Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
A MANET or Mobile Ad-Hoc Network is decentralized in nature and it is basically a collection of heterogeneous mobile nodes which are autonomous and can communicate among themselves over the wireless link. In this infrastructure-less network, all the nodes dynamically route the packets by themselves with help of some protocols for sending or receiving the packet information. The ZRP or Zone Routing...
In this paper the performance analysis of a routing algorithm for MANETs called Service Zone Gateway Prediction (SZGP) is presented. This is a non-cooperative and hybrid type of routing with a hierarchical multilayered structure, incorporating pre-computed multipath hop-by-hop distributed connectivity. The goal is balance of the load among the nodes and reliable and energy efficient communication...
Mobile ad hoc Network (MANET) consists of autonomous mobile nodes without any centralized control. These mobile nodes move arbitrarily within the self-configurable MANET environment. Each of these mobile nodes can act as router while receiving and forwarding information. Secure routing is an important issue in MANET as mobile nodes are prone to attacks from malicious nodes and the overall performance...
For making Mobile ad hoc network (MANET) more energy efficient swarm intelligence is used as a base and the clustered based approach as Bee-Ad Hoc-C which is an evolution from Bee-Ad-Hoc has been chosen as the best method in our previous work along with Stable Cluster Maintenance Scheme. In the proposed method parallel routing has been considered to improve the scalability of the system, reduce the...
Science of networking is still a relatively immature area. Proposing an efficient dynamic routing protocol for MANET is an arduous and provoking task. Various protocols for routing phenomenon have been proposed to IETF [1]. Considering an ad-hoc network which is specified by frequently changing topology and infrastructure less connectivity, a protocol must be tested under realistic conditions but...
Adhoc networking field has been interestingly accepted by the research society due to its surprising features. Almost every aspect of the network has been explored by the researchers at some level of detail. A lot of analyses/ surveys have been presented in the literature for showing the performance of well accepted adhoc routing protocols viz. AODV, DSR, AOMDV, CBRP etc. This paper presents some...
As per need of recent applications, new research aspects related to scalability, heterogeneity, and power consumption have been emerged. These issues are supposed to be fixed for better utilization of MANETs. MANET nodes interact through multi-hop routing. AODV is a commonly used on-demand protocol for routing in MANETs. In the existing literature, AODV has been analyzed a number of times but heterogeneity...
Mobile Ad Hoc NETworks (MANETs) have become eminent resources for providing communication to military and other defence establishments operating in the conventional battlefield scenario in enemy territory or Counter Insurgency/Counter Terrorism operations beyond the reach of a permanent network infrastructure. However, MANET's inherent topology lack in defensive procedures and are thus, vulnerable...
Routing security challenges significantly impact the wide-scale adoption of mobile ad hoc networks (MANET), with wormholes constituting an especially severe threat. Wormhole detection algorithms like traversal time and hop count analysis (TTHCA) and modified transmission time-based mechanism (M-TTM) combine effective detection with low traffic overheads. TTHCA measures packet traversal time (PTT)...
Ad hoc wireless networks are influence embarrassed because nodes function through restricted battery energy. Therefore, Energy expenditure is central propose of new ad hoc routing protocols. To propose such protocols we contain to give the impression of being missing from the conventional minimum hop routing schemes. Moreover, limited-energy property makes together nodes and network lifetime surrounded...
This paper proposes a new multipath protocol, Low Energy Consumption Stability and Energy Aware Reverse Ad hoc On-demand Distance Vector (LEC-SEAR-AODV) Routing Protocol. This is a modification of existing SEAR Ad hoc On-demand Distance Vector (SEAR-AODV) Routing Protocol. The LEC-SEAR-AODV uses the path with high RF value as the primary path to route the data packets whereas secondary paths are used...
We present in this paper a multi-layer scheme for QoS Management in MANETs. Our proposal is to combine multiple communication protocols of different layers, to provide an adapted QoS to a different traffic classes. Protocols are modified to improve their awareness of the quality of service, so that new extensions with QoS support are developed. We model QoS service at routing layer, via a QoS extension...
MANET technology develops when the mobile device users are faced situation without support of a fixed network infrastructure. This technology allows communication without a fixed infrastructure. The high mobility in MANET network makes it very vulnerable to attack. Attacks in MANET can destructive routing scheme formed by routing protocols. This study designed a MANET network using AOMDV (Ad Hoc on-demand...
In our basic model, we study a stationary Poisson pattern of nodes on a line embedded in an independent planar Poisson field of interfering nodes. Assuming slotted Aloha and the signal-to-interference-and-noise ratio capture condition, with the usual power-law path loss model and Rayleigh fading, we explicitly evaluate several local and end-to-end performance characteristics related to the nearest-neighbor...
When some wireless networks are formed only for a particular purpose, they are the Mobile Ad-hoc Networks (MANETs). They do not depend on any access point for communication; they self-organize, and change topology dynamically. A routing protocol is necessary to help a node discover the routes to other nodes of the network and enable its communication with them. Each routing protocol tends to find...
In Ad hoc networks, there is no central infrastructure but it allows mobile devices to establish communication path. Since, there is no central infrastructure and mobile devices are moving randomly, gives rise to various kinds of problems, such as security and routing. Here the problem of routing will be considered. In this work, a new Route Selection Technique for AODV will be proposed that selects...
Mobile ad hoc networks (MANETs) are spontaneously deployed over a geographically limited area without well-established infrastructure. In a distributed Mobile Ad Hoc Network (MANET), collaboration and cooperation is critical concern to managing trust. The networks work well only if the mobile nodes are trusty and behave cooperatively. Due to the openness in network topology and absence of a centralized...
A MANET is a infrastructure-less and auto configurable network of mobile nodes which are connected without wires. As per proposal of this paper, the communication in a MANET works on set of random keys called KEY1=X+KEY0, KEY2=X+KEY1, KEY3=X+KEY2…KEYN=X+KEYN−1 to establish the connection between nodes and applies to validate the packets. Since there could be a issue of keys length, hence we can enforce...
In Mobile Ad hoc Networks (MANETs), frequent link breakages occur which reduces the route lifetime and increases the frequency of invoking the route discovery process. Broadcasting is used in most of the reactive routing protocols for route discovery. Broadcasting increases routing overhead and end-to-end delay as well as decreases packet delivery ratio. To solve the broadcast storm and routing overhead...
Ad-hoc network, due to its fundamental characteristics like open environment operation, random topology and capability limitation, is mostly at risk from secuirity point of view. There may be malicious threats during data transmission from one user to another user, which leads to affect the system performance and causing insecurity in data transmission. Many routing protocols consider these secuirity...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.