scholarly journals Implmenting A Modified Shared Tree Multicast O-Corman Protocol in Wireless Adhoc Network

2018 ◽  
Vol 7 (3.3) ◽  
pp. 31
Author(s):  
K Vanisrsee ◽  
Dr V.S.K.Reddy ◽  
K Sudarsanan

A mobile Ad Hoc network is a Noinfrastructure networkand randomly moves nodes are presented .Multicasting support data forwarding, and thus it is suitable for MANETs.Implementing’Multicast opportunistic cooperative routing in Mobile Ad Hoc Network’, (MANET) to improves the %PDR , and reduces the power consumption, multicast is meant for group communication. Multicasting sending copy of the information to all members in a group, it improves, the wireless link in a network.In an Ad Hoc network nodesare randomly distributed and free to fly without any existing infrastructure or infrastructure less administration. In the Networkeach node isfitted out with a single omnidirectional antennaand that multiple nodes are allowed, together their transmissions to take the advantages of spatial diversity to obtain energy savings.It is assumed that some nodes are not a member in a group, hence it does not receive transmission, and packet has be resent again. Where as in existing unicast transmission protocol for multiple hop network picked by multiple intermediate nodes,and only one receiver. Theprotocol performance is analyzed using the ns-2.32 network simulator. 

2020 ◽  
Vol 12 (6) ◽  
pp. 49-63
Author(s):  
Yasir Mohammed ◽  
Maha Abdelhaq ◽  
Raed Alsaqour

A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance the link break provision of the ad hoc on-demand remote protocol (AODV). The proposed algorithm is called the AODV Link Break Prediction (AODVLBP). The AODVLBP prevents link breaks by the use of a predictive measure of the changing signal. The AODVLBP was evaluated using the network simulator version 2.35 (NS2) and compared with the AODV Link prediction (AODVLP) and the AODV routing protocols. The simulation results reveal the effectiveness of AODVLBP in improving network performance in terms of average end-to-end delay, packet delivery ratio, packet overhead ratio, and packet drop-neighbour break.


Author(s):  
Ganesh Kumar ◽  
A. Arivazhagan

<p>The aim of this paper is to model the Portable Manager and allow it to aid in communication among Mobile Ad-hoc Networks (MANETs) carrying information across the mobile nodes in the network. In this article, Modeling Portable Manager aiding in the MANET Communication (MMAC) is proposed. The novelty is present in the use of node performance parameter called as α defined as the ratio of the packet received, packet loss and delay of the node which could be used for the next hop selection in the mobile ad hoc network. The Portable Manager (PM) is used to find out the relay node in the network. The working of the PM with a minimal number of nodes is analyzed and presented through the simulations in the network simulator.</p>


Author(s):  
Ali H. Al-Bayatti ◽  
Hussein Zedan ◽  
Antoniuo Cau ◽  
François Siewe

Many military research efforts have concentrated on how to allow war-fighters to take advantage of all available information within the battlefield in a rapid and flexible manner. As a result, the development of the Global Information Grid (GIG) was the key enabler for this process; hence, adding to the development of the mobile networking part of the GIG, the concept of the Mobile Ad hoc Network of Networks (MANoN) is introduced. This article proposes a novel security management algorithm achieving the three management essentials: Security Administration; Prevention and Detection; and Containment and Recovery; based on the International Telecommunication Union’s recommendation M.3400 to manage securely the future of military Network-Centric Warfare (NCW). The authors will employ Interval Temporal Logic (ITL) as a method of handling both sequential and parallel composition in flexible timely constrains, in addition, this technique will be evaluated using the Network Simulator (NS-2) to provide and check whether security requirements are met in a comprehensive manner.


Mobile Ad hoc Network(MANET) provides wireless communication withoutany infrastructure. MANET generally uses a most popular and well-suited routing protocolthat is Ad hoc on Demand Distance Vector (AODV). Random topology and mobilityin MANET cause link break multiple times in network due to which poor link quality thatresults in packet losses in the network. In this paper, link quality improvement in AODV routing protocol is focused. Link quality issue can be resolved through Cross-layer design(CLD) interaction in the OSI communication model. This technique called as Reliable-AODV. CLD is implemented by interacting Physical firstlayer and network third layer of the OSI model, CLDinteraction help in strong route formation inAODV for Reliable-AODV. The result shows an improvement in the system Performance in terms of metricslike throughput, Packet Delivery Ratio(PDR) and reduction in the packet losses, delay ofthe network. Network simulator used for performance analysis is NS-2.a Simulation tool that shows improvement in results. Castadiva Emulator with Wi-Fi routers and laptop are used as test bed architecture for validating sample results of simulations. It is observed that some small variation in the


2019 ◽  
Vol 8 (2) ◽  
pp. 2221-2228

In mobile ad-hoc network, throughput is very important performance parameter. It depends upon different other network parameters like speed of nodes, pause time, density of nodes. To obtain a desired throughput in mobile ad-hoc network, a fuzzy based throughput calculation work has been performed in this paper. In this work, DSDV routing protocol is implemented in two steps: one is fuzzy based system and another is network simulation based scenarios. Designing the rule based fuzzy system and evaluating the DSDV routing protocol in network simulator work is carried out in this research work. Throughput is considered as main performance parameter for evaluating the table driven protocol. Fuzzy system is designed using one input parameter throughput and four output parameters like pause time, maximum speed, node density, and maximum number of connections. An input will be given by the user and based on that input value; other output parameter values will be calculated by the fuzzy system. In network simulator based scenario, varying the maximum number of connections, maximum speed, pause times, number of nodes, different scenarios were generated and routing protocol’s performance is evaluated.


2021 ◽  
Vol 5 (2) ◽  
pp. 468
Author(s):  
Alon Jala Tirta Segara ◽  
Aditya Wijayanto

In this digital era the development of technology occurs an evolution in media technology, let's call it new media or people also often call it online media or people are more familiarly called it the internet, this media is certainly familiar to the ears. The delivery of data for communication can be hampered because of the lack of satellites caused by the weather or because of damage to the satellites and delays in the delivery of data that may result in late entry of information. Therefore we want to implement mobile ad-hoc network (manet) and evaluate the results of the manet method by knowing the results of end to end delay and packet delivery ratio Normalized routing load to know the existing. The research method uses simulation method and evaluation of routing model using Network Simulator. Evaluation is prioritized on the use of existing calculated parameters to test the AOMDV protocol and then we use the PSO algorithm to be able to optimize the value of existing calculated parameters. In this study has been done by using 2 scenarios with each scenario has a number of nodes namely 30 and 50 ago with an area of 1000m x 1000m and also data delivery speed of 200/kbps and speed of 200 in each scenario. After doing the simulation and looking at the existing comparison values, we came to a conclusion about the results of the parameter trial above obtained the average value of PDR on nodes 50 95.1 and nodes 30 81.5%, NRL values on nodes 50 51.4% and nodes 30 12.7%. While in optimization value with PSO each parameter occurs in a significant increase in PDR and NRL parameter value while for Avaerage delay value there is a decrease in each simulation value.


Author(s):  
Ali H. Al-Bayatti ◽  
Hussein Zedan ◽  
Antoniuo Cau ◽  
François Siewe

Many military research efforts have concentrated on how to allow war-fighters to take advantage of all available information within the battlefield in a rapid and flexible manner. As a result, the development of the Global Information Grid (GIG) was the key enabler for this process; hence, adding to the development of the mobile networking part of the GIG, the concept of the Mobile Ad hoc Network of Networks (MANoN) is introduced. This article proposes a novel security management algorithm achieving the three management essentials: Security Administration; Prevention and Detection; and Containment and Recovery; based on the International Telecommunication Union’s recommendation M.3400 to manage securely the future of military Network-Centric Warfare (NCW). The authors will employ Interval Temporal Logic (ITL) as a method of handling both sequential and parallel composition in flexible timely constrains, in addition, this technique will be evaluated using the Network Simulator (NS-2) to provide and check whether security requirements are met in a comprehensive manner.


Sign in / Sign up

Export Citation Format

Share Document