scholarly journals Improved Selfish Node Detection Algorithm for Mobile Ad Hoc Network

Author(s):  
Ahmed. A. ◽  
Zulkarnain Md. ◽  
Yazan Aljeroudi
Author(s):  
Temesgen Mengistu Helana ◽  
Alazar Merdekios Keba

In our day-to-day life, wireless technology plays a great role, because users move from place to place across the globe, it’s important to think about the type of network we can deploy quickly. Collection of two or more node forms A mobile ad-hoc network (MANET) without the aid of any centralized infrastructure. There are independent nodes that communicate without a wire in a mobile ad hoc network. Due to the behavior of nodes in MANET the time when node joining/leaving the network is unknown. This study focuses on improve performance of DSR protocol affected due to selfish nodes. So, identify path without any selfish node is the main issue for delivering a packet by selecting a reserved path. The algorithm counts the number of failed route request messages to aware the selfish node that causes failure on NS-2 simulator tools. The node is assigned to indicating the selfishness status of the node during route discovery. In this study the researcher conducts performance evaluation of existing DSR and modified one is assessed by using packet delivery ratio, and endto-end delay metrics and achieved very good result.


Author(s):  
. Harpal ◽  
Gaurav Tejpal ◽  
Sonal Sharma

In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to handle some simple problems and security considerations in MANET, operation of wormhole strike and acquiring the well-known routing protocol Ad-hoc On Need Distance Vector. This short article will be a great help for the people performing study on real world problems in MANET security.


Author(s):  
Aarti Sahu ◽  
Laxmi Shrivastava

A wireless ad hoc network is a decentralized kind of wireless network. It is a kind of temporary Computer-to-Computer connection. It is a spontaneous network which includes mobile ad-hoc network (MANET), vehicular ad-hoc network (VANET) and Flying ad-hoc network (FANET). Mobile Ad Hoc Network (MANET) is a temporary network that can be dynamically formed to exchange information by wireless nodes or routers which may be mobile. A VANET is a sub form of MANET. It is an technology that uses vehicles as nodes in a network to make a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. In this research paper Fuzzy based control approaches in wireless network detects & avoids congestion by developing the ad-hoc fuzzy rules as well as membership functions.In this concept, two parameters have been used as: a) Channel load b) The size of queue within intermediate nodes. These parameters constitute the input to Fuzzy logic controller. The output of Fuzzy logic control (sending rate) derives from the conjunction with Fuzzy Rules Base. The parameter used input channel load, queue length which are produce the sending rate output in fuzzy logic. This fuzzy value has been used to compare the MANET, FANET and VANET in terms of the parameters Throughput, packet loss ratio, end to end delay. The simulation results reveal that usage of Qual Net 6.1 simulator has reduced packet-loss in MANET with comparing of VANET and FANET.


Sign in / Sign up

Export Citation Format

Share Document