Prefix Delegation Based Route Optimisation in Cooperative Ad Hoc Interconnected Mobile Networks

Author(s):  
Rehan Qureshi ◽  
Arek Dadej
Author(s):  
Budi Rahmadya

Ad Hoc Network Communication is mobile networks communications and have a high mobility for each of its nodes. This type of network communications is a temporary networkwith utilizing a WiFi network or Bluethoot as a medium of communications. In the entirenetwork, node moves with a speed varying and unpredictable direction. Packets data delivery from the source node to destination node by using an ad hoc network requires its owntechniques. In this research discussed the existing data communication technique inVehicular Ad Hoc Network (VANETs) Communications with attention: Broadcasting Time, Routing Protocol, Message Dissemination, Delay Tolerant Network Dissemination and / DTN.These techniques can increase the delivery ratio / sending data packets to the destination as well as a smaller delay time. In order to maintain the integrity of the data packets received bythe destination node, the authors have proposed a method of duplicate messages in thisresearch.


Author(s):  
Gergely Pintér ◽  
Zoltán Micskei ◽  
András Kövi ◽  
Zoltán Égel ◽  
Imre Kocsis ◽  
...  

Author(s):  
Mamata Rath ◽  
Bibudhendu Pati ◽  
Jhum Swain

With faster expansion of mobile networks and quicker increment of web clients, more individuals approach worldwide data and communication innovation, because of which the issues of utilizing web as a worldwide stage and empowering the savvy protests and machines to coordinate, discuss, register, and ascertain slowly develops. In mobile ad-hoc networks (MANETs) and vehicular ad-hoc networks (VANET), the mobile stations and vehicles are self-reconfigurable as per the difference in network topology. Joint action between convenient centers is more basic because of the way that they confront significant difficulties, for example, frailty to work securely while protecting its advantages and performing secure guiding among center points. In the presence of vindictive hubs, one of the rule challenges in MANET is to plot ground-breaking security course of action that can shield MANET from different routing assaults.


Author(s):  
Phan Cong-Vinh

In mobile environments (MEs) such as vehicular ad hoc networks (VANETs), mobile ad hoc networks (MANETs), wireless sensor networks (WSNs), and so on, formal specification of self-configuring P2P networking (SPN) emerges as a need for programming, and verifying such mobile networks. Moreover, well-specified SPN in MEs becomes a requirement of developing middleware for the mobile networks. The chapter is a reference material for readers who already have a basic understanding of the MEs for their applications and are now ready to know how to specify and verify formally aspect-oriented self-configuring P2P networking (ASPN) in MEs using categorical language, assured that their computing needs are handled correctly and efficiently. ASPN in MEs is presented in a straightforward fashion by discussing in detail the necessary components and briefly touching on the more advanced components. Several explanatory notes and examples are represented throughout the chapter as a moderation of the formal descriptions. Significant properties of ASPN in MEs, which emerge from the specification, create the firm criteria for verification.


Author(s):  
Meng Yu ◽  
Jing (Tiffany) Li ◽  
Haidong Wang

We consider practical network coding, a useful generalization of routing, in multi-hop multicast wireless networks. The model of interest comprises a set of nodes transmitting data wirelessly to a set of destinations across an arbitrary, unreliable, and possibly time-varying network. This model is general and subsumes peer-to-peer, ad-hoc, sensory, and mobile networks. It is first shown that, in the singlehop case, the idea of adaptively matching code-on-graph with network-on-graph, first developed in the adaptive-network-coded-cooperation (ANCC) protocol, provides a significant improvement over the conventional strategies. To generalize the idea to the multi-hop context, we propose to transform an arbitrarily connected network to a possibly time-varying “trellis network,” such that routing design for the network becomes equivalent to path discovery in the trellis. Then, exploiting the distributed, real-time graph-matching technique in each stage of the trellis, a general network coding framework is developed. Depending on whether or not the intermediate relays choose to decode network codes, three practical network coding categories, progress network coding, concatenated network coding and hybrid network coding, are investigated. Analysis shows that the proposed framework can be as dissemination-efficient as those with random codes, but only more practical.


Author(s):  
André Paul ◽  
Carsten Jacob ◽  
Heiko Pfeffer ◽  
Stephan Steglich

The growing availability of well-equipped handheld devices and the increasing mobility of users influence the way today’s services can be used. In the future, services provided by different devices can be used on an ad-hoc basis to fulfill user-specified tasks. This chapter proposes an infrastructure for mobile networks that allows for the rating of nodes with respect to their provided functionalities. Thus, it is possible to create reputation relationships and trust assessments between service requesters and service providers. One means for making use of trust relationships is in the reduction and the prevention of interactions with misbehaving or inaccurate nodes. The authors’ work also factors in the subjectivity of users by allowing different service quality perceptions for each user. Thus, each user can base his or her cooperation behavior on their own service behavior preferences instead on the aggregated preferences of all users.


2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Fatna El Mahdi ◽  
Ahmed Habbani ◽  
Zaid Kartit ◽  
Bachir Bouamoud

Internet of Things (IoT) is a hot and emerging topic nowadays. In the world of today, all kinds of devices are supposed to be connected and all types of information are exchanged. This makes human daily life easier and much more intelligent than before. However, this life mode is vulnerable to several security threats. In fact, the mobile networks, by nature, are more exposed to malicious attacks that may read confidential information and modify or even drop important data. This risk should be taken in consideration prior to any construction of mobile networks especially in the coming 5G technology. The present paper aims to provide a contribution in securing such kinds of environment by proposing a new protocol that can be implemented in ad hoc networks.


Sign in / Sign up

Export Citation Format

Share Document