scholarly journals Research on Optimization of Routing Protocol for Quantum wireless Ad Hoc Network

Author(s):  
Ling Zhang ◽  
Qin Liu

Abstract This paper addresses the optimization of on-demand routing protocols for quantum wireless Ad Hoc network. This paper proposes an optimal quantum route metric algorithm that integrates quantum route metric and classic route metric to select a better route path for quantum communication. The paper also improves the route discovery protocol by proposing a "reverse synchronization method" which means after the route request is completed, the quantum entanglement channel is established synchronously when the reverse path is established. This method, better than general methods which builds quantum channels after the forward path establishment, reduces the time and the numbers of messages for quantum channel establishment, thus improving the efficiency. Accordingly, this paper elaborates the specific methods, procedures and related upgrading message formats involved in quantum route discovery, quantum channel establishment and quantum information transmission of on-demand routing protocols for quantum wireless Ad Hoc network. The advantage of the "reverse synchronization method" in reducing the time and the numbers of messages for quantum channel establishment is verified through analysis on protocol performance.

2017 ◽  
Vol MCSP2017 (01) ◽  
pp. 38-41
Author(s):  
Hari Shankar Sahu ◽  
Rupanita Das

Now a days telecommunication technology leads to a rapid growth of number of users, these number of users nothing but number of nodes in MANET.A wireless ad hoc network is a decentralized type of wireless network. The mobility of nodes effect on the performance of the network. Due to mobility of nodes the link breaks number of times which effect on the packet delivery. Therefore to analyze the performance, packet delivery fraction (PDF)can be used. This paper describe the packet delivery fraction of on demand routing protocol AODV and DSR on different terrain areas using GLOMOSIM.


Author(s):  
Jaber H. Majeed ◽  
Najmah Abed Habeeb ◽  
Waleed Khalid Al-Azzawi

<span>A mobile ad hoc network (MANET) can be seen as a mobile nodes collection having no support of fixed infrastructure and therefore its communication is totally dependent on the network's nodes. As a result of the mobility of nodes, rapid and unpredictable changes occur within the mobile ad hoc network (MANET) arrangements. Therefore, this makes the analysis of routing protocols very crucial so as to enhance efficient communication between the wireless nodes. IPv4 and IpV6 within the MANET is another issue of concern. IPv4 which has been traditionally used for ages and IPv6; predicted to be the forthcoming network architecture model is investigated because of its protection which has been improved as well as its enormous address space provision. The analysis on Ad Hoc On Demand Vector and Dynamic Manet On Demand routing protocols are performed using Qualnet simulator under the IPv4 and IPv6 standards. A thorough evaluation of the usability and functionality of the simulator software is carried out. The metrics for performance are; Throughput, End-to-End Delay and Average jitter. Afterwards, analyses and summary of the results is conducted and summarized in order to make available an assessment of their performances.</span>


2013 ◽  
Vol 10 (1) ◽  
pp. 393-421 ◽  
Author(s):  
Xi Wu ◽  
Huibiao Zhu ◽  
Yongxin Zhao ◽  
Zheng Wang ◽  
Liu Si

Mobile Ad Hoc Networks (MANETs) are formed dynamically by mobile nodes without the support of prior stationary infrastructures. In such networks, routing protocols, particularly secure ones are always the essential parts. Ariadne, an efficient and well-known on-demand secure protocol of MANETs, mainly concerns about how to prevent a malicious node from compromising the route. In this paper, we apply the method of process algebra Communicating Sequential Processes (CSP) to model and reason about the Ariadne protocol, focusing on the process of its route discovery. In our framework, we consider the communication entities as CSP processes, including the initiator, the intermediate nodes and the target. Moreover, we also propose an intruder model allowing the intruder to learn and deduce much information from the protocol and the environment. Note that the modeling approach is also applicable to other protocols, which are based on the on-demand routing protocols and have the route discovery process. Finally, we use PAT, a model checker for CSP, to verify whether the model caters for the specification and the non-trivial secure properties, e.g. nonexistence of fake path. Three case studies are given and the verification results naturally demonstrate that the fake routing attacks may be present in the Ariadne protocol.


Author(s):  
Rahul M Desai ◽  
B P Patil ◽  
Davinder Pal Sharma

<p class="Default">Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector, Optimized list state routing protocols, Ad hoc on demand routing protocol, Ad hoc on demand multipath routing protocol, Dynamic source routing are optimized versions of distance vector or link state routing protocols.  In this paper, existing protocols such as DSDV, AODV, AOMDV, OLSR and DSR are analyzed on 50 nodes Mobile Ad Hoc network with random mobility. Packet delivery ratio, delay, control overhead and throughput parameters are used for performance analysis.</p>


Sign in / Sign up

Export Citation Format

Share Document