The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A MANET or Mobile Ad-Hoc Network is decentralized in nature and it is basically a collection of heterogeneous mobile nodes which are autonomous and can communicate among themselves over the wireless link. In this infrastructure-less network, all the nodes dynamically route the packets by themselves with help of some protocols for sending or receiving the packet information. The ZRP or Zone Routing...
In this paper the performance analysis of a routing algorithm for MANETs called Service Zone Gateway Prediction (SZGP) is presented. This is a non-cooperative and hybrid type of routing with a hierarchical multilayered structure, incorporating pre-computed multipath hop-by-hop distributed connectivity. The goal is balance of the load among the nodes and reliable and energy efficient communication...
To solve hidden-terminal and exposed-terminal problems, an improved multi-channel MAC protocol (IMCMP) is proposed based on the existing multi-channel MAC protocol (MCMP). With the network simulation tool NS-2 (Network Simulator 2), the simulated experiments on the 802.11 protocol, MCMP and IMCMP are carried out. The simulation results show that under the different network loads and different channel...
Mobile ad hoc Network (MANET) consists of autonomous mobile nodes without any centralized control. These mobile nodes move arbitrarily within the self-configurable MANET environment. Each of these mobile nodes can act as router while receiving and forwarding information. Secure routing is an important issue in MANET as mobile nodes are prone to attacks from malicious nodes and the overall performance...
For making Mobile ad hoc network (MANET) more energy efficient swarm intelligence is used as a base and the clustered based approach as Bee-Ad Hoc-C which is an evolution from Bee-Ad-Hoc has been chosen as the best method in our previous work along with Stable Cluster Maintenance Scheme. In the proposed method parallel routing has been considered to improve the scalability of the system, reduce the...
Mobile Ad-Hoc Networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and does not have any centralized control in the network. MANET have no clear way of defense mechanism to protect network from security threats, thereby making this network accessible to both legitimate node and authorized node. The absence of centralized administration and openness make MANETs...
Science of networking is still a relatively immature area. Proposing an efficient dynamic routing protocol for MANET is an arduous and provoking task. Various protocols for routing phenomenon have been proposed to IETF [1]. Considering an ad-hoc network which is specified by frequently changing topology and infrastructure less connectivity, a protocol must be tested under realistic conditions but...
Adhoc networking field has been interestingly accepted by the research society due to its surprising features. Almost every aspect of the network has been explored by the researchers at some level of detail. A lot of analyses/ surveys have been presented in the literature for showing the performance of well accepted adhoc routing protocols viz. AODV, DSR, AOMDV, CBRP etc. This paper presents some...
As per need of recent applications, new research aspects related to scalability, heterogeneity, and power consumption have been emerged. These issues are supposed to be fixed for better utilization of MANETs. MANET nodes interact through multi-hop routing. AODV is a commonly used on-demand protocol for routing in MANETs. In the existing literature, AODV has been analyzed a number of times but heterogeneity...
Mobile Ad Hoc NETworks (MANETs) have become eminent resources for providing communication to military and other defence establishments operating in the conventional battlefield scenario in enemy territory or Counter Insurgency/Counter Terrorism operations beyond the reach of a permanent network infrastructure. However, MANET's inherent topology lack in defensive procedures and are thus, vulnerable...
Routing security challenges significantly impact the wide-scale adoption of mobile ad hoc networks (MANET), with wormholes constituting an especially severe threat. Wormhole detection algorithms like traversal time and hop count analysis (TTHCA) and modified transmission time-based mechanism (M-TTM) combine effective detection with low traffic overheads. TTHCA measures packet traversal time (PTT)...
Ad hoc wireless networks are influence embarrassed because nodes function through restricted battery energy. Therefore, Energy expenditure is central propose of new ad hoc routing protocols. To propose such protocols we contain to give the impression of being missing from the conventional minimum hop routing schemes. Moreover, limited-energy property makes together nodes and network lifetime surrounded...
Mobile ad hoc networks (MANETs) are temporary networks which are formed for a specific purpose. They are infrastructureless, autonomous and entirely distributed systems where different wireless mobile nodes are capable of arbitrary movement and power switching without breaking the network connectivity since it is physically possible. In these networks, nodes must operate both as hosts and as routers...
TCP — Transmission Control Protocol acts as a logical vehicle for process to process communication. TCP ensures reliability in the form of flow control, error control and congestion control via ACK-Acknowledgement based transmissions. Wireless networks have limited spatial reuse scope which limits amount of data that can be in transmission within a specific geographical area at a time. In such scenarios...
A Mobile Ad-hoc Network (MANET) has special characteristics such as dynamic topology, the absence of an administrative point and no fixed infrastructure. These features make it vulnerable to many attacks, such as the Denial of Service (DoS) attack. This type of attack deprives users of access to their legitimate services leading to degradation of the network. This paper posits the Monitor, Detect,...
This paper proposes a new multipath protocol, Low Energy Consumption Stability and Energy Aware Reverse Ad hoc On-demand Distance Vector (LEC-SEAR-AODV) Routing Protocol. This is a modification of existing SEAR Ad hoc On-demand Distance Vector (SEAR-AODV) Routing Protocol. The LEC-SEAR-AODV uses the path with high RF value as the primary path to route the data packets whereas secondary paths are used...
We present in this paper a multi-layer scheme for QoS Management in MANETs. Our proposal is to combine multiple communication protocols of different layers, to provide an adapted QoS to a different traffic classes. Protocols are modified to improve their awareness of the quality of service, so that new extensions with QoS support are developed. We model QoS service at routing layer, via a QoS extension...
MANET technology develops when the mobile device users are faced situation without support of a fixed network infrastructure. This technology allows communication without a fixed infrastructure. The high mobility in MANET network makes it very vulnerable to attack. Attacks in MANET can destructive routing scheme formed by routing protocols. This study designed a MANET network using AOMDV (Ad Hoc on-demand...
Wireless data transfer between mobile users has become more popular nowadays. In Mobile Ad-hoc Network, mobile nodes communicate with each other through the wireless medium, within the transmission range. If we use the data access applications in the wired network, the physical cabling in the wired network is restricting the connection topology and the bandwidth. But there is no such a restriction...
In our basic model, we study a stationary Poisson pattern of nodes on a line embedded in an independent planar Poisson field of interfering nodes. Assuming slotted Aloha and the signal-to-interference-and-noise ratio capture condition, with the usual power-law path loss model and Rayleigh fading, we explicitly evaluate several local and end-to-end performance characteristics related to the nearest-neighbor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.