Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Current evaluations of DoD tactical networking systems have left the impression of sub-optimal performance without being able to provide either a clear vision of the limits on the performance that could realistically be attained or which layers of the network algorithm are responsible for the suboptimal results. Recent advances in computing the capacity of a large MANET allow us to obtain a practical...
During blackhole attack, a malicious node captures packets and not forwards them in the network and advertises itself as having the shortest path to the node whose packets it wants to intercept. If more than one malicious nodes work together as a group then the damage will be very serious. This type of attack is called cooperative black hole attack. To avoid single blackhole attack in MANET we considered...
A new approach is introduced to obtain the reliability function of time-dependent system by using reliable node and reliable path concept in mobile ad-hoc network (MANET). It is known that all nodes of the MANET are not functional at all the time. Upon the failure of any node in the active path of the network, the system switches to the next path and correspondingly the connection between the source...
Mobile ad hoc network is a network of wireless node connected using wireless media. Each node operates as a router for all other nodes in the network. Nodes in MANET are mobile and hence change their topology dynamically. From one source to destination node there may be multiple paths. Due to wireless link mobile ad hoc networks are susceptible to many attacks. One popular attack on mobile ad hoc...
This paper simulates and evaluates the performance of zone routing protocol (ZRP), hybrid wireless mesh protocol (HWMP) and adhoc on demand distance vector protocol (AODV) against black hole, gray hole and jellyfish reordering attacks which inversely affect the functionality of protocols. Although for MANET numerous protocols and improvised algorithms has never been tested against each other on numerous...
MANET (Mobile Ad Hoc Network) consists of mobile nodes having no fixed infrastructure. These networks have dynamic topology and all the nodes are in general autonomous. Normally network comprises of selfish individuals that are not willing to forward the packets but wants to forward their own messages. In ad hoc network throughput increases when all available nodes are used for routing and forwarding...
Video streaming (like YouTube) services and related applications become more and more widespread. Therefore, video streaming delivery over a mobile ad-hoc network (MANET) becomes a necessity as an important content delivery infrastructure between the user (content consumer) and the content storage node. Furthermore, user mobility impacts the quality of the delivered video and hence new concepts should...
Mobile ad-hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links; each node operates as an end system and a router for all other nodes in the network. Nodes in mobile ad-hoc network are free to move and organize themselves in an arbitrary fashion. The path between each pair of the users may have multiple links and the radio between them can be heterogeneous. Use of...
Mobile Ad hoc Network (MAN ET) is a collection of wireless mobile hosts without the requirement of any existing infrastructure or centralized access point, such as base station, due to this it is a self-organized network. The black hole problem is one of the security attacks that occur in mobile ad hoc networks (MAN ETs). In Black hole attack, a malicious node falsely advertise shortest path to the...
Ad hoc communications are attracting more and more attention in today's research and technology, because of low cost implementation, and simple initialization procedures. They are being projected to be used in several fields such as collaborative computing and disaster recovery environments. However, route instabilities and scalability are issues that still need to be addressed. In this paper we implement...
Increasing attention is paid to mobile ad hoc networks last time. Application of such networks expands a range of opportunities in activity felds of man. The main objective of mobile ad hoc networks, as well as any other, is data transmission. It is provided by TCP. This paper is devoted to the performance evaluation of TCP under influence of various MANET aspects separately and together. The paper...
In this paper, we propose a physical layer (PHY) caching scheme to exploit cache-assisted dynamic multihopping gain and cache-induced opportunistic CoMP gain in wireless ad hoc networks. In particular, the PHY caching scheme contains a novel PHY transmission mode called the cache-induced dual-layer CoMP which can support homogeneous opportunistic CoMP in wireless adhoc networks and substantially improves...
Mobile ad hoc network is an arbitrary network in which all the nodes are mobile and consists of limited battery power and channel bandwidth. Ad hoc network often deployed in emergency situations, therefore saving resources i.e. power in such situations is prime importance. In this paper, an algorithm MAODV (Ad Hoc on demand distance vector routing using threshold power to route the packet) has been...
MANET is a set of wireless mobile stations which creates a short-term network without any backbone or centralized infrastructure. In today's world, large portion of traffic on the Internet carries TCP traffic due to real-time and non-real time multimedia traffic. Internet traffic has completely different properties than that of CBR (constant bit rate) traffic, which is the most generally evaluated...
Mobile adhoc networks (MANETs) or simply adhoc network, comprises of nodes that freely and dynamically self — organize into arbitrary and temporary network topology without any infrastructure support. Each node in a MANET are free to move in any direction, and will therefore change its links to other devices frequently. Due to the limitation of signal transmission range, not all nodes can directly...
A Mobile ad hoc networks (MANETs) is an infrastructure-less, dynamic network consisting of a collection of wireless mobile nodes that communicate with each other without the use of any centralized authority. It is a network that allows user to change its location and configure itself, and use wireless connections to connect various networks. In this paper, a survey on various protocols like CMAC,...
Due to limited transmission range and limited battery constraints of mobile nodes in Mobile Ad Hoc Network (MANET), routing in MANET becomes challenging especially when certain QoS requirements such as high data packet delivery ratio, low end to end delay and low routing overhead are to be satisfied. Even though a number of routing protocols have been proposed aiming to provide better network life...
Performance of routing protocols rely on the node mobility, network size, traffic volume, and connectivity patterns. Increasing number of connections in the wireless network creates more data section and incurs more collision. Therefore, there is a need of identifying efficient routing protocol to provide call services in such network. In this paper, we analyze the performance of routing protocols...
Mobile Ad-hoc Networks (MANET) are mobile nodes that communicate without any predefined infrastructure and are wireless in nature. This allows MANET to be easily setup in difficult geographical terrains. MANET routing protocols are standards using which communication is carried out among the mobile nodes. MANET are very vulnerable to security attacks because of their open nature. In this paper analysis...
To improve cooperative efficiency in mobile ad hoc networks, a relay-optimized cooperative MAC (RO-CMAC) protocol is proposed in this paper. In the protocol, an optimal relay is selected through two or three contention phases in case of low data rate of direct transmission from a sender to its recipient. In the first phase, all relays with the highest data rates to the sender and its recipient are...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.