scholarly journals Design adaptive Subnetting Hybrid Gateway MANET Protocol on the basis of Dynamic TTL value adjustment

Author(s):  
Kaushal Kishor ◽  
Parma Nand ◽  
Pankaj Agarwal

Mobile ad hoc Network is infrastructure less wireless network and decentralized way, and then for a large network number of nodes dynamically therefor the connection established between source node to destination node is really challenging. The challenge is interconnecting ad hoc network to the internet seems from the needs to inform ad hoc nodes about available gateways in an extremely challenging scenario while a making a minimum consumption of the source network resources. Then an efficient gateway discovery of an ad hoc network becomes one of the central factors to enable the economic consumption of hybrid ad hoc network in future mobile and wireless network. In mobile ad hoc network have multihop nature of MANET therefore several reachable gateways for mobile node at any period of time. If the mobile node receives gatways advertisement from more than one gateway. It has to determine which gateway to use for connecting to the net. Most existing protocol choose the gateway which is closer in terms of the number of physical hops. This paper has focused on design an efficient and adaptive subnetting hybrid gateway discovery mechanism on the basis of dynamic TTL value adjustment such that congestion and unnecessary overhead is reduced. Selecting the gateway on the basis of one and two parameters will increase the performance and throughput of the network. The main objective of adaptive gateway discovery to determine the optimal TTL value in terms of number of hops to determine the proactive area, nodes outside this area follow the reactive approach. Consequently, for achieving a good trade off between performanceand network operating expense. 

Author(s):  
Zulfekar Ahmad ◽  
Akhilesh Bansiya

Mobile Ad-hoc Network is a collection of wireless mobile node, consists of each wireless transmitters and receivers, which dynamically forming a temporary network and communication between transmitter and receiver is by using bi-directional link. Either directly, if nodes in MANET are within communication range or indirectly means transmitter node rely on intermediate node, for forwarding data to destination node. IDS can be well-defined as the protector system which self-detects malicious activities within a network, and thus generates an alarm to alert the security device at a locality if intrusions are considered to be illegal on that network or host. There me many approach to classify IDS. In the existing work, they used fuzzy logic which decides the rules for the trust evaluation of the nodes. Rules should be defined previously which is difficult to manage for the unknown variables. This method is not suitable for the dynamic nature of the network. So we applied better technique which generates the more trustful network. In our proposed work, trust is calculated by sending the Route Request (RREQ) packets to the network then the destination node send Route Reply (RREP) packet. Calculate RTT for distance between the sender and destination nodes. We select the path by taking the shortest RTT and then form clusters. Calculate the energy of each node in cluster and select cluster head of maximum energy. Cluster head forward the data from source to destination. This method removes the chance of malicious node from the network.


Author(s):  
Aarti Sahu ◽  
Laxmi Shrivastava

A wireless ad hoc network is a decentralized kind of wireless network. It is a kind of temporary Computer-to-Computer connection. It is a spontaneous network which includes mobile ad-hoc network (MANET), vehicular ad-hoc network (VANET) and Flying ad-hoc network (FANET). Mobile Ad Hoc Network (MANET) is a temporary network that can be dynamically formed to exchange information by wireless nodes or routers which may be mobile. A VANET is a sub form of MANET. It is an technology that uses vehicles as nodes in a network to make a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. In this research paper Fuzzy based control approaches in wireless network detects & avoids congestion by developing the ad-hoc fuzzy rules as well as membership functions.In this concept, two parameters have been used as: a) Channel load b) The size of queue within intermediate nodes. These parameters constitute the input to Fuzzy logic controller. The output of Fuzzy logic control (sending rate) derives from the conjunction with Fuzzy Rules Base. The parameter used input channel load, queue length which are produce the sending rate output in fuzzy logic. This fuzzy value has been used to compare the MANET, FANET and VANET in terms of the parameters Throughput, packet loss ratio, end to end delay. The simulation results reveal that usage of Qual Net 6.1 simulator has reduced packet-loss in MANET with comparing of VANET and FANET.


Author(s):  
Sukant Kishoro Bisoy ◽  
Prasant Kumar Pattnaik

The Transmission Control Protocol (TCP) is a reliable protocol of transport layer which delivers data over unreliable networks. It was designed in the context of wired networks. Due to popularity of wireless communication it is made to extend TCP protocol to wireless environments where wired and wireless network can work smoothly. Although TCP work in wireless and wired-cum-wireless network, the performance is not up to the mark. In literature lot of protocols has been proposed to adopt TCP in wireless mobile ad hoc network. In this, we present an overall view on this issue and detailed discussion of the major factors involved. In addition, we survey the main proposals which aim at adapting TCP to mobile and static Ad hoc environments. Specifically, we show how TCP can be affected by mobility and its interaction with routing protocol in static and dynamic wireless ad hoc network.


2013 ◽  
Vol 347-350 ◽  
pp. 2677-2681
Author(s):  
Qin Yuan ◽  
Yong Wang

MANET(mobile ad-hoc network) is an independent NET AS SYSTEM, which has much difference with wired network. It does not depend on fixed main network ( but can be cooperated with main network). This article puts forward a kind of ASN structure during the design of MANET Tourism Network. So it solves the inadaptability between the net segmentation and combination in the MANET from wired ASN. It proves this MBGP can guarantee net MANET QQS in a simulated way.MANET is a kind of communication net with no central structure, which is contrary to the traditional wireless network with base station. It is also called self-organized net. The difference between MANET and wired autonomous network is that MANET gateway BGP agreement is very different from BGP agreement of wired autonomous network.


2020 ◽  
Vol 12 (6) ◽  
pp. 49-63
Author(s):  
Yasir Mohammed ◽  
Maha Abdelhaq ◽  
Raed Alsaqour

A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance the link break provision of the ad hoc on-demand remote protocol (AODV). The proposed algorithm is called the AODV Link Break Prediction (AODVLBP). The AODVLBP prevents link breaks by the use of a predictive measure of the changing signal. The AODVLBP was evaluated using the network simulator version 2.35 (NS2) and compared with the AODV Link prediction (AODVLP) and the AODV routing protocols. The simulation results reveal the effectiveness of AODVLBP in improving network performance in terms of average end-to-end delay, packet delivery ratio, packet overhead ratio, and packet drop-neighbour break.


2012 ◽  
Vol 11 (10) ◽  
pp. 3060-3064 ◽  
Author(s):  
Roopali Garg ◽  
Himika Sharma

Mobile ad-hoc network is a self-governing network, consists of group of nodes that communicates with each other through wireless links. As it is a wireless network, so it is subjected to various attacks. There is one attack which is very dangerous called Sybil attack. In Sybil attack, attackers or malicious nodes uses multiple identities to disrupt the communication between the nodes by capturing necessary and important information and creating misunderstandings between the nodes. In this paper some measures are described to prevent Sybil attack.


2019 ◽  
Vol 16 (9) ◽  
pp. 3906-3911
Author(s):  
Karan Singh ◽  
Rajeev Gupta

Recent progression in the field of information and communication cause increase of packet count over the World Wide Web network. These communicated packets should deliver on time from origin node to destination node using a reliable and shortest route. In this way routing plays an important part in dispatching the packets to destination form the source. This routing becomes more crucial when packets delivery is done in independent mobile nodes which dynamically form a temporary network. This network named as Mobile Ad-Hoc Network and therefore it is said to be particular reason-specific, self-ruling and dynamic. In this paper we analyzed 3 protocols and for a quality of service (i.e., Packet Delivery Ratio) and achieved comparative study of various protocols of routing with respect to Operation of protocols, Route maintenance, Routing table, Route, Route selection, Routing structure, Routing Approaches, Protocol types, Merits and Demerits.


Author(s):  
Hicham Zougagh ◽  
Noureddine Idboufker ◽  
Rida Zoubairi ◽  
Rachid El Ayachi

In a mobile ad hoc network, a source node must rely on intermediate nodes to forward its packets along multi-hop routes to the destination node. The performance of a mobile ad hoc network is closely related to the capability of the implemented routing protocol to adapt itself to unpredictable changes of topology network and link status. One of these routing protocols is optimized link state routing protocol which assumes that all nodes are trusted. However, in a hostile environment, the OLSR is known to be vulnerable to various kinds of malicious attacks. Without having any control on packet forwarding, an intermediate node can behave selfishly or maliciously to drop packets going through it. Therefore, in this article, the authors propose a new technique for the selection of multipoint relays whose aims to provide each node the ability to select alternative paths in order to reach any destination two hops away.


2019 ◽  
Vol 6 (1) ◽  
pp. 68
Author(s):  
Anisa Widayanti ◽  
I Gusti Agung Komang Diafari Djuni ◽  
N.M.A.E Dewi Wirastuti

Mobile Ad hoc Network (MANET) is a dynamic wireless mobile node network, without using network infrastructure such as limited power (because it uses batteries). Mobility of each node that is able to move in all directions, and autonomy of each node in determining its own route to forward the data plan. Therefore, in this study we will see the performance of MANET on IEEE 802.11 g WLAN with a data rate that is different from an AODV routing protocol. This simulation observes changes in data rates ranging from 1, 2.5 Mbps, using WLAN 802.11 g. For parameters used in the data rate starting from 1, 2, 5, Mbps using WLAN 802.11 g obtained the Package Loss value at a data rate of 5 Mbps by 0.98%, the highest value of the highest throughput was generated at a data rate of 1 Mbps of 313,715 bps, and the delay for the data rate of 5 Mbps was 0.0008 second.


2014 ◽  
Vol 2014 ◽  
pp. 1-12 ◽  
Author(s):  
Shigeru Kashihara ◽  
Takuma Hayashi ◽  
Yuzo Taenaka ◽  
Takeshi Okuda ◽  
Suguru Yamaguchi

This paper proposes a data delivery method based on neighbor nodes’ information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.


Sign in / Sign up

Export Citation Format

Share Document