is able to act as initiator to new hosts for address allocations. It maintains distributed allocation table and pending allocation table, which are a set of configured IP addresses in use and a set of IP addresses whose allocation has been initiated but not yet completed respectively. The purpose of distributed allocation table is to find efficiently unconfigured address from the address space and the pending allocation table avoids concurrent address allocations. When the requester contacts an initiator by broadcast message for a free address, the initiator responds with an unconfigured address. Simultaneously, the initiator floods the network with a message asking for all hosts whether this address can be allocated. If all replies confirm the uniqueness of the pending allocation, then it is assigned. If not, then repeat the procedure with new address. Authors proposed to identify network partition with partition ID and Universal Unique Identifier (UUID host with smallest IP address in the network). Informing partition ID to every host in the network required proactive routing protocols or periodically transmitting messages. It usually consumes higher network resources and increased network overhead Network merging was the interesting part but we note some drawbacks with regards to the mechanism. Maintaining two tables and periodically transmitting control messages increases communication overheads. Frequent updating of such table with reactive routing protocols may reduce the efficiency of entire network communication. 3. Protocol Messages The following messages are exchanged during IP address assignment: 1. IP Address Request: A local broadcast message from the requester to neighboring nodes in the network requesting an IP address. 2. IP Address Avail: Unicast2 responses to IP Address Request from the neighboring nodes of the requester. This message contains the replying node s IP address and proposed block of IP addresses, if any. 3. Allocator Chosen: Unicast messages from the requester to all its neighbors on electing an allocator from among the neighbors that sent IPAddressAvail messages. This message contains the IP address of the chosen allocator. 4. IP Address Assign: Unicast message from the allocator to the requester assigning an IP address. This message contains an IP address block for the requester, IP address range from which the addresses can be assigned to nodes, and the network id. 5. IP Address Update: Network-wide message exchanged between nodes to update the network configuration information. This message is sent to all nodes in the network: (i) by the allocator responsible for reclamation of IP addresses during IP address allocation process, and (ii) by the merge agent during network-merging process. 6. Wait Period: Unicast message from the allocator informing the requester to extend its assign ip timer. 4. Efficient Network Layer Addressing This mechanism utilizes variable length addressing and an attachment agent. When a new host enters a network, the agent acquires the address for the new host. It is not totally clear how the attachment agent selection criteria priorities among close hosts around joining host. Similarly to MANET Conf, the attachment agent responds to joining host saying allocation is pending and simultaneously requesting a confirmation of the address uniqueness from entire network. Receiving negative reply indicates pending allocation address Available 462
3 may be in use and allocation can be cancelled to avoid conflict allocation. Concurrent assignment of same address in the network may occur through missing of reply messages requested by attachment agent. The main drawback is that IP compatible addresses. These are not assigned and when networks merge, every host must change its address if the total number of hosts in the merged network is greater than the current available address space. Variable address length scheme can reduce network communication overhead considerably. 5. Conflict Free IP Addressing Mechanism Here it is consider that Stand-alone Mobile Ad Hoc Networks. We assume that a block of IPv4 private addresses is used for addressing the hosts within a MANET. The blocks provided for private addressing are: (10/8 prefix) (172.16/12 prefix) ( /16 prefix) It is consider, the introduce block, which provides 24 bits for addressing. We need to consider 2 issues: We want to generate conflict free addresses for each MANET, but also we need to bear in mind that as hosts from different MANETs may come into contact with each other, they should be able to identify, by the address used, that they are from different MANETs. By structuring the address space into MANET ID and Host ID, both objectives can be achieved, at least statistically. Note that MANET ID is not used for routing as in wire line networks, but to differentiate between different MANETs in case of mergers. The routing inside a MANET needs only consider the host ID. 5.1 Network Initialization When the very first host wishes to join the network it sends broadcast message to its neighbors and simultaneously starts the acknowledgement timer. At least one acknowledgement message should be received from requester s surrounding hosts (although in this case there are none) before timer expires. If not it repeats the procedure few times (threshold time). If requester s timer expires without any response from its surrounding hosts then this requester decides to configure by itself with very first IP address of the network. It selects randomly a MANET ID, and takes the very first address in the host ID space. 5.2 Address generation in the Network. The network is capable of generating a range of addresses, and the range of addresses of any two hosts in the MANET is disjoint. A new host receives an unused IP address as will be explained next. Each host is numbered, according initially to the order of arrival on the MANET, but when a host departs from the MANET the number is reused, in which case it will not represent the order of arrival of the new host. Any given host, whose number is n, can allocate the following addresses: Σ n x Base Value + i (1) i=0 Where Base Value = 2, 3, 4,.... Host Number n = 0, 1, 2, i = 0, 1, 2, 3, (Base Value 1) The values obtained in Eq.(1) are then added to the first address in the host range to generate a new address. This algorithm leads to a tree structure in the way the addresses are generated, as shown if Figure 2 for the base value of 2. The higher the base value, the wider the tree and the higher the number of leaves with free addresses to allocate. This relation between the number of nodes in the MANET, the base value and the number of nodes with free addresses is depicted in table A and Figure 1. Base Value No of Hosts with Free Addresses for MANET with 50 Hosts 100 Hosts 200 Hosts 500 Hosts Table 1. No of nodes with addresses Available 463
4 Fig 3. Address Allocation Tree The host that allocates the address, the address allocator, will assign new address to an address requester according to the address allocator s available IP address(es). If more than one is available, it selects the lowest value. Fig 1. No of Free Hosts for various Base Values. This shows how the algorithm generates the sequence of addresses. The very first host selects randomly the MANET ID and picks as its IP address the first address in the host ID range. The first host generates the address of the second host, which generates the address of the third and fourth, and so on Host Joining the Network When a new host comes to join the network, it sends a broadcast message requesting a new address to join the network. One or more hosts, those with available addresses, will respond to that broadcast message. If a new joining host receives more than one response from other hosts, it gives priority to the address allocating host with the lowest address. Fig 2: Address Generating Sequence 5.4. Host Departing Network Host departure message is received by neighbor hosts, they will inform the host who will be responsible for regenerating the departing node s address. In other words, the parent host or a host that has replaced the parent in the tree. If the parent host place is vacant, say because the parent has left the network and has not been replaced, then the parent of the parent is informed, so that when the parent s address is regenerated it knows that there is a vacant address to generate. Naturally, if the parent of the parent is also vacant, then its parent is notified, and so on. When an existing host abruptly departs the network, there is no opportunity to inform the network about this departure. When a new host next comes to join the network, after receiving a new address it broadcasts a message informing its new address. Then all of members in network respond to new member acknowledging the new address. With these messages newly configured host knows which hosts are not present in the network. The newly configured host sends unicast messages to the missing hosts. If there is no reply, the new hosts will inform the parent of the missing host, just as in the case of a graceful departure. 6. CONCLUSIONS As the results show the dynamic distributed conflict-free address configuration algorithm for MANETs that provides address assignment to mobile hosts during the initiation, formation and maintenance of a network. The number of addresses each host can generate is the base value in the algorithm, and we considered a few possible values for comparison purposes. It is observed that increasing the base value leads to an increment of available free addresses. And function of the base value, and the impact of the merger of two MANETs with coinciding MANET IDs. Available 464
5 REFERENCES [1]. Jeff. Boleng, Efficient Network Layer Addressing for Mobile Ad Hoc Networks, in Proc. Of International Conference on Wireless Net-works (ICWN'02), Las Vegas, USA. [2].Asad Amir Pirzada, Chris McDonald, Establishing Trust In Pure Ad Hoc Networks, Internal Report, School of Computer Science and Software Engineering, The University of Western Australia. [3].Ad Hoc Networking Extended Research Project. Online Project. IEEE Working Group. [14] H. Zhou, L. Ni, and M. Mutka, Prophet Address Allocation for Large Scale MANETs, Proceedings of IEEE INFOCOM 2003, Mar [15] P. Patchipulusu, Dynamic Address Allocation Protocols For Mobile Ad Hoc Networks, Master s Thesis, Texas A&M University, Aug [16] A. Misra, S. Das, A. McAuley and S.K. Das, Autoconfiguration, registration, and mobility management for pervasive computing, IEEE Personal Communications, pp , Aug [4]. S. Nesargi and R. Prakash, MANETconf: Configuration of Hosts in a Mobile Ad Hoc Network, InfoCom 2002, June [5] S.-J. Lee, M. Gela, and C.-K. Toh, A simulation study of table-driven and on-demand routing protocols for mobile adhoc networks, IEEE Network, 1999, 13(4), pp [6] S. Chakrabarti and A. Mishra, QoS issues in ad hoc wireless networks, IEEE Communications Magazine, 2001,39(2), pp [7]E. Pagnani and G. P. Rossi, Providing reliable and fault tolerant broadcast delivery in mobile ad-hoc networks, Mobile Networks and Applications, 1999, 5(4), pp [8] IETF Working Group: Mobile Adhoc Networks (manet). [9] Y.-B. Ko and N. H. Vaidya, Geocasting in mobile ad hoc networks: Location-based multicast algorithms, Technical Report TR , Texas A&M University, Sep [10] S. Thomson and T. Narten, IPv6 Stateless Address Autoconfiguration, RFC 2462, Dec [11] G. Ricart and A. K. Agrawala, An Optimal Algorithm for Mutual Exclusion in Computer Networks, Communications of the ACM, vol. 24, no.1, pp.9-17, Jan 1981 [12] J. Jeong, J. Park, H. Kim and D. Kim, Ad Hoc IP Address Autoconfiguration, Internet Draft, draft-jeongadhoc-ip-addrautoconf- 03.txt, work in progress, Jul [13] K. Weniger, Passive Duplicate Address Detection in Mobile Ad Hoc Networks, Proceedings of IEEE WCNC 2003, Mar Available 465
Hosts Address Auto Configuration for Mobile Ad Hoc Networks
Hosts Address Auto Configuration for Mobile Ad Hoc Networks Sudath Indrasinghe, Rubem Pereira, Hala Mokhtar School of Computing and Mathematical Sciences Liverpool John Moores University [email protected],
Result Analysis of Virtual IP Address Configuration Protocol
Volume 64 No2, February 2013 Result Analysis of Virtual IP Address Configuration Protocol Satinder Kaur MTech Student Amritsar College of Engineering & Technology, Amritsar, Punjab-India- 143001 Tanu Preet
New Approach for Address Auto-Configuration in MANET Based on Virtual Address Space Mapping (VASM)
New Approach for Address Auto-Configuration in MANET Based on Virtual Address Space Mapping (VASM) Majid Taghiloo 1, Mehdi Dehghan 2, Jamshid Taghiloo 3, Maria Fazio 4, 1 Computer Engineering Department,
IP ADDRESS ASSIGNMENT IN A MOBILE AD HOC NETWORK
MILCOM 2002 1 IP ADDRESS ASSIGNMENT IN A MOBILE AD HOC NETWORK Mansoor Mohsin and Ravi Prakash The University of Texas at Dallas Richardson, TX Abstract A Mobile Ad Hoc Network (MANET) consists of a set
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks
1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing
Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing Jun-Zhao Sun MediaTeam, Machine Vision and Media Processing Unit, Infotech Oulu P.O.Box 4500, FIN-90014 University of Oulu, Finland
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
Name Service in IPv6 Mobile Ad-hoc Network
Name Service in IPv6 Mobile Ad-hoc Network Jaehoon Jeong, Jungsoo Park, Hyoungjun Kim, and Kishik Park Protocol Engineering Center, ETRI, 161 Gajong-Dong, Yusong-Gu, Daejon 305-350, Korea {paul,pjs,khj,kipark}@etri.re.kr,
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
A Survey: High Speed TCP Variants in Wireless Networks
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
IJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
www.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract
Achieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet
An Efficient AODV-Based Algorithm for Small Area MANETS
An Efficient AODV-Based Algorithm for Small Area MANETS Jai Prakash Kumawat 1, Prakriti Trivedi 2 PG Student, Department of Computer Engineering & IT, Government Engineering College, Ajmer, India 1 Assistant
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund
Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs
International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
Internet Connectivity for Ad hoc Mobile Networks
Internet Connectivity for Ad hoc Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu Charles E. Perkins
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
Study of Network Characteristics Incorporating Different Routing Protocols
Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,
Forced Low latency Handoff in Mobile Cellular Data Networks
Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN [email protected]
A Scalable Multicasting with Group Mobility Support in Mobile Ad Hoc Networks
International Journal of Information Processing Systems, Vol.3, No.1, June 2007 1 A Scalable Multicasting with Group Mobility Support in Mobile Ad Hoc Networks Kap-Dong Kim*, Kwangil Lee**, Jun-Hee Park**,
Gateway Load Balancing in Integrated Internet- MANET to Improve Network Performance
Gateway Load Balancing in Integrated Internet- MANET to Improve Network Performance Ajay Kumar 1, Udai Shankar 2, Mahesh Kumar Tiwari 3 1 2 3 Department of Computer science & Engineering and Information
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
A Link-state QoS Routing Protocol for Ad Hoc Networks
A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
SJBIT, Bangalore, KARNATAKA
A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,
Simulation Based Analysis of VOIP over MANET
Simulation Based Analysis of VOIP over MANET Neeru Mehta 1, leena 2 M-Tech Student 1, Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal, Haryana, India Abstract In the last
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
Routing with Load Balancing in Wireless Ad hoc Networks
Routing with Load Balancing in Wireless Ad hoc Networks Hossam Hassanein and Audrey Zhou Department of Computing and Information Science Queen's University Kingston, Ontario, Canada, K7L 3N6 {hossam, zhou}@cs.queensu.ca
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
IPv6 mobility and ad hoc network mobility overview report
Institut Eurecom 1 Department of Mobile Communications 2229, route des Crêtes B.P. 193 06904 Sophia Antipolis FRANCE Research Report RR-08-217 IPv6 mobility and ad hoc network mobility overview report
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
Keywords: DSDV and AODV Protocol
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparison
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
Module 2: Assigning IP Addresses in a Multiple Subnet Network
Module 2: Assigning IP Addresses in a Multiple Subnet Network Contents Overview 1 Lesson: Assigning IP Addresses 2 Lesson: Creating a Subnet 19 Lesson: Using IP Routing Tables 29 Lesson: Overcoming Limitations
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India
Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks
www.ijcsi.org 118 -Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks Vijayalakshmi P 1, Dr.V.Saravanan 2, Dr. P. Ranjit Jeba Thangiah 3, Abraham Dinakaran.J 4 1 Karunya
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
II RELATED PROTOCOLS. Dynamic Source Routing (DSR)
ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra
G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418
An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. [email protected]
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Wireless Mesh Networks under FreeBSD
Wireless Networks under FreeBSD Rui Paulo [email protected] The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much
Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
Name Resolution in On-Demand MANETs and over External IP Networks
Name Resolution in On-Demand MANETs and over External IP Networks Paal Engelstad, Do Van Thanh, Geir Egeland University of Oslo (UniK) / Telenor R&D, 1331 Fornebu, Norway {Paal.Engelstad, Thanh-van.Do,
PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
