Ad-hoc network implementation and experimental testing using low cost and COTS components: An ecuatorian case study

Author(s):  
Patricia Chavez-Burbano ◽  
Ignacio Marin-Garcia ◽  
Andres Munoz-Arcentales
Author(s):  
Mohamed Er-Rouidi ◽  
Houda Moudni ◽  
Hassan Faouzi ◽  
Hicham Mouncif ◽  
Abdelkrim Merbouha

Mobile ad hoc network become nowadays more and more used in different domains, due to its flexibility and low cost of deployment. However, this kind of network still suffering from several problems as the lack of resources. Many solutions are proposed to face these problems, among these solutions there is the clustering approach. This approach tries to partition the network into a virtual group. It is considered as a primordial solution that aims to enhance the performance of the total network, and makes it possible to guarantee basic levels of system performance. In this paper, we study some schemes of clustering such as Dominating-Set-based clustering, Energy-efficient clustering, Low-maintenance clustering, Load-balancing clustering, and Combined-metrics based clustering.


2015 ◽  
Vol 713-715 ◽  
pp. 2308-2311
Author(s):  
Zhong Zong

In the protocol of Ad Hoc network, the AODV routing protocol is the on-demand distance vector routing protocol. Because of its low cost and simple realizing, it is the hot point of wireless ad hoc network researches. This paper researches the mechanism of the AODV routing protocol, analyses its limitations and proposes a pre-judgment based on the link quality. It avoids using the local path restoration algorithm AODV-LQP in unstable area. Before the break of the low quality link, starting the link reparation will avoid the restoration in data transportation. The simulation experiment shows that the improved algorithm reduces the average time delay of end to end, and augments the packet delivery ratio.


2007 ◽  
Vol 19 (4) ◽  
pp. 459-465
Author(s):  
Daisuke Kurabayashi ◽  
◽  
Tomohiro Inoue ◽  
Akira Yajima ◽  
Tetsuro Funato ◽  
...  

Focusing on an algorithm for realizing a small-world (SW) like ad hoc communication network among autonomous mobile agents, we discuss how the ad hoc network emerges through local negotiation without a central manager. We have started procedures that lend emerging networks the SW property, resulting in effective, low-cost communication. We formulate the expected number of communication links and degrees of agents, verifying the feasibility of our proposal through simulation.


2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
José Jailton ◽  
Tassio Carvalho ◽  
Jasmine Araújo ◽  
Renato Francês

In the new context of Next Generation Networks, Aerial Ad Hoc Networks, also known as FANET (Flying Ad Hoc Network), are being used to monitor areas of difficult access. Owing to the dynamism and autoconfiguration of this type of network, a strategy is needed to position its devices (drones) to ensure it can achieve good performance. In light of this, this paper proposes a flight path planning model, which involves a metaheuristic optimization-based approach. The proposal relied on the artificial neural networks to optimize the positioning of the relay device, so that the throughput between the other devices could be increased; the benefits of the proposal were demonstrated through simulations.


2015 ◽  
Vol 77 (22) ◽  
Author(s):  
Nur Cahyono Kushardianto ◽  
Yudhi Kusnanto ◽  
Elvian Syafrurizal ◽  
Ahmad Hamim Tohari

Quality of Service for data traffic is an important facet of a network, which in the case of a wireless network can easily be disrupted by applying a device to broadcast signals.  The authors believe that the increased of the energy consumption, when a jamming attack occurs, can be used as a guiding indicator in order to mitigate the attack. The authors show that when a reactive jamming attack occurs on a wireless network unmitigated, it can easily block the entire data traffic to the point there is no data can be delivered. The authors also show that, using NS3 simulation, in an event where a reactive jamming attack to the network happened, the source of the attack can be identified through the increased of energy consumption , and successfully mitigated by avoiding sending data traffic through the same channel used by the attacker, by executing channel hopping.  


2012 ◽  
Vol 198-199 ◽  
pp. 1615-1620
Author(s):  
Xiao Pei Liu ◽  
Teng Fei ◽  
Cheng Zhu

With the growing maturity of the Bluetooth technology, Bluetooth technology to the utility and safety are getting higher and higher. As open-standard of short distance wireless technology of communications. Bluetooth has much virtue of low-power consumption, low-cost and strong anti-interference. It is convenient and economical when used by mobile devices in Small scope. This thesis summaries the background of the thesis, also simply illustrates Ad Hoc network and the application of Bluetooth in Ad Hoc network. At the beginning of this article, the main research task and arrangement of chapters are introduced. Introduce Bluetooth technology and architecture. Based on the introduction of the system module of Bluetooth personal area network (PAN), implementation of the application module of PAN is presented. The implementations of software and hardware platform of Bluetooth ad hoc are also presented. An application of Bluetooth ad hoc---wireless communication positioning system based on Bluetooth, GPRS and GSM is designed and realized. Finally, Summary of the main technology and project, summarize the relevant work of the thesis.


Sign in / Sign up

Export Citation Format

Share Document