scholarly journals Modeling Portable Manager Aiding in the MANET Communication

Author(s):  
Ganesh Kumar ◽  
A. Arivazhagan

<p>The aim of this paper is to model the Portable Manager and allow it to aid in communication among Mobile Ad-hoc Networks (MANETs) carrying information across the mobile nodes in the network. In this article, Modeling Portable Manager aiding in the MANET Communication (MMAC) is proposed. The novelty is present in the use of node performance parameter called as α defined as the ratio of the packet received, packet loss and delay of the node which could be used for the next hop selection in the mobile ad hoc network. The Portable Manager (PM) is used to find out the relay node in the network. The working of the PM with a minimal number of nodes is analyzed and presented through the simulations in the network simulator.</p>

Author(s):  
Sunil Kumar ◽  
Kamlesh Dutta

A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future.


2019 ◽  
Vol 8 (02) ◽  
pp. 24484-24490
Author(s):  
Abdulghani Saif Kasem Mohammed ◽  
Khalid Hamid Bilal

Mobile Ad Hoc Network (MANET) is the one of the type of ad hoc network, the MANET is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized  administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and sometime act as routers at the same time, In MANET, the mobile nodes require to forward packets for each other to enable communication among nodes outside of transmission  range. The nodes in the network are free to move independently in any direction, leave and join the network arbitrarily. Thus a node experiences changes in its link states regularly with other devices. Eventually, the mobility in the ad hoc network, change of link states and other properties of  wireless transmission such as attenuation, multipath propagation, interference etc. This paper discuses   study of Mobile ad-hoc Networks (MANET): classification, characteristics, structure of  MANET  and challenges that are imposed by Mobile ad-hoc Networks.


Author(s):  
Sunil Kumar ◽  
Kamlesh Dutta

A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future.


2018 ◽  
Vol 7 (2.27) ◽  
pp. 150
Author(s):  
Rupinder Kaur ◽  
Sandeep Singh Kang

The mobile ad-hoc network is the decentralized type of network in which mobile nodes can move from one location to another. Due to random mobility of the mobile nodes route establishment, route maintenance is the major issues of mobile ad-hoc networks. This research paper, focus on the route establishment and route maintenance properties of mobile ad-hoc network. The DCFR protocol is the route establishment and route maintenance protocol in which broker route will be recovered on the basis of node connectivity. The node, which has maximum connectivity, is selected as the best node for route recovery in DCFR Protocol. In this research work, the DCFR protocol is further improved by adding buffer size parameter for route recovery which also maintains quality of service in the network. The proposed DCFR protocol simulation results perform well as compared to existing DCFR protocol in terms of certain parameters  


Author(s):  
Mohammed Ahmed Jubair ◽  
Mustafa Hamid Hassan ◽  
Salama A. Mostafa ◽  
Hairulnizam Mahdin ◽  
Aida Mustapha ◽  
...  

<p>A Mobile Ad-hoc Network (MANET) refers to a dynamic and wireless network, which can be designed without an existing infrastructure as every node serves as a router. A MANET is a self-configuring system of mobile nodes that are connected wirelessly. Every node serves as a sink, as well as a router to send packets. The movement of the nodes is not restricted as they can move in any direction, and they have the ability to get organized into a network. Due to their free and independent movement, they do not have a fixed position; they often change positions. In this study, the Dynamic Source Routing (DSR) and Ad-hoc On Multipath Demand Distance Vector (AOMDV) protocols are compared using Network Simulator NS2.35. DSR is a reactive gateway discovery algorithm whereby the connection of a MANET mobile device is established only on demand. Basically, AOMDV was specially tailored for ad-hoc networks that are highly dynamic to respond to link failures and breakages in the network. It ensures that the paths for destinations are sustained, and it defines the new routing information using destination serial numbers to ensure loop freedom always while avoiding problems. More so, it is a protocol that is based on a timer that can discover ways through which the mobile nodes respond to link breakages and change in topology. A comparison of protocols has been carried out individually and jointly with the aim of evaluating their performance. The performance is measured in terms of End-to-End Delay, Packet Delivery Ratio, Packet Loss Ratio, and Routing Overhead Ratio. The performance of the routing protocols was done using two scenarios; when there is a change in the simulation time and when there is a change in the number of nodes.</p>


2012 ◽  
Vol 224 ◽  
pp. 520-523
Author(s):  
Hyun Jong Cha ◽  
Jin Mook Kim ◽  
Hwang Bin Ryou

A mobile ad-hoc network is a method of communication between different nodes (mobile devices) without the use of base stations, which are used in wired networks. In a Mobile ad-hoc network, nodes can play the role of a receiver, sender, or a relay. As movement is flexible in Mobile ad-hoc networks and nodes have limited resources, nodes may join the communication or exit it at any time. Therefore, for Mobile ad-hoc networks, routing techniques - selecting communication routes and maintaining them – is considered important in an environment of constantly changing network topology. To overcome this problem, this paper proposes a reliable routing protocol based on MP-AOMDV, which monitors changes in signal strength not only for GPS signals but reception signals as well. Although MP-AOMDV was researched under the assumption of fixed movement direction and speed, this paper proposes a routing technique that works with changing movement direction or speed of nodes.


2020 ◽  
Vol 1 (1) ◽  
pp. 7-14
Author(s):  
Chen Chao ◽  
Liang Jun ◽  
Sun Xin

Mobile ad hoc networks use the wireless network and have wider applications especially in emergency situation, military combat zones, and the mobility vehicles. The mobile ad hoc network especially poses the problem of security and efficiency as the network is often subject to internal and external attacks. To overcome such problems, different protocols are proposed. In this study, an improved protocol is proposed which makes use of hexacol cluster method and thus provide greater efficiency and security to the network. For validating the proposed method, a stimulation was performed and results were compared with other protocols. The results indicate that the proposed method showed improved performance compare to the other protocol.


Author(s):  
Zhiyan A. Younis ◽  
Adnan Mohsin Abdulazeez ◽  
Subhi R. M. Zeebaree ◽  
Rizgar Ramadhan Zebari ◽  
Diyar Qader Zeebaree

Disasters could cause communication systems partially or completely down. In such a case, relief operations need a rapidly deployed communication system to save lives. Exchanging information among the rescue team is a vital factor to make important decisions. Communication system required to be robust to failures, rapidly deployable, easily maintainable to provide better services. Wireless ad-hoc networks could be the choice of establishing communication with the aid of existing infrastructure in a post-disaster case. In order to optimize mobile ad-hoc network performance, address the challenges that could lead to unreliable performance is required. One and most crucial key challenge is routing information from a sender to receiver. Due to the characteristics of a disaster environment such as signal attenuation, communication links exist between rescue crew is short-lived, suffer from frequent route breakage, and may result in unreliable end-to-end services. Many routing protocols have been proposed and evaluated in different network environments. This paper presents the basic taxonomy of Mobile Ad Hoc Networks and the state of the art in routing categorizes (Proactive, Reactive, Geographic-aware and Delay tolerant Networks (DTN)). The comparison of existing routing protocols in Mobile Ad-Hoc Networks indicates that overhead in Proactive and Geographic is competitive with delay in Reactive and DTN routing.


2018 ◽  
Vol 8 (1) ◽  
pp. 2532-2536
Author(s):  
S. Jahanbakhsh Gudakahriz ◽  
S. Jamali ◽  
M. Vajed Khiavi ◽  
A. Soleimany

A mobile ad hoc network (MANET) is defined as a set of mobile nodes which communicate through wireless links with no central infrastructure. In these networks nodes are always moving and could enter to or exit from the network at any time. Therefore, network topology is completely dynamic. Another characteristic of these networks is the low node energy level, resulting from inherent node limitations. Stable routing is one method to face routing challenges in mobile ad hoc networks. The objective of this study is to stabilize TORA protocol which is a distributed routing protocol, with high adaptation, efficiency, and suitability for large and dense mobile ad hoc networks and thus to provide a new high efficiency protocol. The proposed protocol introduced as Stable-TORA has been compared with base protocol TORA in different scenarios via NS-2 simulator environment and its efficiency is evaluated.


Author(s):  
Pawitar Dulari

Security is an essential requirement in wireless ad hoc network. The type of ad hoc networks makes them vulnerable to distinct forms of attack. The random nature of these networks makes invoke of security a challenging issue. The paper shows the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks. Then it presents the main attack categories that exist in it. Finally presents the current security solutions for the mobile ad hoc network.


Sign in / Sign up

Export Citation Format

Share Document