The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In military operation, sharing information among troops is essential issue for effective combats and minimal causalities. So these tendencies take militaries to information centric combat. And MANET has proper properties for this military operation such as infrastructure less, effective data transfer and flexible for changeable topology. Routing protocol is key factor of MANET. So to apply MANET into...
Mobile Ad-hoc is the most attractive area of research because of its dynamic topology and mobile environment of network. It is a structure less, self adjustable, dynamic network. Routing is the main challenging in MANET because of its nature. AODV is reactive routing protocol which is based on Breadth first search and it uses flooding. DSDV is a proactive routing protocol which maintains a routing...
Ad hoc is a Latin word which describes solutions for this or specific purpose. In the world of computer network, an ad hoc network refers to a network connection which established for a single session and does not require wireless base station; they are on-the-fly networks. Energy, security and selfishness have been amongst the most popular issues for researchers in recent years. Selfish node is stated...
Mobile Ad hoc systems have recognized expanding mindfulness in the present couple of years. As of late, systems administration of unattended detecting gadgets has expected noteworthy consideration from the exploration group. In this paper we exhibit a survey investigation of lightweight proactive source steering conventions of Mobile Ad hoc systems. In this paper we likewise audit and analyze the...
In a typical wireless sensor network, the batteries of the nodes near the sink deplete quicker than other nodes due to the data traffic concentrating towards the sink, leaving it stranded and disrupting the sensor data reporting. To mitigate this problem, mobile sinks are proposed. They implicitly provide load-balanced data delivery and achieve uniform-energy consumption across the network. On the...
Location based protocols use the information of node's position to route the data. Routing the data in this case does not mean choosing the shortest path. It means choosing the available path based on the location information, this is one of the reasons that these protocols may fail the routing task in mobile Ad-hoc Networks (MANET) where the mobility of the nodes and the dynamic topology makes the...
Research and propose a path collection mechanism optimization scheme of AODV protocol. This scheme adopts the path collection mechanism in DSR protocol to improve the performance of AODV, meanwhile it avoids being affected by the high running overhead and weak scalability of DSR protocol. Results obtained by OPNET Simulation shows that the optimized AODV scheme performs effectively in terms of packet...
Mobile ad hoc network is a network of wireless node connected using wireless media. Each node operates as a router for all other nodes in the network. Nodes in MANET are mobile and hence change their topology dynamically. From one source to destination node there may be multiple paths. Due to wireless link mobile ad hoc networks are susceptible to many attacks. One popular attack on mobile ad hoc...
A mobile ad-hoc network is a wireless network such that nodes are move dynamically in network. In OSI network layer there is lot of attack but introduce only collaborative black hole and worm hole attack. A group of black hole node easily employed against routing in mobile ad-hock networks called collaborative black hole attack. When two malicious node is create a tunnel is called worm hole attack...
With the widely using of WiFi router, indoor localization based on RSSI (Received Signal Strength Indication) of WiFi has also been used broadly, but its localization precision is only several meters, meanwhile it needs more router. An indoor localization method based on adjustable power WiFi router is explored. Not only the off-line finger print maps but also on-line localization test used to adjust...
MANETs is a collection of mobile nodes. There infrastructure is neither fixed nor has any control station. So it is affected by various types of malicious attack. AODV is a standard MANETs protocol so every malicious node tries to attack on this routing protocol. A black hole attack is a type of malicious attack in which black hole node replies to route request packet with the highest destination...
Mobile ad-hoc network have been innovated in communication network as introduce to wireless environment with dynamic scenario where infrastructure existence based on on-demand. MANET network has been easily set upped as veridical key stone of dynamic wireless environment with self configuring at low prices in compare to wired network. Due to roving and movable behavior of the node, MANET network are...
Wireless data transfer between mobile users has become more popular nowadays. In Mobile Ad-hoc Network, mobile nodes communicate with each other through the wireless medium, within the transmission range. If we use the data access applications in the wired network, the physical cabling in the wired network is restricting the connection topology and the bandwidth. But there is no such a restriction...
In this paper, we present preliminary results from a performance comparison between the two multicast routing protocols ODMRP and SMF. While SMF uses a proactive selection of forwarding nodes, ODMRP is a reactive approach to multicast routing. For the evaluation, we use an two-step approach. First, we perform emulation-based measurements in a virtualized test bed utilizing the ns-3 IEEE 802.11 model...
Mobile crowd management is yet an emerging new research area for Search and Rescue (SAR) operations. The dynamic nature and mobility of Mobile Adhoc Networks (MANETs) demand for new set of networking strategies to be developed in order to provide reliable and efficient communication during catastrophe such as in battlefield, terrorist attacks and natural disasters. A MANET is an independent, dynamic,...
The rapid development of wireless communication technologies and portable mobile devices such as laptops, PDAs, smart phones and wireless sensors brings the best out of mobile computing particularly mobile ad-hoc and sensor networks. Nowadays, most of researchers working on Wireless Sensor Networks (WSNs) focus on Mobile Ad-hoc and Sensor Networks (MASNETs) due to their wide range of potential applications...
Mobile ad-hoc sensor networks (MASNETs) have promised a wide variety of applications such as military sensor networks to detect and gain as much as possible about enemy movements and explosions. Most of these applications can be deployed either in static or mobile environment. In static WSNs, the change of sensor nodes topology is normally caused by node failure which is due to energy depletion. However,...
Routing protocol for low-power and lossy networks (RPL) is the standard IPv6 based routing protocol for low power, lossy Networks (LLNs) proposed by IETF. It is proposed for networks with characteristics like small packet size, lossy links, low bandwidth, low data rate and low power resources. RPL is a single path routing protocol and the existing objective functions do not support creation of multiple...
Despite the agreement on the Wireless Mesh Networks impact as a flexible way to provide Internet connections with low cost, they still suffer from some limits that degrade their performance, resulting from their Wireless/multihop nature. Using multiple paths principale and an appropriate Channels Assignment process may confront one of the most encountered problems in wireless communication field,...
Ad hoc communications are attracting more and more attention in today's research and technology, because of low cost implementation, and simple initialization procedures. They are being projected to be used in several fields such as collaborative computing and disaster recovery environments. However, route instabilities and scalability are issues that still need to be addressed. In this paper we implement...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.