The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Hierarchical network architectures are widely deployed to reduce routing overheads and increase scalability. In our work, we are interested in deploying a P2P overlay in ultimately large-scale Mobile Ad-Hoc Networks (MANETs). We therefore study the performance of such an approach, creating a number of hierarchical network configurations and deploy Chord over them. The clusters are MANETs, running...
The recent spread of mobile networks has paved the way for building a pervasive social networking (PSN) environment, which enables people to access social networking services (SNS) anytime and from anywhere. There have been extensive studies on MANETs (Mobile Ad-hoc NETworks), which use mobile terminals for relaying information. While the feasibility of using them as emergency networks in the aftermath...
Cluster computing in ad hoc network draws special attention from the research community due to its inherent support for group communication in varied application domains like emergency and rescue operations, etc. Context sensitive aware cluster computing yields maximum benefits and advantages than the traditional computing. The Cluster Head (CH) and the Cluster Members (CM) effectively coordinate...
A MANET is a self-motivated mobile wireless network that can be created exclusive of any former support. The challenge of MANET is to design robust routing algorithms which will satisfy all or few routing properties. Routing protocol in MANET can be categorized in various approaches depending upon network structure, communication model, routing strategy. Routing protocols can be further classified...
Inside MANET, mobile devices can move independently devoid of pre established infrastructure. In this type of network there is no fixed topology for the network. To increase the coverage range and to obtain the global type of services these MANETs can be joined to other type of networks. For combination of heterogeneous type of networks, intermediate one which is a gateway is used to form a hybrid...
Recently, an Opportunistic network is evolved from a mobile ad hoc network. In an opportunistic network, the mobility and resource constraints of mobile nodes lead to network partitioning or performance degradation. Several forwarding schemes are proposed to forward with less traffic and delay. However, these schemes utilize too much private information to get high performance, or creates too much...
Wireless Communication is an inevitable part of Smart Home domain. A Mobile Ad-Hoc Network (MANET) is defined as an arrangement of wireless mobile nodes which creates a temporary network for the communication. MANET suffers from both kinds of attacks, active and passive attacks at all the layers of the network model. The lacks of security measures of routing protocols allow attackers to intrude the...
The design of a trust management framework in a mobile ad hoc network and its various components to protect against different attacks has a significant impact upon the performance of the secure routing protocol which is meant to form the most reliable route for data delivery. Specifically, the current work focuses upon the impact of certain parameters specific to two components within the proposed...
In this paper a routing algorithm for MANETs is presented, based on the formation of servicing zones and determination of nodes in these zones as default gateways. The idea behind this approach is to gain power efficiency and sustainability of the network. The proposed approach reduces the overall number of broadcasts in the network and ensures a reliable and energy efficient connection, by balancing...
New generation military equipment, soldiers and vehicles, use wireless technology to communicate on the battlefield. During missions, they form an ad hoc network, namely Mobile Ad hoc NETwork (MANET). Since the battlefield includes coalition, each group may communicate with another group, and inter-MANET communication may be established. Inter-MANET (or interdomain MANET) communication should allow...
Mobile Ad-hoc Network is a network in which mobile nodes communicate with each other by the help of wireless links and mobile nodes can move randomly in a network without any centralized management system. As MANET is a wireless network, security is a major concern and different type of attacks can manipulate the data/info that are transmitted from the source node to destination node in the network...
A Mobile Ad-Hoc Network (MANET) is a dynamic ad hoc network without any fixed infrastructure. Since it is dynamic in nature, it can configure and vary locations by itself, on the move. Since devices in a MANET are autonomous and can move in any direction, they change links with other devices very often. One of the principal challenges in building a MANET is to properly route traffic in order to constantly...
In Mobile Adhoc networks (MANET) the mobility of nodes results in regular and random changes of network topology, which results in regular route changes, network partitions and possibly packet losses, making routing a challenging task in MANET network. The mostly used routing protocols in such networks are proactive and reactive routing protocols, but a reactive routing strategy is the most popular...
In MANET routing one of the very important factor to be considered is the QoS. A multi-constraint routing protocol discussed till now considers two or three fixed QoS metrics. As all the metrics are not examined, there is high possibility that few other QoS are not achieved. In this paper rough set theory is introduced to dynamically select any of the QoS metrics depending on their values in information...
Ad hoc On Demand Distance Vector (AODV) routing is an extensively accepted routing protocol for Mobile Ad hoc Network (MANET). The inadequacy of security considerations in the design of AODV makes it vulnerable to black hole attack. In a black hole attack, malicious nodes attract data packets and drop them instead of forwarding. Among the existing black hole detection schemes, just a few strategies...
Adhoc wireless networks are defined as the category of wireless networks that utilize multihop radio relaying and are capable of operating without the support of any fixed infrastructure and hence they are also called infrastructureless networks. This type of network allows for spontaneous communication without previous planning between mobile devices. A variety of routing protocols for adhoc wireless...
The Zone Routing Protocol (ZRP) is emerging as a potential hybrid routing algorithm. By using two kinds of routing protocol i.e. IARP and IERP, ZRP not only abates control overhead, but also minimizes end-to-end delay. The resent research on performance of ZRP indicates that routing overhead is still a significant issue and need more improvements. In this paper we focus on improving ZRP protocol by...
Mobile Ad-hoc Network (MANET) is a physical infrastructure less network, in which there are no fixed nodes and every node in the network functions like a router, which discovers the routes for other nodes in the network, and route the data packets that are not within the direct communication. There are many protocols have been proposed for MANET. The most widely used and popular are AODV, DSR, and...
Mobile Ad hoc Network (MANET) is a temporary infrastructure less network formed by collection of wireless mobile nodes. Every node is mobile to communicate with each other without relying on any centralized system. As the power of mobile node is limited it is during communication nodes will keep on losing its energy and finally drain off when the energy becomes zero. Thus, it is very essential to...
On wireless computer networks, wireless devices are directly communicate with each other freely in the presence of adhoc network which act as a medium. Ad-hoc procedure gives permission to all wireless devices that they communicate within their range which ultimately discover and interact in peer to peer trend that doesn't include central access points in the network. In clustering proper assortment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.